...effective audit program.
Experience in auditing technical environment such as Cloud and DevSecOps practices.
Good knowledge of cyber security and technology general practices.
Good knowledge of audit methodology and techniques.
Good project management and...
...subscriptions
Azure Blueprints
Azure Policies
Azure Resource Manager templates (ARM templates)/Bicep/Terraform
Nice to have:
Cyber security experience is desirable.
Certified Information Systems Security Professional (CISSP)
Microsoft Azure Solutions Expert...
...An important and internationally recognized company is looking for a Senior Cyber Security Engineer, trained to: •Responsible for completing proof-of-concept evaluations for such data protection, classification and discovery toolsets, and subsequent implementation of the...
...This role is responsible for executing Cybersecurity M&A due diligence and leading cyber integration planning, coordination, and reporting while partnering across multiple Cyber, business, and technology cross function teams.
Requirements
~ Execute Cybersecurity...
...Cyber Security Architect are responsible for guiding the design and implementation of secure solutions and services across our business and IT support areas. Driving the successful configuration and implementation of security solutions to reduce risk to an acceptable level...
...patented Attack Signal Intelligence, it empowers security teams to rapidly prioritize, investigate and respond to the most advanced cyber-attacks. With 35 patents in AI-driven threat detection and the most vendor references in MITRE D3FEND, organizations worldwide rely...
...Excellent communication skills and the ability to operate independently as part of a distributed team
About the Company:
Q6 Cyber is the leading E-Crime Intelligence company. We monitor the
“Digital Underground” - a vast universe where hackers,...
...~Very detail and quality oriented.
~Experience working with the Elastic stack is a big plus!
About the Company:
Q6 Cyber is the leading E-Crime Intelligence company. We monitor the
“Digital Underground” - a vast universe where hackers, fraudsters...
...As a cyber engineer, you will be responsible for developing and implementing security measures to safeguard computer systems, networks, and data against cyber threats. You will work closely with other IT professionals to design and deploy secure solutions.
Responsibilities...
...Program, conducting Phishing campaigns and other initiatives to educate and test the workforce, aiming to reduce susceptibility to cyber threats.
~Compile and analyze results from security initiatives, like Phishing campaigns, to identify trends, report on program effectiveness...
...documentation related to our data security tools, policies, user communication, and training.
• You will work closely with our cyber security experts to ensure that all documentation meets the highest standards of clarity, accuracy, and relevance. Your contributions...
...patented Attack Signal Intelligence, it empowers security teams to rapidly prioritize, investigate and respond to the most advanced cyber-attacks. With 35 patents in AI-driven threat detection and the most vendor references in MITRE D3FEND, organizations worldwide rely...
...management experience in a project management role.
~ Fundamental knowledge of broad technology solutions including but not limited to: Cyber Security, Infrastructure & Networking, HR/Payroll, ERP, Finance.
~ Experience with project management tools and methodology....
...build innovative and enterprise-level network security products and solutions, to protect online businesses from being interrupted by cyber attacks. We're a group of people passionate about challenging the status quo to solve the real world's cybersecurity problems...
...cybersecurity requirements across data security tool implementations
Utilize project management experience to ensure appropriate cyber resources are notified and tasked when needed
Complete assigned project tasks and deliverables for the various data security...
...patented Attack Signal Intelligence, it empowers security teams to rapidly prioritize, investigate and respond to the most advanced cyber-attacks. With 35 patents in AI-driven threat detection and the most vendor references in MITRE D3FEND, organizations worldwide rely...
...security, and at least 3 years in architecture.
Requirements
- Expert knowledge of network access control, zero trust, network and cyber security
- Prior experience with relevant industry regulations and security standards for the Tech Industry
- Experience with...
...Cyber Security Analyst is responsible for the real-time identification and alerting of information security events that pose an immediate risk to Sysco’s employees, customers, suppliers, shareholders, partners, or business operations.
Requirements
Cybersecurity...
...EMEA).
Preferred Qualifications:
- Experience: 7-10 years of relevant experience in Operational and Technology Audit, Risk Management, Cyber Security Compliance or Security Engineering preferably within the technology sector (Social Media, eCommerce, Fintech etc.) and/or...
...addressed with relevancy, accuracy and in a timely manner.
Define protocols and maturing of 'playbooks' for operational response to cyber threats.
Operate autonomously to further investigate and escalate in accordance with policies, procedures, and defined...
...methodologies.
Fundamental understanding of core business technologies including but not limited to CRM, ERP, Infrastructure, Network, Cyber and HRIS.
Understanding of Cost, Budget Mgmt and Risk Mgmt including Forecasting.
Experience with developing and...
...any other related field.Knowledge of external global payment compliance regulations and frameworks such as Safeguarding, PSD2, SCA, Cyber Hygiene, NYDFS, DSA, BSA/AML etc.
ByteDance is committed to creating an inclusive space where employees are valued for their skills,...
...organization as it enables us to reach thousands of potential customers every day to help them learn about what we’re doing to protect the cyber world from emerging threats. You'll be working collectively across our organization to better identify our impact on customers. As a...