- UpvoteDownvoteShare Job
- Suggest Revision
As our IT & Cyber Security Manager, you will play a critical role in planning, building, implementing, and maintaining both IT infrastructure and cyber security systems. Identify and advocate for enhancements in IT & Cyber Security resources, structure, policies, procedures, and practices.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Zachary Piper Solutions is seeking a Cyber Network Engineer to support a civilian program for Export-Import Bank of the United States in Washington, D.C. The team is seeking a skilled cyber analyst and engineer to assist in the implementation and configuration of Firewalls, vulnerability assessment, penetration testing, and threat hunting for this Department of Treasury program.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Ground Software Engineering, Cyber Software Security Assurance (C/SSA), Mission Software Integration, Systems Engineering, ISSM, ISSE, and ISSOs∯*∯ The Cyber lead has primary oversight of a ISSE and C/SSA activities focused on Cyber CDRL development and Static and Dynamic security scanning of Ground Mission Unique Software.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
And Cyber Security Service Provider (CSSP) Analyst - Certified (CEH, GCIH, etc) highly desired Certifications: OSCP, OSEP, OSWA, OSWE, OSED, OSCE, GCIH, GPEN, and/or GWAP Applicant selected will be subject to a government security investigation and must meet eligibility requirements for access to classified information.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
CEH, CySA+, GCIH, GCIA, CFR, CCNA Cyber Ops, CCNSecurity, GICSP, Cloud+, SCYBER, PenTest+, CHFI or GCFA. Six (6) years of Cyber Security Analyst work experience (or equivalent). Tyto's services and solutions embody its domain expertise in four major Technology domains: Network Modernization, Hybrid Cloud, Cyber Security, and Enterprise IT. Tyto offers a broad range of service delivery models including design/install projects, Managed Services, and 'As-a-Service.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
NCIS is the DON component with primary responsibility for criminal investigation, law enforcement (LE), counter-terrorism (CT), counterintelligence (CI), and cyber matters. NCIS not only has primary responsibility for all criminal investigative, CI, CT, and cyber matters within the DON, but it also has exclusive investigative jurisdiction in non-combat matters involving actual, potential, or suspected criminal, terrorism, sabotage, espionage, and subversive activities.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Contract personnel provide front line response for digital forensics/incident response (DFIR) and proactively hunting for malicious cyber activity. - Able to write cyber investigative reports documenting digital forensics findings.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Deep understanding of cybersecurity program planning and sequencing, including governance, risk management, architecture, technology onboarding, vulnerability management, awareness and training, and cyber third-party risk management.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Minimum of 2 years experience working with Security Operations Centers (SOCs), Incident Response teams, Cyber Threat Intelligence functions, and other members of the cyber defense mission, and awareness of security threats and defensive strategies within the critical infrastructure, including techniques, tactics, and procedures (TTPs) that threat actors utilize to attack an organization.
Full-timeExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Rooted in decades of experience, Resilience helps financial, risk, and information security leaders continuously improve their organizations' cyber resilience by connecting cyber insurance coverage with advanced cybersecurity visibility and a shared plan to reinforce actionable cyber hygiene.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Position Title: Information Security Analyst – Cyber Security analyst - (SECRET CLEARANCE) MILVETS is currently seeking to fill a full time Information Security Analyst – Cyber Security analyst - (SECRET CLEARANCE) position.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Capital One is looking for talented Cyber Security Analysts with experience performing endpoint, network, and cloud security monitoring to join our Cyber Security Operations Center (CSOC.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Cyber Security Engineer will support enhancements to system security architecture and cyber security capabilities and manage multiple system security plans for development, test and production systems to support Assessment and Authorization (A&A) security requirements.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
We blend risk strategy, digital identity, cyber defense, application security and managed service solutions to rethink the entire security lifecycle. C ollaborate within an Agile development team to ensure that incremental capabilities are delivered each sprint and develop Incident Response (IR) automation scripts and reusable integrations for InfoSec technologies (e.g., Phantom, Demisto/XSOAR, Splunk, CrowdStrike, Office 365, Jira, MySQL, etc.
Full-timeExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Technology Consulting - Cyber Security - Identity & Access Management (IAM) (Manager) (Multiple Positions) (1503404), Ernst & Young U.S. LLP, Raleigh, NC. Must have a Bachelors degree in Computer Science, Information Systems, Engineering, or a related field and 5 years of progressive, post-baccalaureate consulting experience in Cyber Security and/or IAM. Alternatively, will accept a Masters degree in Computer Science, Information Systems, Engineering, or a related field and 4 years of consulting experience in Cyber Securityand/ or IAM.
ExpandApply NowActive JobUpdated 6 days ago
cyber job
FEATURED BLOG POSTS
How to Write a Statement of Interest the Best Way
Your life's goal is to work for Company A. Their brand, their product, their reputation—it's safe to say you're a fan. The only problem is that their careers page never highlights the role that matches your skills and experience. It's a bummer for sure, but don't fret.
Should I Hire for Potential Over Experience?
The workforce is shifting every day. In fact, research from the World Economic Forum (WEF) shows over half of employees around the world will need to upskill or reskill by 2025. The rapid rise of digital literacy, automation, and new technologies will quickly supersede businesses that don't train ahead of the curve. With the dire need to invest in training, it's evident that hiring someone with experience isn't that much different than hiring someone without it.
How to Decide Between Two Job Offers: 10 Practical Tips
It’s arguably a good predicament to have. You’ve applied to many jobs, interviewed multiple times, and now find yourself with two legit job offers. Nice! But although this is a feel-good validation of everything you have to offer, a daunting choice lies ahead. How do you decide which job will be the best fit for you?
Why Work in Sales? 9 Reasons & Tips on Answering as an Interview Question!
Working in sales can be demanding and challenging, but it can also be gratifying. Sales is an excellent career with a clear path full of excitement and potential for growth. So, if you're contemplating careers and have wondered "why work in sales?", keep reading to determine if sales is a suitable role for you.
How to Fire an Employee
So… you've finally decided to let one of your employees go. Drafting the paperwork and corresponding with HR is the easy part, but knowing how to fire an employee is where things get complicated. In fact, it is one of the most challenging conversations to have in the workplace. However, it must be done, and it must be done with poise and tact. Not only should you keep your state law in mind, but you should also consider your former employee's wellbeing.
How Long Does it Take to Hear Back from a Job?
Are you applying for your very first job? Maybe you’re anticipating your termination from your current role and want to be proactive. Either way, waiting to hear back on your job application can be stressful. If time has passed since you applied, you may wonder how long does it take to hear back from a job. Well, the answer is... it depends.
How to Respond to a Recruiter Through Email? (Tips & Examples)
Rather than wading through an endless list of open roles, wouldn’t it be nice if relevant job opportunities come to you?