- UpvoteDownvoteShare Job
- Suggest Revision
The potential candidate will work both on their own and part of a team to support client engagements, including security program assessments, build out of security program capabilities (such as risk management, vendor risk, identity & access management, and data security), delivery of user and security awareness training, administration of GRC tools, and support of outsourced security capabilities (such as vendor risk management and compliance as-as-service.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Familiarity with: Zero Trust Network Access (ZTNA) and Secure Access Service Edge (SASE) frameworks, Identity, Credential, and Access Management (ICAM) (OKTA), Cloud Workload Protection Platform (CWPP), Security Operations Center (SOC) Operations, Vulnerability Threat Management, and Compliance Formal Education Master of Science degree (or higher) in one of the following: computer science, electronics engineering, computer engineering, computer science, information technology, or cybersecurity.
ExpandApply NowActive JobUpdated 12 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Skills, Experience and Requirements As a successful Staff Cyber Security Lab Engineer, you will have: BS in Engineering or equivalent technical degree with 8+ years of experience in Computer Science, Information Security, or Risk Management.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The solutions we’ve created have: Saved lives in the California wildfires and southern U.S. flooding Provided security for the 2020 Presidential Inauguration, Super Bowl, and post-attack Boston Marathon Enabled augmented-reality training environments for surgeons Increased transparency and promoted patient wellness in hospitals and senior care facilities Combined computer vision and robotics to automate dangerous manual labor tasks And much more.
Full-timeExpandApply NowActive JobUpdated 12 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Six months experience working as a law enforcement officer/deputy, security/loss prevention officer, or security officer; OR Completion of a certificate/post-high school degree program in computer science/closely related field from an accredited institution; OR Special training in surveillance systems/operations.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Answer new interns' questions on routine processes such as onboarding/badging; new employee orientation, internet, and intranet access; ES&H or safety procedures; payroll and time sheets; training; meeting schedule and location; security escorting for meetings in a tech area; ordering computer peripherals, etc.
InternExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Global Information Assurance Certification (GIAC) Security Essentials Certification Years of Professional Experience 10+ years’ experience in cybersecurity Desired experience Risk Management Framework (RMF), Cybersecurity Framework (CSF), Federal Information Security Modernization Act (FISMA), and FedRAMP experience.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Training or Certifications including CISSP, CSSLP, Security +, Cloud +, Certified Cloud Security Professional (CCSP), AWS certifications, or equivalent. Product Security Software Engineer (Mid-Level or Experienced)Company:The Boeing Company.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Computer security experience combined with risk analysis, audit, and compliance objectives is desired. Broad experience across Information Security domains such as governance, risk & compliance, incident response, identity & access management, penetration testing, e-discovery & forensics, etc.
ExpandApply NowActive JobUpdated 12 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This exciting grant represents NTIA's ( National Telecommunications and Information Administration) largest award under the Public Wireless Supply Chain Innovation Fund. Learn more about the grant here: In this role, you will: Utilize security testing platforms like Keysight, Viavi, and Tenable for testing new ORAN hardware and software.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Performs Incident Handling duties which can be minor or major security incidents within the defined Computer Security Incident Response process. B.S. in Computer Science, Computer Engineering, MIS, or related degree and a minimum of tfive (5) years of related experience in Information Security or an equivalent combination of education, training or experience.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Penetration Tester Job Category: Information Technology Time Type: Full time Minimum Clearance Required to Start: TS/SCI with Polygraph Employee Type: Regular Percentage of Travel Required: None Type of Travel: None What You'll Get to Do: Perform computer network evaluations to include penetration security assessments in a cybersecurity red team environment.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Must possess strong knowledge of business, information security and/or computer science as normally obtained through the completion of a bachelor's degree or equivalent combination of relevant education, technical, business and healthcare experience.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
We are turning “science fiction” into everyday reality through technologies such as superconducting, 3D integrated circuits or computer chips, carbon nanotubes, photonic logic devices, micro electro-mechanical systems and other emerging device topologies.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Security Software Engineer - Tegra page is loaded. Tegra Security System Software Engineer. Security Software Engineer - Tegra. For over 25 years, NVIDIA has been revolutionizing computer graphics, PC gaming, and accelerated computing.
Full-timeExpandApply NowActive JobUpdated 4 days ago
computer security jobs
FEATURED BLOG POSTS
What is a W-9 and How to Fill One Out
When you began working for yourself, you probably didn’t account for the tax reporting work that will fall on your shoulders each year. If you’re a freelancer, independent contractor, or business owner, filing your taxes is not as simple as uploading your W-2 form into some online tax preparation software. Most self-employed people need to complete a W-9 as a step for accurately reporting their earnings to the IRS. Below, you can learn how to fill out a W-9 and when to submit it.
Tightening the HR budget in 2023
With the state of the economy still uncertain, 2023 is expected to be approached with much anticipation. Human Resource leaders have many concerns, including how they will manage to accomplish their goals with budget belts already getting snug. Let’s look at some of the factors that the new year is projected to bring for HR and how to prioritize budgets to reach human capital objectives.
A Comprehensive Guide to Becoming a Better Conversationalist
Have you ever stood awkwardly next to someone at a party because you didn’t know what to say to them? How about at a networking event or on a first date? You're not alone if you’ve ever experienced this uncomfortable silence. Many people struggle to master the art of being a great conversationalist.
Why is Non-Verbal Communication Really Important?
In a world where words and phrases rule daily communication, you may wonder why non-verbal communication is important. Whether you realize it or not, you communicate more with nonverbal actions than you do with verbal communication. When you interact with your peers, people are reading your body language, facial expressions, voice, and many other factors that help fill in blanks that words can't fill.
Making Hybrid Work More Efficient
Covid was a catalyst for change in the work environment. Keeping people safe and helathy was the initial goal for employers, but the unintended result was the considerable demand in remote work. Now, onsite work has been dramatically altered to remote work, which is now transforming into a combination of the two: hybrid work.
How Can HR Technology Help Retain Employees?
Human resources' rapid adoption of technology has led to new ways of streamlining human capital management. Based on the IEE Global Study, these technologies changed how HR handled recruitment and retention in 2022. This includes tech like
Why is Time Management Important? 10 Crucial Importances of Time Management
We’ve all been there before. What starts as a relaxing evening scroll quickly becomes a full-blown binge. You blink, and it’s midnight - throwing off your entire next day before it even starts. And at its worst, this indulgence might leave you feeling behind on things you planned to finish that night. This is why time management is important.