- UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
InternExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Deep proficiency in multiple security technologies, including: Network Security, NGFW, Cloud Security, DLP, CASB, Proxy, IAM, SIEM/Analytics, etc. security, Data Security, Vulnerability & Risk Management, Proxy, EDR, IAM, SIEM.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Led by CEO, Jim Rosenthal, BlueVoyant’s highly skilled team includes former government cyber officials with extensive frontline experience in responding to advanced cyber threats on behalf of the National Security Agency, Federal Bureau of Investigation, Unit 8200, and GCHQ, together with private sector experts.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Rooted in decades of experience, Resilience helps financial, risk, and information security leaders continuously improve their organizations' cyber resilience by connecting cyber insurance coverage with advanced cybersecurity visibility and a shared plan to reinforce actionable cyber hygiene.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Partner and seek guidance from the business, technology functions and the Regional Information Security Officer (RISO) for APAC on information security policies/standards, maintain cyber risk management practice, tracking and managing closure of vulnerabilities, secure application development, supplier security assurance, security incident response, cybersecurity awareness.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Security: Okta, Crowdstrike, Palo Alto, Proofpoint, Cyber Ark, Sailpoint, Fastly, Fire-Eye, Fortinet. Security: Okta, Crowdstrike, Palo Alto, Proofpoint, Cyber Ark, Sailpoint, Fastly, Fire-Eye, Fortinet.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
We need a self-starter who excels in a high-paced, evangelistic environment and thrives on pitching a leading Unified Endpoint Security (UES) technology to CTO's, CIO's, CISO's, IR teams and security experts.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Senior Cyber Analyst is part of ITW’s corporate Cyber Security team and is responsible for analyzing data across multiple businesses in a global segment to detect gaps, assess risks, and recommend remediation measures to enhance the organization’s security posture.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Proficiencies in one or more of the following technical IT security domains or equivalent: Platform Security Standards, Network Security, Cloud Governance, Cyber Operations Management, Access and Identity Management Governance etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As a Senior Cyber Security Engineer to join our Cyber Threat Intelligence Team in AbbVie Business Technology Solutions, you'll have opportunities to contribute to the digital transformation of a leading biopharma company, helping to create solutions that impact patients and their communities for the better.
RemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As a Field Executive Data Officer, you will be a member of a key team within Comcast Technology Solution’s exciting new cyber security business unit, which sells SaaS and subscription security solutions to the large enterprise and federal government.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Review, audit, and monitor security compliance programs against security policies, standards, and frameworks such as PCI-DSS, NIST CSF-171, SOC1 II, etc. Basic Knowledge in auditing security technologies such as firewalls, IDS, DLP, Vulnerability Scans, Windows Servers, Applications, etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As a Threat Hunter, you will be responsible for proactively hunting for threats, providing technical leadership within the Cyber Hunt Team and the broader security organization, and continuously growing your technical skill set.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Security Engineers are expected to do so using multiple methods and tools including but not limited to manual penetration testing, outputs from automated security scanning tools including Software Composition Analysis, Static Application Security Testing, Dynamic Application Security Testing, and the findings from third-party application penetration tests.
$189,000 - $283,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
PayNearMe is looking to add a talented and experienced Network Security Engineer reporting to our Chief Information Security Officer. Familiarity with common security compliance frameworks (CIS, ISO, PCI, SOC2, NIST) and vulnerability scanning tools (e.g., Tenable, Qualys, Rapid7.
RemoteExpandApply NowActive JobUpdated Today
cyber security jobs in San Francisco, CA
FEATURED BLOG POSTS
What is Seasonal Employment?
Depending on where you are in your career, you might have first-hand experience with seasonal employment. Seasonal employment can be a great way to expand your skill set and earn extra cash while helping businesses meet seasonal increases in demand.
How to Avoid a Bad Hire
"A new employee who doesn't meet the minimum performance, quality, and culture fit standards you set when you began sourcing and recruiting. Additionally, bad hires will immediately show signs of self-interest instead of an interest in their role and the company."
How to Ask for a Letter of Recommendation
When the job board you subscribe to finally posts your dream job, you may feel like the stars have aligned. But part of securing a position that matches your career plan is ensuring you address all the application basics. You know, the resume, the cover letter, the portfolio. It seems like you've got this in the bag — until you realize they want a letter of recommendation, too!
16 Tech Jobs You can Get Without a College Degree
You might think that if you don’t have a computer science, information technology, or related degree, then there’s absolutely no way you can break into the technology field and score a high-paying tech job. But this is a misconception. There are actually tons of tech jobs out there that don’t require a college degree. Instead, employers are more interested in the skills that you can offer. So, read on to learn more about how to land tech jobs without a degree.
What Are SMART Goals?
When it comes to achieving our goals, there’s a lot of noise to work through. A study by the University of Scranton has found that only 8% of people who set New Year’s resolutions actually achieve them. Our busy lives might be one reason for this. Another, even more important reason, is our approach to goal setting. Being too vague, too ambitious or simply unclear on the timeframe can set us up for failure.
The Best Remote Jobs: Where & How to Find Them
The Covid-19 pandemic hasn’t been easy on any of us, but if there’s one silver lining, it’s the fact that remote work has grown in popularity because of it. Companies that previously weren’t open to their employees working remotely were suddenly forced into allowing it. Since then, they've realized that much of their workforce is happier and more productive. Naturally, this has led to more remote job openings, which is great if you’re interested in this type of position. Read on to learn more about the best remote jobs and where to find them.
In-House vs Outsourcing Recruiting: Which is Better?
When looking at in-house vs outsourcing recruiting, it is important to nail down the benefits for each and whether those benefits outweigh the risks that follow.