- Sumitomo Pharma (Montpelier, VT)
- …configure, test, and optimize DLP solutions. + Conduct risk assessments and vulnerability analyses related to data protection. + Provide training and awareness ... programs for employees on DLP best practices. **E-Discovery** + Manage the identification, preservation, collection, and processing of electronically stored information (ESI) for legal and regulatory matters + Coordinate with Legal, Compliance, and IT teams to… more
- Robert Half Technology (Jacksonville, FL)
- …protection, and cloud security (Azure/AWS). + Proficiency in threat analysis, vulnerability management, and security monitoring. + Knowledge of security frameworks ... such as NIST, ISO 27001, or CIS Controls. + Strong troubleshooting, problem-solving, and communication skills. + Certifications preferred: CompTIA Security+, CISSP, CEH, or equivalent. Technology Doesn't Change the World, People Do.(R) Robert Half is the… more
- St. George Tanaq Corporation (Lansing, MI)
- …Encryption, authentication, and access control mechanisms + Risk assessment, vulnerability management, and security monitoring + AI/ML security considerations, ... including data privacy and model integrity + Security compliance documentation and reporting **Core Competencies** + Analytical and risk assessment expertise + Collaboration with DevOps, PMs, and AI/ML teams + Leadership in implementing secure development best… more
- Microsoft Corporation (Redmond, WA)
- …principles with supervision + Support deployment gates, security controls, and vulnerability scanners + Contribute to threat modeling, security drills, and incident ... response processes + Run code/config in non-production environments to confirm functionality + Seek new knowledge to improve availability, reliability, and performance + Share ideas and leverage developer tools to create, debug, and maintain code… more
- Bowery Residents Committee (Manhattan, NY)
- …outreach with MTAPD or NYPD. Responsible for providing direct outreach, vulnerability assessments, escort, and referral services for all homeless individuals ... encountered in the system during their shift. Responsible for recording and maintaining accurate statistical data on all individuals approached and referred as well as case-record management of clients receiving longer-term services. Recognize the signs and… more
- General Motors (Marion, IN)
- …across cross-functional teams + Oversee client patching, security compliance, and vulnerability remediation + Provide IT support for Just-In-Time (JIT) supplier ... operations **Required Qualifications** + Bachelor's degree (or higher) in IT, Engineering, or a related field + 10+ years of progressive IT experience, including leadership or supervisory responsibility + Experience supporting manufacturing or industrial… more
- UCLA Fielding School of Public Health (Los Angeles, CA)
- …the rewarding and aversive properties of stimuli, and how they contribute to vulnerability to substance use disorders. Our long-term goal is to identify novel ... mechanisms and therapeutic strategies to improve pain management. For additional information about our ongoing projects, we encourage you to go and visit www.massalylab.com. The Massaly Lab is seeking highly motivated, creative, and dedicated postdoctoral… more
- RTX Corporation (Cedar Rapids, IA)
- …+ Experience with various information system security tools that address vulnerability analysis and mitigation. These may include Splunk, Ivanti, Tenable, ACAS, ... HBSS, Nexpose, etc. + Experience in the oversight and execution of the Assessment & Authorization processes (Certification & Accreditation), as defined in JSIG/DAAG + Experience in the execution and management of Information System's (IS) incident response and… more
- Air National Guard Units (Washington, DC)
- …security programs, procedures, and tools are specifically accomplished by conducting vulnerability assessments and ensuring all protection needs are met Requirements ... Conditions of Employment Qualifications GENERAL EXPERIENCE: Experience, education, and/or training that has provided a basic knowledge of data processing functions and general management principles that enabled the applicant to understand the stages required… more
- Google (Sunnyvale, CA)
- …analysis. + Respond to vulnerabilities with repos, mitigations, and hardening. + Surface vulnerability patterns and design them out. + Focus on the security strategy ... for Google Cloud. Information collected and processed as part of your Google Careers profile, and any job applications you choose to submit is subject to Google'sApplicant and Candidate Privacy Policy (./privacy-policy) . Google is proud to be an equal… more
Recent Jobs
-
Construction Close-Out Administration - Project Manager - Data Center
- Olsson (Moncks Corner, SC)