Get the job you really want.
Maximum of 25 job preferences reached.
Top Cybersecurity Jobs
Greentech • Real Estate • Social Impact • Energy • Industrial • Solar • Renewable Energy
The Principal will oversee compliance with reliability regulatory standards, focusing on IT/OT cybersecurity, policy advocacy, and training delivery.
Top Skills:
Computer ScienceCyber SecurityFirewall TechnologiesInformation TechnologyMs SharepointNetworking TechnologiesVulnerability Scan Technologies
Reposted 20 Hours AgoSaved
Fintech • Machine Learning • Payments • Software • Financial Services
Perform audits focusing on technology and cybersecurity risks, execute audit procedures, manage client relations, and coach less experienced associates.
Top Skills:
Cloud ComputingCybersecurityData AnalyticsInformation Technology
Fintech • Financial Services
The Digital Forensic Investigator will support forensic investigations, troubleshoot hardware/software, and improve business performance for the Computer Crimes and Forensics Investigations Team.
Top Skills:
Information TechnologyMS OfficeSplunk
Aerospace • Hardware • Information Technology • Security • Software • Cybersecurity • Defense
Manage 24/7 SOC support for cybersecurity incidents, oversee incident response, monitor alerts, and develop strategies to enhance security.
Top Skills:
Computer ScienceCybersecurityData ScienceInformation SystemsInformation TechnologySIEMThreat Intelligence Platforms
AdTech • Cloud • Digital Media • Information Technology • News + Entertainment • App development
The Sr Cyber Security Manager is responsible for overseeing Cyber Security strategy and operational engagement across Studios, Film, and Television. This role involves risk assessment, communication with stakeholders, and coordinating cyber security projects and incident responses.
Top Skills:
Collaboration ToolsCyber SecurityInformation TechnologyMicrosoft SuiteProject Management Tools
Aerospace • Hardware • Information Technology • Security • Software • Cybersecurity • Defense
The Manager oversees storage security operations, incident response, reconfigurations, and compliance, while leading security assessments and policy development.
Top Skills:
AnsibleComputer ScienceCybersecurityFibre ChannelFismaInformation TechnologyIscsiItilNist 800-53
Consumer Web • eCommerce • Software
Lead Security and IT teams, develop strategies for security infrastructure, ensure operational excellence, and mentor employees. Collaborate with stakeholders to optimize systems.
Top Skills:
AWSCloud ArchitectureInfrastructure As CodeSecurity Frameworks
Artificial Intelligence • Big Data • Healthtech • Machine Learning • Analytics • Biotech • Generative AI
The IT Compliance Auditor will lead internal audits for ISO27001, manage compliance issues, maintain audit records, and develop internal policies. The role requires collaboration with IT and Security teams.
Top Skills:
Iso 27001
Artificial Intelligence • Blockchain • Fintech • Financial Services • Cryptocurrency • NFT • Web3
Responsible for executing IT and security audits at Coinbase, managing audit staff, developing reports, and enhancing controls in line with regulatory requirements.
Top Skills:
Application SecurityGoogle SuiteIt GovernanceExcelMs PowerpointMs WordPythonRisk ManagementRuby
Artificial Intelligence • Blockchain • Fintech • Financial Services • Cryptocurrency • NFT • Web3
As an Internal Audit IT Analyst, you will execute IT and security audits, develop audit practices, prepare reports, manage staff, and track remediation activities. Engage with business units and maintain knowledge of regulatory requirements.
Top Skills:
Google SuiteExcelMs PowerpointMs WordPythonRuby
Information Technology • Consulting • Defense
The Exploitation Analyst will develop exploitation plans and collaboratively work with teams to analyze and assess cyber threats while sharing findings with stakeholders.
Top Skills:
Computer ForensicsComputer SecurityCyber SecurityInformation TechnologyNetwork And Systems AdministrationNetwork EngineeringPenetration TestingSoftware EngineeringSystems EngineeringVulnerability Analysis
Software • Cybersecurity
As a Computer Network Defense Analyst, you will analyze computer network defense resources to identify and report potential security events, requiring extensive experience and a relevant degree.
Top Skills:
Computer ForensicsCyber SecurityInformation TechnologyNetwork Engineering
New
Track Smarter, Apply Better.
Ditch the spreadsheets. Organize your job search with our freeApplication Tracker.
Use For Free
Software • Cybersecurity
The CND Analyst 3 will analyze security alerts and logs to identify potential events. Requires extensive relevant experience and an appropriate security clearance.
Top Skills:
Agency Tools (DxBuffalobuffaloClearvisionComputer ForensicsCvesCyber SecurityInformation AssuranceInformation TechnologyIntrusion Detection SystemsNetwork EngineeringSoftware EngineeringSsveVirustotal)Vpns
Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
The role involves managing IT and Cybersecurity budgets, optimizing processes, analyzing cost structures, and collaborating with finance and technical teams.
Top Skills:
AWSAzureGCP
Aerospace
The role involves serving as a Senior ISSE to perform assessment and authorization tasks related to cybersecurity compliance, risk assessments, and maintaining Authorizations to Operate for DoD medical systems.
Top Skills:
AppdetectiveAssured Compliance Assessment SolutionCybersecurityDisa StigsEmassFortifyInformation TechnologyNist 800-53Risk Management FrameworkWebinspect
Big Data • Cloud • Internet of Things
The InfoSec M&R Engineer Trainee will monitor, analyze, and respond to security alerts, optimize workflows, and implement automation. Responsibilities include triaging incidents, documenting information, and escalating as needed while working in a shift-based team environment.
Top Skills:
Artificial IntelligenceComputer NetworkingCybersecurityInformation TechnologyMachine LearningNetwork DevicesOperating SystemsScriptingSystems
Big Data • Information Technology • Security • Software • Analytics
Analyze and exploit digital networks with a focus on computer and information systems design/development; requires extensive relevant experience and technical skills.
Top Skills:
Computer ForensicsComputer ScienceComputer/Network SecurityEngineeringInformation AssuranceInformation SystemsInformation TechnologyMathematicsPenetration TestingProgrammingSystem EngineeringVulnerability Analysis
Software • Cybersecurity
The Computer Network Defense Analyst 3 will support the CSD Mission Office by analyzing cyber threats, crafting analytics, and implementing defensive measures using AI and ML.
Top Skills:
AIAmodComputer ForensicsCyber SecurityInformation TechnologyMachine LearningNetwork EngineeringSigintSystems Engineering
Information Technology • Cybersecurity
As an Exploitation Analyst, you will apply your understanding of adversary networks to develop exploitation plans, work collaboratively with teams, and analyze data to provide insights to improve intelligence operations.
Top Skills:
Computer ForensicsComputer SecurityCyber SecurityInformation TechnologyNetwork EngineeringSoftware EngineeringSystems Engineering
Information Technology • Software
The SIGINT Operator will conduct SIGINT collection operations for national security, requiring technical knowledge and communication skills. Training is provided.
Top Skills:
Cyber SecurityInformation TechnologyMS OfficeNetwork Engineering/SecuritySigint Collection Equipment
Information Technology • Software
SIGINT Operators will conduct technical SIGINT collection in support of operations with a focus on National Security, providing necessary training and support in a team environment.
Top Skills:
Cyber SecurityElectronic WarfareInformation TechnologyMS OfficeSigint Collection EquipmentSigint Collection Operations
Aerospace
The ISSO will manage cybersecurity for the STARE Program, including project management, compliance, administrative support, and developing relationships, while requiring a Secret Clearance.
Top Skills:
AcasCybersecurityEmassEvaluate_StigInformation TechnologyNist Sp 800-53Risk Management FrameworkScapStig Viewer
Information Technology
The Target Digital Network Analyst will analyze data to support intelligence operations, maintain databases, and collaborate with teams while adhering to shift schedules.
Top Skills:
AIComputer ScienceCyber SecurityInformation TechnologyMachine LearningNetworking
Aerospace • Hardware • Information Technology • Security • Software • Cybersecurity • Defense
The Principal UC IT Security Manager oversees UC security management, plans and designs security architectures, and implements security controls for communication platforms.
Top Skills:
Cisco IseMicrosoft Defender For Cloud Apps
Healthtech
As an IT Audit Manager, you'll lead audits, assess risks, advise business partners, and manage direct reports while enhancing internal audit methodologies.
Top Skills:
Computer ScienceCybersecurityInformation TechnologyIt AuditMicrosoftSAP
Top Companies Hiring Cybersecurity Roles
See AllAll Filters
Total selected ()
No Results
No Results







.png)





















