- UpvoteDownvoteShare Job
- Suggest Revision
We have the proven expertise to plan, build, and run successful security programs across Risk Management, Cyber Digital Transformation, Threat Management, Security Operations - Managed Services, and Identity and Data Management.
Full-timeRemoteExpandUpdated 28 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with identity and access management (IAM) solutions, RBAC and MFA. Implement and manage IAM solutions to ensure proper user authentication, authorization, and access control in the cloud environment.
ExpandUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Operate and manage Cloud Security Posture Management (CSPM) and Cloud Workload Protection Platforms (CWPP), such as Wiz, Orca, Prisma, and Rapid7 ICS. Intermediate levelproficiency in Identity & Access Management (IAM) Security, including experience with architecting AWS IAM roles & policies using complex conditionals.
$175,000 - $220,000 a yearExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Current Network Security applications, services and appliances including Identity Management, Network Access Control, Application Layer Inspection, Content and Malware Filtering, Data Loss and Intrusion Prevention, zero-day threats, IPsec and SSL VPN, PKI, Two-Factor Authentication and other.
ExpandUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
4) Current Network Security applications, services and appliances including Identity Management, Network Access Control, Application Layer Inspection, Content and Malware Filtering, Data Loss and Intrusion Prevention, zero-day threats, IPsec and SSL VPN, PKI, Two-Factor Authentication and other.
ExpandUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
At a glance, DGR Systems was founded in 2009 in Tampa, Florida, and provides full-service solutions in the areas of Modern Workplace (Endpoint Solutions, Collaboration), Security (Identity and Access Management, Zero Trust, Information Protection) Modern Infrastructure and Cloud, and Applications (Collaboration Apps, SQL Reporting, Power Platform.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Strong understanding of security best practices in cloud development, including identity and access management, data protection, and compliance standards. · Azure Cloud Services: Strong experience with Azure for cloud services development, familiar with Azure DevOps, Azure Functions, Azure SQL Database, and other Azure managed services.
ExpandUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Implement core cloud security capabilities such as identity & access, data protection, security controls and compliance, vulnerability management, threat detection and response, and logging/monitoring.
ExpandUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Familiarity with: Zero Trust Network Access (ZTNA) and Secure Access Service Edge (SASE) frameworks, Identity, Credential, and Access Management (ICAM) (OKTA), Cloud Workload Protection Platform (CWPP), Security Operations Center (SOC) Operations, Vulnerability Threat Management, and Compliance.
ExpandUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
For more information or to be considered or the Systems Administrator - Identity and Access Management Job, please contact Thomas McCarthy at. This Systems Administrator serves as the Lead Administrator and provides technical expertise related to identity and user account management, including troubleshooting and operational support of managed directory stores.
$70,000 a yearExpandUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Identity management (user access, RBAC, Application identity mgmt and control). This role will engineer cloud solutions in Azure, AWS, and Google that leverage the following services.
$53 - $58 an hourRemoteExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Proficiency in Microsoft productivity tools and project management software such as Microsoft Project, Teams, and Microsoft Dynamics Project Operations. Strong understanding of project management methodologies, tools, and techniques.
$80,000 - $130,000 a yearFull-timeExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Risk Management Framework (RMF), Cybersecurity Framework (CSF), Federal Information Security Modernization Act (FISMA), and FedRAMP experience. Applicants selected will be subject to a government security investigation and must meet eligibility requirements for access to classified information and be able to obtain a government-granted security clearance.
ExpandUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Support the ZTA management team in recommending and creating technical solutions. Provide system engineering and architectural design support services. Individuals may also be subject to a background investigation including, but not limited to criminal history, employment and education verification, drug testing, and creditworthiness.
ExpandUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Identity and Access Management DevOps Engineer. Develop, enhance, and customize custom-developed and third-party software used in our environment, such as OpenLDAP, Shibboleth Identity Provider, Active Directory, OATH, and Google Cloud Identity Services.
ExpandApply NowActive JobUpdated Today
identity and access management cloud jobs
FEATURED BLOG POSTS
How to Pass a Personality Test with Flying Colors
Whether you’re applying for your first job or looking to move up the career ladder, personality tests aren’t usually the first thing we think about. But surprisingly, they can have a massive impact on how our future employers perceive us. In fact, a 2017 study by the Society for Human Resource Management (SHRM) has found that 32% of U.S. employers use personality tests when hiring for senior management positions, and 28% use them for middle management positions. Personality tests are also used for hourly workers and contractors, though less frequently.
Virtual Reality Job Interviews
With the advent of desktop computers, the arduous task of scouring through weekly job classifieds became a thing of the past. The mid-1990s brought about a new era where job seekers could easily search and apply for jobs online. The introduction of AOL's Instant Messaging feature provided an even faster means for employers and candidates to communicate and schedule interviews. As smartphones became more pervasive in the early 2000s, hiring managers increasingly used phone calls for screening and interviewing candidates. Despite this trend, over 80% of interviews still took place in person.
A Potential TikTok Ban?!
As you may already know, there has been a lot of talk lately about the possibility of a TikTok ban. While this has not yet come to fruition, it's important to consider the implications this could have for businesses and recruiters who rely on TikTok as a platform to market their brand, recruit new talent, and connect with their audience.
The Effects of Workplace Racism and Sexism
One day it's a covert statement to a mother returning to work after maternity leave. Another day it's a lingering gaze at an employee enjoying a culturally rich meal. These microaggressions (or sometimes macroaggressions) can take an employee from a confident, high-performer to one that feels insecure being themselves at work. Your employees engage with people with different ideas and feel most comfortable and valued when they can work without losing their cultural, racial, and gender identity. While most employers know this, why have workplace racism and sexism often been neglected?
When Rage Applying Strikes: How to Identify Unserious Candidates
As the job market remains highly competitive, we have seen a surge in "rage applying." This is when candidates apply to multiple jobs, often without considering whether they are truly interested in the role. Rage applying goes hand-in-hand with quiet quitting. Often, employees want to entertain the thoughts and feelings of leaving their job, but they aren't necessarily serious about leaving yet. Meanwhile, other employees engaging in this trend are actually trying to find a better role. As a recruiter, it can be hard to identify who are the real applicants in a sea full of quiet quitters, but understanding rage applying and identifying red flags will certainly help.
How to Increase Job Ad Exposure
In today's competitive job market, writing quality job ads is critical for attracting top talent to your organization. While networking and candidate referrals are prime real estate for finding qualified candidates, nothing beats the tried-and-true method of writing an extraordinary job ad. But while writing a great job ad is the first step, what's more important is increasing visibility. You could have the most detailed, well-written ad on the internet, but if no one sees it, then you are wasting time (and potentially money!). Employers often believe that job boards are the root of the problem, but you can learn how to increase job ad exposure by tweaking a few steps of your recruitment process.