Are you a business? Hire Security candidates in Belleville, NJ
Understanding of data security and cloud security methodologies, and experience in configuration and management of data security to meet compliance and IT security requirements. * Experience using ...
Candidate needs to be highly experienced with data privacy law and security. Must have knowledge of global SaaS trends. Besides improving contracting processes, you will be responsible for process ...
Minimum of 5 years of experience in network security, with a focus on remote access VPN technologies. * Extensive experience with Cisco VPN solutions, Cisco Defense Orchestrator (CDO), BGP routing ...
Security Monitoring and Incident Response: Monitor security systems, identify potential threats, and respond to security incidents promptly and effectively. * Configuration: Hands-on experience ...
Are you looking for an exciting career in the security field with an opportunity to work alongside the biggest names in sports & entertainment? We offer part time or full-time opportunities with a ...
Provide professional guidance regarding software applications for physical and electronic security, CCTV, and related areas for the Institution. * Assist with the following on behalf of the ...
The SAI360 software application is a GRC application offering a wide range of GRC functional capabilities for risk management, internal audit, internal control, information security and regulatory ...
Planning and implementing security designs for National Special Security Events. This is no ordinary job, and our special agents are no ordinary individuals. Show us you have the talent and ...
Integrate security controls, including static/dynamic analysis and container scanning. * Collaborate with development and QA teams to ensure quality data solutions. * Work closely with IT security to ...
Develop and enforce network security policies and procedures to protect against unauthorized access, data breaches, and other security threats. * Ensure compliance with industry standards and ...
Oversee the administration and operation of legal applications, ensuring high availability, reliability, and security. * Manage and configure legal applications (e.g., Intapp Intake, Intapp Terms ...
Oversee the design, development, and deployment of APIs, ensuring scalability, security, and performance. * Cross-Functional Collaboration: Work closely with product, engineering, and marketing teams ...
Develop, implement, and execute the annual audit plans that include cloud, cyber security, DevOps and information security. * Achieve consistent, coordinated, coverage of IT and IS related risks and ...
CHLP provides assistance in a number of areas including, but not limited to, landlord-tenant matters, foreclosures, Social Security Disability Insurance, Supplemental Security Income, Medicaid ...
Work closely with security and risk leaders to foresee and mitigate risks, ensuring ethical AI usage and compliance * Gain an understanding of and contribute to LLM operations, focusing on the ...
Solution Architect in New York, NY or Atlanta, GA Relevant Experience (in Yrs) 12 Must Have Technical/Functional Skills • Expertise in Investment management Domain • Security Master (Identifier ...
The ideal candidate will have a strong background in financial technology, networking, data centers, cyber security and have a proven ability to foster innovation and cross department collaboration ...
You deeply understand the security and performance designs for a system with a large user base hitting both an API and web front end. You have a framework mindset: you are passionate about making an ...
Manage and Support desktop & laptop deployments and regular security updates via deployment tools and ensure prior testing is completed. * Undertake user creation and termination tasks in Active ...
We are looking for someone with deep experience migrating on prem (on premises) data centers to Azure along with strong skills in Networking, Architectural Design, Security, and SQL. In this role ...
A leading utility provider seeks an experienced Systems Administrator with a strong background in system administration, cyber security, and technical support. The ideal candidate is a proactive ...
We are especially focused on security with SSO, PIM and conditional access methodologies a must. BUT we also work with clients that use Apple Macs and work with Gsuite and need a strong centralized ...
Collaborate with security stakeholders to gather requirements and identify opportunities for automation. * Analyze requirements and translate them into technical specifications for automation ...