- UIC Government Services and the Bowhead Family of Companies (San Diego, CA)
- …scripting for automation + Experience with NIST 800-53, CNSSI 1253, or DoD Cybersecurity standards **Soft Skills** + Ability to lead architecture decisions and ... mentor others + Strong communicator capable of translating compliance needs into technical workflows + Able to operate independently in a fast-paced federal/healthcare environment + Comfortable producing documentation for audits and ATO packages Physical… more
- UIC Government Services and the Bowhead Family of Companies (Corona, CA)
- …with the client analyzing complex and unique technical support assignments and lead or collaborate with engineers, cybersecurity personnel, and program analysts ... within an agile environment. They will report to the Program Manager of the Task Order. They will consider overall project design including cost, schedule, and social issues that may be associated with a project. **Responsibilities** + Strong experience… more
- Palo Alto Networks (Santa Clara, CA)
- …At Palo Alto Networks(R) everything starts and ends with our mission: Being the cybersecurity partner of choice, protecting our digital way of life. Our vision is a ... who are as committed to shaping the future of cybersecurity as we are. **Who We Are** We take...highly skilled and motivated Senior Manager, Performance Engineering to lead our global performance engineering organization. This role will… more
- Sealing Technologies (Columbia, MD)
- …a trusted partner in providing powerful edge computing hardware and defensive cybersecurity solutions to protect the Federal Government and private enterprises. Our ... allies, mission partners, and private industries in accomplishing their cybersecurity and defense objectives efficiently and securely through cutting-edge hardware,… more
- Palo Alto Networks (Santa Clara, CA)
- …At Palo Alto Networks(R) everything starts and ends with our mission: Being the cybersecurity partner of choice, protecting our digital way of life. Our vision is a ... who are as committed to shaping the future of cybersecurity as we are. **Who We Are** We take...visionary and hands-on Sr Director, GTM and CX to lead the strategic direction and architectural design of our… more
- Innovative Management & Technology Services (Clarksburg, WV)
- …mission-driven Senior Information Systems Security Officer (ISSO) to join our cybersecurity team supporting a critical government program. This position requires ... deep knowledge of federal cybersecurity standards, hands-on technical security expertise, and the ability...standards, hands-on technical security expertise, and the ability to lead compliance efforts in a Scaled Agile Framework (SAFe)… more
- Sony Pictures Entertainment (Culver City, CA)
- …architecture and engineering and is now focused on information and cybersecurity to define robust security design patterns, reference architecture across ... architecture, DevSecOps, and technical standards throughout Sony Pictures. + Lead the development and implementation of comprehensive security architecture… more
- Davis-Ulmer Sprinkler Co. Inc. (Beltsville, MD)
- …not a cybersecurity position or security guard position. Responsibilities: * Lead all jobs that require access, intrusion, and video and ensure the technicians ... are performing necessary tasks * Liaison with the customers on security projects * Upgrading & Installing systems * Cabling | Toning and Testing * Camera Installation \Programming and Alignment * Troubleshooting connection problems * Programming of intrusion *… more
- Guidehouse (Washington, DC)
- …ensure the confidentiality, integrity, and availability of mission-critical data assets. The lead guides a team of cybersecurity professionals and works closely ... **:** None **Clearance Required** **:** Active Secret The Senior Data Security Lead supports the development of the data protection strategy for the agency's… more
- Leidos (St. Petersburg, FL)
- …an entire system, site, or program to reduce risk. * Develop and lead Information Security projects from conceptualization to full deployment and user acceptance. * ... Create comprehensive training programs on information assurance, data security, cybersecurity best practices, and relevant policies and procedures. * Design training… more