Average salary: $194,840 /yearly
More statsGet new jobs by email
$165,000 per week
At Lockheed Martin, a global leader in security and aerospace, we are seeking a Cyber Software Engineer Staff to join our pioneering IT and Cybersecurity team. This role focuses on creating and sustaining secure software solutions that meet our high standards of excellence...Cyber- Role Descriptions: Privileged Access Management using CyberArk On-Prem solutionsHands-on expertise with CyberArk components including PVWA| CPM| and PSMAuthentication SSO| MFA| SAML| OAuth| OIDC| certificate-based authentication. Essential Skills: Privileged Access ...Cyber
- Role: Cyber Security Location: Little Ferry, NJ Cyber security, Firewall configuration, vulnerabilities management and Tenable. OT installation & Configuration , Experience on Bitdefender or similar Tool for Application white -listingCyber
- ...Herndon, VA. This role is critical for designing, developing, and analyzing low-level Windows components to support national security and cyber defense missions. Key Responsibilities: Design and implement software components in the Windows kernel space. Perform...Cyber
- ...This role is responsible for proactively identifying, assessing, mitigating, and reporting cyber risks across the organization, with a strong emphasis on influencing stakeholders at all levels. As a senior position, it requires the ability to effectively engage with senior...Cyber
- ...Job Role: Cyber Security Tester with Adroid/Iphone Mobile Testing Experience Location: Andover, Massachesetts Onsite Skills Must To Have- Android App Penetration Testing, Owasp, Burpsuite, Mobsf, Vulnerability Assessment. JDs; ~5 years of...Cyber
- ...Job Title: Cyber Security with Penetration Testing Exp// Penetration Tester with Security Experience Job Location: Austin, TX Job Duration: Fulltime Client: Apple Top Skills: Penetration Testing Basic Java Coding Security Experience...CyberFull time
- Type: Full-TimeLocation: Washington, DCOvertime Exempt: ExemptReports To: ARMADA HQCONTINGENT UPON AWARDDuties & Responsibilities:Implements and maintains cybersecurity measures to protect systems and data.Monitors systems for security breaches and vuln...Cyber
- Cyber Security Audit And Risk Management Specialist The client is seeking a skilled and experienced Cyber Security Audit, and Risk Management Specialist with specific experience in the airline industry.Cyber
- ...Hi Professionals, Hope you are doing good This is Jayaraman from Info Way Solutions, LLC We have job opening for PM with Cyber Security / Cryptograhy experience and the detailed Job description is given below: Kindly check the JD and share your views Job...Cyber
- ...Position Title * CYBER SECURITY BA Position Responsibilities 2 DAYS ON SITE IN CHANTILLY VA MUST HAVE EXPEREINCE WITH BIG ID Maintenance and update of RegEx classifiers as needed to align with business needs Detailed workflow integration requirements between...Cyber
- ...Role: Tech PM with Cyber Security Location: Tampa, FL Exp: 10 & Above Description We are seeking a skilled professional with expertise in CIAM, SIEM, and cybersecurity to support security initiatives and project governance. The role involves coordinating...Cyber
- ...Role Summary: The Cyber Security Technician is responsible for implementing and maintaining security measures to protect the organization's systems and data. This role involves monitoring security systems, responding to incidents, and ensuring compliance...Cyber
- ...Position- Cyber Security Duration-Contract Location- Pittsburgh,P JD Candidate should be very good hands on experience on Jump Box Cyber Security 4-6 Years Regards, Pallavi Verma Sr. Technical Recruiter | Syntricate...CyberContract workImmediate start
- ...Lansing, MI Duties: Apply cybersecurity policies during exercises. Develop and maintain knowledge management tools. Support cyber defense readiness and secure data handling. Create briefings and exercise documentation. Qualifications: Familiarity...Cyber
- ...Job Title: Cyber Security Consultant Location: Downey, CA Duration: 9 Months Minimum Skills : The Consultants must meet all the following minimum qualifications: 1.One (1) year of experience within the last two (2) years responding...Cyber
- ...growing startup working at the intersection of cybersecurity and insurance. The Axio360 platform is a decision-making engine for holistic cyber risk management, including cybersecurity assessments, cyber risk quantification (CRQ), and cyber insurance analysis. Axio enables...Cyber
- ...Role Summary: The Cyber Security Engineer is responsible for developing and implementing security measures to protect the company's systems and data. Main Responsibilities and duties: Develop and implement security measures. Conduct security...Cyber
- ...Position: Cyber Security, Microsoft Sentinel Location: New Jersey, NJ (Onsite) Duration: C2C Contract Experience: 8*+ Years Job Description: • Management of Sentinel Platform monitoring and platform support of Microsoft Sentinel SIEM Administer •...CyberContract workImmediate start
- ...programs. This is not managing technology. Do not send me people who are implementing cybersecurity tools. This person will be managing cyber programs. This person will need to have strong communication skills to present the status of the programs and at times represent the...Cyber
- ...a wide range of programs and services. Our Eastern Territorial Headquarters' Information Technology Department has an opening for a Cyber Incident Manager. This position will lead the response to cyber incidents, ensuring they are handled promptly and efficiently to minimize...CyberFull timeRemote work
- ...cybersecurity projects/critical work efforts. o Understand the problem statement and clearly frame up the solution in partnership with Cyber SMEs. o lign issues and remediation plans accordingly. o Create project charter, build out a comprehensive project plan and...CyberWork at office
- Job Description Job Description Direct Counsel is representing an AmLaw 100 law firm is seeking a Litigation Associate to join its Privacy & Cybersecurity Practice Group . The firm represents leading global clients across industries in data privacy , cybersecurity...Cyber
- ...Cyber Security Engineer (location: Herndon, VA) TS/SCI with adjudicated CI poly required prior to start Must have DoD 8570/8140 approved certification such as CompTIA Security+, ISC2 CISSP, or equivalent Identify vulnerabilities and provide analysis, guidance,...Cyber
- ...Role Summary: The Cyber Security Administrator is responsible for managing and maintaining the organization's security infrastructure. This role involves configuring security systems, monitoring network traffic, and ensuring the overall security of the organization...Cyber
- ...and sustainment. Oversee ACAS scanning and remediation. Lead Zero Trust implementation. Manage incident handling and COOP/DR cyber readiness. Core Competencies: Cybersecurity program management | Risk & vulnerability assessment | Compliance & accreditation |...Cyber
- ...Cyber Threat Analyst Principal Responsibilities: Utilize threat intelligence platforms such as VirusTotal, AlienVault OTX, Recorded Future, and ThreatConnect Analyze and assess emerging cyber threats to provide actionable intelligence Contribute to...Cyber
- Job Description: The candidate shall have experienced with conducting Risk Assessments using industry standard Risk frameworks like NIST CSF, IEC 62443 3-2, etc., With a responsibility as needed per the project context. Cybersecurity context, and Cybersecurity Risk...Cyber
- ...Cybersecurity Digital Forensics and Incident Response (DFIR) team is responsible for defending critical financial infrastructure from Global Cyber threats. We leverage an evolving arsenal of controls that require technical proficiency as well as tenacity, professionalism, and...Cyber
- ...Cyber security project engineer skilled in supporting Information Assurance, Certification & Accreditation and Assessment & Authorization activities. You will successfully guide the team through the security process coordinating and tracking risks, generating security...Cyber



