- UpvoteDownvoteShare Job
- Suggest Revision
Experience with Azure cloud administration, including management of Virtual Machines, Automation Accounts, Networking services, Network Security Groups, and Azure SEIM Tools like Sentinel and multi-cloud security tools like Defender for Cloud.
Full-timeExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Wharton's Information Security Office is searching for a Director of Information Security to join our Information Security Team. Reporting to Wharton's Chief Information Security Officer this position is responsible for leadership and management of cloud security, security architecture, security engineering, Identity & Access management, DevSecOps, and other key areas of information security for the Wharton School.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of cloud security controls, including tenant isolation, encryption at rest, encryption in transit, key management, vulnerability assessments, application firewalls, SIEM, etc. This role will report to the Director of Hybrid Cloud Security within the Stratascale department.
ExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
In this role, you can collaborate and guide various security teams on using multiple approaches to improve cloud, network, and endpoint security posture across the Microsoft ecosystems, including Azure and Windows.
ExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Deploy and manage security tools such as Palo Alto's Prisma Cloud solution. Current cloud security certifications at Architect, Engineering or increased levels. Be the security expert to engage with teams for the deployment and management activities of connectors, configurations, and development activities within the cloud.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Sr. Security Consultant Hybrid Cloud (M365) will focus on Microsoft 365, directly involved in projects ranging in size and complexity, by architecting, designing, and executing enterprise-level deployments of Microsoft 365 Security and Compliance tools.
ExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Tanium, Defender for Endpoint, Defender for Cloud, CrowdStrike, Proofpoint, Mimecast, Orca, Abnormal. Deep working knowledge of competitive security tools like Proofpoint, Mimecast, CrowdStrike, Tanium, ForcePoint, and Orca.
ExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Docker, Kubernetes, AWS, Azure, Linux, Elasticsearch, Elastic Stack, Logstash, Kibana, Beats, Prisma Cloud, Tanzu, IaC, CaC. DoD8570 IAT II Compliance Certification, including Security+, CCNA Security, or GSEC.
ExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Possessing experience with Oracle Cloud role design across functional (ERP, EPM, OTBI) and technical (e.g. - Security Console, Setup & Maintenance, OIC) domain areas; Identifying key risks and controls, knowledge of Sarbanes Oxley readiness, controls optimization, as well as configuration of controls around security, business process and within the Oracle Cloud RMC modules.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Provide architectural security guidance to DevOps team building cloud infrastructure in compliance with industry standards (PCI-DSS, NIST, CIS, OWASP) in public cloud environmentsBuild threat models and security reporting tools.
Full-timeExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Consulting experience with 3 rd party Email and Data Security tools such as Abnormal, Proofpoint, and Mimecast are needed. Strong infrastructure skills with virtualized cloud networking such as but not limited to routing, DNS, VPN, LDAP-Directory services, and equivalent in AWS, Azure, and GCP.
ExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Relevant industry certifications such as Certified Cloud Security Professional (CCSP), Certified Information Systems Security Professional (CISSP), or Certified Ethical Hacker (CEH.
ExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Export with cloud security in platforms such as AWS and GCP. Conduct ethical hacking and penetration testing on camera devices and web applications to identify vulnerabilities and security flaws.
Full-timeExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with DLP to secure Microsoft Cloud data related to Exchange. Software design, cloud architecture analysis, and design, particularly with Azure. 3+ years of experience designing and implementing public cloud (Azure) environments, solution architectures, and operational models.
ExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Security industry certification but not limited to CISSP, SSCP, CISM, SANS GSEC, ECSA, ECSP, and Security+. Must have experience with CyberArk Cloud Platform, EPM, LCD (CyberArk SaaS Cloud Base.
Full-timeExpandUpdated Today
cloud security jobs
FEATURED BLOG POSTS
How Does Salary Pay Work? (Compared to Hourly Pay)
At the bottom of each job advertisement, companies label a role as salaried or hourly. Both methods will get you paid (yay), but each in very different ways. So, it's essential to figure out how does salary pay work? While employees paid by the hour are paid based on how long they work, employers pay salaried employees a fixed amount.
The Quiet Quitting Phenomenon
The term, quiet quitting, was coined in 2009, but only now is it gaining traction as young Millennials and Gen Z workers are experiencing record levels of burnout. With the pandemic and the state of the economy, young employees are feeling the pressure. So, quiet quitting comes into effect when that pressure is exasperated by work stress and no managerial support.
How Does Salary Range Work (With Examples)
What are your salary expectations? Do you know? Establishing a salary that compensates you fairly and keeps you happy at work can feel like taking a shot in the dark. And employers sure don’t make learning budgets easy!
Guide to Hiring a Teenager
Teenagers are full of life. They bring energy and adaptability that may be hard to get from older workers, but does that mean that hiring teens is beneficial? Well, it depends. As you debate whether or not you should integrate teenagers into your workforce, there are some things that you should know first.
How to Re-apply for Your Old Job Professionally
Have you recently started a new job only to find that you miss your old one? Maybe you didn’t realize how good you had it, and now you regret leaving. Don’t worry. You’re not the first person to feel this way, and you might even be able to return to your old job if you play your cards right.
5 Practical Ways to Remove Bias from your Hiring Process
Many employers think their hiring process is perfect. However, research shows that the hiring processes are generally impartial and unfair, especially if you are part of certain demographics. Women, people of color, people with disabilities, or even people in lower socioeconomic status are more likely to be subject to implicit bias. As diversity and employer branding become major aspects of business, it is important that employers take the lead to identify and remove bias from the hiring process. So, here are 5 practical ways to get you started.
Tips for a Good Character Reference Letter with Examples
Hiring managers love a resume laden with relevant skills and qualifications. Hard skills specific to the role, like SEO strategy or Java programming languages, are easy to qualify using achievements or facts and figures. But how exactly can they verify personality traits, work ethic, relationship management skills, or curious nature during an interview when they barely know you?