- UpvoteDownvoteShare Job
- Suggest Revision
Our senior consultants provide support in Cybersecurity, Cloud Security, Application Security, DevSecOps, Network Security, Data Security, Threat and Vulnerability management, Identity and Access Management, Encryption, PKI / CLM Architecture, Technology Risk Management, GRC Solutions, IT Audit, IT Compliance, IT Controls Integration, IT Compliance, Report and Certification preparation and remediation, and Advisory services on program design, build, review, and modernization.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Domain knowledge for the following cybersecurity capability areas: Application Security, Vulnerability Management, Data Security and Protection, Cloud Security, Infrastructure Security, Identity and Access Management, Cyber Threat Operations, Cybersecurity Testing.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
7+ years total experience and solid understanding of any combination of the following support and monitoring of security endpoints/servers such as patch deployment/risk assessment/vulnerability scanners/security incident and event monitoring solutions/antivirus products, Network Security Protocols and Methodologies, Information Security & IT controls, security penetration and vulnerability assessments.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of operating systems Windows/LINUX appliances such as identity & access management systems, anti-malware solutions, automated compliance tools, virus protection, and desktop security tools, routers/firewalls/switches/networking protocols.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
The role oversees a team of IT professionals and service providers delivering IT Infrastructure operational activities in the areas of End User Services, Field IT, Service Desk, IT Infrastructure (cloud and on premise), Network infrastructure (cloud and on premise), Office 365, Security, and Access Management services.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Creates, monitors, and enforces consistent security standards for security products (i.e. intrusion detection systems, cyber security, firewalls, vulnerability assessment systems, penetration testing, secure email system, access control & identity management systems, network security, etc.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Strong functional and technical knowledge of information/cyber security capabilities with deep expertise in one or more of the following areas: Encryption, Data Security, Application Security, End Point Security, Identity and Access Management, Windows/Unix/Linux Systems Security, Mainframe Security, Perimeter Security, Network Security, Mobility Security, Cloud Security, Cyber Security, Cryptography, or Authentication Systems.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Lead the implementation of new information security technologies or integration of existing technologies including initial configuration, installation, change management, and operational handoff, such as inventory management, logging & intrusion detection, vulnerability scanning, secrets management, and identity and access management.
Full-timeExpandApply NowActive JobUpdated 30 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Responsible for developing and maintaining the technical IT / cyber security capabilities necessary for safeguarding the firm's information systems and applications (software development lifecycle.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Deep experience in 1-2 cybersecurity domains such as application security, data protection, cloud security, network security, IT risk, security operations, identity and access management, DevSecOps, etc.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Understanding of security automation within DevOps and CI/CD processes including vulnerability identification and management. You'll report to the Senior Director of Cybersecurity Architecture, Cloud Security, and DevSecOps and be responsible for defining and socializing reference architectures, standards, and controls across technology on-premises, in the cloud, and within development processes.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Technical knowledge of multiple security domain areas such as identity & access management, application security, security operations, and network/infrastructure security.
$138,900 - $259,700 a yearFull-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Minimum eight years of recent security architecture experience, with deep technical expertise across multiple technical domains, including application development, cloud computing, security, identity and access management, IT infrastructure, and emerging technologies such as Generative AI; preferably within a professional services firm or similar environment.
Full-timeRemoteExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Operational support is comprised of five workstreams teams: Livesite Engineering, Identity Management, Network Management, Tech Ops (Secure workspace operations) and Customer Experience (CXP.
Full-timeExpandApply NowActive JobUpdated 1 month ago
FEATURED BLOG POSTS
How to Dress on the First Day of Work (Men & Women)
You did it! Out of hundreds of applicants and dozens of people interviewed, you’re the one who got a new job. Congrats! Now comes the question of how to dress on the first day of work.
Why College Students Should Work While in College?
College is a special part of our lives. It’s a time when we prepare for our dream job while creating some of the most memorable moments in life. That said, college life can also be stressful. Not only do we have to spend long hours studying, writing and researching, but we also have to deal with increased tuition fees and living expenses.
5 Ways to Measure Candidate Experience
Your candidate experience is made up of 4 essential parts
How to Stall a Job Offer Politely
You did it! After several weeks of looking for a new job and undergoing grueling interviews, you finally have a job offer. Although this may be very exciting, accepting a job offer means that you’re making a long-term commitment to your future employer. So, even if you’re eager to leave your current job, this isn’t a decision you should take lightly.
How to Get a Job in a New City - Best Tips to Follow
When your dream job posts, will you be ready? What if that dream job was in a faraway city or a different continent…would you move for it? Most of us have dreamed about what it would be like to accept a job in a new place at one time or another. But when it comes to actually making a move, it’s usually the logistical details that give us pause. The key to job searching in a different location is to have a plan.
What is a Policy of Non-Retaliation & How to Create One
Your company probably has many policies in place – anti-discrimination policies, equal opportunity policies, ethics policies, and so on. However, it is important to re-evaluate whether you have a policy that covers every situation. Say for instance one of your employees submit a complaint in good faith to their supervisor. To their surprise, they are met with retaliation, such as demotion, defamation, or even termination.
When to Tell Your Boss You're Job Searching
The Bureau of Labor Statistics has found that individuals, on average, have 12.4 jobs throughout their working life. So regardless of where you are on the career ladder, it’s inevitable that at some point, you’ll begin looking for another job. That said, you might be wondering,