• Senior Manager, Information Records Governance

    Sumitomo Pharma (Montpelier, VT)
    …configure, test, and optimize DLP solutions. + Conduct risk assessments and vulnerability analyses related to data protection. + Provide training and awareness ... programs for employees on DLP best practices. **E-Discovery** + Manage the identification, preservation, collection, and processing of electronically stored information (ESI) for legal and regulatory matters + Coordinate with Legal, Compliance, and IT teams to… more
    Sumitomo Pharma (01/10/26)
    - Related Jobs
  • Cyber Security Engineer

    Robert Half Technology (Jacksonville, FL)
    …protection, and cloud security (Azure/AWS). + Proficiency in threat analysis, vulnerability management, and security monitoring. + Knowledge of security frameworks ... such as NIST, ISO 27001, or CIS Controls. + Strong troubleshooting, problem-solving, and communication skills. + Certifications preferred: CompTIA Security+, CISSP, CEH, or equivalent. Technology Doesn't Change the World, People Do.(R) Robert Half is the… more
    Robert Half Technology (01/10/26)
    - Related Jobs
  • Senior Security Engineer (AI/Cloud Modernization)

    St. George Tanaq Corporation (Lansing, MI)
    …Encryption, authentication, and access control mechanisms + Risk assessment, vulnerability management, and security monitoring + AI/ML security considerations, ... including data privacy and model integrity + Security compliance documentation and reporting **Core Competencies** + Analytical and risk assessment expertise + Collaboration with DevOps, PMs, and AI/ML teams + Leadership in implementing secure development best… more
    St. George Tanaq Corporation (01/10/26)
    - Related Jobs
  • Software Engineer II (SAP Technologies)

    Microsoft Corporation (Redmond, WA)
    …principles with supervision + Support deployment gates, security controls, and vulnerability scanners + Contribute to threat modeling, security drills, and incident ... response processes + Run code/config in non-production environments to confirm functionality + Seek new knowledge to improve availability, reliability, and performance + Share ideas and leverage developer tools to create, debug, and maintain code… more
    Microsoft Corporation (01/10/26)
    - Related Jobs
  • Transit Based Outreach Specialist (End Of Line)…

    Bowery Residents Committee (Manhattan, NY)
    …outreach with MTAPD or NYPD. Responsible for providing direct outreach, vulnerability assessments, escort, and referral services for all homeless individuals ... encountered in the system during their shift. Responsible for recording and maintaining accurate statistical data on all individuals approached and referred as well as case-record management of clients receiving longer-term services. Recognize the signs and… more
    Bowery Residents Committee (01/10/26)
    - Related Jobs
  • Plant IT Manager - Site Support Analyst

    General Motors (Marion, IN)
    …across cross-functional teams + Oversee client patching, security compliance, and vulnerability remediation + Provide IT support for Just-In-Time (JIT) supplier ... operations **Required Qualifications** + Bachelor's degree (or higher) in IT, Engineering, or a related field + 10+ years of progressive IT experience, including leadership or supervisory responsibility + Experience supporting manufacturing or industrial… more
    General Motors (01/10/26)
    - Related Jobs
  • Postdoctoral Research Position

    UCLA Fielding School of Public Health (Los Angeles, CA)
    …the rewarding and aversive properties of stimuli, and how they contribute to vulnerability to substance use disorders. Our long-term goal is to identify novel ... mechanisms and therapeutic strategies to improve pain management. For additional information about our ongoing projects, we encourage you to go and visit www.massalylab.com. The Massaly Lab is seeking highly motivated, creative, and dedicated postdoctoral… more
    UCLA Fielding School of Public Health (01/10/26)
    - Related Jobs
  • Information Systems Security Manager (Onsite)…

    RTX Corporation (Cedar Rapids, IA)
    …+ Experience with various information system security tools that address vulnerability analysis and mitigation. These may include Splunk, Ivanti, Tenable, ACAS, ... HBSS, Nexpose, etc. + Experience in the oversight and execution of the Assessment & Authorization processes (Certification & Accreditation), as defined in JSIG/DAAG + Experience in the execution and management of Information System's (IS) incident response and… more
    RTX Corporation (01/10/26)
    - Related Jobs
  • IT Cybersecurity Specialist (Infosec)

    Air National Guard Units (Washington, DC)
    …security programs, procedures, and tools are specifically accomplished by conducting vulnerability assessments and ensuring all protection needs are met Requirements ... Conditions of Employment Qualifications GENERAL EXPERIENCE: Experience, education, and/or training that has provided a basic knowledge of data processing functions and general management principles that enabled the applicant to understand the stages required… more
    Air National Guard Units (01/10/26)
    - Related Jobs
  • Senior Product Security Engineer

    Google (Sunnyvale, CA)
    …analysis. + Respond to vulnerabilities with repos, mitigations, and hardening. + Surface vulnerability patterns and design them out. + Focus on the security strategy ... for Google Cloud. Information collected and processed as part of your Google Careers profile, and any job applications you choose to submit is subject to Google'sApplicant and Candidate Privacy Policy (./privacy-policy) . Google is proud to be an equal… more
    Google (01/10/26)
    - Related Jobs