Careers In CyberSecurity

 

Our work environment for cyber professionals is dynamic and exciting, with competitive salaries and growing opportunities.  Cybersecurity professionals often thrive in an informal atmosphere, unconventional working hours, and shifting work responsibilities aimed at keeping knowledge fresh and work exciting.  There are many different jobs within our cybersecurity disciplines that require a broad range of knowledge, skills and abilities.

 

Our Cybersecurity professionals must have the ability to rapidly respond to threats as soon as they are detected.  Our professionals possess a range of technical abilities to perform a variety of activities, and are able to work in different locations and environments.  Our customers are varied and demanding. Our Cybersecurity work includes information security architecture and analysis, security engineering, training, project management, and the analysis of policies, trends, and intelligence to better understand how an adversary may think or act - challenging your problem solving skills like those of a detective. This level of work complexity requires our cybersecurity workforce to possess both a wide array of technical IT skills and business acumen along with advanced analysis capabilities.

 

If you are up to the challenge and a team player, please scroll through our openings to see if CyberSecurity4Hire is right for you!

 

Cloud Security
Cloud Security

Considered a security and technical expert in cloud security technology, designs, systems implementation and integration, with deep, specialized knowledge of our cloud strategy, including all of our affiliates systems and applications.

Security Analyst
Security Analyst

Apply the guidance provided in all relevant information security frameworks, industry standards and guidelines such as the National Institute of Standards and Technology (NIST), ISO 27001/27002, HITECH/HIPAA, SOX, FFIEC, OWASP in the delivery of IT security services.

Security Assessment
Security Assessment

As a global cyber security expert in security measures and compliance, the role will institutionalize/implement full life cycle compliance and governance frameworks including: ownership of cyber security assessments, partnering with stakeholders to acquire needed cyber-related information, tracking progress against vulnerability remediation plans, reporting results at all levels in the organization, understanding (functional/technical) integration/connections, etc.

Computer Forensics
Computer Forensics

A strong understanding of Windows based systems including installing, troubleshooting, and networking. Linux and UNIX experience is a plus. Knowledge of EnCase or Forensic Toolkit or SMART or open source (Linux) forensic tools such as SIFT. An understanding of data collection & preservation principles.

Security Training
Security Training

Fast-growing premier cybersecurity company is expanding its security, privacy, and incident response practices. Our teams provide full-scope IT Security services including: Security Architectures, Strategic Planning, Security Control Assessments, Penetration Testing, Engineering, Privacy, Internal Controls, Security Operations Center, and Incident Response.

Incident Response
Incident Response

Uses threat intelligence information to understand the techniques, tactics, and procedures used by attackers in the kill chain. Work with asset owners, infrastructure and support teams, stakeholders, Security Operations, and management teams during high severity incidents to develop and execute high level remediation plans, author incident findings and lessons learned. Investigate suspicious anomalous activity based on data alerts or data outputs from various toolsets.

Compliance - Security Audits
Compliance - Security Audits

IT Risk Advisors and Security Auditors work closely with managers and are responsible for all phases of project and engagement management for multiple clients in a wide variety of industries delivering a full range of IT Governance, Risk and Compliance (GRC) services to our clients. Responsibilities include the overall planning, direction and completion of IT internal audits, Risk Management, IT operations reviews, and IT activities related international standards.

Affiliate Networks
Affiliate Networks

Describe your image.

Penetration Testing
Penetration Testing

Describe your image.

Mobility
Mobility

Describe your image.

Application Security
Application Security

Conduct security architecture reviews on existing technology and offer plans for remediation. Work with enterprise architects and developers to design optimal security practices when developing new application functionality. Mitigate security risks associated with projects, which have a high technical complexity and/or involve significant challenges to the business.

Disaster Recovery
Disaster Recovery

Describe your image.

Network Security Engineer
Network Security Engineer

Describe your image.

Project Management
Project Management

Describe your image.

SIEM - Data Analytics
SIEM - Data Analytics