Get the job you really want.
Maximum of 25 job preferences reached.
Top Cybersecurity Jobs
Reposted 5 Days AgoSaved
Easy Apply
Easy Apply
Cybersecurity
As a SOC Analyst, you will monitor and analyze security incidents, coordinate responses, and collaborate with a team of cybersecurity professionals to mitigate risks.
Top Skills:
CybersecurityCybersecurity ToolsSecurity Information And Event Management (Siem)
Software
As a Security Engineer, you will conduct threat assessments, lead forensic investigations, mentor junior analysts, and enhance security tools and strategies for enterprise defense.
Top Skills:
AWSAzureC/C++CybersecurityForensicsPythonRuby
Security • Cybersecurity
The FRCS Cybersecurity Manager will oversee the installation and maintenance of IT and OT hardware and software, ensuring cybersecurity compliance for Navy Networks while managing user access and system integrity during changes.
Top Skills:
CybersecurityItOt
Security • Cybersecurity
The ISSE will support Department of Defense programs, ensure Cybersecurity requirements are met, and engage with stakeholders through assessments and technical discussions.
Top Skills:
Comptia Security+CybersecurityOs/Ce
Security • Cybersecurity
The Senior Information Systems Security Officer ensures cybersecurity compliance, manages risk, conducts investigations, and collaborates with teams on critical system security objectives.
Top Skills:
CismCisspComptia Security+CybersecurityRisk Management FrameworkSecurity Technical Implementation Guides
Security • Cybersecurity
The Senior Cyber Counterintelligence Officer investigates and analyzes cyber events, supports interagency partners, and develops security measures for counterintelligence initiatives.
Top Skills:
Cybersecurity
Artificial Intelligence • Healthtech • Analytics • Biotech
The Cyber Security Engineer will integrate security into product design, manage vulnerabilities, conduct risk assessments, support incident responses, and ensure compliance with regulations.
Top Skills:
AIAWSAzureCybersecurityDockerGCPKubernetes
Information Technology • Consulting • Defense
Managing the operational security of Information Systems; ensure compliance with policies, conduct assessments, and oversee configuration management.
Top Skills:
CybersecurityEncryption ToolsInformation AssuranceNetwork SecuritySecurity Incident ManagementSecurity Tools
Information Technology • Consulting • Defense
The Information Systems Security Officer will support the information assurance program, enforce security policies, and manage security operations for critical systems. Responsibilities include risk assessments, documentation preparation, and security compliance activities to protect sensitive information.
Top Skills:
CybersecurityEncryption ToolsInformation AssuranceInformation Systems SecurityNetwork Security ServicesPkiSecurity MethodologiesSecurity PoliciesSecurity Standards
Information Technology • Consulting • Defense
The role involves managing information systems security, implementing security policies, conducting assessments, and ensuring compliance with security standards and frameworks.
Top Skills:
Communication ProtocolsCybersecurityEncryption ToolsHardware Security ImplementationItPkiSecurity AuthorizationSecurity Incident ManagementSecurity Tools
Fintech • HR Tech • Insurance • Consulting
As an IT Lead Security Specialist, you will design security controls, manage cyber risks, provide advisory, and ensure compliance with security standards while collaborating with business teams and stakeholders.
Top Skills:
CybersecurityEncryptionHybrid CloudIso 27001NistPublic CloudRisk ManagementSecurity ControlsThreat Countermeasures
Fintech
As an IT Audit Senior Manager, oversee technology audits, evaluating risks and controls, mentoring staff, and enhancing operational efficiency through data analytics and audit automation tools.
Top Skills:
APIsArtificial IntelligenceAWSAzureCybersecurityData ScienceDevOpsMachine LearningRobotic Process Automation
New
Track Smarter, Apply Better.
Ditch the spreadsheets. Organize your job search with our freeApplication Tracker.
Use For Free
Reposted 6 Days AgoSaved
Consulting • Cybersecurity
The role involves research on security risks, assisting in SOC assessments, collaborating with clients, and developing compliance solutions.
Top Skills:
Compliance FrameworksCybersecurityGdprHipaaIso 27000NistPci DssSoc
Information Technology • Security • Cybersecurity
The Vice President will lead Qualys' Advanced RiskOps Group, managing operations, driving business growth, and building a technical team focused on innovative cyber risk management services.
Top Skills:
CybersecurityEnterprise Technology ServicesEtmFairRisk ManagementVulnerability Management
Information Technology • Software
The role involves gathering, analyzing, and disseminating Cyber Threat Intelligence to support operational decision-making and improve vulnerability management. It includes identifying threats, collaborating with stakeholders, and producing reports.
Top Skills:
Cyber Threat IntelligenceCybersecurityOpen-Source IntelligenceVulnerability Management
Information Technology • Software
The role involves gathering and analyzing cyber threat intelligence, identifying threats and vulnerabilities, and improving vulnerability management capabilities.
Top Skills:
CybersecurityIntelligence Analytical MethodsOpen-Source Intelligence
Fintech
As an IT Audit Manager, you will lead audits, understand risks, collaborate with stakeholders, and mentor team members to drive improvements in internal controls.
Top Skills:
Artificial IntelligenceAutomationAWSAzureCloud ComputingCybersecurityData AnalyticsData ScienceMachine LearningRobotic Process AutomationScripting
Fintech • Machine Learning • Payments • Software • Financial Services
Responsible for security architecture, design, and configuration of HP NonStop systems, collaborating with vendors and teams, and ensuring compliance with security policies and regulatory requirements.
Top Skills:
CyberarkHp Nonstop SystemsServicenowSplunk
Financial Services
As a Senior Lead Cybersecurity Architect, you will develop high-quality cybersecurity solutions, guide evaluations of technology, and influence decision-makers on technology applications.
Top Skills:
Artificial IntelligenceCloud ComputingCybersecurity ArchitectureMachine LearningProgramming Languages
Cloud • Information Technology • Software • Consulting
The Insider Threat Analyst will monitor for insider threats using various tools, analyze user behavior, and collaborate on investigations while documenting findings for stakeholders.
Top Skills:
CybersecurityEdr ToolsUser And Entity Behavior Analytics (Ueba)
Big Data • Cloud • Internet of Things
The InfoSec M&R Engineer Trainee will monitor, analyze, and respond to security alerts, optimize workflows, and implement automation. Responsibilities include triaging incidents, documenting information, and escalating as needed while working in a shift-based team environment.
Top Skills:
Artificial IntelligenceComputer NetworkingCybersecurityInformation TechnologyMachine LearningNetwork DevicesOperating SystemsScriptingSystems
Reposted 7 Days AgoSaved
Information Technology
Lead the protection of network and data assets, conduct vulnerability assessments, ensure compliance with cybersecurity frameworks, and develop incident response procedures for TARCES infrastructure.
Top Skills:
5GCloud SecurityCybersecurityEdge ComputingHybrid CloudNetwork SecurityVulnerability Assessments
Healthtech
The IT Internal Audit Manager will lead IT audits, manage risk, ensure compliance, and improve controls, collaborating with IT and business teams.
Top Skills:
CobitCosoCybersecurityIso 27001It General ControlsNistSoc 1/2Sox
Information Technology • Software
The Nightwing Military Program offers training and opportunities in cybersecurity and related fields, focusing on skills development and preparation for future roles.
Top Skills:
AICloud ForensicsCybersecurityIncident ResponseNetwork EngineeringSystems Administration
Information Technology • Consulting • Cybersecurity
The Requirements Manager supports the identification and assessment of capability requirements for military intelligence missions, coordinating with cybersecurity experts and government officials to manage requirements within the DoD.
Top Skills:
Cloud ArchitecturesCyber OperationsCybersecurityData GovernanceJcidsRisk AssessmentUscybercomZero Trust
Top Companies Hiring Cybersecurity Roles
See AllPopular Job Searches
All Filters
Total selected ()
No Results
No Results

























