- Ford Motor Company (Dearborn, MI)
- …ourselves. Are you ready to change the way the world moves? The Enterprise Cyber Security Cloud Security team is responsible for working with other security ... securing Ford's public cloud infrastructure. The teams work closely together to identify security gaps in the cloud environments and address them. The Cloud … more
- Oracle (Des Moines, IA)
- **Job Description** Responsible for the planning, design and build of security architectures; oversees the implementation of network and computer security and ... **Responsibilities** Responsible for advanced planning, design and build of security systems, applications, environments and architectures; oversees the implementation… more
- Oracle (Little Rock, AR)
- …in threat hunting, analyzing indicators of compromise (IOCs), investigating security incidents, managing incident responses, and conducting digital forensics across ... this role, you will be part of a dedicated security operations team, leveraging data loss prevention, case management...tools, and developing automation to detect and respond to security threats in real time. Additionally, you will play… more
- Leidos (Arlington, VA)
- …This role is critical in helping the organization maintain a strong security posture and comply with industry regulations. **Primary Responsibilities:** + Platform ... potential impact on business operations. + Remediation Coordination: Collaborate with IT, security teams, and asset owners to develop and track remediation plans,… more
- NetApp (Morrisville, NC)
- **Job Summary** We are seeking a highly skilled and experienced Cyber Security Incident Responder to join our Global Security team. The ideal candidate will have ... integrity of our systems. **Job Requirements** + Lead and manage cyber security incident response investigations, ensuring timely and effective resolution. + Conduct… more
- Leidos (Orlando, FL)
- …Federal Information Processing Standards (FIPS), and Federal Information Security Modernization Act (FISMA) compliance frameworks. The Cybersecurity Specialist ... closely with the organization's IT teams to identify vulnerabilities, conduct security control assessments, perform risk analysis and assessments, develop … more
- Sanford Health (ND)
- …nature. Strong understanding of network protocols (TCP/IP, OSI model) and network security concepts Expertise in network switch, routing, and security ... tools for identifying, evaluating, implementing, troubleshooting, and maintaining technical security controls for the organization. These controls are designed to… more
- RELX INC (Chicago, IL)
- Do you possess an understanding of security controls and their implementation within complex IT environments? Do you have demonstrated experience in implementing and ... Risk and Authorization Management Program) Team is focused on analytics and security monitoring within Azure cloud environments. The team is responsible for… more
- MUFG (Jersey City, NJ)
- …details. **Job Summary:** This role focuses on comprehensive application security testing and vulnerability management across the software development lifecycle. ... tools like Invicti, Veracode, and Burp Suite to identify and remediate security flaws in application code and open-source components. The position requires strong… more
- TekSynap (Washington, DC)
- …required by DoD for role. + Mustmaintainrequired technical and security trainingrelativeto cybersecurity duties,in accordance withDoD instruction 8510.01, Risk ... Management Framework for DoD Systems, NIST Special Publication 800-53, Recommended Security Controls for Federal Information Systems and Organizations and DoD… more