... for less?Job Title: Mainframe Systems Programmer Location: USA, Remote Yr of ...
24 days ago
... position. Job Title: Mainframe z/OS Systems Programmer Job location- Remote- Part time ...
29 days ago
... matter expert for z/OS operating systems and system components; provide direct technical ... , or changes to z/OS operating system, network, and component software. Provide ...
27 days ago
... Experience with JES2, z/OS Unix System Services (OMVS), Storage Management Subsystem ... ) Experience with TSS (Top Secret Security) Experience with performance monitoring to ...
29 days ago
... re searching for a skilled Security Tester to assess and ... security of our software applications and systems. You'll collaborate with developers, security ... meet the highest security standards. Responsibilities: Conduct security testing, including vulnerability ...
10 days ago
... 10+ years experience.Understanding of security principles, PKI, mutual Transport ... Layer Security (mTLS), for microservices and API security, key and ... certificate management, and distributed system architecture.Public ...
15 days ago
... and analyze evidence such as security policies, system configurations, logs, and access ...
10 days ago
... technology security, computer engineering, computer information systems, computer science, management information systems or ...
10 days ago
... within the organization's network and systems. - Analyze data logs, user activities ...
24 days ago
... , group permissions, and security policies to keep our systems secure and organized ...
27 days ago
... you a master of both Windows Systems and SQL Databases? A leading financial ... , TX is seeking an IT Systems & Database Administrator for a unique hybrid ... in ensuring the performance and security of a large-scale enterprise environment ...
a day ago
... . Directs programmers and analysts to make changes to data base management system ...
10 days ago
Description: Cyber security IT Auditor Location: Austin, Texas ... and analyze evidence such as security policies, system configurations, logs, and access ...
7 days ago
... and analyze evidence such as security policies, system configurations, logs, and access ... with vendor personnel to assess security practices and governance. Perform control ...
9 days ago
... . Directs programmers and analysts to make changes to data base management system ... data base changes on other systems and staff cost for making ...
9 days ago
... and analyze evidence such as security policies, system configurations, logs, and access ... with vendor personnel to assess security practices and governance.Perform control ...
10 days ago
... and analyze evidence such as security policies, system configurations, logs, and access ... with vendor personnel to assess security practices and governance. Perform control ...
10 days ago
... Description As a member of the Security and Identity team, you will ... to OCI's security posture and is a highly scalable system that works across ...
10 days ago
... and analyze evidence such as security policies, system configurations, logs, and access ... with vendor personnel to assess security practices and governance. Perform control ...
13 days ago
... and analyze evidence such as security policies, system configurations, logs, and access ... with vendor personnel to assess security practices and governance.Perform control ...
13 days ago
- 1
- 2