The Principal Consultant will work directly with multiple customers and key stakeholders (Admins, C-Suite, etc) to drive the security priorities of the security operations management, security operati...
read moreThe Application Offensive Security Consultant is responsible for providing technical direction and performing security assessment on applications. Being a member of the Application Security team, you ...
read moreCoordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and ...
read moreHaving previously served in the role of Chief Information Security Officer you have specific, hands-on experience building, maintaining, and operating the full Cybersecurity Program for a leading Hedg...
read moreSenior Manager, Information Security Office (ISO) Product Security Consultant. As an associate in Capital One’s Cyber Information Security Office - Product Security team, you will work with top talent...
read moreCoordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Data Security, Vulnerability Management, Network Architecture an...
read moreThe Principal Consultant will work directly with multiple customers and key stakeholders (Admins, C-Suite, etc) to drive the security priorities of the security operations management, security operati...
read moreThe Principal Consultant will work directly with multiple customers and key stakeholders (Admins, C-Suite, etc) to drive the security priorities of the security operations management, security operati...
read moreNetwork Security Consultant (Strata) . Responsibilities of the Network Security Consultant include:. Understand customer environment, requirements, and security roadmap to implement the appropriate se...
read moreThe Principal Consultant will work directly with multiple customers and key stakeholders (Admins, C-Suite, etc) to drive the security priorities of the security operations management, security operati...
read moreThe Principal Consultant will work directly with multiple customers and key stakeholders (Admins, C-Suite, etc) to drive the security priorities of the security operations management, security operati...
read moreCoordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and ...
read moreThe Principal Consultant will work directly with multiple customers and key stakeholders (Admins, C-Suite, etc) to drive the security priorities of the security operations management, security operati...
read moreCoordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Data Security, Vulnerability Management, Network Architecture an...
read moreThe Principal Consultant will work directly with multiple customers and key stakeholders (Admins, C-Suite, etc) to drive the security priorities of the security operations management, security operati...
read moreCoordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and ...
read moreCoordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and ...
read moreThe Principal Consultant will work directly with multiple customers and key stakeholders (Admins, C-Suite, etc) to drive the security priorities of the security operations management, security operati...
read moreThe Principal Consultant will work directly with multiple customers and key stakeholders (Admins, C-Suite, etc) to drive the security priorities of the security operations management, security operati...
read moreThe Principal Consultant will work directly with multiple customers and key stakeholders (Admins, C-Suite, etc) to drive the security priorities of the security operations management, security operati...
read moreThe Principal Consultant will work directly with multiple customers and key stakeholders (Admins, C-Suite, etc) to drive the security priorities of the security operations management, security operati...
read moreThe Principal Consultant will work directly with multiple customers and key stakeholders (Admins, C-Suite, etc) to drive the security priorities of the security operations management, security operati...
read moreThe Principal Consultant will work directly with multiple customers and key stakeholders (Admins, C-Suite, etc) to drive the security priorities of the security operations management, security operati...
read moreThe Principal Consultant will work directly with multiple customers and key stakeholders (Admins, C-Suite, etc) to drive the security priorities of the security operations management, security operati...
read moreThe Application Offensive Security Consultant is responsible for providing technical direction and performing security assessment on applications. Being a member of the Application Security team, you ...
read moreThe Principal Consultant will work directly with multiple customers and key stakeholders (Admins, C-Suite, etc) to drive the security priorities of the security operations management, security operati...
read moreThe Application Offensive Security Consultant is responsible for providing technical direction and performing security assessment on applications. Being a member of the Application Security team, you ...
read moreWork or projects with military or federal government agencies in Risk, Compliance or Information Security/Cyber Security sectors. Our Security, Risk and Compliance consultants work with clients at all...
read moreBrosnan Risk Consultants provides exceptional security services nationwide. Many of our employees began their careers as Security Officers, and today we are proud to say they have become a part of the...
read moreThe Application Offensive Security Consultant is responsible for providing technical direction and performing security assessment on applications. The person in this role should possess good understan...
read moreIn-depth knowledge of security event management, network security monitoring, investigating common types of attacks, network packet analysis, log collection and analysis, and reviewing security events...
read moreBrosnan Risk Consultants provides exceptional security services nationwide. Many of our employees began their careers as Security Officers, and today we are proud to say they have become a part of the...
read moreBrosnan Risk Consultants provides exceptional security services nationwide. Many of our employees began their careers as Security Officers, and today we are proud to say they have become a part of the...
read moreCoordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Platform Security, Application Security, Resiliency, Data Security, Networ...
read moreWe are hiring for a long term Consultancy - IT / Information Security Auditor (CISA). IT / Information Security Audit experience, Certified Information Systems Auditor (CISA) is strongly preferred. De...
read moreSenior Information Security Risk Analyst Consultant. Facilitate the continued improvement in information security risk management and culture across the firm, through continual refinement and implemen...
read moreMeet with prospective customers in order to sell our Security-as-a-Service business model. ...
To achieve their objective, they are now looking to bring a Digital Forensic Consultant onboard to lead investigations and mentor junior consultants. ...
To achieve their objective, they are now looking to bring a Digital Forensic Consultant onboard to lead investigations and client services. ...
As a SIG consultant in the security & privacy team, you perform technical assessments, and you advise clients (from Developers to C-level). You are involved in software quality in general, and your fo...
read more