Displaying 1 - 5 of 5

HCLTech
Frisco, Texas
Role: -Security Architect Location: - Frisco, TX Day 1 Onsite Full time hire Required skills. Accountable for translating private cloud implementation into a well-defined blueprint that uses Cloud Security Products to enhance IT security. Understands the vision and enabler to autonomously cater to user needs. In-depth knowledge of system design and architecture with the technologies and experience
HCLTech
Franklin Lakes, New Jersey
Job Title: - Security Architect Location: - Franklin Lakes, NJ Full time Hire Day 1 Onsite Primary skills: Security Architecture and Engineering, Sec ops, IAM, Network security, Governance risk and compliance General Description: - Candidates must have prior experience designing and integrating diverse information technologies, managing complex system interfaces, and developing secure architecture
HCLTech
Santa Clara, California
We are looking to hire a Network/Network Security Solution Architect with PreSales Exp. for a Fulltime Role in Santa Clara, CA. This is a HYBRID role, with travel as needed. JD: Deep experience (minimum 4 years experience) in one or more of the following areas: Networking and Network Security (FW, Proxy, etc.) Host Protection (EDR/EPP) Identity Management Data leakage prevention Solid technical ba
HCLTech
Los Angeles, California
We are looking to hire a Network/Network Security Solution Architect with PreSales Exp. for a Fulltime Role in Los Angeles, CA. This is a HYBRID role, with travel as needed. JD: Deep experience (minimum 4 years experience) in one or more of the following areas: Networking and Network Security (FW, Proxy, etc.) Host Protection (EDR/EPP) Identity Management Data leakage prevention Solid technical ba
HCLTech
Chicago, Illinois
We are looking to hire a Network/Network Security Solution Architect with PreSales Exp. for a Fulltime Role in Chicago, IL. This is a HYBRID role, with travel as needed. JD: Deep experience (minimum 4 years experience) in one or more of the following areas: Networking and Network Security (FW, Proxy, etc.) Host Protection (EDR/EPP) Identity Management Data leakage prevention Solid technical backgr