Get the job you really want.
Maximum of 25 job preferences reached.
Top Cybersecurity Jobs
Information Technology • Software
The role involves overseeing security requirements for data protection, risk assessments, cybersecurity integration, and documentation for government clients.
Top Skills:
Configuration ManagementCybersecurityInformation TechnologyRisk ManagementSecurity AssessmentSecurity EngineeringSystem Security
Big Data • Information Technology • Security • Software • Analytics
The Exploitation Analyst Level 3 requires extensive experience in cybersecurity, system administration, and relevant degree qualifications. Responsibilities include vulnerability analysis and penetration testing.
Top Skills:
Computer ScienceCyber SecurityInformation TechnologyNetwork EngineeringSystems Engineering
Information Technology • Consulting
The IT Security Analyst is responsible for implementing IT infrastructure, managing certificate processes, and working with teams on service requirements and changes across multiple functions.
Top Skills:
Computing HardwareDatabase SecurityEnterprise PkiInformation TechnologyInfrastructureNetwork Security
Big Data • Cloud • Fintech • Information Technology • Financial Services
The Associate Principal, IT Governance role involves overseeing IT governance programs, collaborating with compliance teams, addressing audit findings, and improving IT control processes.
Top Skills:
CobitDevops ToolsExcelIntegrated Grc Management SolutionsItilNist Cybersecurity FrameworkPowerPointSecurity ToolsTableau
Cybersecurity
Oversee and manage IT integration projects for Department of Defense, ensuring technical soundness and efficiency while meeting mission objectives.
Top Skills:
CybersecurityInformation TechnologySystems Integration
Information Technology
The Target Digital Network Analyst analyzes data to generate insights, supports intelligence missions, and enhances target information through collaboration and analytical techniques.
Top Skills:
AIComputer ScienceCyber SecurityInformation TechnologyMachine LearningNetwork EngineeringSigintSoftware EngineeringSystems Engineering
Utilities
The IAM Program Manager oversees IAM governance and systems, ensuring compliance with policies while integrating solutions and managing access control.
Top Skills:
Iam SystemsInformation Technology
Aerospace • Hardware • Information Technology • Security • Software • Cybersecurity • Defense
The Chief Engineer leads cybersecurity engineering for IT systems, manages a team, and ensures compliance and innovation for intelligence missions.
Top Skills:
AWSItilv3Itilv4Splunk
14 Days AgoSaved
Automotive • Information Technology
The Head of Security Strategy and Planning oversees strategic, operational, and financial planning for the Security Department, ensuring alignment with business objectives and project management for security initiatives.
Top Skills:
Business AdministrationCismCisspCybersecurityInformation TechnologyIso 27001Nist CsfPmpPrince2Risk ManagementSoc2
Fintech
The role involves researching potential cybersecurity threats, performing analysis, reacting to incidents, and enhancing detection and remediation capabilities in a financial context.
Top Skills:
Computer ScienceCyber SecurityForensicsIncident ResponseInformation TechnologyNetwork SecuritySecurity GovernanceSecurity Information And Event ManagementThreat Management
Consulting
As a Consultant, you will support clients by improving business processes and internal controls, while developing client deliverables and engaging with senior management.
Top Skills:
CybersecurityFismaInformation TechnologyNessusNistUnixVulnerability ManagementWindows
Information Technology • Consulting • Defense
The Exploitation Analyst will develop exploitation plans and collaboratively work with teams to analyze and assess cyber threats while sharing findings with stakeholders.
Top Skills:
Computer ForensicsComputer SecurityCyber SecurityInformation TechnologyNetwork And Systems AdministrationNetwork EngineeringPenetration TestingSoftware EngineeringSystems EngineeringVulnerability Analysis
New
Cut your apply time in half.
Use ourAI Assistantto automatically fill your job applications.
Use For Free
Reposted 14 Days AgoSaved
Security • Software
This is a general application for various roles in cybersecurity, IT support, help desk operations, and field technician services, inviting applicants to submit their resume for future opportunities.
Top Skills:
CybersecurityField Technician ServicesHelp Desk OperationsInformation TechnologyManaged Service Provider Support
Software • Cybersecurity
Conduct advanced analysis on data to generate insights for targets, maintain databases, and develop profiles while mentoring analysts.
Top Skills:
Collection And Open-Source Data AnalysisInformation SystemsInformation Technology
Software • Cybersecurity
Analyze collection and open-source data to provide insights on targets, maintain databases, generate profiles, and mentor other analysts.
Top Skills:
Information SystemsInformation Technology
Reposted 16 Days AgoSaved
Easy Apply
Easy Apply
Aerospace • Artificial Intelligence • Machine Learning • Cybersecurity
The Cybersecurity Engineer will act as an ISSO, ensuring compliance with cybersecurity policies, conducting risk assessments, and supporting system accreditation.
Top Skills:
AcasCloud SecurityContainerized EnvironmentsCybersecurityDod Cybersecurity PoliciesEmassHbssInformation TechnologyNistRisk Management Framework (Rmf)
Cybersecurity
Responsible for conducting IT Risks and Controls audits, managing IT governance, and working with stakeholders to address compliance and risk management.
Top Skills:
Audit SoftwareCybersecurityData Analysis ToolsInformation TechnologyMS OfficeSAPSFDC
Big Data • Information Technology • Security • Software • Analytics
The role requires extensive experience in designing and developing computer or information systems, focusing on security and vulnerability analysis.
Top Skills:
Computer ForensicsComputer ScienceComputer/Network SecurityEngineeringHardware EngineeringInformation AssuranceInformation SystemsInformation TechnologyMathematicsPenetration TestingProgrammingSoftware EngineeringSystem EngineeringVulnerability Analysis
Big Data • Information Technology • Security • Software • Analytics
The role requires analyzing networks for vulnerabilities and designing secure systems, necessitating extensive experience in computer systems and cybersecurity.
Top Skills:
Computer ScienceEngineeringInformation SystemsInformation TechnologyMathematics
Security • Software • Cybersecurity
Analyze and protect against vulnerabilities, intrusions, and threats in computer networks. Requires extensive experience in cyber security and network administration.
Top Skills:
Cyber SecurityInformation AssuranceInformation TechnologyNetwork EngineeringSystems Engineering
Security • Software • Cybersecurity
The Exploitation Analyst will analyze vulnerabilities and threats in network systems, protect against intrusions, and respond to cyber events.
Top Skills:
Computer ScienceCyber SecurityInformation TechnologyNetwork Engineering
Security • Software • Cybersecurity
The Exploitation Analyst will analyze, map, and protect computer networks while responding to unauthorized activities and threats.
Top Skills:
Computer ForensicsComputer Network SystemsCyber SecurityInformation AssuranceInformation TechnologyNetwork EngineeringPenetration TestingVulnerability Analysis
Security • Software • Cybersecurity
The Digital Network Exploitation Analyst will analyze data for target opportunities, evaluate networks, and develop operational plans for missions.
Top Skills:
Communication DevicesComputer ForensicsInformation TechnologyIp Core InfrastructureNetwork SecurityNetworkingOsi ModelPenetration TestingSystems Engineering
Security • Software • Cybersecurity
The Digital Network Exploitation Analyst will analyze data to evaluate target opportunities and assist in developing detailed plans for the US Federal Government.
Top Skills:
Computer ScienceCyber SecurityInformation TechnologyNetwork EngineeringSoftware EngineeringSystems Engineering
Hospitality
The Cybersecurity Intern will assist the Cybersecurity team in operational tasks, security reviews, and learn security technologies, working 30-40 hours weekly during the summer.
Top Skills:
Cloud ComputingInformation SecurityInformation Technology
Top Companies Hiring Cybersecurity Roles
See AllAll Filters
Total selected ()
No Results
No Results
























