Maximum of 25 job preferences reached.
Top Cybersecurity Jobs
Machine Learning • Security • Software • Analytics • Defense
The Senior Cybersecurity Analyst supports operations, compliance, and security policies while providing expertise on cybersecurity strategy and governance.
Top Skills:
Anti-VirusAWSAzureCloud Access Security BrokerCorelight InvestigatorFirewallsIntrusion Detection SystemsIntrusion Prevention SystemsLinuxmacOSMalwareMicrosoft DefenderSentinelTcp/IpUnixVulnerability ManagementWindows
Information Technology • Professional Services • Security • Cybersecurity
The Principal Product Manager will define and evolve cybersecurity offerings, drive requirements through development lifecycles, and build strong inter-departmental relationships.
Top Skills:
AIApplication SecurityCloud SecurityCybersecurityEndpoint Detection And ResponseNetwork Detection And ResponseSIEMVulnerability Management
Information Technology • Consulting
The Sr. Program Manager will oversee a SOC program, ensuring cybersecurity service delivery, stakeholder relationships, team leadership, and program execution.
Top Skills:
AgileAIBig Data PlatformsCybersecurityIt Project ManagementMachine LearningSoc Operations
Professional Services • Security • Consulting • Cybersecurity
The intern will assist in testing cybersecurity processes, conduct research, produce content, and support the cybersecurity team in incident response activities.
Top Skills:
CybersecurityDigital Forensics
Information Technology • Business Intelligence • Consulting • Defense
Analyze target networks, support cyber operations through cybersecurity data analysis, vulnerability assessment, and operational planning activities. Requires experience in network security and analysis.
Top Skills:
CybersecurityNetwork ProtocolsSigintTraffic Analysis
Big Data • Cloud • Security • Software • Analytics
The Senior Reverse Engineer will reverse engineer complex code bases, collaborate with analysts, and perform development tasks while supporting a U.S. Government customer.
Top Skills:
CybersecurityHacking MethodologiesNetworking TechnologiesReverse EngineeringSoftware Development
Information Technology
Responsible for accrediting IC systems, implementing software security techniques, conducting security testing, and providing consulting on secure coding practices.
Top Skills:
CybersecurityForensic InvestigationInformation SecurityMalware Reverse Engineering
Consulting
The Enclave Program Manager will lead the technical and security operations within secure enclave environments, ensuring federal compliance and managing complex projects.
Top Skills:
CybersecurityFederal Security FrameworksFismaHardwareHhs GuidelinesIt InfrastructureNetwork DevicesNistSoftware
Information Technology
Analyze SIGINT and cybersecurity data, develop exploitation plans, collaborate with teams, and apply analytical techniques to distill insights from data.
Top Skills:
AIComputer ForensicsCybersecurityMachine LearningMalware TriagePenetration TestingSigint
Edtech
The Cybersecurity Operations Researcher conducts analytical studies on risk and security data while collaborating with multidisciplinary teams. Responsibilities include applying cybersecurity knowledge, analyzing network security challenges, and producing technical documentation. The role involves engaging with international stakeholders and delivering training and tools to enhance cybersecurity operations.
Top Skills:
Computer Network Defense ToolsComputer ScienceCybersecurityOpen-Source Platforms
Financial Services
Lead the management of technology risks across the enterprise, ensuring alignment with risk appetite and regulatory expectations, while enhancing control maturity and driving accountability in technology risk management.
Top Skills:
AICybersecurityFfiecNist CsfSox Itgc
Information Technology • Software
The Cyber Action Officer manages cyber incidents, coordinates responses, reports incident metrics, evaluates threats, and communicates updates to leadership.
Top Skills:
Cyber Network DefenseCybersecurityIncident ResponseMitre Att&Ck FrameworkNetwork Security MonitoringSystem AdministrationThreat HuntingTraffic Analysis
New
Track Smarter, Apply Better.
Ditch the spreadsheets. Organize your job search with our freeApplication Tracker.
Use For Free
Security
The Partner Development Manager will manage strategic partnerships in the federal sector, develop go-to-market strategies, and support government procurement processes while ensuring strong relationships with resellers and system integrators.
Top Skills:
Cybersecurity
Information Technology • Software
The Incident Manager III will analyze cyber threats, provide intelligence support, and collaborate with various stakeholders to enhance cybersecurity measures.
Top Skills:
CybersecurityIntelligence Community Database Search ToolsOpen-Source Intelligence
Fintech
The Analyst will support technology audits by assessing risks, executing audit programs, testing controls, engaging stakeholders, and driving innovation in auditing processes.
Top Skills:
AICloudCobitCybersecurityIt AuditItilNist
Information Technology • Consulting
Responsible for providing IT support, troubleshooting hardware/software, managing Windows Server environments, and applying cybersecurity best practices.
Top Skills:
Active DirectoryCybersecurityGroup PolicyIa ToolsMecmNist Sp 800-37Nist Sp 800-53PowershellRmfStigsWindows Server
Automotive • Retail
The role involves enhancing CarMax's Cybersecurity program by conducting risk assessments, developing compliance processes, and delivering information security training while collaborating with technology teams.
Top Skills:
CfpbCobitCosoCybersecurityGlbaHippaInformation Risk ManagementIso-27001/2ItilNistOwaspPayment Card Industry (Pci)SansSarbanes-Oxley
Information Technology • Software
The C-SCRM SME Analyst conducts risk assessments, supports SCRM processes, and collaborates on compliance with supply chain policies and regulations, ensuring mission-critical capabilities for the Department of War.
Top Skills:
CybersecurityEmassGrc ToolsNist 800-161Nist Sp 800-30Nist Sp 800-37Nist Sp 800-53
Cybersecurity
As Federal Chief Technical Advisor, you will serve as a trusted CTO-level advisor to federal agency leadership, providing strategic cybersecurity guidance, solving complex technology challenges, and driving account growth through technical insight and relationship management.
Top Skills:
Cloud SecurityCybersecurityEndpoint SecurityGrcIdentity And Access ManagementSIEMSoarZero Trust
Aerospace
The ISSM oversees cybersecurity operations, ensuring compliance with relevant regulations, maintaining documentation, and training staff while monitoring IT security posture and changes.
Top Skills:
Agile DevelopmentCloudCybersecurityRisk Management Framework (Rmf)
Artificial Intelligence • Healthtech • Analytics • Biotech
The IT Auditor will evaluate technology controls, assess risks, and enhance IT auditing strategies while collaborating with global stakeholders to improve operations and compliance standards.
Top Skills:
Cloud ComputingCobitCybersecurityFairIso 27001Itil V3Network & It InfrastructureNist 800-171Nist 800-53Sdlc
Cloud • Software
The Director of Platform Defense and Safety leads efforts to protect Salesforce from fraud and abuse, managing a team and coordinating prevention strategies across the organization.
Top Skills:
CybersecurityData Processing And AnalysisSalesforceThreat IntelligenceTrust And Safety
Security
Lead day-to-day operations and strategic execution for the IRS Cybersecurity Fraud Analytics and Monitoring program, managing multidisciplinary teams and coordinating stakeholder engagement and response activities.
Top Skills:
Cloud-Based AnalyticsCybersecurityData AnalyticsETLForensic AnalysisFraud AnalyticsMachine LearningPredictive AnalyticsSIEM
Big Data • Cloud • Hardware • Software • App development
As an InfoSec GRC Analyst, you will drive compliance initiatives, support audits, and design training while collaborating with various departments to enhance InfoSec operations.
Top Skills:
Ai ToolsAudit ToolsCompliance MethodologiesCybersecurityInformation SecurityReporting Tools
Reposted 7 Days AgoSaved
Automotive • Information Technology
The Technology Audit Manager leads internal and external security audits, coordinating activities, managing stakeholders, and integrating findings into risk processes.
Top Skills:
CisCybersecurityGrcInformation TechnologyIso 27001Nist Csf/800-53
Let Your Resume Do The Work
Upload your resume to be matched with jobs you're a great fit for.
Success! We'll use this to further personalize your experience.
Top Companies Hiring Cybersecurity Roles
See AllPopular Job Searches
All Filters
Total selected ()
No Results
No Results



































