- UpvoteDownvoteShare Job
- Suggest Revision
More specifically, we are looking for technical cybersecurity experts with experience in all or some of the following: intelligence collection, incident response, insider threat analysis, network operations, emerging cyber policy, security operations (malware analysis, specialized cloud expertise, forensic experts, penetration testing, and application testing.
Full-timeExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
At least 2 years of experience in information technology (operations, software delivery, access management, microservices), information security (application security, network security, cyber security, data protection), information systems risk management, information systems auditing, or a combination.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Responsible for security services delivery, which may include use of application, network, firmware, mobile, hardware security tool sets, detection of security defects, and remediation consultation of those weaknesses.
ExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Network Monitoring and Defense, Security Appliance, Firewall, Routing, IDS/IPS, WAF, ISE/NAC, AD, setup and rule management. We are seeking a Senior Cyber Security Engineer in Atlanta.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Develop and maintain the technical IT/cyber capabilities including all phases of the software development lifecycle and software stack which includes threat modeling of application designs, static application security testing (SAST), software composition analysis (SCA), dynamic application security testing (DAST), and penetration testing.
Full-timeExpandApply NowActive JobUpdated 16 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Very good knowledge of cyber-security (SSO, system hardening, cryptography, network security, standards, best practices, RBAC. Maintain expert level of knowledge in communications technology, and industry protocols for integration of data into transmission EMS/SCADA. Manage the network communication between company’s application and customer devices.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with multiple security domains relative to Data Protection, IT Risk, Network Security, Application Security, Security Operations, and Identity and Access Management.
$177,900 a yearPart-timeExpandApply NowActive JobUpdated 20 days ago - UpvoteDownvoteShare Job
- Suggest Revision
5+ years of relevant post-graduate experience in security architecture and network restoration and remediation. Ability to work with clients, to include system owners and key stakeholders to understand organizational security controls and system/network architecture.
$148,000 a yearFull-timeExpandApply NowActive JobUpdated 16 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Integration experience of PAM solution with at least three or more out of on-prem servers, AWS, Azure, GCP, SaaS Applications, Web Application, Network Devices (Firewall/Switches/Routers), Active Directory (multiple domain setup.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Strong understanding of information security principles, practices, and technologies, including network security, application security, cloud security and endpoint security.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Network security, access management, end point protection, data loss prevention, vulnerability management, application security, forensics, web security, mainframe, incident response and/or cyber threat management in a medium to large corporation.
$80 an hourExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
You will collaborate with international teams, including Solaris and Linux Server Administration, Cyber Security, and Network teams. Additionally, you will work on Production system issues, participate in troubleshooting, security vulnerability management, patching, and ensure application availability, reliability, and stability.
Full-timeExpandApply NowActive JobUpdated 20 days ago - UpvoteDownvoteShare Job
- Suggest Revision
We blend risk strategy, digital identity, cyber defense, application security and managed service solutions to rethink the entire security lifecycle. Industry recognized Professional Security certification preferred (CISSP, CIPP/IT, CRISC.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Additional Cyber Security Architect Job Responsibilities. Writes detailed security requirements for deployment of applications and network infrastructure components, and participates in focus groups to help define security requirements for new and emerging technologies.
Full-timeExpandApply NowActive JobUpdated 7 days ago
FEATURED BLOG POSTS
Internship Cover Letter Tips with Examples
Until now, college has been about learning, absorbing, and experiencing. It’s not until you become eligible for an internship that things start getting real—real-world experiences using real-life scenarios. Applying for internships takes time, and there’s no college course on “how to apply for jobs.” (We’d sign up immediately if there was, though!) But here's a spoiler alert: most internships require a cover letter. And while this may seem like a burden, it’s actually a blessing.
5 Practical Ways to Remove Bias from your Hiring Process
Many employers think their hiring process is perfect. However, research shows that the hiring processes are generally impartial and unfair, especially if you are part of certain demographics. Women, people of color, people with disabilities, or even people in lower socioeconomic status are more likely to be subject to implicit bias. As diversity and employer branding become major aspects of business, it is important that employers take the lead to identify and remove bias from the hiring process. So, here are 5 practical ways to get you started.
Tips to Get Your First Job Confidently
Whether you’re a recent graduate or you still have a few exams left, you may be itching to put your polished leather shoes on and join the workforce. After all, your first job is an entryway into the professional life you’d lead for the decades to come.
Tips for a Good Character Reference Letter with Examples
Hiring managers love a resume laden with relevant skills and qualifications. Hard skills specific to the role, like SEO strategy or Java programming languages, are easy to qualify using achievements or facts and figures. But how exactly can they verify personality traits, work ethic, relationship management skills, or curious nature during an interview when they barely know you?
How to Dress on the First Day of Work (Men & Women)
You did it! Out of hundreds of applicants and dozens of people interviewed, you’re the one who got a new job. Congrats! Now comes the question of how to dress on the first day of work.
Why College Students Should Work While in College?
College is a special part of our lives. It’s a time when we prepare for our dream job while creating some of the most memorable moments in life. That said, college life can also be stressful. Not only do we have to spend long hours studying, writing and researching, but we also have to deal with increased tuition fees and living expenses.
5 Ways to Measure Candidate Experience
Your candidate experience is made up of 4 essential parts