We are seeking a skilled Cyber Security Engineer to join our dynamic team. In this role, you will... Read more
We are seeking a skilled Cyber Security Engineer to join our dynamic team. In this role, you will be responsible for designing, implementing, and maintaining security measures to protect our information systems from cyber threats. You will conduct thorough risk assessments and vulnerability analyses, ensuring that our systems comply with industry standards and regulations. Collaborating closely with IT teams, you will develop and enforce security policies and procedures, and lead incident response efforts to mitigate potential breaches.
As a Cyber Security Engineer, you will also monitor network traffic for suspicious activity and respond promptly to security incidents. You will be responsible for maintaining and updating security infrastructure, including firewalls, intrusion detection systems, and encryption protocols. Your expertise will be vital in educating staff on security best practices and conducting regular training sessions. Ideal candidates will possess a firm understanding of security frameworks such as NIST, ISO 27001, or similar, and hold relevant certifications like CISSP, CEH, or CompTIA Security+. Strong analytical skills and a proactive approach to problem-solving are essential for success in this role.
Read lessWe are seeking a detail-oriented and proactive Cyber Analyst to join our dynamic cybersecurity team. In this role,... Read more
We are seeking a detail-oriented and proactive Cyber Analyst to join our dynamic cybersecurity team. In this role, you will be responsible for monitoring, analyzing, and responding to security incidents, ensuring the protection of our organization’s information systems. You will conduct threat assessments, vulnerability assessments, and risk analysis to identify potential security risks, implementing necessary measures to mitigate them. Your expertise will be vital in developing and maintaining security policies, procedures, and documentation, while also collaborating with IT teams to enhance overall security posture.
As a Cyber Analyst, you will investigate security breaches, perform forensic analysis, and prepare comprehensive reports on findings and recommendations. You will stay current with emerging threats and vulnerabilities, attending training sessions and conferences to enhance your technical skills. The ideal candidate will possess a strong understanding of security frameworks, risk management, and compliance standards. Proficiency in security tools and technologies, coupled with experience in incident response and threat hunting, is essential. A bachelor’s degree in Cybersecurity, Computer Science, or a related field, along with relevant certifications such as CISSP, CEH, or CompTIA Security+, is preferred. Join us in safeguarding our digital assets and ensuring a secure environment for our operations and clients.
Read lessWe are seeking a dedicated and detail-oriented Identity Analyst to join our dynamic team. In this role, you... Read more
We are seeking a dedicated and detail-oriented Identity Analyst to join our dynamic team. In this role, you will be responsible for managing and maintaining identity access management systems, ensuring that our organization's data is secure and compliant with industry standards. You will conduct thorough analysis and audits of identity data, identifying and resolving discrepancies while collaborating with IT and security teams to implement effective identity governance policies. Your expertise will be essential in developing and enhancing processes related to onboarding, offboarding, and role-based access controls.
The ideal candidate will have a strong background in identity management systems, with proficiency in tools such as SailPoint, Okta, or Microsoft Identity Manager. Excellent analytical and problem-solving skills are crucial, as is the ability to communicate complex concepts clearly to both technical and non-technical stakeholders. Responsibilities also include monitoring access requests, performing regular audits, and generating reports to track compliance with regulatory requirements. A Bachelor's degree in Computer Science, Information Systems, or a related field is preferred, along with at least 2 years of experience in identity and access management.
If you are passionate about data security and thrive in a collaborative environment, we invite you to apply for this exciting opportunity to make a significant impact on our organization’s identity management practices.
Read lessAll your saved jobs are no longer available or you've already applied.
for the following search criteria