Are you a business? Hire Security candidates in Peggy
The role is targeted at maintaining and enhancing the cybersecurity infrastructure with a specific concentration on Operational Technology (OT) to safeguard the integrity, confidentiality, and accessibility of company's data and resources. Operate and maintain cybersecurity technology, with a spe...
We are looking for an Information Security Analyst to join our Cyber Security organization within the Cyber Resiliency group. ...
Degrees in Information Technology, Information Systems, Information Security, Networking (Systems Administration), Information Assurance, or Cybersecurity may be considered relevant if the programs contain, at minimum, a concentration of courses in the following foundational CS areas: algorithms;...
STEM TLs drive technical decisions, architectural design discussions, and systems integration within the context of their technical specialties coming from a full spectrum of backgrounds such as software development; systems engineering; architecture; electrical engineering; cryptography and cybe...
Backgrounds such as Cybersecurity, SIGINT, hybrid-cloud, machine learning (ML), artificial intelligence (AI), integrated network architecture, information technology infrastructure and hybrid-communications all have a place in the spectrum of implementations ranging from commercial/government off...
As an established Software Engineer, NSA has opportunity for you to contribute, learn, and grow in virtually any Computer Science focus area, including: Cybersecurity, High Performance Computing (HPC), Quantum Computing Research, Data Analytics, Machine Learning/Artificial Intelligence (ML/AI), C...
NSA has career opportunities in the following fields: science, cybersecurity, education and training, engineering and physical sciences, inspection, investigation and compliance, security and law enforcement, Intelligence analysis, intelligence collection, language analysis, installation and logi...
Computer Systems Architects at NSA use commercial and government developed hardware, software, networking, and security products to: - drive information technology projects - produce compliance results for established project requirements and IT architecture - modernize IT architecture through an...
Job Title: General Manager (Security Installation Company) Overview: We are seeking a dynamic and experienced leader to serve as the General Manager of our security install...
Employers want to know
Do you have experience as a Security?
We are looking for a Security Automation Developer to join our security team. Your mission will be to automate security operations and develop tools to enrich and automate security events. We're looking for someone with a cybersecurity foundation and hands-on experience with automation technologi...
HR About us: Security Industry Specialists, Inc. SIS) provides security solutions to some of the most recognized companies and brands in the world. Health, Dental, Vision, and 401k for eligible employees • Paid Time Off including Sick/Safe Time • A dynamic and challenging work environment with op...
MsoNoSpacing">Job Title: CyberArk Security Engineer Location: 100% onsite (Houston, Texas) Duration: 6 months <p style=&qu...
Knowledge of State Juvenile Detention Standards; understanding of adolescent behavior and facility security. ...
As a Senior Security Engineer at NTT, you will be responsible for designing, implementing, and managing security solutions to safeguard the network, applications, and digital assets of our client. Incident Response - Monitor security events, investigate and respond to security incidents, and a...
Understand and document customers' compliance and security requirements and come up with end-to-end solutions based on Qualys TruRisk Platform security solutions and partner integrations. Constantly learn and stay on top of the latest developments in the Qualys portfolio and in the larger securit...
Attempt to resolve network and security related problem by following the guidance provided. Troubleshooting of reported problems that are within the scope around the Network and Security Infrastructure. Strong understanding of Network Security and related Technologies. Knowledge of application an...
The Principal Information Security Architect – Enterprise Technology serves as the most senior security architect and advanced technology analyst in the company. Information Security Architect with deep understanding of domains of security (e. The Open Group Architecture Framework Certification (...
Security Certifications (Certified Cloud Security Professional (CCSP), Certificate of Cloud Security Knowledge (CCSK), AWS Certified Security-Specialty, GIAC Cloud Security Automation (GCSA), CompTIA Cloud+, or AWS Solutions Architect. Cloud Security Engineers plan, implement, upgrade, or monitor...
Adhering to high-quality standards and best practices, high performance, and scalable, repeatable processes and deliverables in accordance with applicable regulations Analyze, troubleshoot, and investigate network security-related incident based on security platform reporting, network traffic, lo...
As the Information Security Governance Specialist, you will utilize your wide area of expertise in risk management, cybersecurity, vulnerability management, information security governance, incident management, security frameworks and other areas to provide security compliance oversight for the H...
Security Solutions of Texas – Bureau License #C10520501 Security Solutions of Texas is hiring for a Full Time Position in the East DFW Region. Level IV with III is commensurate with experience ( Position is 1099 Contractor ) Security Solutions of Texas and Pryme Sec...
Job Title: Privileged Access Security Engineer- CyberArk Location: 100% onsite -Houston, Texas 77064 Duration: 6 months Must Have: CyberArk Looking...
Duties Include: Provide daily on-site support oversight of CST operations to ensure compliance with established Construction Security Plans Conduct periodic security and quality inspections for the duration of the project to ensure compliance with construction design and security standards. Coord...