- CommonSpirit Health (Englewood, CO)
- …integrations with downstream and upstream systems (Payroll, HR, Finance, Supply Chain, Identity Management , Benefits vendors, etc.). + Develop calculated fields, ... condition rules, business processes, and custom reports to meet complex business needs. + Data Conversion & Migration: ERP Data Conversion & Migration Support + Collaborate with the Data Conversion team leveraging GCP BigQuery for centralized transformation of… more
- DeVine Consulting, Inc. (Monterey, CA)
- …proper configuration and support of domain system servers, SAN, backup systems, identity management , security of the datacenter + Planning, installation, ... maintenance during or after-work hours, troubleshooting, and managing all servers and applications + Assessment of customer needs and implementation of improved configurations for customer needs Requirements: + BA/BS from an accredited college or university… more
- Post Holdings Inc. (St. Louis, MO)
- …position, we need an individual with a technical understanding of networking, identity management , host security and operating systems. The individual should ... have the ability to learn new information at a rapid pace. Good technical and communication skills, ability to deal with ambiguity and very high level of creativity and inquisitdiveness are a must. Previous experience in security operations, security event… more
- STELLAR SERVICES (New York, NY)
- …+ Create documentation needed to support new development. + Integrate with Oracle Identity Management System usinQ People lnteQration Broker + Share knowledge to ... continually improve implementation methodology + Support technical aspects of code deployment to production environments + 8 years of PeopleSoft development experience required more
- Futurex (Bulverde, TX)
- …Collaborate with security and DevOps teams to ensure compliance, encryption, and identity management standards. + Lead network-related projects for cloud ... migrations, multi-region deployments, and disaster recovery. + Establish and document best practices, architecture diagrams, and operational procedures. + Mentor junior engineers and contribute to the continuous improvement of the infrastructure team.… more
- Walmart (Bentonville, AR)
- …Qualifications** + Experience with ADE-related platforms (eg, device lifecycle tools, identity management , collaboration apps). + Familiarity with security best ... practices and compliance standards. + Background in mentoring and technical leadership. **Why Join Us** + Impact: Your work will directly improve associate productivity and engagement across the enterprise. + Growth: Opportunities for career advancement and… more
- Amazon (Arlington, VA)
- …any combination of the following: threat modeling experience, secure coding, identity management and authentication, software development, cryptography, system ... administration and network security experience - Knowledge of networking protocols, to include HTTP(S), DNS, and TCP/IP - Experience with AWS products and services - Experience performing security activities across one or more phases of the software… more
- STELLAR SERVICES (New York, NY)
- …and operating system security design; access and audit control development; and identity management solutions. + Develop sets of security principles, technology ... standards and architectural constructs which guide the solution design, engineering and deployment of IT solutions. + Ensure security architecture reviews are conducted for new technology to ensure best practices, document security solutions, and enable common… more
- Shuvel Digital (Ashburn, VA)
- …within and external to the organization to brief, design, and implement various identity management initiatives. + Provide guidance across domains of systems ... engineers, network engineers, and information security professionals. + Having a "security-first" mindset for analyzing designs and implementations to identify security vulnerabilities and flaws. Skills and Experience: + BS Degree in a related technical field… more
- Schrodinger (NY)
- …etc. + Additional understanding of other cybersecurity practices, such as encryption, identity and access management (IAM), network security, vulnerability ... over a month of paid vacation time. Our Office Management team also plans a myriad of fun company-wide...status, caregiver status, sexual and reproductive health decisions, gender identity or expression, sexual orientation, or any other protected… more