operation of critical Department of Defense (DoD) enterprise networks and IT infrastructure. Serving as a technical backbone... policies, and Identity and Access Management (IAM) to safeguard system integrity and data privacy. Support the deployment...
Solution Specialist on the team, you will: Help consult with clients on the system design of AWS environments Install... within our Deloitte US Delivery Center model, which is dedicated to driving impactful business services. It leverages Deloitte's scale...
best practices through continuing professional development, attending conferences, and reading specialist media. Project Management..., Transportation, Planning, Asset Management, or related field; Master's preferred PMP, PE, IAM, or similar relevant certifications...
and AI innovation? At Cvent, we’re committed to continuous learning and adaptation—AI isn’t just a tool for us, it’s part of our DNA...-minded developer, not a traditional security specialist. In This Role, You Will: Shape and lead a company-wide...
PKI and IdAM Engineer The Opportunity: You know that the user is the last frontier for cybersecurity. It... Management (IdAM) specialist, you have the skills and experience to keep hackers from taking data and breaking processes. We’re...
lead throughout the sales cycle, from discovery to hand-off. Collaborate with sales, product, and specialist teams... and Compliance Design security architectures including MDR, SOCaaS, IAM, SIEM/SOAR, and vulnerability management. Ensure solutions...
Responsibilities Cardinal Technology Systems Corp. is a government IT solutions provider servicing commercial... for our company. Summary Must possess IT-II security clearance or have a current National Agency Check with Local Agency Check...
tests utilizing in-house tools and develop remediation plans for identified vulnerabilities. Implement and manage IAM.... Collaborate with cross-functional teams to ensure security is integrated into all aspects of IT infrastructure, and develop...
(IAM) specialist, you have the skills and experience to keep hackers from taking data and breaking processes. We’re...SailPoint Engineer The Opportunity: You know that the user is the last frontier for cybersecurity. It’s where the...
: o Implement and enforce cloud security best practices, including identity and access management (IAM), encryption, and network... principles and tools, including IAM, encryption, and compliance frameworks. o Extensive experience with monitoring...
As an Identity and Access Management (IAM) specialist, you have the skills and experience to keep hackers from taking... data and breaking processes. As a Ping Identity Subject Matter Expert , you’ll play a critical role in the world of IAM...