- UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
$150ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Professional Certification (Security+, Data+, Cyber Security Analyst+, or Systems Security Certified Practitioner) Cyber Data Science (CDS) is looking for a data-focused professional with cyber security experience to join our new and growing team.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
In this role, you will drive positive impacts through the design, build, execution, and assessment of risk programs across cyber, technology, and operational risk (non-financial risk) domains. Demonstrated desire for continued learning about new and emerging technologies and staying current with trends in cyber, technology, and operational risk management.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
O Oversee execution testing of Security Incident Event Management (SIEM) across several security domains including Cloud SaaS vendor, Comptroller’s office, and EOTSS. o Oversee integration testing of EOTSS Single Sign On (SSO), EOTSS Identify Access Management (IAM), EOTSS Multi-Factor Authentication (MFA), Cloud SaaS Vendor user access management, and Comptroller’s access controls and provisioning processes.
$150ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Willingness to participate in professional associations involving hospital and school security and safety, including the American Society for Industrial Security (ASIS), the International Association for Healthcare Security and Safety (IAHSS) and International Association of College Law Enforcement Administrators (IACLEA.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Sr. Cyber Security Risk Analyst will partner with all appropriate parties which includes, but is not limited to: other departments, service providers, application service providers, technology staff, etc.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Technology Consultant – Cyber Security – Identity & Access Management (IAM) (Manager)(Multiple Positions. Must have a bachelor's degree in Computer Science, Information Systems, Engineering, or a related field and 5 years of progressive, post–baccalaureate consulting experience in Cyber Security and/or IAM. Alternatively, will accept a master's degree in Computer Science, Information Systems, Engineering, or a related field and 4 years of consulting experience in Cyber Security and/or IAM.
$150ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Technical knowledge in some of the following domains in a cloud or on-premise context: routing/switching, stateful or next gen firewalls (NGFW), distributed denial of service (DDoS) mitigation, web application firewalls, intrusion detection / prevention systems (IDS/IPS), network segregation, security information and event management (SIEM), Container and Orchestration technologies, Infrastructure as Code, and other threat and vulnerability management capabilities.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Manage security controls such as network and host intrusion detection/protection systems (IDS/IPS), identity access management systems (SSO, IdP), firewalls, security incident and event management systems (SIEM), mobile device management (MDM) systems, data classification and loss prevention systems (DLP), secure email gateways, and proxy systems.
$200 - $250ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Use your understanding of Security Data Science, Graph Theory & Machine Learning applications to wrangle our unique cybersecurity data and create analyses and tools that point to the most significant business, governance, and risk management impacts.
$150Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
These projects should be targeted to enable multiple business processes and/or source data systems to drive efficiencies and reduce redundancies supporting one or more of the following functions; internal audit, compliance, enterprise risk management, operational risk management, technology risk management, third party risk management, cyber security, business resiliency, incident management, SOX (and/or other compliance frameworks), or other business programs/initiatives.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Raytheon is seeking a well-qualified Deputy IPT Lead-P5 to join the Cyber Security Engineering team for a dynamic, high-profile program located onsite in Aurora, CO. This individual will be responsible for assisting the development and management of the cyber group and may be required to provide guidance to program-level software/hardware architects.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Amazon Corporate Security’s (ACS) Prototype Security team is seeking a Program Security Manager who is able to develop, implement, and lead security projects and programs to support the Amazon Project Kuiper team.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Grants and Procurement Coordinator will work with the Grants and Procurement Specialist in the development and implementation of federally funded projects that serve to advance emergency preparedness and homeland security efforts across the Commonwealth of Massachusetts.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
The Senior Network Security Engineer, Network Site Reliability Engineering (SRE) is the subject matter expert in designing and implementing the Network security strategy and platforms for the next-gen operations for all Marriott International (MI) networks including the Property Networks, Datacenter/Cloud Networks, and Corporate Networks.
ExpandApply NowActive JobUpdated Yesterday
cyber security incident jobs Company: Capital One in Boston, Mililani-town, Hawaii
FEATURED BLOG POSTS
Why is Professionalism Important & How to Be Professional
You might have heard the word professionalism thrown around in the workplace, but do you know what it means? And do you know how to maintain professionalism no matter the circumstances?
Why Cover Letters Are Important & How To Write One | Job\Searcher
Most people completely waste their cover letter real estate. Your cover letter is another opportunity to speak directly about how your background and capabilities align with the opportunity you seek. It also allows you to introduce your personality a bit more than a resume does. So, why are cover letters important? Because you can stand out, big time, with a custom cover letter directed to the right person.
Hiring Again After Mass Layoffs
It's never an easy decision to let members of your staff go, but depending on the state of your business, mass layoffs may have been the only way to survive. Now that you're months into the future, you may find yourself itching to start hiring again after previous layoffs.
Why Are Internships Important & How Can You Get One?
Internships are for college students or people who have just completed their degree. If you are a student or recent grad, you may be wondering how to land an internship. If you've never had one, you may even wonder if you need one. After all, didn’t you work in that call center while also doing exams? Or perhaps you’ve bartended your first year in college?
Why is Networking Important & How to Network Effectively
Even if you’ve worked hard to earn a degree from an impressive school, landing your dream job might still come down to who you know – otherwise known as networking. Lots of qualified candidates might apply for a job, but the person who gets it might very well be so-and-so’s sibling, friend, or kid. Sometimes the only way to get your foot in the door is to know someone.
Why is it so Hard to Get a Job After College
For many, it was easy finding a job while in college. But after job hunting for weeks, you may wonder why it is so hard to get a job after college. After all, you’ve put a lot of time and effort into getting your degree. But don’t get discouraged. The University of Washington found that 53% of graduates are either unemployed or working a job that doesn’t require a degree. Other studies also show that landing your first job can take between 3 and 6 months. So, getting your first job takes time.
Making the Move to Salary Transparency
The salary transparency trend continues. Last year, Colorado passed its Equal Pay Transparency Rules, which required employers to include compensation in job postings, notify employees about promotional opportunities, and record job descriptions and wage records. Soon after, states like Washington, Nevada, Maryland, and Rhode Island followed suit.