It Security And Ethical Hacking Jobs

Currently, there are no It Security And Ethical Hacking jobs available which match this search. You may wish to explore similar job titles on the IT jobs page or view related jobs below.
Here are some related jobs:
Raytheon IIS is looking for individuals who can support the development and deployment of information technology services for an overseas location. The Situation Awareness Team Lead manages the Cyber Engineer, Sensor Analyst and the Vulnerability & Assessment Analyst within the Cyber Security Operations Center (CSOC) supporting the clients and the Computer Network Defense (CND) mission. The lead's...
Job Details: Job Title: Enterprise Network Security Engineer Job Category: Information and Product Security This role is for an advanced network engineer with a knack for security. You have a deep technical curiosity and thrive when given opportunity to probe and investigate. Beyond a strong set of technical skills, you should be comfortable understanding, analyzing and communicating security ...
**Must have an active Secret Security Clearance** Please be aware that this position requires a security clearance, or the ability to obtain one. Security clearances may only be granted to U.S. Citizens. In addition, applicants who accept a conditional offer of employment may be subject to government security investigation(s) and must meet the eligibility requirements for access to classified inf...
Kimberly-Clark Corporation Neenah, WI, 54957
Information Security jobs / Remote Work Arrangement Available jobs at Kimberly-Clark The IT Security Engineer - Web Security is responsible for the identification, tracking, mitigating, remediation, and verification of web security vulnerabilities in software, systems, and application services. IT Security Engineer - Web Security Req. 140000OO The candidate will combine experience in informati...
Sony Pictures Imageworks Culver City, CA, 90231
The Information/Application Security Manager reports to the regional Executive Director in delivering the Information Security program initiatives. The Information/Application Security Manager has strong ethical hacking and penetration testing experience. This position requires expertise regarding security vulnerabilities, application analysis, malware analysis, protocol analysis, and debugging. ...
Job Description Performs complex (journey-level) information security and enterprise risk management work in support of the Texas Department of Motor Vehicles (TxDMV), Information Technology (IT) Services Division. Reports to the agency Information Security Officer (ISO). Performs assessments of IT risks. Researches, analyzes, and evaluates security and risk management controls, participates in t...
Information Security Analyst Primary responsibility for Ethical Hacking (CEH) with database penetration in a McAfee SIEM environment. Responsibilities  Partner with the Information Technology (IT) Department to remediate security alerts and respond to information security incidents that could potentially impact the network, systems and applications at the Client  Monitor security functionali...
*This position requires working night shifts* As a Network Security Analyst, the incumbent applies technical and functional expertise to support computer network defense operations for large scale enterprise networks. Responsibilities include: Conduct network monitoring and intrusion detection analysis using various Computer Network Defense (CND) tools, such as Intrusion Detection/Prevention Sy...
The Company Go beyond. At Towers Watson, we are more than individuals. We are a community focused on helping our colleagues and clients thrive and succeed. Towers Watson is a leading global professional services company that helps organizations improve performance through effective people, risk and financial management. With more than 14,000 associates around the world, we offer consulting, techn...
Application Security Architect Job Type: Full-Time Location: San Mateo, CA Department: Security RingCentral provides cloud computing based business phone systems designed for today's mobile and distributed business world. The RingCentral technology platform eliminates the need for expensive and technically complex on-premise legacy phone systems. By combining a hosted, multi-extension business...
Join a growing, fast-paced and high-performance Cyber Security team. Information security is an integral part of Visa’s corporate culture. It is essential to maintaining our position as an industry leader in electronic payments, and it is the responsibility of each and every employee to safeguard information, protect it from unauthorized access, and ensure regulatory compliance. Information securi...
We have openings for our 2015 Internship Program in IT Security. Our internship will provide students with practical work experience designed to expand their classroom education and career path as they prepare for a profession in the field of Information Security, Cyber Security, or Computer Forensic Science. Company Overview: HomeServe USA, rated a 2014, Top Work Place, is a leader in supply...
Job Summary: This position is a lead security analyst within IT Security Governance and IT Security Operations. Responsibilities: IT Security Operations: Monitor the effectiveness of the Enterprise wide information security program and Architecture. Responsible for investigating possible security violations. Analyze and recommend action on security related incidents; notify appropriate owner...
PricewaterhouseCoopers Tampa, FL, 33602
US IT supports and develops internal systems and applications for use by PWC staff in all areas of the Firm. UK/US Enterprise Information Security & Assurance (EISA) provides security monitoring, assurance and testing services to the UK, US, Brazil and SSA Firms. Security Intelligence & Response is a team under the Enterprise Security Information & Assurance organization charged with investigati...
Hewlett-Packard Company Palo Alto, CA
Senior IT Security Consultant - 1215452 Description Key Roles and Responsibilities · Conduct vulnerability assessments, threat modeling, code review (and audit), penetration testing and SDLC support · Provide consultancy and vulnerability recommendation to clients · Provide technical report based on the vulnerability findings · Provide technical training to junior members of the team · Able...
ARRIS Group, Inc. Suwanee, GA, 30024
DIRECTOR OF INFORMATION SECURITY ARRS2014 Summary of work IT Security Management Staff Management & Development Financial Planning & Management Strategic Planning Subcontractor Management Information Security Governance Security Incident and Vulnerability Management Business Partnerships Logging and Security Services Management Communications and Coordination Coordination with physica...
Kellogg Company Brook, IL
WHAT DO I NEED TO DEMONSTRATE? At Kellogg Company, we recruit the best people to help grow our business and build on our success. To be considered for this position you must be able to demonstrate the following: Required: Demonstrated track record of responding to and defending against software and hardware vulnerabilities. Exposure and knowledge of deploying and configuring scanning and analy...
Portland General Electric Portland, OR, 97228
APPLICATION DEADLINE: Open until filled Portland General Electric values the energy of teamwork, diversity, and innovation to provide our customers with safe and reliable power. As Oregon's largest provider of electric service, PGE is helping shape Oregon's energy future. Among the millions of ordinary jobs in the world are a few special places —team-driven environments with the resources and sup...
Position Description Associate - Technology Risk Advisory - Privacy/Security IT Compliance We are currently looking for a Consultant for our technology risk advisory practice. The candidate will work with teams of information technology staff in a wide variety of systems environments. Our Technology Risk Advisory Services group serves the technology risk related needs of our clients. This group ...
PricewaterhouseCoopers Tampa, FL, 33602
US IT supports and develops internal systems and applications for use by PWC staff in all areas of the Firm. US IT supports and develops internal systems and applications for use by PWC staff in all areas of the Firm. Security Intelligence & Response is a team under the Enterprise Security Information & Assurance organization charged with investigating and responding to security incidents affect...

Get new jobs by email for this search
We'll keep looking and send you new jobs that match this search.
email me

Upload your resume and let employers find you!
It's that simple!

IT Career Tools

Security Officer

Salaries

$16,640.00 - $38,563.00
Typical Salary for Security Officer
(848 Respondents)
Source: Monster.com Careerbenchmarking Tool

Education / Training

Some College Coursework Completed
34.4%
High School
23.1%
Bachelor's
18.8%
Associates
14.3%
Certification
3.4%
Master's
2.6%
(727 Respondents)
Source: Monster.com Careerbenchmarking Tool

Popular It Security And Ethical Hacking Articles

Certification: Certified Ethical Hacker Article Rating
With this credential, techies hack in an above-the-board manner to uncover system and network vulnerabilities -- before criminals do.
For Employers: Post Jobs | Search Resumes | Advertise
About Monster | Work for Monster | Advertise with Us | AdChoices | Partner with Us | Investor Relations | Social Media
Terms of Use | Privacy Center | Accessibility Center | Help | Security | Contact Us | Sitemap | Mobile
©2014 Monster - All Rights Reserved U.S. Patents No. 5,832,497; 7,599,930 B1; 7,827,125 and 7,836,060 MWW - Looking for Monster Cable? - V: 2014.4.60.60-312
eTrustLogo