- Stanley Black and Decker (New Britain, CT)
- …+ **Security:** Secure architecture design, Least Privilege, Zero Trust approach, IAM - Access management , vulnerability assessment, compliance standards, ... automation, cloud infrastructure within an **IoT environment,** and CI/CD pipeline management . The ideal candidate thrives in technical settings, excels at solving… more
- Truist (Charlotte, NC)
- …following areas: Encryption, Data Security, Application Security, End Point Security, Identity and Access Management , Windows/Unix/Linux Systems Security, ... cloud security technology stack, including CSPM, CNAPP, CIEM, SSPM, vulnerability management , code scanning, SIEM, identity tooling, and network/endpoint… more
- Microsoft Corporation (Redmond, WA)
- …innovations that impact billions of lives around the world. IAM Protect Team ( Identity and Access Management ) builds and manages the products and ... access management within Microsoft focusing on various aspects including access evaluation, hardening and governance. IAM protect employees have deep… more
- Edward Jones (St. Louis, MO)
- …skills + Partner with appropriate Client business stakeholders to plan, implement and support identity and access management , processes, systems and their ... knowledge to mature the newly introduced greenfield by expanding the systems under management , centralizing access governance to meet regulatory and risk success… more
- AIG (Salida, CO)
- …specifically system and application remediation (patching, settings, EOL/upgrades), monitoring and logging, identity and access management . + Track and ... Engagement (GRE), Third Party Relationship Management , Security Architecture, Security Engineering, Identity and Access Management + Global ISO -… more
- Materion (Cleveland, OH)
- …sign-on (SSO) and multi-factor authentication (MFA), and integrate them with enterprise-wide IAM systems. Role Design and Management : + Implement SAP Governance, ... involves designing, implementing, and managing SAP security architecture, ensuring secure access , data protection, and compliance with regulations like SOX, ITAR,… more
- MyFlorida (Tallahassee, FL)
- …maintaining, and executing the department's IT Security Strategic Plan + Review and modify identity and access management policies + Review and modify ... to information security incidents and execute countermeasures + Review access requests and provide access control oversight...IAM policies for both on prem and cloud-based identity management + Excellent coordination and collaboration… more
- Oracle (Annapolis, MD)
- …4. **Cloud Governance & Security:** Ensure robust multi-cloud security by implementing Identity and Access Management , network segmentation, encryption, key ... (GCP) + **Hybrid Security:** OCI Vault (Oracle), Key Vault (Azure), KMS (AWS/GCP), and cross-cloud identity (OCI IAM , Azure AD, AWS IAM , Google Workspaces) +… more
- Truist (Charlotte, NC)
- …limited to firewalls, intrusion detection/prevention systems, network operating systems, identity management , database activity monitoring, encryption, content ... and maintaining IAM solutions that ensure secure, efficient, and compliant access across the organization. The SailPoint IAM Engineer will collaborate with… more
- AeroVironment (Huntsville, AL)
- …Loss Prevention (DLP) solutions + Advanced forensics and incident response + Privileged Access Management (PAM) systems + Cloud Security Posture Management ... security posture + Architects zero-trust security models and implements modern identity solutions across the enterprise + Leads security design reviews for… more