Oversees the investigation of complex computer and information security incidents to determine extent of compromise to national security information and automated information systems. Oversees the configuration and validation of secure systems, tests security products/systems to detect computer and ...
As a Security Consultant II, you will be responsible for:. Demonstrate web application security experience or Cloud Security Providers. Would you enjoy working with cutting-edge web security systems?. We integrate and maintain Akamai security, media, and performance solutions for our clients. ...
Unleash Your Potential: Ignite Your Insurance Career! Ignite your career with our booming insurance company! Fuel your passion for success as we blaze a trail of consistent growth year after year.We’re on the lookout for exceptional individuals to join our dynamic team and ride the wave of our...
Degree in Cyber Security, Computer Science, or related subject; or genuine equivalent experience working in cyber-security, GRC, security audit etc. BlueVoyant Cyber Security Consultants work within the Professional Services team advising, supporting, and managing clients. Consultants must have demo...
As a CTA and Senior Security Consultant at Kyndryl, you will join the Kyndryl Consultant Profession, collaborating with other consultants, architects, project managers, and technical experts. As a CTA and Senior Security Consultant, you will be responsible for ensuring the confidentiality, integrity...
Whether new hires are interns, co-ops, or full-time consultants, SRA Corps members meet our founders, learn our values, and experience a day in the life of a cybersecurity consultant. The Offensive Security Senior Consultant position will be part of our Advisory practice on the Technical Assessments...
As a domain consultant for network security transformation, you provide technical expertise and guidance in customers' network security and zero trust journey. You evangelize our industry leadership in on-prem, cloud, and security services that establish Palo Alto Networks as a customer’s cybersecur...
The Senior Security Consultant is responsible for providing expert-level information security consulting services in a technological and advisory capacity to Lumen customers. The consultant must possess an operational security mindset, superior customer interaction skills, and a broad perspective on...
As a domain consultant for network security transformation, you provide technical expertise and guidance in customers' network security and zero trust journey. You evangelize our industry leadership in on-prem, cloud, and security services that establish Palo Alto Networks as a customer’s cybersecur...
The Senior Security Consultant is an expert level role, responsible for translating clients’ cybersecurity requirements and customising and implementing security solutions into specific systems, applications and product designs. Able to drive the security architecture conversations with the clients ...
Strong understanding of current information security related regulations, standards, and best practices; advanced knowledge in current data and voice technologies, advanced knowledge in current security technologies and tools; strong interpersonal, communication, and project management skills; minim...
ACI fabric security and Layer 4 to Layer 7 integrations with ACI management features. IOS, NX-OS and XE hardening for security. ...
As an Information Security Analyst, you will be responsible for safeguarding our customer's computer systems, networks, and data from potential security breaches, threats, and vulnerabilities. Symmetrio, a SoluStaff Company, is recruiting for an Information Security Analyst. You will analyze and ass...
Job Title: Technical Security Analyst - Bug Bounty Program. Assigning vulnerabilities to appropriate teams: Once the vulnerabilities are prioritized, bug bounty triage analysts assign them to the appropriate teams such as development or security operations for remediation. Years of experience in sec...
Strong understanding of current information security related regulations, standards, and best practices; advanced knowledge in current data and voice technologies, advanced knowledge in current security technologies and tools; strong interpersonal, communication, and project management skills; minim...
As an SAP Basis & Security Architect, you will be a key member of our technology team, responsible for designing, implementing, and maintaining the SAP landscape within the context of the innovative SAP RISE model. Ocean Spray is hiring for a(n) SAP Basis & Security Architect! We’re a team of farmer...
Understanding of shared security model within OCI including data security, account and identity, application, network controls and Operating System security. Cloud Information Systems Security SpecialistJob Category: Information TechnologyTime Type: Full timeMinimum Clearance Required to Start: None...
The ideal candidate will have a strong background in business process analysis, change management, and cybersecurity compliance. Develop and execute change management plans to support the successful implementation of cybersecurity initiatives. Analyze current business processes related to cybersecur...
Job Description: We are looking for a Ping Identity and Access Manager (IAM) Architect to design, implement, and maintain our IAM solutions, ensuring the security and accessibility of our systems. PING CERTIFICATION REQUIRED Job Title: Ping Identity and Access Manager Architect (Remote) Locati...
We are seeking a Senior Manager to join Product Security to lead a team of security researchers and security architects as they work with engineering teams to integrate security into the SDLC. As a Manager Senior Information Security, you will be responsible for:. Contributing to the strategic direc...
Ready to jam with us? Apply now and let’s make some security magic at DistroKid!. ...
Job Title: Security Operations Center (SOC) Manager (100% Remote). Security Operations Analyst, Incident Responder, Forensic Examiner, or Security Architect/Administrator. Preferred certifications: EnCase or equivalent forensic examiner certification, GIAC certifications (GCIH, GNFA, GCFA, GCTI), Of...
The Security Analyst will work closely with our Managed Security Service Provider (MSSP) and internal teams to ensure robust security monitoring, efficient incident escalation, and proactive threat hunting. We are seeking a skilled and experienced Security Analyst to join our cybersecurity team. Wor...
Security Analyst’s primary responsibility is to monitor all information security tools and systems for unusual and unauthorized activity, as well as Indicators of Compromise (IoC). The hands-on control of security for an international company and management of Security systems. Monitor of all securi...
Compliance Manager, IT Security Auditing (Remote Option Available)-2402357. This role is part of the branch examination program and includes a team focused on virtual computer reviews, server maintenance requirements, information security, and other technology-related security assessments within the...