Conduct risk assessments to identify potential cybersecurity threats and vulnerabilities. Provide recommendations for improving the organization's cybersecurity posture. Assist with compliance efforts...
read moreThe Application Offensive Security Consultant is responsible for providing technical direction and performing security assessments on applications. The person in this role should possess a good unders...
read moreLead and support customer demonstrations that showcase our unique value propositionScope and lead Proof of Value (PoV) projects for prospective customers and partners based on best practices to ensure...
read moreThe Application Offensive Security Consultant is responsible for providing technical direction and performing security assessment on applications. Being a member of the Application Security team, you ...
read moreConsultant - Chief Information Security Officer. Brief executive leadership regularly on current cybersecurity threats and challenges, and the status of the information security management system. Hed...
read morePerform security reviews and identify security gaps in security architecture, resulting in recommendations for inclusion into the risk mitigation strategy. The EITS Security Architect is part of the E...
read moreThe Principal Consultant will work directly with multiple customers and key stakeholders (Admins, C-Suite, etc) to drive the security priorities of the security operations management, security operati...
read moreSenior Network Security Consultant. Your role will include overseeing security policies, managing risk assessments, responding to security incidents, and maintaining compliance with industry standards...
read moreThe Application Offensive Security Consultant is responsible for providing technical direction and performing security assessment on applications. Being a member of the Application Security team, you ...
read moreThe consultant will play a key role in managing and responding to security incidents, ensuring fast and effective resolution, and coordinating actions to mitigate risks across the organization. Our cl...
read moreNetwork Security Consultant - Firewall/Proxy (L2 Level). Remediation of network security compliance reports generated daily, including the deviation of security standards configurations on a global sc...
read moreMonitor and analyze security incidents and trends. Assist with compliance efforts related to cybersecurity regulations (e. Stay up-to-date on the latest cybersecurity threats and trends.
In-depth knowledge of security event management, network security monitoring, investigating common types of attacks, network packet analysis, log collection and analysis, and reviewing security events...
read moreDGA Security: NYC's #1 Security Firm. For over 50 years, DGA Security has been the name trusted in security solutions for businesses across the country. Live Video Monitoring Sales Consultant - High E...
read moreThe Application Offensive Security Consultant is responsible for providing technical direction and performing security assessment on applications. The person in this role should possess good understan...
read moreDo you want to lead the development of planetary scale security solutions in the cloud? Are you excited to help customers automate security operations giving them unprecedented capability and agility?...
read moreAs a Senior OT Security Consultant, you will work on exciting projects across industries such as maritime, oil and gas, renewables, utilities, and more. Design and implement security strategies for SI...
read moreTechnical Presales Consulting & Solutioning: Durchführung von OT-Security Workshops, OT-Security Bid Advisory für strategische Deals, Erstellung einer OT-Security Solution Architecture und Bottom-up K...
read moreUnderstanding of the entire ecosystem of network security including well-rounded understanding of the information security domains and their inter-relations across that ecosystem. BYOD (Bring Your Own...
read moreUnderstanding of the entire ecosystem of network security including well-rounded understanding of the information security domains and their inter-relations across that ecosystem. Lead from front in r...
read more