CSC Holdings, LLC seeks a Systems Engineer to design, manage, maintain, and document both internal and customer-facing Unix environments and operating systems. Responsible for system life cycle management and system automation. Resolve performance,...
About TSR: TSR is a relationship-based, customer-focused IT and technical services staffing company. For over 40 years TSR, Inc. and its wholly owned subsidiary, TSR Consulting Services, have prospered in the Information...
Position Overview:We are seeking an experienced Cybersecurity Risk Assessment Engineer to conduct risk assessments using industry-standard frameworks such as NIST CSF, IEC 62443 3-2, and others. This role involves analyzing cybersecurity risks,...
Description Help us protect not only the Amazon Security (AmSec) cloud computing environment but all of our customers as well! Since 2006, our great team at AmSec has been enabling our customers to bring great ideas to life in ways that...
Summary: The Information Security Manager (“ISM”) is primarily responsible for assisting the Senior Information Security Manager (“SISM”) to fulfill Dime's security monitoring oversight functions in support of Dime's...
Description The Ads Security organization at Amazon is dedicated to creating innovative technical solutions that detect, assess, and mitigate security risks within Amazons Advertising businesses. Our vision is to accelerate the...
Job ID:679357BR Date posted:Dec. 20, 2024 Program:Syracuseta2024, buildradar Description:What We're Doing At Lockheed Martin, we are passionate about innovation and integrity. We believe...
Title: Associate Director of Network Security Location: New York, NY 10016 – 3x a week on-site Duration: PERM Interview Process: 2/3...
Summary: The Information Security Manager (“ISM”) is primarily responsible for assisting the Senior Information Security Manager (“SISM”) to fulfill Dime's security monitoring oversight functions in support of Dime's...
The position's primary responsibility is to support access management operational activities for critical financial systems. This support includes user onboarding, transfer, offboarding, certifications and other established operational processes...