- PSEG (Newark, NJ)
- …wireless environment, Cloud software/infrastructure security, secure software development, and data protection . + Collaborating closely with Digital Workplace, ... + Broad knowledge of cybersecurity principles (eg access control, data protection , cybersecurity architecture, infrastructure/application security design… more
- Charles Schwab (Southlake, TX)
- …platforms** (AWS, Azure, GCP) and associated security controls. + Familiarity with ** privacy -by-design principles** and data protection laws (GDPR, CCPA, ... and conducting ** Privacy Impact Assessments (PIAs)** to safeguard client data , meet regulatory obligations, and strengthen Schwab's cyber resilience posture.… more
- General Dynamics Information Technology (Baton Rouge, LA)
- …Able to Obtain:** None **Public Trust/Other Required:** None **Job Family:** Cyber and IT Risk Management **Skills:** GRC Tools,NIST 800-53,Risk Management Framework ... network architectures + Collaborate with stakeholders in order to develop program/project cyber policies . + Familiarization with NIST 800 series documentation, (… more
- The Hartford (Charlotte, NC)
- …software. This includes configuring and managing the software to protect our email system and data from cyber threats such as spam, phishing, and malware. We are ... includes configuring, managing, and monitoring the software to protect our email system and data from cyber threats such as spam, phishing, and malware. The… more
- Guidehouse (Alexandria, VA)
- …to AWS GovCloud environments, ensuring control enforcement and alignment with the DoD's cyber and privacy mandates. + Provide comprehensive NIST RMF support via ... **Job Family** **:** Cyber Consulting **Travel Required** **:** Up to 10%...Will Do** **:** + Provide comprehensive IT, cybersecurity, and data operations services for DoD program in AWS GovCloud.… more
- Chenega Corporation (Sierra Vista, AZ)
- …Analyst (Penetration Tester) shall plan for and conduct OT&E cyber survivability assessments on operationally representative system configurations, operated within ... the coordinated involvement of NSA-certified Red Teams. In accordance with DOT&E cyber policies, the Contractor shall perform T&E planning, execution, data … more
- ISC2 (Springfield, IL)
- …and data privacy requirements (eg, GDPR (General Data Protection Regulation), HIPAA (Health Insurance Portability and Accountability)). Collaborate ... we do in support of our vision of a safe and secure cyber world. Our globally recognized, award-winning portfolio of certifications provide an independent and… more
- Rubrik (Palo Alto, CA)
- …** Rubrik (RBRK), the Security and AI company, operates at the intersection of data protection , cyber resilience and enterprise AI acceleration. The Rubrik ... awareness education to teams on security best practices for data protection , and ensures data ...and follow system-specific security policies and procedures; + Protect data and individual privacy per requirements and… more
- Proofpoint (Washington, DC)
- …will become an expert in Email Security Gateways, Advanced Persistent Threats, Attack Protection , Threat Response, Data Loss Prevention (DLP), and the threat ... monitoring + IT security, vulnerability or risk assessments, and policy enforcement + Data Loss Prevention (DLP), compliance and privacy + Enterprise email… more
- Rubrik (NC)
- …** Rubrik (RBRK), the Security and AI company, operates at the intersection of data protection , cyber resilience and enterprise AI acceleration. The Rubrik ... Know, acknowledge, and follow system-specific security policies and procedures; + Protect data and individual privacy per requirements and regulations; + Perform… more