Get new jobs by email
- ...Role: SOC Analysts Location: Tempe, AZ (Onsite) Type: Contract Job Description: Our Clients' Global Security Operations Center (GSOC) is seeking experienced SOC Analysts to support Tier 1 and Tier 2 operations during U.S. daytime hours. This position...SuggestedContract workAfternoon shift
- ...We are seeking experienced SOC Analysts (Tier 1 / Tier 2) to join our client's Global Security Operations Center (GSOC) . This role supports cybersecurity operations aligned with U.S. daytime hours while collaborating closely with teams supporting the Japanese business...Suggested
- ...Entra ID, Okta, Tenable, Purview, Varonis, AI solutions and related security monitoring, SCORM 2.0 Knowledge of NIST 800-171 / CMMC SOC / security operations experience Preferred certifications: SC-200, CISSP Past Performance Support during IT...SuggestedPermanent employmentFull timeTemporary workFor contractorsRemote work
- ...scanners) Strong understanding of GRC processes, including risk assessments, audits, and compliance frameworks (ISO 27001, NIST, SOX, SOC 2) Experience with automation (Python/Ansible), troubleshooting, and managing security tools in enterprise environments Nice...Suggested
- ...Splunk SOAR (formerly Phantom) and security automation/orchestration workflows. Background in detection engineering, threat hunting, or SOC operations. Additional certifications such as CISSP, GIAC (GCIA, GCIH), or cloud security credentials (AWS Security Specialty, AZ-500...Suggested
- ...principles including Segregation of Duties (SoD), auditability, certification processes, and evidence capture. Ensure integrations meet SOX, SOC, internal audit, and enterprise security standards. Create documentation supporting audit readiness design documents, test evidence,...Suggested
- ...ensuring clarity, alignment, and timely decision making. Compliance, Governance & Reporting: Ensure IAM program alignment with SOX, SOC 2, HIPAA, and internal security governance requirements. Provide structured updates to leadership using Agile dashboards, progress...Suggested
- ...Design AI governance frameworks aligned to enterprise risk management and regulatory requirements (e.g., EU AI Act, NIST AI RMF, SOC 2) Integrate watsonx.governance with third-party model registries, MLOps pipelines, and enterprise data platforms Build automated...SuggestedOdd jobContract workRemote work
$69 - $74 per hour
..., telemetry coverage, and log source onboarding needs to enhance detection capabilities. Collaborate strategically with engineering, SOC, platform, and infrastructure teams. Develop metrics, dashboards, and feedback loops supporting continuous detection quality improvement...SuggestedHourly pay- ...Knowledge of scripting or automation tools such as PowerShell or Python (preferred). ~ Familiarity with compliance standards such as SOC 2, ISO 27001, or PCI (preferred). ~ Experience building dashboards and reports in Tableau or similar BI tools (preferred). ~...SuggestedHourly pay
- ...vulnerability management, identity protection, logging/analytics, and related systems). Manage security partners including a managed SOC and other third-party security service providers: define outcomes, SLAs, escalation paths, and service quality expectations....Suggested
- ...Cisco FMC, SIEM platforms, and packet capture utilities. Investigate and remediate network based security incidents, coordinating with SOC or incident response teams as necessary. Perform security event correlation and escalation following established SOPs....SuggestedWork at officeImmediate startRemote workShift workWeekend work
- ...walkthroughs and testing. Maintain the control library and policies, ensuring alignment with frameworks such as ISO 27001, NIST, SOX, and SOC 2, as applicable. Prepare reports and dashboards for leadership, manage metrics, and support governance forums. Coordinate with...SuggestedContract workLocal area
- ...principles including Segregation of Duties (SoD), auditability, certification processes, and evidence capture. Ensure integrations meet SOX, SOC, internal audit, and enterprise security standards. Create documentation supporting audit readiness design documents, test evidence,...Suggested
- ...management, Microsoft Entra Must be knowledgeable related to various security frameworks, compliance, and regulations including NIST, GDPR, SOC reports etc. Experience working with Microsoft Azure, AWS, hybrid, and multi-cloud systems Very good understanding of data security...SuggestedWork experience placement
- ...application control. Monitor, analyze, triage, and remediate security alerts from MDR and SIEM platforms, escalating to managed SOC partners as needed. Administer and maintain security tooling, including EDR/XDR platforms, vulnerability scanners, email and DNS...Contract workWork at officeRemote work
- ...monitor cloud configurations and prevent/detect malicious behavior. Align controls with applicable compliance frameworks (CIS, NIST, SOC 2, ISO 27001, etc.) SaaS Security Define and maintain SaaS security standards and reference architectures, integrated...Contract work
- ...Implement and manage security tools such as SIEM, CSPM, and endpoint protection Ensure compliance with industry standards (ISO 27001, SOC 2, GDPR, etc.) Collaborate with DevOps and engineering teams to integrate security into CI/CD pipelines (DevSecOps) Respond...Remote work
- ...rail. The role bridges Security Engineering, Blockchain Engineering, and Compliance, ensuring that key management infrastructure meets SOC 2 Type 2, PCI DSS, ISO 27001, and C4 CCSS QSP Level 3 certification standards while sustaining 100K+ TPS throughput with sub-second...Local areaRemote work
$60 - $70 per hour
...rules. ~ Demonstrated ability to troubleshoot complex endpoint policy issues across Windows and macOS. ~ Familiarity with HIPAA, SOC 2, PCI DSS, or similar compliance frameworks in an endpoint security context. ~ Comfortable working in a fast-paced environment...Hourly payContract workRemote workShift work- ...Job Summary We are seeking a SOC Specialist (Bilingual Japanese/English) to support cybersecurity operations by monitoring, detecting, and responding to security threats across multiple environments. The ideal candidate will conduct threat analysis, incident response,...