Sort by
Date Posted
Locations
Years of Experience
Industries
Position Level
Company
Easy Apply only
$90K
$125K
CyberArk EPM Policy management including policy creation, updates and deletion, support and maintenance.
Posted 1w ago
• 5 - 7 years exp. • Healthcare
Deliver comprehensive reports including assessment-based findings, outcomes and propositions for further system security enhancement; daily administrative tasks, reporting and communication with the r...
Posted 1w ago
• Less than 5 years exp. • Business Services
Implements and administers information security controls using software and vendor security systems.
Posted 1w ago
• 5 - 7 years exp. • Technical Services
• Evaluate and implement security plans, Program briefings. Review, interpret and maintain Security Classification Guides and Program Protection Plans...
Posted 5d ago
• 5 - 7 years exp. • Aerospace & Defense
Identify, implement, and improve current processes to support the Identity Access Governance program including controls, data quality, security risk reduction, and regulatory compliance; identify and...
Posted 1w ago
• Less than 5 years exp. • Finance & Insurance
Ongoing support of the GRC System, including report/dashboard creation, user administration, workflow development, etc. Create automated processes wherever possible to mature the GRC programs and supp...
Posted 2w ago
• 8 - 10 years exp. • Retail & Consumer Goods
Recommends and implements security policies, procedures, standards and technologies for current and future processes and systems.
Posted 2w ago
• 5 - 7 years exp. • Education, Government & Non-Profit
Conduct link analysis of technical data using software tools to identify trends in attacks, targeting, and timing of suspicious/malicious activity.
Posted 1w ago
• 5 - 7 years exp. • Information Technology
Participates in Information Security incident response and is responsible for root cause analysis and reporting. Provides detailed recommendations for future risk mitigation of similar incidents. Repo...
Posted 4w ago
• 5 - 7 years exp. • Education, Government & Non-Profit
The Clinical Asset Defense Engineer (CADE) will identify improvements in medical device risk management in the day-to-day operations of security processes and standards as needed within medical device...
Posted more than 4w ago
• 5 - 7 years exp. • Hospitals & Medical Centers
Work closely with threat intelligence and investigation analysts to implement detection for the knowledge and information shared about current and changing threat landscapes...
Posted more than 4w ago
• 5 - 7 years exp. • Technical Services
You will be a guide and mentor to development teams, educating developers and development support on secure best practices
Posted more than 4w ago
• 5 - 7 years exp. • Finance & Insurance
Develop and debug complex code and conduct code reviews in alignment with best practices. Engineer and develop standard data analytic service offerings to drive risk reduction across the enterprise...
Posted more than 4w ago
• Less than 5 years exp. • Finance & Insurance
Perform information security functions in support of credit union operations.
Posted more than 4w ago
• Less than 5 years exp. • Finance & Insurance
Manage the Data Loss Prevention (DLP) Program, coordinate the remediation efforts, generate reports and provide metrics on the effectiveness of the DLP program...
Posted more than 4w ago
• 5 - 7 years exp. • Finance & Insurance
Provide direction, develop standards, and initiate processes related to identity and access management.
Posted more than 4w ago
• 5 - 7 years exp. • Finance & Insurance
Lead the implementation and development process for the Identify and access Management (IAM) program with a security focus.
Posted more than 4w ago
• 5 - 7 years exp. • Finance & Insurance
Report suspected security violations, threats or inappropriate network actions, in accordance with established response procedures.
Posted more than 4w ago
• Less than 5 years exp. • Finance & Insurance
A strong cybersecurity and engineering background that includes endpoint accountability and security, email security, identity and access management (IAM), privileged access management (PAM), Insider...
Posted 2w ago
• 5 - 7 years exp. • Consumer Technology
EASY APPLY
Plan, organize and lead efforts to document business requirements for enterprise business application integration or service activation in the context of Network Security ensuring documentation is com...
Posted 3w ago
• 8 - 10 years exp. • Business Services
Help shape and build cloud and infrastructure practice through collaboration with business development, marketing, and capabilities development teams. Ensure and build the controls and processes for c...
Posted 2w ago
• Technical Services
Provide analysis on classified and open source intelligence reports for information on foreign and/or domestic threats, recommended mitigations, and provide threat indicators for events directed at IC...
Posted 1w ago
• Less than 5 years exp. • Information Technology
Implement various information security controls to accomplish full incident containment, and mitigation.
Posted 2w ago
• 5 - 7 years exp. • Consumer Technology
Provide situational awareness on the current threatlandscape and the techniques, tactics and procedures associated with specific threats.
Posted 4w ago
• 5 - 7 years exp. • Staffing
An Information Security Engineer supports information security functions across the enterprise. Interacts closely with customers, software developers.
Posted more than 4w ago
• Less than 5 years exp. • Education, Government & Non-Profit