- UpvoteDownvoteShare Job
- Suggest Revision
Capital One is looking for talented Cyber Security Analysts with experience performing endpoint, network, and cloud security monitoring to join our Cyber Security Operations Center (CSOC.
$165,100 a yearExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Continuously monitors the effectiveness of security controls in cloud environments and financial systems through comprehensive assessments across domains including but not limited to IAM, secure CI/CD pipeline, data security/protection, incident management, vulnerability management, key management, cryptography, etc.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
One or more (preferred) Cyber Security Certifications including CISSP, one or more SANS GIAC, CISM, CISA, CEH. Knowledge of cloud security principles and practices, particularly in AWS, Azure, or GCP environments.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
$150ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Exposure to tools/technologies required to implement or oversee hardware/software asset management; identity, credential, and access management; data discovery; secure cloud services; intrusion detection and prevention; endpoint detection and response; cyber threat intelligence; enterprise cybersecurity risk management; supply chain risk management.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Act as a consultative strategist to the CISO, VP Cyber Security, Information Security Director, VP of Infrastructure, Chief Risk Offices, and other key leadership. Be a key technical advisor consulting on leading-edge technologies and possess deep technical knowledge in the following pillars of technology: Zero Trust, SASE, ZTNA, EDR/MDR, Identity and Access Management, MicroSegmentation, Cloud technologies, and security principals (AWS, Azure, GCP.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
For example - cloud (e.g. CCSP, AWS Solutions Architect), offensive security (e.g. OSCP, GPEN), operating systems (Microsoft/Linux administration), etc. MTSI is seeking a Cyber Security Systems Engineer whose primary function will be to work with Special Access Programs (SAPs) supporting Department of Defense (DOD), Headquarters United States Air Force, and MTSI Operations.
$150ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Responsible for software assurance, penetration testing with a range of automated tools, security patch management, secure cloud and hybrid engineering, and CDSRecommend, install, configure, operate, and maintain Government-approved IT security tools, RSA Archer and applications to support overall information assurance activities necessary to protect systems in client security environments.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Big Data Infrastructure, Cyber Collection & Processing Systems, CyberSecurity, Software Engineering, Security Operations Center Support, Incident Response & Threat Mitigation, Exploitation & Forensics, Data Center & Cloud Services, and Predictive Analytics and Tools.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with application security or product security, including in DevOps, DevSecOps, and SDLC, and with cloud assessment methodologies, including utilizing built-in processes for assessing native cloud services, including optimizing cloud infrastructure for efficiency, security, and cost-effectiveness.
$150ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Our senior consultants provide support in Cybersecurity, Cloud Security, Application Security, DevSecOps, Network Security, Data Security, Threat and Vulnerability management, Identity and Access Management, Encryption, PKI / CLM Architecture, Technology Risk Management, GRC Solutions, IT Audit, IT Compliance, IT Controls Integration, IT Compliance, Report and Certification preparation and remediation, and Advisory services on program design, build, review, and modernization.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
These include Management Consulting, Cloud Architecture, Software Development, Agile Implementation, Data Science and Analytics, Systems Engineering, Augmented Reality, and Cyber Security services.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Enterprise Security knowledge relating to IDS, IPS, NGFW, Proxy, Threat hunting, Cyber Security, Threat Intelligence. Work jointly with the Regional Sales Manager (RSM) to architect the solution (create Bill of Materials and Visio solution drawings) and ensure recommended solution leverages Keysight enterprise, cloud, visibility and security features and fits into the overall client network and security architecture and requirements.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
IR includes cloud-based and non-cloud-based applications such as: Microsoft Azure, Microsoft O365, Microsoft Active Directory, and Cloud Access Security Brokers (e.g., Zscaler.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
8+ years of experience with large enterprise/cloud-level information technology, cyber security, and complianceExperience with Oracle Cloud Infrastructure (OCI), or related experience from AWS or Microsoft Azure, and developing cloud architectures.
$137,900 - $232,300ExpandApply NowActive JobUpdated Today
cyber security cloud jobs in Washington, Mililani-town, Hawaii
FEATURED BLOG POSTS
The Effects of Workplace Racism and Sexism
One day it's a covert statement to a mother returning to work after maternity leave. Another day it's a lingering gaze at an employee enjoying a culturally rich meal. These microaggressions (or sometimes macroaggressions) can take an employee from a confident, high-performer to one that feels insecure being themselves at work. Your employees engage with people with different ideas and feel most comfortable and valued when they can work without losing their cultural, racial, and gender identity. While most employers know this, why have workplace racism and sexism often been neglected?
When Rage Applying Strikes: How to Identify Unserious Candidates
As the job market remains highly competitive, we have seen a surge in "rage applying." This is when candidates apply to multiple jobs, often without considering whether they are truly interested in the role. Rage applying goes hand-in-hand with quiet quitting. Often, employees want to entertain the thoughts and feelings of leaving their job, but they aren't necessarily serious about leaving yet. Meanwhile, other employees engaging in this trend are actually trying to find a better role. As a recruiter, it can be hard to identify who are the real applicants in a sea full of quiet quitters, but understanding rage applying and identifying red flags will certainly help.
How to Increase Job Ad Exposure
In today's competitive job market, writing quality job ads is critical for attracting top talent to your organization. While networking and candidate referrals are prime real estate for finding qualified candidates, nothing beats the tried-and-true method of writing an extraordinary job ad. But while writing a great job ad is the first step, what's more important is increasing visibility. You could have the most detailed, well-written ad on the internet, but if no one sees it, then you are wasting time (and potentially money!). Employers often believe that job boards are the root of the problem, but you can learn how to increase job ad exposure by tweaking a few steps of your recruitment process.
How to Navigate Hiring Out of State
The job market has shifted significantly in recent years. The accelerated adoption of technology has not only pushed many companies into remote working arrangements but also increased the availability of supporting tools and technologies (i.e., video conferencing and collaboration software).
Building a Candidate Pipeline Through Internships
Building a candidate pipeline through a great internship program for local college students and recent graduates at local universities is a great and cost-effective way to attract and retain top talent. By offering meaningful and impactful work experiences, regular feedback, coaching, and mentorship, you can create a positive internship experience that will make your organization a sought-after destination for future employees. This not only benefits the organization in the short-term but also in the long-term, as you'll have a pool of well-trained and experienced candidates who may be interested in full-time employment once they graduate. Furthermore, building relationships with local universities and college students can increase brand awareness and build a positive reputation for your organization in the local community.
How To Make $100K a Year – No BS Strategies & Advice
If you’re like most of us, you’d love to be wealthier. Having more money would alleviate stress. It would make it easier to pay your bills and buy nicer things. Maybe it’d allow you to spend more time with your kids and go on more vacations. You’re not alone if you wish you could somehow earn a more significant income.
How To Answer “Why Do You Want to Be a Supervisor” in an Interview
Anyone who has worked in a supervisor role knows how challenging yet rewarding it is. But chances are if you're trying to become a supervisor, you'll be forced to answer: