Careers In CyberSecurity

 

Our work environment for cyber professionals is dynamic and exciting, with competitive salaries and growing opportunities.  Cybersecurity professionals often thrive in an informal atmosphere, unconventional working hours, and shifting work responsibilities aimed at keeping knowledge fresh and work exciting.  There are many different jobs within our cybersecurity disciplines that require a broad range of knowledge, skills and abilities.

 

Our Cybersecurity professionals must have the ability to rapidly respond to threats as soon as they are detected.  Our professionals possess a range of technical abilities to perform a variety of activities, and are able to work in different locations and environments.  Our customers are varied and demanding. Our Cybersecurity work includes information security architecture and analysis, security engineering, training, project management, and the analysis of policies, trends, and intelligence to better understand how an adversary may think or act - challenging your problem solving skills like those of a detective. This level of work complexity requires our cybersecurity workforce to possess both a wide array of technical IT skills and business acumen along with advanced analysis capabilities.

 

If you are up to the challenge and a team player, please scroll through our openings to see if CyberSecurity4Hire is right for you!

 

Cloud Security
Considered a security and technical expert in cloud security technology, designs, systems implementation and integration, with deep, specialized knowledge of our cloud strategy, including all of our affiliates systems and applications.
Security Analyst
Apply the guidance provided in all relevant information security frameworks, industry standards and guidelines such as the National Institute of Standards and Technology (NIST), ISO 27001/27002, HITECH/HIPAA, SOX, FFIEC, OWASP in the delivery of IT security services.
Security Assessment
As a global cyber security expert in security measures and compliance, the role will institutionalize/implement full life cycle compliance and governance frameworks including: ownership of cyber security assessments, partnering with stakeholders to acquire needed cyber-related information, tracking progress against vulnerability remediation plans, reporting results at all levels in the organization, understanding (functional/technical) integration/connections, etc.
Computer Forensics
A strong understanding of Windows based systems including installing, troubleshooting, and networking. Linux and UNIX experience is a plus. Knowledge of EnCase or Forensic Toolkit or SMART or open source (Linux) forensic tools such as SIFT. An understanding of data collection & preservation principles.
Security Training
Fast-growing premier cybersecurity company is expanding its security, privacy, and incident response practices. Our teams provide full-scope IT Security services including: Security Architectures, Strategic Planning, Security Control Assessments, Penetration Testing, Engineering, Privacy, Internal Controls, Security Operations Center, and Incident Response.
Incident Response
Uses threat intelligence information to understand the techniques, tactics, and procedures used by attackers in the kill chain. Work with asset owners, infrastructure and support teams, stakeholders, Security Operations, and management teams during high severity incidents to develop and execute high level remediation plans, author incident findings and lessons learned. Investigate suspicious anomalous activity based on data alerts or data outputs from various toolsets.
Compliance - Security Audits
IT Risk Advisors and Security Auditors work closely with managers and are responsible for all phases of project and engagement management for multiple clients in a wide variety of industries delivering a full range of IT Governance, Risk and Compliance (GRC) services to our clients. Responsibilities include the overall planning, direction and completion of IT internal audits, Risk Management, IT operations reviews, and IT activities related international standards.
Affiliate Networks
Describe your image.
Penetration Testing
Describe your image.
Mobility
Describe your image.
Application Security
Conduct security architecture reviews on existing technology and offer plans for remediation. Work with enterprise architects and developers to design optimal security practices when developing new application functionality.
Mitigate security risks associated with projects, which have a high technical complexity and/or involve significant challenges to the business.
Disaster Recovery
Describe your image.
Network Security Engineer
Describe your image.
Project Management
Describe your image.
SIEM - Data Analytics
Show More
  • Twitter Social Icon
  • LinkedIn Social Icon

© 2016 CyberSecurity For Hire, LLC.  All Rights Reserved. | Privacy Policy

Affiliate Networks

Describe your image.