Top Tech Jobs & Startup Jobs
The Sr. Cyber Operations Specialist will monitor and analyze the security posture of systems, handle cyber incidents, and support the implementation of security policies and risk management frameworks for the F-16 Aircraft Structural Integrity Program.
The IT Audit Manager will lead and execute IT audits, managing project timelines and conducting assessments on IT systems and controls. Responsibilities include developing audit plans, maintaining relationships with stakeholders, mentoring peers, communicating findings, and drafting reports with recommendations.
As the Global Cyber Threat Hunting Lead, you will be responsible for executing threat hunting activities, leading investigations into threats, analyzing network traffic, and collaborating with incident response teams to detect and mitigate potential security incidents. Your role involves developing detection methodologies and enhancing security processes.
The Lead Incident Response Coordinator at McKesson will manage the organization’s response to security incidents, oversee activities such as malware analysis and incident triage, coordinate enterprise-wide incident response efforts, perform forensic reviews, and conduct root cause analyses to improve incident response processes.
The Solutions Consultant in Major Accounts at Palo Alto Networks will provide technical guidance and leadership to customers during their security transformation. Roles include meeting sales quotas, developing strategic account plans, conducting technical assessments, and facilitating customer success with the company's cybersecurity solutions.
As a Solutions Consultant, you will act as a key technical leader in cybersecurity, ensuring customer satisfaction by providing solution guidance, technical expertise and value realization of their investments in Palo Alto Networks. This role involves extensive collaboration with various teams, understanding customer needs, and developing strategic technical solutions to exceed sales quotas.
The SecOps Engineer will focus on Identity and Access Management (IAM) within Lilly's Cybersecurity team. Responsibilities include evaluating and implementing identity technologies, ensuring operational excellence, addressing security threats, collaborating with various stakeholders, and driving innovative IAM solutions to improve security and user experience.
The Senior Solutions Architect will guide Keyfactor’s enterprise customers in implementing and integrating solutions into their infrastructures. Responsibilities include leading design workshops, acting as a primary technical contact, ensuring customer satisfaction, collaborating with product teams, mentoring junior members, and enhancing service delivery processes.
Featured Jobs
The Senior Manager of Technical Security Operations will lead a team of cybersecurity analysts, overseeing 24/7 support, issue resolution, and performance tracking. The role involves collaborating with customers for feedback, updating internal documentation, and ensuring efficient operations. The focus is on improving product self-service and customer satisfaction.
The Cyber Incident Response Manager leads the incident response team, coordinating and managing responses to cyber threats. Responsibilities include conducting forensic analysis, preventing future incidents, developing training, preparing incident reports, and collaborating with stakeholders.
The Insider Threat Engineer is responsible for identifying, assessing, and mitigating insider threats within the organization. This role involves monitoring user activity, analyzing behavior patterns, developing training programs, and ensuring compliance with regulations. The engineer collaborates with IT and other departments to create effective incident response strategies and security controls against potential insider threats.
As a Principal Consultant, you will lead cybersecurity compliance assessments, mentor team members, develop technical content, and engage with clients to enhance their security programs. You'll also contribute to thought leadership and ensure client satisfaction through effective collaboration and delivery of services.
The Principal Product Manager will strategize and oversee the execution of Threat Intelligence and External Attack Surface Management product offerings, directing product development lifecycle while collaborating with engineering, sales, and marketing teams. Responsibilities include market research, product planning, KPI tracking, and mentoring junior product managers.
As a Managing Consultant in Risk Advisory, you'll design, execute, and assess risk programs across cyber, technology, and operational risks. You will nurture client relationships while leading project teams, conducting risk assessments, and mentoring team members, ensuring high-quality deliverables that address client challenges.
The Technical Account Manager will serve as a trusted advisor to clients, ensuring maximum value from SecurityScorecard's platform. Responsibilities include managing client relationships, providing technical support, developing customized solutions, monitoring security performance, and collaborating with internal teams to enhance customer satisfaction and identify sales opportunities.
The Technical Documentation Writer at Abnormal Security will create and manage technical documentation for cybersecurity products, utilizing AI tools to enhance content quality and efficiency. Responsibilities include developing user manuals and troubleshooting guides, collaborating with teams for accuracy, and continuously improving documentation based on customer feedback.
As a Jr. Offensive Cyber Operator, you will identify phishing procedures, exploit vulnerabilities, and execute database operations while performing penetration testing on external networks. You will collaborate on security assessments, provide technical oversight, and contribute to assessing systems for vulnerabilities.
The Security Control Assessor will conduct in-depth security control assessments for National Security Systems, produce detailed cybersecurity risk recommendations, develop security policies and documentation, conduct vulnerability scans, and participate in security meetings to support NSS initiatives. The role requires experience with NIST RMF and CNSS policies, cybersecurity tools, and risk analysis.
Top Companies Hiring
See AllAll Filters
No Results
No Results