Get the job you really want.
Maximum of 25 job preferences reached.
Top Cybersecurity & IT Jobs
Security • Cybersecurity
The Senior Director, Office of the CISO leads strategic and operational initiatives, aligning cybersecurity priorities with business outcomes while overseeing security operations and team development.
Top Skills:
Business OperationsCybersecurityTechnology Strategy
Information Technology • Security • Cybersecurity
The Federal CTSO will lead technical initiatives and provide cybersecurity advisory services to U.S. Federal agencies, focusing on risk management and operational resilience.
Top Skills:
Compliance FrameworksCybersecurityRisk ManagementSecurity ArchitectureVulnerability Management
Big Data • Information Technology • Security • Software • Analytics
As a Training Manager/Curriculum Developer, design and deliver training programs in Intelligence, Cyber, Data Science, and AI, collaborating with SMEs to create impactful curriculum.
Top Skills:
Artificial IntelligenceCybersecurityData ScienceIntelligenceJupyter NotebooksPower BIPythonRSQLTableau
Information Technology • Consulting
The Cybersecurity Engineer will oversee cybersecurity practices, develop strategies, mitigate risks, ensure compliance, and provide training to teams.
Top Skills:
FedrampNist 800-53Security+ Ce
Fintech
The IAM Manager leads cybersecurity teams, managing resources, implementing security controls, and enhancing monitoring and logging protocols to mitigate risks for the bank.
Top Skills:
CybersecurityIdentity And Access ManagementMonitoring And Logging
Software • Cybersecurity
The Synack Red Team seeks cybersecurity researchers for vulnerability testing and intelligence delivery remotely, either part-time or full-time.
Top Skills:
CybersecurityPenetration Testing
Artificial Intelligence • Cloud • Machine Learning
The AWS Cloud Architect will provide technical support to the Joint Staff, integrating JCC2 applications while managing customer satisfaction and leading system operations.
Top Skills:
Ai/MlAtlassianAWSCybersecurityDevOpsLinuxMicrosoft
Fitness • Healthtech • Retail • Pharmaceutical
The Lead Director of Vulnerability Scanning will oversee vulnerability management, lead a team, and ensure compliance with industry standards.
Top Skills:
CybersecurityHipaaHitrustIsoNistPciRisk AnalysisScanning TechnologyVulnerability Scanning
Software • Cybersecurity
As a Digital Network Exploitation Analyst 3, you will work on complex computer systems, requiring deep expertise in cybersecurity, information systems, and programming methodologies.
Top Skills:
Computer ForensicsComputer ScienceCybersecurityInformation SystemsNetwork AdministrationPenetration TestingSystems EngineeringVulnerability Analysis
Financial Services
As a Senior Lead Cybersecurity Architect, you'll develop and implement cybersecurity strategies, lead threat modeling practices, mentor others, and evaluate emerging technologies.
Top Skills:
Att&CkAWSAzureCybersecurity SolutionsGCPProgramming LanguagesSoftware Engineering MethodologiesStride-Lm
Fintech
The Director of Technology Risk leads contract negotiations related to cybersecurity and technology for Fidelity's clients, ensuring alignment with company policies and mitigating risks.
Top Skills:
AICybersecurityDataTechnology Risk Management
Software • Cybersecurity
The Cyberspace Operations Analyst I provides operations research analysis support for intelligence and cyberspace operations, focusing on model development, data analysis, and strategic policy recommendations.
Top Skills:
Computer EngineeringComputer ScienceCybersecurityMathematical ModelingOperations ResearchStatistical Analysis
New
Cut your apply time in half.
Use ourAI Assistantto automatically fill your job applications.
Use For Free
Software • Cybersecurity
Responsible for assessing training effectiveness, maintaining joint training standards, developing training materials, and coordinating training events for cyberspace forces.
Top Skills:
Cybersecurity
Software • Cybersecurity
Provide operations research analysis support for intelligence and cyberspace operations, utilizing mathematical and statistical methods to inform decision-making. Develop evaluations and recommendations for operational performance and planning.
Top Skills:
Computer EngineeringComputer ScienceCybersecurityOperations Research
eCommerce • Food • Information Technology • Mobile • Cybersecurity • App development • Big Data Analytics
The IAM Engineer III will design and maintain secure authentication and access control solutions, collaborating with cross-functional teams to enhance identity and access management practices.
Top Skills:
Active DirectoryLdapMicrosoft EntraOauthOpenid ConnectSAML
Financial Services
The role involves designing, implementing, and managing IAM solutions, overseeing technical teams, and ensuring compliance with cybersecurity standards while leading large-scale IAM projects.
Top Skills:
Active DirectoryAzure Active DirectoryFido2Identity And Access ManagementLdapOpenid ConnectSAMLWebauthn
Information Technology
The Digital Network Exploitation Analyst evaluates target networks, analyzes cybersecurity data, develops tradecraft, and shares insights with teams and stakeholders.
Top Skills:
Computer ForensicsCybersecurityNetwork SecurityPenetration TestingSigintVulnerability Analysis
Information Technology
As a Digital Network Exploitation Analyst, you'll evaluate target opportunities, analyze SIGINT and cybersecurity data, and develop exploitation plans in collaboration with a diverse team.
Top Skills:
Agency ToolsCybersecurityFirewallsIp InfrastructureLinuxNetworkingObfuscation NetworksOsi Network StackProxiesRoutersSigintSwitchesVpnsWindows
Automotive • Cloud • Greentech • Information Technology • Other • Software • Cybersecurity
The role involves advising engineering teams on cybersecurity practices, mitigating risks, and ensuring compliance with regulations while maintaining strong stakeholder collaboration.
Top Skills:
.NetAccess ControlsAWSDevsecopsIaasJavaMulti-FactorOauthOidcOraclePaasPythonSaaSSAMLSecrets ManagementSpring FrameworksZero Trust
Reposted 21 Days AgoSaved
Automotive • Cloud • Greentech • Information Technology • Other • Software • Cybersecurity
Design and deploy Privileged Access Management solutions, collaborate on enterprise architecture for security, and mentor team members while ensuring compliance across frameworks.
Top Skills:
Azure Key VaultBashCyberarkJavaScriptNode.jsPerlPowershellPrivileged Access ManagementPythonRubySailpoint
Automotive • Cloud • Greentech • Information Technology • Other • Software • Cybersecurity
The Lead Cybersecurity Integrated Architect advises teams on cybersecurity principles, mitigates risks, educates on best practices, and collaborates on architecture solutions.
Top Skills:
.NetAWSCloud ContainersDevsecopsIaasJavaOraclePaasPythonSaaSSecurity ProtocolsServerless PlatformsSpring FrameworksZero Trust
Automotive • Cloud • Greentech • Information Technology • Other • Software • Cybersecurity
The Lead Cybersecurity Integrated Architect communicates cybersecurity guidelines, advises on architecture, mitigates risks, and collaborates on best practices while ensuring compliance and security within engineering and product teams.
Top Skills:
.NetAWSCloudDevsecopsIaasJavaOraclePaasPythonSaaSSpring FrameworksZero Trust
Automotive • Cloud • Greentech • Information Technology • Other • Software • Cybersecurity
Lead the Detection Engineering team, develop detection strategies, enhance cybersecurity capabilities, manage incident responses, and communicate with stakeholders.
Top Skills:
AWSAzureData LakesEdrGCPNdrSIEMSoarThreat Intelligence
Automotive • Cloud • Greentech • Information Technology • Other • Software • Cybersecurity
Design and maintain identity management systems, implementing SSO and MFA solutions, ensuring compliance, and collaborating with stakeholders on security best practices.
Top Skills:
Azure AdFfiecFido2GdprIamIso 27000KerberosMfaNistOauth 2.0OktaOpenid ConnectPing IdentityRadiusSAMLSsoWindows Hello
Automotive • Cloud • Greentech • Information Technology • Other • Software • Cybersecurity
The Senior Cybersecurity Engineer will design, develop, and maintain identity governance solutions using SailPoint, troubleshoot identity issues, and collaborate with cross-functional teams to deliver IAM solutions.
Top Skills:
Active DirectoryAws IamAzure Key VaultBeanshellCyberarkHashicorp VaultIdentity Security CloudJavaOktaOracleRest ApisSailpointSoap ApisSQL Server
Top Companies Hiring Cybersecurity + IT Roles
See AllPopular Job Searches
All Filters
Total selected ()
No Results
No Results






















