- Merck & Co. (Rahway, NJ)
- …Security Applications, Design Applications, Endpoint Security , Firewall Security , Identity Access Management (IAM), Incident Response, Information ... principles, methodologies, and technologies, as well as a basic understanding of network security solutions and endpoint security Familiarity with network … more
- Organon & Co. (Jersey City, NJ)
- …of Modern Workplace devices, including oversight of Intune and Microsoft Endpoint Configuration Manager (MECM) infrastructure, managing the Organon build images, ... security and vulnerability patching, and application packaging and deployment....investing in the unmet needs of Women's Health, expanding access to leading biosimilars and touching lives with a… more
- City of New York (New York, NY)
- …& Compliance, and Information Security . Your Impact: As the Endpoint Security and Identity and Access Management (IAM) Specialist for the Division ... Your Role: We are seeking a skilled and detail-oriented Endpoint Security and Identity and Access Management (IAM) Specialist to join our cybersecurity… more
- Merck (Rahway, NJ)
- …Security Applications, Design Applications, Endpoint Security , Firewall Security , Identity Access Management (IAM), Incident Response, Information ... principles, methodologies, and technologies, as well as a basic understanding of network security solutions and endpoint security . Familiarity with network… more
- Cognizant (Bridgewater, NJ)
- … technologies with in SIEM, Network and Endpoint Security , Cloud Security , Identity and Access Management etc. . Ability to articulate technology ... **Overview:** Cognizant is looking for a **Cyber Security Service Line Sales Specialist** to join the Cybersecurity Service Line to drive additional revenue growth… more
- JPMorgan Chase (Jersey City, NJ)
- …numbers of devices at scale for critical business operations. + Experience with identity and access management, device security , firewalls, mobile ... the aligned projects in line with the compliance standards, risk and security , service level agreements, and business requirements + Applies relevant technical… more
- Citizens (Iselin, NJ)
- …environments. + Drive resiliency and monitoring to prevent and detect advanced threats. Endpoint Security + Lead the strategy for securing laptops, mobile ... Application Security to lead and expand our security strategy across cloud, network, endpoint , and...and response (EDR), mobile device management (MDM), and zero-trust access principles. + Ensure a frictionless but secure end-user… more
- City of New York (New York, NY)
- …as a Project Leader by instructing, teaching, and illustrating best practices for security access management, identity governance, and policy enforcement ... Computer Specialist (SW) Level II, to function as Sr. Security Access Management Analyst, who will: -...devices and managing configuration to ensure secure and compliant endpoint access . - Ensure the appropriate permissions… more
- Bloomberg (New York, NY)
- …environment that employees rely on every day. From OS-level software to endpoint performance, from privileged access control to secure remote connectivity, ... with InfoSec and Risk to define and enforce EUC security requirements, including endpoint protection and patch...telemetry, performance tuning, and support tooling + Familiarity with security tooling (DLP, EDR, EMP), access control… more
- NBC Universal (Englewood Cliffs, NJ)
- …working across cyber security disciplines to include but not limited to Identity and Access Management (IAM), Security Engineering, Product Security ... IT assets. This individual reports directly to the VP, Identity and Security Services and will interact...and compliance monitoring (AWS, Azure, GCP). + CASB (Cloud Access Security Broker) for SaaS protection. +… more
- Justworks (New York, NY)
- …Security organization across multiples domains such as network and infrastructure, application security , identity and access management, data protection, ... and penetration testing of cloud products and deployments. + Demonstrated technical expertise with endpoint security such as laptops security , mobile device … more
- iconectiv (Bridgewater, NJ)
- …teams. + Monitor system, network, and application activity for signs of unauthorized access or malicious activity. + Perform security audits and risk ... **About iconectiv** Your business and your customers need to confidently access and exchange information simply, seamlessly and securely. iconectiv's extensive… more
- ADP (Parsippany, NJ)
- …(AWS, Azure, or GCP) + Experience with key security domains such as identity and access management (IAM), data protection, and network security + ... protection and efficiency + Help drive initiatives around cloud security , zero trust, identity management, and data protection + Collaborate on security… more
- MongoDB (New York, NY)
- …Evaluate, implement, and manage cloud-native security tools and platforms for endpoint security , identity management (IAM), and CSPM **Qualifications:** ... solutions for cloud platforms (AWS, Azure, GCP), including network and compute security , identity management, and cloud security posture management (CSPM)… more
- Amazon (New York, NY)
- …experience in Information Security , Networking, Security Operations, Application Security , Threat Detection, or Identity and are interested in helping ... Engineering service teams such AWS Private Cloud (VPC), Amazon Identity and Access Management (IAM), AWS Key...on experience with AWS. - Experience operating and deploying security tools such as Firewalls, Endpoint Detection… more
- City of New York (New York, NY)
- …incidents and vulnerability reports, direct teams for remediation of issues. - Ensure identity and access management is properly documented in the ticketing ... areas of the Plan's business to develop a "best in class" information security and compliance program to assess appropriate technology platform risks and protect… more
- Wells Fargo (Iselin, NJ)
- …networking, cryptography, cloud, authentication and directory services, email, internet, applications, and endpoint security + Review and correlate security ... confidentiality, risk management, threat identification, modeling, monitoring, incident response, access management, and business continuity + Identify security … more
- Insight Global (Bridgewater, NJ)
- …incident response, and security tools * Strong understanding of network protocols, security frameworks, identity and access management (IAM), and system ... administration * Expert level understanding of perimeter security controls, endpoint controls, and cloud environment controls * Experience with network… more
- EPAM Systems (New York, NY)
- …to protect information systems and assets + Develop, implement, and maintain Endpoint Privileged Management solutions + Ensure all security technologies and ... and maintaining secure application infrastructures with a primary focus on Endpoint Privileged Management. Expertise in Endpoint Privileged Management tools… more
- Guardian Life (New York, NY)
- …response and digital forensics + Security Orchestration and Automation (SOAR) + Identity Access Management (IAM) / User Behavior Analytics (UBA) + Data Loss ... + DLP and Secure Data Transmission, Storage, and Access + Identity & Access ... + Web Proxy + Web Application Firewall + Endpoint Security Protection + Data Loss Prevention… more