Unleash Your Potential: Ignite Your Insurance Career! Ignite your career with our booming insurance company! Fuel your passion for success as we blaze a trail of consistent growth year after year.We’re on the lookout for exceptional individuals to join our dynamic team and ride the wave of our...
Oversees the investigation of complex computer and information security incidents to determine extent of compromise to national security information and automated information systems. Oversees the configuration and validation of secure systems, tests security products/systems to detect computer and ...
As a CTA and Senior Security Consultant at Kyndryl, you will join the Kyndryl Consultant Profession, collaborating with other consultants, architects, project managers, and technical experts. As a CTA and Senior Security Consultant, you will be responsible for ensuring the confidentiality, integrity...
Degree in Cyber Security, Computer Science, or related subject; or genuine equivalent experience working in cyber-security, GRC, security audit etc. BlueVoyant Cyber Security Consultants work within the Professional Services team advising, supporting, and managing clients. Consultants must have demo...
The Senior Security Consultant is an expert level role, responsible for translating clients’ cybersecurity requirements and customising and implementing security solutions into specific systems, applications and product designs. Able to drive the security architecture conversations with the clients ...
As a domain consultant for network security transformation, you provide technical expertise and guidance in customers' network security and zero trust journey. You evangelize our industry leadership in on-prem, cloud, and security services that establish Palo Alto Networks as a customer’s cybersecur...
As a Security Consultant II, you will be responsible for:. Demonstrate web application security experience or Cloud Security Providers. Would you enjoy working with cutting-edge web security systems?. We integrate and maintain Akamai security, media, and performance solutions for our clients. ...
As a domain consultant for network security transformation, you provide technical expertise and guidance in customers' network security and zero trust journey. You evangelize our industry leadership in on-prem, cloud, and security services that establish Palo Alto Networks as a customer’s cybersecur...
We are looking for a System Consultant to join our Professional Services team. As a System Consultant you will be involved with the implementation of our software solutions and work on a team with Project Managers and Data Conversion Professionals. The System Consultant demonstrates a proven ability...
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper is hiring a professional Sales Operations Analyst to join our Sales Operations team. Keeper’s cybersecurity software is trusted by millions of people and thousands of organizations, globally. Join one...
The Chief Information Security Officer (CISO) is responsible for establishing and maintaining a corporate-wide information security management program to ensure that information assets are adequately protected. Professional security management certifications, such as a Certified Information Systems ...
While you would be welcome to come into the office for team/business meetings, on-sites, meet-ups, and events, our expectation is you would regularly work from home rather than a Stripe office. A remote location, in most cases, is defined as being 35 miles (56 kilometers) or more from one of our off...
Strong understanding of current information security related regulations, standards, and best practices; advanced knowledge in current data and voice technologies, advanced knowledge in current security technologies and tools; strong interpersonal, communication, and project management skills; minim...
Your responsibilities will be varied and dynamic, spanning asset classification models, risk assessment reports, information security policies, security solution scenarios, implementation plans, organization models, procedures, security services, security effectiveness evaluation reports, and securi...
PC proficiency, including basic knowledge of MS Office products, including Outlook, Word and Excel. ...
Strong understanding of current information security related regulations, standards, and best practices; advanced knowledge in current data and voice technologies, advanced knowledge in current security technologies and tools; strong interpersonal, communication, and project management skills; minim...
This role involves creating, maintaining, and updating security policies, automating security validation, and supporting various cloud security initiatives. ...
Report and help investigate security-related incidents and security violations as requested by the Computer Security Incident Response Center (CSIRC). Junior Cyber Security Specialist (ISSO)Job Category: Information TechnologyTime Type: Full timeMinimum Clearance Required to Start: NoneEmployee Type...
Bloomberg’s CTO Office is the future-looking technical and product arm of Bloomberg We envision, design, and prototype the next generation infrastructure, hardware, and applications for the Bloomberg Terminal. Bloomberg is looking for a Technical Product Manager to shape and execute the vision, and...
Piper Companies, security, cyber security, engineer, vulnerability management, Nessus, burp suite, nexpose, compliance, security controls, fedramp, client, network scanning, app scanning, aws, azure, gcp, cloud, vulnerability management, CVSS, CMSS, audit, policies, . Responsibilities of the Securit...
Analyst is a member of a service team with upwards of four (4) personnel within the Information Security Operations group that are focused on data loss prevention (DLP), data aggregation/sharing monitoring, sensitive information management, cryptographic services, telemetry logging, and secure file ...
Monitor and analyze security events and alerts from multiple sources, including security information and event management (SIEM) software, network and host-based intrusion detection systems, firewall logs, and system logs. You will feed in to and drive internal service improvement processes and init...
The Security Analyst will work closely with our Managed Security Service Provider (MSSP) and internal teams to ensure robust security monitoring, efficient incident escalation, and proactive threat hunting. We are seeking a skilled and experienced Security Analyst to join our cybersecurity team. Wor...
The Senior Virtual Chief Information Security Officer(Senior vCISO) will provide strategic leadership and oversight for the information security programs of VC3 managed clients. One or more of the following qualifications: Certified Information Security Manager (CISM), Certified Information Systems ...
The Contractor Analyst will be experienced in risk management, risk and control self assessments (RCSA), standards, and enterprise Governance, Risk and Compliance (GRC) tool operations. The Analyst will understand how ORM framework applies to the business and be able to articulate need for issue man...