- Deloitte (Colorado Springs, CO)
- Cyber Data Protection and Encryption Senior Consultant Our Deloitte Cyber team understands the unique challenges and opportunities businesses face in ... computing, secure enclaves, envelop encryption) and industry trends around cyber risk, data protection and...including Oracle and MS SQL + Familiarity with common identity , authentication, and directory services, such as Active Directory… more
- Deloitte (Colorado Springs, CO)
- …(Microsoft Identity -Entra ID and Active Directory (AD) Our Deloitte Cyber team understands the unique challenges and opportunities businesses face in ... front lines with our clients supporting them with their Cyber Risk needs specifically helping them address Active Directory...and AD security and compliance reports and advanced threat protection capabilities such as Defender for Identity .… more
- Nou Systems, Inc. (Colorado Springs, CO)
- …mission protection , and anomaly engineering. + Provide support for data and signal collection, processing, storage, archiving, analysis, and lessons learned to ... Contractor interfaces. + Provide technical and operational insight to support mission protection , operations, and mission data assessments. The Contractor shall… more
- KBR (Colorado Springs, CO)
- …procedures. + Knowledge of cross-domain solution technical implementation. + Knowledge of data access protection and cyber -security activities relative to ... modifications employing waterfall, agile DevOps, and SecDevOps processes. + Knowledge of cyber -security activities relative to data platforms a plus +… more
- Deloitte (Colorado Springs, CO)
- …you'll do Key responsibilities of this position include protecting Deloitte people, data , and information systems by leveraging a User Behavioral Analytics Tool to ... program. + Support highly visible, small team in day-to-day responsibilities: conduct data analysis, develop reporting and presentation content. + Conduct in depth… more
- Deloitte (Colorado Springs, CO)
- …activities. + Review and advise on technical requirements, vendor solutions, and data protection features of applications and systems utilized and/or delivered ... 5 years in Risk Management, technology risk, privacy, or cyber security. Prior experience in project delivery or quality...technologies used to collect, share, access and use personal data such as cookies, web beacons, data … more