- HealthEdge Software Inc (Trenton, NJ)
- **Overview** **Position Overview:** AstheTechnical Program Manager for Vulnerability Management, you willbe responsible foroverseeing and coordinating the ... performance indicators (KPIs) and metrics to measure the effectiveness ofour program . Compliance and Regulatory Adherence: + Ensure compliance with healthcare… more
- TD Bank (Mount Laurel, NJ)
- …risk disciplines and practices **Preferred Qualifications:** + Function as a technical expert for vulnerability scanning, prioritization, and remediation ... Description:** **Department Overview:** We are looking for someone experienced in vulnerability management practices to develop and implement technology controls and… more
- Deloitte (Philadelphia, PA)
- ServiceNow Cyber Security - Manager In this role, you will be responsible for designing and implementing ServiceNow security solutions while ensuring alignment with ... security solutions focusing on Security Operations, Integrated Risk Management, and Vulnerability Response + Collaborate with sales teams to develop practical… more
- Comcast (Mount Laurel, NJ)
- …daily and overall work processes and practical implementation of cyber engineering and technical standards within one or more assigned areas of the Cyber Security. ... Monitors assigned areas of Cyber Operations to ensure technical adherence to industry and company standards. Ensures all work processes are efficient and consistent… more
- JPMorgan Chase (Wilmington, DE)
- …impact by delivering high-quality products that resonate with clients. As a Product Manager in Cybersecurity and Technology Controls, you are an integral part of the ... customer expectations. We are seeking a highly skilled and experienced Product Manager to join our Cyber Technology Control Management (TCM) product team. This… more
- GovCIO (Trenton, NJ)
- **Overview** GovCIO is currently hiring a Cyber Security Manager to support our newly awarded customer contract. This position will be fully remote within the United ... Assesses and mitigates system security threats and risks throughout the program life cycle. Validates system security requirements definition and analysis.… more
- Rubrik (Trenton, NJ)
- …through conflict or addressing ambiguity. + Solid delivery skills as a project / program manager , handling concurrent initiatives. + Pragmatic use of PMBOK / ... order to securely protect Rubrik information. Rubrik is seeking a ninja-skilled Project Manager to organize, plan, schedule, and deliver on our dynamic portfolio of … more
- L3Harris (Camden, NJ)
- …continuous improvement activities within the system engineering domain and applications given program needs. + Experience in managing technical programs and ... Job Title: Manager , Systems Engineering Job Code: 19148 Job Location:...and Integration and Test (I&T). The role facilitates the technical success of the product, from an overall systems… more
- Grant Thornton (Philadelphia, PA)
- …you will have the opportunity to collaborate with our clients and deliver technical cybersecurity consulting and advisory services across a broad spectrum of areas, ... data protection, security engineering, and incident response readiness activities. The Manager role offers an excellent opportunity to leverage and display your… more
- GovCIO (Trenton, NJ)
- **Overview** GovCIO is currently hiring for an Service Delivery Manager to support complex operations for systems by ensuring data quality, operational readiness, ... with cybersecurity and privacy requirements. This position demands strategic oversight, technical expertise, and the ability to collaborate across teams to achieve… more
- PPL Corporation (Allentown, PA)
- …knowledge base on asset protection measures and the conduct of vulnerability /risk assessments to determine security risks, vulnerabilities and safety concerns and ... company managers. + Incumbent must also have sufficient knowledge to provide technical support in the design, installation, and oversight of various electronic… more
- Noblis (Philadelphia, PA)
- …the Government to resolve conflicting system security engineering requirements. + Develop program technical publications such as Systems Engineering Plans (SEP), ... Systems Security Engineering (ISSE) individual to assist the Information Systems Security Manager (ISSM) with NSWCPD ashore and afloat systems network server duties.… more
- EPAM Systems (Conshohocken, PA)
- …as code (IaC) using tools like Terraform, Ansible, or OCI Resource Manager to automate cloud provisioning and configuration management + Deploy infrastructure using ... enclaves, and troubleshoot any deployment errors + Diagnose and resolve complex technical issues related to OCI services, ensuring minimal downtime and disruption +… more
- TD Bank (Mount Laurel, NJ)
- …across the Enterprise Protect organization. Reporting to the Risk Reporting Senior Manager for the Enterprise Protect Risk Factory (EPRF), the candidate will be ... needs; ensures alignment of metrics across the organization. This role acts a technical working lead / resource to others. This role works closely with senior… more
- TD Bank (Mount Laurel, NJ)
- …for this role. **Line of Business:** Technology Solutions **Job Description:** The Manager Information Security manages / leads a team of Technology Controls / ... business line/segment or transformational (change the bank) strategic initiative / program , liaising across the organization and primarily interfacing with executive… more
- Lockheed Martin (King Of Prussia, PA)
- …commercial use\. The Classified Cybersecurity will partner with the security team, program , and government customers to perform as an Information Systems Security ... system security operations including hardware and software implementations\. \- Carry out technical administration of IS in accordance with internal LM and customer… more
- Lockheed Martin (King Of Prussia, PA)
- …will support military Space Programs\. This position receives day\-to\-day operations guidance from program staff and will report to the FBM IS Classified IT Ops ... Manager \. Responsibilities include: * Perform successful root cause analysis...* Knowledge with Active Directory \(AD\) * Knowledge of vulnerability remediation and security management \(system hardening, log management,… more