security controls across cloud environments, application developer ecosystems, and corporate infrastructure, ensuring scalable... platform teams and developers to close gaps in cloud posture, application security, and data protection maturity. Risk...
environments, including those complying with DoD IL5 Identify architectural flaws and security concerns in application designs... Product Application Security discipline Experience in designing, implementing, and maintaining secure software system...
expert consultation on securing the entire SDLC process Identify architectural flaws and security concerns in application... by development teams Review application code to identify logic flaws, unsafe functions, and violations of security standards...
Perform product Cyber Security assessments on projects of multiple Ford product lines Compliance reviews on features..., modules as defined in the Ford Cyber Security engineering process in compliance with ISO 21434, UNECE R155, UNECE WP.29...
Director, Information Security and build relationships with technology stakeholders. You'll leverage your knowledge of cloud... security best practice and payment systems to identify and remediate cloud vulnerabilities. This individual contributor role...
contributions you will make: This position is responsible for detecting, analyzing, and responding to security threats across the... enterprise. This role focuses on operational security execution reducing threat dwell time, improving detection fidelity...
of enterprise cybersecurity; focusing on the development and implementation of processes and tools that support Security Operations... identified threats and risks to the organization through collaboration with other Information Security and Sanford technological...
and transferable U.S. government issued security clearance is required prior to start date. U.S. citizenship... is required, as only U.S. citizens are eligible for a security clearance Security Clearance Type: Secret - Current Security Clearance Status: Active...
as we are. Your Career: You will work with a team of amazing device identification and security professionals to help identify, monitor... of Device Security. Your Impact As a senior level Device Security Researcher, you will: Research and identify security...
Cloud Native Application Protection: Secure applications built for cloud environments by automating security assessments... The Cloud Security function at Ro is dedicated to protecting the security and privacy of our patients by continually...
Management (PAM) or similar tools. Windows and Linux OS and application operations support, administration, security...Job Details: Job Description: Our Government Information Techology and Security (GITS) Team...
. Applications are accepted until further notice. Meet the Team The mission of the Security & Trust Organization... and external stakeholders to drive essential security initiatives. The Security and Trust Organization (S&TO) is dedicated...
checks to ensure safe, stable and efficient operation of the security system on a global basis. - Perform application...The Physical Security System and Technology Team, falls under the physical security department of the Corporate...
for Case Center’s Implementation Delivery and Security Compliance, you will: Work with cross-functional technical projects... and provide recommendations for cost optimizations and efficiencies. Support, track, and manage security compliance (currently...
unauthorized access. Application & Product Security: Holistically harden web and mobile applications (iOS/Android) and the web... in infrastructure, application, or product security. Cloud & Orchestration: Hands-on experience with Kubernetes, Docker, and cloud...
and performance. Integration & Automation: Integrate Delinea with enterprise identity, endpoint, and security tooling (e.g., AD/Azure... AD, SSO/MFA, SIEM, ITSM) and automate onboarding/rotation/workflows using APIs and scripting. Security & Compliance...
. Collaborate with infrastructure, cloud, and application teams- to design secure workload architectures and define security...Develop enterprise security architecture blueprints- that define segmentation strategy, enforcement zones, and secure...
enterprise risks, designing security controls, and leading security‑focused initiatives. You will focus on Identity and Access... Management across cloud, on‑premises, and SaaS environments while partnering with infrastructure, application, cloud...
, and procedures for endpoint security application use and support. Communicate technical standards to Information Technology teams... Employee Hotel Rates, other discounts, perks and more What We’re Looking For: A motivated security professional eager...
, engineers, policy experts, and business leaders working together to build beneficial AI systems. About the Team The Security..., and drive the developer security program that shapes how engineers build and ship software. The team works...