- RTX Corporation (Fullerton, CA)
- …advantage. Systems Security Engineering creates holistic security solutions leveraging Cyber Security, Software Assurance and Supply Chain Risk Management to ... support Program Protection Implementation on embedded weapons systems. Join our highly...Operate (ATO) accreditation + Perform analysis on cybersecurity collected data and test results + Validate secure configuration of… more
- RGP (San Francisco, CA)
- …CSF 2. , ISO 27001, etc. ); Cybersecurity risk management strategy expertise; Identity and access management; Cyber defense lead practices; AI solution security ... and protection ; Penetration testing & threat detection and response; Data classification and privacy; Data privacy rules and regulations (e. . , GDPR, CCPA,… more
- Sanford Health (ND)
- … identity and access management, SSO/MFA, vulnerability management, and data protection . Skillfully maintains the existing security systems, including ... work and the work of other team members. **Qualifications** Bachelor's degree in cyber security or an information technology related field. Minimum of 4 years… more
- Motion Recruitment Partners (Irving, TX)
- …match with pre and post-tax options + Paid Sick Time Leave + Legal and Identity Protection Plans + Pre-tax Commuter Benefit + 529 College Saver Plan Motion ... Cyber Threat Intelligence Analyst Irving, TX **Onsite** Contract...operational, and tactical intelligence activities. + Collect and fuse data from internal telemetry, OSINT, ISACs, and commercial sources.… more
- Leidos (Alexandria, VA)
- …systems and provide IS / Security Control Status Reports based on live data from security monitoring tools. + Ensure ongoing assessments are in compliance with ... + Coordinate with System, ACAS, and HBSS/ESS Administrators to resolve credentialing and data issues. + Provide real-time security status metrics based on the ConMon… more
- Medtronic (Denver, CO)
- …a more connected, compassionate world. **A Day in the Life** The Cyber Security Architect & Engineering Director has responsibilities for defining, developing, and ... technologies to safeguard access to resources, networks, computer systems, and data . Example: SIEM, SOAR, EPP/EDR, MFA, Vulnerability Monitoring & Management, DLP,… more
- City of New York (New York, NY)
- …on various Risk and Compliance topics, such as Cybersecurity, Privacy and Data Protection , and information discoverability under Freedom of Information Law. ... will collaborate with the Audit and Compliance Division within OTI's Office of Cyber Command. Under the guidance of the division's leadership, the College Aide will… more
- Koniag Government Services (San Antonio, TX)
- …including cloud migration strategies, software-defined networking implementations, and advanced data protection schemes. + Develops architectural road maps ... **Koniag Data Solutions, LLC,** a Koniag Government Services company,...Services company, is seeking an IT Architectural Engineering Services ( Cyber Network & Systems Security SME V) support KDS… more
- Nomad Global Communication Solutions (Huntsville, AL)
- …required to work onsite in Huntsville, Alabama. Position: Software Engineer lV ( Cyber ) - NTC Division: Technology Department: Nomad Total Command (NTC) Status: ... API integration, web sockets, messaging and information exchange, versioning, data logging, dependencies, configurations, code translation, local and cloud hosting,… more
- BAE Systems (Herndon, VA)
- …the US Department of Defense, enables the US government to transform data into intelligence and provides engineering, integration and sustainment support for ... be expected to: recognize the issue(s), identify the facts, define additional data that would be helpful, make assumptions as necessary, determine alternative… more