Systems Security Engineer - Vulnerability management. We are seeking a highly skilled Systems Security Engineer with at least 10 years of experience in vulnerability management, particularly within Mi...
read moreSystems Security Engineer - Vulnerability management. We are seeking a highly skilled Systems Security Engineer with at least 10 years of experience in vulnerability management, particularly within Mi...
read moreThis opportunity is to work as a Senior Front-End Engineer within Audible's engineering team. This opportunity is for a Senior Front End Software Engineer for Audible’s Consumer Domains group. We are ...
read moreNew York, NY: $173,000 - $197,400 for Principal Associate Senior Software Engineer; $173,000 - $197,400 for Senior Software Engineer. Senior Software Engineer, Full Stack (Go, Python, AWS) - Rewards &...
read moreThis opportunity is to work as a Senior Front-End Engineer within Audible's engineering team. This opportunity is for a Senior Front End Software Engineer for Audible’s Consumer Domains group. We are ...
read moreNew York, NY: $211,000 - $240,800 for Manager, Lead Software Engineer; $211,000 - $240,800 for Lead Software Engineer. Wilmington, DE: $175,800 - $200,700 for Manager, Lead Software Engineer; $175,800...
read moreStrong experience in cloud security, including working with cloud infrastructure security tools. Utilize security tools to detect and resolve vulnerabilities in cloud systems, including Ankor, Tenable...
read moreUnderstand the customer environment, requirements, and security roadmap to implement the appropriate security solution. Configure, implement, and maintain Security Operating Platform. You work with th...
read moreStrong experience in cloud security, including working with cloud infrastructure security tools. Utilize security tools to detect and resolve vulnerabilities in cloud systems, including Ankor, Tenable...
read moreUnderstand the customer environment, requirements, and security roadmap to implement the appropriate security solution. Configure, implement, and maintain Security Operating Platform. You work with th...
read moreSenior Systems Programmer to lead integration and configuration of Access Control, CCTV, Intrusion, Intercom and Low Voltage Security systems in the N NJ/NYC region! . Genetec Security Center, CCURE 9...
read moreSenior Systems Programmer to lead integration and configuration of Access Control, CCTV, Intrusion, Intercom and Low Voltage Security systems in the N NJ/NYC region! . One of the fastest-growing Secur...
read moreExperienced in overseeing the design, development, implementation, and maintenance of multiple security systems (such as access control and CCTV systems) and have a deep understanding of the overarchi...
read moreExperienced in overseeing the design, development, implementation, and maintenance of multiple security systems (such as access control and CCTV systems) and have a deep understanding of the overarchi...
read moreSystems Engineer for Access Control and CCTV systems on an embedded contract in Queens, NYC. Troubleshoot, monitor, program Access Control, CCTV, Card Reader, Alarm, Security and Low Voltage systems. ...
read moreSystems Engineer for Access Control and CCTV systems on an embedded contract in Queens, NYC. Troubleshoot, monitor, program Access Control, CCTV, Card Reader, Alarm, Security and Low Voltage systems. ...
read moreAs a Cyber Systems Security Engineer Staff, you will lead the technical aspects across BLQ-10 systems, focusing on enhancing cybersecurity through modern solutions. Educate program engineers on implem...
read moreAs a Cyber Systems Security Engineer Staff, you will lead the technical aspects across BLQ-10 systems, focusing on enhancing cybersecurity through modern solutions. Educate program engineers on implem...
read moreAs a Cyber Systems Security Engineer Sr, you will support the integration of modern cybersecurity solutions across multiple Owego programs. Familiarity with security architecture design, security audi...
read moreFamiliarity with security architecture design, security audit tools, security requirements generation, security testing. As a Cyber Systems Security Engineer Sr, you will support the integration of mo...
read moreDesign, implement, and optimize FW code for wireless communication systems on JMA HW/FW platforms with emphasis on Embedded System Security principles and techniques, security by design and OS hardeni...
read moreDesign, implement, and optimize FW code for wireless communication systems on JMA HW/FW platforms with emphasis on Embedded System Security principles and techniques, security by design and OS hardeni...
read moreApplies current Systems Security Engineering methods, practices, and technologies to the architecture, design, development, evaluation, and integration of systems and networks to maintain system secur...
read moreApplies current Systems Security Engineering methods, practices, and technologies to the architecture, design, development, evaluation, and integration of systems and networks to maintain system secur...
read moreApplies current Systems Security Engineering methods, practices, and technologies to the architecture, design, development, evaluation, and integration of systems and networks to maintain system secur...
read moreApplies current Systems Security Engineering methods, practices, and technologies to the architecture, design, development, evaluation, and integration of systems and networks to maintain system secur...
read moreOur Need: Creative and innovative engineers with prior systems, hardware, or software engineering experience with the potential to outthink world class reverse engineers. In a modern approach to “Spy ...
read moreOur Need: Creative and innovative engineers with prior systems, hardware, or software engineering experience with the potential to outthink world class reverse engineers. This role involves understand...
read moreKnowledge and understanding of security engineering, system and network security, authentication and security protocols, incident management. Knowledge of various Security domains, Compliance requirem...
read moreKnowledge and understanding of security engineering, system and network security, authentication and security protocols, incident management. Create and maintain technical process documentation (proce...
read moreCyber Security knowledge: Security monitoring, MITRE attack vectors, SIEM, secret management, DLP, encryption concepts, etc. Azure security services / applications: (Log Analytics, Sentinel, Defender)...
read moreCyber Security knowledge: Security monitoring, MITRE attack vectors, SIEM, secret management, DLP, encryption concepts, etc. Azure security services / applications: (Log Analytics, Sentinel, Defender)...
read moreYou shall focus on the systems engineering/cyber security engineering related tasks. Provide system security engineering expertise. Cyber Security InfoSec Engineer.
You shall focus on the systems engineering/cyber security engineering related tasks. Cyber Security InfoSec Engineer. Provide system security engineering expertise.
You shall focus on the systems engineering/cyber security engineering related tasks. Cyber Security InfoSec Engineer. Provide system security engineering expertise.
You shall focus on the systems engineering/cyber security engineering related tasks. Cyber Security InfoSec Engineer. Provide system security engineering expertise.
Cyber Security Engineer/Architect. The officer will be responsible for helping advance cyber security tradecraft to ensure consistent decision making across the organization. The officer will partner ...
read moreCyber Security Engineer/Architect. Lead special projects or investigation into specific technology or solution issues and to shepherd research and piloting of new capabilities with project engineers a...
read moreCyber Security Engineer/Architect. The officer will be responsible for helping advance cyber security tradecraft to ensure consistent decision making across the organization. The officer will partner ...
read moreCyber Security Engineer/Architect. Performs a critical role by defining the operational and technical strategy used by the Sponsor to protect systems and data. Will research new disruptive technology ...
read more