Maximum of 25 job preferences reached.
Top Cybersecurity Jobs
21 Days AgoSaved
Information Technology • Professional Services • Security • Defense
As a Digital Network Exploitation Analyst, analyze SIGINT and cybersecurity data, evaluate target networks, and develop analyses to support intelligence missions while working with various stakeholders in a collaborative environment.
Top Skills:
AlgorithmsComputer ArchitectureComputer ForensicsComputer ScienceCybersecurityData StructuresEngineeringLogic And ComputationMathematicsNetwork SecurityPenetration TestingProgramming LanguagesProgramming MethodologiesSystems Administration
Consulting
The role involves optimizing the Qualys platform for reporting and risk visibility, supporting external attack surface management, and collaborating with cybersecurity and IT stakeholders.
Top Skills:
CsamCybersecurityEasmQualysServicenowVmdr
Fintech • Financial Services
The Vice President of Technology Control Management oversees technology risks, monitors control effectiveness, and ensures compliance with security policies while leveraging AI for risk assessment and reporting.
Top Skills:
AICybersecurityTechnology Controls
Information Technology
As a Cybersecurity Engineer, you will develop and review cybersecurity policies for Armament systems, advise on security design implementation, conduct assessments, and provide support to the program office for cybersecurity-related activities.
Top Skills:
Ai/MlCloud SystemsCybersecurityStigsWeapons Systems
Software • Cybersecurity
Responsible for managing partner sales and alliances, driving measurable outcomes, and collaborating in a high-growth organization. Requires extensive experience in partner management.
Top Skills:
Alliance ManagementCybersecurityPartner EcosystemZero Trust Segmentation
Insurance
The role involves leading architecture in cybersecurity, advancing Zero Trust architecture, and collaborating to create security solutions while managing a team of architects.
Top Skills:
AWSCloud Security Alliance MethodologiesCybersecurityIdentity And Access ManagementNist Cybersecurity FrameworkZero Trust Architecture
Information Technology • Software
The Vice President, Cyber Strategy defines SHI's Cyber strategy, developing market positions and aligning cross-functional teams to enhance customer outcomes and infrastructure transformation.
Top Skills:
Ai InfrastructureAutomationCybersecurityHybrid CloudOrchestrationVirtualization
Information Technology • Business Intelligence • Consulting
As a Cybersecurity Engineer, you will support RMF activities, develop compliance packages, and coordinate security assessments for a DoD platform.
Top Skills:
CybersecurityDod ComplianceInformation AssuranceRisk Management Framework (Rmf)
Reposted 21 Days AgoSaved
Information Technology • Software • Analytics • Cybersecurity
The Cyber Technical Analyst designs and maintains cybersecurity processes, conducts assessments, implements security measures, and provides leadership to junior staff.
Top Skills:
CybersecurityData AnalyticsEngineeringSoftware Development
Fintech • Financial Services • Cryptocurrency
The CISO will lead cybersecurity initiatives, manage a security team, develop security policies, ensure compliance, and collaborate with engineering and product teams.
Top Skills:
CybersecurityGdprIsoNist Cybersecurity FrameworkRisk ManagementSoc 2
Information Technology
The Cybersecurity Engineer I will implement and maintain cybersecurity protections, monitor for vulnerabilities, and assist in incident response.
Top Skills:
CybersecurityDod PoliciesNetwork Security
Information Technology • Software
The role involves responding to security incidents, enhancing incident response processes, conducting investigations, and performing proactive threat hunting.
Top Skills:
AWSAzureCybersecurityEdrMitre Att&CkSIEM
New
Cut your apply time in half.
Use ourAI Assistantto automatically fill your job applications.
Use For Free
Hardware • Information Technology
The Senior Manager, Cyber Defense acts as Chief of Staff, providing guidance and overseeing Cyber Defense Teams while managing projects and stakeholder relationships.
Top Skills:
Crisis ManagementCyber IntelligenceCybersecurityIncident Response
Security • Cybersecurity
As a C4I Cyber Intelligence Analyst, you will conduct all-source intelligence analysis and provide support for military C4I functions, focusing on telecommunications infrastructure and system vulnerabilities.
Top Skills:
C4IComptia Security+CybersecuritySigintTelecommunications Networks
Cloud • Information Technology • Software • Consulting
The SOC Lead will manage SOC operations, oversee incident response activities, and ensure high standards in cybersecurity for federal clients.
Top Skills:
AnalyticsCloud MigrationCybersecurityData DeliveryProject Management
Insurance • Agriculture
The Senior IT Internal Auditor will conduct IT audits and SOX work globally, ensuring compliance and effectiveness of IT controls and governance.
Top Skills:
CobitCybersecurityIso 27001Iso 27017It General ControlsIt GovernanceIt InfrastructureItilNist
Fintech
Lead and execute audits over IT functions, manage audit activities, communicate findings, coach team members, and ensure compliance with internal standards.
Top Skills:
AgileAuditing ToolsCloud ComputingCybersecurityData AnalyticsDevops ToolsItil StandardsMiddleware TechnologiesNetwork InfrastructureServer Operating Systems
Artificial Intelligence • Software • Cybersecurity
The Senior AI Sales Engineer will lead technical sales discussions, design solutions, mentor junior engineers, and represent the company at events, focusing on AI-powered cybersecurity solutions.
Top Skills:
AICybersecurityMlSales EngineeringSolutions Architecture
News + Entertainment
The Security Engineer will enhance security operations, design solutions for various environments, and manage incident responses while improving the overall security posture.
Top Skills:
Active DirectoryAWSAzure AdCybersecurityEndpoint SecurityIdentity ManagementMicrosoft SentinelOffice 365SIEMThreat Intelligence
Edtech
Lead comprehensive IT audits, assess IT controls, provide recommendations for improvements, engage stakeholders, and support advisory engagements.
Top Skills:
AutomationCloud TechnologyCybersecurityData ScienceIt Audit Standards (Isae 3402It ControlsSoc 1Soc 2)
Information Technology • Consulting • Cybersecurity
The Cybersecurity Liaison will serve as a trusted advisor to agency CIOs and CISOs, translating cybersecurity concepts, coordinating audits, improving communication, and overseeing accreditation activities.
Top Skills:
CybersecurityData ProtectionEndpoint ManagementGrc Automation PlatformsInformation AssuranceIt Security AuditsSIEMVulnerability ManagementVulnerability Scanning
Information Technology • Software
The role involves supporting a mission-critical program by developing system engineering documentation and conducting cybersecurity evaluations. Responsibilities include technical support, requirements assessment, and managing security risks while ensuring compliance with certification processes.
Top Skills:
CybersecurityInformation AssuranceSystems Engineering
Information Technology • Software
Lead the development and implementation of cybersecurity solutions within a DoD enterprise data program, managing a team, and ensuring compliance with security standards.
Top Skills:
Ai/Ml ModelsCotsCybersecurityFossGotsMbseSIEMSoarZero Trust Architecture
Other • Security
Oversee global cyber assurance activities, manage audits, compliance requirements, and collaborate with stakeholders to ensure effective information security practices.
Top Skills:
AuditboardCybersecurityGrc PlatformsIso/Iec 27001 CertificationSoc 2 Reporting
Greentech
This role involves protecting systems and data from cyber threats, conducting assessments, managing security tools, and ensuring compliance with security standards.
Top Skills:
AWSAzureCloud SecurityCybersecurityFirewallsGCPIdsIpsMxdrPowershellPythonSIEM
Let Your Resume Do The Work
Upload your resume to be matched with jobs you're a great fit for.
Success! We'll use this to further personalize your experience.
Popular Job Searches
All Filters
Total selected ()
No Results
No Results































