- Oracle (Austin, TX)
- …security systems, applications, environments and architectures and ensures compliance with information security standards and corporate security policies ... modeling. + Brings advanced-level skills to research, evaluate, track, and manage information security threats and vulnerabilities in situations where in-depth… more
- Huntington Ingalls Industries (Hanscom AFB, MA)
- …relevant experience. + Knowledge Base: + + Strong understanding of information security principles: access control, authentication, system hardening, ... comprehensive Security Assessment Report (SAR). Analyze vulnerability and threat information to identify and enumerate risks. Develop and deliver concise risk… more
- ADP (Roseland, NJ)
- …+ Collaborate with the SOC to integrate directory-related logs and alerts into the ** Security Information and Event Management (SIEM)** systems. + Respond to and ... Information Systems Security Professional ( **CISSP** ) + Certified Information Security Manager ( **CISM** ) + Certified Identity and Access Manager (… more
- Federal Reserve Bank (Richmond, VA)
- …assigned **Qualifications:** + 6+ years (Senior) or 10+ years (Advanced) of relevant information security related work experience in areas such as: computer ... Reserve System (FRS), delivers national intrusion detection, incident response, security intelligence, threat assessment, and vulnerability assessment services for… more
- BeOne Medicines (Emeryville, CA)
- …procedures for specific functional domains as well as regional SOPs under global Information Security Management System. Lead and manage training and awareness ... maturity. + Responsible for leading internal IT, Cybersecurity, and third-party information security risk management activities for various information… more
- Lockheed Martin (Colorado Springs, CO)
- …and comprehensive benefits\. **Basic Qualifications:** \- B\.S\. in Computer Science, Information Security , Software Engineering, or related field \(M\.S\. ... Azure DevOps\) that compile, test, containerize, and deploy code to AWS\. **\- Security Integration** - Embed security scans \(static analysis & software… more
- Truist (Raleigh, NC)
- …experience. + Deep specialized and/or broad functional knowledge in applied enterprise information security technologies including but not limited to firewalls, ... matures. Responsible for developing and maintaining the technical IT / cyber security capabilities necessary for safeguarding the firm's information systems and… more
- Amentum (Tampa, FL)
- …(eg, 30, 60, and 90 day notices). * Develop and maintain an Information Security Continuous Monitoring (ISCM) Plan. This plan shall address ongoing ... awareness of information security , vulnerabilities, security controls, and threats to support organizational risk management decisions. * Identify, assess,… more
- Elevance Health (Richmond, VA)
- …as required by law)._ **Summary** The Staff Vice President of Technology in Information Security Identity and Access Management (IAM) that will be responsible ... security strategy, accepted best practices, business requirements, policies, and Information Security standards. + Experience with, and understanding of,… more
- Brightstar Lottery (Providence, RI)
- …team, you will lead and execute technology-focused audits with a strong emphasis on information security and IT risk management. You will be a contributor in ... efficiently, securely, and effectively. The ideal candidate is an experienced information security professional who can dive into a variety of complex system… more