... this role is optimizing the security of the company's cloud infrastructure ... . They will develop and implement security policies, conduct risk assessments, and ... teams to identify and mitigate security threats, ensuring the protection of ...
28 days ago
... Title: Network Engineer- L3 (Data + Security) Tier II & Support Type: Full ... across enterprise data center and security environments. Role involves managing routing ...
14 days ago
... Risk & Compliance PCI & Data Risk Specialist Location: Plano, TX-Onsite C2C ... Seeking a senior Cyber Risk & Compliance Specialist to lead PCI DSS assessments ...
7 days ago
... and flair. As a Data Visualization Specialist, you will manage curating insightf
6 days ago
... Description ECS is seeking a Purchasing Specialist to work in our Plano ...
7 days ago
... received. Position: Azure Kubernetes Services Specialist Location: Plano, TX Job Mode ...
28 days ago
Description: Genesis10 is currently seeking a Network / System Engineer with our client in the financial industry located in Plano, TX and Chandler, AZ. This is a 12 + month contract position. Responsibilities: Assist in translating business requirements ...
8 days ago
Description: Overview Who we are Collaborative. Respectful. A place to dream and do. These are just a few words that describe what life is like at Toyota. As one of the world's most admired brands, Toyota is growing and leading the future of mobility ...
26 days ago
Description: We are At Synechron, we believe in the power of digital to transform businesses for the better. Our global consulting firm combines creativity and innovative technology to deliver industry-leading digital solutions. Synechron s progressive ...
27 days ago
Description: Company Description ** To comply with U.S. federal government requirements, U.S. citizenship is required for this position. ** Our Mission At Palo Alto Networks everything starts and ends with our mission: Being the cybersecurity partner of ...
5 days ago
Description: Ability to develop site survey templates to be used for capturing end user devices, DID numbers, additional solution design details, etc. Deep understanding of compliance surrounding FCC's E911 requirements of both Kari's Law and RAY BAUMS ...
15 days ago
... : Overview Identity is the new security perimeter! Come help Fisher Investments ... manage digital risk by applying security through identity controls. You will ... , you will support the Information Security
23 days ago
... convert them into MongoDb queries. Security: Implementing security best pract
16 days ago
... API gateway policies to meet security and performance requirements Collaborating with ...
2 days ago
... (Intelligence, Surveillance & Reconnaissance), Aviation, and Security (IAS) business area is a leader ...
4 days ago
... including application integration, performance management, security implementation, configuration management, and problem ...
5 days ago
... (Intelligence, Surveillance & Reconnaissance), Aviation, and Security (IAS) business area is a leader ...
7 days ago
... in the areas of cyber security and networks, AI/ML, advanced ...
10 days ago
... protection alerts. Collaborate with the security team and global stakeholders on ...
12 days ago
... understanding of financial services or security systems Define and prioritize the ...
12 days ago
- 1
- 2