Information Security Consultant. Information Security Consultant. ...
Security Engineering experience preferably in AWS Cloud and at least 2 of the following areas: cloud security, web application security, incident response, threat hunting, and cyber security operations. Good understanding of cloud security architecture, security assessments, audit standards for t...
Quarry Consulting is looking for Cyber Security Analyst and Reporting Specialist with 7 years experience in cybersecurity risk management, and 5 years in project management within cybersecurity + cert (CISM or CRISC). University degree or college diploma in Cybersecurity, Information Technology, ...
We are seeking an experienced and proactive IT Security Manager to lead our security team and safeguard our assets, employees, and information. As the IT Security Manager, you will be responsible for overseeing and managing all aspects of our security operations. You will play a crucial role in d...
Lead and coordinate the incident response team in handling cybersecurity incidents, including data breaches, malware infections, insider threats, and other security breaches. Our client is a leading Oil & Gas firm looking to hire IT Security Analysts with a 7-month hybrid contract with the possib...
We are seeking an experienced and proactive Senior IT Security Manager to lead our security team and safeguard our assets, employees, and information. As the Senior IT Security Manager, you will be responsible for overseeing and managing all aspects of our security operations. You will play a cru...
Monitor security alerts and events to identify potential threats or security incidents. Respond to security incidents promptly, investigating and mitigating security breaches. Educate and train employees on security best practices to enhance the organization's overall security posture. Prepare an...
Certification in one or more of the following: CISSP, Certified Information Security Manager (CISM), Global Information Security Professional (GISP), Certified in Risk and Information Systems Control (CRISC), Certified Information Systems Auditor (CISA), The Open Group Architecture Framework (TOG...
Employers want to know
Do you have experience as a Security?
As such, we are looking for a Application Security Architect with strong technical & leadership skills, a background in product/application security, and a passion for solving complex product security challenges in a fast-moving agile environment. Keys: Application Security, Architecture, Softwar...
Research and develop a system security context and define security assurance requirements based on industry standards and cyber security policies and practices. Bachelor’s degree in computer science, Information Security, or related field; Cyber Security specialty a strong asset. Proficiency with...
As a senior IT security advisor, you help protect IT hardware, software and data against modification, destruction, and accidental or unauthorized disclosure. You also assist in authentication and access control by designing, administering and controlling proven security systems. ...
Join forces with our brilliant Security Engineering team to define and integrate Security Architecture standards and Secure SDLC across the organization, ensuring our security practices stay top-notch and our products. Help development teams in meeting security requirements through security consu...
The ideal candidate will have experience driving a secure culture through appropriate security-based behaviors as part of a security-aware culture collaborating across various teams that include Engineering, BT, Security, P&P, Marketing etc. As the Technical Program Manager for the Security team,...
Our client is seeking an experienced SAP Basis/Security Manager with expertise in Business Technology Platform (BTP) to join their organization on a full time permanent basis. ...
You possess 5 years of experience as an operational risk, information security, security risk management and/or cybersecurity professional. You support the Risk and Information Security activities of MS Security Organization for your scope. Risk and Security Officer - 2nd Line of Defense. Risk an...
Paladin is seeking a curious person who has a passion towards healthcare security and safety and pursues additional education through the International Association of Healthcare Security and Safety (IAHSS). Rural Security Site Supervisor - Eastern Rural Zone. The Rural Security Site Supervisor is...
Develop and implement comprehensive network security architectures, including firewalls, intrusion detection/prevention systems, VPNs, NetFlow and other security technologies. Evaluate and recommend new security tools and technologies to enhance the organization's security posture. Position Title...
Our client is seeking a SAP Security consultant to join their project immediately for 6 month contract position with a chance for potential for extension. Advice on SAP Security policy and procedures. Review and understand the new security design and its comparison to existing design. Translate t...
We're looking for a hands-on staff security engineer to play a key role in building Rippling's security program. Rippling's product’s scope provides a unique set of security challenges, but our management is especially supportive of security and compliance as a central function of the business. A...
Oversee and expertly coordinate all security-related activities, ensuring the highest standards of safety and security are consistently met in every aspect of operations. Proactively identify and integrate cutting-edge security technologies, continuously updating and refining security strategies ...
As the Technical Program Manager for the Security team, you will assist in driving security initiatives by engaging various process owners in the design, documentation, and implementation of the appropriate controls in our computing environments, enabling Okta to demonstrate those controls to ext...
A strong understanding of and passion for the security domain; that could include understanding of topics in the sub-domains of cryptography, network security, application security, common threat vectors, etc. Android platform with a security angle; development experience with modern encryption t...