- Cambridge International Systems Inc (Norfolk, VA)
- …etc.) using eMASS and DADMS. + Perform security assessment testing, vulnerability analysis (eg, ACAS), and ensure control compliance across OPTEVFOR systems ... and infrastructure. + Collaborate directly with OPTEVFOR's Information System Security Manager (ISSM), ISSEs, and other stakeholders to maintain system compliance. +… more
- Consolidated Electrical Distributors (Irving, TX)
- …monitor, audit, investigate, and remediate in accordance with CED's cyber security program leveraging cyber security tools and applications. The position will work ... security, software, and hardware-based firewalls. Reports to: Information Security Manager Minimum Qualifications: + Bachelor's Degree or equivalent training/certification(s)… more
- Toyota (Plano, TX)
- …servers, web servers, desktops, printers and storage devices. Reporting to the Sr. Manager - OneTech, the person in this role will join the **Cloud Engineering ... macOS, Linux/Unix, iOS, Android) and diverse environments at an enterprise scale Technical Expertise: + Proficient in managing and monitoring endpoint devices across… more
- FranklinCovey (Madison, WI)
- …two additional teams-Impact Platform and Admin Platform (each led by an Engineering Manager with 5-6 engineers each). You'll partner closely with IT on Dev/SecOps ... IT on **Dev/SecOps** (you don't manage them): security reviews, vulnerability remediation, compliance, infrastructure costs, and monitoring + **Champion reliability,… more
- Leidos (Annapolis Junction, MD)
- …match and immediate vesting, Flexible Schedules, Discounted Stock Purchase Plans, Technical Upskilling, Education and Training Support, Parental Paid Leave, and much ... will act as an ISSO for a large software development program which includes software maintenance and development, IT support (Network/Workstation/Server), systems… more
- MUFG (Jersey City, NJ)
- …part of the Program Governance team to drive the Security Observability technical program with cutting-edge technology to improve security posture. This is a ... components: + Different types of data collection, Log data, Scanning data, Vulnerability data, Configuration data, and external intelligence data + Data lake and/or… more
- Northrop Grumman (Bellevue, NE)
- …will perform the following duties on a day-to-day basis in support of the program : + Perform assessments of systems and networks within the networking environment or ... from acceptable configurations, enclave policy, or local policy. + Establish strict program control processes to ensure mitigation of risks and support obtaining… more
- GE Vernova (Saratoga Springs, NY)
- …Lead, you will be reporting directly to project and designated line manager , while as well indirectly reporting technically to the OT Engineering Cybersecurity ... un avantage. **Essential Responsibilities** + Conduct risk assessments and vulnerability assessments for operational technology systems to identify security… more
- RTX Corporation (Tewksbury, MA)
- …video, and network infrastructure. + Produce, update and generally improve technical documentation to support security requirements and operational support of ... systems. + Review systems vulnerability assessments to ensure compliance with recognized industry standards...+ Cisco Meeting Server (CMS) and Cisco Unified Call Manager (CUCM) + Cisco Identity Service Engine (ISE) +… more
- S4 Inc. (Omaha, NE)
- …monitor security controls (NIST 800-53, DISA STIGs, CNSSI 1253) + Support vulnerability management, IAVMs, CTOs, and security remediation efforts + Assist with ... and cybersecurity compliance + Experience using tools such as eMASS and vulnerability management systems + Ability to coordinate with system owners, government… more