Apply a strong understanding of security protocols, cryptography, authentication, authorization and security. Authorization and security within the context of cybersecurity. Consultant level (multiple openings) in Foster City, CA to:. Design, build, test and implement security systems with VISA's IT...
A company is looking for an OCM Security Consultant. ...
Apply a strong understanding of security protocols, cryptography, authentication, authorization and security. Authorization and security within the context of cybersecurity. Consultant level (multiple openings) in Foster City, CA to:. Design, build, test and implement security systems with VISA's IT...
A company is looking for a Security Consultant (vCISO) for a remote full-time cyber role. ...
Apply a strong understanding of security protocols, cryptography, authentication, authorization and security. Authorization and security within the context of cybersecurity. Cyber Security Engineer – Sr. Cyber Security Engineer – Sr. ...
A company is looking for a Senior Cybersecurity Specialist - Cybersecurity Regulatory Assessment. ...
Web Application Security Security Design Review Threat Modeling. We are looking for a highly-skilled Security professional with a good aptitude for Threat Modeling, ability to read through (software) architectural documents and requirements from the different business groups and give accurate and ac...
Brosnan Risk Consultants provides exceptional security services nationwide. Many of our employees began their careers as Security Officers, and today we are proud to say they have become a part of the Senior Leadership Team (SLT). Notify supervisors and on-site staff of any irregularities, suspiciou...
Brosnan Risk Consultants provides exceptional security services nationwide. Here at Brosnan Risk Consultants, our culture encourages and supports diversity throughout the workplace! We offer both full-time and part-time opportunities. Many of our employees began their careers as Security Officers, a...
Web Application Security Security Design Review Threat Modeling. We are looking for a highly-skilled Security professional with a good aptitude for Threat Modeling, ability to read through (software) architectural documents and requirements from the different business groups and give accurate and ac...
We are looking for a highly-skilled Security professional with a good aptitude for Threat Modeling, ability to read through (software) architectural documents and requirements from the different business groups and give accurate and actionable recommendations for the engineers to implement. The Cons...
The Cloud Security Team comprises security professionals who oversee the security aspects of an organization's cloud assets. As part of their role, they also suggest security solutions and work with other cybersecurity teams to enhance the security of cloud assets. The successful incumbent will be p...
Apply a strong understanding of security protocols, cryptography, authentication, authorization and security. Authorization and security within the context of cybersecurity. Cyber Security Engineer – Sr. Consultant level (multiple openings) in Foster City, CA to:. ...
As a domain consultant for network security transformation, you provide technical expertise and guidance in customers' network security and zero trust journey. You evangelize our industry leadership in on-prem, cloud, and security services that establish Palo Alto Networks as a customer’s cybersecur...
They will collaborate with development, operations, and security teams to ensure seamless integration and deployment of enterprise-wide eQube PaaS containerized solutions. Collaborate with development, operations, and security teams. Ensure security best practices are followed in containerized envir...
A company is looking for a Project Manager, Security Products to manage client-facing projects for remote implementations of security products. ...
A company is looking for a Build Practice Engineer....
Key Responsibilities:Support audit and compliance efforts related to SOC 2, HIPAA, ISO 27001, and other relevant regulationsManage and optimize Identity and Access Management (IAM) processesDevelop and maintain automation scripts and tools to enhance security operations efficiencyRequired Qualificat...
Key Responsibilities:Maintain compliance with government security policies and proceduresTrain employees on security protocols and ensure adherence to regulationsManage security clearance processing and collaborate with Contracts Department for complianceRequired Qualifications:Bachelor's degree or ...
A company is looking for an Incident Response Security Consultant. ...
A company is looking for a Sr Information Security Analyst to perform security assessments and ensure compliance with various regulations. ...
A company is looking for a SAP Security Services Architect. ...
A company is looking for an Information Assurance Security Analyst. ...
A company is looking for a Senior Security Operations Engineer specializing in Incident Response and Insider Threat. ...