INFORMATION SECURITY ARCHITECTURE : Design and architect enterprise security.Develop and maintain an aspirational architectural road map for the enterprise.Communicate architectural designs, plans, go...
read moreAn established financial institution is seeking an experienced Cyber Security Business Analyst who can demonstrate strong analytical, problem-solving and communication skills.You will be a great fit i...
read moreAn established financial institution is seeking an experienced Cyber Security Business Analyst who can demonstrate strong analytical, problem-solving and communication skills.You will be a great fit i...
read moreINFORMATION SECURITY ARCHITECTURE : Design and architect enterprise security.Develop and maintain an aspirational architectural road map for the enterprise.Communicate architectural designs, plans, go...
read moreYou will bring your passion for Cybersecurity to a team of dedicated professionals and leverage this passion to ensure our vulnerability remediation activities are effective and efficient and that we ...
read moreYou will bring your passion for Cybersecurity to a team of dedicated professionals and leverage this passion to ensure our vulnerability remediation activities are effective and efficient and that we ...
read moreIn a very hands-on capacity you will responsible for the support and administration of several core network security tools.There is the possibility of converting to full-time after 6-9 months.You will...
read moreIn a very hands-on capacity you will responsible for the support and administration of several core network security tools.There is the possibility of converting to full-time after 6-9 months.You will...
read moreCybersecurity risk and issue management, information analysis, familiarity with tools such as JIRA and Service Now, core cybersecurity domains such as identity and access management, vulnerability man...
read moreArootah is searching for experienced Cybersecurity Analysts to consult to our highly prestigious client base. Having previously served in this role, you have specific, hands-on experience implementing...
read moreArootah is searching for experienced Cybersecurity Analysts to consult to our highly prestigious client base. Having previously served in this role, you have specific, hands-on experience implementing...
read moreOne of our telecommunication clients is looking to hire a Cybersecurity Auditor with experience in the public sector compliance sector. You will be responsible for conducting cybersecurity audits and ...
read moreOne of our telecommunication clients is looking to hire a Cybersecurity Auditor with experience in the public sector compliance sector. The ideal candidate will have a strong understanding of cybersec...
read moreThis Senior Information Security Analyst role will be responsible assessing implementing the information security governance, risk, and compliance program.The individual will write and maintaining aud...
read moreThis Senior Information Security Analyst role will be responsible assessing implementing the information security governance, risk, and compliance program.The individual will write and maintaining aud...
read morePrimary responsibilities will include assessing Cybersecurity, Business Continuity controls for S&P third parties by conducting control risk assessments, risk recertifications, and continuously monito...
read morePrimary responsibilities will include assessing Cybersecurity, Business Continuity controls for S&P third parties by conducting control risk assessments, risk recertifications, and continuously monito...
read moreUnder the direction of the Executive Director Infrastructure, the Cyber Security Analyst Level II will assist with implementing cybersecurity polices, standards, directives, and guidelines that draws ...
read moreThis cybersecurity role requires excellent communication skills, creativity, strong technical background, and familiarity with tradition and emerging security technologies and practices. The activitie...
read moreIF THE ATTACHED GRID IS NOT INCLUDED ON TOP OF THE RESUME IT WILL BE DECLINED AND YOU WILL LOSE THAT SUBMITTAL SLOT.The grid is intended to be screening questions that your recruiter should ask while ...
read moreSupport the Government with the DoD Risk Management Framework (RMF) program and the Cybersecurity Inspection Program.
Demonstrated knowledge of security frameworks and standards such as PCI-DSS, ISO 27001, ISO 22301, NIST 800-53, NIST Cybersecurity Framework, CIS, and HIPAA.
Support the Government with the DoD Risk Management Framework (RMF) program and the Cybersecurity Inspection Program.
Support the Government with the DoD Risk Management Framework (RMF) program and the Cybersecurity Inspection Program.
Demonstrated knowledge of security frameworks and standards such as PCI-DSS, ISO 27001, ISO 22301, NIST 800-53, NIST Cybersecurity Framework, CIS, and HIPAA.
Support the Government with the DoD Risk Management Framework (RMF) program and the Cybersecurity Inspection Program.
Experience providing technical PAM expertise IT management and staff in cybersecurity threat risk assessments, development, testing and the implementation and operation of appropriate information secu...
read moreExperience providing technical PAM expertise IT management and staff in cybersecurity threat risk assessments, development, testing and the implementation and operation of appropriate information secu...
read moreDevelop access management best practices as they relate to cybersecurity and compliance activities.
Develop access management best practices as they relate to cybersecurity and compliance activities.
Familiarity with common cybersecurity frameworks such as NIST and CIS. It has become necessary to solicit experienced cybersecurity analysts to assist the agency in developing, implementing, and manag...
read moreIt has become necessary to solicit experienced cybersecurity analysts to assist the agency in developing, implementing, and managing protective shields and ensuring compliance with cyber security poli...
read moreOne year plus year of experience with cybersecurity operations. One year plus of experience triaging technical support, research, investigation, and reviewing of system logs and events such as Windows...
read moreOne year plus year of experience with cybersecurity operations. One year plus of experience triaging technical support, research, investigation, and reviewing of system logs and events such as Windows...
read moreAgile Development Methodology experience;.Microsoft SQL Server experience;.Consult with Solution Architects, Solution Engineers, and others as appropriate to design applications in line with Client st...
read moreAgile Development Methodology experience;.Microsoft SQL Server experience;.Consult with Solution Architects, Solution Engineers, and others as appropriate to design applications in line with Client st...
read moreMaintain the Cybersecurity Framework.
Maintain the Cybersecurity Framework.
Are you ready to safeguard the digital frontier?.You’ll have the opportunity to step into a pivotal role as a Cyber Security Analyst, defending against digital threats in the heart of Pinebrook, NJ.Le...
read moreAre you ready to safeguard the digital frontier?.You’ll have the opportunity to step into a pivotal role as a Cyber Security Analyst, defending against digital threats in the heart of Pinebrook, NJ.Le...
read more