Skip to main content
X

Get jobs by email for this search

By continuing you agree to Monster's Privacy policy, Terms of use and use of cookies.

Computer Hacking Forensic Investigator Jobs

5 jobs

Under the direction of the Manager of Information Security Architecture, this role’s primary function is to utilize proven consulting and technical skills to deliver technology architecture, design, and engineering services with a specific focus on the security domain. In doing so, the incumbent in this position will help to develop Enterprise standards and supporting frameworks focused on securit...
The role of a Sr. Security Engineering Consultant is to assist the sales organization in qualifying opportunities, designing solutions, and assisting with solution demonstrations and implementations. The security consultant will also be Nuspire’s technical expert in areas of security, compliance, and network design. Methods of accomplishing this vary in day-to-day responsibilities and include, bu...
Job Title Information Security Solution Architect Location Westborough, MA 01581 US (Primary) About the Company At BJ's Wholesale Club, every Team Member has the same goal, to Delight Our Members. This common purpose means working as a Team, supporting our Community in a positive way, and treating everyone with Respect and Integrity. In fact, Team, Community, Respect and Integrity, are the BJ...
Cyber Threat Analyst-1600751 Description Job Summary The financial services industry is constantly under attack by sophisticated cyber adversaries that range from nation states to criminals. In response, the Raymond James Cyber Threat Center (CTC) is charged with ensuring all equities are secure against all tiers of adversaries. We are the central hub for Computer Network Operations and are on ...
Job Summary The financial services industry is constantly under attack by sophisticated cyber adversaries that range from nation states to criminals. In response, the Raymond James Cyber Threat Center (CTC) is charged with ensuring all equities are secure against all tiers of adversaries. We are the central hub for Computer Network Operations and are on the front lines of security incident respon...