Adapture is hiring a Security Analyst for a remote position. Apply today! https://hubs.la/Q02F54Tf0
Interest
Skip to main content
Adapture is hiring a Security Analyst for a remote position. Apply today! https://hubs.la/Q02F54Tf0
Pro Pen-Tester | Soc Analyst | Bug Hunter | Azure Cloud Security Engineer | CEO of Pak Cyber Wing Online Cyber Security Training Institute
2wInterest
To view or add a comment, sign in
(ISC)² Member-CC | SANS Gold Cert.-GIAC GSEC401-GCIH-GCFW-GWAPT | AWS Architect |cloud IBM | Cisco ToT| VMware | Fortinet | Huawei ToT | Security Consultant, Assistant Professor @ NTI, Egypt
Network security engineer
WE ARE HIRING! Title: Resident Network Security Engineer Company: BMB Group – Egypt Location: Katameya \ one of our customers. Working Conditions: Full time, working hours from 9am to 5pm. No of Vacancies: (1) Job Duties: Will be responsible for assisting customer on operational tasks, act as first line of support onsite, and day-to-day performance monitoring. Requirements: - 2-4 years of experience in the same field. - Hands-on experience in Cisco networking. - Expert in FortiGate firewalls. - CCNP Security. For interested candidates, please E-mail your updated CVs to [email protected] with mentioning the job code: RNSL in the subject.
To view or add a comment, sign in
opportunity
Herotel is Hiring: Network Monitoring Agent Know anyone interested? https://lnkd.in/d3RMDpfi
To view or add a comment, sign in
Zentric in Switzerland is an expert for the following topics: - Incident response preparation and support - ISO 27001, Common Criteria and IEC 62443 certification - Establishment of CERT departments - Digital Forensic - Social Engineering Awareness - Threat Modelling and - DevSecOps Specific: Product Security, OT and Controlled Environment
To view or add a comment, sign in
We're URGENTLY Hiring: Software Composition Analysis Specialist Security Lit 🚀 Day to Day Responsibility 👇🏾 ➡️Conducting Software Scans: Regularly run scans on the software codebase using SCA tools to identify vulnerabilities and compliance issues with software components. This might include analyzing both in-house and third-party/open-source software elements. ➡️Analyzing Scan Results: Review and interpret the results from the SCA tools. This involves assessing the identified vulnerabilities for their severity, impact, and the urgency of remediation. ➡️Updating Software Bill of Materials (SBOM): Maintain and update the SBOM, ensuring it accurately reflects all the software components in use, including versions and dependencies. ➡️Collaboration with Development Teams: Work closely with software developers to communicate findings from the SCA process. This may involve advising on the secure use of third-party components and assisting in remediation strategies. ➡️Remediation Tracking and Management: Follow up on the remediation process for identified vulnerabilities, ensuring that they are addressed in a timely manner. This might include re-scanning components post-remediation to confirm that vulnerabilities have been effectively resolved. Apply 👉🏽 https://lnkd.in/gmBdm-6v
To view or add a comment, sign in
UKTL Are Hiring Who are we? The UK Telecoms Lab (UKTL), a new national and independent telecommunications laboratory has been established to act as a secure research facility bringing together telecoms operators, suppliers and academics to research and test innovative new ways of boosting the security, resilience, and performance of the UK’s telecommunications networks. What do we do? 🔍 Security research: Discover and examine new telecom vulnerabilities to bolster sector and national security. 🛠️ Tool development: Create bespoke telecoms testing tools to enhance our research capabilities. Share non-sensitive tools with the community. 🔒 Security testing: Independently test equipment and network functions to elevate the security of the UK’s live telecoms networks and supply chains. 📚 Standards research: Collaborate with NCSC, OFCOM, and international bodies to define and develop telecoms standards. 🌐 Vendor diversification: Help incumbents and new vendors build secure, interoperable solutions, easing entry barriers into operator networks. 🎓 Skills development & training: Address the telecoms security skills gap by teaching and developing expertise to boost the UK’s technical capability. 🤝 Industry engagement: Lead the telecoms security research and development community in the UK. If you're interested in any of the above and want to be part of securing the future of UK Telecoms, please reach out to me, or check our careers page for more. Link in the comments
To view or add a comment, sign in
Passionate PM specializing in small teams and new ventures -- I'll help you get your startup started.
My friends in #devops #kubernetes #kubernetessecurity #ciam and #identitymanagement should check this out.
I'm hiring again, for various things, but particularly: - Kubernetes networking (security experience preferred but not required) - Bootstrapping PKI from the ground up, both for use internally but also as-a-service - Product security nerds LMK if you or anyone you know is interested in these things!
To view or add a comment, sign in
Founder, Veteran, working with growth-minded business leaders to advance leadership skills, strengthen teamwork, optimize processes, solve problems, and achieve better results.
Security has a design problem.
Chief Operating Officer @ TCM Security | Red Team Lead | Speaker | Leader | Mentor | Army Veteran | Former Mayor | Friend
Cybersecurity can absolutely be entry level - the industry just needs to train you to do it and stop pawning off ownership of the field on everyone else. It's time to reinvent the wheel on cybersecurity hiring.
To view or add a comment, sign in
Hiring new Position
BETEC#hiring. Know anyone who might be interested? Please apply or whatsup resume.
To view or add a comment, sign in
Breakfix Technician @ Confidential// Troubleshooting
4dInterested