- UpvoteDownvoteShare Job
- Suggest Revision
Experience with/exposure to Endpoint Security, Cloud Security, SIEM/Log Management, Mobile Security, Identity Security, Incident Response as well as other cyber security domains.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This position collaborates with personnel and stakeholders across multiple operations teams such as – Threat Analysis, Incident Response, Cyber Threat Intelligence, Security Infrastructure, Insider Threat, Red Team, Security Architecture, Dev-Ops, Detection Engineering, Identity Mgt, and more.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Conduct cyber investigations for escalated and challenging computer security incidents using computer forensics, network forensics, root cause analysis and/or malware analysis. Interface with other teams in Information Security (e.g. network operations, Cyber Threat Operations Center (CTOC), vulnerability management) along with information and liability risk officers and technology management to help guide cyber security investigations and incidents.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Cyber Security Operation Center Fusion team synthesizes multi-source security alerting, intrusion investigations, cyber intelligence, and business information into actionable analysis.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Cloud Security: Proficiency in cloud security and experience with cloud service providers (e.g., AWS, Azure, Google Cloud, O365) and SaaS Data Security, knowledge of secure cloud architecture design, cloud data protection mechanisms, and cloud identity and access management (IAM.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Our senior consultants provide support in Cybersecurity, Cloud Security, Application Security, DevSecOps, Network Security, Data Security, Threat and Vulnerability management, Identity and Access Management, Encryption, PKI / CLM Architecture, Technology Risk Management, GRC Solutions, IT Audit, IT Compliance, IT Controls Integration, IT Compliance, Report and Certification preparation and remediation, and Advisory services on program design, build, review, and modernization.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Utilize a wide range of security capabilities including both native cloud tooling and 3rd party platforms such as CNAPP and CSPM solutions, network detection and response (NDR), vulnerability assessment and discovery, identity and access management (IAM), data protection solutions, key management (KMS), and event logging systems in order to build a layered defense approach to cloud environments.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Typically a minimum of five years of information security experience (red teaming, purple teaming, penetration testing, cloud security, and/or network security). Demonstrate expertise in simulating/emulating threat actor tactics, techniques, and procedures (TTPs) and reconnaissance, social engineering, cloud, web application, API, infrastructure, network, and physical security testing techniques.
$150RemoteExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Hands-on experience with design and configuration of network security on layer 3, 4, and 7. Job Title: PSO IT Security Specialist st. In addition to these technical skills and experiences possessing relevant certifications such as certified Ethical Hacker (CEH), or AWS Certified Security Specialty in security and DevOps practices.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Travel X-Ray Tech - Health Advocates Network is urgently hiring X-Ray Tech with at least 2 years of recent experience! Health Advocates Network-Allied is seeking a travel Radiology Technician for a travel job in Atlanta, Georgia.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Leveraging your significant experience in information security, cloud architecture and engineering, vulnerability management, and DevSecOps practices, you will be expected to broaden and sharpen our capability to manage the incoming security engineering needs while rapidly surfacing, driving down, and reporting on vulnerabilities across our AWS, GCP, and Azure environments.
$150ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Ensure robust endpoint protection, network security, and threat intelligence capabilities. Job Summary: We are seeking a seasoned and highly skilled Director of Security to lead our organization's security strategy and operations.
ExpandApply NowActive JobUpdated 15 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This role requires a working knowledge of security and network protocols, system and network administration, and configuration management. Current information security certification, including Certified Information Systems Security Professional (CISSP), GIAC certification, or Certified Information Security Manager (CISM.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Armed Security Officer is responsible for responding to all emergency codes, internal/external disaster events as needed and/or requested, conducting preliminary investigations of reported incidents, and performing other security related tasks as directed by a security supervisor/and or Manager.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience in Security and Risk Management, Endpoint Security, Security Architecture and Engineering, Communication and Network Security, Identity and Access Management, Security Assessment and Testing, Security Operations, and Software Development Security.
RemoteExpandApply NowActive JobUpdated 2 days ago
network security cyber jobs Title: security manager in Atlanta, AK, Arkansas
FEATURED BLOG POSTS
Hiring Taking Too Long?
We all know one of the biggest downfalls of a successful recruiting and hiring process is the amount of time it takes to hire someone. The time it takes to hire is sometimes completely out of line with applicant's expectations, creating a huge gap between candidates and businesses. Meanwhile, most recruiters and hiring managers don't even notice that they're taking too long. They have been fighting the symptoms of a too-long-hiring process without addressing the problem at the root. Here, we will expose some of those symptoms and offer solutions to help shorten your hiring process.
Structured vs Unstructured Interviews
The goal of an interview is to evaluate candidates based on their skills, personality, and knowledge. You want to choose the BEST candidate from your candidate pool, so the interview is something you can't mess up. As you begin planning your interview process, one of the major decisions you'll face is whether the interview should be a structured vs unstructured interview. So let's take a dive into the differences and sort out which circumstances warrant which interview process.
How to Describe Your Personality with Examples
Imagine you’re in an elevator with the CEO of your dream company and you get to talking. The conversation is going well and you start to imagine yourself working for their company when the CEO turns around and asks you “tell me a bit about yourself.” Would this catch you off guard or would you be able to give a clear and succinct description of who you are?
4 Ways to Make Your Job Posting More Inclusive
According to a Glassdoor survey,
How to Calculate Net Income
Understanding your finances can be daunting even if you’re good with numbers. Your net income, in particular, is a key metric for determining how well you’re doing financially and whether your current way of operating is sustainable or not.
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra:
6 Best Ways to End a Cover Letter with Examples
Including a cover letter with your resume is a great way to introduce yourself to the hiring manager, tell them why you’re the ideal fit for the role, and provide context about your personal situation. A strong cover letter will give you an advantage over other applicants. But it’s important that you structure it properly and write it powerfully so that it carries an impact. This article will discuss how to end a cover letter effectively so you catch the eye of a hiring manager and increase your odds of landing an interview. Read on to learn more.