Search Results: 5,075 vacancies
...maintain and continually improve our overall security strategy, including policy enforcement... ...strategically respond to any emerging cyber threats, minimizing potential business, financial... ...of organizational needs and risks
We are a company committed to creating...
Suggested
...provider of IT Solutions throughout the southeast is seeking a Cyber Security Analyst / Engineer to become an integral part of our team!
We are... ...security policies
Testing systems to locate potential risks and vulnerabilities
Reporting security statuses and incidents...
Suggested
...Innova Solutions is immediately hiring an Information Security Engineer with DLP
Position Type: Contract/Fulltime
Duration: 12+ Months
Position: Information Security Engineer with DLP
Location: Chandler AZ/Charlotte NC
Required...
Suggested
Hourly pay
Full time
Contract work
Temporary work
Work experience placement
Immediate start
Worldwide
Flexible hours
...A top financial client is seeking a Cyber Security Detection & Response Sr. Analyst to work a hybrid schedule in Charlotte, NC.
Responsibilities:
The... ...exercises.
Effectively communicate vulnerability details, risks, and potential impacts to, application owners,...
Suggested
Work experience placement
Shift work
...Cyber Security Engineer
Permanent Position
Charlotte, NC - Hybrid
The Cyber Security Engineer is responsible for assisting with the... ..., and penetration tests to identify and mitigate potential risks.
Design and implement security controls, configurations, and...
Suggested
Permanent employment
...Job Description
Job Description Role: Cyber Security Engineer
Duration: Long Term
Location: Charlotte, North Carolina
Comments... ...candidate will have a well-rounded application of cyber security risk management principles DLP operations regulatory requirements...
Suggested
...awareness of the latest critical information security vulnerabilities, threats, and exploits... ...~3+ years of experience in technology or cyber security
~ Mid-level knowledge of... ...preferred
~ Working knowledge of security risk oversight, CVSS (Common Vulnerability...
Suggested
Work experience placement
...friends, and family.
WHAT WE DO
Our Security and Compliance consultants work with... ...Compliance
Information Security
Risk Management
Data Privacy
The ideal candidate... .../Controls
Design and enablement of cyber controls functions and processes
Change...
Suggested
Permanent employment
...individuals protect their assets and manage risks.
Were also committed to making a... ...shielding the companys systems from security risks, while designing technology... ...Charlotte, NC or Reston, VA
The Sr. Cyber Investigations Analyst will provide expert-level...
Suggested
Relocation
Flexible hours
Title: SAP Security and Compliance Business Analyst
Location: Charlotte, NC-Hybrid
Duration: 6 month contract to hire
Compensation: $45-53/hour
Work... ...a strong understanding of SAP security concepts, risk management, and compliance best practices as well as a solid...
Suggested
Permanent employment
Contract work
Local area
Flexible hours
...Job Title: Cyber Threat Analyst
Job Location: 214 North Tryon, Charlotte NC
Zip Code: 28202
Top 3/5 Skills: DLP, PII, PIH, Cyber... ...to, Legal, Teammate Relations (Human Resources), Corporate Security, Incident Response, and Security Operations.
· Possess...
Suggested
Work experience placement
The Security Engineer will be an integral member of the CPI Security IT Operations and InfoSec Team. This role will lead security implementation... ..., and protected against unauthorized access and other security risks.
Identify vulnerabilities and potential threats, conduct...
Suggested
Work experience placement
Weekend work
...role in Charlotte, North Carolina, United States
Cyber Security Detection and Response Sr. Analyst.
Key skills:
** Understanding of command... ...written, detailed reports that describe vulnerabilities/risks and that provide specific remediation guidance.
Understanding...
Suggested
Shift work
...Job Description
Job Description In security risk management we're looking to harness the power of industry best practice combined with... ...resilience and robustness of all Ubuntu customers and users subject to cyber attacks. Additionally, the team collaborates with our...
Suggested
Holiday work
Local area
Remote job
Worldwide
...appliances.
Updates existing baseline documents annually or creates new baseline documents as required. Ensures baselines effectively secure key technologies by starting with CIS benchmarks and with subject matter experts to refine baselines.
Configures scans within...
Suggested
Work experience placement
...Job Description:
An Information Security Analyst I is a highly motivated and detail-oriented individual. As an Information Security Analyst I, you will be responsible for assisting in the monitoring and maintenance of security measures to protect our organization's...
Hourly pay
Temporary work
Work experience placement
Remote job
Flexible hours
Job Summary:
The Associate Security Analyst will play a vital role i n ensuring our clients... ....
1+ years' experience of cyber security principles, concepts and practices... ...security solutions and how they address client risk exposure and solve key use cases....
Flexible hours
...Officers (four-year degree required) or Cyber Warfare Engineers (four-year degree required... ...information Providing computer network risk mitigation and network vulnerability assessments... ...replacing cryptologic networks, physical security systems, electronic equipment, antennas,...
Full time
Work experience placement
Worldwide
Overseas
..., and financial well-being.
The Cyber Threat Resolution Analyst plays an essential role in the Cyber... ...resolving and mitigating cybersecurity risks to bank controls. They prioritize... ...integrates across Global Information Security, leveraging current risk assessments...
Full time
Shift work
Day shift
...Description Top Skills' Details
- 2- 3 years of information security administration and information security operations experience -... ...incident response, vulnerability management, host/network forensics, cyber-crime investigation, penetration testing, business continuity,...