Maximum of 25 job preferences reached.
Top Cybersecurity Jobs
Aerospace • Information Technology • Professional Services • Defense
The SOC Watch Officer leads SOC operations, overseeing monitoring and incident response, and ensuring timely threat detection and remediation while coordinating across SOC functional areas.
Top Skills:
CybersecurityIncident ResponseSecurity OperationsThreat Detection
Information Technology
The role involves analyzing AI and ML threats, conducting in-depth intelligence analysis, and authoring intelligence products for operational strategies.
Top Skills:
Algorithmic ApplicationsArtificial IntelligenceBig DataCybersecurityData AnalyticsData ClusteringMachine Learning
Fintech • Payments • Software • Financial Services
The Portfolio & ZTS Manager supports the Head of Security Strategy in managing the security roadmap, coordinating Zero Trust activities, and preparing strategic materials for leadership, focusing on cross-team alignment and security portfolio maturity.
Top Skills:
CybersecurityPortfolio ManagementProgramme GovernanceTechnology StrategyZero Trust Principles
Aerospace
The Sr Cybersecurity Analyst will lead data privacy incident responses, manage compliance, enhance cybersecurity posture, and mentor junior analysts while collaborating with cross-functional teams.
Top Skills:
CybersecurityData PrivacyGdprHipaaIncident ResponsePenetration TestingThreat IntelligenceVulnerability Management
Information Technology
As a Solution Architect, you'll design secure networks for the DoD, leading project delivery, collaborating with stakeholders, and implementing cybersecurity measures and cloud technologies.
Top Skills:
AIAWSAzureCloud TechnologiesCybersecurityGCPMachine LearningNetwork Access ControlNetwork Architecture
Professional Services
The SOC Chief oversees the Security Operations Center, directs cybersecurity incident response, manages projects, and ensures compliance with monitoring objectives. They lead operational activities, coordinate with federal stakeholders, and support continuous improvement in SOC functions.
Top Skills:
Cyber Kill ChainCybersecurityInformation TechnologyMitre Att&Ck
Security • Cybersecurity
Manage hardware and software systems as a Linux Systems Administrator, providing maintenance and support, ensuring security compliance and coordinating with event staff.
Top Skills:
CybersecurityLinuxNetapp SansVhdsVMware
Reposted 2 Days AgoSaved
Information Technology • Consulting • Defense
The TDNA TTA will lead efforts in developing analytic methodologies and tradecraft while supporting cyber and intelligence missions for the US Intelligence Community. Responsibilities include technical leadership, communication of complex ideas, analyzing diverse data sets, and collaborating within a team to drive strategic change.
Top Skills:
CybersecurityInformation SystemsInformation TechnologyPythonSigintTcp DumpWireshark
Fintech • Financial Services
The Cyber Risk Management Analyst Sr supports the Cyber Risk team by managing the cybersecurity risk profile of the Bank through oversight, assessments, and compliance with regulations.
Top Skills:
CybersecurityExcelGrc Risk ToolInformation TechnologyPowerPointWord
Computer Vision • Security • Cybersecurity
The Solutions Engineer will work with the sales team in a technical pre-sales role, addressing customer cybersecurity needs by demonstrating solutions and aligning them with customer requirements.
Top Skills:
CloudCloud Security SolutionsComputer HardwareCybersecurityDatabasesIdentity & Access ManagementIt FundamentalsNetworkingOperating SystemsSaas Security
Information Technology • Consulting • Cybersecurity
The GRC Analyst will lead audits, design compliance programs, develop risk registers, and mentor junior analysts while ensuring cybersecurity and compliance excellence.
Top Skills:
CybersecurityGrcHipaaHitrustIso 27001Nist CsfSoc 2
Aerospace • Industrial
The Senior Information System Owner manages complex information systems, ensuring compliance with government standards, collaborating with cybersecurity teams, and overseeing system risks and operations.
Top Skills:
CybersecurityDigital TechnologyHigh Performance ComputingInformation SystemsNetwork ArchitectureRisk Management Framework (Rmf)
New
Track Smarter, Apply Better.
Ditch the spreadsheets. Organize your job search with our freeApplication Tracker.
Use For Free
Healthtech
The Cybersecurity Network Engineer will design, implement, and manage network infrastructure while ensuring security and compliance. Responsibilities include maintaining network devices, monitoring performance, troubleshooting issues, and developing security policies.
Top Skills:
BashCybersecurityFirewallsNetworkingPowershellPythonRoutersSwitchesVpns
Professional Services • Consulting • Financial Services
The Associate IT Auditor will assist in IT audits by evaluating controls, analyzing risks, preparing reports, and ensuring compliance with regulations.
Top Skills:
CybersecurityIt Audit
Artificial Intelligence • Automotive • Greentech • Information Technology • Machine Learning • Software • Cybersecurity
The Cybersecurity Engineer II responds to security threats, conducts forensic investigations, enhances security controls, and supports incident management and threat analysis.
Top Skills:
Advanced Email ProtectionBot ManagementCloud Security ToolsData AnalyticsDdos ProtectionEndpoint Detection And ResponseIds/IpsSaseSIEMSoarThreat Intelligence PlatformsWaf
Healthtech
The Attack Surface Management Engineer is responsible for vulnerability management and reducing cyber risk in a healthcare environment through collaboration with IT and clinical teams, maintaining security tools, and managing vendor relationships.
Top Skills:
Asset DiscoveryAttack Surface ManagementCloud TechnologiesCybersecurityDevOpsIotVulnerability Management
Mobile • Software
The Cybersecurity Engineer implements security controls, maintains compliance, supports vulnerability management, and promotes secure practices across cloud environments for the DoD.
Top Skills:
AWSAzureCloud ComputingCybersecurityGCPNist 800-53RmfSastSIEMVulnerability Management
Information Technology • Security • Consulting • Defense
The Cyber Exercise Planner will lead joint cyber exercise planning and execution, collaborate with stakeholders, and ensure alignment with MARFORCYBER objectives.
Top Skills:
Cyber OperationsCybersecurityJoint Exercise Lifecycle (Jelc)
Information Technology
The Network Systems Engineer will develop and maintain complex technology systems, emphasizing cybersecurity for the Navy, while mentoring and supporting military missions.
Top Skills:
Active DirectoryCisco IseCybersecurityEsxiIcamIt SystemsLdapLinuxMfaPingPkiRadiant LogicRadiusSshVmware VcenterWindows
Information Technology • Professional Services • Consulting
Provide expert-level support for DoD programs, ensuring cybersecurity compliance and assisting with system security engineering throughout the acquisition lifecycle.
Top Skills:
AafCybersecurityDodi 8510.01PkiRisk AnalysesRmfSecurity DocumentationSystem Security Engineering
Healthtech • Information Technology
The Vice President of Cybersecurity will lead DAS Health's cybersecurity strategy and operations, ensuring compliance and security across internal and client environments while developing high-performing teams and managing incident response.
Top Skills:
CisCloud SecurityCybersecurityGrcHipaaHitrustIamIncident ResponseIso 27001NistPci-DssSIEMSocVulnerability Management
Information Technology • Software
The Senior Disaster Recovery Analyst will develop and maintain disaster recovery plans, support testing of recovery capabilities, and coordinate recovery operations during incidents.
Top Skills:
AWSCybersecurityNist Sp 800-53Rmf
Information Technology • Security • Software • Analytics • Cybersecurity
The role involves facilitating data movement across security domains, developing documentation, standardization, and enhancements to content presentation with minimal guidance.
Top Skills:
CybersecurityData AnalyticsItSecurity+
Fintech • HR Tech • Insurance • Consulting
The role involves managing client relationships, delivering expert advisory on cyber risk, developing solutions, and leading a team. Candidates should possess extensive industry experience alongside cybersecurity expertise.
Top Skills:
CybersecurityInsuranceRisk Management
Information Technology
As a Digital Network Exploitation Analyst, evaluate target networks, analyze SIGINT data, develop tradecraft, and collaborate with teams to share insights.
Top Skills:
Computer ArchitectureComputer ForensicsCybersecurityNetwork SecurityNetwork/System AdministrationPenetration TestingProgramming MethodologiesSigintSystems EngineeringVulnerability Analysis
Let Your Resume Do The Work
Upload your resume to be matched with jobs you're a great fit for.
Success! We'll use this to further personalize your experience.
Top Companies Hiring Cybersecurity Roles
See AllPopular Job Searches
All Filters
Total selected ()
No Results
No Results
































