- RGP (San Francisco, CA)
- …etc. ); Cybersecurity risk management strategy expertise; Identity and access management ; Cyber defense lead practices; AI solution security and ... must demonstrate a high level of executive presence and well-developed project management skills, in addition to the ability to deliver sustainable and profitable… more
- NY CREATES (Albany, NY)
- …innovation and commercialization. Job Description: Job Description for Associate Director of Identity and Access Management JOB SUMMARY The Associate ... Director of Identity and Access Management is the authoritative architect and...from an accredited institution; master's degree preferred. Equivalent Microsoft Identity MVP or military cyber identity… more
- National Renewable Energy Laboratory (Golden, CO)
- …career and well-being. **Job Description** NLR is seeking a mid-career Adversarial Cyber Researcher to join its Cybersecurity Research Center (CRC). The CRC conducts ... experimentation, hardware and software assurance, supply chain integrity, and cyber -physical resilience testing. Working across NLR's energy, grid, and systems… more
- AeroVironment (Manassas, VA)
- …800-171, and CMMC + Support implementation of CMMC Level 3 efforts + Support Cyber team's efforts towards vulnerability management , triaging alerts, and cyber ... **Worker Type** Regular **Job Description** **_Summary_** The Cyber Security Analyst II is a crucial junior to mid-level contributor that is required to operate with… more
- COLSA Corporation (Shalimar, FL)
- …Description: The team is searching for a penetration tester to support the 48th Cyber Space Test Squadron, the United States Air Force, and the United States Space ... hands on testing, self-paced learning, and program and project management by working directly with experienced team members with...GCIH, GPEN, and/or GWAP. If you have a technical cyber -background and want to learn more about penetration and… more
- Post Holdings Inc. (St. Louis, MO)
- …position, we need an individual with a technical understanding of networking, identity management , host security and operating systems. The individual should ... difference. **Responsibilities** The Post Holdings IT team is seeking a cyber security professional with demonstrated network, platform and application layer… more
- National Renewable Energy Laboratory (Golden, CO)
- …and associated MySQL work. + Experience using Ansible for automation and configuration management + General knowledge of cyber security best practices to ... define and scope and coordinate needs working closely with Cyber Security and other ITS groups to ensure compliance...based on these requirements + Handle network connectivity and access configuration requests such as VPN by engaging ITS… more
- AeroVironment (Simi Valley, CA)
- …changes to high-level requirements + Anticipates bottlenecks and provides escalation management + Analyzes end-to-end, moderate to high complexity business processes ... and creating presentations and reports for the board, executive management , and other groups + Other duties as assigned...with Microsoft Office applications including Word, Visio, Excel, Project, Access , and PowerPoint + Able to excel in a… more
- AeroVironment (Simi Valley, CA)
- **Worker Type** Regular **Job Description** **Summary** The **Data Management (DM) Analyst I** works with a cross-functional team to create/write, review, analyze, ... education/training, and key skills. **ITAR Requirement:** _T_ _his position requires access to information that is subject to compliance with the International… more
- PSEG Long Island (Bethpage, NY)
- …single sign on (SSO), multi-factor authentication (MFA), data loss prevention (DLP) and identity and access management (IAM). + Knowledge of Endpoints, ... are regularly scheduled to work 20 or more hours per week, you will have access to a wide range of comprehensive benefits eligible the first of the month coincident… more
- COLSA Corporation (Colorado Springs, CO)
- …Principal Duties and Responsibilities (*Essential Functions): + Applies knowledge of Cyber policy, procedures, and workforce structure to develop, implement, and ... maintain a cyber -secure environment + Supports, monitors, tests, and troubleshoots hardware...information and resources + Senior level experience with Risk Management Framework (RMF) techniques, policies, and procedures + Identifies… more
- AeroVironment (Albuquerque, NM)
- …Senior Director, Contracts is responsible for managing and leading the contract management and oversight process of major Federal, State and commercial contracts ... the partner to the Business leader. + Perform contract management and administrative duties throughout the contract lifecycle including,...and building highly effective teams + Qualified to have access to data and technology that is subject to… more
- Tyto Athene (Colorado Springs, CO)
- …of relevant experience in assigned position/function + Relevant STEM, Computer Science, Cyber , IT, or Management bachelor's degree associated with assigned ... is organized in two core functions, software assessment and Risk Management Framework/environment assessment. Embracing the tenants of DevSecOps, this Cybersecurity… more
- HSBC (New York, NY)
- …across the bank. This senior role reports directly into the Global Head of Cyber Technology & Engineering. As our Global Head of Cryptographic Services you will: + ... risk mitigation and operational needs + Empower HSBC to successfully navigate cyber risk with innovative, responsive and frictionless technologies and services, both… more
- AeroVironment (Simi Valley, CA)
- …a blend of technical expertise, problem-solving skills, and project management capabilities to drive continuous improvement initiatives across the organization. ... improvements. Experience with Digital Twin Simulation software for modeling, scenario management , and optimization of factory processes. + Develop and execute the… more
- Swagelok (Solon, OH)
- …(DLP); Antivirus, Anti-malware and Zero Day protections; Security Information and Event Management (SIEM); Identify and Access Management and Privileged ... the enterprise including legislative/regulatory compliance issues in the areas of cyber security, technology, IT operations, and data. Additionally, the IT Security… more
- American Tower (Cary, NC)
- …protection of distributed networks and remote users. + Implement and optimize centralized identity and access management systems, ensuring secure access ... , security monitoring, and risk-based alerting experience highly desired. + Proven cyber security experience with Identity , Firewall, Cloud, and SIEM tools… more
- AeroVironment (Simi Valley, CA)
- …AV's processes. Assesses program risk and opportunities and establishes risk management plans + Makes sound/data-driven decisions to ensure program cost, schedule ... experience with a Master's degree + Experienced in advanced Project Management concepts and interfacing directly with customers + Experienced managing projects… more
- HP Inc. (Spring, TX)
- …defenses and countermeasures, including identity and persona validation, data management , access controls, threat and malware detection and monitoring. * ... data, e-commerce and web-based systems. Administers policies to control physical/virtual access to systems. Performs tests to ensure policy compliance; responds to… more
- AeroVironment (Huntsville, AL)
- …and industry developed tools and practices. Ensure good configuration control and management of software + Assists in writing of system requirements, system test ... develop software and scoping the depth of the development with project/program management to fit timeline and budget constraints + Effectively provides development… more