Average salary: $112,364 /yearly
More statsGet new jobs by email
- ...safety procedures, emergency response protocols, and incident reporting practices. • Familiarity with surveillance systems, access control systems, and basic security technology preferred. • Fluent in English and Spanish. Skills and Competencies • Ability to...Access control
- ...patrols and inspections of buildings and facilities • Issue required vehicle passes to authorize personnel. • Monitor electronic access control and report violations • Monitor radio-frequency identification (RFID) systems and respond to alarms indicating unauthorized...Access controlContract workWork experience placementLocal areaImmediate startFlexible hoursNight shiftRotating shift
- ...tech and marketing technology stack (tool selection criteria, access/permissions, documentation, vendor coordination, platform change... ..., identity considerations, consent signals, access controls) Build scalable governance toolkits (templates, policies, QA...Access controlWeekend work
- ...Improvement Ensure compliance with applicable data protection and privacy regulations Maintain audit trails and manage system access controls. Identify opportunities to automate workflows and improve operational efficiency without compromising data integrity....Access controlShift work
$18.14 per hour
...secure, or arrange to correct security violations and initiate necessary reports; receives, issues and account for keys, locks, and access control passes; monitors fire/chemical agent/intrusion detection systems and other facility protection devices/ alarms. Maintains work...Access controlContract workFor contractorsWork at officeLocal areaImmediate startFlexible hoursShift workNight shiftRotating shift$100k
...where you own the technical vision. Not a staff augmentation seat. Not someone else's roadmap. This position requires access to export-controlled information under ITAR (22 CFR §120–130). Applicants must be U.S. citizens as defined by 8 U.S.C. §1324b(a)(3). iTERRA Solutions...Access controlFlexible hoursShift work- Job Description Job Description Description: ~ Help Desk Technicians will serve as the first point of contact to all employee technical assistance requests ticketing system. The technician will provide on-site and remote assistance for these requests by utilizing...SuggestedWork experience placementWork at officeRemote work
- ...Network Security: Implementing firewalls and encryption to protect sensitive transportation data and prevent unauthorized access to traffic control systems. Data Center Management: Maintaining the core network infrastructure within DDOT data centers, ensuring high...Access control
- ...calculations, and interference analysis. Security System Architecture: Serve as a SME for Physical Security systems, including Access Control (ACS), Video Surveillance (SVS/CCTV), and intrusion detection. Documentation: Develop and approve comprehensive design...Access controlLocal areaRemote work
- ...technologies. Strong understanding of TCP/IP networking and network security concepts. Experience with firewall policy management, access control, and threat detection. Familiarity with network diagnostic and monitoring tools such as Wireshark. Experience troubleshooting...Access control
- ...Responsibilities: Manage SAP Security role assignments and user access Work extensively with GRC (Governance, Risk & Compliance) for... ...Security Proven experience with GRC role assignment and access control Good understanding of user roles, authorizations, and security...Access controlRemote work
- ...Reliability Engineer (SRE) with strong expertise in Identity & Access Management (IAM) and AWS Cloud Services. Key Responsibilities... ...AWS Develop and maintain IAM policies, roles, and access controls Ensure high availability, reliability, and performance of...Access control
- ...Services Engine (ISE): A major focus for current DOT roles is managing and administering the Cisco ISE environment for network access control. IPv6 Transition: Leading the enterprise-wide transition from IPv4 to IPv6 across various network domains....Access control
- ...metrics. Security & Governance Implement enterprise-grade security including: SSO integration (SAML, OAuth, Google IAM) Role-based access control (RBAC) Ensure data governance, compliance, and auditing. For applications and inquiries, contact: ****@*****.***...Access controlRemote work
- ...across C&I and CRE portfolios. This role focuses on identity and access management, deal structuring, deal pipeline configuration,... ...system roles and up to 40 users Enforcement of role-based access controls within standard CreditLens capabilities Support configuration of...Access control
- ...Location: Mckinney, TX (Hybrid) Job Description: The Identity & Access Management (IAM) team plays a pivotal role in our Cybersecurity... ...identity lifecycle, authentication, authorization, and access controls. Collaborate across departments to define RBAC models, MFA...Access controlContract work
- ...Google Apps Script, Python, PowerShell, GAM). Security and governance implementation (DLP, data residency, conditional access, OAuth, compliance controls). Experience with large-scale, global rollouts or enterprise migrations. Knowledge of IT asset management and license...Access control
- ...Google Apps Script, Python, PowerShell, GAM) Security and governance implementation (DLP, data residency, conditional access, OAuth, compliance controls) Experience with largescale, global rollouts or enterprise migrations (e.g., M365 Google Drive) Knowledge of IT asset...Access control
- ...Responsibilities: Design and implement secure identity and access management (IAM) solutions using Microsoft Entra ID... ...Kerberos) Experience implementing identity governance and access controls (RBAC, Conditional Access, PIM) Solid experience with AWS cloud...Access control
- ...technology environments. This role focuses on assessing IT controls, validating remediation activities, and ensuring AML systems... ...Evaluate IT general controls (ITGCs), including change management, access management, SDLC, and security controls Assess system...Access controlContract workRemote work
- ...Architecture to implement and continuously improve governance controls across Power Platform and other AI solutions. Work with Information... ...ensure security hardening activities (configuration baselines, access controls, monitoring, auditing, and secure-by-default standards...Access control
- ...best practices for: Data modeling Data quality Metadata management Versioning of datasets Governance and access control ~ Guide teams on ETL/ELT patterns and integration with AI workflows AWS Platform & Integration Architect...Access control
- ...administrator will manage workspace configuration, cluster policies, user access, integrations with cloud services, and ongoing platform... ...roles, and permissions using IAM, SCIM, and role-based access control (RBAC). ~8 Required Proficiency with Apache Spark concepts,...Access control
$90 - $130 per hour
...efforts across a cloud environment Stay hands-on with monitoring, threat detection, and incident response Manage identity, access controls, and security policies Perform security assessments and address vulnerabilities Strengthen and harden cloud systems...Access controlContract workWork at officeLocal area- ...Skilled professional responsible for implementing identity and access management solutions using SailPoint's IdentityIQ platform. The... ...and comply with relevant regulatory standards. Implement access control policies, role-based access control (RBAC), and other security...Access controlRemote work
- ...web applications, REST APIs, and cloud-backed services. Identify and validate vulnerabilities including injection flaws, access control issues, authentication/authorization weaknesses, SSRF, deserialization, and logic bugs. Evaluate LLM-based systems and AI...Access control
- ...platforms and provide guidance for migrating logging strategy, access requirements, and performance requirements into a Self-Hosted Falcon... ...needs Advise on configurations such as: Role-Based access controls LogScale and Kubernetes environmental variables JVM...Access controlRemote work
- ...configuring, testing, implementing and supporting LAN solutions. Technologies supported includes: Cisco switches, firewalls, wireless controllers, access points, F5 load balancers, Cisco's Identity Services Engine (ISE), Cisco's Network Access Control (NAC), and other network...Access controlPermanent employmentWork at officeLocal area3 days per week
- ...Qualifications 7+ years of experience in IAM, identity engineering, or access management roles. At least 3 years of hands-on Okta... ...on policies, enrollment policies, password policies, and access controls within the Okta ecosystem. Build and maintain Okta configurations...Access controlFor contractorsRemote work
- ...automation workflows Manage configuration artifacts using version-controlled configuration management practices Eliminate configuration... ...lifecycle practices Secrets management and role-based access control Experience in regulated industries such as MedTech...Access control
