- Ford Motor Company (Dearborn, MI)
- …and incident response. **You'll have ** + Bachelor's degree in computer science, information security , or a related technical field, or equivalent practical ... + As a key member of our second line-of-defense security team, you will act as a trusted advisor...intelligence for development teams. + Develop and automate vulnerability management processes, using a risk -based approach to… more
- DoorDash (San Francisco, CA)
- …protection of people, property, operations, brand, and reputation. We manage safety and security risk and provide value across the business through technology, ... and implementing mitigation strategies. + Assist with threat assessment, site-specific security risk analysis, and safety audits. + Guide situational… more
- Hackensack Meridian Health (Edison, NJ)
- …must obtain within one (1) year of hire: GIAC certifications, OSCP (Offensive Security Certified Professional), CISSP (Certified Information Systems Security ... healthcare and serve as a leader of positive change. The **Cloud Security Architect** builds, maintains, upgrades and continuously improves cloud networks and… more
- Oracle (Charleston, WV)
- …24x7 protection for OCI's critical assets. Qualifications: + Bachelor's degree in Security Management , Business Administration, or a related field (Master's ... **Responsibilities** Key Responsibilities: + Live Site Protection: Responsible for end-to-end physical security operations and risk mitigation for all OCI sites… more
- Applied Materials (Santa Clara, CA)
- …+ Drive architectural reviews and influence security strategy across the enterprise ** Risk Management & Compliance** + Perform risk assessments and ... best practices **What We're Looking For** + **Deep expertise in OT/IoT security architecture** and vulnerability management . + 7-10 years in OT/ICS… more
- RTX Corporation (Richardson, TX)
- …leader will also serve as the cybersecurity portfolio owner for endpoint security technologies, responsible for lifecycle management , vendor strategy, and ... (IoT/OT where applicable) + Serve as portfolio owner for endpoint security solutions, including lifecycle management , investment planning, vendor strategy,… more
- Google (New York, NY)
- …and ethics are the highest priority. The Role As the Intelligence Lead (FTC) working in Security & Risk Operations within S&P, you'll be part of a team that ... and safeguarding our research, people, and products is a foundational mission. The Security & Privacy (S&P) organization enables the entire company to pursue its… more
- MUFG (Tampa, FL)
- … security risks and controls, to analyze various methods of controlling information security problems, determine the strengths and weaknesses of each method ... technologies + Authentication, MFA, Authorization, Identity Governance, Provisioning, RBAC, ABAC, Risk based Access Control, Privileged Access Management (PAM),… more
- Enhanced Protection Services (Bloomington, MN)
- … career with Allied Universal(R) Enhanced Protection Services, a global leader in security and threat mitigation. We specialize in risk consulting, executive ... analysts, armed security operatives, x-ray screeners, and security consultants. Our risk and consulting group,...and properties, while maintaining a low-profile. + Provide real-time information about the surrounding area of the work site.… more
- IntelliDyne (Falls Church, VA)
- …joint-force DoD agency network. + Conduct and manage accreditation activities under Risk Management Framework (RMF) for multiple accreditation boundaries. + ... Classification: Exempt Responsibilities: + Propose, coordinate, implement and enforce information systems security policies, standards, and methodologies. +… more