- Insmed Incorporated (NJ)
- …participate directly in cybersecurity operations , including incident response, threat detection, vulnerability management , and risk remediation.Architect and ... seeking an experienced leader to oversee cybersecurity operations, enterprise risk management , and Computer Systems Validation (CSV) program. This role will manage… more
- Reed Smith LLP (Pittsburgh, PA)
- …design, implementation, and support of LAN/WAN, remote access, IDS/IPS, PKI, and firewall/unified threat management systems, as well as Identity & Access ... requirements. Deploy, manage, and maintain firewalls, including Firewall-as-a-Service (FWaaS), Unified Threat Management (UTM) solutions, and Secure Web Gateways… more
- Unknown (Fort Worth, TX)
- …Cyber Security Network Security Specialties it security encryption next-gen utm (unified threat management ) mobile device management endpoint security ... antivirus email and web protection free tools network security and server protection server protection and managed detection and response (mdr) About the Role The Company is seeking a Vice President of Corporate and Strategic Communications to play a pivotal… more
- Unknown (Seattle, WA)
- …As the chief incident commander, the role involves end-to-end security posture management , from threat detection to incident response, and applying the ... technical operations/SRE, with a minimum of 2 years in a formal people management role. The role requires deep expertise in modern security operations within a… more
- Unknown (Jacksonville, FL)
- …of security frameworks and standards, as well as experience in incident response, threat modeling, and risk management , is essential. The CISO will be ... & Services Technology Real Estate Security Smart Home Software Property Management Access Management Mobile App Development Integration Services Electricians… more
- Unknown (Rock Hill, SC)
- …standards, student development theory, and experience in areas such as ADA regulations, threat assessment, and risk management . The ideal candidate will have a ... the ability to build and lead a high-performance team. Proficiency in case management systems and budgeting experience in a complex organizational structure are also… more
- Daiichi Sankyo, Inc. (Bernards, NJ)
- …analysis of a variety of data sets to investigate potentially malicious activityReview threat material to determine impact and actionsWork closely with IT staff to ... is required. Excellent written and verbal communication skills and time management skills are essential. Daiichi Sankyo, Inc. is an equal opportunity/affirmative… more
- The Computer Merchant, LTD. (Waltham, MA)
- …of cloud security concepts, including network security, data protection, identity management , and threat modeling across major cloud providers. Extensive ... security foundations to include experience with network security, vulnerability management , penetration testing, security operations, and application security; fundamental… more
- Unknown (New York, NY)
- …certification programs and a strong technical grounding in areas such as threat detection, incident response, vulnerability management , and security engineering ... auditors. The role also involves conducting comprehensive security assessments, developing a threat model specific to the crypto landscape, and standing up incident… more
- Unknown (Boston, MA)
- Vice President, Legal About the Company Leading provider of cyber threat detection software Industry Computer & Network Security Type Privately Held, VC-backed ... Technology Specialties endpoint security cyber security anomaly detection advanced threat detection & response malware protection incident response threat… more
- Unknown (Denver, CO)
- …$76-$100 million Categories Computers Design Services Integration Services IT Management Information Technology & Services Technology Security Specialties advanced ... threat protection insider threat protection threat detection threat response automated intelligence machine learning information security software saas… more
- Unknown (Austin, TX)
- …About the Company Innovative provider of data-driven security insights & threat analytics Industry Security and Investigations Type Privately Held, VC-backed Founded ... 2019 Employees 11-50 Funding $6-$10 million Specialties security risk management crowdsourcing community data data visualizaton safety tools transparency social… more
- Dream Finders Homes (Jacksonville, NC)
- …automobile for on-site use. Preferred Experience Bachelor's degree - Construction Management . Knowledge of building codes 2+ years of residential home building ... individuals with disabilities. Some functions may exclude individuals who pose a direct threat or significant risk to the health and safety of themselves or others.… more
- Dream Finders Homes (Mount Pleasant, SC)
- …partners Strong attention to detail Strong organizational skills and time management skills Ability to establish and maintain strong relationships Proficient in ... individuals with disabilities. Some functions may exclude individuals who pose a direct threat or significant risk to the health and safety of themselves or others.… more
- Dream Finders Homes (Stockbridge, GA)
- …clerical duties as assigned. EXPERIENCE, SKILLS, KNOWLEDGE BA in Construction Management , Building Sciences or related discipline 2+ years of residential ... individuals with disabilities. Some functions may exclude individuals who pose a direct threat or significant risk to the health and safety of themselves or others.… more
- Unknown (San Francisco, CA)
- … management fraud prevention bot defense bot detection automated threat prevention enterprise software security software bot protection web application security ... President of Sales About the Company Innovative provider of automated security threat protection solutions Industry Computer & Network Security Type Privately Held,… more
- Lockheed Martin (Harmans, MD)
- …Here, you'll work with cybersecurity experts on the forefront of threat protection and proactive prevention. In this fast-paced, real-world environment, you'll ... DevOps, Automated testing and CI/CD pipelines in Git * Container and Container Management ie Ansible, Docker, Kubernetes and Rancher * Modern software languages such… more
- Agile IT (San Diego, CA)
- …Defender for Endpoint/Office 365/Cloud Apps, Microsoft Sentinel SIEM, Intune endpoint management , and Purview compliance features. Ensure that security baselines and ... and aligned with each clienta€ (TM) s policies and CMMC requirements. Threat Monitoring & Incident Response: Monitor security alerts and events across client… more
- Unknown (Irving, TX)
- …banking trust banking securities credit cards consumer finance asset management leasing financial technology wholesale banking information technology digital banking ... savings wealth management consumer banking and retail banking About the Role...the financial crime compliance sector. A background in counter threat finance, anti-money laundering, or sanctions compliance is strongly… more
- Unknown (New York, NY)
- …VPN Specialties Endpoint Security Network Security Security Information & Event Management (SIEM) Web Security Database Security Email Security Data Security ... Advanced Threat Defense Mobile Security About the Role The Company...successful candidate will be fully accountable for the end-to-end management , optimization, and innovation across a diverse media ecosystem,… more