- UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of FedRAMP, FISMA, NIST, STIG, CIS, and other IT security and compliance frameworks, regulations, and control libraries. The network is a converged IP network carrying data, voice and video with a security stack comprising of remote access network, IDS/IPS, web content filtering and nextgen firewall devices.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
They will have a positive impact on the security organization and shape the way security event monitoring is provided across the Comcast Enterprise. Our client is seeking a Security Engineer III who will work with the architecture and engineering teams to deploy, document, and test a multi-component infrastructure designed to ETL the raw logging data into a structured database environment.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
OPPORTUNITY OVERVIEWAs a Cyber Intelligence Analyst at ZeroFox , you will play a pivotal role in safeguarding our customers' brands and executives by conducting comprehensive OSINT research, analysis, and threat assessments.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Principal Cyber Security Engineer (Cloud Security) We are seeking an experienced, passionate, and talented cyber security engineer with a deep interest in cloud. Collaborate with Oracle Cloud Infrastructure (OCI) and other internal teams to enhance our security posture.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Contribute to vulnerability management, application security and/or offensive/red-team operations. Deep application security knowledge, with the ability to map an application vulnerability to exploitation indications and relevant investigative techniques.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Of the required experience, must have 2 years of experience with the following: 3GPP security and technical specifications, including 55.301 or 33.210; and Shaping 5G security architecture and underlying Cloud infrastructure, including OpenStack or K8s based architecture.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Kyruunauts in the Senior Director, Information Security role can move in a more linear career path to a VP, Information Security. Information Security Compliance and Certification Leadership: Collaborate with other compliance-focused leadership roles on the team to ensure a cohesive approach to compliance with regulatory requirements and industry standards and participate in achieving and maintaining compliance with critical healthcare regulatory frameworks, such as SOC2, HIPAA, HITRUST, and FedRamp.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Overall, the OCI Security Architecture team performs a variety of work ranging from cloud security, application security, vulnerability analysis, threat modeling, and hacking/enterprise network penetration.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Developing, deploying, and supporting security solutions globally to include regional offices, and cloud environments, including Amazon Web Services (AWS), Google Cloud and Microsoft Azure. Become a member of a leading Data Protection, Privacy and Security company during one of the best market opportunities to come along in a generation.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Prior experience performing in the role of an information security officer/information systems security officer (ISO/ISSO) on a state or federal government contract. Relevant security certifications such as CISSP, SSCP, CAP, or CISA.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
A foundational understanding of secure product development objectives and practices, for example: Critical Vulnerability Response & Disclosure, Application Security Testing (pen-testing), Secure Code Review, Supply Chain Risk Mitigation, Vulnerability Management.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Familiarity with security frameworks and standards (eg; the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF), Cybersecurity & Infrastructure Security Agency (CISA) Risk Assessment Methodologies, OWASP, CIS) and their application in vulnerability management process.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Identity and Access Management Operations:-Work closely with Engineers on the Security and IT team to ensure we are able to operationalize our Identity and Access Management (IAM) strategies as Attentive scales.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This position sits on the Information Security team, a team that safeguards our company's digital assets and reduces cyber risks. Proficient in modern security tools and practices including SIEM , SSO, IAM, MDM.
ExpandApply NowActive JobUpdated 2 days ago
Title: cyber security Company: Cc Industries in North, SC
FEATURED BLOG POSTS
How To Answer “Why Do You Want to Be a Supervisor” in an Interview
Anyone who has worked in a supervisor role knows how challenging yet rewarding it is. But chances are if you're trying to become a supervisor, you'll be forced to answer:
What is Career Cushioning?
Is your organization prepared for “career cushioning”?
Growing Discontent: Employees Wouldn't Wish Their Jobs on Their Worst Enemy
The start of a new year, and most people are already busy setting personal and professional goals. What’s on the top of the list for a growing number of working people is making an exit from the job they currently have. Why?
How to Gracefully Quit a Job You Just Started
You’ve just started learning the ropes at your new job, and you've gotten to know your colleagues. But you’re already thinking about quitting. Maybe you were deciding between to job offers and realized that you’ve made the wrong choice. Or, a change in your personal circumstances means that you have to quit.
How to Professionally Reschedule a Job Interview Without Destroying Your Chances
You’ve practiced answering common interview questions and refined your “greatest weakness.’ Nothing can stop you until BAM! The flu hits your household. Or you ran over a nail and popped a tire en route to the interview. When you need to pivot, there’s a good, better, and best way to reschedule a job interview. Here’s how to do it professionally, so you can nail the gig when the timing is right.
What is a W-9 and How to Fill One Out
When you began working for yourself, you probably didn’t account for the tax reporting work that will fall on your shoulders each year. If you’re a freelancer, independent contractor, or business owner, filing your taxes is not as simple as uploading your W-2 form into some online tax preparation software. Most self-employed people need to complete a W-9 as a step for accurately reporting their earnings to the IRS. Below, you can learn how to fill out a W-9 and when to submit it.
A Comprehensive Guide to Becoming a Better Conversationalist
Have you ever stood awkwardly next to someone at a party because you didn’t know what to say to them? How about at a networking event or on a first date? You're not alone if you’ve ever experienced this uncomfortable silence. Many people struggle to master the art of being a great conversationalist.