Applied Cryptographer
Quantstamp | EMEA | Remote – View job details
As an applied cryptographer, you should have studied various cryptographic protocols and have knowledge of cryptography fundamentals or concepts such as Elliptic Curve Cryptography, hash functions, PCP, etc. You should have experience with at least one major language such as Rust, Python, Java, or C. The exact language is less important. You should be familiar with version control software (specifically GitHub), testing, and be familiar with algorithms and data structures.
Cloud Security Specialist
KMS Lighthouse | Israel | Onsite – View job details
As a Cloud Security Specialist, you will design, implement, and manage security solutions for Azure and Microsoft 365. You will monitor security alerts, lead incident response, and perform periodic assessments. You will ensure compliance with ISO 27001, SOC2 Type II, and NIST standards.
Chief Information Security Officer
CYBERcom | Israel | Hybrid – View job details
As a CISO, you will develop and implement comprehensive cybersecurity policies and procedures; Ensure compliance with relevant regulations and standards (e.g. GDPR, ISO 27001); Conduct risk assessments and develop mitigation strategies; Advise on security best practices and emerging threats; Work with clients to strengthen their security posture.
Cyber Range Leader
Booz Allen Hamilton | Japan | Onsite – View job details
As a Cyber Range Lead, you will lead a team of experts leveraging cyberspace capabilities to assess potential weaknesses in cyber security solutions and the effectiveness of mitigations. Leverage cyberspace operational systems to aggregate threat feeds to inform senior management briefings aligned with client mission areas.
Cyber Security Technology Consultant
Thales | Mexico | Hybrid – View job details
As a Cybersecurity Technical Consultant, you will provide onsite or remote consulting services and support to Thales customers with a focus on high quality, accuracy and customer satisfaction. Develop and deliver in-depth technical hands-on product knowledge transfer to customers. Track high impact projects to ensure successful completion by developing project scoping plans, design guides and related documentation.
Cyber Security Advisor
H&M | Sweden | Onsite – View job details
Act as a Cyber Security Advisor, carrying out security assessments of internally developed and third-party provided solutions to ensure they comply with H&M’s security standards. Carrying out security maturity and risk assessments of internal and external partners.
Cyber Security Engineer
PetroApp | Egypt | Remote – View job details
As a Cyber Security Engineer, you will develop and implement cyber security policies, procedures, and controls to protect the company’s digital assets. Conduct penetration tests and monitor network traffic and security alerts to detect and respond to potential security breaches. Perform vulnerability assessments and penetration tests to identify and remediate security vulnerabilities. Conduct regular audits of security systems and processes to ensure compliance with industry standards and regulations.
Cybersecurity Governance Risk & Compliance Manager
Munster Polytechnic | Ireland | Onsite – View job details
As a Cyber Security Governance Risk & Compliance Manager, you will develop, implement and maintain a robust IT Governance, Risk and Compliance framework in line with industry best practices and regulatory requirements. You will increase risk maturity throughout the project lifecycle and provide independent assessments to address the risks inherent in significant changes such as business decisions, projects, process changes and implementation of new systems, applications and infrastructure.
Cyber Security Instructor
ABM College | Canada | Onsite – View Job Details
As a Cyber Security Instructor, you will create a dynamic classroom learning experience using a variety of instructional strategies to enable adult learners to achieve their learning objectives in accordance with the program objectives set out in the curriculum. Ensure that students are motivated to learn and reach their full potential. Develop a variety of classroom strategies to ensure the acquisition and retention of knowledge and skills.
Digital Forensics and Incident Response Analyst
Accenture | Philippines | Onsite – View Job Details
As a Digital Forensics and Incident Response Analyst, you will perform incident response to cybersecurity incidents including APT and nation state attacks, ransomware infections and malware outbreaks, insider threats, BEC, DDOS, security and data breaches, etc. You will conduct detailed investigations of cybersecurity incidents to identify the root cause, scope of impact, recommended actions for containment, eradication and recovery, and provide a final report with recommendations on how to prevent the same attack in the future by strengthening your security posture.
Director of Information Security, Cyber Risk and Compliance
S&P Global | Italy | Onsite – View job details
As Director of Information Security, Cyber Risk & Compliance, you will be familiar with the Cyber Risk & Compliance team’s activities and market intelligence regarding SOC reports, relevant regulatory requirements, control frameworks, internal and external audit processes, customer interactions including security inquiries and audits, as well as cybersecurity processes and controls across the company and divisions. Make recommendations related to balancing the requirements and deadlines made by the corporate divisions with the human and technical capabilities present in Market Intelligence. Negotiate differences to find and implement solutions acceptable to both the corporate group and Market Intelligence.
Head of Identity Management Platform
Nexi Croatia | Croatia | Hybrid – View job details
As Head of Identity Management Platform, you will leverage your extensive experience in Identity and Privileged Access Management, IT technology expertise and deep IT security knowledge to organize and lead complex projects, manage third-party teams and oversee platform lifecycle activities such as upgrades and integrations.
Head of Consulting
Orange Cyberdefense | Norway | Hybrid – View job details
As Head of Consulting, you will lead, mentor and develop a team of Cybersecurity Consultants to foster a culture of excellence and continuous improvement. Define and implement the Consulting division’s strategy in alignment with company goals to ensure the delivery of innovative and effective Cybersecurity solutions. Ensure all consulting activities comply with industry standards, regulatory requirements and best practices to mitigate risk to both clients and the company.
Security Officer CU TH
Ericsson | Thailand | Onsite – View job details
As the Head of Security CU TH, you will drive the execution and follow-up of security strategies, policies and directives, governance models and frameworks. Support the business in the implementation and maintenance of ISO 27001 controls across the CU in line with the MA scope and Ericsson Global ISO 27001 Controls Framework. Manage local security incidents and support investigations.
IT Program Manager
Bose Corporation | United States | Onsite – View job details
As an IT Program Manager, you will develop, implement and manage a cybersecurity program aligned with the organization’s strategic objectives. You will oversee security projects related to enterprise applications with a focus on protecting sensitive data and ensuring compliance with regulatory standards. You will facilitate regular security assessments and audits to identify vulnerabilities and implement corrective actions.
Penetration Tester
Navy Federal Credit Union | United States | Onsite – View Job Details
Penetration Testers manage penetration tests from initiation to execution. Identify vulnerabilities in NFCU applications, systems and networks and prescribe remediation methods. Leverage complex tactics including lateral movement, network tunneling/pivoting, credential compromise and hash cracking.
Principal Data Security Specialist
Oracle | Spain | Onsite – View job details
As a Principal Data Security Specialist, you will be focused on providing technical and procedural guidance to help customers define their platform requirements and realize the value of their subscription. Research and evaluate new solutions and services to drive continuous improvement.
Senior Architect – Cybersecurity
Presight | UAE | Onsite – View job details
As a Senior Cyber Security Architect, you will develop and implement security architecture solutions to protect the organization’s IT infrastructure. Design and review security policies, standards, and procedures. Conduct security assessments and risk analyses to identify vulnerabilities and recommend mitigation strategies. Lead security projects and collaborate with cross-functional teams to integrate security measures.
Senior Cybersecurity Architect
Hexagon Geosystems | European Economic Area | Remote – View job details
As a Senior Cybersecurity Architect you will plan, organize, test and document the implementation of new security systems and tools, define success criteria and security requirements, develop reference architectures, functional and non-functional requirements for proof of concept initiatives and projects, lead threat modeling, security architecture reviews and perform risk assessments of new and existing technology solutions.
(Senior) Information Security Officer
Oetker Digital | Germany | Hybrid – View job details
As the (Senior) Information Security Officer, you will develop, implement and monitor a strategic and comprehensive corporate information security and IT risk management program based on Oetker Group-wide security directives. Manage and assist with the development and implementation of information security policies, procedures and guidelines. Provide guidance and advice to C-level, senior management team and staff on information security and its alignment with business objectives and risk management.
Technology and Cyber Risk: Senior Officer – Cyber Security Risk
Citi | Poland | Onsite – View job details
Technology and Cyber Risk: As the Senior Cybersecurity Risk Officer, you will review and evaluate compliance and cyber policies and procedures, technology and tools, and governance processes to provide a credible challenge to minimize losses due to cyber risks. Assess cyber risks and evaluate measures to address root causes that continually lead to losses due to operational risks by challenging both past and proposed practices. Support independent assurance activities to evaluate areas of concern, including substantive and control testing.
Vulnerability Manager
TTM Technologies | United States | Remote – View job details
As a Vulnerability Manager, you will be responsible for identifying, assessing, prioritizing and managing vulnerabilities across systems and networks. You will conduct regular vulnerability assessments and penetration testing across systems, applications and networks.