Top Cybersecurity Jobs
This role involves maintaining and overseeing application DDoS, Bot Mitigation, and Web Application Firewall (WAF) defense capabilities. Responsibilities include reviewing and implementing network protection controls, monitoring cybersecurity threats, guiding engineering teams, providing support for application migration behind WAF, and advising on application security configuration. The candidate must have a strong understanding of application security, especially Akamai technologies.
Lead transformational cybersecurity initiatives, drive strategic planning, collaborate with stakeholders, assess risks, promote innovation, and manage organizational transformation.
Provide exceptional technical support for end users, elevate IT operational processes, and mentor junior staff. Responsibilities include end user education, lifecycle management, and hardware inventory management. Required skills include IT support experience, macOS troubleshooting, Google Workspace administration, and excellent communication. Nice to have network fundamentals understanding and IT security mindset.
Featured Jobs
Security Engineer, Vulnerability Management role at RingCentral with responsibilities including vulnerability scans, tracking and remediation, automatization, visualization of VM state, policy exception evaluation, and participation in audits and security programs.
As a Security Engineer, Vulnerability Management at RingCentral, your primary responsibilities will be to perform vulnerability scans of systems and networks, monitor, triage, and track remediation of vulnerabilities, develop automation, and participate in audits of information security programs. Additional responsibilities include conducting log reviews, enhancing monitoring capabilities, and participating in incident response.
RingCentral is seeking a Security Engineer, Vulnerability Management to perform vulnerability scans, monitor, and track remediation of vulnerabilities. This role involves developing automation and maintaining the Vulnerability Management process. The engineer will also participate in audits and contribute to information security policies. Required skills include operating vulnerability scanning tools, familiarity with vulnerability management concepts, endpoint and server operating systems knowledge, network security fundamentals, and compliance with security standards and best practices.
Seeking a Senior Application Security Engineer to build and secure Integral Ad Science (IAS) infrastructure and collaborate with multiple teams to ensure security and compliance. Responsibilities include defining security framework, developing standards, responding to incidents, and enhancing application security posture. Requires 5-10+ years of application security experience, coding background, knowledge of code analysis products, and collaboration with engineering teams.
Seeking a Senior Application Security Engineer to build and secure the Integral Ad Science infrastructure and operations. Responsibilities include defining security framework, developing standards, responding to incidents, educating workforce, evaluating tools, and collaborating with teams for secure devops.
Seeking a Subject Matter Expert Linux Administrator to perform standard Linux system administration duties, maintain multi-user computer systems, and support HPC systems and software environment at ERDC in Vicksburg, Mississippi. Responsibilities include system documentation, performance tuning, software installation, and resource allocation. Requires 12+ years of experience with various educational levels. Preferred skills include software compiling, application scaling, storage architectures, multi-factor authentication, Python programming, and experience with specific software tools.
Conduct audits to ensure adherence to cybersecurity regulations and standards. Analyze audit results and identify control gaps. Provide recommendations for implementation and serve as a trusted advisor to IT System owners.
Security Specialist role focusing on incident response within the AWS cloud environment. Responsibilities include providing subject matter expertise on cloud networking, configuring security alerting, collecting forensics artifacts, coordinating cybersecurity incidents, and evaluating security measures.
Manage a team overseeing the day-to-day operations of security technology and programs, monitor trends, lead policy development, audit mitigation, and recommend enhancements for security systems, teams, and processes.
Join Systems & Technology Research’s (STR) growing Contracts team as a Principal Contracts Administrator to support a diverse contract portfolio of DoD and Intelligence Community Contracts. Responsibilities include contract life cycle administration, proposal development, risk assessment, and maintaining contract records. This role offers opportunities to work with business teams, negotiate transactions, and build customer relationships.
Students will work on cyber security projects with mentorship from experienced staff. They will collaborate with technical experts, support all phases of projects, and work on prototype algorithms and systems.
Students will work on cyber security projects with mentorship from experienced staff. Responsibilities include problem design, solution discovery, prototype development, data analysis, and technical presentation. Must be enrolled in a technical degree program and have a strong academic record. Background in signal processing, machine learning, and software development is required. Position offers competitive pay and flexible working hours.
Part-time Events and Shows Security Officer role at Collectors, responsible for protecting personnel, property, and profits at trade show events across the country. Requires travel, setting up security equipment, providing transportation for high-value items, monitoring for unusual activity, and collaborating with security team and law enforcement to ensure safety.
Creating, extending, and enhancing course material on cloud security topics. Working effectively at a distance and producing high-quality training videos and written reports.
Top Companies Hiring Cybersecurity + IT Roles
See AllAll Filters
No Results
No Results