6 Jobs Found
Experience
-
1 to 4
Key
Skills -
nist cybersecurity framework,
nist csf controls testing,
cybersecurity controls testing,
control design assessment,
operating effectiveness testing,
governance risk and compliance,
grc,
internal audit,
risk assessment,
residual risk analysis,
exception management,
remediation tracking,
risk acceptance,
security compliance,
iam,
identity and access management,
network security,
endpoint security,
vulnerability management,
siem,
logging and monitoring,
incident response,
business continuity,
backup and recovery,
change management,
configuration management,
evidence review,
log analysis,
security architecture review,
test planning,
test execution,
control walkthroughs,
audit documentation,
executive reporting,
dashboards,
scorecards,
stakeholder communication,
servicenow grc,
auditboard,
cisa,
cissp,
cism,
crisc,
iso 27001,
comptia security plus,
comptia cysa.,
23
Days Ago
Experience
-
3 to 5
Key
Skills -
Cyber Security Operations,
Incident Response,
Threat Hunting,
Malware Analysis,
Digital Forensics,
SOAR Playbook Development,
Security Automation,
Workflow Integration,
SIEM,
EDR,
Vulnerability Management,
Rapid7,
CyCognito,
Zscaler ZIA,
Zscaler ZPA,
Akamai WAF,
CyberArk,
MITRE ATT&CK,
Threat Intelligence Platforms,
Security Monitoring,
Incident Containment,
Root Cause Analysis,
Analytical Skills,
Troubleshooting.,
47
Days Ago
Experience
-
10 to 15
48
Days Ago
Experience
-
15 to 17
Key
Skills -
Project Management,
Program Management,
Informatica,
CyberArk,
Checkmarx,
Qualys,
Cisco ACI,
Palo Alto Email Security,
AWS Security,
Azure Security Center,
Cloud Security Architecture,
Network Security,
Application Security,
Vulnerability Management,
Identity and Access Management,
Security Compliance,
Risk Management,
DevSecOps,
Infrastructure Security,
Bioinformatics (Nice to have),
PMP Methodologies,
Agile and Waterfall,
Stakeholder Communication,
Leadership,
Team Management,
Security Audits,
Regulatory Standards,
60
Days Ago
Experience
-
3 to 5
Key
Skills -
Incident Response (IR),
Threat Hunting,
Root Cause Analysis (RCA),
Playbook Execution and Automation,
Alert Tuning and Detection Rule Optimization,
Zscaler,
Wiz,
CyberArk,
Vulnerability Management and Remediation,
SOC Workflow and Process Improvement,
Documentation and Compliance Reporting,
Mentoring and Training L1 SOC Analysts.,
93
Days Ago