- Deloitte (Colorado Springs, CO)
- …cryptography, confidential computing, secure enclaves, envelop encryption) and industry trends around cyber risk, data protection and cryptography practices. ... Our Deloitte Cyber team understands the unique challenges and opportunities...our clients, assisting them to evaluate strategic and practical data protection and encryption requirements based on… more
- Deloitte (Colorado Springs, CO)
- …of Entra ID and AD security and compliance reports and advanced threat protection capabilities such as Defender for Identity , manage/migrate/deploy their LDAP ... Our Deloitte Cyber team understands the unique challenges and opportunities...are dealing and ensuring the integrity of access to data . Required: + Ability to travel 25-50%, on average,… more
- Deloitte (Colorado Springs, CO)
- …posture and reduce risk exposure. Collaborates with clients to enhance overall protection against cyber risks. + Majors : Computer Science, Cybersecurity, ... our people up for success is our highest priority. We are currently recruiting Cyber Summer Scholars whose skills and interests align with the below description: … more
- Deloitte (Colorado Springs, CO)
- …posture and reduce risk exposure. Collaborates with clients to enhance overall protection against cyber risks. + Majors : Computer Science, Cybersecurity, ... people up for success is our highest priority. We are currently recruiting Cyber Strategy Summer Scholars whose skills and interests align with the below… more
- General Dynamics Information Technology (Fort Carson, CO)
- …evaluate data pertaining to operations, and organizations in support of force protection and identity data management efforts. + Recommend mitigation ... threats. + Experience with knowledge management, legal implications of identity data and US policy in conducting... and US policy in conducting offensive and defensive cyber operations. + Familiarity with and ability to leverage… more
- Deloitte (Colorado Springs, CO)
- …do: + Maintain the health of complex enterprise systems and troubleshoot high-volume data feeds. + Integrate data from various internal and external enterprise ... systems into the Insider Threat Management workflow, ensuring data cleanliness. + Develop analytical models leveraging relevant data from Insider Risk detection… more
- General Dynamics Information Technology (Colorado Springs, CO)
- …in multiple IT disciplines, including network architecture, cloud security, endpoint protection , vulnerability management, identity and access management, and ... to minimize the impact of security incidents. + Reporting & Metrics: Analyze data from security monitoring systems and other sources to provide regular reports and… more