- Truist (Raleigh, NC)
- … data lost prevention, vulnerability management, access management, firewalls, security awareness training, etc. + Excellent ability to express complex ... activities may change from time to time. + Applies a solid understanding of IAM concepts and uses knowledge of the business and key processes to drive improvements.… more
- Charles Schwab (Phoenix, AZ)
- …preferred. Develop Custom IGA solutions using SailPoint & Java frameworks. + Review IAM Security polices standards, guidelines, and procedures. + Work closely ... (SCS), Office of CISO, we provide platforms, services, and security operations capabilities which enable the firm to produce...shareholder outcomes securely and safely. Securing our IT assets, data , and access to applications is the core of… more
- Palo Alto Networks (Santa Clara, CA)
- …management organization and continues to look for top-notch talent to tackle challenging security problems. As a Senior Product Manager for Zero Trust Identity, you ... our customers to secure our products across the cloud, data centers, service providers, enterprises, and more, as we...and more, as we continue to innovate with new security features, including Cloud Identity Engine, Advanced Security… more
- Amazon (Seattle, WA)
- …access controls across all their AWS environments. AWS Identity and Access Management ( IAM ) enables customers to secure their workloads in the cloud by providing ... Apps services in AWS, including support for customers who require specialized security solutions for customers who require specialized security solutions for… more
- CGI Technologies and Solutions, Inc. (Reston, VA)
- …Capacity Planning * Cloud operations and infrastructure management - rehydration activities, IAM , security and compliance, availability, data protection, ... playing this video you consent to Google/YouTube processing your data and using cookies -Learn more (xweb.asp?clid=21001&page=cookiespolicy#integrationofyoutube) . **Position… more
- Ford Motor Company (Dearborn, MI)
- …developer journey with data -driven enhancements. * **Workload Identity & Security ** : Implement identity-aware infrastructure using GCP IAM , Workload ... how developers build and ship software. * **Developer Experience Leadership** : Lead DevEx strategy across the GKE platform and related developer workflows. Design… more
- McAfee, Inc. (San Jose, CA)
- …with containerization technologies such as Docker and Kubernetes. + In-depth knowledge of security best practices, including IAM , encryption, and security ... cloud solutions using Amazon Web Services (AWS) in this role. You will lead the Cloud & DevOps practices, ensuring seamless integration, delivery, and deployment… more
- WM (Houston, TX)
- …and implement secure, scalable, and resilient AWS cloud architectures, including VPCs, Subnets, Security Groups, IAM Roles, Route 53, Load Balancers, VPNs, and ... Certificates. + Lead on-premises to cloud migration projects, ensuring seamless modernization,...security best practices (encryption with KMS, Secrets Manager, IAM least-privilege, firewall rules, GuardDuty, CloudTrail) to maintain compliance… more
- NANA Regional Corporation (Fort Meade, MD)
- …Manager support encompass a range of tasks and responsibilities aimed at ensuring the security and protection of the SCCA's systems, data , and assets. It ... professionals, apply today! Analyzes, retrieves, catalogs, and safeguard digital data related to cybercrime investigations. Researches and evaluates equipment and… more
- US Bank (Atlanta, GA)
- …**SUMMARY** We are seeking a highly skilled and experienced Machine Learning Architect to lead the development and optimization of advanced Data Science and AI ... This role demands in-depth expertise in systems, GPU, performance engineering, enterprise security , big data , secure and scalable ML infrastructure, and advanced… more