- Crown Equipment Corporation (New Bremen, OH)
- …frameworks. + Ensure application security practices align with regulations including General Data Protection Regulation (GDPR) and Payment Card Industry Data ... Interface (API)-based applications. + Review design documents and perform architecture risk assessments for new and existing applications. + Collaborate with DevOps,… more
- Proofpoint (Sunnyvale, CA)
- …safeguard their data , and make their users more resilient against cyber -attacks. Leading organizations of all sizes, including more than half of the Fortune ... digital world. Join us in our pursuit to defend data and protect people. How We Work: At Proofpoint,...our customers protect their greatest assets and biggest security risk : their people. That's why we're a leader in… more
- Niagara County Community College (Sanborn, NY)
- …designing, implementing, and managing robust security measures that protect our infrastructure and data . From network and firewall protection to Office 365 and ... protecting digital environments and staying one step ahead of cyber threats? Do you thrive in a role where...comprehensive IT security strategies to protect the College's systems, data , and users. + Design, implement, and maintain security… more
- Proofpoint (Pittsburgh, PA)
- …safeguard their data , and make their users more resilient against cyber -attacks. Leading organizations of all sizes, including more than half of the Fortune ... digital world. Join us in our pursuit to defend data and protect people. How We Work: At Proofpoint,...our customers protect their greatest assets and biggest security risk : their people. That's why we're a leader in… more
- Proofpoint (San Diego, CA)
- …problem-solving, Exceptional in execution and impact. **Corporate Overview** In today's cyber threat landscape, protection starts with people. At Proofpoint, ... digital world. Join us in our pursuit to defend data and protect people. How We Work: At Proofpoint,...our customers protect their greatest assets and biggest security risk : their people. That is why we are a… more
- BAE Systems (San Diego, CA)
- …( _GXP_ ) develops industry-leading geospatial intelligence _software_ for data management, image exploitation, and reporting. **Position Summary:** This position ... and systems, including Lab-in-a-Box (LIB) environments, virtualization platforms, endpoint protection , and logging/alerting tools. This position is 100% onsite… more
- SAIC (El Segundo, CA)
- …Systems Security Officer (ISSO)** to support all facets of SAIC's Information Protection Program at our **El Segundo, CA** location. The ISSO assists the ... Authorities across the DoD and Intelligence Communities. + Perform vulnerability/ risk assessment analysis to support authorization and accreditation. + Prepare… more
- Arkansas Electric Cooperative Corporation (Little Rock, AR)
- …including power plants, substations, and corporate offices. + Conduct regular risk assessments and vulnerability analyses to identify potential threats and ... weaknesses. Use this data to recommend and implement mitigation strategies. + Create...physical security, including NERC CIP-006 (Physical Security of BES Cyber Systems) and CIP-014 (Physical Security). + Prepare for… more
- Amentum (Fort Belvoir, VA)
- …Synthesize findings to support vulnerability identification, course of action development, protection studies, trend analyses, risk analysis, and mitigation ... reports (IPRs) and briefs, white papers, after action reviews, final reports, risk analysis products, and other documents necessary to convey assessment findings to… more
- PNC (Cleveland, OH)
- …working capital, achieve faster, more secure transactions, and take advantage of data -driven insights to unlock new potential for their company. Our best-in-class ... through the use of technology + Offering reporting and data integration to provide efficiencies and business intelligence around...needs. + Protecting company assets against various forms of cyber or payment fraud + Creating new products and… more