- UpvoteDownvoteShare Job
- Suggest Revision
Within the Cyber Fusion Center, the Offensive Security Team continuously evaluates PepsiCo’s cyber security posture through penetration tests and red team engagements to proactively identify gaps and drive mitigations to minimize PepsiCo's cyber risk exposure.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
As a Cyber Risk Principal Associate within the Governance and Risk division, you see security as an innovation enabler and differentiator, not a step in the compliance process. You possess a technical understanding of cloud infrastructure, cyber security tools, and tool configuration management as well as risk management and controls.
Part-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Center 3 (19075), United States of America, McLean, VirginiaPrincipal Associate, Cyber Remediation ManagerAs a Cyber Remediation Manager within Security Testing Service, you see security as an enabler to empower the business.
$165,100 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Additionally, CCOR Tech & Cyber provides Firmwide end-to-end independent second line risk management oversight of Global Technology, the Chief Administrative Office including Global Supplier Services, Global Real Estate and Global Security, Business, Technology and Third Party Resiliency, Crisis Management, and Insider Threat.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As a Cyber Security Analyst III at Upbound, your primary responsibility is to deliver advanced technical analysis, guidance, and mitigation strategies for logical security threats impacting our infrastructure and data security.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Compliance, Conduct, Operational Risk Technology & Cybersecurity (CCOR Tech & Cyber) group within the organization has areas of alignment across all Lines of business (LOBs), Regions and Corporate Functions (CFs), responsible for the independent oversight of first line operational risk management practices and compliance with technology and cybersecurity laws, rules, and regulations.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Be recognized in your product as the clear point of escalation and subject matter expert for IT Risk and Cyber domains. Hands-on practical experience delivering enterprise level planning, design, and implementation of enterprise-level security solutions and controls related to: Modern Security Engineering/Architecture practices (e.g. microservices, containers, orchestration, continuous integration & delivery pipelines, API first, service delivery & integration.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Ability to influence and mature business and engineering areas within all information security domains. Experience mentoring and coaching for internal and external team members to promote a culture of security throughout the business.
$122,800 - $136,700Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
These technical deep-dive reviews will then been evaluated against technical and business resilience planning, incident response plans, and cyber intelligence reporting. Working across multiple systems of record, this role will identify areas of technical risk to the business by analyzing IT architectures, security controls, evolving industry practices, etc.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Security industry certification (CISSP, SSCP, CISM, SANS GSEC, ECSA, ECSP, and Security+) Experience with privileged access management program, specifically familiar with CyberArk solutions (i.e., Core Privileged Access Security, Endpoint Privilege Manager Application Access Manager, Privileged Session Manager, Privileged Threat Analytics, Central Password Manager, Connectors.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Security safeguards should be in accordance with industry standards, generally accepted business practices and Company security policies. Design/install/operations of VPN, SoHo, WAF, IDS, DDoS, Partner Access Solutions, Network Security Stack powering Zero-Trust, Firewalls and microsegmentation protecting CCS operations infrastructure (SIEM, DataLake, WAF, IDS, SOC dashboards.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Based in Plano, Texas TTS-US, a Toyota group company, has rapidly transformed itself into a technology and mobility establishment and a leading provider of IT security, including network security, endpoint security, cloud security, cloud workload, mobile security, data security, and security management in addition to threat intelligence, and cyberattack response services.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
As a member of the Information Security team, the Cybersecurity Analyst is responsible for protecting the company from intrusions, malware, threat actors, and other forms of cyber attacks.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Application Security Cyber Engineer is responsible for enhancing the security of software applications by implementing secure coding practices, conducting security testing, and collaborating with development teams to ensure security is integrated throughout the development process.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Associate's Degree Business Administration, Criminal Justice, Law Enforcement, Security or closely related field preferred. CSO - Commissioned Security Officer Texas Private Security Level 2, 14 days of hire required and.
Full-timeExpandApply NowActive JobUpdated Today
cyber security jobs Title: director business development Company: Bae Systems in Garland, TX
FEATURED BLOG POSTS
5 Common Interview Mistakes
Everyone's interview process is unique in some form or fashion. Like most, your interview process is crafted so you can get the most information out of your candidates to increase hiring confidence and make the right hiring decisions. However, there are often small problems in interview processes that could ultimately affect the success of hiring decisions.
How to Ask Someone to be a Reference + Email Templates
One part of the job-hunting process that frequently gets overlooked is putting together a list of good references. Most of the time we focus on creating the perfect resume, writing an awesome cover letter, and getting our hands on letters of recommendation. We think about what outfit we’ll wear to the job interview, how we’ll answer those tricky questions, and what our career plan looks like. But, in fact, having multiple references lined up who will speak favorably about you to a potential employer is critical to landing a job. This aspect of job searching really can’t be ignored.
Job Rejection Email Response with Examples
Glassdoor estimates that, on average, there are about 250 applicants for every job vacancy out there. If you’ve ever applied for a job, the odds are that you’ve received the dreaded job rejection email.
Structured vs Unstructured Interviews
The goal of an interview is to evaluate candidates based on their skills, personality, and knowledge. You want to choose the BEST candidate from your candidate pool, so the interview is something you can't mess up. As you begin planning your interview process, one of the major decisions you'll face is whether the interview should be a structured vs unstructured interview. So let's take a dive into the differences and sort out which circumstances warrant which interview process.
How to Describe Your Personality with Examples
Imagine you’re in an elevator with the CEO of your dream company and you get to talking. The conversation is going well and you start to imagine yourself working for their company when the CEO turns around and asks you “tell me a bit about yourself.” Would this catch you off guard or would you be able to give a clear and succinct description of who you are?
4 Ways to Make Your Job Posting More Inclusive
According to a Glassdoor survey,
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra: