BCMC
Jobs at Similar Companies
Similar Companies Hiring
Jobs at BCMC
Let Your Resume Do The Work
Upload your resume to be matched with jobs you're a great fit for.
Success! We'll use this to further personalize your experience.
Recently posted jobs
Information Technology
The Enterprise Architect SME will lead technology mapping, develop workflows for incident response, facilitate stakeholder workshops, and provide documented workflows for governmental cyber-incident responses.
Information Technology
Manage cyber incidents by investigating breaches, correlating data, recommending security practices, and supporting restoration activities for government clients.
Information Technology
Lead Linux Systems Administrator managing RHEL environments and providing technical support for cybersecurity initiatives. Responsible for Ansible automation, Splunk monitoring, and overseeing lab operations.
Information Technology
The role involves supporting ServiceNow operations, designing and developing applications, integrating systems, and ensuring code quality in a remote setting.
Information Technology
The role involves leading requirement sessions, documenting functional and technical requirements, managing user story backlogs, executing test cases, and ensuring quality through Agile methodologies for a ServiceNow program.
Information Technology
The Incident Manager III is responsible for identifying and responding to cyber threats, enhancing vulnerability management efforts, and collaborating with stakeholders to improve cyber security intelligence capabilities.
Information Technology
The Incident Manager II is responsible for gathering and analyzing cyber threat intelligence, collaborating with teams, and improving vulnerability management capabilities while maintaining reports and briefings.
Information Technology
The Cyber Network Defense Analyst monitors network activity, analyzes data for threats, and recommends measures to protect systems. Responsibilities include event correlation, trend analysis, reporting, and developing cyber defense tools and signatures.
Information Technology
Support incident response for cyber-attacks, investigate breaches, develop mitigation plans, track incidents, and collaborate with teams.
Information Technology
The Watch Officer provides technical support for Tier I and II issues, monitors system health, documents problems, and ensures communication with management.


.png)



.png)