system health checks. Investigate agent behavior and troubleshoot integration issues. 2. Vulnerability Management System...%) Resolve customer inquiries via ticketing systems and the SOC. Maintain Remote Monitoring and Management (RMM) platforms...
., PCI, HIPAA). Strong understanding of risk assessment, security assessment, and vulnerability management using Microsoft... position: #LI-CV1 #LI-Remote...
vulnerabilities in security systems (e.g., vulnerability and compliance scanning). Oversees and performs threat modeling, security... Intermediate - Demonstrated project management skills Intermediate - Demonstrates a high level of accuracy, even under pressure...
and/or knowledge of Software Development Lifecycle (SDLC), object-oriented programming, software configuration management, real-time... systems software development Familiarity with cybersecurity vulnerability assessments Comfort and ability working...
such as SIEM platforms, IDS/IPS, vulnerability scanners, endpoint protection, firewalls, PKI, and DLP solutions Proficiency...; familiarity with DoD incident‑response procedures Strong communication and stakeholder‑management skills; capable of leading...
, and operations at scale. Uphold security and compliance best practices (least privilege, secrets management, supply-chain security..., vulnerability remediation) across services and CI/CD. Bachelor's Degree in Computer Science or related technical field AND 4+ years...
tools such as SIEM platforms, IDS/IPS, vulnerability scanners, endpoint protection, firewalls, PKI, and DLP solutions...-attacks; familiarity with DoD incident-response procedures Strong communication and stakeholder-management skills; capable...
but not limited to circuits, indoor and outdoor fiber infrastructure, external and internal DNS, IP Address Management, web filtering..., firewall systems, network infrastructure security, remote access, VPNs, wireless networks, routing and switching environment...
, and driving technology adoption in hybrid and remote work environments. What You’ll Do Design and develop Software features... pipeline and release management frameworks ensuring scalable automation and robust deployment strategies for devices software...
, and driving technology adoption in hybrid and remote work environments. What You’ll Do Design and develop Software features... pipeline and release management frameworks ensuring scalable automation and robust deployment strategies for devices software...
, networks, and database products using methods such as encryption technology, vulnerability analysis and security management..., test, configuration management and maintenance of information systems and data Assist program security in the development...
processing, and data management. This position is an onsite role in Aurora, CO. What You Will Do Design, implement... and integrate new tools and technologies to support automation, vulnerability scanning, and secure build practices. Help establish...
processing, and data management. This position is an onsite role in Aurora, CO. What You Will Do Design, implement... and integrate new tools and technologies to support automation, vulnerability scanning, and secure build practices. Help establish...
detection and defense. Vulnerability Management: Analyze vulnerability scan results, assess business risk, and recommend... to reporting and dashboards for vulnerability management metrics. Qualifications Bachelor’s degree in Cybersecurity...
and management; conducting vulnerability analysis; developing mitigation plans; and performing penetration testing, password...Remote Downey, CA Pay Range - $50-$55/hr on W2 Position Description: An Information Security Specialist interprets...
, authentication and authorization, secrets management, and vulnerability remediation. Strong understanding of secure coding practices..., competencies, and proficiency for the role. #LI-Remote Thumbtack embraces diversity. We are proud to be an equal opportunity...
, secure design patterns, authentication and authorization, secrets management, vulnerability discovery and remediation..., such as calibrated job level, qualifications, skills, competencies, and proficiency for the role. #LI-Remote Thumbtack embraces...
such as encryption technology, vulnerability analysis and security management. Responsible for integration of multiple methods..., test, configuration management and maintenance of information systems and data Assist program security in the development...
’s lives. With intelligent agreement management, Docusign unleashes business-critical data that is trapped inside of documents...’s Intelligent Agreement Management platform, companies can create, commit, and manage agreements with solutions created by the #1...
’s lives. With intelligent agreement management, Docusign unleashes business-critical data that is trapped inside of documents...’s Intelligent Agreement Management platform, companies can create, commit, and manage agreements with solutions created by the #1...