vulnerability management program while partnering with Infrastructure teams responsible for patch deployment. Additional...The Cybersecurity Manager leads and coordinates cybersecurity operations, governance execution, and security technology...
GENERAL SUMMARY: Reporting to the Director of Emerging Technology Security, the Manager of Enterprise AI & Cloud... Security leads and oversees the comprehensive security program for artificial intelligence systems and cloud infrastructure...
across the workforce. Manage EDR/XDR, SIEM, SOAR, vulnerability management, patching SLAs, and threat intelligence. Coordinate...Overview: The IT Security Manager is responsible for establishing, implementing, and maintaining the organization...
, and data remain secure in an evolving threat landscape. As Manager of Security Operations, you'll combine strategic... program. Translate threat intelligence into actionable defensive strategies. Coordinate red team/blue team exercises...
data centers. The Security Operations Manager (SEC) shall serve as the Security Operations team leader (est 10... centralized logging and threat analysis, and Ensuring consistent, comprehensive and timely patching across the environment...
centers. The Security Operations Manager (SEC) shall serve as the Security Operations team leader (est 10 technicians... and threat analysis, and Ensuring consistent, comprehensive and timely patching across the environment Performs and/or reviews...
The Senior Manager, Maritime Cyber Safety Operations is responsible for leading the operations and management... with the GCS Threat Intelligence & Security Operations team to develop and maintain an operational framework for mitigating OT...
. For more information, please visit and . Position Overview: We're looking for a Manager, Cybersecurity who can run our SOC operations..., vulnerability management, DFIR, and security tool health - while also managing our MSSP/MDR partners, running red team engagements...
management, and overall program management of our corporate network. The Corporate Cybersecurity Manager will develop..., CMMC 2.0, NIST 800-53/171, RMF, CSF, DFARS). Hands-on experience with SOC operations, threat intelligence, vulnerability...
Overview JST is currently seeking a Cloud Cybersecurity Manager who will serve as the program's senior cybersecurity..., network, application, data); implement policy-as-code, SBOM/provenance, and least-privilege patterns. Threat, Vulnerability...
, CI/CD, and data pipelines Own and oversee the vulnerability management program, ensuring risk-based remediation.... POSITION OVERVIEW We are seeking a Senior Manager, Information Security Architecture & Engineering to serve as a key security...
Manager to join the Information Security Team. The Information Security Team reports to the Chief Technology Officer... and is responsible for the Information security program. This role will oversee the implementation, performance, and management of the...
Overview The Cyber Security Incident Response Manager ensures the organization is prepared to detect, analyze... (IR) program, develops playbooks, manages response teams, and ensures alignment with enterprise risk management, regulatory...
MDR and vulnerability management providers to ensure SLAs and threat intelligence integration. Develop and maintain SOC..., tuition reimbursement, Chairman’s Scholarship, 529 College Savings Plan) Broad Based Employee Award Program—value sharing...
Overview: The Cyber Security Incident Response Manager ensures the organization is prepared to detect, analyze... (IR) program, develops playbooks, manages response teams, and ensures alignment with enterprise risk management, regulatory...
Operational Technology threat management, secure software development, vulnerability management, and incident response.... About the role: As an Operational Technology (OT) Cyber Security Manager you will lead a cross functional team to evolve...
requirements, and evolving threat landscapes. Lead and mature the organization’s cybersecurity program through risk-based decision..., threat detection, vulnerability management, and third-party/vendor security risk management. Ensure the selection...
, including monitoring, threat detection, incident response, and vulnerability management. Design, implement, and manage security... strategies.• Experience with SIEM tools, vulnerability scanners, penetration testing and threat model methodologies...
The Information System Security Manager (ISSM) is responsible for applying and documenting Information System... and overseeing the implementation and sustainment of security controls in all stages of the program lifecycle. This is not a hybrid...
(SIEM, IDS/IPS, EDR, SIG, EPM, firewalls, threat intel platforms, etc.). Oversee vulnerability scanning, prioritization...-on experience with core security technologies (SIEM, IDS/IPS, EDR, SIG, EPM, firewalls, vulnerability management, threat intel, SOAR...