- Vanguard (Wayne, PA)
- …http/s traffic patterns, including headers, cookies, session tokens, and payloads. + Cloud Security Architecture & Threat Modeling for web applications. Deep ... escalated Incident Ticket resolution. + Designs and implements cyber security and operations procedures, tasks and reports....understanding of cloud security services, capabilities and defense in… more
- Cambridge International Systems Inc (Philadelphia, PA)
- …and critical challenges in defense and security . We are currently seeking a Cyber Security Analyst to support operations in Philadelphia, PA. This is a ... Cyber Security Analyst III - Secret Clearance...Apply today and help shape the future of secure cloud computing for national security . About Cambridge… more
- TD Bank (Mount Laurel, NJ)
- …+ Designs, reviews, and integrates all application requirements, including functional, security , integration, performance, quality, and operations **Education & ... **Line of Business:** Technology Solutions **Job Description:** The Senior IT Support Analyst provides a broad range of systems / application support, research and… more
- Deloitte (Philadelphia, PA)
- Cyber Google Security Operations Manager Position Summary Our Deloitte Cyber team understands the unique challenges and opportunities in cybersecurity. Join our ... offering assists clients in defending against advanced threats by transforming security operations , monitoring technology, data analytics, and threat… more
- Deloitte (Philadelphia, PA)
- …in security operations , threat detection engineering, or enterprise IT security . + Deep hands-on experience with Google Cloud 's SecOps tool stack and ... offering assists clients in defending against advanced threats by transforming security operations , monitoring technology, data analytics, and threat… more
- Deloitte (Philadelphia, PA)
- …or related field (or equivalent work experience). + 2+ years of experience in security operations , threat detection engineering, or enterprise IT security . + ... Includes security architecture, secure development and deployment, end-to-end cyber cloud capabilities, application security , and security for emerging… more