- UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Explore more InfoSec / Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Experience with security tools (e.g., SAST, SCA, vulnerability scanning, penetration testing) In the role of the Senior Advanced Cyber Security Architect for the Forge Core Platform, you will report to the Product Security Leader and will provide expertise in security to development teams throughout all phases of the SDLC. Working under minimal supervision, you will own one or more product components and ensure they're built and deployed securely in the cloud.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Collaborate with stakeholders, executives, and LOB partners to complete assessments, develop cybersecurity maturity recommendations across cybersecurity domains (governance & risk management, strategy and program management, vulnerability management, threat intelligence, security monitoring, network protection, identity and access management, business continuity / disaster recovery, incident response, security architecture, and cloud security.
Full-timeExpandApply NowActive JobUpdated 18 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Our senior consultants provide support in Cybersecurity, Cloud Security, Application Security, DevSecOps, Network Security, Data Security, Threat and Vulnerability management, Identity and Access Management, Encryption, PKI / CLM Architecture, Technology Risk Management, GRC Solutions, IT Audit, IT Compliance, IT Controls Integration, IT Compliance, Report and Certification preparation and remediation, and Advisory services on program design, build, review, and modernization.
ExpandApply NowActive JobUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Given the rapid growth in cyber security threats, data protection requirements, and the increased complexity in our product and technology offerings such as SaaS, OT, and artificial intelligence the need for an experienced leader with the expertise to put in place a comprehensive program to ensure product security across our complex landscape is more critical than ever to ensure we protect both our customers and the company.
Full-timeExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Participate in PI planning, sprint planning, & daily standups with development teams to champion security in development backlog. Work closely with DevOps to ensure the Cloud is built securely using IaC and manage cloud security posture management via enforcing policies in Defender for Cloud.
ExpandApply NowActive JobUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This experience could have been gained from a consultancy firm or a multinational organization Proven experience with IT Audit, with an understanding of IT processes, including applications, and infrastructure; security and vulnerability assessments, change control, IT risk assessment, data privacy, governance, cyber security best practices, etc.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Senior Information Security Analyst will report to the Division Director of Information Security for Tarkett North America and Tarkett Sports, executing and contributing to cyber-and information security strategy and transformational programs while working in a remote and flexible work environment.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Red team activities focus on vulnerability discovery and the development and demonstration of RF and network-based techniques to gain unauthorized access to and/or exploit information networks.
(student)ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Essential Duties and Responsibilities:-Investigate and analyze all response activities related to cyber incidents within the network environment or enclave. -Distribute directives, vulnerability, and threat advisories.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Other work/general skills: Excel, Workflow automation tools, NIST Cyber Security Framework, CIS. The Junior Analyst, Information Security GRC is part of a team responsible for the global Information Security program.
ExpandUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Collaborate with the Group Global CISO to define and execute a comprehensive cyber security strategy for the CRH Americas region, aligned with the organization's global security objectives and regional IT strategies.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Three years of experience in any combination of support and monitoring of security endpoints/servers, e.g., patch deployment/risk assessment/vulnerability scanners/security incident and event monitoring solutions/antivirus products, network security protocols and methodologies, information security and information technology controls, security penetration and vulnerability assessments, systems/network administration.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Ensures system security needs established and maintained for operations development, security requirements definition, security risk assessment, systems analysis, systems design, security test and evaluation, certification and accreditation, systems hardening, vulnerability testing and scanning, incident response, disaster recovery, and business continuity planning and provides analytical support for security policy development and analysis.
ExpandApply NowActive JobUpdated 14 days ago
cyber security vulnerability jobs in Atlanta, GA
FEATURED BLOG POSTS
How to Practice Fair Chance Hiring for People With Criminal Records
Usually when you think of your dream hire, you think of someone who is respectful, trustworthy, reliable, and has sound judgment, right? As you envision your ideal candidate with these qualities, the last person you think of is someone with a criminal record.
6 Common Mistakes to Avoid When Employer Branding
Currently, job searchers are putting extra effort into researching employers. The information they find plays a major role in whether they will pursue an opportunity with you or look for jobs elsewhere. That is why it is now more important than ever to be proactive and intentional when showcasing your workforce and workplace culture. Having a well crafted employer branding strategy can help you strategize and influence your potential candidates so they see your business in the best light. But in order to do that, you should be aware of some of the most common mistakes that employers make.
What to Say When Terminating an Employee
Terminating an employee is an inevitable part of doing business. Whether you’re re-structuring your department or you’ve identified a few employees who’re not living up to your expectations, letting people go is necessary for keeping your workforce healthy and thriving.
How to Utilize Keywords for Your Job Ads
Before we give you the scoop on how to utilize keywords in job ads, it would be helpful if we defined what keywords are and why they are important. In simple terms,
What Makes a Good Paid Time Off (PTO) Policy
The world of work has undergone some major transformation in recent years. From remote and flexible work to increased emphasis on employee benefits and wellbeing, companies nowadays have to be very intentional about their HR policies and how they approach talent acquisition.
Internal Recruiting: Benefits and 5 Internal Recruiting Methods to Consider
Internal and external recruiting are nearly the same thing. The biggest difference is where candidates are sourced. There are instances where external recruiting may be the best option. However, when you are presented with the opportunity to recruit internally, you should take full advantage of the different internal recruiting methods. Initially you will find that the hiring process gets a little bit easier. Then you'll notice all the other benefits that internal recruiting offers.
How to Answer the Interview Question: What is Your Communication Style?
As a job searcher, you probably have so many questions about job searching. However, once you've landed an interview, your excitement takes your questions to a whole new level. What will you wear? Will you know how to answer all the questions? Have you practiced giving nice firm handshakes?