- UpvoteDownvoteShare Job
- Suggest Revision
Capital One’s Offensive Security Purple Team reduces cyber risk by uncovering vulnerabilities and weaknesses in the enterprise cyber environment by conducting covert/overt adversary simulation and emulation.
Full-timeRemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Provide key performance and risk indicators for the CISO utilized for the Board of DirectorsCollaborate with the Security Architecture, Cyber GRC, Product Security to develop roadmaps, enhancement strategies, and support transformational activities for the Global Information Security.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Areas of responsibility include but are not limited to information security operations, cyber risk & intelligence, data loss & fraud protection, regulatory compliance, policy management and audits & assessment.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Offensive Security is part of the Cyber Operations and Intelligence program and assists with identifying opportunities to enhance Capital One’s information security posture against a broad range of cyber threats, and develop strategies to most effectively address the threats.
RemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Moderate understanding of networks, risk management, network security, digital forensics, and security operations. 2 years' experience in payment card or information security industry, all-source cyber intelligence organizations, investigating payment card, cybercrime fraud.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
The Information Security Manager is a critical member of the IT Security Risk and Compliance team and will be responsible for a team of senior security experts providing security platform management or global security systems, third party risk management, security consulting, and to prevent or reduce cyber risks that could impact business operations.
Full-timeExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Demonstrated advanced knowledge of cyber security concepts with a focus area in two or more of the following: attack surface management, Security Operations Center (SOC) operations, Intrusion Detection/Intrusion Prevention Systems (IDS/IPS), Security Information and Event Management (SIEM) use, threats (including Advanced Persistent Threat (APT), insider), vulnerabilities, and exploits; incident response, investigations and remediation.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
We have the proven expertise to plan, build, and run successful security programs across Risk Management, Cyber Digital Transformation, Threat Management, Security Operations - Managed Services, and Identity and Data Management.
RemoteExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Interface with other teams in Information Security (e.g. network operations, Cyber Threat Operations Center (CTOC), vulnerability management) along with information and liability risk officers and technology management to help guide cyber security investigations and incidents.
Full-timeExpandApply NowActive JobUpdated 16 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Conduct cyber investigations for escalated and challenging computer security incidents using computer forensics, network forensics, root cause analysis and/or malware analysis. Industry certifications in cyber forensics and incident response, such as GIAC Cloud Forensics Responder (GCFR), Certified Forensic Computer Examiner (CFCE), GIAC Certified Forensic Examiner (GCFE), GIAC Certified Forensic Analyst (GCFA), GIAC Certified Incident Handler (GCIH), GIAC Reverse Engineering Malware (GREM), and other related credentials.
ExpandApply NowActive JobUpdated 20 days ago - UpvoteDownvoteShare Job
- Suggest Revision
At Regions, the Cyber Security Operations Center (SOC) Analyst is responsible for the daily operational monitoring of events and alerts from multiple sources, including Security Information and Event Management (SIEM) and IDS/IPS tools, malware prevention platform, system logs, etc.
Full-timeExpandApply NowActive JobUpdated 20 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with multiple security domains relative to Data Protection, IT Risk, Network Security, Application Security, Security Operations, and Identity and Access Management.
$177,900 a yearPart-timeExpandApply NowActive JobUpdated 20 days ago - UpvoteDownvoteShare Job
- Suggest Revision
More specifically, we are looking for technical cybersecurity experts with experience in all or some of the following: intelligence collection, incident response, insider threat analysis, network operations, emerging cyber policy, security operations (malware analysis, specialized cloud expertise, forensic experts, penetration testing, and application testing.
$148,000 a yearFull-timeExpandApply NowActive JobUpdated 16 days ago - UpvoteDownvoteShare Job
- Suggest Revision
8+ years treasury experience is also required (with 5+ years in a management role), preferably in a multinational public company with emphasis on Operational Treasury Cash management, Short Term Borrowing and Investments, Negotiation of Commercial Terms, Card Acquiring Solutions, Bank Relationship Management, Financial Risk Management (F/X, interest rate), Trade Finance, Internal Controls, Cyber Security, Fraud Prevention and Treasury Technology.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
This experience could have been gained from a consultancy firm or a multinational organization Proven experience with IT Audit, with an understanding of IT processes, including applications, and infrastructure; security and vulnerability assessments, change control, IT risk assessment, data privacy, governance, cyber security best practices, etc.
$130,000 a yearFull-timeExpandApply NowActive JobUpdated 16 days ago
security operations cyber risk jobs in Atlanta, GA, Australia
FEATURED BLOG POSTS
How do Employers Verify Education?
At any stage in your professional journey, you may come across an employer or a recruiter who asks to verify your educational credentials. This shouldn’t come as a surprise as 30% of candidates admitted to lying on their resumes, yet 79% of them never get caught. In fact, 85% of employers in the US who conduct background checks find that candidates have lied on their resumes or job applications.
How to Be More Articulate and Speak More Clearly
Have you ever had those moments when you're talking to someone and have no idea what they are saying? The best response you can muster up is a simple head nod or blind agreeance?
How to Ask for a Higher Starting Salary
Maybe you think you’ve finally found your dream job. Everything about it is perfect, except… the salary. Unfortunately, it just isn’t where you want it to be. So, should you give up and move on? Given all the effort you’ve already invested, it’s probably wise to try and negotiate a better salary before you do.
How to Pass a Personality Test with Flying Colors
Whether you’re applying for your first job or looking to move up the career ladder, personality tests aren’t usually the first thing we think about. But surprisingly, they can have a massive impact on how our future employers perceive us. In fact, a 2017 study by the Society for Human Resource Management (SHRM) has found that 32% of U.S. employers use personality tests when hiring for senior management positions, and 28% use them for middle management positions. Personality tests are also used for hourly workers and contractors, though less frequently.
10 Practical and Effective Strategies to Persuade Anyone of Anything
Learning how to persuade people is like a key that can unlock any door. Acing the interview for the job of your dreams. Getting the best deal on a new car. Closing a sale with a skeptical customer. All of these wins require a level of persuasiveness.
A Potential TikTok Ban?!
As you may already know, there has been a lot of talk lately about the possibility of a TikTok ban. While this has not yet come to fruition, it's important to consider the implications this could have for businesses and recruiters who rely on TikTok as a platform to market their brand, recruit new talent, and connect with their audience.