- UpvoteDownvoteShare Job
- Suggest Revision
Contribute in developing, testing, and documenting security procedures, including disaster recovery, business continuity, backups, and incident response. Provide ongoing advice and third-level support to Security operations and IT for incident response, indicators of compromise (IOC’s), vendors security vulnerability notifications, law Enforcement security alerts, etc.
ExpandApply NowActive JobUpdated 27 days ago - UpvoteDownvoteShare Job
- Suggest Revision
These projects should be targeted to enable multiple business processes and/or source data systems to drive efficiencies and reduce redundancies supporting one or more of the following functions; internal audit, compliance, enterprise risk management, operational risk management, technology risk management, third party risk management, cyber security, business resiliency, incident management, SOX (and/or other compliance frameworks), or other business programs/initiatives.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Position Summary: As a Virtual Cyber Security Sales Engineer at our Client, you will play a pivotal role in driving the success of our cybersecurity solutions across the United States. Virtual Cyber Security Sales Engineer.
Full-timeExpandApply NowActive JobUpdated 27 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Key Relationships : External vendors (cyber incident response & cyber risk management), brokers, Procurement, Compliance, Underwriting, Underwriting Management, Claims. Ensure competing broker cyber offerings in the incident response and risk management space are monitored and potentially incorporated where not to the detriment of Beazley or Beazley Security’s own offerings.
$120,000 a yearFull-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Technical knowledge and ability to speak to common topics in one or more of the following: network and IT infrastructure, common application and database design, IT governance and risk management, third party management, incident response, knowledge of typical network and IT security components.
Full-timeExpandApply NowActive JobUpdated 30 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Relevant Terms: IP, intellectual property, technology transactions, agreements, data privacy, cyber-security, privacy rights, data security, software, patents, licensing, license contracts, SaaS, CIPP, Certified Information Privacy Professional, due diligence, M&A, mergers and acquisitions.
Full-timeExpandApply NowActive JobUpdated 27 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Bachelor’s degree from an accredited college or university in Computer and Information Science, Computer Engineering, Computer Systems Analysis, Information Cybersecurity and five (5) years of progressive information security experience across various information security/information technology risk management domains such as but not limited to application security, infrastructure security, identity, and access management, vulnerability and cyber threat management, security architecture, etc.
$109,718 a yearFull-timeExpandApply NowActive JobUpdated 15 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Practical application of Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR) tools to identify threat patterns, enrich investigations, and build automation-supported workflows.
Part-timeExpandApply NowActive JobUpdated 27 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Drive customers' cyber security use cases and aid in new use case development. The Solutions Architect is a function of our Professional Services group, your primary responsibility will be assisting customers with the design and integration scoping of Recorded Future Security Intelligence data and running projects to support this function.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
This person will supervise all aspects of IT security to include design, development, implementation, incident response, budgets, and adherence to various regulations. Minimum 3 years experience with DoD cyber security requirements (CMMC, DFARS, SPRS.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Develop scripts and automation tools using Python, JavaScript, React, and GoLang to enhance security processes, reduce manual effort, and ensure rapid incident response. Familiarity with Extended Detection and Response (XDR), Endpoint Detection and Response (EDR), Static Application Security Testing (SAST), and Dynamic Application Security Testing (DAST) tools and methodologies.
$150,000 a yearFull-timeExpandApply NowActive JobUpdated 15 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Firm Type: Law Firm, Experience: 3 Years, Job Overview: A law firm in Boston, MA, is seeking a Mid-Level Data, Privacy, and Cyber Security Associate Attorney with 3-5 years of experience.
Full-timeExpandApply NowActive JobUpdated 27 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Channel Marketing experience, preferably within the Cyber Security market, experience in channels, particularly in the MSSP area, and with experience create channel-focused content, and plan, execute, and measure programs with experience in the US market.
ExpandApply NowActive JobUpdated 16 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Responds to major incidents reported to the Police Department and assumes the role of Incident Commander and follows the Incident Command System/Standardized Emergency Management System (ICS/SEMS) protocol; develop and implement appropriate advisory communication to the Berklee community as mandated by the Clery Act.
Full-timeExpandApply NowActive JobUpdated 27 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Ensure that cyber assets, controls and designs are aligned with best practices and are in full compliance with corporate and NERC CIP cyber security policies and procedures. The Senior Information and Operational Technology Engineer will support the SCADA Package in all networking, security system integration and communications aspects related to the offshore Windfarm.
Full-timeExpandApply NowActive JobUpdated 2 days ago
cyber security incident response jobs Company: Capital One in Boston, Mililani-town, Hawaii
FEATURED BLOG POSTS
Is There a Slow Decline of the Labor Market and Wage Growth?
BLS data from January 2023 to March 2023 states that,
Virtual Reality Job Interviews
With the advent of desktop computers, the arduous task of scouring through weekly job classifieds became a thing of the past. The mid-1990s brought about a new era where job seekers could easily search and apply for jobs online. The introduction of AOL's Instant Messaging feature provided an even faster means for employers and candidates to communicate and schedule interviews. As smartphones became more pervasive in the early 2000s, hiring managers increasingly used phone calls for screening and interviewing candidates. Despite this trend, over 80% of interviews still took place in person.
A Potential TikTok Ban?!
As you may already know, there has been a lot of talk lately about the possibility of a TikTok ban. While this has not yet come to fruition, it's important to consider the implications this could have for businesses and recruiters who rely on TikTok as a platform to market their brand, recruit new talent, and connect with their audience.
The Effects of Workplace Racism and Sexism
One day it's a covert statement to a mother returning to work after maternity leave. Another day it's a lingering gaze at an employee enjoying a culturally rich meal. These microaggressions (or sometimes macroaggressions) can take an employee from a confident, high-performer to one that feels insecure being themselves at work. Your employees engage with people with different ideas and feel most comfortable and valued when they can work without losing their cultural, racial, and gender identity. While most employers know this, why have workplace racism and sexism often been neglected?
When Rage Applying Strikes: How to Identify Unserious Candidates
As the job market remains highly competitive, we have seen a surge in "rage applying." This is when candidates apply to multiple jobs, often without considering whether they are truly interested in the role. Rage applying goes hand-in-hand with quiet quitting. Often, employees want to entertain the thoughts and feelings of leaving their job, but they aren't necessarily serious about leaving yet. Meanwhile, other employees engaging in this trend are actually trying to find a better role. As a recruiter, it can be hard to identify who are the real applicants in a sea full of quiet quitters, but understanding rage applying and identifying red flags will certainly help.
How to Increase Job Ad Exposure
In today's competitive job market, writing quality job ads is critical for attracting top talent to your organization. While networking and candidate referrals are prime real estate for finding qualified candidates, nothing beats the tried-and-true method of writing an extraordinary job ad. But while writing a great job ad is the first step, what's more important is increasing visibility. You could have the most detailed, well-written ad on the internet, but if no one sees it, then you are wasting time (and potentially money!). Employers often believe that job boards are the root of the problem, but you can learn how to increase job ad exposure by tweaking a few steps of your recruitment process.
How to Navigate Hiring Out of State
The job market has shifted significantly in recent years. The accelerated adoption of technology has not only pushed many companies into remote working arrangements but also increased the availability of supporting tools and technologies (i.e., video conferencing and collaboration software).