- Oracle (Honolulu, HI)
- **Job Description** ** Technical Program Manager - Threat and Vulnerability Management** Oracle Cloud Infrastructure The Oracle Threat and ... Vulnerability Management (TVM) team proactively identifies, assesses, prioritizes, and...of the future. We are looking for a senior Technical Program Manger to lead key initiatives… more
- Oracle (Honolulu, HI)
- …Regional Security Operations. GPS is seeking a Technical Program Manager to lead a risk-driven, enterprise-scale vulnerability management program ... standards. **Responsibilities** + Daily Responsibilities + Operate a risk-driven vulnerability program that prioritizes by exploitability, asset criticality,… more
- GovCIO (Honolulu, HI)
- **Overview** GovCIO is currently hiring for Endpoint Vulnerability Management Subject-Matter Expert/ Technical Lead for our NIH Proposal. The Technical Lead ... Submit a referral to this job (https://careers-govcio.icims.com/jobs/6978/endpoint- vulnerability -management-subject-matter-expert- technical -lead/job?mode=apply&apply=yes&in\_iframe=1&hashed=-1834385473) **Location** _US-Remote_ **ID**… more
- Baylor Scott & White Health (Honolulu, HI)
- …vary based upon position type and/or level **Job Summary:** The PCI Compliance Program Manager is responsible for leading the organization's Payment Card ... DSS controls are effectively implemented, maintained, and continuously improved. The Program Manager collaborates with various internal and external stakeholders… more
- SOS International LLC (Pearl Harbor, HI)
- …execution of the information system patch and vulnerability management program . + Thorough understanding of Security Technical Implementation Guidelines ... Defense!** SOSi is on the hunt for a seasoned **Information Systems Security Manager ** to lead cutting-edge security initiatives at **Joint Base Pearl Harbor Hickam… more
- SAIC (Pearl Harbor, HI)
- …of domain enclaves by actively tracking and maintaining each network's cyber- vulnerability level and system compliance with applicable Defense Information Systems ... Agency (DISA) Security Technical Implementation Guides (STIGs) and Security Requirements Guides (SRGs)....any deviations or shortfalls to the Information System Security Manager (ISSM) for action. + Support and assist with… more
- Queen's Health System (Honolulu, HI)
- …* Supports and maintains The Queen's Health Systems' (QHS) information security program . * Actively promotes awareness and training of QHS Security Policies and ... limited to the following: o Management and support of QHS' information security technical controls, programs and policies. o Support QHS initiatives and projects by… more
- Cardinal Health (Honolulu, HI)
- …back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as ... organization. This role will also serve as a senior technical and strategic resource ensuing IT operations, projects, and...processes. + Shape the evolution of our GRC management program , helping build and refine processes that scale with… more
- Systems Technology Forum (Pearl Harbor, HI)
- …Personal Leave + Performance / Award Bonuses + Professional Development Coursework + Technical Training + Tuition Assistance Program + TotalChoice (TM) Voluntary ... logistics services, STF is committed to delivering high-quality systems engineering, technical and professional support services that meet and exceed deliverable… more
- V2X (Schofield Barracks, HI)
- …in support of US Army's Warfighter Training& Readiness Solutions ( W-TRS) program . *Performs risk analysis to evaluate the potential impact of identified ... Degree) **Certification(s):** 8140/8570 DoD Certification; Foundation-Intermediate / Information Assurance Manager I-II (IAM I-II) **Required Knowledge:** *Experience conducting regular… more
- Deloitte (Honolulu, HI)
- …and accelerate their path to value creation. Work You'll Do As a Project Delivery Manager on the project, as a Digital Network Exploitation Analyst you will: + Apply ... data and technical expertise to perform file signature analysis, real-time forensic analysis, and report intelligence-derived significant network events and… more