- UpvoteDownvoteShare Job
- Suggest Revision
Deloitte Advisory's Cyber Risk team helps complex organizations more confidently pursue their growth, innovation and performance agendas through proactive management of the associated cyber risks.
$188,375 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Systems Security Engineering creates holistic security solutions leveraging Anti-Tamper (AT), Cyber Security, Software Assurance, and Supply Chain Risk Management to support Program Protection Implementation on embedded weapons systems.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Understanding of networks, risk management, network security, digital forensics, and security operations. Analysis of cyber threat intelligence and fraud intelligence.
$172,600 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Risk Management: Identify and assess security risks, and address through ensuring appropriate architectural solutions with appropriate security controls. Spearhead and design the implementation of security architectures that safeguard the company's critical intellectual property and operational infrastructure, ensuring resilience against advanced cyber threats and compliance with industry regulations.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Engage in response activities that may include incident response, incident management, driving remediation or threat mitigation, threat hunting, forensic analysis; conduct other security operations activities that may include identification of weakness (for example, vulnerabilities/ insecure configurations), reviewing/assessing security configuration change requests, driving the coverage of the security monitoring services.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Minimum of 5 years experience in designing, developing, implementing, and managing solutions across cybersecurity domains (Cyber Defense, Cloud Security, Infrastructure/Network Security, Threat and Vulnerability Management, Application Security, Advanced Security Analytics, Data Security, Identity Management, Security Operations, Supply Chain Security, Managed Security Services, etc.
Full-timeExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Founded in 2013 by security and risk experts Dr. Alex Yampolskiy and Sam Kassoumeh and funded by world-class investors, SecurityScorecard’s patented rating technology is used by over 25,000 organizations for self-monitoring, third-party risk management, board reporting, and cyber insurance underwriting; making all organizations more resilient by allowing them to easily find and fix cybersecurity risks across their digital footprint.
Full-timeExpandApply NowActive JobUpdated 12 days ago - UpvoteDownvoteShare Job
- Suggest Revision
About the Role: The Manager of Cyber Security leads the development, implementation, and ongoing coordination of an enterprise-wide cyber security governance, risk & compliance management (GRC) program including cyber risk identification, analysis, and mitigation, tracking and reporting to executive management.
Full-timeExpandApply NowActive JobUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience and expert knowledge on NIST guidelines, FISMA, Cybersecurity principles and methodologies, Executive Orders (EO's), Office of Management and Budget (OMB) Memorandums, Federal, DoD and CISA Technical Reference Architectures, Maturity Models, Risk Management Framework (RMF), Cybersecurity Framework (CSF), technical knowledge of IT systems, and cloud security (is preferred.
Full-timeExpandApply NowActive JobUpdated 18 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Graduation from an accredited post-secondary college or university with major coursework in information technology or cyber security, computer information systems, computer science, management information systems, or a related field is strongly preferred.
$11,299.5 a monthFull-timeExpandApply NowActive JobUpdated 19 days ago - UpvoteDownvoteShare Job
- Suggest Revision
These projects should be targeted to enable multiple business processes and/or source data systems to drive efficiencies and reduce redundancies supporting one or more of the following functions: internal audit, compliance, enterprise risk management, operational risk management, technology risk management, third party risk management, cyber security, business resiliency, incident management, SOX (and/or other compliance frameworks), or other business programs/initiatives.
Full-timeExpandApply NowActive JobUpdated 12 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Applied knowledge of technologies for data mapping, risk assessments, third party risk management, compliance tracking, security controls management. Keyword: Cyber, Security, Compliance, I PCI, NIST, ISO, Compliance Manager, Google VPC, AWS Cloud, CISA, CISM, CISSP, AWS, Security Administrator.
Full-timeExpandApply NowActive JobUpdated 22 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Provide subject matter expertise in third-party risk management. We provide strategic and technical advice, and we have expertise in areas covering Artificial Intelligence, Cloud Migration, Custom Software Development, Data Analytics Infrastructure & Cloud Solutions, Cyber Security Services, etc.
Full-timeExpandApply NowActive JobUpdated 17 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Founded in 2013, backed by KKR, Summit Partners, and NEA, and trusted by over seven thousand enterprises across the globe, this leading cybersecurity company offers a SaaS product suite that proactively fights against complex cyber security threats such as includes insider threats, industrial espionage, IoT compromises, zero-day malware, data loss, supply chain risk, and long-term infrastructure vulnerabilities.
Full-timeExpandApply NowActive JobUpdated 6+ months ago - UpvoteDownvoteShare Job
- Suggest Revision
Minimum five (5) years of experience in Information Technology operational and/or engineering roles of which at least three (3) years of experience in IT security, compliance, or risk management developing and deploying security technologies, policies, standards, and procedures.
Full-timeExpandApply NowActive JobUpdated Yesterday
management risk cyber security jobs in Austin, HI, United Kingdom
FEATURED BLOG POSTS
6 Common Mistakes to Avoid When Employer Branding
Currently, job searchers are putting extra effort into researching employers. The information they find plays a major role in whether they will pursue an opportunity with you or look for jobs elsewhere. That is why it is now more important than ever to be proactive and intentional when showcasing your workforce and workplace culture. Having a well crafted employer branding strategy can help you strategize and influence your potential candidates so they see your business in the best light. But in order to do that, you should be aware of some of the most common mistakes that employers make.
What to Say When Terminating an Employee
Terminating an employee is an inevitable part of doing business. Whether you’re re-structuring your department or you’ve identified a few employees who’re not living up to your expectations, letting people go is necessary for keeping your workforce healthy and thriving.
How to Utilize Keywords for Your Job Ads
Before we give you the scoop on how to utilize keywords in job ads, it would be helpful if we defined what keywords are and why they are important. In simple terms,
What Makes a Good Paid Time Off (PTO) Policy
The world of work has undergone some major transformation in recent years. From remote and flexible work to increased emphasis on employee benefits and wellbeing, companies nowadays have to be very intentional about their HR policies and how they approach talent acquisition.
Internal Recruiting: Benefits and 5 Internal Recruiting Methods to Consider
Internal and external recruiting are nearly the same thing. The biggest difference is where candidates are sourced. There are instances where external recruiting may be the best option. However, when you are presented with the opportunity to recruit internally, you should take full advantage of the different internal recruiting methods. Initially you will find that the hiring process gets a little bit easier. Then you'll notice all the other benefits that internal recruiting offers.
How to Answer the Interview Question: What is Your Communication Style?
As a job searcher, you probably have so many questions about job searching. However, once you've landed an interview, your excitement takes your questions to a whole new level. What will you wear? Will you know how to answer all the questions? Have you practiced giving nice firm handshakes?
What Makes a Company a Great Place to Work
After one too many after-hours emails, you’re on the hunt for a new gig. But what makes a company a great place to work? And how will you know when you find one? Finding a motivating, safe, and productive work environment is important for our mental and physical health. If you’re financially frustrated, creatively stuck, or just plain over it, it’s time to find a healthier workplace where you can flourish.