- Merck & Co. (Rockville, MD)
- …Delivery of Security Applications, Design Applications, Endpoint Security, Firewall Security, Identity Access Management (IAM), Incident Response, ... cloud configuration, intrusion detection and prevention systems, and secure remote access . Collaborate with cross-functional teams to integrate Zero Trust principles… more
- SMBC (Jersey City, NJ)
- …+ Knowledge and experience in various Technology and Cybersecurity domains, eg, Identity and Access Management , Vulnerability Management , etc. + ... and finance/technology industry to conduct audit coverage for the firm's cybersecurity and other related technology controls. Reporting to the Cybersecurity… more
- Signature Aviation (Orlando, FL)
- …+ Drive security awareness and training programs to foster a culture of cybersecurity across the organization. Team Management & Development + Lead, mentor, ... global Information Security program. Reporting directly to the Director of Cybersecurity , this pivotal role will drive strategic security initiatives to safeguard… more
- Ralliant (Raleigh, NC)
- Ralliant is seeking a motivated and technically broad ** Cybersecurity Engineer** to support and secure our Microsoft Cloud and collaboration platforms. This engineer ... and Exchange Online. + Deploy and manage **Microsoft Defender for Endpoint, Office, Identity ** , and **Entra ID** security features (PIM, MFA, SSPR). + Operate and… more
- COLSA Corporation (Fort Belvoir, VA)
- …Area of Responsibility (AOR) + Compiles, edits, coordinates, and updates cybersecurity strategies, policies, directives, and guidance to implement cybersecurity ... Mission Assurance Support Service + Advises senior leadership of cybersecurity challenges, issues, and opportunities for improvements + Advises supervisory… more
- DHL Express, Inc. (Tempe, AZ)
- …and manage secure vulnerability process (OS & Application) + Follow up and management of Cybersecurity Standards by SIEM Process (Security information and event ... lives. **Start YOUR career with DHL today ** The ** Cybersecurity Sr. Manager** , reporting to the Head of...applications and browser security; security assessments and penetration testing; identity and access control; applied cryptography and… more
- Avnet (Chandler, AZ)
- …international operations. The successful candidate will have strong expertise in cybersecurity assessments, regulatory frameworks, and risk management , and will ... to global audiences. + Create and manage internal communications related to cybersecurity initiatives, policies, and compliance updates. **Risk Management ** +… more
- COLSA Corporation (Kingsport, TN)
- General Summary: The Local Defender serves as a critical cybersecurity role that combines ISSO responsibilities with traditional Security Operations Center (SOC) and ... Threat Analyst functions. The position is pivotal in maintaining the cybersecurity posture of systems under its purview by supporting system authorization,… more
- American Tower (Cary, NC)
- …protection of distributed networks and remote users. + Implement and optimize centralized identity and access management systems, ensuring secure access ... **The Team** We are seeking a Senior Cybersecurity Engineer to join American Tower's Information Security team. The team protects the confidentiality, integrity, and… more
- COLSA Corporation (Kingsport, TN)
- General Summary: The Local Defender is a critical cybersecurity role responsible for protecting the organization's digital assets through proactive monitoring, ... adversarial tactics, techniques, and procedures (TTPs). + Collaborate with other cybersecurity team members and the government customer to integrate threat… more
- COLSA Corporation (Southport, NC)
- …teams. The ideal candidate brings robust understanding of Zero Trust architecture and Identity , Credential, and Access Management (ICAM) principles, and Risk ... + Inform the customer of the implementation of ICAM frameworks to ensure secure identity lifecycle management and access control policies across IT and… more
- COLSA Corporation (Dahlgren, VA)
- …contractor tasks and artifacts + Demonstrates competent knowledge of the Risk Management Framework, Computer Network Defense, and Vulnerability Mgmt. + Self starter ... Trains and develops Basic level employees + Demonstrates the ability to utilize cybersecurity tools (ACAS, ESS, Tanium, SIEM, eMASS) to generate cybersecurity … more
- Columbia Technology Partners (Annapolis Junction, MD)
- …management , auditing, security authorization process, principles of Cybersecurity (confidentiality, integrity, non-repudiation, availability, access control), ... activities for systems and networking operations. Provide assistance to ensure Cybersecurity functions are included in the configuration management process.… more
- Security Risk Advisors (Philadelphia, PA)
- …global team members. Track and maintain repositories of data pertaining to team members' access and training in multiple platforms, which will be the baseline of the ... Understand the holistic view of the client's business and cybersecurity needs. Act as the central point of contact...zone will be considered 1-3 years of professional project management or related work experience preferred. Holds or is… more
- Talen Energy (Allentown, PA)
- …and monitoring tools (Industrial Defender, Nozomi, Claroty, Dragos). + Familiarity with identity and access management (Active Directory, Okta, Azure ... of OT cybersecurity platforms, including asset inventory, vulnerability management , network segmentation, and secure remote/vendor access . + Develop,… more
- Applied Research Solutions (Norfolk, VA)
- …partners. With an industry-competitive benefits package, awards and recognition programs, and direct access to ARS senior management , we are dedicated to the ... Lead or support projects related to systems engineering, systems integration, logistics, cybersecurity , and tactical data links. + Develop and execute strategies for… more
- Hawaiian Electric (Honolulu, HI)
- …(eg, access control list, capabilities list). + Network access , identity , and access management (eg, public key infrastructure, Oauth, OpenID, ... development and enforcement of cybersecurity policies & standards, cybersecurity risk management activities, information technology (IT) and operational… more
- Sallie Mae (Newark, DE)
- … + Provide legal advice and support to Information Security, Risk Management , and others relating to cybersecurity , incident response, and business ... or its Sterling, Virginia office. **What You'll Do** + Procurement and Vendor Management + Provide legal advice and strategic advisory support for the day-to-day… more
- Sabre (Dallas, TX)
- …Proactively identify and mitigate identity -related risks, focusing on privileged access management and identity lifecycle controls. Partner with ... Governance & Policy: Define and enforce governance policies, including RBAC, conditional access , and cost management . Align cloud architecture standards across… more
- Whirlpool Corporation (Benton Harbor, MI)
- …govern the proper utilization of technical controls across the global footprint. + ** Identity and Access Management Operations** . This organization manages ... of all digital identities to include: provisioning/deprovisioning, Identity Governance, Access Reviews and Privileged Access Management . **Your… more