Ready to use consultative sales techniques to satisfy client communication needs? As a Strategic Market Technical Sales Consultant at Spectrum Business, you can do that. Expert in Managed Router and M...
read moreCoordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Data Security, Vulnerability Management, Network Architecture an...
read moreAs a security operations center (SOC) analyst in the cybersecurity and data privacy practice area, you will be part of a SOC analysis team responsible for supporting entities across NYS. Serving as a ...
read moreReady to use consultative sales techniques to satisfy client communication needs? As a Strategic Market Technical Sales Consultant at Spectrum Business, you can do that. Expert in Managed Router and M...
read moreAs a security operations center (SOC) analyst in the cybersecurity and data privacy practice area, you will be part of a SOC analysis team responsible for supporting entities across NYS. Serving as a ...
read moreAs a principal security consultant in the Cybersecurity and Data Privacy Practice Area, you will collaborate with team members to conceptualize, deliver, and support our clients through today’s ever-c...
read moreAs a security operations center (SOC) analyst in the cybersecurity and data privacy practice area, you will be part of a SOC analysis team responsible for supporting entities across NYS. Serving as a ...
read moreReady to use consultative sales techniques to satisfy client communication needs? As a Strategic Market Technical Sales Consultant at Spectrum Business, you can do that. Technical skills : Expert in M...
read moreAs a principal security consultant in the Cybersecurity and Data Privacy Practice Area, you will collaborate with team members to conceptualize, deliver, and support our clients through today’s ever-c...
read moreCoordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and ...
read moreCoordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and ...
read moreCoordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Data Security, Vulnerability Management, Network Architecture an...
read moreAls Sicherheitsexperte in der Rolle Principal Security Consultant (m/w/d) berätst Du unsere Kunden auf strategischer, taktischer und konzeptioneller Ebene und sorgst dafür, dass Sicherheitsrisiken red...
read moreCoordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Platform Security, Application Security, Resiliency, Data Security, Networ...
read moreCoordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Platform Security, Application Security, Resiliency, Data Security, Networ...
read moreCoordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and ...
read moreCoordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and ...
read moreAls Sicherheitsexperte in der Rolle Principal Security Consultant (m/w/d) berätst Du unsere Kunden auf strategischer, taktischer und konzeptioneller Ebene und sorgst dafür, dass Sicherheitsrisiken red...
read moreCoordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and ...
read moreCoordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and ...
read moreReady to use consultative sales techniques to satisfy client communication needs? As a Strategic Market Technical Sales Consultant at Spectrum Business, you can do that. Expert in Managed Router and M...
read moreThe Cloud Cybersecurity Solutions Architect will serve as the technical expert and strategic planner for cloud security architecture. Deep understanding of cloud-based cybersecurity principles, includ...
read moreReady to use consultative sales techniques to satisfy client communication needs? As a Strategic Market Technical Sales Consultant at Spectrum Business, you can do that. Expert in Managed Router and M...
read moreReady to use consultative sales techniques to satisfy client communication needs? As a Strategic Market Technical Sales Consultant at Spectrum Business, you can do that. Expert in Managed Router and M...
read moreExpertise in cloud security, identity and access management (IAM), and security information and event management (SIEM) systems. Master's degree or equivalent experience in Cybersecurity, Computer Sci...
read moreServing as a SOC analyst and NYSTEC consultant, your day-to-day role will be working with a team that performs intake and initial triage of cyber security events. Bachelor's Degree with a concentratio...
read moreBachelor's Degree with a concentration or major in Information Security, Cyber Security, Digital Forensics, Information Assurance, or a related field. As a security operations center (SOC) analyst in ...
read moreThe Application Offensive Security Consultant is responsible for providing technical direction and performing security assessment on applications. Being a member of the Application Security team, you ...
read moreThe Application Offensive Security Consultant is responsible for providing technical direction and performing security assessment on applications. Being a member of the Application Security team, you ...
read moreReview and analyze advanced computer security incident response activities and technical investigations of information security related incidents or breach related activates. Cyber Security Research C...
read moreReview and analyze advanced computer security incident response activities and technical investigations of information security related incidents or breach related activates. Innova Solutions has a cl...
read moreAs a Senior Consultant in our Cyber & Strategic Risk Application Security team, you will be part of our Oracle practice and will be responsible for delivering application security for Oracle Cloud ERP...
read moreAs a Senior Consultant in our Cyber & Strategic Risk Application Security team, you will be part of our Oracle practice and will be responsible for delivering application security for Oracle Cloud ERP...
read morePerform security reviews and identify security gaps in security architecture, resulting in recommendations for inclusion into the risk mitigation strategy. The EITS Security Architect is part of the E...
read morePerform security reviews and identify security gaps in security architecture, resulting in recommendations for inclusion into the risk mitigation strategy. The EITS Security Architect is part of the E...
read moreThis position for #BroadcomSoftware is responsible to provide subject-matter expertise, thought leadership, adoption guidance and solution/technical specialization within and/or across Broadcom’s Main...
read moreTo achieve their objective, they are now looking to bring a Digital Forensic Consultant onboard to lead investigations and mentor junior consultants.
As a SIG consultant in the security & privacy team, you perform technical assessments, and you advise clients (from Developers to C-level). Strong opinion on software security/privacy and the ability ...
read moreAs a SIG consultant in the security & privacy team, you perform technical assessments, and you advise clients (from Developers to C-level). Knowledge of software security tools. Strong opinion on soft...
read more