Chief Information Security Officer
HoneyBook | Israel | Local – View job details
As CISO, you will develop and implement a multi-year security strategy and roadmap to anticipate and address security challenges in line with the company’s growth objectives. Ensure HoneyBook complies with all relevant laws, regulations and standards such as PCI DSS, SOX and ISO 27001. Develop and maintain security policies, standards and procedures to protect company assets and data.
Cyber Cloud Security Engineer
Capital One | United States | Local – View job details
As a Cyber Cloud Security Engineer, you will design, build, and implement the cloud security architecture to modernize the company’s cloud. Lead threat modeling for cloud services. Participate in managing the overall cloud control inventory, playbooks, cloud service catalog, and Service Adoption Framework (SAF) reporting. Stay current on emerging cloud computing vulnerabilities, threats, controls, and their potential impact to Capital One.
Cyber Security Engineer
Aerospace Corporation | United States | Hybrid – View job details
As a Cyber Security Engineer you will perform research in the areas of Cyber and Network Security, advising DoD and IC Space Systems customers on the secure design and implementation of their systems, reviewing network architecture designs to identify security, data flow and performance deficiencies. Identify security vulnerabilities and weaknesses in SW, HW and architectural designs of the mission environment and provide recommended mitigation measures.
Data Center Security Operations Manager
Microsoft | France | Onsite – View job details
The Datacenter Security Operations Manager oversees the implementation of physical security policies and procedures at applicable datacenters and ensures that Microsoft’s physical security vendor guard force has the resources and information to provide physical security services that meet Microsoft and customer requirements for protecting people, information, and critical infrastructure. Performs analysis to detect security threats, alerts, or risks and escalates to the Critical Incident Response Team and/or external agencies, as appropriate. Implements security protocols to support the physical protection of company personnel and assets. Delivers and maintains a security program in its area of responsibility.
Data Security Engineer
CIBC | Canada | Local – View job details
As a Data Security Engineer, you will execute and coordinate complex application programming activities such as developing specifications, coding, testing, debugging, documentation and automation via DevOps CI/CD to ensure successful program implementation and maintenance. Act as an SME in analyzing requirements, estimating assigned work packages and coordinating end-to-end implementation of program specific solutions. Lead the development of solutions that meet business objectives while maintaining existing applications.
Deputy Director CISO, Digital, Data, Technology, Corporate and Delivery
UK Headquarters | UK | Hybrid – View job details
As the Deputy CISO Director for Digital, Data, Technology, Corporate and Delivery, you will: Implement the Department’s cybersecurity strategy, ensuring it is aligned with the National Cybersecurity Strategy and reflects the requirements of Department stakeholders Implement enterprise strategies, approaches and processes to mitigate information security risks and ensure effective delivery of services to the Department Establish, maintain and implement appropriate strategies, standards, controls and policies to protect information assets and technology across the Interior Department family and drive compliance with government policies, standards, regulatory requirements and legislation.
Deputy Director, National Security Procurement Unit
Cabinet Office | UK | Local – View job details
As Deputy Director of the National Security Procurement Unit, he will lead a team of 20 people based in Glasgow and London. They will be responsible for setting up this new unit and ensuring it is ready when the Procurement Act comes into force in October 2024. They will provide the policy framework and associated procedures and guidance that will set out how the Government will operationalise the new powers in the Act.
Director of Cybersecurity
ASC Engineered Solutions | United States | Hybrid – View job details
As Director of Cybersecurity, you will develop and execute the cybersecurity strategy and roadmap for the organization. Coordinate with internal and external stakeholders to ensure compliance with cybersecurity requirements and regulations. Establish and maintain cybersecurity policies and standards that comply with NIST CSF and CMMC requirements. Perform third-party risk management assessments to evaluate the security practices and compliance of vendors, suppliers, and partners.
EMEA Lead – ICS/OT Security Engineer (Manufacturing Operations Technology)
Axalta | Germany | Local – View job details
As an EMEA Lead – ICS/OT Security Engineer (Manufacturing Operational Technology) you will maintain network architecture and data flow diagrams and coordinate backup and recovery processes. Maintain and troubleshoot endpoint and antivirus solutions within the OT/ICS environment (DMZ, Process Control Network etc.). Assist with application patching and upgrades. Maintain interfaces between local (on-premise) and enterprise historians (cloud).
Security Officer/Information Security Officer
Bullish | Germany | Local – View job details
As Security Officer/Information Security Officer, you will support the Management Board in defining and updating the Information Security Policy and advise on all issues related to Information Security, including helping to resolve conflicting goals (e.g. economic aspects and information security). Manage and coordinate the Agency’s Information Security processes, oversee the involvement of IT service providers and assist with related tasks. Additionally, you will support the creation and updating of Technology Contingency Plans.
ICS IAM Operations Lead
WTW | India | Local – View job details
As the ICS IAM Operations Lead, you will oversee and provide input to identity services processes running within ICS and across WTW, including access re-authentication, privileged access, JML, policies/standards, and risk processes, ensuring alignment with internal information and cyber security frameworks. Manage major audit requests from both internal and external auditors and provide regulatory evidence to support SOX, SOC2, HIPPA, etc.
Junior Information Security Engineer
LEAP Dev | Australia | Hybrid – View job details
As a Junior Information Security Engineer, you will monitor security dashboards and alerts, respond to information security events and create new ways to resolve existing security issues. You will develop automation scripts to process and track systems and perform vulnerability testing, risk analysis and security assessments.
Network Security Specialist
ValueLabs | United Arab Emirates | Local – View job details
As a Network Security Engineer, you will design and implement network security architectures for enterprise network environments including Zero Trust Networks. Develop and maintain expertise in network security protocols such as TCP/IP, DNS, HTTP, etc. Perform security assessments and risk analysis to identify vulnerabilities and develop mitigation strategies.
Principal Cyber Threat Hunter (GCS)
RBC | Canada | Hybrid – View job details
As a Principal Cyber Threat Hunter (GCS), you will create detection engineering solutions to proactively identify and mitigate Advanced Threat Actors (APT/UNC) and insider threats. Analyze, research and reverse engineer Tactics, Techniques and Procedures (TTPs) and malware samples to create detections based on industry leading frameworks such as MITRE ATT&CK. Improve security posture and resilience against attacks by simulating attack scenarios using automated adversary emulation tools/breach and attack simulation tools.
SAP Security and GRC Experts
Teva Pharmaceuticals | India | Local – View job details
As a SAP Security and GRC expert, you will implement and maintain user access control (roles, profiles, authorizations) based on the principle of least privilege. Participate in user provisioning and de-provisioning process. Analyze security logs and identify potential security risks and vulnerabilities. Assist with security audits and ensure compliance with internal security policies and industry regulations (SOX, HIPAA, etc.). Support development and implementation of security best practices for SAP systems.
Security Engineer
Avrioc Technologies | UAE | Local – View job details
As a Security Engineer, you will monitor and analyze endpoint security events including malicious apps, device compromises, host-based attacks, data breaches, etc. Respond and investigate security incidents observed from SIEM solutions and individual security devices to ensure timely and effective resolution. Use threat intelligence and security best practices to proactively identify new threats and attack patterns and take further action on identified IOCs.
Security Risk Specialist
Worldline | Italy | Hybrid – View job details
As a Security Risk Specialist, you will contribute to the monitoring and further development of security risk management and internal control system tools, systems and processes, as well as monitoring compliance with regional and industry specific regulations (e.g. PCI DSS, ISO27001, CROE, etc.) and implementing required measures. Additionally, you will perform regular audits of internal data and network security controls to validate their effectiveness, identify risks and drive continuous improvement.
Senior Cybersecurity Analyst – Cloud Security
NVIDIA | United States | Onsite – View job details
As a Senior Cyber Security Analyst – Cloud Security, you will educate the organization on cyber security guidelines for cloud computing and help develop security solutions that facilitate the effective implementation of these practices. Stay informed about emerging trends and threats in cloud security and work to develop and articulate Nvidia’s cloud security strategy and vision. Help define and implement cloud security policies, standards and procedures, ensuring alignment with industry standards.
Senior Cybersecurity and Resilience Engineer
European Investment Bank | Luxembourg | Local – View job details
As a Senior Cyber Security and Resilience Engineer, you will contribute to the definition of EIB’s IT security strategy and policies on IT Cyber Resilience. Develop EIB’s Cyber Resilience program elements to ensure IT security policies, procedures and initiatives are properly designed and implemented. Lead the development of detailed High Availability and Disaster Recovery architecture for applications and systems in an environment with multiple data centers, cloud-based solutions and technology platforms.
Senior Engineer (Security & Identity)
Versent | Australia | Hybrid – View job details
As a Sr. Engineer (Security & Identity) you will be responsible for implementing, configuring and maintaining IAM solutions for customers including but not limited to IAM Platform, SSO and MFA. Perform regular reviews and updates to ensure the ongoing efficiency and security of the deployed solutions. Oversee the management of Identity and Access Management (IDAM) solutions including the incorporation of new services within a multi-cloud environment.
Threat Detection and Response Analyst
Vanderbilt University Medical Center | United States | Local – View job details
As a Threat Detection and Response Analyst, with ongoing guidance, you will perform cyber threat intelligence, computer and network intrusion detection, incident response, and cybersecurity forensic investigations; conduct small and medium scale threat analysis of the environment; troubleshoot and resolve complex security issues; and implement small and medium scale technologies.
Threat Hunter
CyberProof | Israel | Hybrid – View job details
As a threat hunter, you will hunt and analyze available data sets looking for indicators of security compromise. You will design and implement data mining techniques to derive meaningful insights from large data sets. You will analyze data sets from various sources including networks, endpoints and cloud environments.