Description: Minimum Requirements: Candidates that do not meet or exceed the minimum stated requirements (skills/experience) will be displayed to customers but may not be chosen for this opportunity. Years Required/Preferred Experience 3 Required Evaluate ...
16 hours ago
Description: Phone/Skype Hire. Onsite from Day 1 / Hybrid. Local preferred. State of TX residency is must. Location: Austin, Texas Duration: 6+ months Must have current LinkedIn profile. The cloud architect is responsible for the cloud computing ...
17 hours ago
Description: Evaluate and review existing DSHS Cybersecurity tools and controls to determine gaps, provide recommendations, and implement risk reduction plans for the DSHS organization. 3 Required Design, prepare, and present supporting documentation such ...
22 hours ago
Description: Graduation from an accredited four-year college or university with major coursework in computer science, computer information systems, software engineering, cybersecurity, or a related field. Two (2) years of full-time experience in software ...
9 days ago
Description: Minimum Requirements: Candidates that do not meet or exceed theminimumstated requirements (skills/experience) will be displayed to customers but may not be chosen for this opportunity.Required/PreferredExperienceRequiredGraduation from an ...
9 days ago
Description: job summary: Randstad Digital is hiring and we're looking for someone like YOU to join our team! If you are seeking a new opportunity, looking to grow in your career, or you know someone who is - we want to hear from you! Take a look at the ...
23 days ago
Description: Payrate: $72.85 - $72.85/hr. Responsibilities Conduct vulnerability scans, analyze reports, and validate potential findings; contribute to process improvements; and documentation. Configure and manage vulnerability scanners for both VM and ...
26 days ago
Description: Minimum Qualifications Years Skills / Experience 3 Experience in a GRC, cybersecurity, or compliance role 3 Hands-on experience with GRC platforms (Diligent preferred) - Strong understanding of NIST CSF 2.0, HIPAA, and state-level frameworks ...
29 days ago
... , Searching, Indexing, Session handling - Junit - n/a Security - Access Control Lists (ACL), Sin
22 hours ago
... Alto firewalls as Perimeter security devices and Prisma access for remote VPN ... implemented Network access control across all offices for port level security using ...
21 days ago
... , Greetings of the day!! Security Consultant - Identity & Access Management Services Saviynt IGA ... beneficial). 812+ years overall Identity & Access Management experience. Proven experience and ...
22 hours ago
... motivated Network Security Administrator II to join our Identity and Access Management ... ensure secure, efficient, and compliant access to
8 days ago
... as routers, switches, firewalls, and access points. Monitor network performance and ... ensure optimal operation.Implement network security measures to protect against unauthorized access a
29 days ago
... : Contract Skilltype: Cisco ISE Network Security Engineer w/ Automation Top 3 Skills ... Network Security & Authentication Expertise Strong hands-on ... 1X network access control, along with proficiency in firewall security platforms ( ...
9 days ago
... : Job Title:Cloud Security Automation Engineer Job Description ... expertise in building and supporting security solutions for Windows, Linux ... protection. Building and deploying security solutions using technologies such ... with Identity and Access, Endpoint, Vul
23 days ago
... cost monitoring and optimizations, user security auditing Implementsupport automation for production ... standards and methodologies for DB security both infrastructure and app level ... for administering Snowflake - AccountsDatabases and access roles
15 days ago
... using Sailpoint to replace Access Hub for user access. I.E - If you Leave ... make sure you have the access that you should have in ...
26 days ago
... : In-depth understanding of the security concepts in Oracle - RMC module ... roles, assessing SA and privileged access, and supporting integration with Sailpoint ...
20 hours ago
... expertise in managing Identity and Access Management (IAM) projects. This role ... the organization, ensuring alignment with security standards, compliance requirements, and business ...
21 hours ago
... on Python development and Identity & Access Management (IAM) automation. You will ... platforms, RAG pipelines, LLMOps, and security/governance, while automating IAM controls ...
a day ago