Get the job you really want.
Maximum of 25 job preferences reached.
Top Cybersecurity Jobs
Financial Services
Lead cybersecurity architecture strategy and develop solutions across technologies. Manage teams and innovate in risk identification and problem solving.
Top Skills:
AICloud-Based PlatformsCvssCybersecurity FrameworksGlbaMitre Att&CkMlNist 800-53OwaspPci
Information Technology • Software
Lead Vulnerability Assessment Team overseeing cybersecurity operations, identifying and mitigating vulnerabilities, and collaborating on security solutions, while providing mentorship and ensuring compliance with best practices.
Top Skills:
CybersecurityPenetration TestingRisk AssessmentTenableVulnerability Assessment ToolsVulnerability ManagementWiz
Information Technology • Software
The role integrates cybersecurity solutions, coordinates technology deployments, addresses vulnerabilities, and ensures compliance with security standards while serving as a primary liaison for end-users.
Top Skills:
CmmcComputer ScienceCybersecurityGdprIsoMicrosoft Power BiNist
Information Technology • Software
The role involves analyzing cyber threats, supporting military operations, synthesizing data from various intelligence sources, and providing strategic insights and reporting.
Top Skills:
Computer ScienceCybersecurityHumintMicrosoft Power BiOsintSigint
Information Technology • Software
The role involves providing expertise in Cyber Operations at a Joint Operations Center, developing SOPs, maintaining situational awareness, and facilitating communication and reporting for operational effectiveness.
Top Skills:
Artificial IntelligenceCybersecurityMachine LearningMicrosoft Power Bi
Fintech • Payments • Financial Services
As a Manager in Cybersecurity & Technology Control Assessment, you will conduct control testing, manage operational risks, and ensure compliance with regulations while collaborating across teams to enhance risk management strategies.
Top Skills:
AIAudit MethodologiesControl TestingCybersecurityRobotic Process Automation (Rpa)Technology Risk
Information Technology • Software
The Nightwing Military Program offers training and opportunities in cybersecurity and related fields, focusing on skills development and preparation for future roles.
Top Skills:
AICloud ForensicsCybersecurityIncident ResponseNetwork EngineeringSystems Administration
Information Technology • Software
Nightwing Military Program offers technical training and support in various cyber specialties. Responsibilities include upskilling, participating in meetings, and monitoring opportunities. Training includes hands-on labs and role-specific paths for cybersecurity professionals.
Top Skills:
AICybersecurityData OperationsSoftware ModernizationSystems IntegrationTechnical Surveillance
Artificial Intelligence • Big Data • Information Technology • Security • Software
The Cyber Security Design Authority will oversee cybersecurity governance, assess products, guide teams in security, and promote cybersecurity maturity within the organization.
Top Skills:
CybersecurityEmbedded SystemsIotOt
Consulting
The Information Systems Security Engineer will perform security assessments, design secure environments, and support compliance with Cybersecurity standards.
Top Skills:
Cissp CertificationCybersecurityDod Risk Management FrameworkInformation Systems Security Engineering Professional CertificationNist Risk Management FrameworkPki
Consulting
Lead a team conducting cybersecurity risk assessments and reporting for a federal agency, analyzing risks and providing actionable recommendations.
Top Skills:
CybersecurityNist Federal Information Processing StandardsRisk Analysis
Software • Analytics • Defense
Oversee internal IT infrastructure and security operations, manage compliance with CMMC standards, and ensure network performance and security of data.
Top Skills:
Apple HardwareCmmc StandardsCybersecurityFirewallsIntrusion DetectionIt InfrastructureNetworkingNist 800-171System AdministrationVpns
New
Cut your apply time in half.
Use ourAI Assistantto automatically fill your job applications.
Use For Free
Big Data • Fintech • Mobile • Payments • Financial Services • Data Privacy
Oversee global Cyber Incident Response & Management program, ensuring effective response to security threats while providing team leadership and collaboration with stakeholders.
Top Skills:
CybersecurityEdrForensic ToolsNist Cybersecurity FrameworkSIEMSoar
Information Technology
Analyze target networks and SIGINT data, develop exploitation plans, and collaborate with teams to share findings and insights.
Top Skills:
CybersecurityIp Core InfrastructureNetwork InfrastructureSigint
Information Technology
As a Digital Network Exploitation Analyst, evaluate target networks, analyze SIGINT data, develop tradecraft, and collaborate with teams to share insights.
Top Skills:
Computer ArchitectureComputer ForensicsCybersecurityNetwork SecurityNetwork/System AdministrationPenetration TestingProgramming MethodologiesSigintSystems EngineeringVulnerability Analysis
Information Technology
Evaluate target opportunities and analyze SIGINT and cybersecurity data. Develop tradecraft, collaborate with teams, and document findings.
Top Skills:
CybersecurityIp Core InfrastructureSigint
Artificial Intelligence • Cloud • Information Technology • Security • Software
Lead and manage cybersecurity personnel in protecting information assets, ensuring compliance with DoD standards, and overseeing cybersecurity engineering and strategies for the Army National Guard.
Top Skills:
Certification And AccreditationConfiguration ManagementCross Domain SolutionsCybersecurityCybersecurity EngineeringDod PoliciesEnterprise ArchitectureIt Security StandardsPublic Key InfrastructureRisk AssessmentVulnerability Management
Healthtech • Pharmaceutical • Manufacturing
The role involves assessing cyber risks in applications, leading risk assessments, communicating findings, and enhancing risk assessment processes.
Top Skills:
Application Risk AssessmentControl FrameworksCybersecurityGrc ToolsInformation SecuritySecurity Standards
Artificial Intelligence • Cloud • Information Technology • Security • Software
The SOC Mid-Level Analyst monitors security events, responds to incidents, conducts threat hunting, and collaborates with engineering teams to enhance security measures.
Top Skills:
CirtCybersecuritySIEMSoar
Aerospace
The ISSE will lead cybersecurity strategy execution, ensure compliance with DoD standards, and facilitate security assessments for the Air Force's ABMS Division.
Top Skills:
AcasCybersecurityEmassHbss/TrellixNist 800-53Risk Management Framework (Rmf)Siem Platforms
Aerospace
The ISSM will provide cybersecurity and RMF support, lead security audits, interface with leadership, and manage security compliance activities.
Top Skills:
AcasCybersecurityHbssNist 800-53Nist Special PublicationsRisk Management Framework (Rmf)
Fintech
The IAM Manager leads cybersecurity teams, managing resources, implementing security controls, and enhancing monitoring and logging protocols to mitigate risks for the bank.
Top Skills:
CybersecurityIdentity And Access ManagementMonitoring And Logging
Fintech • Information Technology • Insurance • Financial Services • Big Data Analytics
The intern will work with MetLife's Global Security team focusing on cybersecurity. Responsibilities include supporting security initiatives, analyzing vulnerabilities, and collaborating with various teams on security projects.
Top Skills:
Ai SecurityAzure DevopsCloud SecurityIdentity And Access ManagementPowershellPythonSQLThreat IntelligenceVulnerability Management
Aerospace
The role involves serving as a Senior ISSE to perform assessment and authorization tasks related to cybersecurity compliance, risk assessments, and maintaining Authorizations to Operate for DoD medical systems.
Top Skills:
AppdetectiveAssured Compliance Assessment SolutionCybersecurityDisa StigsEmassFortifyInformation TechnologyNist 800-53Risk Management FrameworkWebinspect
Insurance
The Senior Counsel will provide legal advice on cybersecurity and incident response, lead investigations, and ensure compliance with privacy laws, while collaborating with various business sectors.
Top Skills:
CybersecurityData PrivacyInformation Security
Top Companies Hiring Cybersecurity Roles
See AllPopular Job Searches
All Filters
Total selected ()
No Results
No Results

























