- Lockheed Martin (Orlando, FL)
- …Lockheed Martin initiatives, programs and policies as directed\. * Comply with site security and access control procedures in accordance with F\-35 program and ... must be able to obtain and maintain a Secret level security clearance and Special Access Program \(SAP\) access \. Deployment and continued employment is… more
- Lockheed Martin (Orlando, FL)
- …support Lockheed Martin initiatives, programs and policies as directed\. Comply with site security and access control procedures in accordance with F\-35 program ... must be able to obtain and maintain a Secret level security clearance and Special Access Program \(SAP\) access \. Deployment and continued employment is… more
- TEKsystems (Huntsville, AL)
- …Create and maintain user and computer accounts and modify file permissions and security access lists. Test new releases of products to ensure compatibility ... customers and vendors. Lead Team with your expertise in Security Technical Implementation Guide STIG compliance and IA accreditation....KGR-42 technologies. The ability to be granted special program access SAP/SAR within 1 year of hire date. Must… more
- Northrop Grumman (Linthicum Heights, MD)
- …+ Create and maintain user and computer accounts and modify file permissions and security access lists in a Microsoft Active Directory environment. + Develop and ... Possible is our commitment to missions. In rapidly changing global security environments, Northrop Grumman brings informed insights and secure technological… more
- PDS Defense (Huntsville, AL)
- …Create and maintain user and computer accounts and modify file permissions and security access lists. Test new releases of products to ensure compatibility ... suppliers, customers, and vendors. Lead Team with your expertise in Security Technical Implementation Guide (STIG) compliance and IA accreditation. Maintain … more
- Microsoft Corporation (Richmond, VA)
- …third-party access and operations. Appropriately takes action and reports physical security access concerns and/or incidents to direct-line management or via ... decommissioning IT datacenter technology(ies) and equipment while proactively prioritizing security considerations. Maintains expertise with the functions of, and… more
- Microsoft Corporation (Richmond, VA)
- …third-party access and operations. Appropriately takes action and reports physical security access concerns and/or incidents to direct-line management or via ... develop an understanding of our Data Center environment, familiarize yourself with security and data management procedures, and accelerate your career growth in the… more
- ManTech (El Segundo, CA)
- …analytical approach to synchronizing interdependent activities such as provisioning, in-processing, and security access . + Familiarity with basic IT setup and ... approach to synchronizing interdependent activities such as provisioning, in-processing, and security access . + Detail-oriented mindset for managing and tracking… more
- M&T Bank (Wilmington, DE)
- …and unauthorized access . It encompasses various disciplines such as network security , access controls, and threat protection and detection, with the ... and external cybersecurity threats, particularly those related to authentication, access control, and directory infrastructure. **Primary Responsibilities:** + Develop… more
- Bloomberg (New York, NY)
- …secure automation and privileged task execution. + Familiarity with operating system-level security controls used to enforce access restrictions (eg, sudo ... Senior Software Engineer - Identity & Privileged Access Management Location New York Business Area Engineering and CTO Ref # 10047610 **Description & Requirements**… more