Where
Where

Security officer jobs in Mississippi (24 jobs)

Sort by:
  • Scadea Solutions Inc
  • Jackson
... Security Officer 6+ Month Onsite : Jackson MS Developing and maintaining agency-specific security ... the state information security listserv. Monitoring security applications, activity logs ... the agency utilizing approved security software and hardware. ...
3 days ago
... Developing and maintaining agency-specific security plans, policies, and procedures.Interacting ... in the state information security listserv.Researching IT industry ... it affects client specifically.Monitoring security applications, activity logs, resources ...
a day ago
  • Talent Group
  • Jackson
... and maintaining agency-specific security plans, policies, and procedures.Interacting ... in the client's information security list serviceResearching IT industry for ... it affects client's specifically.Monitoring security applications, activity logs, resources ...
2 days ago
... 2029719 Job Description: The Information Security System Administrator is a hands-on ... technical expertise. The Information Security Systems Administrator is responsible for ... management (SIEM). The Information Security Systems Administrator is responsible for ...
a day ago
  • Capricorn Systems, Inc.
  • Jackson
Description: Cyber Security Engineer 12+ Months Jackson, MS ... performing a wide range of complex security procedures and processes necessary to ... procedures and processes to maintain security. Conducts complex IT data and ...
10 days ago
  • Swift Strategic Solutions Inc
  • Jackson
... is looking for a Chief Technology Officer to work on their ongoing ...
3 days ago
  • E-Solutions, Inc.
  • Jackson
... you. Job Title: Chief Technology Officer Duration: 2+ Year's (Contract) Location: Jackson ...
4 days ago
Description: Chief Technology Officer (CTO) 12+ Months Jackson, MS ( ...
4 days ago
  • NextRow Inc.
  • Jackson
... : Job Title: MSDH Chief Technology Officer Location: Jackson, MS Duration: Long ...
4 days ago
  • Talent Group
  • Jackson
... performing a wide range of complex security procedures and processes necessary to ... procedures and processes to maintain security.Conduct complex IT data and ... security forensic investigations.Conduct internal vulnerability ...
4 days ago
  • RICEFW Technologies Inc
  • Jackson
... performing a wide range of complex security procedures and processes necessary to ... procedures and processes to maintain security. Conducts complex IT data and ... security forensic investigations. Conducts internal vulnerability ...
10 days ago
  • Beacon Systems, Inc
  • Jackson
Description: Position: Cyber security Analyst Location: Jackson MS 39211 ... performing a wide range of complex security procedures and processes necessary to ...
8 days ago
  • INNOVIT USA INC
  • Jackson
... performing a wide range of complex security procedures and processes necessary to ... procedures and processes to maintain security. Conducts complex IT data and ...
3 days ago
  • Key Business Solutions, Inc.
  • Jackson
... performing a wide range of complex security procedures and processes necessary to ... procedures and processes to maintain security.Conducts complex IT data and ...
3 days ago
  • RedSalsa Technologies, Inc.
  • Jackson
... performing a wide range of complex security procedures and processes necessary to ... procedures and processes to maintain security. Conducts complex IT data and ...
10 days ago
  • Get A Whiz
  • Jackson
... of ensuring the safety and security of our information systems and ... perform a wide range of complex security procedures and processes to protect ...
5 days ago
  • Skywalk Global
  • Jackson
... performing a wide range of complex security procedures and processes necessary to ... procedures and processes to maintain security. Conducts complex IT dat
8 days ago
... performing a wide range of complex security procedures and processes necessary to ... procedures and processes to maintain security.
10 days ago
  • Intellisoft Technologies
  • Jackson
... performing a wide range of complex security procedures and processes necessary to ... procedures and processes to maintain security. Conducts complex IT data and ...
10 days ago
  • MRoads
  • Jackson
... cybersecurity tools used for routine security related tasks. Example: Nmap, Wireshark ...
8 days ago
  • 1
  • 2