Get the job you really want.
Be the first applicant
Apply to jobs posted less than 24 hours ago to maximize your visibility.
Use the Date Posted filter to view jobs posted within the last 24 hours.
Be the first applicant
Apply to jobs posted less than 24 hours ago to maximize your visibility.
Use the Date Posted filter to view jobs posted within the last 24 hours.
Top Cybersecurity & IT Jobs
Fintech • Professional Services • Consulting • Energy • Financial Services • Cybersecurity • Generative AI
As a Cybersecurity Consultant at Capco, you will engage in cybersecurity consulting, developing policies and procedures, conducting research and analysis, and preparing presentations for clients in the financial services sector. You're expected to leverage your expertise in various cybersecurity domains and work collaboratively to enhance clients' operations while adapting to evolving cyber threats.
Top Skills:
Application SecurityCloud SecurityCybersecurityData SecurityDigital TrustIamIt Asset Management GovernanceRegulatory ComplianceRisk Assessments
21 Hours Ago
Financial Services
As a Lead Cybersecurity Architect, you will evaluate current cybersecurity principles and provide technical guidance, conduct security reviews, and recommend actions to mitigate vulnerabilities within Employee Experience technology products. You will leverage deep technical expertise to address cybersecurity challenges and support the advancement of application and platform security maturity.
Top Skills:
AIApi SecurityArchitectureContainerizationControl DesignCybersecurityLlmsMlPublic CloudSaaSSecurity OperationsSupply Chain Risk ManagementThreat ModelingVulnerability Assessments
Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
The Sr. Taxonomy Specialist at CrowdStrike is responsible for leading and coordinating taxonomy projects across the organization, advocating for shared taxonomies, and establishing governance and best practices for taxonomy standards. This role involves collaboration with product managers, designers, engineers, and stakeholders to drive alignment and adoption of taxonomy initiatives, while ensuring they meet customer needs.
Top Skills:
AIContent Management SystemsCybersecurityEnterprise Software ApplicationsInformation ArchitectureMachine LearningPublishing SystemsTaxonomyUser Experience
15 Hours Ago
Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
The Executive Strategist and Vice President will lead a team focused on the Public Sector and Healthcare, driving strategy, fostering customer engagement, and amplifying CrowdStrike's presence in the cybersecurity space. Responsibilities include team leadership, strategic support, customer collaboration, thought leadership, and industry advocacy.
Top Skills:
Cloud SecurityCybersecurityCybersecurity TechnologiesEndpoint SecurityIdentity SecurityIncident ResponseLog ManagementSIEMThreat Landscapes
Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
As an Intelligence Analyst Intern, you will track cyber threats related to DPRK adversaries, analyze data, and produce intelligence reports. You will collaborate with teams to enhance understanding of cyber operations and support CrowdStrike's mission to protect organizations from breaches.
Top Skills:
Analytical MethodsCybersecurityMalware AnalysisNetwork PrinciplesResearch Collection Tradecraft
AdTech • Digital Media • Internet of Things • Marketing Tech • Mobile • Retail • Software
The Security & IT Compliance Director will manage compliance frameworks for SOX, PCI, NSA, and FCC, with a primary focus on PCI. The role involves defining security controls, overseeing compliance initiatives, leading audits, and overseeing a team dedicated to maintaining data integrity and security. The director also develops security policies, conducts training, and collaborates with IT to align technical controls with compliance.
Top Skills:
CcpaCybersecurityData ProtectionGdprIso 27001NistPci DssRisk ManagementSoc 2Sox
AdTech • Digital Media • Internet of Things • Marketing Tech • Mobile • Retail • Software
The role involves leading the Vulnerability Management program, developing strategies for identifying and remediating vulnerabilities, and enhancing the risk management program. Responsibilities include collaboration with cross-functional teams, conducting risk assessments, and providing reports to senior leadership on program effectiveness.
Top Skills:
Attack Surface ManagementAWSAzureCloud SecurityCybersecurityGCPIso 27001LinuxmacOSNessusNistOwaspQualysRisk AssessmentRiskiqSecurity Information ManagementTenableVulnerability ManagementWindowsXpanse
Fintech • Professional Services • Consulting • Energy • Financial Services • Cybersecurity • Generative AI
The Senior Cybersecurity Consultant will lead cybersecurity consulting engagements for clients in financial services, developing security policies and procedures, conducting research and analysis, and creating reports. They will also participate in new business development and client meetings.
Top Skills:
Cloud SecurityCybersecurityData SecurityDigital TrustIdentity & Access ManagementExcelPowerPointRisk ManagementThreat/Vulnerability Management
Featured Jobs
Computer Vision • Hardware • Machine Learning • Software • Semiconductor
The Director of Information Technology will lead HRL Laboratories' IT organization, focusing on strategic leadership, compliance with security regulations, infrastructure and application management, and team development. The role involves managing IT budgets, vendor relationships, and innovation in technology adoption within the defense contracting industry, ensuring alignment with business objectives and effective communication across the organization.
Top Skills:
Cloud ComputingCmmcCybersecurityDefense Industry ApplicationsDfarsItarNist
Machine Learning • Security • Software • Analytics • Defense
The Information Systems Security Manager (ISSM) at STR is responsible for overseeing the Cybersecurity program in compliance with various government directives, monitoring compliance, coordinating with stakeholders, and managing security posture and continuous monitoring efforts, as well as handling incident responses. This role requires collaboration with other security and IT professionals both onsite and through effective communication.
Top Skills:
ComplianceCybersecurityEmassLinuxNessusNist 800-53Operating SystemsRisk Management FrameworkScapSnowSplunkVulnerability ToolsWindowsXacta
Machine Learning • Payments • Security • Software • Financial Services
The Security Analyst will conduct forensic investigations, handle employee relations and legal holds, and support overall security posture. Responsibilities include executing tasks, performing data manipulation, and developing security policies. The role requires technical evaluation and analysis in security areas to mitigate risks and conduct assessments.
Top Skills:
CybersecurityData Loss PreventionForensic InvestigationsIncident ResponseInformation SecurityNetwork SecurityRisk AssessmentsSecurity Technologies
Aerospace • Artificial Intelligence • Computer Vision • Software • Analytics • Defense • Big Data Analytics
The ISSE will design and implement security concepts, policies, and mechanisms while ensuring compliance with security requirements. Responsibilities include conducting assessments, vulnerability tests, and incident response, as well as providing guidance on secure coding practices. The role involves continuous improvement of security controls and training development teams.
Top Skills:
Cloud SecurityCnssi 1253ComplianceContainer SecurityCybersecurityDevsecopsInformation Systems SecurityNist Sp 800-30Nist Sp 800-37Nist Sp 800-39Nist Sp 800-53OpenshiftOpenstackRedhatSecure CodingSecurity AssessmentsSecurity AutomationSecurity DocumentationStig ImplementationSystem Auditing
Big Data • Fintech • Information Technology • Business Intelligence • Financial Services • Cybersecurity • Big Data Analytics
The Principal Architect will lead the strategy for endpoint security solutions, ensuring effective design, implementation, and management against cyber threats. This involves development of security policies, incident response plans, and risk mitigation strategies while collaborating with IT teams to integrate security measures across the organization.
Top Skills:
AntivirusCarbon BlackCrowdstrikeCybersecurityDlpEdrEndpoint SecurityIncident ResponseIso 27001NistPowershellPythonSecurity FrameworksSentineloneSplunkTaniumThreat Intelligence
Aerospace • Hardware • Information Technology • Security • Software • Cybersecurity • Defense
The DevSecOps Pipeline Security Engineer will design and implement security measures for the company's systems, particularly in cloud environments. Responsibilities include testing and developing security protocols, maintaining firewalls, and ensuring compliance with security policies during software updates in the DevSecOps pipeline.
Top Skills:
Amazon Web ServicesCybersecurityDevsecopsItilv4AzureSecurity+
Aerospace • Artificial Intelligence • Computer Vision • Software • Analytics • Defense • Big Data Analytics
As an ISSO at Maxar, you will be responsible for maintaining compliance of information systems, performing risk assessments, managing vulnerabilities, and ensuring security of data transfers. You'll work closely with government entities to support security assessments and incident response. Additionally, you'll prepare systems for disposal and assist in implementing security programs.
Top Skills:
CybersecurityFirewallsLinuxWindowsNetworksRisk Management Framework (Rmf)Scap CheckerSplunkStig ViewerTenable NessusVirtual CloudVulnerability Management
Machine Learning • Security • Software • Analytics • Defense
The Cyber RF Engineer will apply RF and Signal Processing skills in a team focused on cybersecurity challenges. Responsibilities include analyzing and prototyping RF solutions, supporting lab testing, and contributing to proposal efforts. The role demands collaboration with cybersecurity teams and requires experience with RF hardware and signal processing.
Top Skills:
C/C++Communications ProtocolsCybersecurityDigital CircuitsDigital Signal ProcessingElectronicsEm Field SolversMatlabPythonRfRf SystemsSignal ProcessingTcp/Ip
Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
The intern will conduct open source research on cybersecurity topics, evaluate information sources, compose intelligence assessments on cyber threats, and learn about threat actor tactics related to eCrime. This role is designed for students gaining practical experience in cybersecurity analysis.
Top Skills:
Anti-Money LaunderingCriminal JusticeCryptocurrency InvestigationsCybersecurityFinancial Crime AnalysisIntelligence StudiesInternational Relations
Aerospace
This role involves leading the strategy and implementation of secure IT and security infrastructure while ensuring compliance with various frameworks. Responsibilities include managing IT infrastructure, implementing cybersecurity best practices, and automating solutions. The position also requires collaboration on government cybersecurity programs and rolling out new AI platforms for productivity.
Top Skills:
AWSAzureC++CismCisspComplianceCybersecurityGCPIt InfrastructureItarJavaNist 800-171Python
Fitness • Hardware • Healthtech • Retail • Software
The Senior Application Security Engineer at Peloton will lead application security initiatives, ensuring applications and services are secure by design. Responsibilities include conducting security design reviews, guiding engineering teams, implementing security automation, and collaborating across multi-functional teams to enhance overall security posture.
Top Skills:
Application SecurityCybersecurityDevsecopsMobile SecurityPythonRisk AssessmentSecurity AutomationSreVulnerability ManagementWeb Security
Automotive • Big Data • Information Technology • Robotics • Software • Transportation • Manufacturing
The Reflash Technician is responsible for flashing GM development and fleet vehicles with updated software, ensuring compliance with safety guidelines, retrieving vehicle part numbers and Diagnostic Trouble Codes, and conducting function checks. The role requires collaboration with teams for troubleshooting, documentation, and adherence to safety practices.
Top Skills:
Active SafetyAutomotive SystemsCybersecurityEpsFlashing ToolsInfotainmentSerial Data CommunicationsVerification And Validation Processes
Fintech • Legal Tech • Software • Financial Services • Cybersecurity • Data Privacy
The Cyber Security Communications and Risk Manager will support risk-informed decision-making, enhance overall security posture, and lead employee security education programs. They will engage in creating awareness, managing global IT risk initiatives, and ensuring compliance through effective communication and policies.
Top Skills:
Audit StandardsCommunication StrategiesCompliance RegulationsCybersecurityIt SecurityProject ManagementRisk ManagementTechnology Policies
Fintech • Machine Learning • Payments • Software • Financial Services
The Sr. Director, Information Security Officer leads a team to implement and integrate information security within business objectives, manage cyber risk, and provide security expertise to executives. This role advocates for a security culture while enabling business innovation and success.
Top Skills:
APIsCloud ServicesContainersCybersecurityData LakesDevOpsEncryptionGenerative AiMicroservicesRisk ManagementServerlessVulnerability ManagementZero Trust
Fintech • Machine Learning • Payments • Software • Financial Services
As a Senior Manager in the Information Security Office, you will consult on risk and security initiatives, collaborating with various teams to enhance Capital One's security posture. Responsibilities include providing security guidance, managing risks, and offering proactive consulting on various security issues affecting the organization.
Top Skills:
Agile MethodologiesApi ImplementationApplication SecurityCloud Patch ManagementCloud Security EngineeringCloud Service TechnologiesContainer ServicesCybersecurityData SecurityDefensive SecurityEnterprise MonitoringInfrastructure SecurityNetwork ArchitectureOffensive SecurityPenetration TestingSecurity & Access Control ManagementThreat ModelingUser Access ManagementVulnerability Management
Aerospace • Artificial Intelligence • Hardware • Robotics • Security • Software • Defense
The Deputy Director of Physical Security will lead the strategic planning and management of physical security systems, ensuring compliance and operational efficiency. Responsibilities include policy development, system audits, vendor management, budget oversight, and team leadership to safeguard company assets and personnel within a security framework.
Top Skills:
Access ControlCctvCybersecurityIt SecurityPhysical Security SystemsRisk AssessmentsSecurity InfrastructureSecurity PoliciesVisitor Management
Healthtech • Software • Telehealth
The Chief Information Security Officer will lead the development and implementation of a comprehensive cybersecurity and risk management strategy, ensuring compliance and security for client data. This role involves oversight of security operations, incident response, and promoting a security-conscious culture within the organization.
Top Skills:
Application SecurityCloud SecurityCompliance Regulations (HipaaCybersecurityHitrustIdentity And Access ManagementMobile SecurityNetwork SecurityPci)Penetration TestingRisk ManagementSecure Coding PracticesSecurity Incident ResponseThreat IntelligenceVulnerability Management
Top Companies Hiring Cybersecurity + IT Roles
See AllPopular Job Searches
Top Companies Hiring Cybersecurity + IT Roles
See AllPopular Job Searches
All Filters
Total selected ()
Total selected (1)
Job Category
No Results
No Results
No Results