• Manager, Food Safety Program- GSC - US

    Sysco (Stockton, CA)
    …and execution of product recalls and completion of related documentation. Completes vulnerability assessment and develops mitigations for the Food Defense Program to ... ensure requirements are carried out in a timely, accurate manner to decrease risk of Intentional Adulteration. Completes or assures completion of the Regulatory Visit Report and documents corrective and preventive action plans for non-conformances identified… more
    Sysco (01/10/26)
    - Related Jobs
  • Counterintelligence Investigator - TS/SCI…

    General Dynamics Information Technology (El Segundo, CA)
    …critical national assets. + Working knowledge of cyber threats and vulnerability , including the applicable laws, regulations, policies, and ethics related to ... cybersecurity, privacy, and impacts. + Applies techniques of debriefing, interviewing, or elicitation in a systematic manner through direct and indirect questioning to obtain information of security, counterintelligence and/or intelligence value. Prepares… more
    General Dynamics Information Technology (01/10/26)
    - Related Jobs
  • Information Technology Specialist (Infosec)

    Air Mobility Command (Mcchord AFB, WA)
    …the Risk Management Framework to assess risk factors and advise on vulnerability to attack from a variety of sources (eg destructive programs/applications/viruses, ... unauthorized access, disruption of services, espionage) and procedures and methods for protection of systems and applications. 3. Knowledge of Local Area Network security requirements and techniques for protecting computer systems from viruses, data tampering,… more
    Air Mobility Command (01/10/26)
    - Related Jobs
  • SOC Analyst

    TEKsystems (Chandler, AZ)
    …team (CSIRT) activities - Security engineers will also participate in network vulnerability scans, security audits or risk assessments and provide feedback to ensure ... compliance with corporate security policies and adherence to industry best practices. This position interacts with management, lines-of-business representatives, and senior technical engineers across internal and external organizations. This role participates… more
    TEKsystems (01/10/26)
    - Related Jobs
  • Cyber Security Specialist

    Robert Half Technology (Jacksonville, FL)
    …security incidents, including malware, phishing, and intrusion attempts. + Perform vulnerability assessments and recommend remediation actions. + Analyze logs and ... network traffic to detect suspicious activity. + Maintain and update security documentation, policies, and procedures. + Collaborate with IT and cybersecurity teams to improve overall security posture. Requirements Qualifications: + 2+ years of experience in… more
    Robert Half Technology (01/10/26)
    - Related Jobs
  • Site Reliability Engineer

    Fiserv (Omaha, NE)
    …regulated environments (eg, PCI DSS, SOC 2), including secrets management and vulnerability remediation. + 5+ years of experience in Infrastructure as Code ... (Terraform, CloudFormation, Ansible) for provisioning and configuration management. + 5+ years of experience in CI/CD pipeline engineering using Jenkins, GitLab CI, GitHub Actions, or Azure DevOps. + 5+ years of experience in scripting and automation using… more
    Fiserv (01/10/26)
    - Related Jobs
  • Cyber Security Specialist (RMF)

    General Dynamics Information Technology (Macdill AFB, FL)
    …development of security and contingency plans and conduct complex risk and vulnerability assessments. + Analyze policies and procedures against DoD security policies ... and regulations and provide recommendations for closing gaps. + Recommend system enhancements to improve security deficiencies. + Interface with both client managers and system users. + Analyze customer DevSecOps security controls and AI/ML security controls… more
    General Dynamics Information Technology (01/10/26)
    - Related Jobs
  • Corrections Unit Manager - SCI Greene

    Commonwealth of Pennsylvania (PA)
    …correctional training program courses related to security such as Security Analysis or Vulnerability Assessment. + D. I have NO training or experience related to ... this work behavior. 10 In the text box below, please describe your experience as it relates to the level of performance you claimed in this work behavior. Please be sure your response addresses the items listed below which relate to your claim. If you… more
    Commonwealth of Pennsylvania (01/10/26)
    - Related Jobs
  • Senior Cybersecurity Architect

    NVIDIA (Santa Clara, CA)
    …solutions + Expertise in network security, including Zero Trust architectures, vulnerability assessment, encryption standards, and secure data handling. + Proficient ... in Identity and Access Management (IAM) solutions, multi-factor authentication (MFA), and modern security technologies like SIEM, IDS/IPS, DLP, and endpoint protection. + Excellent written and verbal communication skills. Ability to communicate effectively… more
    NVIDIA (01/10/26)
    - Related Jobs
  • F-35 Info Sys Sec Manager

    Lockheed Martin (Orlando, FL)
    …network environment tools and applications, including: SIEM, ESS, DLP, IAM, Vulnerability Scanning, etc\. **Desired Skills:** * Proven expertise in Dev/Sec/Ops ... concepts and processes, with the ability to apply them in real\-world scenarios, including: Expertise in Splunk, including: Writing queries, Creating dashboards, Implementing third\-party apps \(e\.g\., Qmulos Products\)\. Experience with network design… more
    Lockheed Martin (01/10/26)
    - Related Jobs