Risultati della ricerca: 58 offerte di lavoro
...Professionals
I hope this email finds you well.
We are actively looking for a qualified candidate for the position of Cyber Security with (SME)
a t Crownsville MD below is the detailed job description.
Title: Cyber Security with (SME)
Contract:...
...types of health care coverage plans that include individual and family dental and vision plans for employers etc.
Title: IT Security Specialist IC2H ESFTeam
Work Location: Detroit MI 48226
Duration: 6 Months
Job Type: Contract
Work Type:...
...software
Debug pairing handoff and coexistence issues and develop intelligent solutions that greatly
enhances user experience... ...understanding of the inner workings of Bluetooth stack protocols and security
Good knowledge of upcoming BT SIG standards and...
...implement ETL solutions to support data warehouse and business intelligence initiatives
Oversee the performance tuning and optimization... ...delivery
Ensure compliance with data governance and security policies during ETL development
Contribute to the continuous...
...can be used to make informed decisions.
Implement rowlevel security on data and understand application security layer models in... ....
~8 years of relevant handson experience in the Business Intelligence domain specializing in data analytics and reporting.
~ Proficient...
...Implement data controls to ensure compliance with data standards security policies and regulatory requirements.
~ Collaborate... ...scalable and efficient data architectures that support business intelligence and analytics requirements.
~ Identify and implement...
...DevOps Tool: CA IT PAM Ansible Microsoft System
Centre Orchestrator (Scorch) ServiceNow
Orchestrator Jenkins Kafka
Business Intelligence Tool: PowerBI
Version control: GIT Gitlab
Web Services: Rest
JavaScript: Node JS
Web Technologies: PHP jQuery Ajax...
...actions of the AMG multidisciplinary team arising in daily meetings to eradicate source failure.
Ensure the scope of the metrics (Security quality LMPU Productivity scrap) and the wellbeing of the work team.
Monitor and meet the objectives of each cell as well as...
...Lead a team of employees and contingent workers to remediate applications with out of support/legacy technologies and/or security vulnerabilities.
Provide direction to keep team on track to complete projects and ensure project goals are met by assigning tasks...
...minority and womanowned business enterprise that leverages a unique blend of human talent machine learning algorithms and artificial intelligence to provide customized talent management solutions for clients. Zteks diversityfocused hiring models have proven successful...
...of temporary and permanent test environments;
Install/configure 3rd party software products on both Windows and UNIX/Linux;
Secure and configure provisioned systems to integrate into automated testing environments;
Architect a scalable software delivery pipeline...
...vital for Government contracts. Proper documentation is often required for audits and compliances checks. The sales executive should secure Government contracts as it is a complex and competitive process.
The Sales Executive engages in understanding the unique needs...
...issues and suggest improvements.
Preferred Skillset Knowledge of Big Data Architectures and Cloud computing Knowledge of machinelearning techniques classifiers and statistical methods Exceptional intelligence and problemsolving skills Excellent communication skills...
...and team architecture standards.
Create design and technical documentation
Ensure Best Practices are followed
Ensure Security Risk and Compliance standards are followed
Requirements
Bachelors Degree Computer Science Mathematics or related...
...assessments of local networks cybersecurity architecture tools policies and plans.
Identify vulnerabilities and gaps in existing security measures.
Analyze risk factors and prioritize areas for improvement.
Remediation and Enhancement:
Collaborate...
...Responsibilities :
Work with the client to design and modify a cohesive framework of applications integrations data security SLAs workflows and processes in support of a global ServiceNow landscape spanning numerous instances.
Service Portal design often...
...configuration upgrades and patches
Tableau Admin will maintain backup and recovery procedures for Tableau Server
Configure and manage security settings including SSL certificates encryption and authentication
Conduct performance tuning exercises for Tableau workbooks...
...expenditures
Highly qualified candidates will also have experience with one or more of the following:
Experience in cybersecurity and security management.
Experience working with grants contracts or other similar documents.
Experience managing form development for...
...maintenance of IT systems
Provide configuration management implementation and sustainment of compliance with
applicable system security controls.
Provide support to IT systems including daytoday operations monitoring and problem
resolution for all of the...
...coordinator supporting DTMB. Agile experience is preferred. As this resource will be facilitating the timely completion of System Security Plans primary duties will be tracking target dates for completion of corrective action plans and POAMs (Plans of Action and Milestones...