Search Results: 9,079 vacancies
...and Data Science seeks a non-tenure-track lecturer to begin August 2019. This faculty member will teach courses in the cyber and information security programs and in the computer science core. Primary responsibility is to teach and develop undergraduate and graduate courses...
Suggested
Full time
...forward-thinking team in an engaging, fast-paced environment. As a Cyber Incident Response Analyst, you will play a critical role in... ...assets.
Duties
Perform real-time monitoring and triage of security alerts in Cybersecurity toolsets including SIEM, and EDR
Make...
Suggested
Work experience placement
The Technology Manager: Cyber Risk & Secure Configuration has a targeted focus in their oversight and active supervision for a Technology operational team(s) and most often reports directly to a Technology Manager or Director.Essential Job Functions:Develops and manages...
Suggested
Holiday work
Full time
Temporary work
For contractors
Work experience placement
For subcontractor
Local area
Immediate start
Description
# Home
# Search Jobs
# Job Description
IT Cyber Security Specialist
Contract: Chicago, Illinois, US
Salary: $70.00 Per Hour
Job Code: 347250
End Date: 2024-05-10
Days Left: 6 days, 3 hours left
Apply
About the Role...
Suggested
Hourly pay
Contract work
Center 3 (19075), United States of America, McLean, Virginia
Senior Manager, Cyber Security Product Owner
Capital One is seeking a technical security product owner to deliver game-changing endpoint security solutions based on threat, data, and design thinking....
Suggested
Full time
Part time
Local area
...Opportunity
Hyatt seeks an enthusiastic Senior Analyst, Cyber Security - Vulnerability Management to join our cyber security... ...vulnerability scanning tools and related software.
•Incident Response
oProvide expertise during security incidents...
Suggested
Remote job
Flexible hours
...Officers (four-year degree required) or Cyber Warfare Engineers (four-year degree required... ...network vulnerability assessments and incident response/reconstruction Providing network... ...replacing cryptologic networks, physical security systems, electronic equipment, antennas,...
Suggested
Full time
Work experience placement
Worldwide
Overseas
Center 3 (19075), United States of America, McLean, Virginia
Manager, Cyber Technical Product Owner (Host and Endpoint Security)
Capital One is seeking a product owner to help deliver game-changing cybersecurity solutions based on threat, data, and design thinking...
Suggested
Full time
Part time
Local area
...Sentinel, Defender for Endpoint, Defender for Cloud Applications, Defender for Office and Defender for Cloud
Performing incident response on security events
Performing threat hunting activities and creating new detections and protections based on the results of those...
Suggested
...An Asset Management firm is seeking a SR. Cyber Security Engineer . This role will focus on planning, designing and executing security... ...will include managing the Microsoft Defender Security Suite, incident response, threat hunting, improvements to our detection and protection...
Suggested
...celebrated.
Are you ready to dive into the dynamic world of Cyber Security? We're on the lookout for a passionate Cyber Security Risk... ...data loss prevention program.
Actively participate in incident response simulations, penetration testing, and compliance activities...
Suggested
...Job Description
We have an outstanding opportunity for a Manager - IT Service Delivery Management - Incident Management at Kraft Heinz. Join our globally recognized organization as we disrupt the food industry and drive innovation. As a Manager, you will play a key...
Suggested
Local area
Posting Description :
US Broking Sr. Cyber Security Consultant/Sr. Cyber Risk Engineer
This will be a hybrid-remote role based out... ...management, security program governance, vulnerability management, incident response, and infrastructure support.
~ Previous hands-on...
Suggested
Holiday work
Full time
Temporary work
Part time
Work experience placement
Local area
Remote job
...procedures
Demonstrated ability of establishing and maintaining metrics-based process improvement
Technical working knowledge of security tools and concepts including IDS/IPS; SIEM; Web Proxy, Encryption, Endpoint Security, Patch management, Vulnerability Scanning &...
Suggested
...Creek 5 (12075), United States of America, Richmond, Virginia
Cyber Security Distinguished Engineer- Cryptography (Remote Eligible)... ...infrastructure, and host/endpoint), intrusion detection and incident response, network traffic analysis, scripting languages, software...
Suggested
Full time
Part time
Local area
Remote job
West Creek 2 (12072), United States of America, Richmond, Virginia
Director, Machine Learning Cyber Engineer
Cyber security is one of the biggest threats of our day. In this role, you will have the opportunity to do work that protects our company and our customers...
Full time
Temporary work
Part time
Local area
...The role of Manager, NOC Escalation & Incident is a pivotal role in ensuring the effective... ...cross-functional teams, including IT, security, and business units, to align incident management... ...networks, and related systems.
Respond promptly to network incidents, outages,...
Full time
Remote job
Flexible hours
Shift work
Night shift
...of Cryptologic Warfare Officers (four-year degree required) or Cyber Warfare Engineers (four-year degree required).
Training & Advancement... ...for a Top Secret/Sensitive Compartmented Information security clearance. Normal hearing is also required.
They should...
Temporary work
Part time
Work experience placement
Worldwide
Overseas
Weekend work
...looking for friendly and experienced folks to join our in-house Security Team.
As a venue, we strive to be #1 in Safety and... ...timely manner
Work with House team to write reports of major incidents witnessed during event to assist management in thorough record...
Outdoor
Flexible hours
...Position Summary:
The IT Security Engineer is responsible for the... ...report on potential security incidents.
He or she will... ...posture relative to the evolving cyber threat landscape and design,... ...practices
Investigate and respond to email phishing alert reports...
Hourly pay