Sort by
Date Posted
Locations
Years of Experience
Industries
Position Level
Company
Easy Apply only
Additionally, the Cyber Security Engineer II will perform security monitoring, security and data/logs analysis and forensic analysis to detect security incidents, and mounts rapid incident response. Y...
Posted 1w ago
• Less than 5 years exp. • Real Estate & Construction
Provide clients with cybersecurity and data privacy advice; independently manage a caseload of working cases from beginning to end; advising clients on response to cybersecurity and data privacy incid...
Posted Yesterday
• Less than 5 years exp. • Legal & Accounting
Collaborate with other teams within the organization to develop, document and recommend corrective action plans. Assessing the impact and scope of identified vulnerabilities...
Posted Yesterday
• Less than 5 years exp. • Technical Services
Applies innovative solutions to address insider threat risk through automated analytics and security awareness training.
Posted 1w ago
• Enterprise Technology
Identify and analyze potential threat activity targeting client networks via monitoring systems, alerts, vulnerabilities, SIEM tools and network traffic...
Posted 2w ago
• 5 - 7 years exp. • Energy & Utilities
Steers security operations and implementation of security controls and solutions ensuring the stable and secure operations of IT and related systems and components...
Posted 2w ago
• 5 - 7 years exp. • Healthcare
Assess information security tools to fight against cybercrime and respond to computer security breaches and viruses. Plan, Pursue, deliver, and management projects and engagement teams of professional...
Posted 1w ago
• 5 - 7 years exp. • Legal & Accounting
You maintain calmness and clarity of thought under pressure and ability to maintain confidentiality
Posted 2d ago
• 8 - 10 years exp. • Finance & Insurance
Manage technical projects, utilizing established project tools and methodologies, with minimal guidance. Develop and manage comprehensive project plans and associated project documents...
Posted 1w ago
• 5 - 7 years exp. • Finance & Insurance
Review and analyze log files from various sources such as SIEM, packet captures, and host logs to report any unusual or suspect activities.
Posted 2w ago
• 5 - 7 years exp. • Technical Services
Proactively seek new business opportunities in the market, as well as upsell and cross-sell of existing clients; proactively plan, set critical milestones, asses, clarify and validate partners needs o...
Posted 2w ago
• 8 - 10 years exp. • Information Technology
Responsible for, including hands on, in regards to all firewalls, data encryption and all other security products, services and procedures.
Posted Yesterday
• 11 - 15 years exp. • Business Services
Advise clients on the security implications of compliance and regulations such as OSFI, ISO, NIST, PCI, PIPEDA, GDPR etc. Carry out threat and risk assessments (TRAs) and develop security architecture...
Posted 1w ago
• 8 - 10 years exp. • Technical Services
Provide direction and support for the secure operation of the enterprise level network, focusing on security devices, security controls, and security monitoring systems...
Posted 5d ago
• Staffing
Supported by our strategic alliances with third-party vendors, our experienced professionals can provide broad services including: strategy, assessment, testing, and implementation of IAM solutions...
Posted 1w ago
• 5 - 7 years exp. • Legal & Accounting
Supported by our strategic alliances with third-party vendors, our experienced professionals can provide broad services including: strategy, assessment, testing, and implementation of IAM solutions...
Posted 1w ago
• Less than 5 years exp. • Legal & Accounting
Penetration testing, networks, infrastructure, secure software development lifecycle, vulnerability assessments and remediation. Work with Infrastructure engineering teams throughout the SSDL to ensur...
Posted Yesterday
• Enterprise Technology
Prioritize events using existing tools to correlate data for the purpose of reducing false positives and detecting threats. Develop, deploy, and operate security mechanisms within our AWS infrastructu...
Posted Yesterday
• Finance & Insurance
Collaborate with other CyberArk departments to ensure coordination and completion of all additional implementation-related tasks.
Posted Today
• Less than 5 years exp. • Information Technology
Ideal candidates for this position are software engineers with strong knowledge and hands-on experience in embedded systems and computer security.
Posted Yesterday
• Telecommunications & Hardware
Supervise and lead the design and implementation of security solutions and detection logic, ensuring adequate support for threat prevention & detection, vulnerability management, incident response, an...
Posted 2d ago
• 11 - 15 years exp. • Finance & Insurance
Technical understanding of a range of enterprise IT and cloud-based architectures and technologies such as networking, server infrastructure, operating systems, web applications, databases, containeri...
Posted 3w ago
• Less than 5 years exp. • Business Services
Assist customers with developing, managing, and executing project plans and timelines. Help maintain customer relationships and identify opportunities for growth...
Posted 1w ago
• Less than 5 years exp. • Information Technology
Validate internal, external and crowd-sourced application security findings and articulate them to studio engineering teams. Help maintain security engineering infrastructure services and custom tooli...
Posted 2w ago
• Media
Technical expert supporting the design and implementation and integration with Security Analytics solutions of multiple data sources; work with partners to obtain and translate requirements into tech...
Posted 6d ago
• 5 - 7 years exp. • Finance & Insurance