- Sierra Nevada Company, LLC (Lone Tree, CO)
- …and tuning. You'll be responsible for the management of our IT security systems and applications, incident response, digital forensics, loss prevention, and ... (Kubernetes, EKS), and cloud-based hosting. + Strong understanding of disaster recovery, SSL/TLS management , and security best practices. + Ability to work under… more
- L3Harris (Palm Bay, FL)
- …and guidelines for system hardening, configuration management , and emerging security technologies. + Develop and implement incident plans and procedures ... products. Uses methods such as encryption technology, vulnerability analysis and security management . Responsible for integration of multiple methods into… more
- SAIC (San Diego, CA)
- …designs, as well as expertise in TEMPEST requirements and procedures. **Responsibilities:** ** Security Management :** + Oversee and enforce security policies, ... as necessary. **Qualifications** **Required Education and Qualifications:** + Bachelor's degree in Security Management , Information Security , or a related… more
- Competitive Range Solutions, LLC (Fort Meade, MD)
- …supporting DoD operations. This role requires deep expertise in cloud security , enterprise architecture, identity and access management (IAM), cryptography, ... + Develop and enforce secure software development practices, ensuring application security , data protection, cryptography, and key management . + Design… more
- American Packaging (Churchville, NY)
- …assigned. + Responsible for defining, advocating, and implementing the Company IT Security Policies. + Program and Project management experience to effectively ... (CMMC, HIPAA, PCI-DSS, SOX). + Hands-on skill with SIEM, EDR/XDR, IDS/IPS, vulnerability management , and cloud- security stacks (AWS, Azure, GCP). + Ability to… more
- Innovative Management & Technology Services (Clarksburg, WV)
- …equivalent professional experience). + Minimum 7 years of experience in information security , IT risk management , or cybersecurity compliance, preferably in a ... Company Overview: Join a fast-growing company highly experienced in cyber security , cloud computing, virtualization, big data analytics, and project management !… more
- House of Blues (Beverly Hills, CA)
- …this sounds like you then please read on! THE ROLE The Data Security Developer will be a highly technical, hands-on individual responsible for building, ... implementing, and automating security controls directly within Live Nation Entertainment's data platforms and pipelines. This role focuses on writing code, scripts,… more
- Global Resource Solutions (Arlington, VA)
- …Cyber Security Program + Provide expert input to the formulation of cyber security policies based upon the Risk Management Framework (RMF) with emphasize on ... the security posture of the authorization boundaries + Ensure configuration management (CM) for security -relevant changes to software, hardware, and firmware… more
- Kratos Defense & Security Solutions, Inc. (Glen Burnie, MD)
- …Burnie, MD facility. This will include physical and environmental protection, personnel security , incident handling, security training and awareness. The ... include developing and updating authorization documentation and implementing configuration management across authorization boundaries, including assessing the security… more
- JPMorgan Chase (Plano, TX)
- …+ Interface with wider CTC teams, ensuring the platform integration with security operations, threat intelligence, infrastructure access management , and network ... engineering solutions + Expertise in AWS public cloud + Proficient in cloud security posture management (eg, Wiz, Prisma Cloud, Crowd Strike Falcon Cloud … more