- Sedgwick (San Antonio, TX)
- … requirements. + Designs computer security architecture and develops detailed cyber security designs. + Prepares and documents standard operating procedures ... PURPOSE OF THE ROLE:** To manage the implementation of security measures to protect company data , networks,...+ Knowledge of vulnerability management + Knowledge of penetration testing + Knowledge of various operating systems + Knowledge… more
- Bank of America (Denver, CO)
- …, vulnerability testing and development of risk appetite Experience evaluating cyber security controls and providing guidance for platform or distributed ... computing platforms (Cloud, PaaS) Experience with information security for No SQL, Big Data , and unstructured data stores (Cassandra, Hadoop, and /or… more
- Banc of California (Santa Ana, CA)
- … Data Security , Configuration Management, Log Generation, Security Risk Assessments/ testing methodologies, Secure Software Development Lifecycle, ... and existing vendors. + Provide support to the Information Security Incident Response team during cyber /privacy incidents....skills, abilities of the applicant in alignment with market data and other factors. Banc of California is an… more
- University of Rochester (Rochester, NY)
- …Skills: - Knowledge of computer networking concepts and protocols, and network security methodologies; knowledge of cyber threats and vulnerabilities; knowledge ... determined by considering factors including, but not limited to, market data , education, experience, qualifications, expertise of the individual, and internal equity… more
- Innovative Management & Technology Services (Clarksburg, WV)
- …Overview: Join a fast-growing company highly experienced in cyber security , cloud computing, virtualization, big data analytics, and project management! ... customers on-site at top government agencies. Job Title: Senior Information Security Specialist Primary Location: Clarksburg, WV - Hybrid Clearance: Top-Secret (TS)… more
- Celonis (New York, NY)
- …working within software development. + A bachelor's degree in Computer Science/Information Security / Cyber Security or equivalent. + Proven track record ... in Java or C++, verifying security posture through source-assisted security assessments and penetration testing (using manual/automated techniques with tools… more
- M. C. Dean (Fremont, CA)
- …Control Systems of any type desired. + Experience with installation, troubleshooting, and testing of security electronics equipment desired. **What we offer:** + ... is Building Intelligence. We design, build, operate, and maintain cyber -physical solutions for the nation's most mission-critical facilities, secure environments,… more
- Robert Half Technology (Deerfield Beach, FL)
- …with tools like Archer or ServiceNow is an advantage. * Solid knowledge of data privacy, database security , cyber governance, and IT risk management ... Description We are looking for an experienced IT Security Specialist to join our team on a...SOC 1/SOC 2, and others. * Perform IT control testing , privacy assessments, and vulnerability reviews to maintain compliance… more
- BAE Systems (Fort Worth, TX)
- …the impact of changes to the system configuration, including those related to cyber - security and nuclear surety + Develop and maintain configuration management ... diverse team that solves complex technical challenges. The Weapons Storage and Security System (WS3), Vault Modernization Program (VMP), modernizes vaults at various… more
- JPMorgan Chase (Jersey City, NJ)
- …maintain ETL/ELT pipelines and data models, an example pipeline being ingesting data from multiple Cyber Intelligence vendor sources + Develops secure and ... software solutions. Make a real impact as you help shape the future of software security at one of the world's largest and most influential companies. As a Lead … more