Cybersecurity risk and issue management, information analysis, familiarity with tools such as JIRA and Service Now, core cybersecurity domains such as identity and access management, vulnerability man...
read moreIn a very hands-on capacity you will responsible for the support and administration of several core network security tools.There is the possibility of converting to full-time after 6-9 months.You will...
read moreIn a very hands-on capacity you will responsible for the support and administration of several core network security tools.There is the possibility of converting to full-time after 6-9 months.You will...
read moreIf you have a passion for Cybersecurity, risk analytics , and working in a collaborative environment, this is the opportunity for you. Create Cybersecurity dashboard and presentations for Board Risk a...
read moreIf you have a passion for Cybersecurity, risk analytics , and working in a collaborative environment, this is the opportunity for you. Create Cybersecurity dashboard and presentations for Board Risk a...
read morePSEG operates under a Flexible Work Model where flexible work is offered when job requirements allow.In support of this model, roles have been categorized into one of four work location categories: on...
read moreHaving previously served in this role, you have specific, hands-on experience implementing, maintaining, and operating a cybersecurity program for a leading Hedge Fund or Family Office. Lead the firm'...
read moreExperience providing technical PAM expertise IT management and staff in cybersecurity threat risk assessments, development, testing and the implementation and operation of appropriate information secu...
read moreProvides technical expertise and support IT management and staff in cybersecurity threat risk assessments, development, testing and the implementation and operation of appropriate information security...
read morePSEG operates under a Flexible Work Model where flexible work is offered when job requirements allow.In support of this model, roles have been categorized into one of four work location categories: on...
read moreWe are conducting a search for a Cyber Security Analyst with a minimum of 2 years professional experience working with cloud security for a fintech firm.Perform daily network and security traffic moni...
read moreWe are conducting a search for a Cyber Security Analyst with a minimum of 2 years professional experience working with cloud security for a fintech firm.Perform daily network and security traffic moni...
read moreOne of our telecommunication clients is looking to hire a Cybersecurity Auditor with experience in the public sector compliance sector. You will be responsible for conducting cybersecurity audits and ...
read moreOne of our telecommunication clients is looking to hire a Cybersecurity Auditor with experience in the public sector compliance sector. Strong understanding of cybersecurity threats and trends, specif...
read morePrimary responsibilities will include assessing Cybersecurity, Business Continuity controls for S&P third parties by conducting control risk assessments, risk recertifications, and continuously monito...
read morePrimary responsibilities will include assessing Cybersecurity, Business Continuity controls for S&P third parties by conducting control risk assessments, risk recertifications, and continuously monito...
read moreCertified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM). Under the direction of the Executive Director ...
read moreUnder the direction of the Executive Director Infrastructure, the Cyber Security Analyst Level II will assist with implementing cybersecurity polices, standards, directives, and guidelines that draws ...
read moreIF THE ATTACHED GRID IS NOT INCLUDED ON TOP OF THE RESUME IT WILL BE DECLINED AND YOU WILL LOSE THAT SUBMITTAL SLOT.The grid is intended to be screening questions that your recruiter should ask while ...
read moreIF THE ATTACHED GRID IS NOT INCLUDED ON TOP OF THE RESUME IT WILL BE DECLINED AND YOU WILL LOSE THAT SUBMITTAL SLOT.The grid is intended to be screening questions that your recruiter should ask while ...
read moreSupport the Government with the DoD Risk Management Framework (RMF) program and the Cybersecurity Inspection Program.
Demonstrated knowledge of security frameworks and standards such as PCI-DSS, ISO 27001, ISO 22301, NIST 800-53, NIST Cybersecurity Framework, CIS, and HIPAA.
Support the Government with the DoD Risk Management Framework (RMF) program and the Cybersecurity Inspection Program.
Support the Government with the DoD Risk Management Framework (RMF) program and the Cybersecurity Inspection Program.
Support the Government with the DoD Risk Management Framework (RMF) program and the Cybersecurity Inspection Program.
Experience providing technical PAM expertise IT management and staff in cybersecurity threat risk assessments, development, testing and the implementation and operation of appropriate information secu...
read moreExperience providing technical PAM expertise IT management and staff in cybersecurity threat risk assessments, development, testing and the implementation and operation of appropriate information secu...
read moreDevelop access management best practices as they relate to cybersecurity and compliance activities.
Develop access management best practices as they relate to cybersecurity and compliance activities.
Familiarity with cybersecurity best practices, security assessment methodology, vulnerability management, Cyber Kill Chain and MITRE ATT&CK. One year plus year of experience with cybersecurity operati...
read moreFamiliarity with common cybersecurity frameworks such as NIST and CIS. It has become necessary to solicit experienced cybersecurity analysts to assist the agency in developing, implementing, and manag...
read moreOne year plus year of experience with cybersecurity operations. One year plus of experience triaging technical support, research, investigation, and reviewing of system logs and events such as Windows...
read moreIt has become necessary to solicit experienced cybersecurity analysts to assist the agency in developing, implementing, and managing protective shields and ensuring compliance with cyber security poli...
read moreAgile Development Methodology experience;.Microsoft SQL Server experience;.Consult with Solution Architects, Solution Engineers, and others as appropriate to design applications in line with Client st...
read moreAgile Development Methodology experience;.Microsoft SQL Server experience;.Consult with Solution Architects, Solution Engineers, and others as appropriate to design applications in line with Client st...
read moreMaintain the Cybersecurity Framework.
Maintain the Cybersecurity Framework.
Entry Level Cyber Security Analyst New York, NY READ BEFORE YOU APPLY! Opportunity: Per Scholas is helping to source entry-level candidates for Cyber Security Analyst positions with our emp...
read moreAre you ready to safeguard the digital frontier?.You’ll have the opportunity to step into a pivotal role as a Cyber Security Analyst, defending against digital threats in the heart of Pinebrook, NJ.Le...
read moreAre you ready to safeguard the digital frontier?.You’ll have the opportunity to step into a pivotal role as a Cyber Security Analyst, defending against digital threats in the heart of Pinebrook, NJ.Le...
read more