, development and implementation of enterprise security solutions that align with business goals and risk tolerance. Design... for automation development and implementation of disparate security and enterprise it tools. Responsible for planning, designing...
on experience with formal test design tools. PREFERRED SKILLS (RANK IN ORDER OF IMPORTANCE): 5+ years large enterprise...
EXPERIENCE.. MUST HOLD AWS OR AZURE CERTIFICATION. PREFERRED CERTIFICATIONS: AWS CERTIFIED CLOUD SOLUTIONS ARCHITECT...
About this Position: Job Title: Lead Penetration Tester SCOPE OF TECHNICAL ENVIRONMENT: Internal Testing: A machine and a set of working access credentials will be provided by University. External Testing: Shall include vulnerability ...
About this Position: Job Title: Security Analyst General Duties and Responsibilities: Perform detailed architectural reviews and risk analysis of security related requests in order to make sound decision making recommendations, such a...
About this Position: Job Title: Quality Assurance Tester (QAT) Resource(s) Experience Requirements: Working Team: Quality Assurance Testing (QAT) 5+ years' experience with: Azure DevOps (ADO). Test cases/test plans. Regression...
About this Position: Job Title: Business Analysis Support Resource(s) Experience Requirements: Working Team: Business Analysis 5+ years' experience with: Requirements gathering Communication with business partners Skills in worki...
About this Position: Job Title: Cybersecurity Penetration Tester Requirements: The selected consultant will perform an external penetration test on the staging Tax website to assess the extent of a compromise an attacker can achieve b...
using best practices and infrastructure-as-code tools. Design and manage enterprise API Gateway solutions, including... Qualifications: Seven (7) years of experience with developing and implementing technical solutions to help mitigate security...
About this Position: Job Title: Penetration Tester Assessment Goal: Obtain sensitive data from County database (Anonymize data in documentation/reports). Compromise of an intermediary device used by privileged users to access the Da...