Security Engineering experience preferably in AWS Cloud and at least 2 of the following areas: cloud security, web application security, incident response, threat hunting, and cyber security operations. Good understanding of cloud security architecture, security assessments, audit standards for t...
We are seeking an experienced and proactive IT Security Manager to lead our security team and safeguard our assets, employees, and information. As the IT Security Manager, you will be responsible for overseeing and managing all aspects of our security operations. You will play a crucial role in d...
As such, we are looking for a Application Security Architect with strong technical & leadership skills, a background in product/application security, and a passion for solving complex product security challenges in a fast-moving agile environment. Keys: Application Security, Architecture, Softwar...
We are seeking an experienced and proactive Senior IT Security Manager to lead our security team and safeguard our assets, employees, and information. As the Senior IT Security Manager, you will be responsible for overseeing and managing all aspects of our security operations. You will play a cru...
Monitor security alerts and events to identify potential threats or security incidents. Respond to security incidents promptly, investigating and mitigating security breaches. Educate and train employees on security best practices to enhance the organization's overall security posture. Prepare an...
Employers want to know
Do you have experience as a Security?
Research and develop a system security context and define security assurance requirements based on industry standards and cyber security policies and practices. Bachelor’s degree in computer science, Information Security, or related field; Cyber Security specialty a strong asset. Proficiency with...
As a senior IT security advisor, you help protect IT hardware, software and data against modification, destruction, and accidental or unauthorized disclosure. You also assist in authentication and access control by designing, administering and controlling proven security systems. ...
Fournir une architecture de solutions de bout en bout pour l’équipe de cybersécurité.Fournir des orientations et donner des conseils aux équipes chargées de la fourniture de solutions afin de garantir la conformité de la conception et du déploiement des solutions avec l’architecture de sécurité v...
Agile certification (Agile Certified Professional, Certified Scrum Product Owner) Project Management Professional (PMP) or PRINCE2 Cyber Security training and certification (CISSP/CISM, GIAC Security Essentials, Security+) . Our I&IT Security Office is seeking a Project Managers to manage various...
Play a pivotal role in cultivating a strong security culture within Okta, emphasizing the importance of security in every aspect of our work, including initiatives such as our Security Champions program. Staff Product Security Engineer focusing on Security Education. Your role is not just about t...
We're looking for a hands-on staff security engineer to play a key role in building Rippling's security program. Rippling's product’s scope provides a unique set of security challenges, but our management is especially supportive of security and compliance as a central function of the business. A...
Oversee and expertly coordinate all security-related activities, ensuring the highest standards of safety and security are consistently met in every aspect of operations. Proactively identify and integrate cutting-edge security technologies, continuously updating and refining security strategies ...
A strong understanding of and passion for the security domain; that could include understanding of topics in the sub-domains of cryptography, network security, application security, common threat vectors, etc. Android platform with a security angle; development experience with modern encryption t...
Industry-related security certification is preferred (CEH, Security+, CISM, CISSP). Apollo’s security monitoring systems. They will be responsible for investigating and resolving security issues, running incident processes and finding and resolving vulnerabilities. Improve our security monitoring...
Our client is seeking a SAP Security consultant to join their project immediately for 6 month contract position with a chance for potential for extension. Advice on SAP Security policy and procedures. Review and understand the new security design and its comparison to existing design. Translate t...
We are looking for a security engineer with a passion for cloud infrastructure and zero trust architecture to join our security team. This intermediate role is tailored for those with a passion for security at scale, eager to delve into cloud and workload security, identity, and the principles of...
Education: Secondary (high) school graduation certificate.Experience: 7 months to less than 1 year.Be the point of contact when in need to handle emergency situations.Co-ordinate activities with other work units or departments.Establish work schedules and procedures.Prepare and submit progress an...
Monitoring, triaging, processing, and escalating security events received from multiple services and log sources. Initial collection of evidence related to security events. Routine audits of ACL and Security Lists. Coordinate with service and operations teams to validate security events and anoma...
Join forces with our brilliant Security Engineering team to define and integrate Security Architecture standards and Secure SDLC across the organization, ensuring our security practices stay top-notch and our products. Help development teams in meeting security requirements through security consu...
Minimum of 7 years of combined experience in the IT or security space, related to corporate or enterprise security. Experience with using and implementing security frameworks within an organization, such as the Center for Internet Security (CIS) Benchmarks or NIST 800-53. Partner with other membe...
Understanding of key security concepts such as cryptography, authentication, authorization, security protocols, or security vulnerabilities as applied to web application security and Cloud-based services. Utilize security information and event management for real-time analysis of security alerts ...
Responsible for advanced planning, design and build of security systems, applications, environments and architectures; oversees the implementation of security systems, applications, environments and architectures and ensures compliance with information security standards and corporate security po...