Head of Information Security
guards | Israel | Hybrid – View job details
As a Chief Information Security Officer (CISO), you will develop and implement security policies and procedures to enhance the security of the company's IT environment. Develop, implement and maintain a comprehensive information security strategy to protect company data, production systems and networks from threats. Ensure compliance with relevant security standards, regulations and best practices (PCI DSS, SOX, ISO 27001, etc.).
Cloud Security Engineer
Noix | Australia | Hybrid – View job details
As a Cloud Security Architect, you'll design, build, and secure cloud infrastructure on AWS and Azure, using tools like Lacework, Mend, and SonarQube to achieve ongoing security and compliance. Develop and maintain secure cloud solutions, ensuring they meet industry standards and regulatory security policies through hands-on implementation.
Cloud SOC Analyst / SOC Engineer
visa | United Kingdom | Remote – View job details
As a Cloud SOC Analyst / SOC Engineer, you will monitor information security alerts using Security Information and Event Management (SIEM) to triage, mitigate and escalate issues as needed while capturing key details and artifacts. Mitigate and contain identified threats using approved incident response methodologies. Conduct threat scanning using specific actions and analyze alert trends to find subtle threats. Identify potential new trends, technologies and emerging threats that may impact the business.
Cybercrime Threat Assessment Manager
Bank of America | United States of America | On site – View job details
The Cybercrime Threat Assessment Manager is responsible for identifying and assessing cyber threats across the cybercrime threat landscape, specifically assessing emerging cybercrime trends and AI threats. The role involves developing strategy, analyzing cyber crime trends/activities and using actionable intelligence to put in place preventative measures and/or controls to mitigate cyber attacks of the bank's financial infrastructure and accounts.
Cybersecurity and Compliance Engineer
Electrolux Group | Italy | On site – View job details
As a Cybersecurity Compliance Engineer, you will create and maintain comprehensive security policies and procedures, and support the establishment and maintenance of the Security Compliance Center. Participate in the adoption, implementation and automation of security compliance verification tools and methodology. Continuously monitor and improve security processes and controls.
Cybersecurity trainee
oyson | United Kingdom | Remotely – No longer accepting applications
As a Cybersecurity Intern, you will build a secure system and gain knowledge of vulnerability assessment and reconnaissance principles to protect your infrastructure and web presence. Use practical vulnerabilities and evaluate their impact on your systems. Evaluate risk assessment and perform threat modeling for web application architecture.
Identity security specialist
technimont | Italy | On site – View job details
As an Identity Security Specialist, you will oversee user provisioning and deprovisioning, manage account access, and ensure compliance with identity lifecycle requirements. Manage privileged accounts and ensure strong permissions are managed. Monitor and respond to security incidents, conduct risk assessments and manage information security risks.
Senior Information Security Compliance Specialist
SAP | Germany | Hybrid – View job details
As a Senior Information Security Compliance Specialist, you will develop and implement a comprehensive compliance program to ensure adherence to relevant laws, regulations and industry standards. Develop and maintain the Delos Cloud Multi-Compliance Framework and related processes that integrate into the overall management system landscape and Enterprise GRC strategy.
Information security engineer
Deep Instinct | Israel | Hybrid – View job details
As an Information Security Engineer, you will investigate security alerts, breaches, and incidents, ensuring timely and effective responses. Implement the necessary security products and tools and constantly ensure that they are working well. Contribute to the development, implementation and maintenance of SOC policies, processes and procedures.
Director of Information Security and Data Protection
Education | United Arab Emirates | On site – View job details
As an Information Security and Data Protection Manager, you will develop and maintain information security policies, standards, procedures and guidelines. Conduct risk assessments to identify potential vulnerabilities and provide recommendations to mitigate risks. Investigate suspected and actual security incidents, prepare reports with recommendations, and ensure remedial actions are taken.
Head of Data Privacy Americas/Regional Director of Data Privacy
Zeiss Group | United States of America | Hybrid – View job details
As the Americas Head of Data Privacy/Regional Director of Data Privacy, you will oversee the regional operational management of the North America data privacy framework, applicable policies and procedures, and related governance operating model.
Mobile pen test
NetSatch Global | United Arab Emirates | On site – View job details
As a PenTester mobile tester, you will conduct vulnerability assessments and penetration testing on mobile and web applications, as well as containers. Identify and exploit vulnerabilities in mobile, web, and container applications. Provide recommendations to improve the security of mobile applications and containers. Work closely with development and security teams to implement security measures. Conduct risk analysis and develop risk mitigation strategies.
Penetration testing
Tech Systems | Ireland | Remote – View job details
As a penetration tester, you will conduct comprehensive penetration tests to identify and mitigate potential security vulnerabilities. Your day-to-day work will consist of obtaining testing from the company's internal board and providing comprehensive security assessments.
Lead Vulnerability Engineer
oracle | Ireland | On site – View job details
The Lead Vulnerability Engineer's responsibilities will include proactively researching new vulnerability signatures for the Java platform, creating and maintaining security tools for the Java platform, performing security assessment of new features to be integrated into the JDK, and assisting development teams with security code review.
Senior Cybersecurity Engineer
Carnegie Mellon University United States of America | On site – View job details
As a Senior Cybersecurity Engineer, you will support the operational capabilities and continued evolution of the Cybersecurity Assurance (CA) team, with a particular focus on developing and delivering cybersecurity training. You will support the standardization and documentation of cybersecurity assessments, develop and use security measurement methods, and transfer your knowledge and experience to the wider community.
Senior Cybersecurity Engineer
Cortelligent | United States of America | Remote – View job details
As a Senior Cybersecurity Engineer, you will develop and deploy robust security solutions to protect Coretelligent customers' networks, systems and data. Regularly analyze vulnerabilities and risks, and proactively identify potential threats and vulnerabilities by reviewing various security tools. Manage the full incident response lifecycle, including detection, analysis, containment, eradication and recovery. Oversee SIEM, firewalls, IDS/IPS, and other tools to detect and respond to security events.
Senior Director of Information Security Strategy and Portfolio
National Bank of Canada | Canada | Hybrid – View job details
As a Senior Information Security Strategy and Portfolio Manager, you will develop and implement strategic planning and cross-functional vision for information security initiatives. Coordinate, prioritize and manage the interconnection between different initiatives across different information security teams and departments. Monitor, measure and communicate the health of the information security portfolio. Manage the budget of the information security project portfolio and provide recommendations to various decision-making bodies.
Senior Security Threat Specialist
Norton Rose Fulbright | Canada | Hybrid – View job details
As a Senior Security Threat Specialist, you will be responsible for proactively managing the company's threat landscape. Primary responsibilities include vulnerability management and threat management (including threat hunting). Other functions include threat intelligence, threat hunting, and service ownership of the company's vulnerability management products.
(Senior) Cybersecurity Test Engineer – SDV Hub
Cariad | Germany | On site – View job details
As a Cybersecurity Test Engineer (Senior) – SDV Hub, you will conduct comprehensive security testing, including penetration testing, vulnerability assessments, and ethical hacking, to identify and address potential security risks in automotive systems. Develop detailed test plans outlining the scope, approach, resources and timeline for cybersecurity testing activities, aligned with automotive industry standards.
Staff Cybersecurity Engineer (General Artificial Intelligence)
Unisys | United States of America | Remote – View job details
As a Staff Cybersecurity Architect (General Artificial Intelligence), you will focus on emerging technologies including AI. You will ensure technology is designed and deployed securely and compatible with enterprise cybersecurity and technology strategies. You will effectively communicate the importance of key cyber programs and services to gain support, trust and engagement from business and technology teams to ensure security objectives are achieved.
Employee Threat Hunter
Guardian One | United States of America | Remote – View job details
As an Employee Threat Hunter, you will conduct proactive threat hunting services for SentinelOne clients. Build, develop and expand fishing tools, techniques and use cases. Incorporate relevant threat intelligence and dark web data into hunting operations. Advise the engineering team on platform improvements to further enable fast and effective threat scanning. Work closely with customers to address threats and improve their long-term security posture.