- NTT America, Inc. (Plano, TX)
- …and practices including SELinux, iptables, auditd, and fail2ban. Experience with vulnerability assessment and patch management using tools like Qualys, OpenSCAP, or ... Lynis. Proficient in log analysis and system monitoring using tools such as Syslog, Logrotate, Nagios, Prometheus, and Grafana. Familiar with endpoint protection and threat detection tools such as CrowdStrike and OSSEC. Strong knowledge of user access control,… more
- Foxhole Technology, Inc (Pensacola, FL)
- …CySA+, CISM, CASP, CISSP or equivalent). + Strong understanding of vulnerability management principles and security control implementation. + Ability to work ... both independently and collaboratively in a fast paced, mission focused environment. + Strong written and verbal communication skills with experience supporting cross functional team. + Proven ability to lead technical efforts and communicate complex concepts… more
- Alight (Chicago, IL)
- …controls for AI systems, including access management, data protection, vulnerability scanning, and incident response protocols. Collaborate with cybersecurity teams ... to ensure compliance with organizational and regulatory standards. + **Software Development:** Build and maintain microservices, APIs, and high-scale systems using Java, Python, JavaScript, and TypeScript. + **Cloud Engineering:** Design and deploy… more
- Robert Half (Atlanta, GA)
- …resilience and data protection via risk assessments, technical testing, vulnerability remediation, incident readiness or response, and privacy services including ... coverage for emerging technology such as Internet of Things (IoT) penetration testing and quantum computing. + Technology Risk and Resilience: Builds right-sized enterprise risk and resilience capabilities across the business, technology, cyber and third-party… more
- Google (Seattle, WA)
- …+ Experience analyzing the security of systems (eg, security testing, vulnerability scanning, threat modeling, etc.). **Preferred qualifications:** + Master's degree ... or PhD in Computer Science or related technical field. + Experience programming in Go. + 5 years of experience with security engineering, computer and network security and security protocols. **About the job** Google's software engineers develop the… more
- SAIC (Colorado Springs, CO)
- …industry security standards and frameworks (NIST 800-171). + Help with vulnerability assessments, security monitoring, and incident response automation. + Work with ... developers to implement secure coding practices and application security testing. + Collaborate with cross-functional teams to optimize cloud costs, security, and performance. + Develop documentation and training materials to promote DevSecOps culture across… more
- MUFG (Tempe, AZ)
- …risk and control domains such as identity and access management, vulnerability management, SDLC, change /release/ incident management and technology operations ... within large enterprise environments. + Hands-on experience performing or leading RCSA activities including ability to identify controls gaps, risk identification, control design, and control effectiveness testing. + Demonstrated leadership, stakeholder… more
- Robert Half Technology (Fresno, CA)
- …particularly within Microsoft Azure and Microsoft security ecosystems + Conduct vulnerability management, risk assessments, and remediation planning + Participate in ... security architecture reviews, vendor assessments, and technology implementations + Develop and improve security policies, procedures, runbooks, and technical documentation + Serve as a senior technical resource, advising internal teams on security, risk, and… more
- Fluor (Las Cruces, NM)
- …production. Administer SCAP scans and provide results/reports during weekly vulnerability meetings. Implement and verify cybersecurity compliance using automated ... tools to ensure benchmarks are met and manage virtual workstations and servers using VMWare. The Systems Administrator analyzes, evaluates, and proposes recommendations on innovative solutions. This role will apply proven communication, analytical, and… more
- Robert Half Technology (St. Louis, MO)
- …with minimal downtime + Administer security tools and policies, including vulnerability management and system patching + Support cloud and hybrid infrastructure, ... collaborating with other IT specialists to ensure optimal integration and operation + Maintain network equipment such as switches, firewalls, and wireless access points + Respond to service outages and technical support requests according to defined SLAs +… more