- Merck & Co. (Rahway, NJ)
- …Security Applications, Design Applications, Endpoint Security , Firewall Security , Identity Access Management (IAM), Incident Response, Information ... principles, methodologies, and technologies, as well as a basic understanding of network security solutions and endpoint security Familiarity with network … more
- Red River (Trenton, NJ)
- …may involve migrating data from on-premises systems to the cloud, setting up security policies, managing user access , and configuring theMicrosoft 365 stack. + ... related to network connectivity, application compatibility, data migration, and user access to ensure a successful deployment. + Provide training and support… more
- City of New York (New York, NY)
- …& Compliance, and Information Security . Your Impact: As the Endpoint Security and Identity and Access Management (IAM) Specialist for the Division ... Your Role: We are seeking a skilled and detail-oriented Endpoint Security and Identity and Access Management (IAM) Specialist to join our cybersecurity… more
- Cognizant (Bridgewater, NJ)
- … technologies with in SIEM, Network and Endpoint Security , Cloud Security , Identity and Access Management etc. . Ability to articulate technology ... **Overview:** Cognizant is looking for a **Cyber Security Service Line Sales Specialist** to join the Cybersecurity Service Line to drive additional revenue growth… more
- Merck (Rahway, NJ)
- …Security Applications, Design Applications, Endpoint Security , Firewall Security , Identity Access Management (IAM), Incident Response, Information ... principles, methodologies, and technologies, as well as a basic understanding of network security solutions and endpoint security . Familiarity with network… more
- GovCIO (Trenton, NJ)
- …(https://careers-govcio.icims.com/jobs/6978/ endpoint ... **Overview** GovCIO is currently hiring for Endpoint Vulnerability Management Subject-Matter Expert/Technical Lead for our...employees enjoy working here. In addition, our employees have access to a range of perks and benefits to… more
- City of New York (New York, NY)
- …as a Project Leader by instructing, teaching, and illustrating best practices for security access management, identity governance, and policy enforcement ... Computer Specialist (SW) Level II, to function as Sr. Security Access Management Analyst, who will: -...devices and managing configuration to ensure secure and compliant endpoint access . - Ensure the appropriate permissions… more
- Citizens (Iselin, NJ)
- …environments. + Drive resiliency and monitoring to prevent and detect advanced threats. Endpoint Security + Lead the strategy for securing laptops, mobile ... Application Security to lead and expand our security strategy across cloud, network, endpoint , and...and response (EDR), mobile device management (MDM), and zero-trust access principles. + Ensure a frictionless but secure end-user… more
- Confluent (Trenton, NJ)
- …technologies. + Have experience with evaluating & implementing identity & access management tools, endpoint security platforms, data loss prevention ... selection, deployment, and optimization of technical tools and platforms such as DLP, endpoint security platform, to identify, score, and alert on anomalous or… more
- Bloomberg (New York, NY)
- …environment that employees rely on every day. From OS-level software to endpoint performance, from privileged access control to secure remote connectivity, ... with InfoSec and Risk to define and enforce EUC security requirements, including endpoint protection and patch...telemetry, performance tuning, and support tooling + Familiarity with security tooling (DLP, EDR, EMP), access control… more
- Justworks (New York, NY)
- …Security organization across multiples domains such as network and infrastructure, application security , identity and access management, data protection, ... and penetration testing of cloud products and deployments. + Demonstrated technical expertise with endpoint security such as laptops security , mobile device … more
- iconectiv (Bridgewater, NJ)
- …teams. + Monitor system, network, and application activity for signs of unauthorized access or malicious activity. + Perform security audits and risk ... **About iconectiv** Your business and your customers need to confidently access and exchange information simply, seamlessly and securely. iconectiv's extensive… more
- MongoDB (New York, NY)
- …Evaluate, implement, and manage cloud-native security tools and platforms for endpoint security , identity management (IAM), and CSPM **Qualifications:** ... solutions for cloud platforms (AWS, Azure, GCP), including network and compute security , identity management, and cloud security posture management (CSPM)… more
- Amazon (New York, NY)
- …experience in Information Security , Networking, Security Operations, Application Security , Threat Detection, or Identity and are interested in helping ... Engineering service teams such AWS Private Cloud (VPC), Amazon Identity and Access Management (IAM), AWS Key...on experience with AWS. - Experience operating and deploying security tools such as Firewalls, Endpoint Detection… more
- Wells Fargo (Iselin, NJ)
- …networking, cryptography, cloud, authentication and directory services, email, internet, applications, and endpoint security + Review and correlate security ... confidentiality, risk management, threat identification, modeling, monitoring, incident response, access management, and business continuity + Identify security … more
- City of New York (New York, NY)
- …incidents and vulnerability reports, direct teams for remediation of issues. - Ensure identity and access management is properly documented in the ticketing ... areas of the Plan's business to develop a "best in class" information security and compliance program to assess appropriate technology platform risks and protect… more
- RELX INC (Trenton, NJ)
- …and implementing runbooks, capabilities, and techniques for Incident Response. + Performing security triage and analysis on endpoint , server, and network ... week. Are you considering a new role in Cyber Security and want to work in a company that...protected veteran status, age, marital status, sexual orientation, gender identity , genetic information, or any other characteristic protected by… more
- Coinbase (Trenton, NJ)
- …impactful results. * Translate the CorpSec vision into actionable roadmaps focused on endpoint security . * Lead hiring to build a high-performing team aligned ... you will define and execute a strategic vision for endpoint and corporate security , empowering your team... communication using device trust and zero trust network access products (like Cloudflare or Zscaler). * You have… more
- EPAM Systems (Newtown, PA)
- …to protect information systems and assets + Develop, implement, and maintain Endpoint Privileged Management solutions + Ensure all security technologies and ... and maintaining secure application infrastructures with a primary focus on Endpoint Privileged Management. Expertise in Endpoint Privileged Management tools… more
- Guardian Life (New York, NY)
- …response and digital forensics + Security Orchestration and Automation (SOAR) + Identity Access Management (IAM) / User Behavior Analytics (UBA) + Data Loss ... + DLP and Secure Data Transmission, Storage, and Access + Identity & Access ... + Web Proxy + Web Application Firewall + Endpoint Security Protection + Data Loss Prevention… more