• Cybersecurity Senior Architect - Cloud / AI…

    Truist (Charlotte, NC)
    …on prem and cloud-based applications. + Applies in-depth and specialized expertise in Identity and Access Management and significant breadth of experience across ... of systems engineering and/or architecture in at least one of the information security areas: network security , access management, end point protection,… more
    Truist (09/10/25)
    - Related Jobs
  • 4.IT Security Engineer - Zscaler

    Robert Half Technology (Chicago, IL)
    …with organizational and regulatory requirements. * Collaborate with network, cloud, and endpoint security teams to integrate Zscaler services seamlessly. * ... Configure, manage, and maintain Zscaler Internet Access and Zscaler Private Access platforms. * Develop and enforce advanced security policies, including… more
    Robert Half Technology (09/17/25)
    - Related Jobs
  • Enterprise Cyber Security Solution…

    TECO Energy (Ybor City, FL)
    …and processes for the following cybersecurity controls: Identity and Access Management (IAM), Data Protection, Application Security , and Infrastructure ... 1. **IAM** : Designs, implements, and manages an organization's privileged access management (PAM), identity governance and administration (IGA), and… more
    TECO Energy (08/15/25)
    - Related Jobs
  • Director, Infrastructure Security Services

    NBC Universal (Englewood Cliffs, NJ)
    …working across cyber security disciplines to include but not limited to Identity and Access Management (IAM), Security Engineering, Product Security ... IT assets. This individual reports directly to the VP, Identity and Security Services and will interact...and compliance monitoring (AWS, Azure, GCP). + CASB (Cloud Access Security Broker) for SaaS protection. +… more
    NBC Universal (10/16/25)
    - Related Jobs
  • Manager Information Technology Services 2…

    New York State Civil Service (Latham, NY)
    …serve as Senior Security Architects within the areas of Network, Identity and Access Management, Data Center and Shared Platforms, Applications and ... security , zero trust, and VoIP/telephony.2. The SAE Identity and Access Management team includes ..., virtualization, storage, backup and recovery, servers, mobile & endpoint security , database security , and… more
    New York State Civil Service (10/10/25)
    - Related Jobs
  • IT Security Engineer

    Golden Route Operations (Las Vegas, NV)
    … demands, you'll design, deploy, and maintain robust defenses-such as precise access controls, backup safeguards, identity provider oversight, and seamless ... tools and systems, incorporating zero-trust principles and AI-enhanced monitoring. + Manage access lists, compensating controls, while expanding identity and SSO… more
    Golden Route Operations (09/30/25)
    - Related Jobs
  • Corporate IT Security Manager - Corporate…

    FirstBank PR (San Juan, PR)
    …Gateway Solution + Management of Sandbox Environment Solution + Management Office 365 Security and Compliance, Intune, Conditional Access , etc. + Management of ... CORPORATE IT SECURITY MANAGER Our Company At FirstBank PR ,...of Zero Trust Architecture across the organization, ensuring strict identity verification and least-privilege access principles. +… more
    FirstBank PR (10/04/25)
    - Related Jobs
  • IT Auditor

    Robert Half Technology (Austin, TX)
    …IT auditing: ability to evaluate security controls such as network protection, identity access management, endpoint security , and incident response ... industry standards. + Collect and analyze evidence such as security policies, system configurations, logs, and access ...as security policies, system configurations, logs, and access records. + Conduct interviews with vendor personnel to… more
    Robert Half Technology (09/30/25)
    - Related Jobs
  • Controlled Unclassified Information, Information…

    Montana State University (Bozeman, MT)
    …and/or meet other government-defined restrictions appropriate for work level and access . Other security -related requirements will include receiving favorable ... IT Professional Working Title Controlled Unclassified Information, Information Systems Security Manager Brief Position Overview The Controlled Unclassified Information… more
    Montana State University (10/02/25)
    - Related Jobs
  • IT Security Specialist II

    Amcor (WI)
    …to reduce risk and prevent incidents + Serve as subject matter expert on endpoint security , mobile and virtual security , intrusion detection, and emerging ... depth, TCP/IP, including risk management, threat and vulnerability management, incident response, and identity and access management. + Fluent in English in both… more
    Amcor (08/30/25)
    - Related Jobs