Average salary: $58,939 /yearly
More statsSearch Results: 16 vacancies
...basis. (Note: No supplies may be purchased unless directed by the Arts & Events Assistant
Responsible for all communication between actors, manage conflict among volunteers and/or staff; enforce safety and program rules, policies, and regulations.
Provide a safe...
Suggested
Hourly pay
Part time
For contractors
Flexible hours
Shift work
...responding to cyber security events, while developing automations that enable efficient and timely responses to mitigate malicious actors.
The Network Detection and Response (NDR) team is responsible for defending the organization's Internet facing networks and applications...
Suggested
Permanent employment
Contract work
3 days per week
...Penetration Testing Prowess: Conduct internal penetration tests to proactively discover and exploit vulnerabilities before malicious actors.
~Container Security Guru: Delve into the workings of containerized applications, understanding their security implications and...
Suggested
Full time
Immediate start
Remote job
...into critical security controls and architectural specifics to develop adequately track, analyze, and defend against cyber threat actors. This role will be a thought leader in the design of cutting-edge detective, preventative, and proactive controls.
Required Skills...
Suggested
Full time
Shift work
Day shift
...procedures associated with malicious insider activity, organized crime/fraud groups, and both state and non-state sponsored threat actors
~ Ability to translate offensive security work to actionable defensive guidance
~ Experience with offensive security and vulnerability...
Suggested
Full time
Shift work
Day shift
...and international access. Segregation and protection of the data on each of these networks is critical in this world of malicious actors with ever-increasing capability.
This position will report to Austin Cooner, Manager – US Systems Engineering.
The role will...
Suggested
Local area
Worldwide
Relocation package
Flexible hours
...you!
Are you
The life of the party?
Frequently found at the kid's table (which is the best place to be anyway)?
A dancer, actor, singer, or athlete?
Outgoing, upbeat, and positive?
Someone who takes direction well?
Interested in a flexible weekday schedule...
Suggested
Hourly pay
Holiday work
Currently hiring
Flexible hours
Day shift
Weekday work
...into critical security controls and architectural specifics to develop adequately track, analyze, and defend against cyber threat actors. This role will be a thought leader in the design of cutting-edge detective, preventative, and proactive controls.
Required Skills...
Suggested
Full time
Remote job
Shift work
Day shift
...taken into account within what VirTra does. Training scenarios are filmed in superior quality and contain the full fidelity of real actors—thus eliminating ‘video game’ training. VirTra’s extensive branching options further increase the realism by allowing scenarios to...
Suggested
Traineeship
Worldwide
Home office
...threat research, and cyber defense control teams to identify opportunities to develop analytical methods to detect advanced threat actors who utilize emerging tactics and techniques. In support of these processes, the role will also include developing and documenting new...
Suggested
Full time
Shift work
Day shift
...Enterprise Role Overview:
Analyzes, improves, implements, and executes security controls proactively to prevent external threat actors from infiltrating company information or systems. Researches more advanced and complex attempts/efforts to compromise security protocols...
Suggested
Full time
Work experience placement
Shift work
Day shift
...based controls’ (e.g. firewalls, routers) architecture and engineering as well as have working knowledge of vulnerabilities and threat actors Tactics, techniques and Procedures. The right candidate will be able to effectively communicate to senior Leaders and non-technical...
Suggested
Full time
Work experience placement
Shift work
Day shift
...procedures associated with malicious insider activity, organized crime/fraud groups and both state and non-state sponsored threat actors.
~ Must be able to critically examine an organization and system through the perspective of a threat actor and articulate risk in...
Suggested
Full time
Shift work
Day shift
...and response functions so those functions can practice and improve their capability to respond and recover against a realistic threat actor.
Required Skills:
• Must be able to critically examine an organization and system through the perspective of a threat actor...
Suggested
Full time
Remote job
Shift work
Day shift
...leveraging industry standard baselines to identify potential ransomware and malware vulnerabilities that could be exploited by a threat actor. Ideal candidates will possess both a broad information security background and strong communications and interpersonal skills to...
Suggested
Full time
Shift work
Day shift
...data normalization tools
• Must be able to critically examine an organization and application through the perspective of a threat actor and articulate risk in clear, precise terms to technical and non-technical audience.
Desired Skills
• Leveraging NIST SP-8...
Full time
Shift work
Day shift