- UpvoteDownvoteShare Job
- Suggest Revision
Cybersecurity experience and/or CISSP, CompTIA Security+ or other Cyber certification. Learn to effectively use the tools required for risk management at DTCC such as PDMS / MetricStream / Archer.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with most standard IAM security protocols (Eg: OAuth, OIDC, RACF, SAML, LDAP, ID Federation, SSO, MFA, UEBA) is required. Experience with Information Security frameworks (, ISO , CIS, MITRE ATT&K and NIST) & security architecture frameworks.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
3+ years of information security experience including experience in one or more of the following security disciplines: information security monitoring, incident response, vulnerability management, host/network forensics, cyber-crime investigation, penetration testing, business continuity, or cyber threat intelligence.
$84,000 - $179,200Full-timeExpandApply NowActive JobUpdated 27 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Support Internet/Extranet Engineering through use of Firewalls, IDS/IPS, various proxy gateway and other network security devices to provide defense-in-depth protection from cyber security threats.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This role will assist and coordinate with incident response staff, threat intelligence, vulnerability management, and perimeter security teams during response activities and cyber investigations.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Senior Network Engineer within Global Network Services Advanced Network Support will be responsible for support and maintenance of Fidelity Investments Internet work services, including routers and switches, load balancing and security for the company.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Follow the DTCC processes and methodologies for risk management Learn to effectively use the tools required for risk management at DTCC such as PDMS / MetricStream / Archer. TRM network and app pen test findings, FOSS findings.
ExpandApply NowActive JobUpdated 15 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Ping Identity, PingFed, PingOne, PingID, PingAuthorize, IAM, Identity Access Management, OAuth, LDAP, SSO, MFA, Information Security, Cybersecurity, security architecture. As an Identity Access Management (IAM) Security Architect for the Cybersecurity Architecture Team, you will focus on existing identity access management controls (on-premise and cloud), design new and efficient security architectures, influence change in control standards, create IT security standards easily consumed by stakeholders, create access specific security patterns & diagrams, and own the Identity & Access Management 3 year roadmap.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Ensure security solutions comply with relevant regulatory requirements (e.g., GDPR, HIPAA, PCI DSS) and industry standards (e.g., NIST, ISO/IEC). The primary areas of focus for the Cloud Security Architect are to partner closely with Cloud teams in developing Cloud risk management strategy, assess current posture, and drive remediation.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Fidelity Fund & Investment Operations (FFIO) is seeking a Director, Security Architect to help deliver next generation cloud-based platforms. Relevant certifications such as CISSP, CISA, CCSP, AWS Security Principles, and AWS Certified Solution Architect preferred.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Explore more InfoSec / Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Possess advanced knowledge of network and application vulnerability assessment, IT practices, risk assessment practices, change control, data privacy, and business continuity. Provide consulting services on key strategic IT initiatives and projects as well as in reviews of security systems and internal controls under development.
InternExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Candidates must be referred for selection to the Border Patrol Agent position before reaching their 40th birthday in accordance with Department of Homeland Security Directive 251-03. AMO is actively seeking applicants to fill full-time security-based positions with the nation’s largest law enforcement organization charged with maintaining the security of our national borders while facilitating lawful international travel and trade.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Job SummaryThe work of the Aircraft Cleaner classification, depending on assignment, includes any or all of the following; Comply with WFS site security procedures for assigned warehouse and other operations.
$16.5 an hourPart-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with vulnerability management, endpoint security, data protection technologies, SIEM deployments, security analysis and anomaly detections. Research and investigate cyber threats and security incidents.
Full-timeExpandApply NowActive JobUpdated 26 days ago
cyber security vulnerability jobs in Southlake, TX
FEATURED BLOG POSTS
How To Decorate a Cubicle for Inspiration & Productivity
You know the negative reputation cubicles have – dull, dreary, gray. How can you possibly be expected to sit in one every day and be your naturally productive, enthusiastic, and upbeat self? The answer lies in decorating your cubicle so it sparks creativity and feels welcoming. While this might seem impossible given the bland canvas you have to work with, take heart because it’s totally doable!
How do Employers Verify Education?
At any stage in your professional journey, you may come across an employer or a recruiter who asks to verify your educational credentials. This shouldn’t come as a surprise as 30% of candidates admitted to lying on their resumes, yet 79% of them never get caught. In fact, 85% of employers in the US who conduct background checks find that candidates have lied on their resumes or job applications.
How to Be More Articulate and Speak More Clearly
Have you ever had those moments when you're talking to someone and have no idea what they are saying? The best response you can muster up is a simple head nod or blind agreeance?
How to Ask for a Higher Starting Salary
Maybe you think you’ve finally found your dream job. Everything about it is perfect, except… the salary. Unfortunately, it just isn’t where you want it to be. So, should you give up and move on? Given all the effort you’ve already invested, it’s probably wise to try and negotiate a better salary before you do.
How to Pass a Personality Test with Flying Colors
Whether you’re applying for your first job or looking to move up the career ladder, personality tests aren’t usually the first thing we think about. But surprisingly, they can have a massive impact on how our future employers perceive us. In fact, a 2017 study by the Society for Human Resource Management (SHRM) has found that 32% of U.S. employers use personality tests when hiring for senior management positions, and 28% use them for middle management positions. Personality tests are also used for hourly workers and contractors, though less frequently.
10 Practical and Effective Strategies to Persuade Anyone of Anything
Learning how to persuade people is like a key that can unlock any door. Acing the interview for the job of your dreams. Getting the best deal on a new car. Closing a sale with a skeptical customer. All of these wins require a level of persuasiveness.