- Enhance and manage enterprise identity and access management (IAM) systems.
- Focus on access governance, identity lifecycle management, and risk mitigation.
- Implement and optimize IAM controls, support audits, and provide technical expertise.
Shape the future of secure product development by embedding security into every stage of the SSDLC. Partner with Development and SRE teams to ensure our cloud-native platform is resilient and scalable. Guide secure design, and drive security maturity across R&D.
Detect, analyze, and respond to security events and incidents across cyber, DLP, fraud, and privacy functions. Operate advanced monitoring and investigation tools. Perform malware analysis and study attacker tactics, techniques, and procedures. Improve detection rules and reduce false positives through purple team engagements. Document incidents, provide reports, and collaborate across teams.
Act as a trusted advisor for a portfolio of clients, helping them strengthen their cybersecurity posture through effective adoption and continuous use of advanced security validation solutions. Guide customers through onboarding, drive measurable outcomes, and ensure long-term satisfaction by aligning technical capabilities with strategic goals. Work cross-functionally, translate customer needs into actionable strategies, mitigate risks, and support ongoing maturity in security validation programs.
The Staff Cyber Systems Engineer will deliver and maintain large, complex Access Management Administration systems, leveraging leading-edge technology to position the organization for success and serve as a senior technical expert responsible for the design & implementation of enterprise access management platforms within the authentication and identity lifecycle.
The Information Security Analyst is responsible for operations and administration of the organizationโs enterprise security solutions and processes, investigates and responds to enterprise security events and requests, and performs network security monitoring and incident response.
As a security-focused software engineer, you will go beyond traditional application security by auditing and writing secure Rust code, conducting code audits, and leveraging machine learning to enhance security. You'll assist in developing secure software, perform vulnerability analysis, design ML models for security, manage bug bounties, integrate security best practices, and assess risks. This role shapes the security landscape of decentralized applications and protocols.
The Principal Research Analyst at ISACA leads the development, delivery, and continuous enhancement of high-quality content, guidance, and practitioner aids for their assigned area of expertise. This role partners closely with business units, marketing, events teams, and ISACA leadership to integrate practice-area content consistently across conferences.
Cyber Offense and Defense Experts (CODEX) is seeking a cyber engineer to join our team to solve real-time cyber challenges, working on site with our end users in their spaces. Applicants will join a team of developers building high impact native applications for mobile devices, with continuous and meaningful feedback from users. Applicants are expected to integrate reverse engineering results into development products and expand their knowledge of the mobile platform to meet development objectives and customer requirements.