- UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Cisco Umbrella, Stealthwatch, WSA, ESA, AMP for Network and End Point, ASA, NGFW, Firepower NGIPS, Cloudlock CASB, AnyConnect, ACI security, Threat Control, TrustSec, DNA. Securing network design and execute with the help of Cisco Secure Access, Edge Network Security, Threat Control, and Secure Mobility solutions.
ExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Anomali, a world-renowned platform leader in Security Operations, supercharges SecOps by fusing Lightspeed Security Analytics, Industry-Leading Cyberthreat Intelligence (CTI), AI-based automated threat hunting, alert orchestration, automated threat detection and incident response (TDIR) blocking, community intelligence sharing, exposure management, and dark web protection.
RemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with cloud-delivered enterprise security products such as SIEM, SOAR, and/or Threat Intelligence. Anomali's Platform offers: “Match” Next-Gen SIEM, “Lens” AI Threat Hunter, “ThreatStream” TIP, Anomali Integrator, Anomali ISAC, Anomali Attack Surface Management, and Anomali Digital Risk Protection, infused with Anomali AI.
Full-timeExpandApply NowActive JobUpdated 13 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Explore more InfoSec / Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
RemoteExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Any experience of the following is useful too: Cisco Data Center Nexus, Cloud, Cisco ASA/PIX, Cisco Secure, ACS, Cisco ACI, Cisco IronPort, Checkpoint FW-1 and NG, Juniper Netscreen and SRX, Palo Alto, Bluecoat and Fortinet security hardware/software products.
ExpandApply NowActive JobUpdated 13 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Threat Investigator- Security Analyst Responsibilities. We are seeking an experienced threat investigator to deeply understand how threat actors abuse the information environment, investigate complex threats, advance investigative methods and use innovative research approaches to protect people from influence operations.
ExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
We are seeking security engineers to investigate sophisticated threat actors, advance investigative methods, automate and mature team processes through tooling, and use innovative approaches to protecting people from offline harm.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The ideal candidate is someone with excellent problem-solving, communication and interpersonal skills who is/can: - Motivated - Flexible - Innovative - Work effectively in diverse environments - Well-organized - Handle multiple assignments Other desired skills and certifications: - Network Security - Network Routing and/or Switching - Risk Management Framework (RMF) - Certification (CCNA, CCNP, CCNA Security, CISSP, ISSP) - Computer Security - Threat analysis - Cybersecurity.
ExpandApply NowActive JobUpdated 13 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Expert understanding of internet security issues, application security technologies, cloud architectures, and threat landscape concepts. Lead application security reviews and threat modeling, including code review and dynamic testing.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Strong knowledge in the following areas: Cloud Security, Identity and Access Management, Application Whitelisting, Threat and Vulnerability Management, Data Loss Prevention, and operating systems security for Windows and Linux environments.
Full-timeExpandApply NowActive JobUpdated 25 days ago - UpvoteDownvoteShare Job
- Suggest Revision
We are looking for a Manager, Threat Researcher with an Incident Response / Digital Forensics background to join our security research and innovation team. As a Manager, Threat Researcher, you will be in charge of performing advanced research in both the cyber security space as well as product oriented research.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Strong knowledge of data privacy and security concepts, including Privacy by Design principles, and have applied experience leading privacy engineering projects. Establish and lead a privacy engineering team consisting of individuals with expertise in security, governance, compliance, and engineering.
$383,910 - $440,190Full-timeExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Today, the Exabeam Security Operations Platform includes cloud -scale security log management and SIEM, powerful behavioral analytics, and automated threat detection, investigation and response (TDIR.
ExpandApply NowActive JobUpdated 13 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with security in one or more of the following: threat modeling, incident/emergency response, OS hardening, vulnerability management, penetration testing, or cryptographic concepts.
Full-timeExpandApply NowActive JobUpdated 22 days ago
threat job Title: application security Company: Mitek Industries in Redwood City, CA
FEATURED BLOG POSTS
The Best Remote Jobs: Where & How to Find Them
The Covid-19 pandemic hasn’t been easy on any of us, but if there’s one silver lining, it’s the fact that remote work has grown in popularity because of it. Companies that previously weren’t open to their employees working remotely were suddenly forced into allowing it. Since then, they've realized that much of their workforce is happier and more productive. Naturally, this has led to more remote job openings, which is great if you’re interested in this type of position. Read on to learn more about the best remote jobs and where to find them.
In-House vs Outsourcing Recruiting: Which is Better?
When looking at in-house vs outsourcing recruiting, it is important to nail down the benefits for each and whether those benefits outweigh the risks that follow.
How to Write a Short Bio
First impressions can be tricky. When meeting someone in person, it’s likely you have an elevator speech. These short, practiced introductions can help you share more about who you are, what you do for work and other facts about you. While this works well in a live, in-person context, there are many cases where professionals “meet” someone via written form - like social media, a resume, or published work. In these cases, your bio works as your first impression. So, here’s a step-by-step guide on how to write a short bio.
How to Conduct a Performance Review (With Examples)
In a world where the smallest mistake can cost your business tens of thousands in lost revenue, your talent is key to keeping your edge on the market and driving growth. However, managing a workforce of any size can be a challenge. Employees come with their own particular skill set, ambitions and flaws. So, it can be difficult to uncover their individual drivers. Not to mention the challenges brought on by the hybrid and remote working models where in-person interactions have become few and far between.
How to Recruit Passive Candidates
Learning to recruit passive candidates is a different ballgame than recruiting active ones. While an active candidate is someone who is currently looking for a new job, a passive candidate tends to be the opposite. Passive candidates are either already working or not looking to work. So, instead of these candidates coming to you, you'll have to find them and reach out to them first.
How to Effectively Recruit Employees
Today, hiring and retaining talent looks much different than it did only two or three years ago. Financial instability and the strain on our mental health brought on by the pandemic has made everyone more wary and selective of their workplace and employer. Whereas in the past people might have prioritized promotions and financial reward, today they look at other factors such as workplace flexibility, personal fulfillment and values alignment.
How Many Hours is Part-Time vs. Full-Time Work?
Growing up you watched your parents shuffle to and from the office, held hostage to their 9 to 5. If jammed-packed schedules and deadlines sound frightening, you might consider pivoting your search to part-time jobs. In fact, even employers have shifted their preference, selecting more people open to the idea of flexible working hours.