- UpvoteDownvoteShare Job
- Suggest Revision
Minimum of 5 years of experience with any combination of the following: mobile security, threat modeling experience, secure coding, identity management and authentication, software development, cryptography, system administration and network security.
ExpandUpdated 30 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The first two initiatives we’ve identified that represent the biggest impact to this purpose are in the Bitcoin space with Bitcoin mining and Bitkey, a self custody Bitcoin wallet.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience in multiple areas of information security, such as: Identity and Access Management Application Security, cryptography and protocols Secure System Development Live Cycle Vulnerability management and penetration testing IT and computer security Network Security Cloud Security Security standards, laws, and compliance.
Full-timeExpandUpdated 29 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with security technologies including Zscaler, Palo Alto, Broadcom DLP, Microsoft, Check Point, CrowdStrike, Splunk, CyberArk, Checkmarx, Contrast, Veracode, etc. Broad cybersecurity experience in the areas of Application Security, Vulnerability Management , Network Security, Security Analytics, Cloud Security, IAM, DFIR, Email Security, DLP, etc.
RemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Single sign-on and federation solutions including operations and implementation knowledge of products (such as Azure AD, MFA, Forgerock,ADFS, Siteminder, OKTA) Government and Public Sector - Service Delivery Center - Cybersecurity IAM Analyst.
$37,700 - $77,100 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Design, configure, implement, troubleshoot, and maintain all security platforms and their associated software, such as firewalls (Security Groups), intrusion detection/intrusion prevention, anti-virus/malware (HBSS), cryptography systems (Vormetric), SIEM (Splunk), and MDM.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Cyber Security Engineer must display an excellent understanding of technology and utilization of Firewalls (Security Groups), VPNs, Data Loss Prevention (DPS), IDS/IPS, Web-Proxy, Security tools, and Security Audits.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Identify cyber threats, trends, and new malware families and threat actor groups by analyzing Arete’s case reports, MDR & SOC escalations, sandbox submissions, raw and open-source intelligence. Experience with EDR technology, threat hunting, automated malware analysis sandbox systems, and countermeasure development (e.g., SentinelOne.
ExpandUpdated 30 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Expert with implementing and managing \SIEM (e.g., Splunk), end-point security (IDS/IPS and HBSS) Expert with at least one of the following tools: Splunk, HBSS/McAfee, Rapid7. Candidates will work directly with Team leads, developers and operations personnel throughout a DevSecOps life cycle both on policy and technical implementation of technologies.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience working with nuclear design and safety analysis software such as SCALE, VERA, MCNP, RELAP, MELCOR, etc. UT-Battelle offers a generous relocation package to ease the transition process. Use machine learning techniques to develop surrogate and reduced order models for optimizing nuclear designs.
ExpandUpdated 30 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Relevant certifications such as OSCP, OSCE, CEH, CISSP, or CISM are strongly preferred. With the largest contingent of contracted Red Team operators in the DoD, we provide an unmatched level of threat intelligence and battle-tested experience for customers in both the DoD and federal civilian markets.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Join our Learning & Enablement team as a Technical Content Developer, where your skills will not only be valued but also essential in shaping the future of Palo Alto Networks. Are you a skilled Technical Content Developer with a passion for crafting engaging learning experiences.
ExpandUpdated 29 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The center includes other quantum faculty, and conducts a wide range of collaborative quantum research in the areas of quantum computing, quantum algorithms and complexity, quantum cryptography, quantum program verification, quantum machine learning, etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with technologies underlying cryptographic systems (symmetric and asymmetric cryptography, ASN.1 encoding, XML canonicalization, digital signatures) Experience with the following: JEE (EJB, JPA, JTA, JAX-B, JAX-RS, JAX-WS), SQL, application servers (Tomcat, WebLogic, JBoss), scripting.
ExpandUpdated 30 days ago
cryptography job
FEATURED BLOG POSTS
How to Dress on the First Day of Work (Men & Women)
You did it! Out of hundreds of applicants and dozens of people interviewed, you’re the one who got a new job. Congrats! Now comes the question of how to dress on the first day of work.
Why College Students Should Work While in College?
College is a special part of our lives. It’s a time when we prepare for our dream job while creating some of the most memorable moments in life. That said, college life can also be stressful. Not only do we have to spend long hours studying, writing and researching, but we also have to deal with increased tuition fees and living expenses.
5 Ways to Measure Candidate Experience
Your candidate experience is made up of 4 essential parts
How to Stall a Job Offer Politely
You did it! After several weeks of looking for a new job and undergoing grueling interviews, you finally have a job offer. Although this may be very exciting, accepting a job offer means that you’re making a long-term commitment to your future employer. So, even if you’re eager to leave your current job, this isn’t a decision you should take lightly.
How to Get a Job in a New City - Best Tips to Follow
When your dream job posts, will you be ready? What if that dream job was in a faraway city or a different continent…would you move for it? Most of us have dreamed about what it would be like to accept a job in a new place at one time or another. But when it comes to actually making a move, it’s usually the logistical details that give us pause. The key to job searching in a different location is to have a plan.
What is a Policy of Non-Retaliation & How to Create One
Your company probably has many policies in place – anti-discrimination policies, equal opportunity policies, ethics policies, and so on. However, it is important to re-evaluate whether you have a policy that covers every situation. Say for instance one of your employees submit a complaint in good faith to their supervisor. To their surprise, they are met with retaliation, such as demotion, defamation, or even termination.
When to Tell Your Boss You're Job Searching
The Bureau of Labor Statistics has found that individuals, on average, have 12.4 jobs throughout their working life. So regardless of where you are on the career ladder, it’s inevitable that at some point, you’ll begin looking for another job. That said, you might be wondering,