Senior Lead Software Engineer, Full Stack (Enterprise Platforms Technology). We are seeking Full Stack Software Engineers passionate about building world-class platforms that leverage emerging technol...
read moreThis opportunity is to work as a Senior Front-End Engineer within Audible's engineering team. This opportunity is for a Senior Front End Software Engineer for Audible’s Consumer Domains group. We are ...
read moreNew York, NY: $211,000 - $240,800 for Manager, Lead Software Engineer; $211,000 - $240,800 for Lead Software Engineer. Lead Software Engineer, DevOps. As a DevOps Engineer, you’ll have the opportunity...
read moreThis opportunity is to work as a Senior Front-End Engineer within Audible's engineering team. As a Senior Front-End Software Engineer, you will. Constantly strive to raise the bar on engineering excel...
read moreThe Distinguished Engineer for Network Security is responsible for leading technology driven outcomes for the Information Security organization and the Enterprise. Distinguished Engineer - Network Sec...
read moreSystems Security Engineer - Vulnerability management. We are seeking a highly skilled Systems Security Engineer with at least 10 years of experience in vulnerability management, particularly within Mi...
read moreThis opportunity is to work as a Senior Front-End Engineer within Audible's engineering team. This opportunity is for a Senior Front End Software Engineer for Audible’s Consumer Domains group. We are ...
read moreThis opportunity is to work as a Senior Front-End Engineer within Audible's engineering team. This opportunity is for a Senior Front End Software Engineer for Audible’s Consumer Domains group. We are ...
read moreMcLean, VA: $158,600 - $181,000 for Principal Associate Senior Software Engineer; $158,600 - $181,000 for Senior Software Engineer. New York, NY: $173,000 - $197,400 for Principal Associate Senior Sof...
read moreUnderstand the customer environment, requirements, and security roadmap to implement the appropriate security solution. Configure, implement, and maintain Security Operating Platform. You work with th...
read moreUtilize security tools to detect and resolve vulnerabilities in cloud systems, including Ankor, Tenable, and Checkpoint Software. Strong experience in cloud security, including working with cloud infr...
read moreUnderstand the customer environment, requirements, and security roadmap to implement the appropriate security solution. You'll act as the technical partner, providing strategic guidance around complex...
read moreStrong experience in cloud security, including working with cloud infrastructure security tools. Utilize security tools to detect and resolve vulnerabilities in cloud systems, including Ankor, Tenable...
read moreSenior Systems Programmer to lead integration and configuration of Access Control, CCTV, Intrusion, Intercom and Low Voltage Security systems in the N NJ/NYC region! . Genetec Security Center, CCURE 9...
read moreExperienced in overseeing the design, development, implementation, and maintenance of multiple security systems (such as access control and CCTV systems) and have a deep understanding of the overarchi...
read moreSystems Engineer for Access Control and CCTV systems on an embedded contract in Queens, NYC. Troubleshoot, monitor, program Access Control, CCTV, Card Reader, Alarm, Security and Low Voltage systems. ...
read moreSystems Engineer for Access Control and CCTV systems on an embedded contract in Queens, NYC. Troubleshoot, monitor, program Access Control, CCTV, Card Reader, Alarm, Security and Low Voltage systems. ...
read moreAs a Cyber Systems Security Engineer Staff, you will lead the technical aspects across BLQ-10 systems, focusing on enhancing cybersecurity through modern solutions. Educate program engineers on implem...
read moreAs a Cyber Systems Security Engineer Sr, you will support the integration of modern cybersecurity solutions across multiple Owego programs. Familiarity with security architecture design, security audi...
read moreAs a Cyber Systems Security Engineer Sr, you will support the integration of modern cybersecurity solutions across multiple Owego programs. Familiarity with security architecture design, security audi...
read moreDesign, implement, and optimize FW code for wireless communication systems on JMA HW/FW platforms with emphasis on Embedded System Security principles and techniques, security by design and OS hardeni...
read moreDesign, implement, and optimize FW code for wireless communication systems on JMA HW/FW platforms with emphasis on Embedded System Security principles and techniques, security by design and OS hardeni...
read moreApplies current Systems Security Engineering methods, practices, and technologies to the architecture, design, development, evaluation, and integration of systems and networks to maintain system secur...
read moreApplies current Systems Security Engineering methods, practices, and technologies to the architecture, design, development, evaluation, and integration of systems and networks to maintain system secur...
read moreApplies current Systems Security Engineering methods, practices, and technologies to the architecture, design, development, evaluation, and integration of systems and networks to maintain system secur...
read moreApplies current Systems Security Engineering methods, practices, and technologies to the architecture, design, development, evaluation, and integration of systems and networks to maintain system secur...
read moreOur Need: Creative and innovative engineers with prior systems, hardware, or software engineering experience with the potential to outthink world class reverse engineers. In a modern approach to “Spy ...
read moreOur Need: Creative and innovative engineers with prior systems, hardware, or software engineering experience with the potential to outthink world class reverse engineers. Our Systems Engineers do a lo...
read moreKnowledge and understanding of security engineering, system and network security, authentication and security protocols, incident management. Knowledge of various Security domains, Compliance requirem...
read moreKnowledge and understanding of security engineering, system and network security, authentication and security protocols, incident management. Create and maintain technical process documentation (proce...
read moreCyber Security knowledge: Security monitoring, MITRE attack vectors, SIEM, secret management, DLP, encryption concepts, etc. Azure security services / applications: (Log Analytics, Sentinel, Defender)...
read moreCyber Security knowledge: Security monitoring, MITRE attack vectors, SIEM, secret management, DLP, encryption concepts, etc. Azure security services / applications: (Log Analytics, Sentinel, Defender)...
read moreYou shall focus on the systems engineering/cyber security engineering related tasks. Cyber Security InfoSec Engineer. Provide system security engineering expertise.
You shall focus on the systems engineering/cyber security engineering related tasks. Cyber Security InfoSec Engineer. Provide system security engineering expertise.
You shall focus on the systems engineering/cyber security engineering related tasks. Cyber Security InfoSec Engineer. Provide system security engineering expertise.
You shall focus on the systems engineering/cyber security engineering related tasks. Provide system security engineering expertise. Cyber Security InfoSec Engineer.
Cyber Security Engineer/Architect. Lead special projects or investigation into specific technology or solution issues and to shepherd research and piloting of new capabilities with project engineers a...
read moreCyber Security Engineer/Architect. The officer will be responsible for helping advance cyber security tradecraft to ensure consistent decision making across the organization. The officer will partner ...
read moreCyber Security Engineer/Architect. Performs a critical role by defining the operational and technical strategy used by the Sponsor to protect systems and data. Will research new disruptive technology ...
read moreCyber Security Engineer/Architect. Performs a critical role by defining the operational and technical strategy used by the Sponsor to protect systems and data. Will research new disruptive technology ...
read more