- PSEG (Newark, NJ)
- …wireless environment, Cloud software/infrastructure security, secure software development, and data protection . + Collaborating closely with Digital Workplace, ... + Broad knowledge of cybersecurity principles (eg access control, data protection , cybersecurity architecture, infrastructure/application security design… more
- Leidos (Odenton, MD)
- …technology-enabled services and mission software capabilities in the areas of cyber , logistics, security operations, and decision analytics to support our defense ... to provide on-site contract support to USCYBERCOM Operations directorate (J3), Cyber National Mission Force (CNMF), and Joint Task Force-Ares (JTF-ARES). Timely… more
- Rubrik (Palo Alto, CA)
- …Experience with modern data protection , cloud-native infrastructure, security, identity , or cyber recovery solutions. + Familiarity with hybrid event ... Security and AI company, operates at the intersection of data protection , cyber resilience and...Rubrik Security Cloud platform is designed to deliver robust cyber resilience and recovery including identity resilience… more
- Truist (Charlotte, NC)
- …areas of specialization relative to Cloud architectures and security principles, Data Protection , IT Risk, Network Security, Application Security, Security ... the information security areas: network security, access management, end point protection , data loss prevention, vulnerability management, application security,… more
- Sumaria Systems, Inc. (Bedford, MA)
- …Manager (ISSM) to ensure system and application deliverables meet all required cyber security policies and regulations for the Technical Advisory and Assistance ... Unclassified Information (CUI), respectively. + Ensure handling of possible or actual data spills of classified information resident in ISs, are conducted in… more
- Sumaria Systems, Inc. (Bedford, MA)
- …Manager (ISSM) to ensure system and application deliverables meet all required cyber security policies and regulations for the Technical Advisory and Assistance ... and to prevent and defend against unauthorized access to systems, networks, and data . + Conduct risk and vulnerability assessments and inspections of planned and… more
- Guidehouse (Arlington, VA)
- …areas: Information Security Continuous Monitoring (ISCM), cybersecurity audit and compliance, and data protection strategy. The consultant will work closely with ... execution of cybersecurity strategies aligned with ISCM, IT and Cyber audit, or Data Security teams. +...Team: Support the development and implementation of Zero Trust data protection strategies, including encryption, tokenization, and… more
- Truist (Atlanta, GA)
- …distributed, and/or mainframe) and how to secure them, including access control, data protection , monitoring, and integration with other technologies + ... + Mobile technologies; + Encryption, tokenization, and key management technologies; + Endpoint Protection (includes malware); + Data Loss Protection (DLP)… more
- Rubrik (Albany, NY)
- …** Rubrik (RBRK), the Security and AI company, operates at the intersection of data protection , cyber resilience and enterprise AI acceleration. The Rubrik ... is revolutionizing data security with Zero Trust Data Protection (TM) , enabling organizations to...Security Cloud platform is designed to deliver robust cyber resilience and recovery including identity resilience… more
- Trellix (Albany, NY)
- …organizations confronted by today's most advanced threats gain confidence in the protection and resilience of their operations. Along with an extensive partner ... We are seeking a seasoned and strategic Senior AI Cyber Defense Consultant to spearhead the advancement of an...compliant, and resilient security solutions that protect sensitive patient data and critical systems. This role requires a blend… more