- Leidos (Houston, TX)
- Description Leidos is seeking an experienced Firewall Engineering Manager to lead a team of security and network engineers responsible for designing, ... Networks, and cloud‑connected environments. The selected candidate will manage the Firewall Engineering Team and serve as a key technical authority for… more
- Leidos (Houston, TX)
- A technology and engineering company is seeking an experienced Firewall Engineering Manager to lead a team responsible for NASA's firewall and ... perimeter security infrastructure. The role involves managing operations, implementing security strategies, and collaborating with various teams. Candidates should have significant experience in network security and leadership skills. This position offers… more
- Hines (Houston, TX)
- …for four primary functions: Security Architecture/Design Security Engineering /Implementation Security Enforcement/Adherence (Governance) Escalated Incident Response ... or related field 10+ years of experience in security architecture and engineering , with proven hands-on technical leadership in real estate, finance, or… more
- Leidos (Houston, TX)
- **Description** Leidos is seeking an experienced ** Firewall Engineering Manager ** to lead a team of security and network engineers responsible for designing, ... Networks, and cloud-connected environments. The selected candidate will manage the Firewall Engineering Team and serve as a key technical authority for… more
- Huntington National Bank (Houston, TX)
- …Job Description + The Google Cloud Platform (GCP) Site Reliability Engineer (SRE) Manager is responsible for supporting the GCP framework and consumers of the ... to the Chief Development Office's (CDO) Cloud Infrastructure Acceleration team. The SRE manager will lead a team of Onshore and Offshore SRE's to develop… more
- Anywhere Real Estate (Houston, TX)
- …the role of Analyst Security Operations. This position will report to the Manager of Security Operations. The Analyst role will be responsible for the management, ... of active security threats, development of new analytic methods, reverse engineering of malicious code, and documenting and transitioning results in reports… more