- UpvoteDownvoteShare Job
- Suggest Revision
Designs and develops security policies, standards and procedures e.g. firewall rules, SSL/IPSec, security incident and event management (SIEM), data protection (DLP, encryption), user account management (SSO, SAML), and password/key management.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with key information security technologies such as SIEM, firewalls, intrusion detection/prevention systems, vulnerability assessment, encryption, identity and access control systems, anti-malware, and security event analysis.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
2+ years of experience working with cloud based or on-prem SIEM products (Splunk, Elastic, ArcSight, QRadar, Sentinel, Securonix, LogRhythm) As a Product Owner supporting the Detection and Mitigation Cyber Service Area, you will be accountable for contributing to and delivering upon the strategic agenda for our core cyber products to drive meaningful progress for our customers and our business.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of security tools such as SIEM, DLP, XDR, EDR, Web Filter etc. Knowledge of Information security and cyber security best practices. This incumbent will provide Security Services and Cyber Defense functions as required to fulfill the Bank's information security program requirements.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Implements industry leading practices around cyber risks and Cloud security and perform security assessments of cloud platforms/environments using industry standard frameworks such as ISO, CSCSM and NIST.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Previous experience working with various SIEM technologies to include Splunk ES, IBM QRadar, HP ArcSight, and/or McAfee Nitro. Hands on experience working with Incident Response, Threat Monitoring, and Cyber Threat Intelligence functions.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
This incumbent will provide support to Security Architecture, Security Engineering, Security Operations, Identity & Access Management, Threat Management, Vulnerability Management and Penetration Testing functions.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The IT Cyber Security Operations Monitoring Team is seeking a temporary consultant to perform Tier 2 SOC follow-up and remediation activity on escalated incidents. SIEM: The ability to conduct correlated searches and analysis utilizing a Security Incident & Event Management system.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Help Administer, configure, and monitor company EDR/MDR, SIEM, DLP, and internet web filtering solutions. Provides countermeasure support to quickly counter cyber threats to enterprise systems while assisting and advising in computer evidence seizure, computer forensics, and data recovery.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Implement, manage and consistently review security tooling such as SIEM and Vulnerability management. Training: Provide staff with regular cyber security awareness training to ensure consistent best practices.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Security Tools & Technologies - Well versed in multiple security technologies such as SIEM, DPI, GRC, Antivirus, Intrusion Detection & Prevention Systems, Cloud/AWS, EDR, XDR, UBA, Web Proxy/Content Filtering, Active Directory, PKI, Radius, RSA SecurID, MFA.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Threat Management, Vulnerability Management & Penetration Testing. Conduct threat assessment and modeling as required. Minimum 5 years of work experience in Information security, cybersecurity, vulnerability management, security architecture, network, security tools and computer systems administration.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Supervise the monitoring and triage of security events via the Security Information and Event Management (SIEM) system, ensuring accurate escalation to the Incident Response team. Act as an escalation point for Cyber Security Events from the CDM team requiring deep understanding of on-premises and cloud technologies.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
GREAT TO HAVEBachelor’s degree in information technology, Computer Science, or a related field and a minimum of 5+ years experience in a cyber security role. Updates: Stay current with the latest technologies and solutions in the cyber security space.
$230,000 - $260,000Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Manager, Cyber Product Owner (Detection and Mitigation Solutions) Prioritize the Product Backlog to maximize business and customer outcomes by balancing technical and non-technical aspects while also incorporating cyber and operational risk reduction outcomes and activities.
ExpandApply NowActive JobUpdated Today
cyber siem jobs in Newark, NJ
FEATURED BLOG POSTS
Brand Reputation 101
People's initial perception of your organization is also known as your brand reputation. Your brand rep either encourages or discourages people from engaging with your company. This means the way people view your company will affect sales and even recruiting efforts.
Recruiting in a Tight Market
As a recruiter or employer, you know how much the economy affects your recruitment and retention efforts. You aren't just in competition with companies in your industry, but you are also fighting against inflation, recession, unemployment rates, and so much more.
How to Build a Candidate Persona
A candidate persona is a semi-fictional representation of your ideal candidate. Building a candidate persona is one of the best methods employers use to ensure their sourcing, recruiting, and hiring processes are focused. Knowing exactly what you're looking for streamlines everything and helps increase hiring confidence. So here's how to create a candidate persona and how to use it.
How to Get Into The Trades: Step-by-Step Guide
Getting a trade job can be a great career move if you like variety and prefer to learn on the job instead of in an academic setting. A trade job can offer security and be a lucrative career path as the demand for skilled trade workers continues to grow.
How do Good Interviewers Prepare for Interviews?
Just like candidates take the time to research you and your company, you should take the time to prepare for the interview. Preparing for the interview doesn't just reflect well on your employer brand and create a better candidate experience. Preparation also helps prevent bad hiring decisions. Bad hiring decisions are usually a result of poor execution during the hiring process. However, going into an interview fully prepared and ready to evaluate candidates will help avoid bad hires. So, here are 6 interview preparation tips for employers.
How to Get a Union Job? A Step-by-Step Guide
A union job can significantly impact your job security, pay, and employment benefits. Whether this is your first job or you have years of experience, a union job can offer much-needed protection in a labor market where employees are hired and fired at will.
Should I Hire for Potential Over Experience?
The workforce is shifting every day. In fact, research from the World Economic Forum (WEF) shows over half of employees around the world will need to upskill or reskill by 2025. The rapid rise of digital literacy, automation, and new technologies will quickly supersede businesses that don't train ahead of the curve. With the dire need to invest in training, it's evident that hiring someone with experience isn't that much different than hiring someone without it.