Cyber security analyst jobs in El Paso, TX
Security Operation Analyst
Security Operation AnalystREPORTS TO. Director of Security Operations and Incident responseFUNCTION.. To manage , maintain and operate, and implement security controls and solutions based on CISO policies..
Cyber Warfare Technician
Officers (four year degree required) or Cyber Warfare Engineers (four year degree required.. repairing or replacing cryptologic networks, physical security systems, electronic equipment, antennas..
Network Security Analyst
Job Description CANDIDATE SKILLS AND QUALIFICATIONS Minimum Requirements Candidates that do not meet or exceed the minimum stated requirements (skills experience) will be displayed..
Security Operation Analyst
We are currently seeking a Security Operation Analyst to join our team in Not specified, Texas (US TX.. ROLE TITLE. Security Operation. Analyst. REPORTS TO. Director of. Security Operations and Incident..
Senior Information Security Engineering Analyst
U.S. citizenship is required due to the nature of the job. Additionally, a Federal Security Clearance is.. Summary of This RoleDevelops, configures, documents, and maintains information security solutions..
Privacy and Security Analyst
Role. Privacy and Security Analyst Location. Austin, TX. Seattle, WA Sanjose, CA Onsite Hire Type. Month Contract (Extendable) JD. Candidate should have Risk & Compliance experience. Experience..
Sr. Manager – Cyber Security & Privacy Governance
Manager. Cyber Security & Privacy Governance to join our teamThis position is 100. Remote. Candidates.. Experience working in a highly regulated environment. Experience in information security and governance..
Cyber Security - Information Assurance Technician (IAT II)
Cyber Security. Information Assurance Technician (IAT II)Job Category. Information TechnologyTime Type.. Up to 10 Type of Travel. Continental US. ACI is seeking a Cyber Security Engineer to join our team in..
Client Executive, SLG Texas
Ideal candidates will have. In depth understanding of managed security services, managed detection and.. About BlueVoyant At BlueVoyant, we recognize that effective cyber security requires active prevention..
Requirements Analyst
Description. Parsons is looking for a Requirements Analyst to join our team supporting the United States.. integrate and synchronize cyber tools, capabilities, and programs into a cohesive platform that supports..
Security Engineer
Are you a skilled Security Engineer with a passion for safeguarding critical infrastructure and systems.. Knowledge of regulatory frameworks and standards such as GDPR, PCI DSS, and NIST Cybersecurity Framework..
Security Administrator
Required Skills. 10 Years of Security Administrator 8 Years of Oracle Platform 8 Years of Advanced SQL 8 Years of Data Security Analyst 8 Years of Project Migrations Preferred Skills. 4 years of..
Security Admin— 100% Remote Work
Job Title. Data Security Analyst. 100. Remote Work Interviews will be conducted through Microsoft Teams.. Responsible for installing and uninstalling various security programs These programs often protect..
Cyber Incident Responder
Description. JOB SUMMARY This role will manage and investigate live security incidents. Cyber Incident.. Responders discover opportunities to improve the security posture of the organization and drive process..
Lead Contract Specialist - Direct Hire
Summary Serves as the Acquisition Division Lead Contract Specialist for the United States Section, International Boundary and Water Commission (USIBWC), responsible for the adminis..
Linux System Administrator
Command Zero is looking to revolutionize the way in which organizations conduct cyber investigations.. Understanding of Security and Compliance Frameworks (eg. SOC 2, ISO27001). Programming experience with..
Systems Engineer, Senior
The Air Force Lifecycle Management Center Defensive Cyber Systems Branch (AFLCMC HNCD) serves as the.. Troubleshoot network performance issues, analyze traffic, and monitor security devices. Perform..
Information Technology Manager
Additionally, you will collaborate with other departments to identify and address their IT needs, implement IT security measures to protect against cyber threats, and develop and maintain IT..