- Genentech (Los Angeles, CA)
- …that require access to the Warehouse must be able to pass the Transportation Security Administration (TSA) Security Threat Assessment (STA). + Ensures the ... and terminal virtualization as a System Administrator + Certifications: Certified Information System Security Professional (CISSP), ISA/IEC 62443 Cybersecurity… more
- Hawaiian Electric (Hilo, HI)
- …and possible design or work process changes. Serves as a liaison to the Information Technology & Services Department (ITS). Serves as the process area point ... training, implementation and support of all matters pertaining to mobile technology functions and related work management processes. Works closely with other… more
- Deloitte (Arlington, VA)
- …assessments. JCIP Technical Reviewers play a critical role in assessing the security posture of cloud environments across the Intelligence Community (IC). They ... technical assessments and analyze cloud configurations, access controls, and security baselines to ensure compliance with Intelligence Community Directives (ICDs),… more
- Cleveland Clinic (Cleveland, OH)
- …to ensure compliance with applicable Export Control and Research Security regulations. Using your expertise in business operations, transactions, contracting, ... as the enterprise subject matter expert on export control and research security regulations and provide consultation to business units on export control/research … more
- Red Hat (Boston, MA)
- …commercialization of our internal software build system, Konflux, as the core technology powering the Red Hat Advanced Developer Suite (RHADS) secure software supply ... transformed the way Red Hat delivers software by ensuring security is built-in, not bolted on. You will be...as incorporating Red Hat Trusted Profile Analyzer (NIST based assessment for regulatory compliance) and supporting the extension of… more
- JPMorgan Chase (Washington, DC)
- …tools (eg, Burp Suite, Nmap, Metasploit, etc.). + Strong understanding of security assessment methodologies such as OWASP Top Ten, NIST Cybersecurity ... Drive the security of critical banking applications and platforms through...Assessments & Exercises Vice President in the Cybersecurity and Technology Controls organization, you will play a key role… more
- Oracle (Austin, TX)
- … elements including Secure Technical Implementation Guide (STIG)s, Assured Compliance Assessment Solution (ACAS), Endpoint Security Solutions (ESS) and ... cloud architectures for DoD mission requirements Ensure strict compliance with DoD security policies, including but not limited to DoD Cloud Computing Security… more
- 7-Eleven (Irving, TX)
- …assigned and serves as a champion for identifying, leading, and driving information technology transformation.o Anticipates and identifies Business Unit needs.o ... Maintains knowledge of the information technology landscape and proprietary technologies, while...technology is delivered securely in compliance with overall security program.o Deepens client relationships as a trusted and… more
- The MITRE Corporation (Honolulu, HI)
- …to the long-term well-being of our employees. MITRE is different from most technology companies. We are a not-for-profit corporation chartered to work for the public ... This is not your typical desk job-this is national security at the operational edge. It's high-impact, high-tempo work...innovation and operational impact at the intersection of data, technology , and mission readiness. As a Principal Analysis &… more
- RTX Corporation (Hartford, CT)
- …of relevant experience + Prior relevant work experience must include Information Technology , digital policy management, digital governance, cybersecurity, or ... as only US citizens are authorized to access certain necessary systems. ** Security Clearance:** None/Not Required RTX Corporation is an Aerospace and Defense company… more