- Baylor Scott & White Health (Trenton, NJ)
- **Job Summary** As the Manager of Vulnerability Management you will paly a key role in the success of the vulnerability and configuration management ... managed service provider that performs the day-to-day functions of the vulnerability and configuration management program . **Responsibilities:** + Provide… more
- BAE Systems (Mount Laurel, NJ)
- … for more complex efforts or area + Translate operational requirements into technical requirements and architectures needed to meet program objectives + Employ ... safeguards, and operational security measures. + Translate operational requirements into technical requirements and architectures needed to meet program … more
- Rubrik (Trenton, NJ)
- …Product Certification and Compliance Team is looking for a success-driven, US-based Program Manager to organize, plan, and execute on continuous monitoring ... excellent leadership, communication, decision-making, and collaboration skills. **What you'll be doing:** ** Program / Development** + Program Manager /… more
- Comcast (Mount Laurel, NJ)
- …daily and overall work processes and practical implementation of cyber engineering and technical standards within one or more assigned areas of the Cyber Security. ... Monitors assigned areas of Cyber Operations to ensure technical adherence to industry and company standards. Ensures all work processes are efficient and consistent… more
- Comcast (Philadelphia, PA)
- …100 miles from the office for the remote option.) **Job Summary** The Manager of Security Intelligence reports to the Director of Digital Forensic Investigations, ... responding to all cyber threats impacting the enterprise. In this role, the Manager of Security Intelligence will lead a team of analysts dedicated to identifying,… more
- PwC IT Services Co. (Philadelphia, PA)
- …Applicable **Specialism** IFS - Internal Firm Services - Other **Management Level** Manager **Job Description & Summary** At PwC, our people in cybersecurity focus ... escalating where appropriate. + Uphold and reinforce professional and technical standards (eg refer to specific PwC tax and...laws. We offer a comprehensive, flexible and competitive benefits program . It provides access to programs that can be… more
- Old Dominion Freight Line (Pennsauken, NJ)
- …lead the development of cybersecurity strategies, provide expert guidance on technical security solutions, and ensure the effective implementation of security ... mitigate risks across the enterprise. This position requires a high level of technical expertise, strategic thinking, and the ability to collaborate across teams to… more
- PagerDuty (Trenton, NJ)
- …team! As a Senior Security Engineer, you will be a key technical leader driving security initiatives across PagerDuty's SaaS offerings, with deep expertise ... and implement security automations and tool integrations + Develop automated vulnerability management workflows to drive timely remediation + Implement automated… more
- TD Bank (Mount Laurel, NJ)
- …mainframe, eCommerce, and other third-party distributed applications security intrusion and vulnerability testing as well as due diligence of vendor information ... up to ensure security of new systems + Plans ongoing intrusion and vulnerability testing + Reviews logs and reports, analyzing results to determine vulnerabilities +… more
- TD Bank (Mount Laurel, NJ)
- …security patching for all endpoint devices, ensuring timely updates and vulnerability remediation. + Implement and maintain secure remote access solutions, including ... teams, and business units. **Depth & Scope:** + Leads Technical solutions at the Product Group level + Deep...have regular career, development, and performance conversations with your manager , as well as access to an online learning… more
- PagerDuty (Trenton, NJ)
- …cute animal memes. **KEY RESPONSIBILITIES** + Embrace the role of hands-on technical lead in defining product security standards and guiding platform protections. + ... preferably AWS. + Familiarity with cloud-native product technologies including: + Vulnerability detection via multiple approaches including SAST, DAST, SCA, and… more