- OCT Consulting, LLC (Washington, DC)
- …(RMF) support. * Implement advanced security architectures for predictive threat detection and response. * Conduct vulnerability assessments. * Manage Configuration ... Management (CM) and control. * Maintain compliance with all cybersecurity policies. * Provide continuous monitoring and reporting of security controls. * Ensure compliance with the DoD Zero Trust Architecture (ZTA). * Ensure the secure operation of the… more
- Saint-Gobain (Malvern, PA)
- …Integrate AI/ML models to automate entity resolution, match/merge logic, and anomaly detection . + Collaborate with data science teams to operationalize AI models ... within MDM workflows. **-Data Quality & Governance** + Analyze and troubleshoot data issues to ensure accuracy and completeness. + Conduct data cleansing to eliminate duplicates and outdated records. + Define and implement data standards, policies, and… more
- Indorama Ventures (Houston, TX)
- …Waste, Wastewater, Storm Water, SPCC) + Develop and manage of Leak Detection and Repair (LDAR) program [audit/review monitoring data for compliance; ensure piping ... changes are added] + Manage Waste Management Program [waste profiles, waste inspections, etc.] + Prepare/submit monthly Environmental Metrics Reports for Corporate + Work collaboratively with team members with different backgrounds and perspectives. +… more
- Charles River Laboratories (Charleston, SC)
- …business group has a comprehensive portfolio of endotoxin testing, microbial detection and microbial identification products and services is unlike any other, ... and has been purposefully designed to meet the complex and ever-changing needs of the industry. We help clients to ensure product safety and quality with easy-to-use yet robust testing solutions that satisfy regulatory requirements, support critical decision… more
- Microsoft Corporation (Redmond, WA)
- …services, serving as the single point of accountability to ensure rapid detection , triage, resolution, and customer communication. + Act as the central authority ... during live site incidents, driving real-time decision-making and coordination across Engineering, Support, PM, Communications, and Field teams. + Contribute to the design of V. Next architecture for Cloud infrastructure services, based on Customer/ First… more
- Ross Stores, Inc. (Dublin, CA)
- …security space with general understanding of current security threats, detection and response & automation orchestration toolsets including endpoint security, ... cloud security SIEM and EDR/XDR/MDR and IR\. * At least 7 years of Information Security experience and at least 5 years with a large organization\. * Strong knowledge of security products such as File Integrity Monitoring, Endpoint Security, mobile security,… more
- Cleveland Clinic (Cleveland, OH)
- …reports; the economic and efficient use of resources; and the deterrence and detection of fraud. + Collect and analyze data from diverse sources, utilizing ... computer-assisted auditing techniques. + Develop and document audit findings, including recommendations for improving controls and complying with regulatory requirements. + Provide or assist in providing training, coaching, and guidance to internal audit staff… more
- Caterpillar, Inc. (Nashville, TN)
- …and troubleshooting the system; analyzing security events and logs; developing detection rules and dashboards; supporting security analysts; managing data ingestion ... and retention; and ensuring overall system health, performance, and compliance. **What You Will Do:** + Serve as the enterprise subject matter expert for SIEM tools within Caterpillar + Partner with internal teams to ensure the SIEM solution is optimized and… more
- General Dynamics Information Technology (Fairfax, VA)
- …access reviews + Conduct access audits, user entitlement reviews, and anomaly detection to ensure least-privilege compliance + Provide subject matter expertise in ... **identity federation, PKI, certificate management** , and secure API authorization + Collaborate with DevSecOps teams to embed ICAM policies within CI/CD pipelines and Infrastructure-as-Code (IaC) templates **TOOLS & TECHNOLOGIES YOU'LL WORK WITH:** + **IAM &… more
- Securitas Security Services USA, Inc. (New York, NY)
- …monitoring with event logging and recording, alarm monitoring of intrusion detection systems, and emergency dispatch, incident reporting and analysis, and remote ... alarm panel programming. We are driven by a clear corporate culture and purpose, which helps us live according to our values of Integrity, Vigilance, and Helpfulness. These values are at the heart of our culture, help define who we are and guide our actions.… more