Job description:
Designs, develops, tests, and debugs software applications and systems
Completes software builds through consistent development practices, including the use of tools, common components, and documentation with guidance from peers and leaders
Completes code reviews/Secure code reviews and automated testing to maintain high-quality code standards with guidance from peers and leaders
Supports and monitors software across test, integration, and production environments
Adheres to security and regulatory best practices to ensure software compliance
Collaborates and co-creates effectively with teams in product and the business to align technology initiatives with business objectives
Completes the development and maintenance of security policies, procedures, and best practices to ensure compliance with industry standards and regulatory requirements
Collaborates with software development teams to integrate security into the software development lifecycle, including conducting code reviews and providing support on secure coding practices
Implements encryption technologies to protect sensitive data in transit and at rest, ensuring the confidentiality and integrity of the organization's data, with guidance from peers and leaders
Conducts research on emerging security threats and technologies to stay updated and maintain situation awareness on emerging and disruptive technologies
Conducts testing and evaluation of new cybersecurity technologies, following SDLC practices for deployment and testing, while managing changes in release management to maintain system integrity and security
Drafts detailed technical documentation and reports on security assessments, findings, and remediation efforts to provide insights and recommendations for improving the organization's security posture, under guidance from peers and leaders.
Job description:
Designs, develops, tests, and debugs software applications and systems
Completes software builds through consistent development practices, including the use of tools, common components, and documentation with guidance from peers and leaders
Completes code reviews/Secure code reviews and automated testing to maintain high-quality code standards with guidance from peers and leaders
Supports and monitors software across test, integration, and production environments
Adheres to security and regulatory best practices to ensure software compliance
Collaborates and co-creates effectively with teams in product and the business to align technology initiatives with business objectives
Completes the development and maintenance of security policies, procedures, and best practices to ensure compliance with industry standards and regulatory requirements
Collaborates with software development teams to integrate security into the software development lifecycle, including conducting code reviews and providing support on secure coding practices
Implements encryption technologies to protect sensitive data in transit and at rest, ensuring the confidentiality and integrity of the organization's data, with guidance from peers and leaders
Conducts research on emerging security threats and technologies to stay updated and maintain situation awareness on emerging and disruptive technologies
Conducts testing and evaluation of new cybersecurity technologies, following SDLC practices for deployment and testing, while managing changes in release management to maintain system integrity and security
Drafts detailed technical documentation and reports on security assessments, findings, and remediation efforts to provide insights and recommendations for improving the organization's security posture, under guidance from peers and leaders.
Research Administrator 2 (4486C) - 80710 About Berkeley At the University of California, Berkeley, we are dedicated to fostering a community where everyone feels welcome and can thrive. Our culture of openness, freedom and belonging make it a special place for students...
Job Description: GIS Enterprise Web Solutions Specialist Position Overview We are seeking a highly skilled GIS Enterprise Web Solutions Specialist to design, develop, and manage web-based geospatial applications and enterprise GIS systems. The ideal candidate will...
...Our client is seeking a dynamic and experienced Chief Marketing Officer (CMO) to join their executive team. The CMO will play a pivotal role in shaping the brand's voice and driving marketing strategies that resonate with current and potential customers. To learn more...
...Job Description: Cable Installer (Secret) Position Title: Cable Installer Location: Hawaii Duration: 4-6 weeks Clearance Required: Secret Application Deadline: August 21, 2025 Job Overview: We are seeking a skilled Cable Installer with an active Secret...
...Polisher/Jeweler - Secaucus, NJ Team Overview: Our Jewelry team is dedicated to delivering excellence from the time a customer places an order to the moment a customer opens their package. The team coordinates and executes day-to-day operations of jewelry production...