- UpvoteDownvoteShare Job
- Suggest Revision
Minimum of 5 years of experience with any combination of the following: mobile security, threat modeling experience, secure coding, identity management and authentication, software development, cryptography, system administration and network security.
ExpandUpdated 18 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The first two initiatives we’ve identified that represent the biggest impact to this purpose are in the Bitcoin space with Bitcoin mining and Bitkey, a self custody Bitcoin wallet.
ExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience in multiple areas of information security, such as: Identity and Access Management Application Security, cryptography and protocols Secure System Development Live Cycle Vulnerability management and penetration testing IT and computer security Network Security Cloud Security Security standards, laws, and compliance.
Full-timeExpandUpdated 17 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with security technologies including Zscaler, Palo Alto, Broadcom DLP, Microsoft, Check Point, CrowdStrike, Splunk, CyberArk, Checkmarx, Contrast, Veracode, etc. Broad cybersecurity experience in the areas of Application Security, Vulnerability Management , Network Security, Security Analytics, Cloud Security, IAM, DFIR, Email Security, DLP, etc.
RemoteExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Single sign-on and federation solutions including operations and implementation knowledge of products (such as Azure AD, MFA, Forgerock,ADFS, Siteminder, OKTA) Government and Public Sector - Service Delivery Center - Cybersecurity IAM Analyst.
$37,700 - $77,100 a yearFull-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Design, configure, implement, troubleshoot, and maintain all security platforms and their associated software, such as firewalls (Security Groups), intrusion detection/intrusion prevention, anti-virus/malware (HBSS), cryptography systems (Vormetric), SIEM (Splunk), and MDM.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Cyber Security Engineer must display an excellent understanding of technology and utilization of Firewalls (Security Groups), VPNs, Data Loss Prevention (DPS), IDS/IPS, Web-Proxy, Security tools, and Security Audits.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Identify cyber threats, trends, and new malware families and threat actor groups by analyzing Arete’s case reports, MDR & SOC escalations, sandbox submissions, raw and open-source intelligence. Experience with EDR technology, threat hunting, automated malware analysis sandbox systems, and countermeasure development (e.g., SentinelOne.
ExpandUpdated 18 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Expert with implementing and managing \SIEM (e.g., Splunk), end-point security (IDS/IPS and HBSS) Expert with at least one of the following tools: Splunk, HBSS/McAfee, Rapid7. Candidates will work directly with Team leads, developers and operations personnel throughout a DevSecOps life cycle both on policy and technical implementation of technologies.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience working with nuclear design and safety analysis software such as SCALE, VERA, MCNP, RELAP, MELCOR, etc. UT-Battelle offers a generous relocation package to ease the transition process. Use machine learning techniques to develop surrogate and reduced order models for optimizing nuclear designs.
ExpandUpdated 18 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Relevant certifications such as OSCP, OSCE, CEH, CISSP, or CISM are strongly preferred. With the largest contingent of contracted Red Team operators in the DoD, we provide an unmatched level of threat intelligence and battle-tested experience for customers in both the DoD and federal civilian markets.
ExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Join our Learning & Enablement team as a Technical Content Developer, where your skills will not only be valued but also essential in shaping the future of Palo Alto Networks. Are you a skilled Technical Content Developer with a passion for crafting engaging learning experiences.
ExpandUpdated 17 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The center includes other quantum faculty, and conducts a wide range of collaborative quantum research in the areas of quantum computing, quantum algorithms and complexity, quantum cryptography, quantum program verification, quantum machine learning, etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with technologies underlying cryptographic systems (symmetric and asymmetric cryptography, ASN.1 encoding, XML canonicalization, digital signatures) Experience with the following: JEE (EJB, JPA, JTA, JAX-B, JAX-RS, JAX-WS), SQL, application servers (Tomcat, WebLogic, JBoss), scripting.
ExpandUpdated 18 days ago
cryptography job
FEATURED BLOG POSTS
How to Conduct a Performance Review (With Examples)
In a world where the smallest mistake can cost your business tens of thousands in lost revenue, your talent is key to keeping your edge on the market and driving growth. However, managing a workforce of any size can be a challenge. Employees come with their own particular skill set, ambitions and flaws. So, it can be difficult to uncover their individual drivers. Not to mention the challenges brought on by the hybrid and remote working models where in-person interactions have become few and far between.
How to Recruit Passive Candidates
Learning to recruit passive candidates is a different ballgame than recruiting active ones. While an active candidate is someone who is currently looking for a new job, a passive candidate tends to be the opposite. Passive candidates are either already working or not looking to work. So, instead of these candidates coming to you, you'll have to find them and reach out to them first.
How to Effectively Recruit Employees
Today, hiring and retaining talent looks much different than it did only two or three years ago. Financial instability and the strain on our mental health brought on by the pandemic has made everyone more wary and selective of their workplace and employer. Whereas in the past people might have prioritized promotions and financial reward, today they look at other factors such as workplace flexibility, personal fulfillment and values alignment.
How Many Hours is Part-Time vs. Full-Time Work?
Growing up you watched your parents shuffle to and from the office, held hostage to their 9 to 5. If jammed-packed schedules and deadlines sound frightening, you might consider pivoting your search to part-time jobs. In fact, even employers have shifted their preference, selecting more people open to the idea of flexible working hours.
How to Make a Job Offer More Competitive
Money alone makes it hard to attract and retain top-notch candidates, especially when you are competing with larger businesses and corporations in your industry. So, instead of focusing on money, figure out how to make a job offer more competitive when you can't offer more money.
5 Ways to Stretch Your Hiring Budget
Many businesses across the country have adjusted business operations to make it through the pandemic. After a period of hardship, many business owners, like yourself, are ready to start recruiting and rebuilding a bigger, more skilled workforce - only now you have to do it with a smaller hiring budget.
How to Ask for a Raise at Work
Here we go again; it’s time to talk money. Whether you’re one year in at a new company or approaching year five on the same team, learning how to ask for a raise should be part of your long-term career plan. These conversations are rarely fun (thanks to society, which has conditioned us to believe that money is taboo), but they are necessary if you want to, well, get paid what you’re worth. Trust us, there’s a lot of money on the table for taking. Below, we’ll discuss tips on timing, approach, and follow-up.