Maximum of 25 job preferences reached.
Top Hybrid Cybersecurity Jobs
Machine Learning • Payments • Security • Software • Financial Services
The Security Specialist will manage RACF security, implement controls, conduct audits, and support IAM integrations, ensuring compliance with regulations.
Top Skills:
Ibm RacfIbm ZsecureJclOracle Identity Manager (Oim)Tso/IspfZ/Os
Fintech • Insurance • Financial Services
The VP leads the technology strategy for Enterprise Compliance, focusing on AI, machine learning and compliance systems. Oversees technology governance, data analytics, and compliance monitoring while ensuring regulatory adherence and enhancing decision-making processes.
Top Skills:
AICompliance Surveillance SystemsData AnalyticsGrc TechnologyMachine LearningWorkflow Automation
Artificial Intelligence • Professional Services • Business Intelligence • Consulting • Cybersecurity • Generative AI
Responsible for managing risks related to cybersecurity, privacy, data, and AI initiatives, while providing strategic leadership and support to enhance risk management efforts.
Top Skills:
Ai Risk ManagementCybersecurityData GovernancePrivacy
Artificial Intelligence • HR Tech • Other • Software • Business Intelligence
The Enterprise Security Engineer will design, build, and operate enterprise security systems, ensuring secure access, automating processes, and enhancing the company's security posture.
Top Skills:
Access ManagementEndpoint ManagementEnterprise SaasIdentity ProvidersIntuneJAMFMicrosoft Entra
HR Tech • Payments • Professional Services • Software
The Sr. Identity and Access Management Analyst will enhance the IAM program by defining roles, managing access, supporting implementations, improving processes, and ensuring security compliance.
Top Skills:
AWSIam ToolsIgaPamSso
New
Cut your apply time in half.
Use ourAI Assistantto automatically fill your job applications.
Use For Free
Consumer Web • eCommerce • Software
As a Threat Detection and Response Engineer II, you'll build tools to detect threats, optimize security logging, respond to incidents, and ensure cybersecurity across the organization using AI and automation.
Top Skills:
AWSCi/CdContainersGoKubernetesPythonSIEM
Big Data • Information Technology • Productivity • Software • Analytics • Business Intelligence • Consulting
The Senior Vulnerability Management Engineer will execute scans, analyze vulnerability findings, provide remediation metrics, and maintain asset inventories to protect Celonis' infrastructure.
Top Skills:
BashCheckmarxCspmDome9NessusPrismaPythonQualysVeracode
Consumer Web • eCommerce • Marketing Tech • Retail • Software • Analytics • Generative AI
As a Lead Security Engineer, you'll secure corporate systems, manage identity and access management, mature security architecture, and lead teams in AI-driven projects while delivering complex solutions across multiple teams.
Top Skills:
AWSAws CognitoCloudflareCrowdstrikeOauthOidcOktaScimSsoTerraformWiz
Consumer Web • eCommerce • Information Technology • Retail • Software • Analytics • App development
The role involves supporting design and operations of security tools, managing vulnerabilities, and ensuring compliance with regulatory standards.
Top Skills:
Cloud TechnologiesCybersecurity PlatformsCybersecurity ToolsDigital Certificate ManagementEnterprise Security Software SolutionsIdentity And Access ManagementScripting MethodologiesSecure Coding Techniques
Fintech • Financial Services
The Lead Technology Risk Officer is responsible for overseeing technology risk management, ensuring compliance, and developing risk policies and procedures.
Let Your Resume Do The Work
Upload your resume to be matched with jobs you're a great fit for.
Success! We'll use this to further personalize your experience.
All Filters
Total selected ()
No Results
No Results







.png)













