- L3Harris (Cape Canaveral, FL)
- …and IT systems. The selected individual will perform technical security control assessments and baseline validations to identify vulnerabilities and control ... continuous monitoring program. Will conduct System Administration (Linux/Windows) and Cybersecurity sustainment activities (hardware/software change management, account management, auditing,… more
- Citigroup (Irving, TX)
- …all technical decisions, ensuring compliance with applicable laws, rules, regulations, and internal policies, while escalating and reporting control issues with ... of middleware, database, container, and AWS cloud environment as well as change- control and compliance processes. We are seeking a highly skilled and dedicated… more
- CAE USA INC (Arlington, TX)
- …Engineers (ISSE) for providing technical expertise and support to CAE programs and Cybersecurity staff. This position is NOT Remote. The individual hired for the ... is responsibility for management, implementation and testing of our Program's Cybersecurity Requirements. The ISSE is involved in most cyber-related technical… more
- Leidos (Fort Meade, MD)
- … Administrator ) + Maintain expert knowledge of endpoint and networking security controls ; provide updates to security control guidance. + Familiarity with all ... architectures, technologies, policies, information and analytic data. + Develop cybersecurity and risk assessment methodologies and procedures to support prevention,… more
- Evolv Technology (Waltham, MA)
- Job Title: Senior Business Applications Administrator The Elevator Pitch Are you passionate about optimizing business systems and driving operational excellence? ... Evolv is seeking a Senior Business Applications Administrator to lead the administration of NetSuite and other...company, and it is essential that our IT and CyberSecurity program can deliver scalable, secure solutions that enable… more
- L3Harris (Camden, AR)
- …Systems Security Manager. The selected individual will perform technical security control assessments and baseline validations to identify vulnerabilities and ... control deficiencies as part of a continuous monitoring program...BoE artifacts. + Responsible for analyzing and/or administering security controls for information systems. + Configuration of change management… more
- Bank of America (Washington, DC)
- …operates global security operations centers that monitor, detect, and respond to cybersecurity incidents. Within GIS, Identity and Access Management (IAM) is a ... and guidelines. You will provide subject matter expertise and support to ( internal ) customers, IT management, and staff in assessing risk and the implementation… more
- NRG Energy, Inc. (NJ)
- …configuration baselines, security logging and patching. Will work with compliance and controls personnel to implement and maintain the program and serve as the ... lead for all CIP related Physical and Electronic Access Control for identified site. * Be the primary contact...various types of alerts or breaches. * Be the administrator for personnel needing electronic access, both local and… more
- ADP (Roseland, NJ)
- …Govern identity lifecycle processes, group policy management, and role-based access controls . + Manage **identity federation** and **SSO** integrations using Entra ... and issuing CA management. + Manage the full **certificate lifecycle for internal needs** , including issuance, renewal, rotation, and revocation. + Administer and… more
- Leidos (Alexandria, VA)
- …initiatives for the **United States Coast Guard (USCG)** at Command, Control , Communication, Computer, Cyber, and Intelligence Service Center (C5ISC) in the ... desktop and cloud systems. You'll work closely with cloud engineers, cybersecurity analysts, and program leadership to drive continuous improvement and deliver… more