- Optiv (Atlanta, GA)
- …physical security assessments, and social engineering + An Attack & Penetration Senior Consultant also contributes to developing and continuously ... resources expected to be strong in both technical and soft skills. A Consultant must be a proven self-starter with the ability to problem-solve, communicate,… more
- AON (New York, NY)
- Aon is looking for a Cyber Security Advisory Consulting Sr. Consultant - Defense and Transformation This Defense and Transformation service line Sr. Consultant ... location is flexible. Your impact as a Cyber Security Advisory Consulting Sr. Consultant Job Responsibilities: This role will be part of a multi-functional Proactive… more
- Deloitte (Tulsa, OK)
- …to clients through following key areas: + Threat detection and response + Attack surface management + Threat Intelligence + Threat Hunting + Data Protection Work ... Anti-Virus, Sandboxing, network- and host- based firewalls, Threat Intelligence, Penetration Testing, etc. + Extensive knowledge of Advanced Persistent Threats… more
- Raymond James Financial, Inc. (Denver, CO)
- …office location._ **Job Summary:** The financial services industry is constantly under attack by sophisticated cyber adversaries that range from nation states to ... Duties and Responsibilities:** * Role is focused on reducing the vulnerability attack surface by implementing technologies and processes to detect, report and… more
- Cherry Bekaert (Raleigh, NC)
- …the areas of Cybersecurity Advisory, Managed Security Services, Vulnerability Assessments, Attack & Penetration Studies, Incident Response and Threat Management, ... experience in cybersecurity position including 4 years working in a consultant environment; valid cybersecurity certification (eg, CISA, CISSP, CEH); experience with… more
- United Airlines (Chicago, IL)
- …accordance with United's secure development standards. The Principal Architect is a senior level position that works closely with development teams, product teams, ... application security/coding standard methodologies. + Sought out as a trusted advisor/ consultant and assists in the creation of security designs, requirements, risk… more