Associate/Pen Tester (Red Team) – Cybersecurity Audit
Siemens | Germany | Hybrid – View job details
Associate / Pen Tester (Red Team) – As a Cybersecurity Audit, you will be responsible for conducting cybersecurity assessments across the Siemens landscape, including products, services, IT systems, factories, and software development centers. This process involves conducting ethical hacking activities, designing attack scenarios against cutting-edge technologies, and highlighting important observations to translate technical findings into management information and take effective action. can do.
CISO
Inflow | Indonesia | Remote – View job details
As CISO, you will be responsible for protecting Influx from information security risks through the development, implementation, and maintenance of security programs (policies, procedures, and standards).
CISO DACH countries
BME – Building Materials Europe | Germany | Hybrid – Show job details
As the Regional Information Security Officer, you will be able to manage information security within the DACH OpCo by providing leadership, small business expertise, program oversight and direction. Implement and enforce local security policies, standards, procedures, and guidelines in alignment with BME Group's security framework.
cloud security engineer
Visionary Technology Consultant | USA | Onsite – View job details
As a Cloud Security Engineer, you will be responsible for designing, implementing, and managing AWS-based solutions with a focus on high availability, fault tolerance, and scalability.
cyber security analyst
Nucleo | Italy | Hybrid – View job details
As a Cybersecurity Analyst, you will be responsible for monitoring and analyzing security events using an enterprise security information and event management (SIEM) platform and recommending actions to mitigate potential threats. Investigate security alerts and escalate incidents to the appropriate team for remediation.
Cyber security network engineer
Nine | Australia | Onsite – View job details
As a Cyber Security Network Engineer, you will implement, configure, and maintain NDR solutions to securely manage, detect, and respond to network events. Monitor and audit risky network activity, ensure policy compliance, and quickly address anomalies and security incidents.
cyber security specialist
Pentera | Israel | Hybrid – View job details
As a Cyber Security Specialist, you will be responsible for developing and implementing strategic cybersecurity initiatives to ensure the confidentiality, integrity, and availability of the company's information assets. Enforce cybersecurity policies and procedures in compliance with industry standards and regulations.
data privacy specialist
Coca-Cola Beverage Florida | USA | Onsite – View job details
As a Data Privacy Specialist, you will be responsible for ensuring your organization complies with data protection regulations, developing and implementing privacy policies, and overseeing your data privacy program. You will work closely with internal teams to establish and maintain a culture of data privacy and security.
Information Security Manager (GRC)
Exersol | Germany | Remote – View job details
The Information Security Manager (GRC) will be responsible for managing the GRC function within the security department, and you will be responsible for designing, implementing, and driving policies and standards across the organization, identifying information security risks, and owning and managing compliance efforts. Masu.
information security specialist
JD Sports | Canada | Onsite – View job details
As an Information Security Specialist, you will be responsible for developing and enforcing data security policies, conducting regular audits, and implementing security solutions.
Insider Threat Security Engineer – Associate VP
MUFG | USA | Onsite – View job details
Insider Threat Security Engineer – As Associate VP, you will be responsible for assessing and strengthening MUFG's working environment by establishing governance systems, assessing existing and future risks, and verifying compliance with information security standards and policies.
MDR Security Analyst
Sentinel One | Israel | Remote – View job details
As an MDR Security Analyst, you will monitor and review threats and suspicious events from customers participating in our services, investigate and triage alerts, investigate further, and develop appropriate action items and remediation plans. . Leverage our deep visibility capabilities and proprietary research cloud to proactively hunt threat data.
malware reverse engineer
Code Hunter | USA | Remote – View job details
As a Malware Reverse Engineer, you will perform a thorough analysis of malware, including writing detailed analysis reports. Track ongoing malware campaigns, identify malicious actors, and document related infrastructure. Develop custom tools and scripts to facilitate and speed up malware analysis tasks.
offensive security engineer
Kaseya | Ireland | Onsite – View job details
As an Offensive Security Engineer, you will be responsible for planning, coordinating, and executing efforts to improve Kaseya's security posture. Red is responsible for executing her team's activities, promoting a cybersecurity culture, and mentoring cybersecurity engineers.
penetration tester
Strata Information Group | America | Remote – View job details
As a penetration tester, you will lead security assessments and penetration testing projects to identify and exploit vulnerabilities, quantify the risk to the organization, and develop mitigation strategies to keep our clients safe.
Principal Cybersecurity Architect
Federal Reserve Bank of Boston | USA | Onsite – View job details
As a Principal Cyber Security Architect, you will develop code to automate security configuration management, build, test, and deploy cybersecurity-related technical solutions, identify and address root causes of problems, and focus on problem categories rather than individual instances. We will focus on solving the problem.
Principal Cyber Security Engineer (IAM)
Walgreens | America | Onsite – View job details
As a Principal Cyber Security Engineer (IAM), you will design technical security programs that protect the integrity of digital networks, systems, applications, and data. You will lead the design, hardening, construction, operation, and automation of key information security solutions and processes to protect the integrity of your organization's digital networks, systems, applications, and data.
SaaS Security Engineer
Business Operating Software | India | Onsite – View Job Details
SaaS Security Engineers are responsible for managing application security, network security, and cybersecurity. You will also be involved in security engineering and information security to ensure the protection of your company's software and customer data.
security architect
Wicks | Israel | Onsite – View job details
As a Security Architect, you will define and execute an annual roadmap to reduce security risks and design secure architectures across various business units. Review and assess new complex environments, discover security gaps, and create security controls in the form of policies and other mitigations.
Senior Cyber Security Solutions Architect
ST Engineering | Singapore | Onsite – View job details
As a Senior Cyber Security Solutions Architect, you will design, develop, and implement secure cyber ranges, cyber exercises, and cyber training solutions, considering SaaS models and web-based solutions.
Senior Information Security Engineer
Boston University | USA | Onsite – View job details
The Security Engineer will be responsible for a variety of information security projects in addition to multiple day-to-day security tasks as part of supporting the information security needs of the Boston College community. Day-to-day duties include responding to cyber incidents, evaluating and implementing firewall change requests, monitoring various security products and audit logs, and providing technical guidance on these products.
Senior security engineer
Abrioc Technologies | United Arab Emirates | Onsite – View job details
As a Senior Security Engineer, you will oversee the design, implementation, and management of security infrastructure to ensure confidentiality, integrity, and availability of systems and data. Design and maintain secure network architecture including firewalls, VPNs, and network segmentation.
Senior security engineer
Stem | India | Onsite – View job details
As a Senior Security Engineer, you will design, implement, and monitor security measures to protect computer systems, networks, and information. Develop technology solutions and new security tools that help reduce security vulnerabilities and automate repeatable tasks.
SOC Analyst II
Armor Defense | USA | Onsite – View job details
As a SOC Analyst II, you will monitor, investigate, analyze, and remediate or escalate compromises or indicators of compromise in systems and applications. Analyze threats to find unique indicators of compromise. Collaborate with other members of the SOC team to develop countermeasures to help prevent and detect future cyber threat activity.
Technical Consultant – SAP Cybersecurity
Bowbridge Software | Germany | Onsite – View job details
As a Technical Consultant for SAP Cybersecurity, you will be responsible for day-to-day tasks such as consulting clients on SAP Cybersecurity, providing technical support and troubleshooting, and supporting sales operations.
Threat and Adversary Mitigation – Group Security
NAB Innovation Center | Vietnam | Hybrid – View job details
Threat and Adversary Mitigation – As Group Security, we ensure that NAB Group's cyber threat controls are adequate, competent, optimally configured and consistent across all NAB Group entities, and ensure that gaps are addressed throughout operational and investment activities. Responsible for ensuring that information is identified and corrected. Develop and maintain a threat and countermeasure framework including attack surface, attack vectors, attack paths, TTP mapping, mitigation controls and countermeasures, control capabilities, and mitigation metrics.
threat hunter
Cycle | India | Onsite – View job details
Threat Hunter leverages open source threat intelligence sources, proprietary feeds and scanning tools, and in-house dark web research data and tools to identify threat actors' infrastructure (domains, hosting infrastructure, networks, etc.) and TTPs. , plan and discover stealth attacks. Run campaigns and continually publish IOCs and threat detection rules for your enterprise clients and community.
Fill out the form to get your free e-book: