New
The Director of Security/GRC will own and scale the security team and corporate security systems while leading governance, risk, and compliance initiatives. The role encompasses managing various security programs and ensuring compliance with standards such as ISO 27001, SOC 2 Type 2, and CMMC.
Posted 42 days ago
Translate security policies into actionable plans.
Lead security initiatives across multiple domains.
Posted 25 days ago
Oversee technical sales for Zero Trust architectures.
Lead hands-on technical POV engagements.
Posted 4 days ago
Guide complex sales cycles as an SME.
Support core AEs in federal opportunities.
Posted 39 days ago
Provide technical leadership for Zero Trust Browser.
Lead executive meetings presenting browser security strategies.
Posted 35 days ago
Lead security and infrastructure strategy.
Manage and develop security teams.
Posted 22 days ago
Secure infrastructure, endpoints, servers, and assets.
Focus on Data Protection and DLP solutions.
Posted 20 days ago
Manage daily enterprise security operations.
Oversee SaaS security and IdP configurations.
Posted 12 days ago
Improve email security posture.
Implement and tune DLP controls.
Posted 19 days ago
Own and enhance DLP security posture.
Reduce data exposure risks through audits and remediation.
Posted 17 days ago
Create technical product presentations for prospective customers.
Lead product evaluations and configurations.
Posted 15 days ago
Evaluate and deploy AI tools with risk controls.
Manage vulnerability management across infrastructure and applications.
Posted 15 days ago
Provide first-line IT support and resolve issues.
Manage the full lifecycle of endpoint devices.
Posted 42 days ago
Translate security policies into actionable plans.
Lead security initiatives across multiple domains.
Posted 40 days ago
Lead transformative planning engagements across the AMER region.
Architect scalable Anaplan solutions aligned with customer goals.
Posted 40 days ago
Collaborate with senior leaders on planning strategies.
Architect scalable solutions using Anaplan.
Posted 39 days ago
Develop and retain a high-performing team.
Lead financial ops process evaluation and redesign.
Posted 39 days ago
Lead and manage financial operations teams.
Transform financial processes for efficiency.
Posted 35 days ago
Configure ServiceNow GRC/IRM modules.
Implement risk frameworks and policies.
Posted 35 days ago
Oversee service management and operations processes.
Lead operational oversight of service management platforms.
Posted 35 days ago
Lead SOC team on-site for government contract.
Oversee security operations and incident response activities.
Posted 27 days ago
Drive planning and execution of security initiatives.
Coordinate work across various teams.
Posted 26 days ago
Lead the development of AI platforms and infrastructure.
Build and operate scalable AI systems enterprise-wide.
Posted 26 days ago
Lead and manage complex multi-workstream programs.
Ensure effective governance and value realization.
Posted 24 days ago
Define connections between GTM platforms.
Translate strategy into scalable designs.
Posted 17 days ago
Lead strategic initiatives in healthcare.
Empower transformations within healthcare systems.
Posted 17 days ago
Lead the quarterly Cash Flow Testing and C3P1 capital production.
Maintain and enhance the end-to-end CFT process.
Posted 13 days ago
Serve as a technical authority for key accounts.
Advise on technology strategy and enterprise transformation.
Posted 14 days ago
Support IT compliance initiatives.
Provide helpdesk assistance.
Posted 14 days ago
Establish governance and standardization across client accounts.
Manage the account Champions Program to enhance collaboration.
Posted 10 days ago
Advise on corporate and securities matters.
Assist with public company reporting obligations and filings.
Posted 10 days ago
Define the technical foundation for AI governance.
Design systems for AI audit events and policy enforcement.
New
Drive AI adoption across large customers.
Manage relationships with C-Suite stakeholders.
Posted 28 days ago
Lead the development of web applications.
Provide technical leadership and oversight.
Posted 19 days ago
Own and enhance DLP security posture.
Reduce data exposure risks through audits and remediation.
Posted 51 days ago
Drive product innovation and integration with Microsoft Intune
Align RMM product strategy with MSP needs
Posted 51 days ago
Build a new team to defend critical assets against advanced threats
Contribute to the security of the global open source ecosystem
Posted 51 days ago
Designing and operating a Security Operations Center
Implementing security software and platforms
Posted 51 days ago
Hiring experienced Security Operations Engineers
Building robust security practices and tools
Posted 51 days ago
Recruiting experienced Security Operations Engineers
Improving security practices and standards
Posted 51 days ago
Build a world-class SecOps team
Defend critical assets against advanced threats
Posted 51 days ago
Defend critical assets against advanced threats
Enhance security of the open source supply chain
Posted 51 days ago
Offer remote InfoSec job opportunities
Highlight key security responsibilities
Posted 51 days ago
Protect digital assets through advanced security testing
Identify and remediate system vulnerabilities
Posted 51 days ago
Assess and manage third party security risks
Ensure compliance with industry standards and regulations
Posted 51 days ago
Lead team in developing compliance features, Drive initiatives to enhance device security,
te with product and design teams, Build scalable frontend and backend applications, Implement agile
Posted 51 days ago
Ensure integrity, confidentiality, and availability of information systems
Lead LiSaaS authorization process effectively
Posted 51 days ago
Ensure integrity, confidentiality, and availability of information systems
Lead LiSaaS authorization process
Posted 51 days ago
Establish a new team of Security Operations Engineers at Canonical.
Enhance security measures for critical assets and high-value cyber targets.
Posted 51 days ago
Support development of cybersecurity policies
Identify and address access control gaps