S. defense, security, space, and intelligence requirements. Celebrating over 50 years in the US, we remain a trusted government partner, leveraging world-class satellite, laser communication, rotor ...
Monitors security compliance in accordance with IT Security standards, policies, and procedures. * Responsible for maintenance of systems documentation such as IT operations manuals. * Responsible ...
Oversee cloud services on platforms such as Azure, AWS, and Office 365, ensuring optimal performance, scalability, and security. * Lead and manage cloud-based Telephony platforms such as Ring Central ...
Implement standard benchmark standards and other security controls as needed. * Provide leadership and guidance across the cloud platform team, acting as a subject matter expert and leading best ...
Your key to unlocking high-security projects. * Eligibility for SCI access and readiness to obtain CI Polygraph . * US Citizenship : Non-negotiable for this critical role. Responsibilities
Active TS/SCI Clearance Required Skills and Qualifications: - Current Top Secret Security Clearance, preferably a Top Secret SCI with a current polygraph - Information Assurance/DoD 8570 ...
Physical security works in tandem with all operations teams to ensure Vantage facilities are safeguarded and well monitored. This includes functions across access control, CCTV, security staff ...
Partner with IT Security to fortify our defenses against emerging threats, maintaining the integrity and security of our data network. * Drive cost-effective telecommunications solutions, maximizing ...
Active Directory, creating users, distribution list, and security groups, office 365 Admin, configuring IP phones, phone, imaging and deploying software, remote users support, troubleshooting ...
Collaborate closely with the cyber security team to build repeatable systems with security best practice and hardening * Preferred familiarity with PCI and SOX procedures and controls Requirements
Security event data normalization and practices to provide ES with data enrichment with Common Information Modal (CIM) compliance. * Provide assistance for detailed view of notable events, workbook ...
This includes understanding encryption, authentication, and network security · Experience in 5G RAN- Core integration will be added advantage · Analyze and design resource orchestration system ...
This position requires that the candidate selected be a US Citizen and must currently possess and maintain an active TS/SCI security clearance with polygraph. About the team Work/Life Balance Our ...
World's largest security integrator consortium is looking for a Customer Success Supervisor to join their busy and exciting company JOB SUMMARY The Customer Success Supervisor is an integral part of ...
Security Certifications may include or similar to: * CompTIA Security+, CISSP, and CEH, * Microsoft 365 and Modern Workplace Certification may include or similar to: * VCP, CompTIA Storage+ * A ...
From fire alarm installation and testing to security cameras and video surveillance, our tailor-made solutions deliver connection and protection. Why Tech Electronics? At Tech Electronics, we pride ...
Working closely with Palo Alto business partners and driving sales for our Prisma Cloud security solutions, into new and existing customers. It is expected that you deliver or exceed your sales ...
Understanding of Cloud architecture, end points, VPC, Security groups etc. Skilled at creating and modifying Cloud formation templates. Skilled at creating new Terraform templates. Experience in ...
Snyk is a developer security platform that makes it easy for development teams to find, prioritize, and fix security vulnerabilities in code, dependencies, containers, and cloud infrastructure -- and ...
Research, drafts, and provides input regarding information security policies, trusted computing base architectures, and security engineering practices and processes. * Craft cybersecurity ...
May be asked to serve as primary contact for profit center's physical security by training associates, adhering to security standards, providing internal communication of security changes, and acting ...
In this role, you will apply Information Technology (IT) security principles, methods and security products to protect and maintain the availability, integrity, confidentiality and accountability of ...
Developing and implementing Security Operations Center / Incident Response & Remediation Playbooks * Developing new integrations with 3rd party systems leveraging Python, JavaScript, and YAML
Departments of Homeland Security and Treasury. We strive to hire only ethical, talented, passionate, and committed "A Players" who already align with the company's core values: Drive, Excellence ...