- Grant Thornton (Dallas, TX)
- As a Cyber Privacy & Data Protection Senior Associate, you will get the opportunity to grow and contribute to our clients' business needs by applying a ... client requests, and communicating conflicts and risks + Deep understanding of global privacy and data protection regulations, such as EU's GDPR, and US laws… more
- Grant Thornton (Dallas, TX)
- Grant Thornton is seeking a Cyber Privacy and Data Protection Manager to join our team in Bellevue, WA. Additional approved locations include: Atlanta, ... San Francisco, CA and San Jose, CA. Grant Thornton's Privacy and Data Protection team...you'll be empowered by the greater Risk team and Cyber team to help clients make the moves that… more
- Robert Half (Dallas, TX)
- …and take necessary corrective steps in real-life situations. Additionally, this team offers data privacy and protection services to safeguard personal ... : Helps organizations prevent theft or help protect sensitive data and assets. The Security and Privacy ...of security-related topics such as authentication, entitlements, identity management, data protection , data leakage prevention,… more
- Deloitte (Dallas, TX)
- …while adhering to all the firm's policies and procedures for security and privacy . The role is accountable for safeguarding applications and data residing ... all endpoint devices by ensuring the fleet is in full compliance with internal cyber security policies as part of laptop imaging. This includes ensuring laptops are… more
- RTX Corporation (Richardson, TX)
- …our nation and our products. We are seeking a Principal Systems Security / Cyber Engineer to function as a key contributor for the Integrated Strategic Solutions ... Certification and Supply Chain Risk Management (SCRM) to support Program Protection Implementation across major program(s). Position Location - Richardson, TX **What… more
- Insight Global (Addison, TX)
- …Automation in order to further the robustness of our clients environment against cyber attacks. This person will be a part of a cryptography-focused team ensuring ... comes to cryptographic activity. Individuals in this role contribute to the protection of system boundaries, keeping computer systems and network devices hardened… more