Maximum of 25 job preferences reached.
Top Cybersecurity Jobs
Information Technology
The Threat Intelligence Analyst will analyze APT threats, support cyber operations, provide intelligence assessments, and coordinate with the Intelligence Community and Cyber Command.
Top Skills:
AnomaliCybersecurityIntelligence Community Analytical StandardsMispMitre Att&Ck FrameworkThreat Intelligence PlatformsThreatconnect
Information Technology • Consulting
Lead Cybersecurity Engineer responsible for designing, implementing, and managing cybersecurity programs and ensuring compliance with DoD standards.
Top Skills:
CybersecurityNiprnetRisk Management FrameworkSiprnet
Reposted 17 Days AgoSaved
Mobile • Security • Software • Cybersecurity
The Senior Manager oversees Keeper's operational delivery for federal deployments, ensuring secure compliance and coordination across engineering and government stakeholders.
Top Skills:
Compliance FrameworksConfiguration ManagementCybersecurityDevOpsDod Cloud Computing SrgFedrampIncident ResponseOperational ControlsRmf/Nist 800-53Sre
Fintech • Financial Services
The Director, Cybersecurity Regulatory Engagement manages cybersecurity regulatory activities, ensuring alignment with regulations and guiding risk management strategies. Responsibilities include leading regulatory exams, coordinating responses, and improving governance frameworks.
Top Skills:
AIComplianceCybersecurityRisk Management
Fintech • Information Technology • Marketing Tech • Financial Services
The Senior Manager of Threat Management oversees application security, vulnerability management, and penetration testing, embedding security in software development and guiding remediation efforts.
Top Skills:
AIApi SecurityApplication SecurityCybersecurityDastIacLlmSastScaVulnerability Management
Insurance
The Manager of Insider Threat Services leads the team responsible for detecting and mitigating insider threats, ensuring compliance with regulations and continuously improving analytics capabilities.
Top Skills:
Behavioral MonitoringCybersecurityData AnalyticsGeneral Data Protection RegulationNist Standards
Aerospace • Information Technology • Software • Cybersecurity • Design • Defense • Manufacturing
The ISSO will lead the implementation of security policies and practices, perform risk assessments, manage compliance monitoring, and oversee incident response activities.
Top Skills:
AcasAudit ReductionDisa StigsHbssNessusRisk Management Framework (Rmf)Scap
Artificial Intelligence • Automotive • Greentech • Information Technology • Machine Learning • Software • Cybersecurity
Manage a team to enhance detection capabilities against cyber threats, develop detection strategies, and ensure compliance with regulations while collaborating with incident response and threat intelligence teams.
Top Skills:
AWSAzureEdrGCPMitre FrameworksNdrSIEMSoar
Artificial Intelligence • Automotive • Greentech • Information Technology • Machine Learning • Software • Cybersecurity
Lead a team in designing and implementing advanced cyber threat detection capabilities while collaborating with internal teams on incident response and compliance efforts.
Top Skills:
AvDlpEdrNdrSIEMSoarThreat Intelligence
Artificial Intelligence • Hardware • Information Technology • Security • Software • Cybersecurity • Big Data Analytics
As a Cybersecurity Engineer, lead security assessments for client systems, ensure compliance with FedRAMP, FISMA, and NIST RMF, and mentor team members in secure cloud architecture.
Top Skills:
AcasDb ProtectDisa Stigs/Stig ViewerNessusNmapWebinspect
Automotive • Professional Services • Software • Consulting • Energy • Chemical • Renewable Energy
The Cybersecurity IAM Analyst supports identity and access management solutions to ensure secure access, compliance, and effective IAM practices.
Top Skills:
Active DirectoryIdentity Governance And AdministrationMicrosoft Azure AdOktaSailpointSaviynt
Fintech • Financial Services
This VP role involves managing the firm's cyber incident response, shaping risk strategies, and enhancing readiness against emerging threats through collaboration and structured improvements.
Top Skills:
CybersecurityOperational ResilienceRisk Management FrameworksThreat Intelligence
New
Cut your apply time in half.
Use ourAI Assistantto automatically fill your job applications.
Use For Free
Reposted 18 Days AgoSaved
Fintech • Financial Services
The Executive Director oversees the fraud risk strategy for digital assets, ensuring proactive identification, governance, and control of fraud risks across Morgan Stanley's businesses.
Top Skills:
BlockchainControl DesignCryptocurrenciesCybersecurityFraud Risk Management
Cloud • Software
The Senior Insider Threat Analyst conducts investigations into insider threats, analyzes indicators, and performs threat hunting to prevent malicious activities.
Top Skills:
CybersecurityIncident ResponseRisk AssessmentThreat Hunting
Cloud • Software
As a Principal Insider Threat Analyst, you'll lead and mature the Insider Threat Program by conducting complex investigations, architecting threat hunting operations, and collaborating with cross-functional partners.
Top Skills:
CounterintelligenceCybersecurityIncident ResponseInsider ThreatThreat Hunting
Cybersecurity
The Jr. Cyber Hero at ThreatLocker involves updating applications, troubleshooting, supporting sales, and providing helpdesk support in an in-office capacity.
Top Skills:
Application AllowlistingConfiguration ManagementCybersecurityElevation ControlEndpoint Network ControlRingfencingStorage Control
Software
Provide cybersecurity support for the MV-75 Program, advising on risk posture, compliance, and ATO readiness while coordinating with stakeholders to ensure integrated cybersecurity considerations.
Top Skills:
Aviation SystemsCybersecurityEmbedded SystemsNist Sp 800-53/800-53ARmfSecurity Control Implementation
Automotive • Big Data • Information Technology • Robotics • Software • Transportation • Manufacturing
The role involves designing and managing PKI and secrets management systems, leading technical teams, and advising on security architecture. Responsibilities include mentoring engineers and ensuring compliance with security standards.
Top Skills:
AWSAws Secrets ManagerAzureAzure Key VaultGCPHashicorp VaultKubernetesPkiSecrets ManagementTerraform
Healthtech • Pharmaceutical
The Associate Director leads a team of auditors in technology risk management, providing oversight and developing audit methodologies for cybersecurity, data, and emerging technologies.
Top Skills:
Cloud InfrastructureCybersecurityData PlatformsInformation Technology
Aerospace • Information Technology • Professional Services • Defense
The Senior Program Manager oversees cybersecurity programs, aligning IT efforts with security objectives and managing project oversight and delivery.
Top Skills:
CybersecurityIncident ResponseIt ProgramsSecurity-Related CertificationsSoc Operations
Consulting
The Cybersecurity Manager leads cybersecurity projects, manages risks, advises on governance, and collaborates with clients while overseeing junior personnel and promoting business growth.
Top Skills:
Configuration ManagementCryptographic ToolsCybersecurityData ProtectionEndpoint SecurityIncident ManagementInformation SecurityIsoIt Asset ManagementNetwork SecurityNistRisk ManagementThreat ManagementVulnerability Management
Security
The Lead Compliance Specialist will oversee federal cybersecurity compliance, focusing on SA&A activities, documentation maintenance, and adherence to FISMA and NIST standards.
Top Skills:
CybersecurityFismaHipaaNistPrivacy ActSa&A
Information Technology • Software
The role involves leading Joint Fires Operational Planning for USCYBERCOM, coordinating targeting strategies, and analyzing cyber threats to support national security objectives.
Top Skills:
Cat Targeting ToolkitsColiseumComputer ScienceCybersecurityMidbPower BITarget Management Systems
Fintech
Lead risk analysis and develop a strategic risk framework for technology and cybersecurity initiatives, ensuring compliance with regulations and industry standards while collaborating with senior leadership and mentoring team members.
Top Skills:
CybersecurityProcess MappingRegulatory StandardsRisk AnalysisRisk Management FrameworksTechnology Compliance
Artificial Intelligence • Cloud • Security • Software • Cybersecurity
The Technical Account Manager (TAM) maintains relationships with strategic customers, ensures security outcomes, and collaborates with teams on technical advisory and account strategy in a cybersecurity context.
Top Skills:
AICybersecurityEdrSecurity+SIEMSoc
Let Your Resume Do The Work
Upload your resume to be matched with jobs you're a great fit for.
Success! We'll use this to further personalize your experience.
Top Companies Hiring Cybersecurity Roles
See AllPopular Job Searches
All Filters
Total selected ()
No Results
No Results

































