- NTT DATA North America (Austin, TX)
- …and rightsizing strategies. Security & Compliance Ensure adherence to security best practices, including least-privilege access , encryption, and network ... segmentation. Implement and manage identity and access management (IAM) policies and roles. Monitor, identify, and...File Share in Azure Gov Cloud (Azure Cloud Sr Engineer ). Have strong expertise in multi-cloud security … more
- AVT Simulation (Orlando, FL)
- …creativity, taste, and execution Our Heritage: Founded in 1998 by an engineer , AVT Simulation is an Orlando-based, end-to-end systems integration and full-service ... your difference. EOE - Females/Minorities/Protected Veterans/Individuals with Disabilities/Sexual Orientation/Gender Identity Qualified individuals with a disability have the right… more
- Procter & Gamble (Cincinnati, OH)
- …assumed-breach campaigns emphasizing evasion and control bypass (EDR/AV, email/web security , identity /conditional access , network segmentation, cloud ... and/or processes to help protect them against the world's most advanced cyber security adversaries? The Information Security Protect organization at P&G is… more
- Amazon (Seattle, WA)
- …infrastructure, penetration testing, mobile security , cloud security , AI security , identity and access controls, threat modeling, cryptography, ... USA | Sunnyvale, CA, USA Provide frontline support for all information security related issues, such as penetration testing, network and service configuration,… more
- Lowe's (Charlotte, NC)
- …primary purpose of this role is to design, develop, and support software-driven security tools and automation services that enhance Lowe's enterprise security ... capabilities. This includes translating business and technical requirements into scalable security platforms, APIs, and internal applications that improve how … more
- Sanford Health (Sioux Falls, SD)
- …to SIEM, email filtering, web and content filtering, firewall, IPS/IDS systems, identity and access management, SSO/MFA, vulnerability management, and data ... nature Strong understanding of network protocols (TCP/IP, OSI model) and network security concepts Expertise in network switch, routing, and security … more
- Applied Research Solutions (Bedford, MA)
- …requisite security clearances, authorization, need-to-know, and are aware of their security responsibilities before granting access to the IS; + Report all ... system and its environment of operation to include developing and updating a System Security Plan, managing and controlling changes to the system, and assessing the … more
- NetApp (Morrisville, NC)
- **Job Summary** We are seeking a highly skilled and experienced Cyber Security Incident Responder to join our Global Security team. The ideal candidate will have ... integrity of our systems. **Job Requirements** + Lead and manage cyber security incident response investigations, ensuring timely and effective resolution. + Conduct… more
- L3Harris (Palm Bay, FL)
- …government security investigation(s) and must meet eligibility requirements for access to classified information. By submitting your resume for this position, ... the space, air, land, sea and cyber domains in the interest of national security . Job Title: Senior Specialist, Info Security Sys Engineering Job Code: 30719… more
- L3Harris (Palm Bay, FL)
- …government security investigation(s) and must meet eligibility requirements for access to classified information. By submitting your resume for this position, ... the space, air, land, sea and cyber domains in the interest of national security . Job Title: Senior Specialist, Info Security Sys Engineering Job Code: 30351… more