- UpvoteDownvoteShare Job
- Suggest Revision
1-3 years of experience in the financial services industry, particularly anti-money laundering (AML), cyber threat intelligence (CTI), fraud investigations, or information security. This position will serve as a Cyber Financial Intelligence Analyst conducting research into the latest network cyber threats with our financial and banking partners.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
At least 4 years of experience in information technology (operations, software delivery, access management, microservices), information security (application security, network security, cyber security, data protection), information systems risk management, information systems auditing, or a combination.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Using the example of cybersecurity, employers tend to prefer graduates of traditional or online cyber security degree programs when considering applicants for the Data and Cybersecurity Director position.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
3+ years of experience in one of the following; Engineering, Computer Science, Networking, IT, Cyber Security or Information Systems OR Bachelor's Degree in one if the following; Engineering, Computer Science, Networking, IT, Cyber Security or Information Systems.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Partnerships of particular importance will include: Cyber Incident Response Team (CIRT), Threat Intelligence TI), SIEM engineering, SOAR development team, and Security Engineering, Security Architecture, GRC/Risk Management, and GRC/Compliance.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Understanding of security detection frameworks such as MITRE ATT&CK, Cyber Kill Chain, and NIST. Understanding of cyber security and IT disciplines including networking, operating systems, authentication protocols, general enterprise network architecture, and security incident response.
RemoteExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Presenting regular feedback reports on the cyber security projects of MSC Cruises USA to the Corporate Cyber Security Department and to the Chief Information Security Officer (CISO.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
As a Threat Hunter, you will be responsible for proactively hunting for threats, providing technical leadership within the Cyber Hunt Team and the broader security organization, and continuously growing your technical skill set.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Cloud Cyber Security Analyst (Data Protection/DevOps) This role reports under the Operations/DevOps function within Cyber Security Threat Management. Requires experience providing top-tier support for 3 or more of the information security technology areas: 1) Access Control, 2) Application Security, 3) Business Continuity and Disaster Recovery Planning, 4) Cryptography, 5) Information Security and Risk Management 6) Legal, Regulations, 7) Compliance and Investigations, 8) Operations Security, 9) Physical (Environmental) Security, 10) Security Architecture and Design, 11) Telecommunications and Network Security.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Minimum of 3 years’ experience working with Security Operations Centers (SOCs), Incident Response teams, Cyber Threat Intelligence functions, and other members of the cyber defense mission, and awareness of security threats and defensive strategies within the critical infrastructure, including techniques, tactics, and procedures (TTPs) that threat actors utilize to attack an organization.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Capital One’s Offensive Security Purple Team reduces cyber risk by uncovering vulnerabilities and weaknesses in the enterprise cyber environment by conducting covert/overt adversary simulation and emulation.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Additional experience may be in one or more of the following: computer or information systems design/development/installation, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance or systems engineering.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Global Security Organization provides industry-leading cyber-security and business protection services to TikTok globally. Thirdly, we strive to be a Business Catalyst & Enabler by embodying the DNA of technical innovation and ensuring our Global Security operations are fast and agile.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Competent with a proven work history of working with Threat Intelligence, cyber security incidents, working with and building security tools (SIEM, vulnerability scanners, firewalls, etc.
ExpandApply NowActive JobUpdated 6 days ago
cyber security jobs Title: director business development Company: Bae Systems
FEATURED BLOG POSTS
Should I Hire for Potential Over Experience?
The workforce is shifting every day. In fact, research from the World Economic Forum (WEF) shows over half of employees around the world will need to upskill or reskill by 2025. The rapid rise of digital literacy, automation, and new technologies will quickly supersede businesses that don't train ahead of the curve. With the dire need to invest in training, it's evident that hiring someone with experience isn't that much different than hiring someone without it.
How to Decide Between Two Job Offers: 10 Practical Tips
It’s arguably a good predicament to have. You’ve applied to many jobs, interviewed multiple times, and now find yourself with two legit job offers. Nice! But although this is a feel-good validation of everything you have to offer, a daunting choice lies ahead. How do you decide which job will be the best fit for you?
Why Work in Sales? 9 Reasons & Tips on Answering as an Interview Question!
Working in sales can be demanding and challenging, but it can also be gratifying. Sales is an excellent career with a clear path full of excitement and potential for growth. So, if you're contemplating careers and have wondered "why work in sales?", keep reading to determine if sales is a suitable role for you.
How to Fire an Employee
So… you've finally decided to let one of your employees go. Drafting the paperwork and corresponding with HR is the easy part, but knowing how to fire an employee is where things get complicated. In fact, it is one of the most challenging conversations to have in the workplace. However, it must be done, and it must be done with poise and tact. Not only should you keep your state law in mind, but you should also consider your former employee's wellbeing.
How Long Does it Take to Hear Back from a Job?
Are you applying for your very first job? Maybe you’re anticipating your termination from your current role and want to be proactive. Either way, waiting to hear back on your job application can be stressful. If time has passed since you applied, you may wonder how long does it take to hear back from a job. Well, the answer is... it depends.
How to Respond to a Recruiter Through Email? (Tips & Examples)
Rather than wading through an endless list of open roles, wouldn’t it be nice if relevant job opportunities come to you?
How to Reject a Candidate Professionally
When deciding on how to reject a candidate, your first question may be