Get the job you really want.
Maximum of 25 job preferences reached.
Top Cybersecurity & IT Jobs
Financial Services
The Lead Cybersecurity Architect develops cybersecurity solutions for financial services, drives strategies, assesses technologies, and leads technical teams while ensuring compliance and risk management.
Top Skills:
Agile MethodologiesApi Gateway SecurityApplication SecurityArtificial IntelligenceAWSCybersecurity ArchitectureMachine LearningPen TestingProgramming LanguagesSoftware Development Life Cycle
Fintech
Conduct audits in specialized IT areas, focusing on cybersecurity and risk management while ensuring compliance. Collaborate with management and document findings.
Top Skills:
CybersecurityData AnalyticsIt Risk Management
Reposted 8 Days AgoSaved
Information Technology
The Cyber Defense Project Integrator will coordinate cybersecurity programs, draft reports on threats, manage project schedules, and ensure compliance with security documentation.
Top Skills:
Computer ScienceCybersecurityEngineeringInformation Systems
Reposted 8 Days AgoSaved
Information Technology
Coordinate cyber defense initiatives, support integration of cybersecurity solutions, maintain project plans, and draft reports on cyber threats.
Top Skills:
CybersecurityProject Management
Information Technology
The role involves leading complex penetration tests, providing expert guidance, developing advanced methodologies, and advising on cybersecurity policies.
Top Skills:
CybersecurityGcfaGcihGxpnOsceOswePenetration TestingSecurity PolicySecurity+Vulnerability Exploitation
Information Technology
The Penetration Tester will lead complex enterprise-level penetration tests, provide expert guidance to government officials, develop advanced exploitation methods, and mentor junior testers.
Top Skills:
CybersecurityPenetration TestingVulnerability Exploitation
Reposted 8 Days AgoSaved
Information Technology
The Cyber Defense Project Integrator - Level II coordinates cybersecurity initiatives, maintains project plans, drafts reports, manages schedules, and ensures compliance across government systems.
Top Skills:
CybersecurityProject ManagementTechnical Writing
Cybersecurity
Play a vital role in protecting critical infrastructure from cyber threats, contributing to industrial cybersecurity at an agile company.
Top Skills:
Critical InfrastructureCybersecurity
Consulting
Conduct technical audits and vulnerability assessments on systems, identify risks, and develop mitigation strategies for the USAF's Mission Assurance program.
Top Skills:
AcasComputer NetworksCybersecurityHbssNessusOperational TechnologyVulnerability Analysis Tools
Information Technology • Consulting
Support incident response for cyber-attacks, investigate breaches, develop mitigation plans, and assist with service restoration in a government context.
Top Skills:
Computer Network DefenseCybersecurityNccic National Cyber Incident Scoring System
Information Technology • Software
The Cyber Solutions Engineer engages with clients to address cybersecurity risks, presents solutions, and develops strategies to enhance risk management practices.
Top Skills:
CybersecurityCybersecurity CertificationsRisk ManagementSaaS
Gaming • Internet of Things • Machine Learning • Software
The Senior Manager will manage Cyber and Technology internal audits, ensuring compliance and operational integrity, and support continuous improvement initiatives.
Top Skills:
AIAnalytics ToolsAutomationCloudCybersecurityData PrivacyIso 27001It Project ManagementNist CsfSoc 2
New
Cut your apply time in half.
Use ourAI Assistantto automatically fill your job applications.
Use For Free
Cybersecurity
Oversee and manage IT integration projects for Department of Defense, ensuring technical soundness and efficiency while meeting mission objectives.
Top Skills:
CybersecurityInformation TechnologySystems Integration
Information Technology • Software
The Incident Manager 2 responds to cyberattacks, investigates incidents, and coordinates response efforts for government clients, ensuring effective resolution.
Top Skills:
Computer Network DefenseCybersecurityIncident Management
Information Technology • Software
The Incident Manager III manages cyber incident response, analyzing incidents, applying cybersecurity practices, and coordinating resolution efforts for government clients.
Top Skills:
CybersecurityFismaIncident ManagementNist 800-62
Information Technology • Software
The Cyber Incident Manager is responsible for managing cyber incident responses, correlating data, recommending defenses, and documenting incidents in a government context.
Top Skills:
CybersecurityFismaNist 800-62
Financial Services
Seek a Threat Detection Engineer with expertise in cybersecurity operations, threat detection, and incident response, focusing on advanced analytical skills and cross-team collaboration to enhance security measures.
Top Skills:
AWSAzureCi/CdCrowdstrikeDetection-As-CodeEdrGCPGitSentinelSIEMSplunk
Fintech • Professional Services • Consulting • Energy • Financial Services • Cybersecurity • Generative AI
Lead consulting engagements to assess and mitigate cybersecurity risks for clients in the financial services sector, develop strategies and policies, and independently manage projects.
Top Skills:
Cybersecurity Frameworks (FfiecIso)ExcelNistPowerPoint
Fintech • Professional Services • Consulting • Energy • Financial Services • Cybersecurity • Generative AI
Role involves consulting on cybersecurity for financial services, crafting policies, conducting research, and engaging with clients to enhance security operations.
Top Skills:
ExcelPowerPoint
Automotive • Cloud • Greentech • Information Technology • Other • Software • Cybersecurity
The Principal Cybersecurity Integrated Architect leads cybersecurity architectural standards, advises engineering teams, mentors peers, and mitigates threats in multi-cloud and on-premises environments.
Top Skills:
.NetAgile MethodologiesAWSCloud Enterprise SolutionsContainerizationCryptographyCybersecurity FrameworksDevsecopsEcsEksFargateIaasIamJavaLambdaOraclePaasPythonSaaSSecurity ProtocolsSpring FrameworksVirtualizationZero Trust
Artificial Intelligence • Cloud • Machine Learning • Software • Business Intelligence • Cybersecurity • Big Data Analytics
This role involves providing cybersecurity services to government clients, focusing on system security engineering, data protection, and cloud security.
Top Skills:
Artificial IntelligenceCloud ModernizationCybersecurityData AnalyticsMachine LearningSoftware DevelopmentSystem Security Engineering
Healthtech
The Director of Information Security leads cybersecurity operations, manages programs for threat modeling, application security, and ensures compliance with security frameworks. Responsibilities include team management, strategy development, and cross-functional collaboration to maintain a robust security posture.
Top Skills:
CisCloud SecurityCybersecurityDevsecopsHipaaHitrustIsoNistSecure SdlcSoc
Automotive • Cloud • Greentech • Information Technology • Other • Software • Cybersecurity
The Principal Cybersecurity Integrated Architect leads cybersecurity architecture, advises teams on secure product development, and fosters compliance with security standards.
Top Skills:
.NetAWSContainerizationDevsecopsJavaOraclePythonSpring FrameworksVirtualization
Financial Services
Lead and manage cybersecurity projects, mentor team members, and develop privacy governance programs for diverse clients while ensuring compliance with regulatory standards.
Top Skills:
Cis 18CybersecurityEndpoint SecurityFirewallsIds/IpsIso 270001Mitre Att&CkNist Csf 2.0Pci-DssPrivacy FrameworksVpn
Reposted 10 Days AgoSaved
Security • Software
This is a general application for various roles in cybersecurity, IT support, help desk operations, and field technician services, inviting applicants to submit their resume for future opportunities.
Top Skills:
CybersecurityField Technician ServicesHelp Desk OperationsInformation TechnologyManaged Service Provider Support
Top Companies Hiring Cybersecurity + IT Roles
See AllPopular Job Searches
All Filters
Total selected ()
No Results
No Results

























