Careers In CyberSecurity
Our work environment for cyber professionals is dynamic and exciting, with competitive salaries and growing opportunities. Cybersecurity professionals often thrive in an informal atmosphere, unconventional working hours, and shifting work responsibilities aimed at keeping knowledge fresh and work exciting. There are many different jobs within our cybersecurity disciplines that require a broad range of knowledge, skills and abilities.
Our Cybersecurity professionals must have the ability to rapidly respond to threats as soon as they are detected. Our professionals possess a range of technical abilities to perform a variety of activities, and are able to work in different locations and environments. Our customers are varied and demanding. Our Cybersecurity work includes information security architecture and analysis, security engineering, training, project management, and the analysis of policies, trends, and intelligence to better understand how an adversary may think or act - challenging your problem solving skills like those of a detective. This level of work complexity requires our cybersecurity workforce to possess both a wide array of technical IT skills and business acumen along with advanced analysis capabilities.
If you are up to the challenge and a team player, please scroll through our openings to see if CyberSecurity4Hire is right for you!
Cloud SecurityConsidered a security and technical expert in cloud security technology, designs, systems implementation and integration, with deep, specialized knowledge of our cloud strategy, including all of our affiliates systems and applications.
Security AnalystApply the guidance provided in all relevant information security frameworks, industry standards and guidelines such as the National Institute of Standards and Technology (NIST), ISO 27001/27002, HITECH/HIPAA, SOX, FFIEC, OWASP in the delivery of IT security services.
Security AssessmentAs a global cyber security expert in security measures and compliance, the role will institutionalize/implement full life cycle compliance and governance frameworks including: ownership of cyber security assessments, partnering with stakeholders to acquire needed cyber-related information, tracking progress against vulnerability remediation plans, reporting results at all levels in the organization, understanding (functional/technical) integration/connections, etc.
Computer ForensicsA strong understanding of Windows based systems including installing, troubleshooting, and networking. Linux and UNIX experience is a plus. Knowledge of EnCase or Forensic Toolkit or SMART or open source (Linux) forensic tools such as SIFT. An understanding of data collection & preservation principles.
Security TrainingFast-growing premier cybersecurity company is expanding its security, privacy, and incident response practices. Our teams provide full-scope IT Security services including: Security Architectures, Strategic Planning, Security Control Assessments, Penetration Testing, Engineering, Privacy, Internal Controls, Security Operations Center, and Incident Response.
Incident ResponseUses threat intelligence information to understand the techniques, tactics, and procedures used by attackers in the kill chain. Work with asset owners, infrastructure and support teams, stakeholders, Security Operations, and management teams during high severity incidents to develop and execute high level remediation plans, author incident findings and lessons learned. Investigate suspicious anomalous activity based on data alerts or data outputs from various toolsets.
Compliance - Security AuditsIT Risk Advisors and Security Auditors work closely with managers and are responsible for all phases of project and engagement management for multiple clients in a wide variety of industries delivering a full range of IT Governance, Risk and Compliance (GRC) services to our clients. Responsibilities include the overall planning, direction and completion of IT internal audits, Risk Management, IT operations reviews, and IT activities related international standards.
Application SecurityConduct security architecture reviews on existing technology and offer plans for remediation. Work with enterprise architects and developers to design optimal security practices when developing new application functionality.
Mitigate security risks associated with projects, which have a high technical complexity and/or involve significant challenges to the business.