- L3Harris (Greenville, TX)
- Job Title: Manager , Cyber Intelligence - Information Systems Security Manager (ISSM) Job Code: 18031 Job Location: Greenville, Texas - ... Description: L3Harris Greenville, Texas, is seeking a program specific Information System Security Manager (ISSM) in support...the customer. This ISSM reports to the Director of Cyber Intelligence for the site. + Develop… more
- Lockheed Martin (Grand Prairie, TX)
- **Description:** You will be the Cyber R&D Program Manager for Lockheed Martin Missiles and Fire Control \(LMMFC\) Advanced Programs \(AP\)\. Our team is ... sophisticated threats\. **What You Will Be Doing** As the Cyber R&D Program Manager , you will be...Ability to obtain a Top Secret / Special Compartmented Information \(TS/SCI\) security clearance\. * Lead complex research &… more
- Synchrony (Dallas, TX)
- …Synchrony threat hunt capabilities. Through collaboration with JSOC leaders, Technical Cyber Intelligence , and other cross-functional teams, this individual will ... cyber threat hunters in designing and executing complex, intelligence -driven, hypothesis-based threat hunts, overseeing all phases from hypothesis drafting… more
- Deloitte (Dallas, TX)
- …Qualifications and Experience Required: + Bachelor's degree in Computer Science, Cyber Security, Information Security, Engineering, or Information ... risks and opportunities-from strategic, reputation, and financial risks to operational, cyber , and regulatory risks-to gain competitive advantage. We apply our… more
- Prime Healthcare (Dallas, TX)
- …such as Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Certified Security Compliance Specialist (CSCS), ... national origin, age (subject to applicable law), disability, military status, genetic information or any other basis protected by applicable federal, state, or… more
- Proofpoint (Dallas, TX)
- …passion and customer focus to the business._ **Corporate Overview** In today's cyber threat landscape, protection starts with people. At Proofpoint, that simple ... Role** We're looking for a strong, talented, result-driven Senior Product Marketing Manager to join the Proofpoint Email Security Product Marketing team. Our team… more
- Amazon (Dallas, TX)
- …areas: threat intelligence , security engineering, data mining, information security, security operations/incident response, cyber -crime investigations or ... Role: We are seeking a highly experienced and strategic Principal Technical Program Manager to lead our Security Operations initiatives, with a primary focus on… more
- JPMorgan Chase (Plano, TX)
- …- such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or those offered by Offensive Security ... propelling continuous improvement. As an Assessments & Exercises Vice President in the Cyber and Tech Controls line of business, you will contribute significantly to… more
- KPMG (Dallas, TX)
- …future as we are, join our team. KPMG is currently seeking a Cyber Operations Content Development & Engineering to join our Enterprise Security Services ... a remote work opportunity. Responsibilities: + Apply a thorough understanding of cyber security operations and monitoring to manage and perform the day-to-day… more
- Concentrix (Dallas, TX)
- …Concentrix. A new breed of tech company - Human-centered. Tech-powered. Intelligence -fueled. We create game-changing solutions across the enterprise, that help ... JIRA + FIT + Product Management Lifecycle + Product Engineering, Product Owner/ Manager +Financial Tracking - through ad hoc Excel (can maintain complex spreadsheets)… more
- Deloitte (Dallas, TX)
- … Governance Professional (AIGP), Certified International Privacy Professional (CIPP), Certified Information Privacy Manager (CIPM), Certified Information ... and manage confidentiality and privacy initiatives designed to safeguard confidential information and protect Deloitte's brand and reputation. Recruiting for this… more
- Deloitte (Dallas, TX)
- …project delivery, quality management, technology risk, privacy, confidentiality, or cyber security strongly preferred. Information for applicants with ... do + Evaluate Confidentiality & Privacy Impact Assessments (CPIA): review information for completeness and accuracy. Identify items for follow-up, update system… more