Resultados de la búsqueda: 23 vacantes
...An important and internationally recognized company is looking for a Senior Cyber Security Engineer, trained to: •Responsible for completing proof-of-concept evaluations for such data protection, classification and discovery toolsets, and subsequent implementation of the...
Monitor and respond to alerts from key security technologies and other internal sources.
Tunes alerts, processing rules, maintenance jobs, etc. to minimize false positives and noise while ensuring relevant security information is captured and highlighted.
Develop...
...This role is responsible for executing Cybersecurity M&A due diligence and leading cyber integration planning, coordination, and reporting while partnering across multiple Cyber, business, and technology cross function teams.
Requirements
~ Execute Cybersecurity...
Why join Stryker?
We are proud to be named one the World’s Best Workplaces and a Best Workplace for Diversity by Fortune Magazine! Learn more about our award-winning organization by visiting stryker.com
Our total rewards package offering includes bonuses, healthcare...
...designing, implementing, and managing the cibersecurity awareness programs to educate our employees and stakeholders about potential cyber threats and the importance of cybersecurity best practices.
Utilize creative approaches to make complex security topics...
...Cyber Security Architect are responsible for guiding the design and implementation of secure solutions and services across our business and IT support areas. Driving the successful configuration and implementation of security solutions to reduce risk to an acceptable level...
...effective audit program.
Experience in auditing technical environment such as Cloud and DevSecOps practices.
Good knowledge of cyber security and technology general practices.
Good knowledge of audit methodology and techniques.
Good project management and...
...patented Attack Signal Intelligence, it empowers security teams to rapidly prioritize, investigate and respond to the most advanced cyber-attacks. With 35 patents in AI-driven threat detection and the most vendor references in MITRE D3FEND, organizations worldwide rely...
...and supporting the existing processes associated with Privileged Access Management activities.
You will need to work closely with Cyber Security teams, service desk leads, systems engineering, network security, audit, application developers, and other internal systems...
...posts:
Please be aware of fraudulent job postings that are not affiliated with Fiserv. Fraudulent job postings may be used by cyber criminals to target your personally identifiable information and/or to steal money or financial information.
Any communications...
...documentation related to our data security tools, policies, user communication, and training.
• You will work closely with our cyber security experts to ensure that all documentation meets the highest standards of clarity, accuracy, and relevance. Your contributions...
...As a cyber engineer, you will be responsible for developing and implementing security measures to safeguard computer systems, networks, and data against cyber threats. You will work closely with other IT professionals to design and deploy secure solutions.
Responsibilities...
...Program, conducting Phishing campaigns and other initiatives to educate and test the workforce, aiming to reduce susceptibility to cyber threats.
~Compile and analyze results from security initiatives, like Phishing campaigns, to identify trends, report on program effectiveness...
...patented Attack Signal Intelligence, it empowers security teams to rapidly prioritize, investigate and respond to the most advanced cyber-attacks. With 35 patents in AI-driven threat detection and the most vendor references in MITRE D3FEND, organizations worldwide rely...
...management experience in a project management role.
~ Fundamental knowledge of broad technology solutions including but not limited to: Cyber Security, Infrastructure & Networking, HR/Payroll, ERP, Finance.
~ Experience with project management tools and methodology....
...cybersecurity requirements across data security tool implementations
Utilize project management experience to ensure appropriate cyber resources are notified and tasked when needed
Complete assigned project tasks and deliverables for the various data security...
...Cyber Security Analyst is responsible for the real-time identification and alerting of information security events that pose an immediate risk to Sysco’s employees, customers, suppliers, shareholders, partners, or business operations.
Requirements
Cybersecurity...
...~Very detail and quality oriented.
~Experience working with the Elastic stack is a big plus!
About the Company:
Q6 Cyber is the leading E-Crime Intelligence company. We monitor the
“Digital Underground” - a vast universe where hackers, fraudsters...
...Excellent communication skills and the ability to operate independently as part of a distributed team
About the Company:
Q6 Cyber is the leading E-Crime Intelligence company. We monitor the
“Digital Underground” - a vast universe where hackers,...
...addressed with relevancy, accuracy and in a timely manner.
Define protocols and maturing of 'playbooks' for operational response to cyber threats.
Operate autonomously to further investigate and escalate in accordance with policies, procedures, and defined...