Submitting more applications increases your chances of landing a job.
Here’s how busy the average job seeker was last month:
Opportunities viewed
Applications submitted
Keep exploring and applying to maximize your chances!
Looking for employers with a proven track record of hiring women?
Click here to explore opportunities now!You are invited to participate in a survey designed to help researchers understand how best to match workers to the types of jobs they are searching for
Would You Be Likely to Participate?
If selected, we will contact you via email with further instructions and details about your participation.
You will receive a $7 payout for answering the survey.
Information that should not be disclosed: 1.
Sensitive information related to company operations, Firewall, WAF, SIEM, AV, EDR, Proxy.
2. Plans for deployment and internal programs.
3. Transfer of sensitive information to affected parties.
4. Activities relating to security incidents:a.
Identification of affected systems.
b. Attack vectors and affected applications.
c. Containment of the incident and affected critical applications.
d. Analysis of the incident for lessons learned.
5. Details of the incident externally or publicly.
6. Disabling networks or critical infrastructure .
7. Policies related to information handling and coordination with internal teams.
8. Information security and communications for business continuity and legal obligations.
9. Contact and coordination with regulators and relevant authorities in case of serious incidents 10.
Access the server using the specified IP address.
11. The existing contracts must be evaluated with clear and explicit confirmation from the legal departments, after reviewing the requirements and the relevant technical documentation.
12. Identified issues must be addressed according to the inspection reports.
13. The plan must be reviewed and updated if necessary to ensure it aligns with current operational requirements.
14. All necessary steps, approvals, and security measures must be implemented for the protection and smooth operation of the targeted systems.
15. The installations were equipped with monitoring devices for cameras and sensors, IDS/IPS monitoring, file protection, inspection of ports and connections, and other security measures.
Education: Bachelor’s degree in Computer Science, Information Security, or a related field (Master’s preferred).
Certifications: Required: CISSP or CASP (or equivalent advanced security certification).
Preferred: CCNA (Networking), GSEC, or SCS.
Experience: 5+ years of hands-on experience in cybersecurity engineering, security operations, or network defense.
Proven experience with enterprise-grade security tools and infrastructure protection.
Strong understanding of threat modeling, risk assessment, and incident management.
Technical Skills: Deep knowledge of TCP/IP, routing, and network protocols.
Experience with SIEM, EDR, IDS/IPS, WAF, and cloud security solutions.
Familiarity with scripting or automation (Python, PowerShell, Bash.
You'll no longer be considered for this role and your application will be removed from the employer's inbox.