Job Description Deep knowledge Maintain and Support the Mainframe Network System Programmer and administration Installing and configuration Network in system side and fine-tuning Mainframe Environments with debugging and problem analysis Experience working with the Network system side of Mainframe environments in a parallel sysplex environment Be able to use TSO/ISPF sufficiently Be knowledgeable in z/OS Communication Server SNA and TCP/IP -multiple LPAR environments Security knowledge -Policy
Description: The Security Data Engineer will work within the Identity and Access Management operational support area to oversee, maintain and enhance all ETL processes and data integrations related to an enterprise compliance program for critical infrastructure protection. The candidate will leverage data integration tools to provide data from critical infrastructure to Identity and Access Management tools and processes. The candidate will continuously assist in the operational administration o
Seeking an experienced offensive security professional to join our red team and lead advanced Active Directory attack simulations within a high-security federal environment. You'll emulate real-world adversaries to identify gaps in authentication, access control, and domain trust configurations, helping strengthen our client s cyber resilience against sophisticated threats. Basic Qualifications 10+ years of experience with cybersecurityDeep knowledge of Windows internals, Active Directory archit
Seeking candidates with solid expertise in Manual web application penetration testing and Manual secure code review. Not looking for only tool-based(SAST and DAST) resources Mandatory Perform manual security code review against common programming languages (Java, .NET)Perform automated testing of running applications and static code (SAST, DAST)Perform manual application penetration tests on one or more of the following to discover and exploit vulnerabilities: web applications, internal applicat
For this position we are really looking for someone who is strong in Security Operations (Vulnerability Management, Penetration Testing, Incident Response, Identity Access Management, etc.). A few of the candidates were strong in Risk Management (Risk Assessment, Data Classification, Audits, etc.) but we already have those skills on our team. The remaining candidates mostly struggled to answer basic technical questions relating to security and seemed to mostly come from more IT Operations backgr
M&S Consulting was conceived in 2002 with the vision of creating highly effective teams of elite consultants to deliver strategic process and technology solutions to enterprise organizations across the US. Our commitment to delivery in complex environments and long-term customer success has merged process and technology into innovative solutions, established deep pockets of expertise, and enabled innovative transformation for evolving businesses. We have intentionally cultivated steady growth fo
Piper Companies is in search of a Program Manager to join our top customer's team in the global Technology Infrastructure space. This critical role involves developing and orchestrating a security-as-code, defense-oriented architecture for the organization and their clients. Responsibilities for the Program Manager, Cybersecurity: Manage the lifecycle of existing and future security and compliance projects.Develop and implement detailed plans across multiple ongoing projects.Coordinate cross-fu
Role: Peoplesoft Security Admin Location: Remote Experience: 10+ Job Description: Required Qualifications: 8+ years of Information Technology experience with 5+ years' experience working with PeopleSoft Security in both HCM and Financials. Strong experience and process knowledge of PeopleSoft Application, Data and Tools Security At least experience of 2 projects in PeopleSoft HCM/Financials domain and experience of at least 2 implementation/Upgrade/support project of PeopleSoft applications
Job Description: Crop to Crop resumes are accepted Location Requirement: Onsite or Remote? Candidate MUST be a WI resident or willing to relocate to WI prior to starting the role at their own expense. This role is 100% remote within the state of WI. This Security Analyst position is part a dynamic and versatile team that concentrates on Access Control Management (ACM), and applying ACM best practices in account provisioning, password resets, and other account management processes in a multi-dom
Role and Responsibilities The client is seeking a senior Akamai Engineer, the candidates will be responsible for the design, implementation, and management of Akamai content delivery network (CDN) solutions, including Akamai Bot Manager and Akamai Account Protector, for the organization. The candidate will work closely with cross-functional teams to ensure optimal performance, availability, security, bot mitigation, and account protection capabilities for web applications and content delivered t
Job Description As a Cloud and Data Architect, you will be responsible for leading architectural decisions for the Cloud, and Data Enterprise Portfolios. You must have a deep understanding of technical architecture and have implemented solutions in a cloud environment focused on AWS or Azure. Knowledge of industry best practices around enterprise cloud security, architectures, and patterns. Experience with micro-services architectures and cloud migration for data is a plus. The architect will n
We are seeking a Windows Security Architect to help design and implement strategies for securing Windows devices across our organization. This role will involve leveraging various security tools and technologies while collaborating with the enterprise team to ensure the security of operational technology (OT) devices that utilize Windows. The ideal candidate will possess deep expertise in Windows architecture and security best practices. Key Responsibilities: Security Design and Implementation:
EDE Security & Monitoring EngineerPosition OverviewWe're looking for someone who can handle both security engineering and IT monitoring. You'll help our enterprise customers implement Microsoft Defender for Endpoint (MDE) with Zero Trust security and set up monitoring systems using Microsoft Operations Manager (MOM) and System Center Operations Manager (SCOM). Main GoalsStrengthen enterprise security with Zero Trust principlesSet up and improve IT monitoring systemsAdvise customers on technical
No SPONSORSHIP BA Machine Identity Management / Machine Identity Security RATE: OPEN C2C or W2 LOCATION: REMOTE Looking for a candidate with Machine identity management and machine identity security. (Sailpoint a big plus). This is more of a business analyst role performing discovery and working with shareholders. Must have clear communication skills. You will be a technical engineer with BA skills driving implementations, permissions, reviewing catering understanding inputs integrations etc.
Immediate need for a talented FIPS Common Criteria-Security Engineer. This is a 12+months contract opportunity with long-term potential and is located in U.S(Remote). Please review the job description below and contact me ASAP if you are interested. Job ID:25-67612 Pay Range: $85 - $86/hour. Employee benefits include, but are not limited to, health insurance (medical, dental, vision), 401(k) plan, and paid sick leave (depending on work location). Key Requirements and Technology Experience: Sk
Your Career This Consultant position is an integral part of our mission within our Professional Services team. In this role, you will work on-site with our customer(s), supporting our mission to help them quickly and completely adopt our Security Operating Platform, leaving them more secure. This is a highly technical, hands-on role, and you will develop and maintain expertise-level skillsets on our products and solutions deployed within the customer's environment. Cortex XSOAR orchestration ena
Monitor security alerts in real-time and promptly triage them based on severity and impact.Accept and coordinate incident reports from internal and external sources, ensuring accurate documentation and timely response.Conduct thorough analysis of security incidents to determine root causes, impact, and recommended remediation actions.Perform detailed forensic analysis of artifacts and malware to identify attack vectors, persistence mechanisms, and data exfiltration methods.Implement strategies f
Job Description:Document and address organization's information security, cybersecurity architecture, and systems security engineering requirements throughout the acquisition life cycle. 3 days - on site - 2 days - remoteNotes from the manager:For this position we are really looking for someone who is strong in Security Operations (Vulnerability Management, Penetration Testing, Incident Response, Identity Access Management, etc.). A few of the candidates were strong in Risk Management (Risk Asse
IT Security Analyst 4 Primary Location: Richmond, Virginia V-Soft Consulting is currently hiring for an IT Security Analyst 4 for our premier client in Richmond, Virginia. WHAT YOULL NEED: Technical Requirements and Certifications IT security or risk assessment certifications are advantageous (CISM, CCSP, CISSP, CEH, CompTIA Pentest+ and/or CompTIA Security+): 5 Years. Education and Experience NIST 800-53 rev 5 and/or Criminal Justice Information System (CJIS) specifications for an informati
At CVS Health, we're building a world of health around every consumer and surrounding ourselves with dedicated colleagues who are passionate about transforming health care. As the nation's leading health solutions company, we reach millions of Americans through our local presence, digital channels and more than 300,000 purpose-driven colleagues - caring for people where, when and how they choose in a way that is uniquely more connected, more convenient and more compassionate. And we do it all w