كلما زادت طلبات التقديم التي ترسلينها، زادت فرصك في الحصول على وظيفة!
إليك لمحة عن معدل نشاط الباحثات عن عمل خلال الشهر الماضي:
عدد الفرص التي تم تصفحها
عدد الطلبات التي تم تقديمها
استمري في التصفح والتقديم لزيادة فرصك في الحصول على وظيفة!
هل تبحثين عن جهات توظيف لها سجل مثبت في دعم وتمكين النساء؟
اضغطي هنا لاكتشاف الفرص المتاحة الآن!ندعوكِ للمشاركة في استطلاع مصمّم لمساعدة الباحثين على فهم أفضل الطرق لربط الباحثات عن عمل بالوظائف التي يبحثن عنها.
هل ترغبين في المشاركة؟
في حال تم اختياركِ، سنتواصل معكِ عبر البريد الإلكتروني لتزويدكِ بالتفاصيل والتعليمات الخاصة بالمشاركة.
ستحصلين على مبلغ 7 دولارات مقابل إجابتك على الاستطلاع.
GPP Database Link
Job Summary:
Conducts software and systems engineering and software systems research to develop new capabilities, ensuring cybersecurity is fully integrated. Conducts comprehensive technology research to evaluate potential vulnerabilities in cyberspace systems.
Key Responsibilities:
Conducts vulnerability scans, analyzes findings and makes recommendations to help mitigate or eliminate vulnerabilities in systems. Identifies systemic issues based on the analysis of vulnerability findings, configuration assessments and derived metrics. Troubleshoots hardware/software interfaces and interoperability between integrated systems. Conducts system engineering and research to develop new solutions that ensure cybersecurity controls are integrated into the enterprise to support business goals. Integrates and aligns cybersecurity system configurations to ensure system performance meets documented requirements. Conducts and/or supports authorized penetration tools and testing on enterprise assets. Designs hardware, operating systems, and software applications to adequately address cybersecurity requirements.
Competencies:
Balances stakeholders - Anticipating and balancing the needs of multiple stakeholders.
Instills trust - Gaining the confidence and trust of others through honesty, integrity, and authenticity.
Manages complexity - Making sense of complex, high quantity, and sometimes contradictory information to effectively solve problems.
Optimizes work processes - Knowing the most effective and efficient processes to get things done, with a focus on continuous improvement.
Tech savvy - Anticipating and adopting innovations in business-building digital and technology applications.
Cybersecurity System Integration - Creates, writes, tests and deploys scripts, code, configurations and controls utilizing the appropriate standards, best practices and tools to provide system integration and data fusion that enable better cybersecurity visibility, assessment and automation.
Data Administration - Administers data storage and applications through proper training and coordinated efforts with internal and external partners to maintain system health and uptime.
Network Services - Installs, configures, tests, operates, maintains and manages network security equipment and software through proper training and collaboration with internal and external partners to enable the secure sharing and transmission of data in support of cybersecurity and business information systems.
Systems Administration - Installs, configures, troubleshoots and maintains server configurations through proper training and coordinated efforts with internal and external partners to ensure the confidentiality, integrity and availability of data and systems.
Systems Security Requirements Planning - Consults with customers through attending cross-functional meetings to gather and evaluate security requirements and translates these security requirements for incorporation into a technical solution(s); provides guidance to partners on how to best apply security requirements as part of the Cummins governance processes through consultation to reduce business risk.
Technology Research and Development - Conducts technology assessment and integration processes through proof of concept projects to evaluate its utility.
Troubleshooting - Diagnoses and resolves the customer-identified issue by utilizing appropriate department standards to satisfy customer expectations.
Values differences - Recognizing the value that different perspectives and cultures bring to an organization.
Education, Licenses, Certifications:
College, university, or equivalent degree in Computer Science, Information Technology, Business, or related subject, or relevant equivalent experience required. This position may require licensing for compliance with export controls or sanctions regulations.
Experience:
5-8 years of cybersecurity work experience is required. Experience with Cloud technology and concepts preferred.
Core Responsibilities:
Must have skills and experience:
Nice to have skills and experience:
لن يتم النظر في طلبك لهذة الوظيفة، وسيتم إزالته من البريد الوارد الخاص بصاحب العمل.