Maximum of 25 job preferences reached.
Top Cybersecurity Jobs
Agency • Gaming • Marketing Tech • Mobile • Analytics
The Data Security Engineer will develop and implement data protection strategies, ensuring compliance with regulations like GDPR and HIPAA while securing sensitive data and collaborating with various teams.
Top Skills:
Analytical ToolsCcpaCismCisspCybersecurityDlp StrategiesGdprHipaaInformation Technology
AdTech • Digital Media • Internet of Things • Marketing Tech • Mobile • Retail • Software
The Vulnerability Management Manager leads the identification, assessment, and remediation of security vulnerabilities across the organization, collaborating with various teams to ensure compliance and risk reduction.
Top Skills:
AnsibleCis BenchmarksCloud PlatformsCrowdstrikeCveCvssCybersecurityInformation TechnologyIntuneJAMFLinuxNetworkingNistPatch ManagementPatch Management ToolsQualysRapid7SccmTenableVulnerability ManagementVulnerability Scanning ToolsWindowsWsus
Reposted 16 Days AgoSaved
Fintech • Machine Learning • Payments • Software • Financial Services
This role involves executing audits of technology functions, risk assessments, communication of audit results, and managing audit engagements while mentoring junior staff.
Top Skills:
Application ControlsCloud ComputingCybersecurityData AnalysisInformation SecurityInformation Technology
Fintech • Machine Learning • Payments • Software • Financial Services
The role involves managing controls testing activities, guiding a team, ensuring compliance, identifying control gaps, and enhancing risk management processes.
Top Skills:
CybersecurityInformation TechnologyProject ManagementRisk Management
Aerospace • Hardware • Information Technology • Security • Software • Cybersecurity • Defense
The IT Systems Administrator II manages classified computing infrastructure, ensuring compliance with security standards while handling user accounts, system maintenance, and supporting IT systems in closed areas.
Top Skills:
Active DirectoryComptia Security+Hyper-VJsigNist 800-53Red Hat LinuxRmfSccmVMwareWindows OsWsus
Information Technology • Internet of Things • Mobile • On-Demand • Software
The Senior Cyber & IT Auditor will execute audits, assess IT risks, maintain compliance, and present findings to management, ensuring cybersecurity improvements.
Top Skills:
Cis ControlsIso 27001Iso 27002ItgcNist 800Nist Cybersecurity FrameworkOwaspPci
Information Technology • Internet of Things • Mobile • On-Demand • Software
The Sr Cyber & IT Auditor will perform IT risk evaluations, assess business continuity, review internal controls, and execute audit projects related to various IT frameworks and regulations while fostering relationships across the organization.
Top Skills:
Cis ControlsInformation Security ToolsIso 27001Iso 27002It General ControlsNist 800 SeriesNist Cybersecurity FrameworkOwaspPayment Card IndustryRisk Assessment Tools
Computer Vision • Healthtech • Information Technology • Logistics • Machine Learning • Software • Manufacturing
The Director of IT will lead corporate IT strategy, oversee IT operations in manufacturing, manage security, and ensure high availability of technology, while supporting cross-functional collaboration.
Top Skills:
Azure AdEnterprise NetworkingGoogle WorkspaceIntuneJAMFJIRAKandjiMdm PlatformsOktaSaaSSlackSotiVpns
Computer Vision • Healthtech • Information Technology • Logistics • Machine Learning • Software • Manufacturing
The Director of IT will lead the Corporate IT function, oversee technology operations across Manufacturing, and ensure a secure IT environment while managing IT budgets and strategy.
Top Skills:
Azure AdGoogle WorkspaceJIRAOktaSlackSoti
Artificial Intelligence • Big Data • Enterprise Web • Fintech • Software • Financial Services
The Senior IT Risk and Compliance Analyst will manage third party vendor risk assessments, improve the vendor risk management program, and collaborate with internal teams to ensure compliance with security policies.
Top Skills:
GdprIso 27001NistPci-DssSoc2Sox
Big Data • Fintech • Information Technology • Insurance • Financial Services
Perform IT audits and assessments across enterprise systems and applications, focusing on cybersecurity, cloud, AI, and digital infrastructure. Evaluate inherent and residual risks, test control design and effectiveness, set audit scope, and deliver value-added recommendations while mentoring associates and collaborating with stakeholders to mitigate technology risks.
Top Skills:
AICloud ComputingCybersecurityDigital Infrastructure
Information Technology • Software
ARSIEM Corporation offers internship opportunities through the Skillbridge Program for separating military service members, focused on Cybersecurity, Software Development, and Systems Engineering.
Top Skills:
CybersecurityInformation TechnologySoftware DevelopmentSystems Engineering
New
Track Smarter, Apply Better.
Ditch the spreadsheets. Organize your job search with our freeApplication Tracker.
Use For Free
Information Technology
As a Target Digital Network Analyst, you will analyze data, ensure target continuity, maintain databases, identify intelligence gaps, and collaborate with teams.
Top Skills:
AIAmodCyber SecurityInformation TechnologyMachine LearningNetwork EngineeringSigintSystems Engineering
Artificial Intelligence • Fintech • Software
Responsible for designing and implementing IT security solutions, auditing security measures, managing vulnerabilities, and ensuring compliance across corporate environments.
Top Skills:
AWSAzure/Entra IdCloud/Saas ProtocolsDnsGCPLoad BalancingmacOSOauthOktaSAMLVpnWindows
Fintech • Insurance • Financial Services
The Director leads Cybersecurity, Resilience & Governance teams, managing risk, ensuring compliance, and fostering security awareness while overseeing disaster recovery and business continuity efforts.
Top Skills:
AWSAzureBusiness ContinuityCloud SecurityDisaster RecoveryInformation Risk ManagementInformation SecurityInformation TechnologyOauth2OidcSAML
Financial Services
The AI Risk Officer Manager oversees IT risks, develops governance frameworks, monitors compliance, collaborates with stakeholders, and provides strategic guidance. Responsibilities include assessing risks, leading initiatives, and supporting training and governance activities.
Top Skills:
Data VisualizationInformation TechnologyRisk Management Frameworks
Reposted YesterdaySaved
Automotive • Information Technology
The Technology Audit Manager leads internal and external security audits, coordinating activities, managing stakeholders, and integrating findings into risk processes.
Top Skills:
CisCybersecurityGrcInformation TechnologyIso 27001Nist Csf/800-53
Cybersecurity
Oversee and manage IT integration projects for Department of Defense, ensuring technical soundness and efficiency while meeting mission objectives.
Top Skills:
CybersecurityInformation TechnologySystems Integration
Information Technology
The Target Digital Network Analyst conducts in-depth data analysis for target development, ensuring comprehensive intelligence and database maintenance while collaborating with teams to share valuable insights.
Top Skills:
Computer ScienceCyber SecurityDigital TelecommunicationsInformation AssuranceInformation TechnologyInternet ProtocolsNetwork EngineeringSoftware EngineeringSystems Engineering
Information Technology • Security • Software • Analytics • Cybersecurity
Provide operational support for Tactical Data Links, ensuring compliance with DOD requirements while analyzing network availability and issues. Document maintenance actions and support configuration of TDL networks.
Top Skills:
Comptia Security+Dod Information AssuranceIemsInformation TechnologyLink-16Lvc EquipmentRimsTactical Data Links
Fintech • Financial Services
The Non-Financial Risk Manager will oversee Cyber, Technology, and Information Security risks, ensuring compliance, developing risk management approaches, and collaborating across departments.
Top Skills:
Cis ControlsCybersecurityInformation TechnologyIso 27001Nist CsfRisk Management
eCommerce • Hardware • Information Technology • Logistics • Mobile • Software • App development
The IT Audit Project Lead will conduct independent audits, assess IT security controls, and build relationships with technology leaders while developing knowledge of custom-built systems.
Top Skills:
Backup And Recovery PracticesFirewallsIncident Response ManagementLogging And MonitoringNetwork SegmentationSecurity ConfigurationsSecurity FrameworksUser Access Management
Software • Cybersecurity
The Exploitation Analyst 3 position requires expertise in network and systems engineering, involving vulnerability analysis, penetration testing, and computer forensics for government clients.
Top Skills:
Computer EngineeringComputer ForensicComputer ScienceComputer SecurityCyber SecurityElectrical EngineeringInformation AssuranceInformation TechnologyNetwork EngineeringSoftware EngineeringSystems Engineering
Security • Software • Cybersecurity
Analyze and protect against vulnerabilities, intrusions, and threats in computer networks. Requires extensive experience in cyber security and network administration.
Top Skills:
Cyber SecurityInformation AssuranceInformation TechnologyNetwork EngineeringSystems Engineering
Security • Software • Cybersecurity
The Exploitation Analyst will analyze vulnerabilities and threats in network systems, protect against intrusions, and respond to cyber events.
Top Skills:
Computer ScienceCyber SecurityInformation TechnologyNetwork Engineering
Let Your Resume Do The Work
Upload your resume to be matched with jobs you're a great fit for.
Success! We'll use this to further personalize your experience.
Top Companies Hiring Cybersecurity Roles
See AllAll Filters
Total selected ()
No Results
No Results





























