Average salary: $200,000 /yearly
More statsGet new jobs by email
- ...applications and APIs in alignment with DTCC processes and control standards. Provide assistance to developers by detailing reported vulnerabilities and recommending remediation steps. Ensure excellent coordination across various teams within DTCC to support security...SuggestedFull timeRemote workFlexible hours
$1,000 per month
Join Our Team as a Website Tester at Little Wheel Little Wheel is a gambling technology company focused on researching and building products that put players first. We are currently hiring Website Testers across Michigan, New Jersey, Pennsylvania, and West Virginia...SuggestedExtra incomeTemporary workPart timeSecond jobCurrently hiringImmediate startWork from homeFlexible hours$1,000 per month
Join Our Team as a Website Tester at Little Wheel Little Wheel is a gambling technology company focused on researching and building products that put players first. We are currently hiring Website Testers across Michigan, New Jersey, Pennsylvania, and West Virginia...SuggestedExtra incomeTemporary workPart timeFreelanceSecond jobCurrently hiringImmediate startWork from homeFlexible hours- ...Title: Cyber Risk Analyst W-2 Only (no 1099) Must be a U.S. Citizen Company's Location: Lemont, IL Job Description Background... ...education and awareness, cybersecurity incident management, vulnerability management, compliance, and cybersecurity risk management....SuggestedFull timeContract workFor contractorsWork at officeRemote workFlexible hours
- JOB DESCRIPTION Are you ready to make an impact at DTCC? Do you want to work on innovative projects, collaborate with a dynamic and supportive team, and receive investment in your professional development? At DTCC, we are at the forefront of innovation in the financial...SuggestedFull timeRemote workFlexible hours
- ...Job Description Job Description Digital Forensic Analyst Employment Type: Full-Time, Mid-Level Department: Forensics CGS is seeking a Digital Forensic Analyst whose primary focus will be on the preservation & collection of mobile device and cloud-stored...SuggestedFull timeWork at officeRemote workFlexible hours
- ...Cybersecurity Vulnerability Analyst Location: Arlington, VA Must have an active Top Secret Security Clearance Node is supporting a U.S. Government customer to provide cybersecurity vulnerability analysis support to reduce the prevalence and impact of vulnerabilities...SuggestedFull time
$91k - $174k
...that our 80k-agent contact center environment remains resilient against voice-specific threats, data breaches, and infrastructure vulnerabilities. What you will be doing… In this role, you will be the dedicated security execution lead for our contact center and...SuggestedFull timeTemporary workPart timeWork experience placementWork at officeWork from homeShift work3 days per week$89k - $143.75k
.... Performing software code reviews and design reviews with a cyber-lens. Performing periodic risk assessment of security vulnerabilities in software for the product by identifying and analyzing software vulnerabilities Developing recommendations to mitigate security...SuggestedFull timeTemporary workWork at officeLocal areaRemote workNight shift- JOB DESCRIPTION Are you ready to make an impact at DTCC? Do you want to work on innovative projects, collaborate with a dynamic and supportive team, and receive investment in your professional development? At DTCC, we are at the forefront of innovation in the financial...SuggestedFull timeRemote workFlexible hoursShift work
- Job Description Job Description Position: Senior SDET Engineer Location: Austin, TX ( Remote untilCovid ) Duration: 12 months Job Description: Must have: · Bachelors or Masters in CS or related degrees. · 9 years with hands on experience in software...SuggestedRemote work
$129.64k - $172.85k
About Lumen Lumen connects the world. We are igniting business growth by connecting people, data and applications – quickly, securely, and effortlessly. Together, we are building a culture and company from the people up – committed to teamwork, trust and transparency....SuggestedFull timeTemporary workRemote work$4,000 per month
...Role Overview The Vulnerability Analyst supports ClearTrust Cyber's Vulnerability Management services by conducting external vulnerability scans, analyzing results, validating findings, and documenting technical findings and implications in a clear, actionable manner...SuggestedRemote jobFull timeContract workPart timeFor contractors- ...procedures and programs, including their functional and system implementation. Qualification Summary To qualify for a Supply Systems Analyst, your resume and supporting documentation must support: A. Specialized Experience: One year of specialized experience that equipped...SuggestedFull timeLocal areaRemote work
$84.5k - $161k
When you join Verizon You want more out of a career. A place to share your ideas freely — even if they’re daring or different. Where the true you can learn, grow, and thrive. At Verizon, we power and empower how people live, work and play by connecting them to what brings...SuggestedFull timeTemporary workPart timeWork at officeWork from homeShift work3 days per week- ...Telework Eligible Yes Major Duties Branch Chief for Inventory Management Policy and Operations, expert analyst/advisor to leadership on Inventory, Disposal, and Demilitarization by overseeing policy, collaborating Major Subordinate Commands, and implementing improvement...Full timeRemote work
$120k - $140k
...and validates secure systems and tests security products and systems to detect security weakness; performs network scanning and vulnerability analysis. Ensures that the appropriate security features and safeguards have been implemented on all information systems as required...Full timeCurrently hiringRemote workFlexible hours$102k - $138k
...of the self-inspection, to include security coordination and review of all system assessment plans. Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them. Prepare reports on the status of security safeguards applied...Temporary workFor contractorsWork at officeImmediate startRemote workWorldwideFlexible hours$86.8k - $165.2k
...classified operating and/or laboratory environments. Experience with various information system security tools that address vulnerability analysis and mitigation. These may include Splunk, Forcepoint, Ivanti, Tenable, ACAS, HBSS, etc. Familiarity with implementation...Temporary workWork experience placementWork at officeRemote workRelocation packageFlexible hours$112.88k - $167.91k
...obtain DAO authorization for new software, hardware, and firmware use before implementation on the system. Identify security vulnerabilities and provide guidance on mitigating risk. Initiate protective or corrective measures when a security incident or...Remote work$60 - $65 per hour
...Overview Immediate need for a talented Principal Systems Analyst (payment experience) . This is a 18+months contract opportunity with long-term potential and is located in Westlake, TX(Hybrid) . Please review the job description below and contact me ASAP if you are...Contract workLocal areaImmediate start- ...engineering lifecycle for the systems under our purview. Security Assessments and Audits: Conduct security assessments, identify vulnerabilities, and recommend corrective actions. Incident Response: Monitor security events and incidents, investigate suspicious activity...Full timeLocal areaRemote work
$99k - $225k
...years of experience as an ISSO or Information System Security Analyst (ISSA) ~ Experience conducting tools assessments and configuration... ...and reviewing tool or capabilities topologies, CONOPS, and vulnerability scans to assess risk Experience with cyber-related tools...Full timeContract workPart timeFor subcontractorLocal areaRemote work$123.25k - $166.75k
...the time. WHAT YOU'LL NEED TO SUCCEED Bring your cyber expertise and drive for innovation to GDIT. The Information Security Analyst Senior must have: Education : Bachelors Degree or equivalent technical training, certification(s) or experience Experience...Temporary workImmediate startRemote workWorldwideRelocation packageFlexible hours$75.8k - $144.2k
...in pursuit of IAM Level II). ~ Knowledge and/or experience with STIGs, SCAP, Splunk or other system hardening and compliance, vulnerability assessment, and/or SIEM tools. ~ United States citizenship is required. Must have eligibility to obtain Top Secret and additional...Temporary workWork experience placementWork at officeImmediate startRemote workWorldwideRelocation packageFlexible hours$70k - $100k
...security changes, with in various levels of an organization, ensuring compliance with published policies; conducting cybersecurity vulnerability and threat analysis; and support cyber incident-response by isolating potentially effected assets, initial investigation and...Contract workWork at officeRemote work$76.5k - $134.9k
...threats), and effectively reporting such activity and associated risks. Ensuring POA&Ms or remediation plans are in place for vulnerabilities identified during monitoring activity, audits, inspections, etc. and implementing, or overseeing, corrective actions....Full timeTemporary workWork experience placementWork at officeRemote workRelocationFlexible hoursShift workDay shift$67.13k - $88.91k
...conducting security audits of information systems. SIEM Tool Experience (ArcSight, Splunk, Wireshark, etc.). Experience with vulnerability/compliance scanning tools (ACAS/Nessus, Retina, MBSA, SCAP, etc.). Experience with the implementation of STIG/SRG...For contractorsWork at officeImmediate startAfternoon shift$77.6k - $176k
...nation? As a systems security and network security engineer, you can identify the tools, applications, and systems needed to assess vulnerabilities and recommend the best solution and security strategy. We need your experience to lead the development and implementation of...Full timeContract workPart timeLocal areaRemote work$70k - $100k
...security changes, with in various levels of an organization, ensuring compliance with published policies; conducting cybersecurity vulnerability and threat analysis; and support cyber incident-response by isolating potentially effected assets, initial investigation and...Contract workWork at officeRemote work




