- UpvoteDownvoteShare Job
- Suggest Revision
As a Malware Analyst and Penetration Tester, you will play a critical role in detecting, analyzing, and mitigating advanced cyber threats to ensure the security and resilience of our organization and clients' systems.
RemoteExpandUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Certifications such as GIAC Certified Incident Handler (GCIH), Certified Malware Analyst (CMA), Offensive Security Certified Professional (OSCP), or equivalent are highly desirable. We are looking for a skilled and experienced Technical Cyber Incident Responder with expertise in malware analysis and penetration testing to join our dynamic team.
RemoteExpandUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The GMSD is responsible for providing the technical consultations, operational support and troubleshooting, benchmarking, building strategies, business planning, and conducting assessment in the areas of safety and environmental compliance, cyber security, advance process control and optimizations, energy and electrical efficiency, process engineering, reliability and maintenance, operational excellence etc.
Full-timeExpandApply NowActive JobUpdated 18 days ago - UpvoteDownvoteShare Job
- Suggest Revision
As a Virtual Cyber Security Sales Engineer at our Client, you will play a pivotal role in driving the success of our cybersecurity solutions across the United States. Virtual Cyber Security Sales Engineer.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Recognized as one of the top audio-video integrators in the nation, Ford AV is known for installing some of the largest and most complex AV projects for ExxonMobil, AT&T, Houston Intercontinental Airport, State Farm, Fannie Mae, Apple, Denver International Airport, Broncos Stadium, U.S. House of Representatives, and the Cyber Warfare Integration Center for the U.S. Military.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
2-5 years of technology experience in one or more of the following areas: Information Security, Technology Governance, Operational Risk, Technology Audit, Cyber Security, Technology Infrastructure or Application Development.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Work with senior engineers to define cyber security requirements for current and future state end-to-end architectures and platforms to advance security controls and the security posture of the business.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
One of our key clients within the financial industry is looking for a Red Team Cyber Security Engineer for a full-time position. Strong experience with database security testing (MSSQL, DB2, MySQL, etc.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Manage Cryptography and Key Management program to ensure compliance requirements such as PCI DSS, PCI TSP and NIST cyber security frameworks while supporting multiple products with both Symmetric and Asymmetric keys to protect the integrity, authenticity, and confidentiality of sensitive and high value data.
ExpandApply NowActive JobUpdated 19 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience in leadingSIEM Architect, SOAR Engineer, / managing cyber security functions, strategy, and risk within Fortune 500 companies, or providing those services in a consulting capacity.
Full-timeExpandApply NowActive JobUpdated 20 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Security certification(s) and/or official training, such as CompTia Sec+, CompTia CySa+, GCIH, CSIH, ECSA, CHFI, ECIH, CEH, AWS SA, similar, or degree are a plus. The Threat Management Associate will perform detection and analysis activities through the monitoring of security appliances, such as, SIEM, IDS/IPS, EDR, and other Threat Detection platforms.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
GI Alliance is seeking an experienced Cyber Security Engineer. Additionally, the Cybersecurity Engineer will operate the controls according to sound cyber-risk management principles and aligns with relevant standards.
Full-timeExpandApply NowActive JobUpdated 19 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Led by the Chief Information Security Officer (CISO), Technology Risk secures Goldman Sachs against hackers and other cyber threats. We are a team of security, software, and data engineers that identify and curate technology data, provide technology solutions in the threat management space, and drive real-time response processes to meet regulatory and management requirements.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Technology, engineering, & operations is looking for an – Application Security Engineer Intern. We are looking for an intern candidate with a preferred background in software development who is interested in Cyber Security and is looking to improve their skills.
Full-timeExpandApply NowActive JobUpdated Today
cyber security engineer jobs in Dallas, TX
FEATURED BLOG POSTS
How to Describe Your Personality with Examples
Imagine you’re in an elevator with the CEO of your dream company and you get to talking. The conversation is going well and you start to imagine yourself working for their company when the CEO turns around and asks you “tell me a bit about yourself.” Would this catch you off guard or would you be able to give a clear and succinct description of who you are?
4 Ways to Make Your Job Posting More Inclusive
According to a Glassdoor survey,
How to Calculate Net Income
Understanding your finances can be daunting even if you’re good with numbers. Your net income, in particular, is a key metric for determining how well you’re doing financially and whether your current way of operating is sustainable or not.
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra:
6 Best Ways to End a Cover Letter with Examples
Including a cover letter with your resume is a great way to introduce yourself to the hiring manager, tell them why you’re the ideal fit for the role, and provide context about your personal situation. A strong cover letter will give you an advantage over other applicants. But it’s important that you structure it properly and write it powerfully so that it carries an impact. This article will discuss how to end a cover letter effectively so you catch the eye of a hiring manager and increase your odds of landing an interview. Read on to learn more.
How to Write a Follow-Up Email for a Job Application?
Most times, we have to do more than submit a "sugar-coated" resume to land our dream jobs. Going the extra mile to follow up on your job application can increase your chances of employment. Additionally, it may even help you get confirmation sooner on whether you are seriously being considered for the job or not.
How to Address a Cover Letter With Examples
It’s easy to get caught up in focusing on your resume – how it looks, what it says, and whether it’s going to land you a job interview. Because there is a big focus on building the perfect resume, job searchers often overlook the importance of a high-quality cover letter. Your cover letter plays a huge role in your first impression. It humanizes you and provides context for your resume.