- UpvoteDownvoteShare Job
- Suggest Revision
Responsible for leading incident response, threat intelligence, and event co-relation for a broad set of technologies under the cyber security program. Build, deploy, and maintain security technologies to ensure the security and integrity of FormFactor, Inc's information systems according to the current cyber security program.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The company offers a personalized Open XDR approach to Managed Detection and Response, advanced Threat Hunting, Digital Risk Protection, Phishing Response, and Incident Response services, helping customers mature their security program efficiently and effectively based on their unique risks and business needs.
RemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This role will work with a team of cyber security consultants to help assess and test various controls within our clients' network to evaluate and determine compliance with the company's security requirements.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Strong knowledge of Windows Server operating systems, and Active Directory Knowledge of core Information Security concepts related to Governance, Risk & compliance Familiarity with security-related regulations, such as CCPA, SEC Cyber 7, and PCI-DSS.
Full-timeExpandApply NowActive JobUpdated 16 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Lead delivery of Accentures Security offerings related to cybersecurity with a focus on cybersecurity strategy definition, security program planning, security operating model design and implementation, cyber risk assessments, and implementation of programs and solutions.
$131,100 - $336,900 a yearFull-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Additionally, you’ll provide technical leadership in the overall Cyber Defense by ensuring Security Design & Architecture, Security Operations, Incident Response, Forensics, Penetration Testing, Network, Systems and Application Security, Risk Management, Red Teaming, Emerging Threat Analysis and Intelligence, Security Automation, Data Analytics & Machine Learning.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Their responsibilities include: Installing, testing, troubleshooting, repairing or replacing cryptologic networks, physical security systems, electronic equipment, antennas, personal computers, auxiliary equipment, digital and optical interfaces, and data systems Configuring, monitoring and evaluating Information Operations (IO), Information Warfare (IW) systems and Information Assurance (IA) operations Cryptologic Technician Collection (CTR) – CTRs serve as experts in intercepting signals.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
The Telecommunications Engineer must have experience and working knowledge related to the design, configuration, installation, and testing in all or most of the following systems: Closed Circuit Television (CCTV), Personnel Access Control Systems, Perimeter Intrusion Detection Systems, Public Address/General Alarm systems (PA/GA), wired and wireless network systems, Telephony Systems, Digital Radio Systems, Marine Systems, Microwave Systems, and Cyber Security implementation methods.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
At least one year of full-time work experience in security work, aviation screener work, or X-ray technician work. Providing frontline security protection of air travelers, airports and airplanes.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The candidate for this position should have experience supporting a broad-range of programs associated with overall information assurance and cyber security support; inclusive of security configuration and management services, data protection, anti-virus, malware detection and protection, host-based and endpoint security solutions, and audit and accountability services.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
As a CTI, you may work independently or as part of small, coordinated teams - ultimately under the supervision of Cryptologic Warfare Officers (four-year degree required) or Cyber Warfare Engineers (four-year degree required.
Part-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
TMHCC is a market leader in providing specialized commercial insurance products in a variety of critical industries - cyber technology, medical stop-loss, renewable energy, international travel, farm and ranch, many others.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Candidates must be referred for selection to the Border Patrol Agent position before reaching their 40th birthday in accordance with Department of Homeland Security Directive 251-03. You qualify for the GL-7 grade level if you possess one of the following: Experience: One year of specialized work experience that shows you have the skills necessary to make sound judgments and decisions; to analyze information rapidly and make prompt decisions and apply these skills in a law enforcement capacity such as training others, managing finances, code enforcement, doing compliance work, corrections, security, military, emergency responders, etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Providing technical advice and guidance for Protective Services such as Physical Security, Personnel Security, Identity and Credential Management (ICAM), Communication Security (COMSEC), Industrial Security, and Classified Information Security Information (CNSI.
ExpandApply NowActive JobUpdated 4 days ago
cyber security jobs Title: director development Company: Bae Systems in Houston, TX
FEATURED BLOG POSTS
How to Address a Cover Letter With Examples
It’s easy to get caught up in focusing on your resume – how it looks, what it says, and whether it’s going to land you a job interview. Because there is a big focus on building the perfect resume, job searchers often overlook the importance of a high-quality cover letter. Your cover letter plays a huge role in your first impression. It humanizes you and provides context for your resume.
How to Call Out of Work
No matter how happy we are with our jobs, there are days when we feel overwhelmed and want to call out of work. No, don't feel guilty. It's expected because we're humans, and we can't control the uncertainties of life. But the problem lies in how to call out of work without seeming uncommitted to work, especially if you seldom get work-free days.
What is Seasonal Employment?
Depending on where you are in your career, you might have first-hand experience with seasonal employment. Seasonal employment can be a great way to expand your skill set and earn extra cash while helping businesses meet seasonal increases in demand.
How to Avoid a Bad Hire
"A new employee who doesn't meet the minimum performance, quality, and culture fit standards you set when you began sourcing and recruiting. Additionally, bad hires will immediately show signs of self-interest instead of an interest in their role and the company."
How to Ask for a Letter of Recommendation
When the job board you subscribe to finally posts your dream job, you may feel like the stars have aligned. But part of securing a position that matches your career plan is ensuring you address all the application basics. You know, the resume, the cover letter, the portfolio. It seems like you've got this in the bag — until you realize they want a letter of recommendation, too!
What Are SMART Goals?
When it comes to achieving our goals, there’s a lot of noise to work through. A study by the University of Scranton has found that only 8% of people who set New Year’s resolutions actually achieve them. Our busy lives might be one reason for this. Another, even more important reason, is our approach to goal setting. Being too vague, too ambitious or simply unclear on the timeframe can set us up for failure.
In-House vs Outsourcing Recruiting: Which is Better?
When looking at in-house vs outsourcing recruiting, it is important to nail down the benefits for each and whether those benefits outweigh the risks that follow.