Where
Where

Jobs and careers temporary for security access in Texas (339 jobs)

Sort by:
Description: Minimum Requirements: Candidates that do not meet or exceed the minimum stated requirements (skills/experience) will be displayed to customers but may not be chosen for this opportunity. Years Required/Preferred Experience 3 Required Evaluate ...
16 hours ago
  • Software People, Inc.
  • Austin
Description: Phone/Skype Hire. Onsite from Day 1 / Hybrid. Local preferred. State of TX residency is must. Location: Austin, Texas Duration: 6+ months Must have current LinkedIn profile. The cloud architect is responsible for the cloud computing ...
17 hours ago
Description: Evaluate and review existing DSHS Cybersecurity tools and controls to determine gaps, provide recommendations, and implement risk reduction plans for the DSHS organization. 3 Required Design, prepare, and present supporting documentation such ...
22 hours ago
  • NovaLink Solutions
  • Austin
Description: Graduation from an accredited four-year college or university with major coursework in computer science, computer information systems, software engineering, cybersecurity, or a related field. Two (2) years of full-time experience in software ...
9 days ago
  • Beacon Systems, Inc
  • Austin
Description: Minimum Requirements: Candidates that do not meet or exceed theminimumstated requirements (skills/experience) will be displayed to customers but may not be chosen for this opportunity.Required/PreferredExperienceRequiredGraduation from an ...
9 days ago
  • Randstad Digital
  • Irving
Description: job summary: Randstad Digital is hiring and we're looking for someone like YOU to join our team! If you are seeking a new opportunity, looking to grow in your career, or you know someone who is - we want to hear from you! Take a look at the ...
23 days ago
  • Aditi Consulting
  • Austin
Description: Payrate: $72.85 - $72.85/hr. Responsibilities Conduct vulnerability scans, analyze reports, and validate potential findings; contribute to process improvements; and documentation. Configure and manage vulnerability scanners for both VM and ...
26 days ago
  • Avtech Solutions
  • Austin
Description: Minimum Qualifications Years Skills / Experience 3 Experience in a GRC, cybersecurity, or compliance role 3 Hands-on experience with GRC platforms (Diligent preferred) - Strong understanding of NIST CSF 2.0, HIPAA, and state-level frameworks ...
29 days ago
  • SRI Tech Solutions
  • Austin
... , Searching, Indexing, Session handling - Junit - n/a Security - Access Control Lists (ACL), Sin
22 hours ago
  • Wissen Infotech
  • Houston
... Alto firewalls as Perimeter security devices and Prisma access for remote VPN ... implemented Network access control across all offices for port level security using ...
21 days ago
  • Drunix Solution Inc
  • Dallas
... , Greetings of the day!! Security Consultant - Identity & Access Management Services Saviynt IGA ... beneficial). 812+ years overall Identity & Access Management experience. Proven experience and ...
22 hours ago
... motivated Network Security Administrator II to join our Identity and Access Management ... ensure secure, efficient, and compliant access to
8 days ago
  • HCM Staffing and Consulting
  • Dallas
... as routers, switches, firewalls, and access points. Monitor network performance and ... ensure optimal operation.Implement network security measures to protect against unauthorized access a
29 days ago
  • NasTech Global, Inc.
  • Spring
... : Contract Skilltype: Cisco ISE Network Security Engineer w/ Automation Top 3 Skills ... Network Security & Authentication Expertise Strong hands-on ... 1X network access control, along with proficiency in firewall security platforms ( ...
9 days ago
... : Job Title:Cloud Security Automation Engineer Job Description ... expertise in building and supporting security solutions for Windows, Linux ... protection. Building and deploying security solutions using technologies such ... with Identity and Access, Endpoint, Vul
23 days ago
  • Sierra Business Solution LLC
  • Dallas
... cost monitoring and optimizations, user security auditing Implementsupport automation for production ... standards and methodologies for DB security both infrastructure and app level ... for administering Snowflake - AccountsDatabases and access roles
15 days ago
... using Sailpoint to replace Access Hub for user access. I.E - If you Leave ... make sure you have the access that you should have in ...
26 days ago
  • Apex 2000
  • Houston
... : In-depth understanding of the security concepts in Oracle - RMC module ... roles, assessing SA and privileged access, and supporting integration with Sailpoint ...
20 hours ago
  • Nityo Infotech Corporation
  • Dallas
... expertise in managing Identity and Access Management (IAM) projects. This role ... the organization, ensuring alignment with security standards, compliance requirements, and business ...
21 hours ago
  • Nityo Infotech Corporation
  • Dallas
... on Python development and Identity & Access Management (IAM) automation. You will ... platforms, RAG pipelines, LLMOps, and security/governance, while automating IAM controls ...
a day ago