The Security Manager will support the InfoSec team to deliver its objectives. Ensure compliance with relevant security standards, service management procedures, regulations, and industry best practices. Will produce the required security assurance documentation that is required for the accreditation of our customers, together with the Security Architects.
Source Job
20 jobs similar to Cyber Security Manager
Jobs ranked by similarity.
- Design, review and develop security architectures for systems and networks.
- Conduct security assessments and communicate identified risks from vulnerability scans.
- Collaborate with Product & Engineering teams ensuring security integration in projects.
Jobgether is a platform leveraging AI to match candidates with suitable job opportunities. They focus on ensuring a fair and objective candidate review process, and operate with AI powered matching and partner companies.
- Oversee security, compliance, and risk management of network infrastructure, ensuring the protection of critical assets and alignment with DoD standards.
- Design and implement security measures that safeguard the network from unauthorized access, vulnerabilities, and advanced threats.
- Manage the Risk Management Framework (RMF) process, ensuring systems remain secure and compliant with DoD requirements throughout their lifecycle.
TekSynap is a fast-growing high-tech company that understands both the pace of technology today and the need to have a comprehensive well-planned information management environment. They focus on nimbly utilizing the best that information technology offers to meet the business needs of Federal Government customers.
- Comprehend a client's compliance/risk/InfoSec environment and convey a high-value proposition.
- Facilitate product demonstrations and answer product questions.
- Consult clients on industry best practices as they learn about AuditBoard.
AuditBoard is the leading audit, risk, ESG, and InfoSec platform on the market, with more than 50% of the Fortune 500 leveraging their technology.
Lead and support customer security audits and respond to security questionnaires. Prepare, coordinate, and manage ISO 27001 audits. Ensure ongoing compliance with HIPAA, NIST CSF, and other regulatory requirements.
OneStudyTeam specializes in speeding up clinical trials and increasing the chance of new therapies being approved with the ultimate goal of improving patient outcomes.
As a Sr. Security Developer, you will collaborate with security and engineering leadership to architect a scalable and resilient vision for secure cloud environments. You will develop and implement programs to ensure the company’s systems are compliant with regulatory requirements and privacy laws. Act as a technical subject matter expert for cloud security requirements and initiatives.
Wealthsimple is on a mission to help everyone achieve financial freedom by reimagining what it means to manage your money.
- Lead the Cybersecurity Policy Program by overseeing the policy portfolio and identifying opportunities to enhance policy coverage.
- Review submissions, supervise evaluations, and provide contract input within the third-party risk assessment process.
- Support continuous compliance with PCI DSS and periodic user access recertification for critical systems and applications.
The New York Times is committed to being the world’s best source of independent, reliable and quality journalism that seeks the truth.
- Implement and maintain security measures to protect the organization's information assets and infrastructure.
- Support product and development teams on application security challenges, including threat modeling and architecture reviews.
- Support security incident response, perform root cause analysis, and drive remediation strategies.
insightsoftware is a global provider of comprehensive solutions for the Office of the CFO, transforming how teams operate and empowering leaders.
- Protecting cybersecurity cloud assets and delivering cybersecurity threat assessment, cyber intelligence, software security, and vulnerability assessment services.
- Identifying and prioritizing critical business functions in collaboration with organizational stakeholders by performing security reviews, identifying gaps in security architecture, and developing security risk management plans and system security plans.
- Evaluating cloud security architectures and designs to determine the adequacy of security design and architecture proposed or provided in response to requirements contained in acquisition documents.
Allied Consultants, Inc. is an Austin-based firm delivering technical and business professionals within Texas State Agencies for over 33 years. They value their consultants and are committed to providing an exceptional experience.
- Simulate attacks to uncover and report security vulnerabilities.
- Proactively take charge and adapt to new challenges.
- Contribute to thought leadership through social media platforms and industry events.
Resillion is a global company with end-to-end capabilities in cyber security, testing of digital media content and quality assurance with offices in North America, Europe, and Asia.
- Hardening of cloud based infrastructure.
- Creating/maintaining Vulnerability Management program.
- Implementation of security controls.
TrueAccord, a wholly owned subsidiary of TrueML, is a category-defining company combining machine learning with a human-based approach to transform debt resolution.
- Collaborate cross-functionally to design pragmatic security solutions.
- Implement and maintain security controls for corporate infrastructure.
- Respond to security incidents and conduct forensic investigations.
DNSFilter is revolutionizing network security by providing fast, accurate, and reliable threat protection and content filtering for businesses and organizations worldwide.
- Lead and mentor the app security team, fostering a culture of security awareness and continuous improvement across the organization.
- Oversee the day-to-day security operations, including monitoring, threat detection, incident response, and vulnerability management.
- Maintain an application security risk management framework, identifying, analyzing, and treating risks.
TrueML is a mission-driven financial software company that aims to create better customer experiences for distressed borrowers. The TrueML team includes inspired data scientists, financial services industry experts, and customer experience fanatics who are building technology to serve people in a way that recognizes their unique needs and preferences as human beings and endeavors to ensure nobody gets locked out of the financial system.
- Protecting data, products, and infrastructure against security threats.
- Meeting security and compliance services such as vulnerability management, security updates and upgrades, and intrusion response.
- Staying current with the latest Information Security trends and news.
Bounteous is a premier end-to-end digital transformation consultancy dedicated to partnering with ambitious brands to create digital solutions.
As an Information Security Officer at Form3, you'll play a pivotal role in strengthening and evolving our information security governance, risk, and compliance practices. Work closely with teams across the organization to embed security into business and technology decisions. Combine strategic oversight with practical execution, ensuring our controls, frameworks, and awareness initiatives remain industry leading as we scale globally.
Form3 is a company that offers a cloud-native, environment while helping define how security scales with the business.
- Ensure unwavering support for the Sales Team in pre-and post-sales endeavours.
- Drive impactful security meetings with customers and delivering compelling presentations at conferences.
- Collaborate seamlessly with internal teams, you will be vital in resolving security issues arising from investigations.
ServiceNow, founded in 2004, is a global market leader bringing innovative AI-enhanced technology to over 8,100 customers, including 85% of the Fortune 500®. Their intelligent cloud-based platform seamlessly connects people, systems, and processes to empower organizations. ServiceNow has a distributed team globally with a very collaborative and inclusive work environment.
Provide guidance to ensure project compliance to the United States Government Baseline (USGCB) for IT Security. Provide technical expertise of computer security laws, mandates, standards and policies in accordance with the Federal Information Security Management Act (FISMA). Represent the project in internal and external meetings, working groups, and integrated project teams to provide IT security compliance requirements.
DecisionPoint Corporation is seeking an Information Security Analyst to join our team!
- Define Canonical's security risk management standards and playbooks
- Analyse and improve Canonical's security risk practices
- Evaluate, select and implement new security requirements, tools and practices
Canonical is a pioneering tech firm at the forefront of the global move to open source. As the company that publishes Ubuntu, one of the most important open source projects, they recruit on a global basis and set a very high standard for people joining the company.
As a Compliance and Risk Specialist, you will support the Compliance and Risk team by leading compliance initiatives. You will conduct risk assessments and remediation activities. You will contribute to the development of security strategies for systems deployed globally.
Canadian Bank Note Company (CBN) is a trusted leader in secure technology solutions for governments and businesses worldwide.
- Lead the design, develop, and implementation of incident response playbooks.
- Be part of a weekly on-call rotation and support in detection engineering.
- Identify areas for security improvement and translate that into workable solutions.
Ping Identity's cloud identity platform enables secure and seamless digital experiences. They are headquartered in Denver, Colorado, with offices and employees around the globe, serving large enterprises.
- Own Swiftly's security risk register and threat models; identify, prioritize, and drive remediation of risks across application and infrastructure.
- Design secure architectures for our SaaS platform, mobile applications, and IOT/Hardware Integration, focusing on authentication, authorization, data protection, and network boundaries.
- Define and maintain security KPIs and dashboards for executive and board reporting.
Swiftly is on a mission to help cities move more efficiently and is the leading transit data platform for agencies to share real-time passenger information.