Average salary: $114,611 /yearly
More statsGet new jobs by email
$76.4k - $138.6k
...innovative, secure solutions that provide speed to market and business value. The opportunity As an Offensive Security Analyst on the Vulnerability Management team, you will play a supporting role in the meticulous evaluation and management of EY's digital exposure,...SuggestedSummer holidayLocal areaFlexible hours- ...Responsibilities Kforce has a client that is seeking a Vulnerability Management Business Analyst in Juno Beach, FL.Summary:This person will help connect business needs with technical security teams, making sure vulnerabilities are identified, tracked, and fixed. You...SuggestedHourly payContract work
- ...Program within Bank of America's Cyber Security Assurance Offensive Security group. The program provides services to assess the vulnerability of the bank's applications to malicious hacking activity. This intermediate technical role is responsible for performing application...SuggestedWork at officeShift workDay shift
- ...applications and APIs. Coordinate with application development teams to collect the application details. Provide the vulnerability information in the predefined report format after performing the App Pentest using manual methodology and App Pentest tools such...Suggested
- ...applications, platforms, and services. Leveraging industry-standard methodologies and advanced techniques, you will proactively identify vulnerabilities, collaborate with application owners to understand root causes, and guide effective remediation to strengthen the firm's...Suggested
- Job Title Qualifications Minimum of 5 years of experience in application penetration testing Bachelor's degree is desirable Minimum of 3 years of experience in App Pentest tools such as Burp Suite and WebInspect Certified in OSCP or GWAPT Business Unit...Suggested
$95.86k - $208.27k
The KPMG Advisory practice is at the forefront of transformation, offering excellent opportunities for individuals to advance their careers and expertise with KPMG. Looking ahead, we anticipate continued evolution and success within the practice, fostering both personal...SuggestedH1bLocal area- ...clinical stakeholders to protect patient data, systems, and infrastructure. Develops and enforces security policies, conducts risk and vulnerability assessments, leads breach response, and drives security awareness to ensure a resilient, compliant, and secure healthcare...Suggested
- A leading cybersecurity firm based in Tampa is seeking a Penetration Tester with 3+ years of experience in hands-on penetration testing. The role involves executing testing procedures, collaborating with a remote team, and engaging in challenging security assessments. Candidates...SuggestedRemote work
- ...for a new challenge. There is no typical day for our Pen Test team. Our clients rely on us to find and exploit a myriad of vulnerabilities across their on premise and cloud-based networks and applications. The benefit of being exposed to so many different situations...SuggestedContract workWork experience placementLocal areaImmediate startRemote workFlexible hours
$500 per month
Become a Professional Game Tester We're looking for passionate gamers to join our elite team of mobile game testers. Get paid to play and test the latest games before they launch. $500+ Avg Monthly Pay 5-10 Hours/Week 100% Remote Position Requirements: ...SuggestedRemote work10 hours per week$104k - $156k
...qualifications: ~ Experience securing cloud-native applications / SaaS solutions and networks. ~ Familiarity with vulnerability scanning and threat protection. ~ Relevant certifications: ~ Microsoft Certified: Azure Security Engineer...SuggestedRemote work$94.4k - $178.8k
We are the leading provider of professional services to the middle market globally, our purpose is to instill confidence in a world of change, empowering our clients and people to realize their full potential. Our exceptional people are the key to our unrivaled, culture...SuggestedWork experience placementInternshipLocal areaRemote work$92.9k - $129.2k
...enabled applications, agents, and workflows, including architecture, design, and implementation analysis Identify and validate vulnerabilities in LLM-based systems such as data leakage, insecure tool use, authentication gaps, and abuse paths Evaluate AI systems for...SuggestedFull timeLocal area- ...daily alerts and operations while leading broader collaborative initiatives, such as architecture design, threat modeling, and vulnerability identification, to drive meaningful security improvements. Candidates should be skilled in cloud-native technologies, with demonstrable...SuggestedLocal areaWorldwide
- ...to obtain TS/SCI clearance considered] Primary Responsibilities Manage compliance systems including Information Assurance Vulnerability Management (IAVM), System Center Configuration Manager (SCCM), non-SCCM, and Tempest Control Maintain JAD cyber security related...Full time
$90.3k - $189.6k
Job Title: Cyber Advisor Team Lead - SOUTHCOM Joint CCMD Cyber Assessment Team Job Category: Information Technology Time Type: Full time Minimum Clearance Required to Start: TS/SCI Employee Type: Regular Percentage of Travel Required: Up to 50% Type of...Full timeContract workWork experience placementWork at officeLocal areaFlexible hours- Job Description: Job Summary The Cyber Advisor Team Lead is responsible for leading a team of cyber technical advisors in planning and executing cyber assessment missions, supporting regional cyber strategies, and enhancing cybersecurity capabilities for partner...Work at office
- ...of position: FEDITC is seeking a Cybersecurity Systems Analyst, Associate to work at MacDill AFB . A United States Citizenship... ...by identifying and mitigating potential shortcomings and vulnerabilities. Advise on network and system risks, risk mitigation courses...For contractorsInterim roleLocal areaWorldwide
- A modern fintech company is seeking a Chief Information Security Officer (CISO) to lead their Information Security Program. The ideal candidate will have over 10 years of information security experience in regulated environments, such as banking or fintech. This role is...Remote work
- ...defined milestones. Drive remediation of audit, regulatory, and penetration testing findings. Ensure strong incident response, vulnerability management, and change management and development programs. Implement metrics that demonstrate real risk reduction and...Contract workRemote workNight shift
$9k
...effective and meet all security requirements for processing classified information.Support client in performing penetration tests, vulnerability/risk assessment analysis to support assessment and authorization utilizing the federal RMF. Help prepare documents that inform...Full timeInterim roleImmediate startWorldwideFlexible hours- Virtual Chief Information Security Officer (CISO) About the Company Flourishing provider of market research & business intelligence services Industry Market Research Type Privately Held About the Role The Company is in need of a Virtual...Part time
- ...and Technology (NIST) security control guidance to build Security Control Traceability Matrix (SCTM) features and to assess the vulnerability of various operating systems within the physical operating environment. Self-starter, able to multi-task and perform effectively...Full time
- ...security technologies including EDR, threat intelligence platforms, vulnerability scanners, identity systems, and network security tools to... ...security monitoring platforms. Collaborate with SOC analysts and incident response teams to investigate alerts, conduct forensic...Work at office
$41 - $45 per hour
Akkodis is seeking a SDET engineer for a Contract with a client in Tampa, FL. The ideal candidate will be responsible for building scalable, highquality automation frameworks and ensuring robust functional and regression coverage . Rate Range: $41/hour to $45...Hourly payContract workTemporary workLocal area- ...current technology to identify key risk areas to ensure an adequate level of control is in place to address risks Oversee vulnerability and threat assessments, mitigation and reporting activities Identify and resolve operational and performance gaps and obstacles...InternshipMonday to Friday
- ...system integrity. Emerging Threats and Innovation Monitor the threat landscape and emerging technologies to proactively address vulnerabilities. Emerging Threats and Innovation Develop partnerships with industry groups, government agencies, and vendors to stay ahead...Work at office
$50k - $100k
Salary Depends on Experience: $50,000--$100,000 Job Schedule: Full Time Job Category: Information Technology Expertise in Integrated Database Management Systems (IDMS) systems, Online IDMS programs using ADSO, IDD, ADSC, MAPC, DDDL, DMLO, OLP, PFCH, and DME, Batch...Full time- Disaster Recovery Manager Required qualifications: 810 years of experience as a disaster recovery manager, with the main role focused on disaster recovery. Strong experience with IT systems. 8+ years of experience in leading the development, testing, and maintenance...

