Description: A venture-backed AI security SaaS company is looking to ... -powered applications used by enterprise security teams. This role focuses on ... , cloud-based applications that power security operations for Fortune 500 customers ...
8 days ago
... connectivity and enable event-driven architectures. Connects the enterprise by defining ... -SAP systems. Produces reference integration architectures by leveraging expert input from ...
23 days ago
$146,632
a year
... effectiveness of foreign intelligence and security services and/or terrorist threats ... of the Air Force, national security, and public safety. PART-TIME ...
25 days ago
... the implementation of modern authentication architectures, federation patterns, and identity provider ...
3 days ago
... the implementation of modern authentication architectures, federation patterns, and identity provider ...
3 days ago
... and architect next generation application architectures across multiple domains including APIs ...
3 days ago
... to both legacy and modern architectures (core distribution an
9 days ago
... the implementation of modern authentication architectures, fe
13 days ago
... the implementation of modern authentication architectures, federation patterns, and identity provider ...
16 days ago
... the implementation of modern authentication architectures, federation patterns, and identity provider ...
16 days ago
... ), distributed data processing, Delta Lake architectures, and modern data engineering practices ...
18 days ago
... ), distributed data processing, Delta Lake architectures, and modern data engineering practices ...
26 days ago
... Ensure compliance with data governance, security, and regulatory policies M
a day ago
... with particular attention towards safety, security and asset protection. Assigns, tracks ...
2 days ago
... role involves overseeing IT strategies, security, and operations to ensure the ...
3 days ago
... , ensuring reliability, data integrity, accessibility, security, and compliance with academic calendars ...
18 days ago
... requirements Manage user provisioning workflows, security roles, and permission structures for ...
19 days ago
... within a mission-critical, enterprise physical security environment. You'll define product ...
19 days ago
... system lifecycle management, performance monitoring, security, and databas
23 days ago
... role assignment, network and data security policies, application access controls, and ...
23 days ago