- Lilly (IN)
- …our Identity and Access Management strategy. **What You'll Be Doing:** This SecOps Engineer will be part of the Lilly Cybersecurity team, responsible for ... the world of cybersecurity? We're looking for a Security Engineer to bring fresh perspectives and bold solutions to...technology that supports the Lilly mission, specifically focused on identity and access management. In this role, you will… more
- Kratos Defense & Security Solutions, Inc. (Colorado Springs, CO)
- …Security Groups, and Network ACLs + Expertise in AWS security best practices, identity and access management (IAM), encryption , security groups, and network ... and global customers. Kratos is seeking a Senior Cloud Engineer to perform functions such as design, analysis, evaluation,...ACLs. Knowledge of AWS Identity and Access Management (IAM) roles and policies. +… more
- AssistRx (Orlando, FL)
- We are seeking an experienced and highly skilled Infrastructure Engineer to join our growing IT team. The ideal candidate will have extensive experience in Linux ... systems are operable, highly available, secure, and scalable. As an Infrastructure Engineer Level II, you will work closely with cross-functional teams to support… more
- Google (New York, NY)
- …management, firewalls, zero trust, secrets management, disaster recovery and continuity, SecOps , Data Loss Prevention (DLP), or encryption . + Experience ... in a customer-facing or support role. + Experience with Cloud Identity and Access Management, Network Security, Data Security, Regulatory Compliance frameworks,… more
- Citigroup (Irving, TX)
- …Response team. You will be assigned to Citi's Vulnerability Assessments and Cloud SecOps team and will collaborate closely with a talented cadre of cloud security ... routing, firewall functionality, host and network intrusion detection/prevention systems, encryption , load balancing, and other network protocols + Must have… more
- SHI (Los Angeles, CA)
- …but not limited to: HSM; PKI; CA; DLP; NG-DLP; Classification; DSPM; Encryption Methods and approaches. Cloud native controls supporting above (AWS, AZURE, Google), ... address customer risk exposure within the following core pillars: + Identity Management; Data Security; Application Security; Data Center/Cloud; Threat and… more