- GovCIO (San Antonio, TX)
- …firewalls, electronic data traffic, and network access. Uses encryption technology , penetration and vulnerability analysis of various security technologies, and ... information technology security research. Prepares security reports for government agencies....(DRA), Automated Compliance Assessment Solution (ACAS), System Center Configuration Manager (SCCM), Tanium, Host Base Security System (HBSS) and… more
- Entergy (The Woodlands, TX)
- …prioritize risk treatment + Conduct security reviews of corporate and operational technology infrastructure + Risk Management Program + Develop and acquire expertise ... in the areas of technology and regulations to ensure Entergy's security posture and...operational, and critical infrastructure protection risk activities + Apply cybersecurity & risk management framework knowledge to drive risk… more
- NY CREATES (Albany, NY)
- …(SailPoint IdentityIQ/IdentityNow, Saviynt, OneIdentity, or Microsoft Identity Manager ); implement birthright provisioning, access request portals, certification ... campaigns, and role-based access control (RBAC/ABAC). + Engineer zero-trust authentication flows: passwordless (FIDO2, Windows Hello for Business), MFA (push, TOTP,… more
- TekSynap (Huntsville, AL)
- …several systems, and networks that provide the infrastructure platforms for cybersecurity capabilities and data. This team is accountable for system administration, ... & RESPONSIBILITIES** + Maintaining and securing Windows-based infrastructure for cybersecurity operations + Supporting identity and access management (IAM) systems… more
- L3Harris (Camden, AR)
- …Security Manager . The selected individual will perform technical security control assessments and baseline validations to identify vulnerabilities and control ... With customers' mission-critical needs always in mind, our employees deliver end-to-end technology solutions connecting the space, air, land, sea and cyber domains… more
- CACI International (Annapolis Junction, MD)
- …management, auditing, security authorization process, principles of Cybersecurity (confidentiality, integrity, non-repudiation, availability, access control ... Delegated Authorizing Official - Level 3 Job Category: Information Technology Time Type: Full time Minimum Clearance Required to Start: TS/SCI with Polygraph… more
- Acclaim Technical Services (Chantilly, VA)
- Acclaim Technical Services, founded in 2000, is a leading language, operations, and technology services company supporting a wide range of US Federal agencies. We ... of defense-in-depth architecture against known vulnerabilities. + Establishes strict program control processes to ensure mitigation of risks and supports obtaining… more
- Southern California Edison (Alhambra, CA)
- …Qualifications** + Seven or more years of experience in information technology , information security and/or cybersecurity . Preferred Qualifications + Bachelor's ... In this job, you'll lead and manage Security and Compliance for Information Technology (IT)/Operational Technology (OT) high impact programs and projects for… more
- Charles Schwab (Southlake, TX)
- …services and applications within the Schwab Portfolio are assessed from a technology risk, cybersecurity risk, and cyber resilience perspective. The Analytics ... and Reporting Manager serves as a subject matter expert (SME), functioning...analyze data, as well as develop visualizations for reporting cybersecurity risks and operational metrics. The individual is responsible… more
- The Clorox Company (Reno, NV)
- …failures. * Identify opportunities for process improvements, standardization, and technology upgrades. **Documentation, Standards, and Cybersecurity ** + Maintain ... failures. + Identify opportunities for process improvements, standardization, and technology upgrades. **Documentation, Standards, and Cybersecurity ** + Maintain… more