- Guidehouse (Washington, DC)
- …+ Experience with the following technology: Z/OS operating systems, WebSphere and Content Manager. + Experience with HTTP/Apache and IBM File Manager + Experience ... SECRET , Z/OS Products (JES2, TN3270, FTP, DB2, Websphere, CICS, Connect-Direct), Security Interfaces (SDSF, SMS, HSM, OMVS, CA-1, CA-Scheduler, CICS, DB2, PAGENT,… more
- Palo Alto Networks (Plano, TX)
- …Alto Networks, where you'll play a vital role in shaping the future of security operations through our cutting-edge Cortex XSOAR platform. We are looking for a ... other technical documentation in the Knowledge Base. + Review technical content for training, marketing, manuals, and troubleshooting guides. + Provide… more
- Walmart (Bentonville, AR)
- …application development stages in accordance with defined standards for development and security + Assess and test the overall effectiveness and performance of an ... monitoring, maintenance and related activities including documentation, deployment, operation, security , configuration management, training (users and sustainment personnel), technology… more
- Truist (Atlanta, GA)
- …network operating systems, identity management, database activity monitoring, encryption, content filtering, and Mainframe security . + Previous experience ... work experience. + In-depth knowledge in applied enterprise information security technologies including but not limited to firewalls, intrusion detection/prevention… more
- US Tech Solutions (Houston, TX)
- …and recovery tools, IBM Spectrum, Dell Networker. + Good knowledge of Linux security , including configuration of endpoint security tools. + Ability to evaluate ... support processing, including full documentation of problem resolution, creation of knowledge content and best practice items. + Show a good understanding of… more
- Federal Reserve Bank (Philadelphia, PA)
- …and procedures. + Monitors compliance with internal audit requirements and Information Security Manual guidelines. + Assist in the deployment of Microsoft Copilot ... organization. + Design and implement Viva Connections dashboards with audience-targeted content and resources. + Foster community engagement and knowledge sharing… more
- SAIC (Washington, DC)
- …such as VOIP, VPN, routing and switching, IDS, Session Border Controllers, Content Switching, Load Balancing, and enterprise class switching. Required to install, ... engineering change orders relating to the replacement or enhancement of perimeter security hardware and software. + Experienced with performing root cause analysis,… more
- Cargill (Atlanta, GA)
- …complex tasks, including monitoring systems, troubleshooting issues, and implementing security measures. With limited supervision, this job resolves network issues, ... to document moderately complex network and infrastructure issues and implement security measures to protect the network infrastructure. **Key Accountabilities** +… more
- Leidos (Chantilly, VA)
- …for web applications. GEOAxIS enables online, on-demand, access to NGA GEOINT content based on user's authoritative attributes/roles. Our Mission is to maintain ... available ICAM services for protecting those critical mission applications across multiple security domains. The GxNext contract was awarded to Leidos in 2021 and… more
- Walmart (Bentonville, AR)
- …requirements. + Architect complex software systems (data/backend), ensuring performance, security , and scalability needs are met. + Software Craftsmanship: ... patterns for High Availability, performance, + Scale our Architecture, Disaster Recovery, Security Architecture. + Strong desire to drive change, and ability to… more