- UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Deep technical knowledge and proven experience with Microsoft, Postgres, Red Hat, PACS, RIS, DICOM, HL7, Web Services, PHP, Java (scripting), HTML, XML, Infrastructure / Cloud IT support; Strong understanding of clinical workflow within Radiology.
ExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
We are actively hiring for a Cyber Risk Analyst - Remote! Your work: Performs more complex work supporting implementation of IT risk management processes and cyber risk quantification (CRQ.
Full-timeRemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Familiar with IT security/cybersecurity domains is a bonus, including but not limited to cyber engineering, Vulnerability Management, Cyber asset management, SAST/DAST, IAM (Identity Access Management), SSO, MFA, cyber threat intelligence, security operation, access control, network security, security vulnerability, insider threat, data loss protection, etc.
$120,000 - $202,500 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Executive Director, Cyber Security and IT Risk Management is responsible for the security of the District's information technology resources, digital assets, user identity, and data privacy.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Reporting directly to the Senior Manager of Security Operations and Threat Intelligence in Procore’s Cyber Fusion Center with the opportunity to be located in the Austin, TX office or work remotely from Austin, TX.
$134,800 - $185,350 a yearExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The ideal candidate will expertly define a robust security framework across network, applications, and cloud environments, proactively addressing cyber risks and ensuring alignment with the Sony Pictures goals.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Serves as a subject matter expert for and convey recommendations directly to senior leadership regarding civil rights, Equal Opportunity and Title IX Compliance Initiatives (related laws and regulations for various state, federal, and local requirements) in alignment with other compliance/risk management functions and Legal Affairs.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This position collaborates with personnel and stakeholders across multiple operations teams such as – Threat Analysis, Incident Response, Cyber Threat Intelligence, Security Infrastructure, Insider Threat, Red Team, Security Architecture, Dev-Ops, Detection Engineering, Identity Mgt, and more.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Develop, design, code, and implement next-generation deployment automation and application using system/software engineering best practices and the latest technologies:DevOps (Jenkins, Red Hat OpenShift, Docker)Infrastructure-as-Code and Configuration-as-Code (UrbanCode Deploy, Ansible, Scripting)Event Driven Architecture / Message Queuing.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience working with cyber security tools and software such as Splunk, Symantec End Point, TrendMicro Antivirus, McAfee Web Gateway, Checkpoint Firewalls, Bluecoat, Sourcefire, Active Directory, or relevant cyber security assets.
RemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Red Hat Certified System Administrator (RHCSA) Evaluates, troubleshoots, and repairs a Windows and Red-Hat Linux based servers, workstations and laptops. IAT II : Minimum of one (1) qualifying baseline certification: Security+ CE, SSCP, CCNSecurity, CISSP (or Associate), CISA, GCIH, GCED, CASP CE, or GSEC.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Recent increasingly responsible experience in technology management, cyber security applications and infrastructure, and business process improvement Required 5 Years Certification as a Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM) Certified Information Systems Security Desired.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The CISO is the lead advocate for the institution's information and cyber security needs and is responsible for the development and oversight of a comprehensive information security strategy intended to protect information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction and to provide confidentiality, integrity, and availability.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
CompTIA Cyber Security Analyst (CySA+) CSA - EC Council Certified SOC Analyst (Previously ECSA - EC-Council Certified Security Analyst) All Department of Homeland Security CBP SOC employees are required to favorably pass a 5-year (BI) Background Investigation.
$81,250 - $146,875 a yearFull-timeExpandApply NowActive JobUpdated Today
equal opportunity red hat cyber security jobs in Raleigh, Nc West Area
FEATURED BLOG POSTS
How to Ask for a Letter of Recommendation
When the job board you subscribe to finally posts your dream job, you may feel like the stars have aligned. But part of securing a position that matches your career plan is ensuring you address all the application basics. You know, the resume, the cover letter, the portfolio. It seems like you've got this in the bag — until you realize they want a letter of recommendation, too!
16 Tech Jobs You can Get Without a College Degree
You might think that if you don’t have a computer science, information technology, or related degree, then there’s absolutely no way you can break into the technology field and score a high-paying tech job. But this is a misconception. There are actually tons of tech jobs out there that don’t require a college degree. Instead, employers are more interested in the skills that you can offer. So, read on to learn more about how to land tech jobs without a degree.
What Are SMART Goals?
When it comes to achieving our goals, there’s a lot of noise to work through. A study by the University of Scranton has found that only 8% of people who set New Year’s resolutions actually achieve them. Our busy lives might be one reason for this. Another, even more important reason, is our approach to goal setting. Being too vague, too ambitious or simply unclear on the timeframe can set us up for failure.
How Long Do Background Checks Take for Pre-Employment
Many jobs require a background check. For some companies, this is a matter of company policy. In other jobs, such as finance, childcare, and security, the government often requires background checks. While there are varying levels of intensity, for most people, a background check is nothing to worry about. In fact, the biggest question is often how long does a background check take? Here’s what job seekers and applicants need to know about background checks before they apply to new jobs.
The Best Remote Jobs: Where & How to Find Them
The Covid-19 pandemic hasn’t been easy on any of us, but if there’s one silver lining, it’s the fact that remote work has grown in popularity because of it. Companies that previously weren’t open to their employees working remotely were suddenly forced into allowing it. Since then, they've realized that much of their workforce is happier and more productive. Naturally, this has led to more remote job openings, which is great if you’re interested in this type of position. Read on to learn more about the best remote jobs and where to find them.
In-House vs Outsourcing Recruiting: Which is Better?
When looking at in-house vs outsourcing recruiting, it is important to nail down the benefits for each and whether those benefits outweigh the risks that follow.
How to Write a Short Bio
First impressions can be tricky. When meeting someone in person, it’s likely you have an elevator speech. These short, practiced introductions can help you share more about who you are, what you do for work and other facts about you. While this works well in a live, in-person context, there are many cases where professionals “meet” someone via written form - like social media, a resume, or published work. In these cases, your bio works as your first impression. So, here’s a step-by-step guide on how to write a short bio.