- COLSA Corporation (Huntsville, AL)
- … security investigation and must meet eligibility requirements for access to classified information. COLSA Corporation is an Equal Opportunity Employer, ... Support and maintain RHEL servers; manage packages, services, and security baselines. + Install, terminate , label, and test...+ Must be able to obtain and maintain Special Access Program (SAP) eligibility and maintain program accesses as… more
- COLSA Corporation (Huntsville, AL)
- … security investigation and must meet eligibility requirements for access to classified information. COLSA Corporation is an Equal Opportunity Employer, ... and configuration using Python and Ansible. + Maintain and enforce security across physical and virtual infrastructure, including firewalls, encryption, and … more
- SanDisk (Milpitas, CA)
- …in efficient operations. With our global reach, we ensure the global supply chain has access to the Flash memory it needs to keep our world moving forward. **Job ... lifecycle, including identification, assessment, prioritization, remediation, and reporting of security vulnerabilities. Oversee regular vulnerability scans, penetration tests, and… more
- Northrop Grumman (Tampa, FL)
- …ESXi, storage provisioning, containers, and software defined networking. + Employ security hardening, granular role-based access , and automation of repeated ... Possible is our commitment to missions. In rapidly changing global security environments, Northrop Grumman brings informed insights and software-secure technology to… more
- DEFTEC (Huntsville, AL)
- …Sentinel (analytic rules, workbooks, UEBA, automation/Logic Apps), Microsoft Defender ( Endpoint / Identity /Email), and Microsoft Purview (DLP policies, sensitivity ... to detect, investigate, and respond to data-loss and misuse events. + Access classified and open-source systems; collect, organize, and format data per InTO… more
- American Express (Charlotte, NC)
- …understanding of various security technologies (eg, SIEM, DLP, IDS/IPS, WAF, endpoint security , cloud security ). + Excellent analytical, problem-solving, ... into actionable compliance strategies and fostering a culture of security and compliance throughout the organization. **Key Responsibilities:** + Strategic… more
- Red River (Pierre, SD)
- …may involve migrating data from on-premises systems to the cloud, setting up security policies, managing user access , and configuring theMicrosoft 365 stack. + ... related to network connectivity, application compatibility, data migration, and user access to ensure a successful deployment. + Provide training and support… more
- Wells Fargo (Chandler, AZ)
- …networking, cryptography, cloud, authentication/directory services, email, internet, applications, and/or endpoint security . Assist more experienced staff with ... security consulting and moderately complex security projects related to data access , integrity,...regard to race, color, religion, sex, sexual orientation, gender identity , national origin, disability, status as a protected veteran,… more
- System One (Monroe Township, NJ)
- …policy development. + Manage IT infrastructure standards (networking, devices, applications, security tools) across the company. + Provide field IT support: ... Support the onboarding and training of staff on IT security practices and compliance. + Maintain IT asset inventory..., or equivalent. + Knowledge of Zero Trust architecture, endpoint detection and response (EDR), and advanced threat monitoring.… more
- TAD PGS, Inc. (Lackland AFB, TX)
- …Microsoft Certified: Azure Security Engineer Associate; OR Microsoft Certified: Identity and Access Administrator Associate; OR Microsoft Certified: Windows ... Server Hybrid Administrator Associate (Server Admin); OR Microsoft Certified: Identity and Access Administrator Associate. Desired Qualifications : + Microsoft… more