- UpvoteDownvoteShare Job
- Suggest Revision
Risk Advisor, Technology Consulting - Cyber Security (Cyber Threat Management - Vulnerability ID) (Manager) (Multiple Positions), Ernst & Young U.S. LLP, Houston, TX.
Full-timeExpandApply NowActive JobUpdated 19 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Strong understanding of the following: networking fundamentals (all OSI layers, protocols); Windows/ Linux/Unix/Mac operating systems as well as software vulnerability and exploitation techniques; commercial or open-source offensive security tools for reconnaissance, scanning, exploitation and post-exploitation (e.g. Cobalt Strike, Metasploit, Nmap, Nessus, Burp Suite.
Full-timeExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The successful candidate will have a background in cyber security, experience in managing a security practice, and have a heavy background in IAM, DR, business continuity, vulnerability management, security controls, and more all within a cloud organization from a design, architecture and strategic perspective.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The company offers a personalized Open XDR approach to Managed Detection and Response, advanced Threat Hunting, Digital Risk Protection, Phishing Response, and Incident Response services, helping customers mature their security program efficiently and effectively based on their unique risks and business needs.
RemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Process Control Network Specialist will help design, deploy and support Process Control Networks to deliver a Secure and Reliable PCD IT security services. Must have mastery of skills in the configuration and maintenance network security controls that safeguard the process control layer.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Provide technical maintenance of ICS/OT systems pertaining to Network Infrastructure and Endpoint management. The role involves overseeing general technical processes to ensure optimal performance & operation while maintaining the security posture to minimize cyber exposure risk.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Strategic Security (SSC) is a nationwide leading provider of security guard services, executive protection, bomb dog, intelligence, consulting, investigative services. Pass and possess a State Licensed Armed Security Guard Card / License if required by your State / City / Locality that you reside in and or that you will be working in.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Supporting Role: Work alongside the Chief Information Security Officer (CISO) and Information Management (IM) Services teams to support security deliverables and operations. Security Information & Event Management (SIEM) solutions - ingesting log sources, tuning triggers and correlation rules to remove white noise, implementing new detections, and conducting maintenance / administration for the SIEM solution.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Design, specify, estimate, and plan telecom systems, including network management, plant radio, mobile GSM, videoconferencing, transmission systems, CATV, industrial WiFi, meteorological systems, PAGA, process CCTV, and RFID.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Chief Engineer is responsible for the efficient operation of all building systems (HVAC operations, mechanical, electrical systems, drainage and plumbing, elevators/escalators and security/fire/life safety), general and preventative maintenance, tenant services, utility tracking and vendor oversight.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Gas Insulated Switchgear, High Voltage Installations, Customer Owned High Voltage Transmission Lines, Prefabricated Substations, Electrical System Design and Analysis, Electrical Calculations (Load Flow, Motor Starting, Short Circuit, Harmonic Analysis, Transient Stability, Relay Coordination, Arc Flash), Protective Relaying, Power Management Systems, Power Transformers, High Power Adjustable Speed Drive Systems, Battery Energy Storage Systems (BESS), PV/Wind Energy, Microgrid Systems, etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Cyber Privileged Access Management CyberArk Senior Consultant. Deloitte Advisory's Cyber Risk team helps complex organizations more confidently pursue their growth, innovation, and performance agendas through proactive management of the associated cyber risks.
$97,613 - $188,375 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Three or more years as a technical leader with expert technical domain expertise in three or more of the following: Virtualization, ESRI, Content Management, Presentation Technologies (VDI, Citrix), SSO/SiteMinder, Web Services/SOA frameworks and technologies, Enterprise Storage, (FC, NFS, CIFS, ISCSI.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Senior Data Engineer plans and coordinates information management activities in compliance with data governance processes and data security requirements. The Senior Data Engineer assists in managing business partner relationships with the Chief Data Office organization and data stewards to optimize information management that supports end-to-end solution delivery, data engineering and data analytics delivery within the Context Engine.
$155,000Full-timeExpandApply NowActive JobUpdated 13 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Sunflower Bank N.A. is seeking a seasoned Wealth Management Advisor responsible for providing thoughtful and meaningful wealth planning and investment management advice to high-net-worth individuals, families, businesses, and non-profit organizations.
ExpandApply NowActive JobUpdated Today
network security vulnerability management cyber jobs Title: engineer in Houston, TX
FEATURED BLOG POSTS
How Long Does it Take to Hear Back from a Job?
Are you applying for your very first job? Maybe you’re anticipating your termination from your current role and want to be proactive. Either way, waiting to hear back on your job application can be stressful. If time has passed since you applied, you may wonder how long does it take to hear back from a job. Well, the answer is... it depends.
How to Respond to a Recruiter Through Email? (Tips & Examples)
Rather than wading through an endless list of open roles, wouldn’t it be nice if relevant job opportunities come to you?
How to Reject a Candidate Professionally
When deciding on how to reject a candidate, your first question may be
How Does Salary Pay Work? (Compared to Hourly Pay)
At the bottom of each job advertisement, companies label a role as salaried or hourly. Both methods will get you paid (yay), but each in very different ways. So, it's essential to figure out how does salary pay work? While employees paid by the hour are paid based on how long they work, employers pay salaried employees a fixed amount.
The Quiet Quitting Phenomenon
The term, quiet quitting, was coined in 2009, but only now is it gaining traction as young Millennials and Gen Z workers are experiencing record levels of burnout. With the pandemic and the state of the economy, young employees are feeling the pressure. So, quiet quitting comes into effect when that pressure is exasperated by work stress and no managerial support.
How Does Salary Range Work (With Examples)
What are your salary expectations? Do you know? Establishing a salary that compensates you fairly and keeps you happy at work can feel like taking a shot in the dark. And employers sure don’t make learning budgets easy!
Guide to Hiring a Teenager
Teenagers are full of life. They bring energy and adaptability that may be hard to get from older workers, but does that mean that hiring teens is beneficial? Well, it depends. As you debate whether or not you should integrate teenagers into your workforce, there are some things that you should know first.