- SMBC (Charlotte, NC)
- …Sumitomo Mitsui Finance and Leasing Co., Ltd. **Role Description** As a Vulnerability Management Analyst , you will be a key part of a high performing SOC team, with ... to protect the Bank's network and data from a cyber -attack and in turn, protect its reputation and the...to set up detections and mitigations ie, Intrusion Prevention Systems , ensuring we have signatures in place to protect… more
- ManpowerGroup (Houston, TX)
- **Our client, a leading energy company, is seeking a Cyber Security Engineer to join their team. As a Cyber Security Engineer, you will be part of the Security ... communication, which will align successfully in the organization.** **Job Title:** Cyber Security Engineer **Location:** Houston, Princeton, or Utah (Hybrid, 1-3… more
- JPMorgan Chase (Plano, TX)
- …leadership will be pivotal in enhancing our resilience against evolving global cyber threats. As a Cybersecurity Intelligence Vice President at JPMorgan Chase within ... critical role in safeguarding the firm's digital assets and infrastructure from cyber threats. Responsible for identifying, assessing, and mitigating risks, you will… more
- Vistra (Irving, TX)
- …Maintenance, Regulatory Affairs, Operations, Security, etc.) *Capabilities and/or knowledge of cyber security controls relating to operating systems , firewalls, ... and effectiveness. **Education, Experience, & Skill Requirements** *5-7 years experience in cyber security, cyber security compliance or nuclear power plant… more
- Leidos (Odenton, MD)
- **Description** Leidos is seeking multiple Cyber Analysts in Ft Meade, MD to support our Connection Approval / Authorization to Connect efforts. These positions are ... MP metrics, and processing connection package correspondence using Government-approved systems . Requirements: + Bachelor's degree (IT-related field preferred), and… more
- Leidos (Alexandria, VA)
- …ConMon Analysts to be responsible for overseeing and monitoring authorized IT systems (re-authorization and new systems ) throughout their lifecycle for security ... activities and artifacts that include the oversight and monitoring of IT systems throughout their lifecycle. + Conduct continuous assessments of security controls,… more
- TEKsystems (Honolulu, HI)
- …network and security status of any component comprising the assigned customer's networks, systems , and software. Additionally, he/she will also be a member of the ... basis. Use network and system management platforms to remotely access and analyze systems , nodes, and devices to identify resolutions to correct anomalies. * 10%… more
- Orange-Ulster BOCES (Goshen, NY)
- …on maintaining data integrity and security, including developing policies, monitoring systems , and protecting against unauthorized access or data loss. It also ... higher in Computer Science, Computer Technology, Data Processing, Management Information Systems , Information Resource Management or related field and one (1) year… more
- STELLAR SERVICES (New York, NY)
- …best practice, principles of secure design, and business strategies. + Revalidate systems to most recent reference architectures to determine gaps, develop and ... manage programs to align systems to newest standards and reference architectures. Define the...+ Define security configurations and operational standards for security systems and applications, including policy assessment and compliance tools,… more
- ONE Gas (Tulsa, OK)
- …security architecture and security configuration of security infrastructure and systems . Provide configuration and engineering for new security initiatives within ... + Endpoint applications + IP networking + Windows server and/or Unix operating systems + Virtualization and cloud technologies + Event monitoring, logging, and alert… more