- Mission Support and Test Services (Las Vegas, NV)
- …availability and privacy of all categories of data in all forms throughout the data life cycle. As a cyber security point of contact for the Policy and ... team, the Cybersecurity Analyst must have a working knowledge of system functions, cyber security policies, cyber security protection measures, familiarity… more
- Deloitte (Las Vegas, NV)
- …cryptography, confidential computing, secure enclaves, envelop encryption) and industry trends around cyber risk, data protection and cryptography practices. ... Our Deloitte Cyber team understands the unique challenges and opportunities...our clients, assisting them to evaluate strategic and practical data protection and encryption requirements based on… more
- Deloitte (Las Vegas, NV)
- …of Entra ID and AD security and compliance reports and advanced threat protection capabilities such as Defender for Identity , manage/migrate/deploy their LDAP ... Our Deloitte Cyber team understands the unique challenges and opportunities...are dealing and ensuring the integrity of access to data . Required: + Ability to travel 25-50%, on average,… more
- Golden Route Operations (Las Vegas, NV)
- … identity and SSO implementations to enhance secure access and identity protection . + Detect, investigate, resolve incidents, including ransomware and ... where you'll help safeguard our gaming and hospitality operations against evolving cyber threats. In a landscape shaped by trends like zero-trust architectures,… more
- Huntington Ingalls Industries (Nellis AFB, NV)
- …and commercial customers. Our capabilities range from C5ISR, AI and Big Data , cyber operations and synthetic training environments to fleet sustainment, ... Mission Technologies is leading the next evolution of national defense - the data evolution - by accelerating a breadth of national security solutions for government… more
- Deloitte (Las Vegas, NV)
- …do: + Maintain the health of complex enterprise systems and troubleshoot high-volume data feeds. + Integrate data from various internal and external enterprise ... systems into the Insider Threat Management workflow, ensuring data cleanliness. + Develop analytical models leveraging relevant data from Insider Risk detection… more