Average salary: $9,500 /yearly
More statsSearch Results: 13 vacancies
...traversal, authentication bypass,
General technical cyber security skills including potentially skills from either an offensive or defensive perspective.
The person may:
Possess skills in monitoring open source vulnerability information.
Have experience...
Suggested
Contract work
Local area
Remote job
...do. The R&D centers we operate for the government create lasting impact in fields as diverse as cybersecurity, healthcare, aviation, defense, and enterprise transformation. We're making a difference every day-working for a safer, healthier, and more secure nation and world....
Suggested
Hybrid work
Shift work
...traversal, authentication bypass.
General technical cyber security skills including potentially skills from either an offensive or defensive perspective.
Possess skills in monitoring open-source vulnerability information.
Have experience triaging vulnerabilities...
Suggested
Contract work
...encryption)
* Network security architecture concepts including topology, protocols, components, and principles (e.g. application of defense-in-depth)
* In implementing, maintaining, and improving established network practices
* In configuring and utilising computer protection...
Suggested
Contract work
Temporary work
Work at office
Immediate start
...rights researchers are committed to promoting social progress, enhancing public understanding of human rights issues, and realizing the defense of human rights.
Requirements:
1. Data collection and analysis: Human Rights Fellows are required to collect data from a variety...
Suggested
Remote job
Local area
Work from home
...experience managing/maintaining logging and SIEM technologies
2. Demonstrated knowledge of cyber security principles and processes in a defensive context
3. Demonstrated ability to develop alerting rules and dashboards to assist with threat detection and incident response....
Suggested
Contract work
...effectively tailor communication and communication style
perform high level research, complex analysis and problem solving to form defensible conclusions based on clear evidence
develop and manage key strategic relationships with a broad range of internal and external...
Suggested
Contract work
...together – Today the modern enterprise is an Enterprise of Things. We are on a mission to secure the Enterprise of Things with active defense by identifying, segmenting, and enforcing compliance of every connected thing in a real-time and at scale. Our unified security...
Suggested
Online
Worldwide
...willingness to relocate to Austria. We offer full visa sponsorship. The following roles are currently available:
Cyber Security Defense Operator / Analyst
Cyber Security Detection Analyst
Cyber Security Service Manager
IT Security System Engineer...
Suggested
Full time
Online
Relocation
...frameworks designed to withstand advanced cyber threats.
Enough about us, let's talk about you.
Your skills in offensive, defensive, security testing, cyber strategies, identity and access management, threat intelligence, digital forensics, and protecting data...
Suggested
Full time
Freelance
Flexible hours
...and Compliance (GRC) requirements across all IT/OT areas.
Additionally youll provide technical leadership in the overall Cyber Defense by ensuring Security Design & Architecture Security Operations Incident Response Forensics Penetration Testing Network Systems and Application...
Suggested
Full time
Online
Relocation
Hybrid work
...remediation efforts.
Stay informed about the latest cybersecurity threats vulnerabilities and industry trends to inform proactive defense strategies.
Australian Citizen with baseline clearance
#splunk #cloud #soar #soc #australiancitizen #dashboard #canberra...
Suggested
Full time
...cyber threat intelligence, threat hunting, and vulnerability management activities
Desirable criteria
1. Experience with cloud defensive tools, such as Microsoft 365 Defender, Sentinel, AWS GuardDuty, and Splunk Cloud
2. Strong knowledge of incident response...
Suggested
Contract work