Search Results: 33 vacancies
...Title: Data Security Consultant
Location: Remote
Duration: 12 Months
Job Description:
Project Schedule:
Anticipated Project Start Date: July 1 2024.
Anticipated End Date: June 30 2025.
Sample Tasks:
Assist with evaluation of architecture...
...POSITION
Application Security Engineer
LOCATION
Remote
DURATION
6 Month C2H
CLIENT
PACIFIC LIFE INSURANCE COMPANY
INTERVIEW TYPE
Video
VISA RESTRICTIONS
Only GC or Citizens
REQUIRED...
...Job Title: NG911 IT Security Analyst
Location: Remote MondayFriday 35 hours/week (not including mandatory unpaid meal break after 6 hours of work)
Duration: 12 Months
Hours: 35 Hours/Week
Years of Experience: 12 Yrs.
Job Description Justification...
...Location: TX
Duration: 6 Months
Job Description:
Security Engineer. Technical skill set Must have hands on experience with Cisco ASA FXOS Palo Alto firewalls and Panorama. Full understanding of Palo Alto Firewall concepts like Security Zones Security...
...NAVA Software solutions is looking for a Network Security Engineer
Details:
Network Security Engineer
Location: NYC Onsite
Duration: 12 months
Need strong Fortinet / Fortigate experience
Job Description
Provide support for all...
...company operates through two divisions Retail Banking and Services and Corporate and Institutional Banking
Position: Information Security Engineer III Daily
Location: Montreal QC H3A 2A6
Duration: 12 Months
Job Type: Contract
Work Type: Onsite...
...members.
IT Associate: Highly skilled, tech-savvy individuals who keep our computer systems, networks, and software up-to-date and secure to ensure smooth daily operations of the team to serve our customers. Individuals who are problem solvers and thrive on finding...
...corporate office 365 hybrid environments
Ability to both author and troubleshoot powershell scripts
working knowledge of email security principles (DMARC/DKIM/SPF/TLS)
Strong interpersonal skills
Working knowledge network security principles and practices
Ability...
...Azure app registrations.
Analyze 3rdparty products to document overall solution and system architectures and identity/permissions security models.
Contribute to the Product features roadmaps and to Power Platform Community of Practice.
Ensure highquality...
...solutions with Automation CI/CD Data Pipelines.
Ability to understand data landscape and draw architectures.
Ensure solutions are secured scalable resilient and bring agility into product development
Ability to measure and monitor data coverage using KPIs/OKRs...
...engineers.
Provides continuous improvement ideas to reduce expenses and/or improve efficiency.
Applies recommended information security standards when developing code and seeks to validate.
Assesses the technical viability of new and emerging products and...
...design tools and vendors.
Develops and ensures adherence to corporate standards affecting enterprise hardware software networks and security.
Maintains a thorough knowledge of Matsons business and continually expands on this knowledge.
Identifies and implements...
...typically supporting complex IT systems.
Support and Maintenance for Finance SBS server infrastructure to include updates upgrades and security.
Backup to senior level server administrator. Technical Environment: VMWare vSphere Server 2019 (Server and SQL) Redhat 7/8...
...the world. Our client is the largest private broadband company in America providing advanced digital video Internet telephone and home security and automation services over its own nationwide IP network. The client is committed to creating meaningful moments of human...
...Develop deploy and support Cloud infrastructure as code artifacts or modules
Design and lead the implementation of highly scalable and secure cloud infrastructure solutions for AWS utilizing Terraform and Python.
Participate on an agile team to deliver AWS Account and...
...include business continuity/disaster recovery backup and restoration repartitioning zerooutage upgrades etc).
Implement and enforce security practices for enterprise messaging platforms
Provide Operational support for platform issues to application development teams...
...Governance and Best Practices: Establish and enforce integration best practices standards and policies to ensure data consistency security and compliance.
Monitoring and Troubleshooting: Monitor the performance of integrated systems identify and resolve integration issues...
...Such as Apache Apache Tomcat Database server file system server configuration of AJP connector email server MQ server.
9. Implement security measures including SSL certificates firewalls access controls and vulnerability assessments to protect web servers and applications....
...staff, determining business requirements for IT systems, managing the design and implementation of IT infrastructure, and eliminating security risks. A large part of their daily responsibilities includes directing the work of other IT staff such as IT Consultants, System...
...am; OR Thurs Sun 11:00am 9:00pm; or as needed for escalations; includes weekends & holidays
Role Responsibilities:
Perform security monitoring and analysis leveraging SIEM and security tools
Conduct technical analysis and correlation of operating system database...