. Manage cybersecurity initiatives across IT and OT environments to protect intellectual property and production systems. Lead..., and vendor relationships. Expertise in cybersecurity best practices, particularly for operational technology (OT) and IT/OT...
of industrial network architecture and cybersecurity best practices. Proficiency in vision system integration (e.g., Cognex...—they partner with us because they want real insight into their roles and the people filling them, not a stack of resumes. We focus...
and OT systems supporting manufacturing production. Develop and implement robust cybersecurity measures to protect... manufacturing-specific ERP systems (e.g., SAP, Oracle, Infor). Strong understanding of cybersecurity principles for operational...
and Operational Technology (OT) systems supporting 24/7 manufacturing operations. Implement and manage robust cybersecurity... insight into their roles and the people filling them, not a stack of resumes. We focus on match-driven placements built...
with database integration and Manufacturing Execution Systems (MES). Knowledge of industrial network cybersecurity best practices..., not a stack of resumes. We focus on match-driven placements built around what actually matters: Commute, Compensation, Culture...
with industrial network design and cybersecurity best practices for ICS. Job Titles That Should Apply Controls Engineer, Control... people filling them, not a stack of resumes. We focus on match-driven placements built around what actually matters: Commute...
of industrial network design and cybersecurity best practices for OT environments. Job Titles That Should Apply Controls..., not a stack of resumes. We focus on match-driven placements built around what actually matters: Commute, Compensation, Culture...
. Familiarity with industrial network architecture and OT cybersecurity principles. Job Titles That Should Apply Controls... people filling them, not a stack of resumes. We focus on match-driven placements built around what actually matters: Commute...
. You Have: 3+ years of experience administering Elastic Stack, including Elasticsearch, Kibana, Logstash, Beats, or Fleet... cybersecurity environment such as SOC, SIEM operations, or defensive cyber Knowledge of AI/ML concepts as applied to security...
of the Fortune 100. At Ping Identity, we're changing the way people and businesses think about cybersecurity, digital... across the Buyer and Customer Journey tech stack with a clear eye on TCO, scalability, and speed to value. What You'll...