Get the job you really want.
Maximum of 25 job preferences reached.
Top Cyber Security Jobs in Cincinnati, OH
Reposted 9 Days AgoSaved
Cybersecurity
The Sr. Insider Threat Analyst mitigates and responds to insider threat security events, conducts data analysis, and coordinates with various security teams to address threats.
Top Skills:
Cyber Defense ToolsDlpScripting LanguagesUeba
Cybersecurity
Vulnerability Analysts at GuidePoint manage vulnerability programs, assess risks, communicate findings, and maintain positive customer relationships, while fostering a culture of continuous learning.
Top Skills:
ArmisAxoniusBashBigfixJAMFMac OsxPerlPowershellPythonQualysRapid7RbvmRhelServicenowSsmTaniumTenableUbuntu LinuxUvmWindows 10Windows 7Windows Server
Artificial Intelligence • Blockchain
Develop AI agents to enhance blockchain security auditing tools, focusing on threat detection, risk assessment, and translating research into practical solutions.
Top Skills:
AIBlockchainLlmsSmart Contracts
Computer Vision • Information Technology
Perform penetration testing on web applications and networks, discover vulnerabilities, develop tools, and manage projects while contributing to security measures and client communication.
Top Skills:
AnsibleAWSAzureBashBurp Suite ProC#CobaltstrikeGitlabMetasploitNessusPowershellPythonRubyTerraform
Security • Cybersecurity
The Security Engineer will design, implement, and support Firewall solutions, enhance security posture, and respond to audits and vulnerabilities.
Top Skills:
CiscoFirewall PlatformsFortinetKqlLogicappsMicrosoft Sc-200Mitre Att&Ck FrameworkSIEM
Software • Cybersecurity • Data Privacy
The Security Engineer role involves managing identity governance, access management solutions, technical support of IAM technologies, and policy development.
Top Skills:
Active DirectoryC++CyberarkJavaJavaScriptLdapLinuxOktaPerlPowershellPythonQradarSailpointSplunkSQLVenafiWindows
Information Technology • Software
As a Security Engineer, you'll enhance security for Sourcegraph's products and infrastructure through vulnerability management, application security, and incident response, contributing to a world-class security team.
Top Skills:
GCPGoKubernetesTerraformTypescript
Reposted 10 Days AgoSaved
Cybersecurity
The DFIR Consultant will support incident response and forensic investigations, perform threat discovery, communicate with clients, and utilize scripting to enhance efficiency.
Top Skills:
Amazon Web ServicesAzureBashEdrFwGoogle SuiteGoM365NdrNgavPowershellPythonSIEMVelociraptorXdr
Security • Cybersecurity
The Cyber Defense Analyst is responsible for monitoring, investigating, and responding to security alerts, leading incident response, and improving automation in a hybrid environment.
Top Skills:
AWSBashCdrCspmEdrGitOktaPythonSIEMSoar
Reposted 12 Days AgoSaved
Artificial Intelligence • Blockchain
The role involves auditing blockchain products, improving security tools, conducting research, and enhancing security processes for smart contracts.
Top Skills:
GoRustSolidity
Artificial Intelligence • Blockchain
Assist in security research by developing analysis tools, discovering vulnerabilities, and publishing findings in various venues. Ideal for Master's or PhD students in related fields.
Top Skills:
CtfGoMalware AnalysisMobile App AnalysisNetwork Anomaly DetectionReverse EngineeringRustVulnerability Detection
Cybersecurity • Data Privacy
The IAM Architect will deploy and support the Ping Identity platform, execute migrations, analyze infrastructure updates, assist clients, and engage in knowledge sharing.
Top Skills:
AWSGCPLdapAzureMicrosoft ServerOauthOpenid ConnectOraclePingaccessPingdirectoryPingfederateSAMLUnixWindows
New
Cut your apply time in half.
Use ourAI Assistantto automatically fill your job applications.
Use For Free
Cybersecurity • Data Privacy
The IAM Business Security Architect will develop and deploy xIAM solutions, improve onboarding processes, and provide architecture advisory services for security operations.
Top Skills:
Api GatewaysCiamIamKerberosLdapMfaMicrosoft Active DirectoryOauthOidcOne Identity ManagerPing FederatePkiSAMLScimSoa ServicesSpmlXacml
Cybersecurity • Data Privacy
The Security Threat Intelligence Engineer will analyze security threats, produce intelligence reports, and enhance threat detection processes, ensuring cybersecurity resilience against diverse attacks.
Top Skills:
AWSAzureEdrElkGCPIdsMispSIEMSnowflakeSoarSplunkStixTaxii FrameworksThreat Intelligence FeedsThreat Intelligence Platform
Cybersecurity • Data Privacy
The Data Protection Consultant will develop a Data Protection Program Framework, document processes, facilitate stakeholder agreement, and create a roadmap while managing data protection technologies and governance standards.
Top Skills:
AWSBigidGCPMS OfficeMs AzureMs365ThalesVaronisVormetric
Cybersecurity • Data Privacy
Manage and support a Data Protection Program, focusing on cybersecurity measures like USB lockdown and email/file sharing restrictions.
Top Skills:
ConfluenceJIRAMS OfficeTrend MicroZscaler
Cybersecurity • Data Privacy
The Security CIAM Engineer will design, develop, and deploy CIAM solutions, focusing on identity lifecycle management and working within an agile team to enhance CIAM platforms.
Top Skills:
AWSAzure Active DirectoryGCPMS OfficeOkta
Cybersecurity • Data Privacy
The role involves developing and improving threat detection systems, writing alert strategies, and supporting incident response teams. Requires collaboration and strong analytical skills to enhance security measures.
Top Skills:
AWSMS OfficePythonSIEMSoarSplunkSQL
Cybersecurity • Data Privacy
The Azure Security Engineer will enhance security posture on Azure, manage security activities, develop security frameworks, and coordinate cloud security architecture.
Top Skills:
AzureAzure Active DirectoryAzure DefenderAzure MonitoringAzure SentinelCybersecurity ToolsDatabricksGitlabJenkinsSnowflake
Cybersecurity • Data Privacy
Engage with customers to perform health checks, conduct pilots, deploy solutions, and provide recommendations on Microsoft Azure security tools.
Top Skills:
Azure Information ProtectionAzure SentinelDefender For CloudMicrosoft Defender For AzureMicrosoft Defender For EndpointMicrosoft For IdentityMicrosoft Information Protection
Cybersecurity • Data Privacy
The role involves conducting health checks, managing deployments, running pilots, and giving recommendations on Microsoft security products.
Top Skills:
Azure Information ProtectionAzure SentinelEmsMicrosoft Defender For CloudMicrosoft Defender For EndpointMicrosoft For IdentityMicrosoft Information ProtectionMicrosoft IntuneOffice 365
Information Technology • Insurance • Professional Services • Software • Cybersecurity
The Security Analyst will provide monitoring services, analyze security incidents, triage event data, escalate issues, and develop client relationships.
Top Skills:
AWSAzureCloud Security ProductsCrowdstrikeEdrGoogleMdrSentineloneSIEMXdr
Internet of Things
As a Staff Security Engineer, you will design security controls, conduct risk assessments, support teams in securing applications, and ensure compliance with security standards while mentoring junior staff.
Top Skills:
Amazon Web ServicesAzureBoxConfluenceData Loss PreventionEndpoint Detection And ResponseGCPGoogle WorkspaceIdentity And Access ManagementJIRAMobile Device/Application ManagementSlackWorkday
Information Technology • Consulting
The Sr. Security Compliance Engineer develops compliance policies, monitors security controls, conducts audits, collaborates on GRC initiatives, and assists in vulnerability management across multiple jurisdictions.
Top Skills:
AWSAzureCompliance Automation ToolsDrataFedrampGCPGdprGrc PlatformsHipaaIso 27001Nis2NistOnetrustPci-DssServicenowSoc 2Vanta
Software
As Director of Security Operations, lead strategic security programs, manage teams for threat detection, incident response, and enhance IAM capabilities. Focus on protecting critical assets against evolving threats while fostering collaboration across departments.
Top Skills:
Extended Detection And Response (Xdr)Identity And Access Management (Iam)Managed Detection And Response (Mdr)Security Information And Event Management (Siem)Security Orchestration Automation And Response (Soar)Threat DetectionVulnerability Management
Top Companies in Cincinnati, OH Hiring Cyber Security Roles
See AllPopular Cincinnati, OH Job Searches
Tech Jobs & Startup Jobs in Cincinnati
Remote Jobs in Cincinnati
Content Jobs in Cincinnati
Customer Success Jobs in Cincinnati
IT Jobs in Cincinnati
Cyber Security Jobs in Cincinnati
Tech Support Jobs in Cincinnati
Data & Analytics Jobs in Cincinnati
Analysis Reporting Jobs in Cincinnati
Analytics Jobs in Cincinnati
Business Intelligence Jobs in Cincinnati
Data Engineer Jobs in Cincinnati
Data Science Jobs in Cincinnati
Machine Learning Jobs in Cincinnati
Data Management Jobs in Cincinnati
UX Designer Jobs in Cincinnati
Software Engineer Jobs in Cincinnati
Android Developer Jobs in Cincinnati
C# Jobs in Cincinnati
C++ Jobs in Cincinnati
DevOps Jobs in Cincinnati
Front End Developer Jobs in Cincinnati
Golang Jobs in Cincinnati
Hardware Engineer Jobs in Cincinnati
iOS Developer Jobs in Cincinnati
Java Developer Jobs in Cincinnati
Javascript Jobs in Cincinnati
Linux Jobs in Cincinnati
Engineering Manager Jobs in Cincinnati
.NET Developer Jobs in Cincinnati
PHP Developer Jobs in Cincinnati
Python Jobs in Cincinnati
QA Jobs in Cincinnati
Ruby Jobs in Cincinnati
Salesforce Developer Jobs in Cincinnati
Scala Jobs in Cincinnati
Finance Jobs in Cincinnati
HR Jobs in Cincinnati
Internships in Cincinnati
Legal Jobs in Cincinnati
Marketing Jobs in Cincinnati
Operations Jobs in Cincinnati
Office Manager Jobs in Cincinnati
Operations Manager Jobs in Cincinnati
Product Manager Jobs in Cincinnati
Project Manager Jobs in Cincinnati
Sales Jobs in Cincinnati
Account Executive (AE) Jobs in Cincinnati
Account Manager (AM) Jobs in Cincinnati
Sales Leadership Jobs in Cincinnati
Sales Development Representative Jobs in Cincinnati
Sales Engineer Jobs in Cincinnati
Sales Operations Jobs in Cincinnati
All Filters
Total selected ()
No Results
No Results




.png)
















