- Rocket Software (Des Moines, IA)
- …they're doing!** **Job Description Summary:** As a senior cybersecurity engineer focused on identity security and threat mitigation with Rocket Software, you are ... Responsibilities** : + Deploy, manage and maintain the enterprise security identity tools, including SSO, MFA, full... capabilities including working with tools such as privilege access management, secrets vaults, email security solutions… more
- Robert Half Technology (Austin, TX)
- …IT auditing: ability to evaluate security controls such as network protection, identity access management, endpoint security , and incident response ... industry standards. + Collect and analyze evidence such as security policies, system configurations, logs, and access ...as security policies, system configurations, logs, and access records. + Conduct interviews with vendor personnel to… more
- Deloitte (San Francisco, CA)
- …and offshore engineers and architects across 8 key Azure cyber domains: Governance, Identity , Application Security , PaaS security , Infrastructure security ... management group and subscription management and configuration, identify management and access control, firewall management, auditing and monitoring, security … more
- Robert Half Technology (El Monte, CA)
- …and manage security tools and technologies, including firewalls, VPNs, IDS/IPS, and endpoint protection. + Monitor and analyze security logs and alerts to ... detect and respond to incidents. + Implement and manage identity and access management (IAM) for Office...O365 security configurations. + Experience with Azure security , MFA, and conditional access policies. +… more
- Unitil (Hampton, NH)
- …and servers. + Manage OT malware and virus protection systems to ensure adequate endpoint security at all times. + Coordinate and participate in efforts to ... regulatory standards, upstream risks and industry best practices. 15% Identity , Credential & Access Management + Work...security groups and process for maintaining 'least privileged' access to systems 5% Assist the Cyber Security… more
- Gilead Sciences, Inc. (Raleigh, NC)
- …Communications, Computer Operations Security , Telecommunications & Network Security , Security Architecture & Models, Endpoint Security , and Cloud ... develop therapies that help improve lives and to ensure access to these therapies across the globe. We continue...illnesses worldwide. We are seeking a dynamic and experienced ** Security Operations Manager** to lead and enhance our cybersecurity… more
- Centene Corporation (New York, NY)
- …world. As a diversified, national organization, Centene's technology professionals have access to competitive benefits including a fresh perspective on workplace ... flexibility. **Position Purpose:** The Data Platforms Security Engineer II is responsible for supporting the design,...+ Prepare reports based on facilities metrics and data access trends. **Compliance & Governance:** + Apply metadata tagging… more
- PSEG Long Island (Bethpage, NY)
- …threat analysis including the development of response procedures + Knowledge of Identity and Access Management IAM fundamentals including Active Directory ADCS ... 20 or more hours per week, you will have access to a wide range of comprehensive benefits eligible...**Job Summary** We are seeking a highly skilled Cyber Security Engineer and Operations Specialist to lead and support… more
- UIC Government Services and the Bowhead Family of Companies (Arlington, VA)
- …Assured Compliance Assessment Solution (ACAS) for vulnerability management * Manage Trellix Endpoint Security System (ESS), previously known as McAfee Host Based ... Security System (HBSS) * Apply cloud-based access ...to race, age, color, religion, sex, sexual orientation, gender identity , national origin, disability, veteran status, and other protected… more
- Banc of California (Santa Ana, CA)
- …WIN(R) **THE OPPORTUNITY** Responsible for all aspects of cyber security operations including architecture, design, configuration, deployment, operation and ... management of cyber security tools, systems and processes. The position is involved... posture of the Bank using next-gen firewall, IDS/IPS, endpoint protection, DLP, encryption, SIEM, vulnerability management and other… more