eBay Classifieds » All ads » Jobs » IT & software » 

cissp in Miami

(1-9 of 9 ads)
View as:
Categories
  1. Product Support Engineer at NextLabs Inc.

    NextLabs is a security software company focused on developing mission critical next generation policy enforcement infrastructure and system software....

  2. Threat and Vulnerability Management Specialist at VariQ

    Perform root-cause analysis of events during the incident process, combining sound analytical skills with advanced knowledge of IT security threats....

  3. Security Information and Event Management / SIEM, Manager at Avanade

    Relevant IT certifications such as CCNA, CCNP, JNCIA, etc. Responsible for monitoring, configuration changes, accounts, managing log sources, and software...

  4. Director, Core System Support at Health Plan of San Joaquin

    CISSP or CISM. At least five years of experience in software application development management and IT Operations;...

  5. IT Security Analyst 4 at Oracle

    The IT Security Analyst for Global IT Risk Management (GIT. 5+ years of IT Security experience across multiple platforms, OS’s, software, and network protocols....

    Ads
    1. Director of IT Security

      Primary Duties and Responsibilities ? Develops corporate security strategy, security architecture, and security incident response. ? Manages the company security organization, consisting of possible direct and indirect reports, to include hiring, training, staff development, performance management and annual performance review. ? Develops and manages budgets and monitors for variances. ? ...

    1. Senior Security Engineer at Concentrix

      CISSP, GCIH, GREM, GCIA. File integrity verification and monitoring software. The Senior Security Engineer is a member of the Security Engineering team and is a...

    1. Vulnerability Assessment Specialist

      IS Tech Specialist The scope of the Application Vulnerability Assessment (AVA) process, owned by Citi Technology Infrastructure (CTI), is comprised of all Citi business functions, subsidiaries, managed facilities, critical infrastructure components as well as service provider arrangements that include Citi branded and co-branded applications. The AVA process is governed by the System Security ...

    1. Cloud Enterprise Architect at Okta

      It integrates directly with an organization’s existing directories and identity systems, as well as 4,000+ applications....

    1. Security Architect - IAM (2 positions)

      Title: Security Architect - Identity Access Management  Location: Miami, FL Duration: Direct Hire Compensation: $100,000-$110,000/year + Bonus Work Requirements: US Citizen, GC Holders or Authorized to Work in US Overview: TekPartners has some of the most sought after Information Technology positions available. As a reputable company in the IT staffing industry, you can trust us to place you ...

    1. Security Systems Engineer at Intel

      GSEC, GCED, CISSP, CISM). Application packaging deployment that meets IT standards. Degree in systems engineering, Information Systems, Computer science,...

    1. Security Analyst

      Overview: TekPartners has some of the most sought after Information Technology positions available. As a reputable company in the IT staffing industry, you can trust us to place you in the right position. We currently have an opportunity for a Security Analyst in Miami, FL. Roles and Responsibilities: Assist in the coordination of disaster recovery (DR) efforts for the Company including ...

    1. Senior Systems Engineer - Federal Sector at Tripwire

      10 years or more of experience with field systems management and software applications in the capacity of sales engineering or IT support operations highly...

    1. Information Systems Manager - Public Safety Applications

      SALARY: $77,877.00 - $124,292.00 AnnuallyOPENING DATE: 03/14/16CLOSING DATE: 05/06/16 05:00 PMREQUIREMENTS AND PREFERENCES:The Broward County Board of County Commissioners is seeking qualified candidates for the position of INFORMATION SYSTEM MANAGER in the Office of Regional Communications and Technology/Public Safety Applications Section.The position is responsible for the mission critical ...

    1. Consultant, Application Security �F5 Technologies - South Central at Optiv

      CISSP or other professional certifications. We are different because we understand it all, do it all and can help clients execute....

    1. Security Analyst

      Overview: TekPartners has some of the most sought after Information Technology positions available. As a reputable company in the IT staffing industry, you can trust us to place you in the right position. We currently have an opportunity for a Security Analyst in Miami, FL. Roles and Responsibilities: Assist in the coordination of disaster recovery (DR) efforts for the Company including ...

    1. Senior Technology Consultant, Networking at eSentio

      Assess IT organizations and IT Service Management processes. SSCP, CISSP or similar. Hands-on IT experience in a law firm....

    1. Network Engineer

      Job Title: Network EngineerLocation: Palm Beach Gardens, FLDuration: 6 Months Contract (possibility of extension)*upon offer, candidates must complete background check and drug test*Responsibilities:Configure/Deploy/Install various network devices and services (e.g., routers, switches, firewalls, load balancers, VPN, QoS)Perform network maintenance and system upgrades including service packs, ...

    1. Certification & Accreditation Security Specialist at By Light Professional IT Services

      CCNA-Security, GSEC, Security+ Ce, CISSP. By Light is an IT products and services firm specializing in software engineering, satellite/terrestrial...

    1. Director Information Security

      Summary:EnvisionRx, with a commitment to providing transparency and disclosure to the Pharmacy Benefit Management (PBM) marketplace, provides full service, integrated PBM services, including network-pharmacy claims processing, mail order, benefit design consultation, drug utilization review, formulary management, and other related services. If you are interested in becoming part of a team ...

    1. Security Operations Center Engineer at By Light Professional IT Services

      CISSP Associate, CASP, GCIH, GCED. By Light is an IT products and services firm specializing in software engineering, satellite/terrestrial communications,...

    1. Infrastructure Vulnerability Assessment Engineer

      The Infrastructure Vulnerability Assessment Engineer role is primarily responsible for testing the various infrastructure systems within the environment. A successful candidate will have a strong background in Information Security with solid testing experience. Due to the complexity of the environment and the business requirements the candidate will train first in the current test ...

    1. Cloud Integrations Enterprise Architect at Okta

      It integrates directly with an organization’s existing directories and identity systems, as well as 4,000+ applications....

    1. Senior Cybersecurity Consultant at Guidance Software

      Security+, Network+, GSEC, or other relevant IT security product certifications such as Tenable Certified Nessus Auditor, ArcSite Certified Systems Analyst, or...

      1. IT Security Analyst IV at Black Knight Financial Services

        CISSP, CEH, CISM, GSEC. Black Knight offers leading software systems; Responsible for the tracking and monitoring of software viruses....

      2. Sr. IT Security Analyst at Professional Alternative, Inc.

        Experience working with company software and hardware products. Experience with computer operations and software tools involved with security compliance....

      3. Information Security Analyst at Healthcare Information and Management Systems Society (HIMSS)

        Prepare IT security documentation, including department policies and procedures, informational notifications, and IT alerts....

      4. Senior Information Security Analyst at Sensus

        5+ years of IT security experience including project management. CISSP, CISA, CEH, CSSLP, CHFI, CCSP, GCIH, GCIA, PMP, ITIL v3....

      5. VP, Global Information Security at Becton Dickinson & Company

        1.Minimum of 10 years of IT leadership experience. 2.Strong knowledge of Secure Software Development Lifecycle (SDLC) processes and methodologies....