Apply a strong understanding of security protocols, cryptography, authentication, authorization and security. Authorization and security within the context of cybersecurity. Consultant level (multiple openings) in Foster City, CA to:. Design, build, test and implement security systems with VISA's IT...
A company is looking for an Associate Red Team Security Consultant. ...
A Security and Risk professional specializing in application security and modernization, focused on updating and transforming existing applications to cloud-first models, enhancing their resilience against evolving threats. Demonstrate deep knowledge in application security with a focus on security ...
A company is looking for a Senior Cybersecurity Specialist - Cybersecurity Regulatory Assessment. ...
The Senior Consultant on the Offensive Security team is focused on assessing and challenging the security posture across a comprehensive portfolio of clients. Assist Crypsis Leadership in the development of security standards and best practices for the organization and recommend security enhancement...
A company is looking for a Cloud Security Consultant in New York, NY, USA. ...
Cyber Security domain with design and implementation various cyber security solutions, such as – (should know most of following):. Remediation of network security compliance reports generated daily, including the deviation of security standards configurations on a global scale. Manage and administra...
Successful candidates coming from an academic background will likely have a Bachelor's degree in Computer Science, Computer Engineering, Electrical Engineering, Math, Information Security, Information Assurance, Information Security Management, Cybersecurity, Cybersecurity Policy, Public Policy, Int...
We are looking for a highly-skilled Security professional with a good aptitude for Threat Modeling, ability to read through (software) architectural documents and requirements from the different business groups and give accurate and actionable recommendations for the engineers to implement. The Cons...
Brosnan Risk Consultants provides exceptional security services nationwide. Here at Brosnan Risk Consultants, our culture encourages and supports diversity throughout the workplace! We offer both full-time and part-time opportunities. Many of our employees began their careers as Security Officers, a...
Possess in-depth knowledge on enterprise security architecture across one, or more of the following domains - Identity & Access Management, Cloud Security, Endpoint Security, Network Security, Application Security, Security Operations and Incident Response. This means you have a deep and broad under...
Role: SAP Basis & SecurityConsultant. SAP GRC configurationfor Access Provisioning Emergency Access new Security roles buildfor SAP BRIM Application Components. SAP AND Basis AND Security ANDS/4 HANA AND BRIM AND MFA AND SSO. ...
Apply a strong understanding of security protocols, cryptography, authentication, authorization and security. Authorization and security within the context of cybersecurity. Cyber Security Engineer – Sr. Cyber Security Engineer – Sr. ...
As a domain consultant for network security transformation, you provide technical expertise and guidance in customers' network security and zero trust journey. You evangelize our industry leadership in on-prem, cloud, and security services that establish Palo Alto Networks as a customer’s cybersecur...
Consultant, Technology Consulting, Cyber Security (Privacy) (Manager)(Multiple Positions), Ernst & Young LLP, San Jose, CA. Apply risk management principles to a cybersecurity environment and leveraging cybersecurity frameworks / standards. Logging, monitoring, and security event management . Must h...
As a domain consultant for network security transformation, you provide technical expertise and guidance in customers' network security and zero trust journey. You evangelize our industry leadership in on-prem, cloud, and security services that establish Palo Alto Networks as a customer’s cybersecur...
Web Application Security Security Design Review Threat Modeling. We are looking for a highly-skilled Security professional with a good aptitude for Threat Modeling, ability to read through (software) architectural documents and requirements from the different business groups and give accurate and ac...
The Cloud Security Team comprises security professionals who oversee the security aspects of an organization's cloud assets. As part of their role, they also suggest security solutions and work with other cybersecurity teams to enhance the security of cloud assets. The successful incumbent will be p...
Role : SAP Secuirity Consultant. Strong system administration & SAP Security. ...
As a domain consultant for network security transformation, you provide technical expertise and guidance in customers' network security and zero trust journey. You evangelize our industry leadership in on-prem, cloud, and security services that establish Palo Alto Networks as a customer’s cybersecur...
Apply a strong understanding of security protocols, cryptography, authentication, authorization and security. Authorization and security within the context of cybersecurity. Consultant level (multiple openings) in Foster City, CA to:. Design, build, test and implement security systems with VISA's IT...
KBSL / Careers / Consultant – Presales – Information Security Solutions. Consultant – Presales – Information Security SolutionsWHAT YOU SHOULD HAVE:. A minimum of 10 years’ pre-sales consulting and/or solution design experience in an enterprise network & security environment. Experience on enter...
Apply a strong understanding of security protocols, cryptography, authentication, authorization and security. Authorization and security within the context of cybersecurity. Cyber Security Engineer – Sr. Consultant level (multiple openings) in Foster City, CA to:. ...
Web Application Security Security Design Review Threat Modeling. We are looking for a highly-skilled Security professional with a good aptitude for Threat Modeling, ability to read through (software) architectural documents and requirements from the different business groups and give accurate and ac...