• Activity Security Representative

    BOOZ, ALLEN & HAMILTON, INC. (Kirtland, NM)
    …and prepare for and participate in security compliance audits and vulnerability assessments. Basic Qualifications: + Experience using Defense Infrastructure Security ... for Systems ( DISS ) and Joint Access Database Environment ( JADE ) + Experience researching, processing, filing, and maintaining inbound and outbound visit notices + Experience escorting facility visitors and maintaining asso cia ted logs + Experience c ond… more
    BOOZ, ALLEN & HAMILTON, INC. (01/01/26)
    - Related Jobs
  • Case Management Platform Backend Engineer

    BOOZ, ALLEN & HAMILTON, INC. (Reston, VA)
    …case management platform and security tools such as SIEM, EDR, vulnerability management platforms, threat intelligence sources, identity systems, and ticketing or ... ITSM platforms. Build and maintain API services, event pipelines, data ingestion jobs, and synchronization services. Implement automated backend workflows to support case routing, enrichment, evidence linkage, and cross-platform data federation. Ensure the… more
    BOOZ, ALLEN & HAMILTON, INC. (01/01/26)
    - Related Jobs
  • Dev Ops Team Lead

    ManpowerGroup (Salt Lake City, UT)
    …Quay, and source control systems like Bitbucket. + Knowledge of security and vulnerability management tools and Linux/UNIX shell scripting skills. **What's in it for ... me?** + Opportunity to lead innovative projects in a dynamic environment. + Work with cutting-edge cloud and DevOps technologies. + Collaborate with a diverse and talented global team. + Enhance your leadership and technical skills in a supportive setting. +… more
    ManpowerGroup (01/01/26)
    - Related Jobs
  • Director Governance, Risk & Compliance (GRC)

    Baylor Scott & White Health (Dallas, TX)
    …Cyber Risk Management, Incident Response, Data Protection, OT Security, Vulnerability Management, Identity and Access Management, Cyber Resilience. - Experience ... with risk management methodologies and tools. - Familiarity with regulatory compliance standards (eg, GDPR, HIPAA, PCI DSS, SOC 2) **Minimum Requirements** - Bachelor's Degree or 4 years of work experience above the minimum qualification - 5 years of… more
    Baylor Scott & White Health (01/01/26)
    - Related Jobs
  • System Administrator

    ManTech (Eglin AFB, FL)
    …Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/ vulnerability assessment, Group Policy management and ... configuration. **Security Clearance:** + Active Top Secret Clearance + Must be able to obtain and maintain a DoD TS/SCI-eligible clearance (ie DCID 6/4 eligibility) + Eligibility for access to Special Access Program Information + Willingness to submit to a… more
    ManTech (01/01/26)
    - Related Jobs
  • Outpatient Care Management RN

    Carle Health (Peoria, IL)
    …target population served is the stratified risk patient or patients with high vulnerability at times of transition between care settings. OP Care Management RN will ... coordinate care around patient's chronic diseases, coordinate and facilitate medication management, and effectively manage care transitions across the continuum. OP Care Management RN will create a longitudinal, personalized care plan for each unique patient.… more
    Carle Health (01/01/26)
    - Related Jobs
  • Program Security Representative, Lead

    BOOZ, ALLEN & HAMILTON, INC. (Kirtland, NM)
    …and prepare for and participate in security compliance audits and vulnerability assessments. Basic Qualifications: + Experience being read into and supporting ... SAP programs + Experience with security policy and manuals, and ICDs, JFANs, DoD, and guiding policy documents + Experience working with Spe cia l Access Program ( SAP ) information and with SIC or JADE account look ups and creations, submitting SAP… more
    BOOZ, ALLEN & HAMILTON, INC. (01/01/26)
    - Related Jobs
  • Multi -Public Cloud Engineer

    NTT America, Inc. (Plano, TX)
    …and practices including SELinux, iptables, auditd, and fail2ban. Experience with vulnerability assessment and patch management using tools like Qualys, OpenSCAP, or ... Lynis. Proficient in log analysis and system monitoring using tools such as Syslog, Logrotate, Nagios, Prometheus, and Grafana. Familiar with endpoint protection and threat detection tools such as CrowdStrike and OSSEC. Strong knowledge of user access control,… more
    NTT America, Inc. (01/01/26)
    - Related Jobs
  • Electromagnetic Warfare Planner

    Amentum (Pearl Harbor, HI)
    …analysis of various pertinent national security policies, military strategies, vulnerability assessments, threat and intelligence assessments. This position will ... identify operational areas of concern, inform planning efforts, and help develop new concepts and identify new capabilities for Electromagnetic Warfare. The ever-increasing demands associated with a congested and contested electromagnetic environment requires… more
    Amentum (01/01/26)
    - Related Jobs
  • Network Security Engineer

    Robert Half Technology (Houston, TX)
    …such as Microsoft Defender and SentinelOne. Conduct risk assessments, vulnerability scans, and remediation activities. Develop and enforce security policies, ... standards, and governance controls. Monitor network traffic and respond to security incidents promptly. Maintain documentation for security architecture, configurations, and compliance audits. Requirements Required Skills & Qualifications Strong experience… more
    Robert Half Technology (01/01/26)
    - Related Jobs