We are seeking a dedicated Security and Governance Analyst to join our dynamic team. The ideal candidate will... Read more
We are seeking a dedicated Security and Governance Analyst to join our dynamic team. The ideal candidate will be responsible for assessing and enhancing the security posture of our organization. Key duties include conducting risk assessments, monitoring security controls, and ensuring compliance with relevant regulations and standards. You will collaborate with various departments to develop and implement security policies, procedures, and best practices that align with organizational goals.
In this role, you will analyze security incidents and vulnerabilities, providing timely reports and recommendations to mitigate risks. You will also assist in the development of security awareness programs, fostering a culture of security within the organization. Strong analytical skills, attention to detail, and the ability to communicate effectively with both technical and non-technical stakeholders are crucial for success in this position. A background in information security, governance frameworks, and experience with security tools will be highly beneficial.
Read lessWe are seeking a skilled and motivated Endpoint Cyber Operations Analyst to join our dynamic cybersecurity team. In... Read more
We are seeking a skilled and motivated Endpoint Cyber Operations Analyst to join our dynamic cybersecurity team. In this role, you will be responsible for monitoring, detecting, and responding to security incidents involving endpoint devices across our organization. You will utilize advanced security tools and technologies to analyze endpoint data, identify vulnerabilities, and implement effective security measures. Your expertise will be crucial in protecting our digital assets, ensuring compliance with security policies, and enhancing our incident response capabilities.
The ideal candidate will have a strong understanding of endpoint security solutions, threat detection methodologies, and incident response processes. Key responsibilities include conducting regular security assessments, performing malware analysis, and collaborating with IT teams to remediate security issues. You will also be tasked with developing and maintaining documentation related to security incidents, as well as contributing to the creation of security awareness training for employees. A proactive approach, excellent problem-solving skills, and the ability to work under pressure are essential for success in this role.
To qualify, candidates should possess a bachelor's degree in Computer Science, Information Technology, or a related field, along with relevant certifications such as CompTIA Security+, CEH, or similar. A minimum of 2-3 years of experience in a cybersecurity role, specifically focusing on endpoint security, is required. Join us to make a significant impact on our cybersecurity posture and help safeguard our organization against evolving threats.
Read lessWe are seeking a highly skilled IFA2 Systems and Cyber Asset Manager to join our dynamic team. In... Read more
We are seeking a highly skilled IFA2 Systems and Cyber Asset Manager to join our dynamic team. In this role, you will be responsible for overseeing the management and security of our information technology systems and cyber assets. You will play a critical role in ensuring the integrity, confidentiality, and availability of our data, while also maintaining compliance with relevant regulations and industry standards. Your expertise will contribute to the development and implementation of cybersecurity strategies, risk assessments, and incident response plans to protect our organization from potential threats.
The ideal candidate will possess a strong background in IT systems management, cybersecurity protocols, and asset management. Key responsibilities include conducting regular security audits, monitoring network traffic for unusual activity, and managing vulnerabilities. You will also collaborate with cross-functional teams to develop training programs and raise awareness of cybersecurity best practices. In addition, you will be responsible for maintaining documentation related to system configurations, operational procedures, and incident reports to ensure seamless communication and accountability within the organization.
To succeed in this position, you should have a relevant degree in Computer Science, Information Technology, or a related field, along with industry certifications such as CISSP, CISM, or equivalent. Proven experience in systems management, cyber asset protection, and risk management is essential. Strong analytical skills, attention to detail, and the ability to work under pressure will be crucial for your success. If you are passionate about cybersecurity and eager to make a significant impact on our organization, we encourage you to apply for this exciting opportunity.
Read lessAll your saved jobs are no longer available or you've already applied.
for the following search criteria