communications related to enterprise applications. Documentation, Reporting & Data Management: Oversee end-user training... from violence, we are seeking a Vice President of Enterprise IT Applications to lead the strategic planning, development...
brands in cybersecurity, we take a human-centric approach in everything from product strategy to user experience. Over... Access Management, a new cybersecurity category built for the way people and AI agents work today. As one of the most loved...
. Responsibilities: Support critical end user applications and work in a highly Agile environment as both a mentor and technology... metrics, assess system data, analyze error logs, & capture user reports. Responsible for operations support metrics...
to cybersecurity, data protection, and change management. Collaborate with managers and leadership on ensuring IT aligns with goals... effectiveness and efficiency. Leverage AI to drive end user efficiency and lead AI implementation across the enterprise. Prepare...
and to prevent and defend against unauthorized access to systems, networks, and data. Conduct risk and vulnerability assessments... and inspections of planned and installed information systems to identify vulnerabilities, risks, and protection needs. Evaluate...
to define computing requirements and create end-to-end solutions consisting of hardware and operating system technologies... and performance requirements (DFARS, RMF, NIST Cybersecurity Framework). Install, Convert, and upgrade systems. Develop, revise...
. Leverage comprehensive API ecosystems for automated user lifecycle management, advanced data extraction protocols... stack meets the highest standards for data protection and operational security. Performance Intelligence & Analytics...
. Leverage comprehensive API ecosystems for automated user lifecycle management, advanced data extraction protocols... stack meets the highest standards for data protection and operational security. Performance Intelligence & Analytics...
, and lead all Varonis-related technical support activities. Collaborate with cybersecurity teams, and system owners to enforce... least-privilege access policies and data protection measures. Qualifications What you will do: Minimum Secret clearance (TS/SCI...
include but are not limited to: Lead and perform development and maintenance of end-user focused, object-oriented, data... impactful solutions. Engage in exciting projects in Digital Transformation, Cybersecurity, IT, Data Analytics and more. Ignite...
. To that end, the Protect Pillar encompasses the following areas: Cybersecurity; Enterprise Data Protection and Data Governance... as the program manager for information security projects and is responsible for: Serving as strategic lead for user...
, local internet breakout End user and application security risks - DDoS, malware, phishing, viruses Knowledge... addresses never, ever. We will continue to abide by our and ensure that no user data is sold to advertisers or used to target...
, and implementing advanced data protection protocols across Google, Box and Dropbox, among other SaaS solutions. What You'll... with organizational policies and legal requirements, including GDPR and other relevant data protection regulations. Monitoring...
addresses never, ever. We will continue to abide by our and ensure that no user data is sold to advertisers or used to target... Solution Campaign Manager to join and drive end-to-end campaign strategy for one of Cloudflare's core solutions...
requirements Lead all cybersecurity policies, frameworks, and incident response initiatives Establish and oversee security... to ensure high availability, performance, and end-user satisfaction Implement and optimize ITIL best practices for incident...
, data protection (DLP, encryption), user and administrator account management, SSO, conditional access controls and password..., Application Security, PaaS security, Infrastructure security, Security Monitoring, Resilience and Data protection Assist...
, security incident and event management, data protection (classification/labeling, DLP, encryption), user and administrator... in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through...
access management built with end-to-end encryption. Keeper’s cybersecurity solutions are FedRAMP and StateRAMP Authorized... their environments and translate needs into product functionality Lead agile ceremonies, define user stories, and maintain a prioritized...