- UpvoteDownvoteShare Job
- Suggest Revision
Hands-on experience with security tools for static code analysis, dynamic application security testing (DAST), and vulnerability scanning, using tools such as Fortify, Acunetix, and Prisma CloudProficiency in scripting languages (e.g., Python, Bash) for automation and tool integration.
ExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Domain Expertise - Evaluate and implement industry standard enterprise-wide security technologies and concepts (Application Security, Data Loss Prevention, Security Event Management, GRC Tools, Threat and Access Management, among others), web-related technologies (such as, Web applications, Web Services and Service Oriented Architectures), network-related protocols, and next generation/ modern technology requirements (evolving encryption environment.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Lead a team of security engineers for delivery of Cybersecurity project management, continuous diagnostics and mitigation, threat mitigation and incident response, security architecture support, critical infrastructure protection, patch management, vulnerability management, risk management, information assurance, penetration testing, cybersecurity services, and Security Assessment and Authorization (SA&A) documentation.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Exceptional SAP Security functional knowledge across GRC, ECC, SOX, SOD, role design and governance processes. Must have detailed understanding and hands on experience in SAP Security, setting up master-derived roles, updating role authorizations, transporting security changes, usage and maintenance of Analysis authorization in BW.Experience with cloud deployment models, secure coding, cyber security, data migration, and data security a plus.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
CGI Federal has an exciting opportunity for a DevOps Engineer SME with a strong security focus and extensive experience to help with DevOps security initiatives and implement best practices in the areas of infrastructure, network security and secure coding, as well as compliance and policy.
ExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Working Title: Network Security Analyst Classification Title: Network Analyst - CareerPosting Details Priority Application Date (Posting will remain open until filled): Tuesday, April 9th @ 11:55pm PDT Hiring PreferenceEligible on-campus applicants in California State University Employees Union (CSUEU) Bargaining Units 2,5,7, and 9 will be given first consideration in the recruitment.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Selected incumbent will support in the area of information system cybersecurity management ensuring security posture and compliance tasks, to include but not be limited, program and information system / application support ensuring security in all phases of system engineering process, supporting information system / application Risk Management Framework (RMF) task(s) in accordance with NIST Special Publication 800-37, addressing and documenting system requirements (controls.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Implement and manage security tools and technologies for application security, cloud security, and identity and access management (IAM). Minimum 2-5 years of experience in application security, cloud security, or a related cybersecurity role.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with the following: JEE (EJB, JPA, JTA, JAX-B, JAX-RS, JAX-WS), SQL, application servers (Tomcat, WebLogic, JBoss), scripting. Experience with Web Application User Interface Development, knowledge of databases and structures, and/or experience working with JSON, HTML, XML, XSLT.Experience with technologies underlying cryptographic systems (symmetric and asymmetric cryptography, ASN.1 encoding, XML canonicalization, digital signatures)Experience developing on Windows, and/or Linux operating systems.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with at least one backend application framework such as Django or Flask. Perpay Credit Card: Expands access to the flexibility and benefits of a World Mastercard by removing common barriers like high security deposits and low approval odds.
ExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The associate is responsible for conducting internal assessments in partnership with information security officers, application owners, and service owners with PCI-DSS compliance tasks such as evidence preparation, evidence gathering and review, aligned to the PCI-DSS requirements.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Advanced knowledge and understanding of security engineering, system and network security, authentication and security protocols, cryptography, or application security.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Engage with key stakeholders to understand the current state of application security, contributing to the security program to address gaps. Perform code reviews, static and dynamic analysis to ensure the security of application codebase.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Minimum ten years of recent experience with at least three of the following: Security Architecture, threat modelling experience, identity management and authentication, software development, cryptography, penetration testing, cloud security, mobile security, and network security.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
KPMG is currently seeking a Director, Senior Cloud Security Architect to join our Global Information Solution Group which is part of KPMG International. In-depth understanding of cloud security principles, best practices and industry frameworks such as CSA, CIS, NIST, and ISO.
Full-timeExpandApply NowActive JobUpdated 6 days ago
application security jobs
FEATURED BLOG POSTS
How Long Do Background Checks Take for Pre-Employment
Many jobs require a background check. For some companies, this is a matter of company policy. In other jobs, such as finance, childcare, and security, the government often requires background checks. While there are varying levels of intensity, for most people, a background check is nothing to worry about. In fact, the biggest question is often how long does a background check take? Here’s what job seekers and applicants need to know about background checks before they apply to new jobs.
The Best Remote Jobs: Where & How to Find Them
The Covid-19 pandemic hasn’t been easy on any of us, but if there’s one silver lining, it’s the fact that remote work has grown in popularity because of it. Companies that previously weren’t open to their employees working remotely were suddenly forced into allowing it. Since then, they've realized that much of their workforce is happier and more productive. Naturally, this has led to more remote job openings, which is great if you’re interested in this type of position. Read on to learn more about the best remote jobs and where to find them.
In-House vs Outsourcing Recruiting: Which is Better?
When looking at in-house vs outsourcing recruiting, it is important to nail down the benefits for each and whether those benefits outweigh the risks that follow.
How to Write a Short Bio
First impressions can be tricky. When meeting someone in person, it’s likely you have an elevator speech. These short, practiced introductions can help you share more about who you are, what you do for work and other facts about you. While this works well in a live, in-person context, there are many cases where professionals “meet” someone via written form - like social media, a resume, or published work. In these cases, your bio works as your first impression. So, here’s a step-by-step guide on how to write a short bio.
How to Conduct a Performance Review (With Examples)
In a world where the smallest mistake can cost your business tens of thousands in lost revenue, your talent is key to keeping your edge on the market and driving growth. However, managing a workforce of any size can be a challenge. Employees come with their own particular skill set, ambitions and flaws. So, it can be difficult to uncover their individual drivers. Not to mention the challenges brought on by the hybrid and remote working models where in-person interactions have become few and far between.
How to Effectively Recruit Employees
Today, hiring and retaining talent looks much different than it did only two or three years ago. Financial instability and the strain on our mental health brought on by the pandemic has made everyone more wary and selective of their workplace and employer. Whereas in the past people might have prioritized promotions and financial reward, today they look at other factors such as workplace flexibility, personal fulfillment and values alignment.
How Many Hours is Part-Time vs. Full-Time Work?
Growing up you watched your parents shuffle to and from the office, held hostage to their 9 to 5. If jammed-packed schedules and deadlines sound frightening, you might consider pivoting your search to part-time jobs. In fact, even employers have shifted their preference, selecting more people open to the idea of flexible working hours.