Get the job you really want.
Maximum of 25 job preferences reached.
Top Cyber Security Jobs in Sacramento, CA
Security • Cybersecurity
The Security Engineer will design, implement, and support Firewall solutions, enhance security posture, and respond to audits and vulnerabilities.
Top Skills:
CiscoFirewall PlatformsFortinetKqlLogicappsMicrosoft Sc-200Mitre Att&Ck FrameworkSIEM
Software • Cybersecurity • Data Privacy
The Security Engineer role involves managing identity governance, access management solutions, technical support of IAM technologies, and policy development.
Top Skills:
Active DirectoryC++CyberarkJavaJavaScriptLdapLinuxOktaPerlPowershellPythonQradarSailpointSplunkSQLVenafiWindows
Information Technology • Software
As a Security Engineer, you'll enhance security for Sourcegraph's products and infrastructure through vulnerability management, application security, and incident response, contributing to a world-class security team.
Top Skills:
GCPGoKubernetesTerraformTypescript
Reposted 6 Days AgoSaved
Cybersecurity
The DFIR Consultant will support incident response and forensic investigations, perform threat discovery, communicate with clients, and utilize scripting to enhance efficiency.
Top Skills:
Amazon Web ServicesAzureBashEdrFwGoogle SuiteGoM365NdrNgavPowershellPythonSIEMVelociraptorXdr
Security • Cybersecurity
The Cyber Defense Analyst is responsible for monitoring, investigating, and responding to security alerts, leading incident response, and improving automation in a hybrid environment.
Top Skills:
AWSBashCdrCspmEdrGitOktaPythonSIEMSoar
Reposted 8 Days AgoSaved
Artificial Intelligence • Blockchain
The role involves auditing blockchain products, improving security tools, conducting research, and enhancing security processes for smart contracts.
Top Skills:
GoRustSolidity
Artificial Intelligence • Blockchain
Assist in security research by developing analysis tools, discovering vulnerabilities, and publishing findings in various venues. Ideal for Master's or PhD students in related fields.
Top Skills:
CtfGoMalware AnalysisMobile App AnalysisNetwork Anomaly DetectionReverse EngineeringRustVulnerability Detection
Cybersecurity • Data Privacy
The IAM Architect will deploy and support the Ping Identity platform, execute migrations, analyze infrastructure updates, assist clients, and engage in knowledge sharing.
Top Skills:
AWSGCPLdapAzureMicrosoft ServerOauthOpenid ConnectOraclePingaccessPingdirectoryPingfederateSAMLUnixWindows
Cybersecurity • Data Privacy
The Security Threat Intelligence Engineer will analyze security threats, produce intelligence reports, and enhance threat detection processes, ensuring cybersecurity resilience against diverse attacks.
Top Skills:
AWSAzureEdrElkGCPIdsMispSIEMSnowflakeSoarSplunkStixTaxii FrameworksThreat Intelligence FeedsThreat Intelligence Platform
Cybersecurity • Data Privacy
The Data Protection Consultant will develop a Data Protection Program Framework, document processes, facilitate stakeholder agreement, and create a roadmap while managing data protection technologies and governance standards.
Top Skills:
AWSBigidGCPMS OfficeMs AzureMs365ThalesVaronisVormetric
Cybersecurity • Data Privacy
Manage and support a Data Protection Program, focusing on cybersecurity measures like USB lockdown and email/file sharing restrictions.
Top Skills:
ConfluenceJIRAMS OfficeTrend MicroZscaler
Cybersecurity • Data Privacy
The IAM Business Security Architect will develop and deploy xIAM solutions, improve onboarding processes, and provide architecture advisory services for security operations.
Top Skills:
Api GatewaysCiamIamKerberosLdapMfaMicrosoft Active DirectoryOauthOidcOne Identity ManagerPing FederatePkiSAMLScimSoa ServicesSpmlXacml
New
Cut your apply time in half.
Use ourAI Assistantto automatically fill your job applications.
Use For Free
Cybersecurity • Data Privacy
The role involves developing and improving threat detection systems, writing alert strategies, and supporting incident response teams. Requires collaboration and strong analytical skills to enhance security measures.
Top Skills:
AWSMS OfficePythonSIEMSoarSplunkSQL
Cybersecurity • Data Privacy
The Security CIAM Engineer will design, develop, and deploy CIAM solutions, focusing on identity lifecycle management and working within an agile team to enhance CIAM platforms.
Top Skills:
AWSAzure Active DirectoryGCPMS OfficeOkta
Cybersecurity • Data Privacy
The Azure Security Engineer will enhance security posture on Azure, manage security activities, develop security frameworks, and coordinate cloud security architecture.
Top Skills:
AzureAzure Active DirectoryAzure DefenderAzure MonitoringAzure SentinelCybersecurity ToolsDatabricksGitlabJenkinsSnowflake
Cybersecurity • Data Privacy
Engage with customers to perform health checks, conduct pilots, deploy solutions, and provide recommendations on Microsoft Azure security tools.
Top Skills:
Azure Information ProtectionAzure SentinelDefender For CloudMicrosoft Defender For AzureMicrosoft Defender For EndpointMicrosoft For IdentityMicrosoft Information Protection
Cybersecurity • Data Privacy
The role involves conducting health checks, managing deployments, running pilots, and giving recommendations on Microsoft security products.
Top Skills:
Azure Information ProtectionAzure SentinelEmsMicrosoft Defender For CloudMicrosoft Defender For EndpointMicrosoft For IdentityMicrosoft Information ProtectionMicrosoft IntuneOffice 365
Information Technology • Insurance • Professional Services • Software • Cybersecurity
The Security Analyst will provide monitoring services, analyze security incidents, triage event data, escalate issues, and develop client relationships.
Top Skills:
AWSAzureCloud Security ProductsCrowdstrikeEdrGoogleMdrSentineloneSIEMXdr
Internet of Things
As a Staff Security Engineer, you will design security controls, conduct risk assessments, support teams in securing applications, and ensure compliance with security standards while mentoring junior staff.
Top Skills:
Amazon Web ServicesAzureBoxConfluenceData Loss PreventionEndpoint Detection And ResponseGCPGoogle WorkspaceIdentity And Access ManagementJIRAMobile Device/Application ManagementSlackWorkday
Information Technology • Consulting
The Sr. Security Compliance Engineer develops compliance policies, monitors security controls, conducts audits, collaborates on GRC initiatives, and assists in vulnerability management across multiple jurisdictions.
Top Skills:
AWSAzureCompliance Automation ToolsDrataFedrampGCPGdprGrc PlatformsHipaaIso 27001Nis2NistOnetrustPci-DssServicenowSoc 2Vanta
Software
As Director of Security Operations, lead strategic security programs, manage teams for threat detection, incident response, and enhance IAM capabilities. Focus on protecting critical assets against evolving threats while fostering collaboration across departments.
Top Skills:
Extended Detection And Response (Xdr)Identity And Access Management (Iam)Managed Detection And Response (Mdr)Security Information And Event Management (Siem)Security Orchestration Automation And Response (Soar)Threat DetectionVulnerability Management
Information Technology • Security • Cybersecurity
The Solution Architect will lead technical discovery and design solutions aligning Oasis capabilities with enterprise needs, focusing on cybersecurity and identity management.
Top Skills:
Cloud SecurityCybersecurityIamPamSecrets Management
Big Data • Cloud • Security • Software • Cybersecurity
Design and build network detection and response systems for large organizations. Collaborate on security architecture, threat hunting, and product innovation.
Top Skills:
Python
Reposted 12 Days AgoSaved
eCommerce • Information Technology • Consulting
Design and implement secure cloud architectures, ensuring compliance and integrating network security solutions across multi-cloud environments. Collaborate with teams to operationalize security strategies.
Top Skills:
AnsibleAWSAzureCi/CdGCPTerraform
Artificial Intelligence • Big Data • Analytics • Consulting • Financial Services • Design
As an Information Security and Compliance Engineer at PureFacts, you will implement security controls, support compliance audits, conduct vulnerability assessments, and develop security policies, ensuring system integrity and availability.
Top Skills:
Cis BenchmarksIso 27001AzureSiem PlatformsSoc 1Soc 2Vulnerability Scanners
Top Companies in Sacramento, CA Hiring Cyber Security Roles
See AllPopular Sacramento, CA Job Searches
Tech Jobs & Startup Jobs in Sacramento
Remote Jobs in Sacramento
Content Jobs in Sacramento
Customer Success Jobs in Sacramento
IT Jobs in Sacramento
Cyber Security Jobs in Sacramento
Tech Support Jobs in Sacramento
Data & Analytics Jobs in Sacramento
Analysis Reporting Jobs in Sacramento
Analytics Jobs in Sacramento
Business Intelligence Jobs in Sacramento
Data Engineer Jobs in Sacramento
Data Science Jobs in Sacramento
Machine Learning Jobs in Sacramento
Data Management Jobs in Sacramento
UX Designer Jobs in Sacramento
Software Engineer Jobs in Sacramento
Android Developer Jobs in Sacramento
C# Jobs in Sacramento
C++ Jobs in Sacramento
DevOps Jobs in Sacramento
Front End Developer Jobs in Sacramento
Golang Jobs in Sacramento
Hardware Engineer Jobs in Sacramento
iOS Developer Jobs in Sacramento
Java Developer Jobs in Sacramento
Javascript Jobs in Sacramento
Linux Jobs in Sacramento
Engineering Manager Jobs in Sacramento
.NET Developer Jobs in Sacramento
PHP Developer Jobs in Sacramento
Python Jobs in Sacramento
QA Jobs in Sacramento
Ruby Jobs in Sacramento
Salesforce Developer Jobs in Sacramento
Scala Jobs in Sacramento
Finance Jobs in Sacramento
HR Jobs in Sacramento
Internships in Sacramento
Legal Jobs in Sacramento
Marketing Jobs in Sacramento
Operations Jobs in Sacramento
Office Manager Jobs in Sacramento
Operations Manager Jobs in Sacramento
Product Manager Jobs in Sacramento
Project Manager Jobs in Sacramento
Sales Jobs in Sacramento
Account Executive (AE) Jobs in Sacramento
Account Manager (AM) Jobs in Sacramento
Sales Leadership Jobs in Sacramento
Sales Development Representative Jobs in Sacramento
Sales Engineer Jobs in Sacramento
Sales Operations Jobs in Sacramento
All Filters
Total selected ()
No Results
No Results


.png)






















