- UpvoteDownvoteShare Job
- Suggest Revision
The Expert Cyber Security Engineer independently supports network, cloud, and application security tools and technologies and acts as a mentor and escalation point for junior engineers.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Understanding of security detection frameworks such as MITRE ATT&CK, Cyber Kill Chain, and NIST. Understanding of cyber security and IT disciplines including networking, operating systems, authentication protocols, general enterprise network architecture, and security incident response.
RemoteExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Serve as technical subject matter expert for cyber-focused areas such infrastructure, network security, secure development, vulnerability management, cloud computing, and the ServiceNow platform.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The RMF ISSM will perform the following activities: Supports the Army Materiel Command/Installation Management Command's cyber security program to include, but not limited to, cyber security policy, procedures, and regulations to assist with identifying potential cyber security issues.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Execute large scale cyber risk and security engagements across global customers by developing security strategies based on risk management and compliance requirements while maintaining metrics on milestones, customer satisfactions and profitability.
Full-timeRemoteExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
As a member of the Cyber Security organization at Blackbaud, the Application Security Engineer is a specialized position that plays a key role in securing software built and/or used by Blackbaud.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
JupiterOne CISO, Sounil Yu, named Winner of the Top 10 CISOs of 2021 and Finalist for Top 10 Cyber Security Experts in the Black Unicorn Awards at Black Hat 2021. Experience with one or more security compliance frameworks (PCI DSS, SOC II, FedRAMP, HIPAA, etc.
Full-timeExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Coordinate and provide expert technical support to enterprise-wide cyber defense technicians to effectively use Enterprise Detection and Response solutions (FireEye HX, CrowdStrike, CarbonBlack) to respond, investigate, and remediate security incidents involving enterprise assets.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
As a Cyber Security Manager, you will be responsible for strategically planning, leading, and tactically supporting the Cyber Threat Intelligence and Vulnerability Management program.
Full-timeExpandUpdated 22 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Cyber Security Engineer - Threat Management is responsible for second level security event/incident response along with the collection, analysis, and dissemination of cyber threat intelligence.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Desired Skills: Firewalls Proxy Switches/routers (Juniper Mist/Fortinet/Aruba) Cyber Security Skills Network and Log Analytics Proficient with application layer protocols – HTTP, SSH, SSL, etc.
$46 - $50 an hourExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Provide relevant Cyber Threat Intel to our InfoSec Operations and Engineering teams to help guide decisions on blocking malicious content, and implementing proactive protections for emerging cyber attack techniques.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Coordinate, communicate and work in conjunction with all teams but not limited to architecture, infrastructure, storage, database, networking, auditing, cyber security, code development, deployments, change planning and implementation, and disaster recovery.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The position is for a Sr. Cloud Security Service Delivery Associate to join the Cloud Security team under Information and Cyber Security. Information and Cyber Security (ICS) is a part of Wells Fargo Technology.
ExpandApply NowActive JobUpdated 10 days ago
cyber security jobs in Raleigh, NC
FEATURED BLOG POSTS
How to Ask for a Higher Starting Salary
Maybe you think you’ve finally found your dream job. Everything about it is perfect, except… the salary. Unfortunately, it just isn’t where you want it to be. So, should you give up and move on? Given all the effort you’ve already invested, it’s probably wise to try and negotiate a better salary before you do.
How to Pass a Personality Test with Flying Colors
Whether you’re applying for your first job or looking to move up the career ladder, personality tests aren’t usually the first thing we think about. But surprisingly, they can have a massive impact on how our future employers perceive us. In fact, a 2017 study by the Society for Human Resource Management (SHRM) has found that 32% of U.S. employers use personality tests when hiring for senior management positions, and 28% use them for middle management positions. Personality tests are also used for hourly workers and contractors, though less frequently.
10 Practical and Effective Strategies to Persuade Anyone of Anything
Learning how to persuade people is like a key that can unlock any door. Acing the interview for the job of your dreams. Getting the best deal on a new car. Closing a sale with a skeptical customer. All of these wins require a level of persuasiveness.
Virtual Reality Job Interviews
With the advent of desktop computers, the arduous task of scouring through weekly job classifieds became a thing of the past. The mid-1990s brought about a new era where job seekers could easily search and apply for jobs online. The introduction of AOL's Instant Messaging feature provided an even faster means for employers and candidates to communicate and schedule interviews. As smartphones became more pervasive in the early 2000s, hiring managers increasingly used phone calls for screening and interviewing candidates. Despite this trend, over 80% of interviews still took place in person.
A Potential TikTok Ban?!
As you may already know, there has been a lot of talk lately about the possibility of a TikTok ban. While this has not yet come to fruition, it's important to consider the implications this could have for businesses and recruiters who rely on TikTok as a platform to market their brand, recruit new talent, and connect with their audience.
The Effects of Workplace Racism and Sexism
One day it's a covert statement to a mother returning to work after maternity leave. Another day it's a lingering gaze at an employee enjoying a culturally rich meal. These microaggressions (or sometimes macroaggressions) can take an employee from a confident, high-performer to one that feels insecure being themselves at work. Your employees engage with people with different ideas and feel most comfortable and valued when they can work without losing their cultural, racial, and gender identity. While most employers know this, why have workplace racism and sexism often been neglected?