- UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
3 years in other roles such as software engineering, sales engineering, customer support, product design, or user research. Thousands of organizations worldwide, including Barclays, Cisco, eBay, Fairfax, ING, Goldman Sachs, Microsoft, The Mayo Clinic, NASA, The New York Times, Wikipedia, and Verizon, use Elastic to power mission-critical systems.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
IT Security Operations Project Manager. Experience with Windows, Linux/Unix, OpenShift Container platform, & VMWare architecture and administration. FedRAMP - Policy Memo, Continuous Monitoring Strategy Guide, Significant Change Policy and Procedures, Vulnerability Scanning Requirements for Containers, etc.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Explore more InfoSec / Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
As the leader of the InfoSec organization, you will work collaboratively with all areas of the business including Engineering, Quality, Architecture, DevSecOps , IT Operations, Program Management, and Business Operations to ensure that we maintain a robust and highly effective information security program for our existing solutions while also supporting the buildout of new client solutions hosted in our data centers and the cloud.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Our elite team of more than 400 experts has an unparalleled record of performance supporting Red Team Operations, Defensive Cyber Operations, Software Engineering, and Technical Engineering.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Kyruunauts in the Senior Director, Information Security role can move in a more linear career path to a VP, Information Security. Information Security Compliance and Certification Leadership: Collaborate with other compliance-focused leadership roles on the team to ensure a cohesive approach to compliance with regulatory requirements and industry standards and participate in achieving and maintaining compliance with critical healthcare regulatory frameworks, such as SOC2, HIPAA, HITRUST, and FedRamp.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Familiarity with threat intelligence platforms, open-source intelligence (OSINT) tools, and data analysis techniques. Medical Insurance- Telemedicine Benefit- Dental Insurance- Vision Insurance- FSA and HS Life and Disability Insurance- Vacation Time: 15 days per year (increases with years of service)- Sick Time: 6 days per year- Paid Holidays: 8 days per year- Employee Assistance Program- 401 (k) Retirement Plan- Paid Maternity Leave- Paid Adoption Leave.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
CISSP (preferred), CASP+, Sec+, CEH, CISA, SSCP, GSEC. Demonstrate a proven track record in cybersecurity, with experience as a cybersecurity analyst, engineer, ISSO, or ISSM. Experience with STIG assessments, ACAS vulnerability scanning & reporting, POA&M management, PPSM, SSP, CONOPS.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Effectively communicate to partners and senior leadership on progress and drive decisions to address program and project challenges. Identify constraints, risks, and dependencies in all phases of the lifecycle to manage project schedules, resources, and budgets.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience as a security engineer, including security monitoring, detection engineering, incident response, and threat hunting in a SaaS company. In close collaboration with our security team members, the compliance team, the SRE team, and product engineering teams, we share the responsibility to identify, protect, detect, respond, and recover from cyber threats.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Toku raised $20 million from a consortium led by Blockchain Capital with Protocol Labs, GMJP, OrangeDAO, Orrick, Reverie, Quantstamp, Next Web Capital, and prominent angel investors including Protocol Labs founder Juan Benet and Alchemy co-founders Nikil Viswanathan and Joe Lau. Read more about Toku inFortune ,Yahoo Finance , andCoinDesk.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Direct experience with project management fundamentals; current or in-process PMP or other equivalent certification would be an asset, though not required. You own your portfolio but work with project managers for guidance to ensure your projects are delivered on time and budget.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Master of Science in Computer Science, Software Engineering, or closely related field. computing services on Amazon Web Services, Google Cloud, Microsoft Azure) and virtualization technologies to include VMware and Hyper-V. Examine and analyze network and data flow diagrams, information security policies/processes, vulnerability management processes, and risk assessments for information security compliance.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Project lead for the Vulnerability Remediation Management Program including analysis and reporting of monthly metrics. Primary responsibilities include leading the community of Security Champions embedded in the software engineering teams, assisting in the remediation of security vulnerabilities and representing security in software architecture discussions.
ExpandApply NowActive JobUpdated Yesterday
project engineering jobs in North, SC
FEATURED BLOG POSTS
Structured vs Unstructured Interviews
The goal of an interview is to evaluate candidates based on their skills, personality, and knowledge. You want to choose the BEST candidate from your candidate pool, so the interview is something you can't mess up. As you begin planning your interview process, one of the major decisions you'll face is whether the interview should be a structured vs unstructured interview. So let's take a dive into the differences and sort out which circumstances warrant which interview process.
How to Describe Your Personality with Examples
Imagine you’re in an elevator with the CEO of your dream company and you get to talking. The conversation is going well and you start to imagine yourself working for their company when the CEO turns around and asks you “tell me a bit about yourself.” Would this catch you off guard or would you be able to give a clear and succinct description of who you are?
4 Ways to Make Your Job Posting More Inclusive
According to a Glassdoor survey,
How to Calculate Net Income
Understanding your finances can be daunting even if you’re good with numbers. Your net income, in particular, is a key metric for determining how well you’re doing financially and whether your current way of operating is sustainable or not.
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra:
6 Best Ways to End a Cover Letter with Examples
Including a cover letter with your resume is a great way to introduce yourself to the hiring manager, tell them why you’re the ideal fit for the role, and provide context about your personal situation. A strong cover letter will give you an advantage over other applicants. But it’s important that you structure it properly and write it powerfully so that it carries an impact. This article will discuss how to end a cover letter effectively so you catch the eye of a hiring manager and increase your odds of landing an interview. Read on to learn more.
How to Write a Follow-Up Email for a Job Application?
Most times, we have to do more than submit a "sugar-coated" resume to land our dream jobs. Going the extra mile to follow up on your job application can increase your chances of employment. Additionally, it may even help you get confirmation sooner on whether you are seriously being considered for the job or not.