- Amazon (Herndon, VA)
- …Position Requirements: Bachelor's degree or foreign equivalent degree in Computer Science, Engineering, Information Systems or Technology, Mathematics ... Position Requirements: Bachelor's degree or foreign equivalent degree in Computer Science, Engineering, Information Systems or Technology, Mathematics… more
- Amazon (Seattle, WA)
- …Position Requirements: Bachelor's degree or foreign equivalent degree in Computer Science, Engineering, Information Systems or Technology, Mathematics ... Position Requirements: Bachelor's degree or foreign equivalent degree in Computer Science, Engineering, Information Systems or Technology, Mathematics… more
- Staples (Framingham, MA)
- …to security architecture. + Extensive experience with both on-premises and cloud-based security systems . + Proficient in using advanced security software ... or a related field. + Professional certifications such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager… more
- TIAA (Frisco, TX)
- … systems . + Lends technical assistance to other incident response and security operation teams, including vulnerability assessments and intrusion detection. + ... and dynamic) and reverse engineering. + Previous experience in other information security roles, such as penetration testing, vulnerability management, threat… more
- CoStar Realty Information, Inc. (San Diego, CA)
- …accredited, not for profit university or college (preferably in a relevant field - Computer Science/Cyber Security ) + A track record of commitment to prior ... adversary emulation and the validation of detective, defensive, and vulnerability controls + Plan and oversee external red team...of total experience in a technical role such as security , networking, systems , or software development +… more
- Cardinal Health (Indianapolis, IN)
- …studying architecture/platform; and identifying integration issues. + Verify information security systems effectiveness by developing and implementing testing ... risks and ensure compliance. With heavy focus in information security operations, including vulnerability management, incident/event management, compliance… more
- Actalent (Colorado Springs, CO)
- …the CIA Triad (Confidentiality, Integrity, Availability) in designing and maintaining secure systems . * Interpret and apply Security Requirements Guides (SRGs) ... Additional Skills & Qualifications Required Qualifications: * Bachelor's degree in Cybersecurity, Computer Science, Information Systems , or related field. * 3+… more
- Robert Half Technology (La Vergne, TN)
- …leverage cutting-edge tools to enhance the security posture of our systems . Responsibilities: * Conduct regular vulnerability assessments and scans to ... Systems (IDS) to detect potential breaches. * Investigate security incidents and provide detailed root cause analyses with... protocols to staff. Requirements * Bachelor's degree in Computer Science, Information Security , or a related… more
- Amentum (Linthicum, MD)
- …security compliance of low and moderately complex information systems , products, and components. Analyze design specifications, design documentation, ... + Verify and validate that the system meets the security requirements. + Provide vulnerability assessment of...the information system + Five (5) years experience in security , systems engineering or system assessment to… more
- Trinity Solar (Iselin, NJ)
- …cyber threats. In this critical role, you will design, implement, and manage security systems , policies, and protocols across the enterprise. You will work ... and system architectures across cloud and on-prem environments. + Continuously monitor systems and networks for security breaches using SIEM tools, endpoint… more