Cyber Security Jobs in the United States
CHRISTUS Health
Irving, TX
This role will work closely with business stakeholders and junior Cyber Analysts during contract negotiations and will conduct Vendor Risk Assessments (VRA) and Application Risk Assessments (ARA) using industry NIST/ISO best practices. In accordance with the CHRISTUS Health License, Certification and Registration Verification Policy, all Associates are required to obtain the required certifications for their respective positions within the designated time frame.
Dexter Technologies
Cherry Hill, NJ
We are proud of the fact that many of them have been promoted to more senior roles: management, senior management, and senior executive leadership positions. Work as the lead investigator on escalated cybersecurity events and collaborate with other cybersecurity teams as needed, in a 24x7 environment.
Altec Industries, Inc.
Birmingham, AL
Altec specializes in the manufacture, sale and service of aerial devices, digger derricks, cranes and specialty equipment for the electric utility, telecommunications, tree care, construction, and light and signs markets. Candidates chosen for this position will work in some or all of the following areas: Monitoring and triaging security alerts generated by the SIEM to ensure rapid response to potential security events.
Recurring Decimal
PHOENIX, AZ
Desired Experience: • Five (5) years’ experience with the following: o Direct experience working within an IT/Cyber security role, hands-on network security. • Highly self-motivated and directed combined with extensive experience working in a collaborative, team-oriented environment.
Leidos
$46.88 - $56.25 per Per hour
Bethesda, MD
Apply system security engineering expertise in one or more of the following to : system security design process; engineering life cycle; information domain; cross domain solutions; commercial off the-shelf and government off-the shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; This is you: BS degree and 8+ years of experience or additional years of experience in lieu of degree. ISSSMs, software engineers, software developers, system engineers and Government counterparts to perform the full spectrum of systems and cyber security engineering tasks to ensure our systems meet a variety of regulatory compliance frameworks.
Newkleo
$52 YEAR
Phoenix, AZ
The position requires practical experience with Kubernetes, cloud or hybrid environments, access controls, monitoring, logging, and general cybersecurity best practices, and will help ensure the system meets the reliability, security, and compliance expectations of a regulated public sector and election environment. Our team understands your needs or requirement before starting the recruitment, that enables to find the high quality of talent with high success rate of talent delivery, keeps us continue to be the best in the industry.
Tech Providers Inc.
$1 HOUR
Phoenix, AZ
The position requires practical experience with Kubernetes, cloud or hybrid environments, access controls, monitoring, logging, and general cybersecurity best practices, and will help ensure the system meets the reliability, security, and compliance expectations of a regulated public sector and election environment. Skills RequiredKubernetes, CybersecuritySkills PreferredExperience RequiredPractical experience with Kubernetes, cloud or hybrid environments, access controls, monitoring, logging, and general cybersecurity best practices.
Vaco LLC
$150000 - $165000
New York, NJ
Determining compensation for this role (and others) at Vaco by Highspring depends upon a wide array of factors including but not limited to: the individual’s skill sets, experience and training; licensure and certification requirements; office location and other geographic considerations; other business and organizational needs. Determining compensation for this role (and others) at Vaco/Highspring depends upon a wide array of factors including but not limited to the individual’s skill sets, experience and training, licensure and certifications, office location and other geographic considerations, as well as other business and organizational needs.
PlanIT Group
Eagan, MN
Task description and/or any specific requirements: • Demonstrate expert-level knowledge and proficiency with ServiceNow (SNow) Vulnerability Response (VR) and generally associated modules, including but not limited to the following skills, abilities and knowledge: o General: Deep understanding of SNow platform's core functionalities and components, including forms, MID servers, tables, dashboards and access control lists (ACLs). • Demonstrated proficiency in successfully evaluating and supporting documentation, validation and remediation processes required to ensure new and existing information technology (IT) systems meet the organization's vulnerability remediation expectations and requirements.
Marriott Vacations Worldwide
Golden Oak, UT
Ability to communicate complex technical concepts and operational insights to executive leadership through clear, concise, and compelling verbal and written communications, including briefings, strategic presentations, and high-impact reports. Successful candidates should possess knowledge and experience and demonstrate strong leadership and relationship skills as follows: Generally, a professional position with specific knowledge in a discipline (e.g., Accounting, Human Resources, Information Resources).
DCS Corporation
Sterling Heights, MI
Provide input to the Risk Management Framework process activities and related documentation (e.g., system life-cycle support plans, concept of operations, operational procedures, and maintenance training materials). Evaluate the effectiveness of procurement function in addressing information security requirements and supply chain risks through procurement activities, and recommend improvements.
System One
Springfield, VA
High School diploma / GED + 10 years or Associate Degree + 8 years or Bachelor’s Degree + 6 plus years’ experience working in Cyber Security Operating Host Based Security System (HBSS), firewalls, Intrusion Prevention Systems, Intrusion Detection Systems, other point of presence security tools, Virtual Private Networks, and related security operations. Designs and implements data network security measures; operates Network Intrusion Detection and Forensics; conducts performance analysis of Information Systems security incidents; develops Continuity of Operation (COOP)/Disaster Recovery (DR) plans and supports certification of Information Systems and Networks.
DCS Corporation
Sterling Heights, MI
In conjunction with the Cybersecurity IPT, monitor compliance with DOD/Army cybersecurity policies and procedures to ensure information system is operated, maintained, and disposed of in accordance with proper security policies and in accordance with programmatic documents during tenure with program. The ISSO serves as a trusted advisor in cybersecurity activities (I.e. eMASS, data entry, research, etc.) to ensure that identified systems are appropriately documented to meet compliance guidelines as directed by the DOD and appropriate subordinate organizations.
System One
$125000 - $130000 YEAR
Washington, DC
At least five years’ experience working at a senior level, performing analytics examination of logs and console events in the following working experience areas of; creating advance queries methods in Splunk or advance Grep skills, firewall ACL review, examining Snort based IDS events, Pcaps, web server log review, and working in a SIEM environment . • 7 years of security intrusion detection examination experience involving a range of security technologies that product logging data; to include wide area networks host and network IPS/IDS/HIPs traffic event review, server web log analysis, raw data logs .
Tata Consultancy Services
Atlanta, GA
Role: Cyber Security Program ManagerLocation: Atlanta, GAExperience: 10-16 YearsType: Full TimeJob Description: Strong knowledge of Cybersecurity and extensive experience working with various security technologies. Knowledge of a reasonable subset of Cybersecurity related aspects like Vulnerability Management, DLP, SIEM/Security Operations, IAM/PAM, MDR, Security Architecture & Engineering, Authentication & SSO/MFA etc.
Judge Group
$124000 - $155200 YEAR
Atlanta, GA
By providing your phone number, you consent to: (1) receive automated text messages and calls from the Judge Group, Inc. and its affiliates (collectively "Judge") to such phone number regarding job opportunities, your job application, and for other related purposes. Description: A leading nonprofit organization supporting critical infrastructure is seeking a Cybersecurity Operations Supervisor to lead its OT (Operational Technology) security team.
DCS Corporation
Virginia Beach, VA
Minimum certification as IAT Level II per DoD 8570.01 with a minimum certification as penetration tester and possess one the following offensive security certifications (OSCP, OSCE, OSEE, OSWP, GPEN, GXPN, or Red Team Operations and Threat Emulation). The Security Software Engineer – Penetration Tester utilizes in-depth understanding and experience in computer science and complex penetration testing methodologies to assist in securing combat systems and PIT in both afloat and shore-based systems by identifying threat vectors and vulnerabilities.
Flagstar Bank
Troy, MI
Act as a recognized subject matter expert, leading and executing highly complex security investigations, advanced threat hunting, and the identification of sophisticated nation-state or organized crime activities. Minimum experience required: 4+ Years of extensive experience in diverse IT security roles, with significant experience as a senior individual contributor in areas such as security architecture, advanced incident response, or threat intelligence.
Judge Group
$80 - $85 YEAR
Omaha, NE
The primary areas of focus for the candidate are to enable Cloud Cybersecurity controls and compliance requirements and remediation programs based on business priorities and risks to address Cyber-Security, Cyber Defense and Business needs of our customer. Extended Detection and Response (XDR): Microsoft Defender for Cloud Apps, Microsoft Defender for Endpoint, Microsoft Defender for Office 365, Microsoft Defender for Identity.
DCS Corporation
Sterling Heights, MI
SSE will assist in conducting trade-off analyses and will integrate contributions from system security engineering disciplines such as anti-tamper, cybersecurity, exportability features, hardware assurance, software assurance, supply chain risk management, and security specialties (personnel security, industrial security, physical security, etc.). Assist in conducting trade-off analyses and will integrate contributions from system security engineering disciplines such as anti-tamper, cybersecurity, exportability features, hardware assurance, software assurance, supply chain risk management; and security specialties (personnel security, industrial security, physical security, etc.).
Leidos
$62.5 - $75 per Per hour
Hyattsville, MD
Leveraging a deep knowledge of the threat landscape, the Principal Cyber Threat Hunter will enhance our cybersecurity posture, implement advanced detection strategies and test various hunting hypotheses to identify and neutralize threats to the DODIN. This position will support a large Department of Defense (DOD) Cyber Security Service Providers (CSSP) and is responsible for proactively identifying, investigating, and mitigating complex cyber threats across our subscribers’ networks.
Leidos
$31.25 - $37.5 per Per hour
Columbus, OH
Committed to continuous learning and self-improvement in the cybersecurity domain, as evidenced by ongoing pursuit of certifications, active participation in industry forums, and dedication to staying ahead of emerging threats and technologies. Support and Lead Cybersecurity Monitoring & Analysis:Investigate alerts generated from endpoints, IDS/IPS, NetFlow data, and custom sensors to detect compromises on customer networks.
L3Harris Technologies
Greenville, TX
Experience or proficiency with Linux administration, Bash scripting, Python, Windows PowerShell, Windows administration, Nessus, Wireshark, Nmap, Elastic Stack (Elasticsearch, Logstash and Kibana (ELK)). With customers’ mission-critical needs always in mind, our employees deliver end-to-end technology solutions connecting the space, air, land, sea and cyber domains in the interest of national security.
PlanIT Group
Reston, VA
Manages and administers a wide range of security systems and tools: o Administers cloud-based security tools such as, Azure Security Center (Sentinel, Log Analytics, Azure WAF, Defender for Identity, Privileged Identity Manager); Microsoft 365 Security Suite (Defender, Advanced Threat Protection, Cloud Application Security, Protection Portal); Microsoft Security and Compliance Center; Microsoft Endpoint Manager (Intune); multi-factor authentication (MFA); web content filtering; and secure document sharing and collaboration solutions. o Operates cloud-based security tools such as, Azure Security Center (Sentinel, Log Analytics, Azure WAF, Defender for Identity, Privileged Identity Manager); Microsoft 365 Security Suite (Defender, Advanced Threat Protection, Cloud Application Security, Protection Portal); Microsoft Security and Compliance Center; Microsoft Endpoint Manager (Intune); multi-factor authentication (MFA); web content filtering; and secure document sharing and collaboration solutions.
Leidos
$37.5 - $45 per Per hour
Omaha, NE
If you received an email purporting to be from Leidos that asks for payment-related information or any other personal information (e.g., about you or your previous employer), and you are concerned about its legitimacy, please make us aware immediately by emailing us at LeidosCareersFraud@leidos.com. November 7, 2025For U.S. Positions: While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.
Leidos
$59.9 - $71.88 per Per hour
Chantilly, VA
Work with the program teams, Business Area leadership, and CTO organization to identify technology and solution roadmaps to improve mission enterprise capabilities and broaden Leidos contributions in technical leadership resulting in increased contract growth and improved customer satisfaction. • Drive Capture and Proposal Success: Partner with capture and business development teams to author technical volumes, whitepapers, and responses to RFPs/RFIs—translating technical innovation into clear, compelling customer value.
System One
$80000 - $100000 YEAR
Cincinnati, OH
System One, and its subsidiaries including Joulé, ALTA IT Services, and Mountain Ltd., are leaders in delivering outsourced services and workforce solutions across North America. This person is responsible for designing, planning, implementing, and supporting various hardware and software security solutions to support the company's operations.
DCS Corporation
Sterling Heights, MI
The ISSM will provide support in the following areas: Provide guidance to ISSOs, Information Technology team members, and the system owner regarding goals and objectives that will minimize the organizational risk present in the system. Certification required for IAM level II or III appointment:- CAP- CASP+ CE- CISM- CISSP- GSLC- CCISO- HCISPP- CISM- CISSP- GSLC- CCISO
Leidos
Scott AFB, IL
If you received an email purporting to be from Leidos that asks for payment-related information or any other personal information (e.g., about you or your previous employer), and you are concerned about its legitimacy, please make us aware immediately by emailing us at LeidosCareersFraud@leidos.com. January 13, 2026For U.S. Positions: While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.
DCS Corporation
Dam Neck, VA
High school diploma with a minimum of 20 years of experience, an Associate degree plus 14 years or a Bachelors degree plus 12 years of experience. Familiarity with the DISA Enterprise Mission Assurance Support Service (eMASS) and Xactta applications as used to develop, manage and track IA artifacts.
Leidos
$36.46 - $43.75 per Per hour
Piketon, OH
If you received an email purporting to be from Leidos that asks for payment-related information or any other personal information (e.g., about you or your previous employer), and you are concerned about its legitimacy, please make us aware immediately by emailing us at LeidosCareersFraud@leidos.com. The IT Cyber Liaison serves as the primary coordination point between cybersecurity, IT operations, and external stakeholders to ensure timely identification, reporting, and remediation of cybersecurity risks.
First Horizon Bank
Memphis, TN
Headquartered in Memphis, TN, the banking subsidiary First Horizon Bank operates in 12 states across the southern U.S. The Company and its subsidiaries offer commercial, private banking, consumer, small business, wealth and trust management, retail brokerage, capital markets, fixed income, and mortgage banking services. Detection/telemetry: Publish Splunk logging schema, retention, and correlation strategies; onboard logs from Azure, Colo, API Gateways, IAM, CyberArk, MFaaS, and core platforms; drive ATT&CK‑aligned detections and forensic readiness.
DCS Corporation
$71307 - $110000 YEAR
St Inigoes, MD
At DCS Corporation, we work closely with the touch points of the software development life cycle: developers, testers, configuration management, hardware, cyber security, and Subject Matter Experts. A creative, out-of-the-box thinker to work in a rapid development environment as part of a multi-disciplinary team of engineers who design, develop, evaluate, test, verify, validate, and provide in-service engineering support.
Leidos
$41.67 - $50 per Per hour
Washington, DC
If you received an email purporting to be from Leidos that asks for payment-related information or any other personal information (e.g., about you or your previous employer), and you are concerned about its legitimacy, please make us aware immediately by emailing us at LeidosCareersFraud@leidos.com. December 23, 2025For U.S. Positions: While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.
Pyramid Technology Solutions, Inc
Ocoee, FL
Requires technical expertise in risk management tools, forensics (gathering of evidence, presentation, chain of custody, etc.), combined management tools, forensics (gathering of evidence, presentation, chain of custody, etc.) with knowledge of industry best practices and procedures. We're looking for a highly experienced and meticulous Network and Financial Risk Analyst with a strong background in financial controls with a strong background in financial controls, and digital forensics to join our team.
Foxhole Technology
$90000 - $100000 YEAR
Ft. Meade, MD
The Cybersecurity Test Engineer III will support sensing development initiatives, including modernization and integration of the Open Sensor Platform (OSP), Full Packet Capture (FPCAP), Automated Security Validation (ASV), Intrusion Detection System (IDS), and emerging sensing technologies. Must be able to work closely with system engineers, developers, cybersecurity engineers, and DISA stakeholders to support successful delivery of new sensing capabilities used to protect and defend the DoDIN.
Bowhead / UIC Technical Services
Colorado Springs, CO
CERTIFICATION REQUIREMENTS: • Comp TIA Security + and at least one of the following: Crestron Certified Programmer (CCP) Certification, Extron Authorized Programmer (EAP) Certification, Crestron Technician Certification, Extron Control Professional Certification, Extron Network AV Specialist. • Plan and Oversee installations (specifically relating to AV Control System Programming and testing), operate, and maintain video conferencing equipment on NIPR, SIPR and JWICS networks.
Foxhole Technology
Pensacola, FL
Requirements of position: Think analytically, effective verbal and written communication skills, make decisions, observe/remember details, interpret data, concentrate on tasks, adjust to change, handle stress/emotions. Our talented employee-owners provide agile, scalable services and solutions that solve operational gaps, operate critical systems, and protect and secure the enterprise – across the organization and around the world.
NY CREATES
Albany, NY
The Associate Director of Identity and Access Management is the authoritative architect and operational owner of the enterprise-wide identity fabric at NY Creates (NYC), responsible for the end-to-end design, implementation, hardening, integration, and lifecycle governance of hybrid identity systems encompassing on-premises Active Directory (AD), Microsoft Entra ID (Azure AD), and a mature Identity Governance & Administration (IGA) platform. Minimum of eight (8) years of progressive identity engineering experience with at least five (5) years exclusively in enterprise IAM program leadership, hybrid AD/Entra ID architecture, and IGA platform ownership in regulated research, federal contractor, or critical manufacturing environments (5,000+ identities, multi-forest, cloud-native apps).
DCS Corporation
Las Vegas, NV
Provide Advisory & Assistance Services (A&AS) to the United Operational Test Team (UOTT) and the Air Dominance Division shaping and managing the end-to-end data infrastructure and analytic processes that drive operational test and evaluation (OT&E). Primarily assist Operations and Data Analysts in managing and improving data workflows by organizing data, streamlining database processes, and optimizing tools on existing data infrastructures.
Foxhole Technology
Pensacola, FL
This includes supporting system accreditation, maintaining Authority to Operate status, performing compliance scans, sustaining accredited baselines, and ensuring all systems remain fully compliant with DoD cybersecurity policies. Our talented employee-owners provide agile, scalable services and solutions that solve operational gaps, operate critical systems, and protect and secure the enterprise – across the organization and around the world.
DCS Corporation
Dayton, OH
A High School Diploma plus 20 years of experience with proper certifications, a Bachelors degree in an applicable discipline and 15+ years of DoD system‑of‑systems test engineering, including lab‑to‑flight progression, or a Masters degree plus 12 years of experience. As Senior Test Engineer, you will architect and execute the end‑to‑end verification, validation, and flight‑test strategy for Major Release 2 (FY 25‑27)—from bench‑level checkout in the Integration SIL to operational acceptance on multiple aircraft.
Healthcare Financial, Inc.
$110000 - $120000 YEAR
Quincy, MA
Foxhole Technology
Fort George G Meade, MD
This role is responsible for designing, implementing, securing, and maintaining mission-critical network and cyber sensing capabilities in support of the DoDIN, including technologies such as Open Sensor Platforms, Full Packet Capture, Intrusion Detection Systems, Automated Security Validation, and emerging sensing solutions. The SME will ensure reliable, secure data flow and connectivity across internal systems, external interfaces, and internet-facing services, operating across cloud, lab, and operational network environments, including NIPRNet and SIPRNet–connected enclaves.
Union Pacific Railroad Company
$20 - $26 HOUR
Omaha, NE
There will also be an opportunity to put leadership, technical skills, and business knowledge to immediate use by leveraging technologies such as Java, Data Networking, Data Science and Cyber Security principles to solve problems and deliver value through real-world project assignments. These teams enable our business operations by building secure systems and platforms that provide our employees and customers visibility and extend automation into one of America’s largest transportation logistics networks.
DCS Corporation
Sterling Heights, MI
Work with various project management offices (vehicle platform offices and C5ISR system offices) in order to evaluate and synchronize program acquisition schedules, integration costs and other requirements pertaining to Army and/or Marine Corps network development. Assist in ensuring end-to-end program integration of the communications network to include interoperability testing and certification, safety confirmation, test, kit procurement and logistics integration.
Judge Group
$112000 - $145000 YEAR
Knoxville, TN
By providing your phone number, you consent to: (1) receive automated text messages and calls from the Judge Group, Inc. and its affiliates (collectively "Judge") to such phone number regarding job opportunities, your job application, and for other related purposes. You’ll lead incident response efforts, manage security platforms, and collaborate cross-functionally to embed security best practices across infrastructure, applications, and cloud environments.
Leidos
Virginia Beach, VA
If you received an email purporting to be from Leidos that asks for payment-related information or any other personal information (e.g., about you or your previous employer), and you are concerned about its legitimacy, please make us aware immediately by emailing us at LeidosCareersFraud@leidos.com. Ultimately, Leidos will support the Navy in unifying its shore-based networks and data management to improve capability and service while also saving significant costs by focusing efforts under one enterprise network.
Foxhole Technology
$70000 - $78000 YEAR
Columbus, OH
Provide professional service support to assist with administrative functions to include, but not limited to: document preparation, scheduling, record keeping, recording minutes, after action reports, preparing travel orders, reserving Government facility meeting space, office supply and inventory, preparing briefing packages, property control, information research and archival, data entry, project coordination, and control activities. Provide support to contract management and control planning, contract reporting, Technical Interchange Meetings, Technical Exchange Meetings, Transition Implementation Planning, and Risk Management.
System One
$200000 - $225000 HOUR
MD, Maryland
PREFERRED QUALIFICATIONSBachelor's degree in a technical field such as Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, Information Systems, Networking and Telecommunications, or similar. RESPONSIBILITIESYou will help drive critical network exploitation efforts and enable enhanced operational awareness through the following responsibilities: Conduct active and passive reconnaissance to identify network devices, services, and protocols.
Cyber Security Jobs Overview
In today's interconnected world, digitized data is always under threat. Without skilled cyber security experts, countless businesses' and individuals' most sensitive financial, medical, and personal data would be at risk of being leaked by hackers, identity thieves, and other cybercriminals. Cyber security is critical to all businesses and organizations; without it, they would lose the trust of their customers and their own trade secrets. Cyber security jobs are held by highly educated and experienced professionals with specialized training in how to protect data.
If you're interested in safeguarding computer systems, networks, and sensitive information, then a career in cyber security might be right for you. You'll detect, monitor, and halt cyber threats to protect critical data, personal information, financial information, medical records, and intellectual property. As more and more data become digitized, the need for cyber security will grow. The Bureau of Labor Statistics estimates a 31% increase in new cyber security jobs in the U.S. over the next 10 years. That's a much faster growth rate than most other occupations.
Want to expand your search by seeking other computer jobs? Consider looking for these similar positions:
Cyber Security Education and Skills
To be considered for a cyber security job, you'll need a bachelor's degree in cyber security, computer science, information technology, or a related field. Having a Master of Business Administration (MBA) degree in information systems or a certification such as the Certified Information Systems Security Professional (CISSP) credential can boost your likelihood of getting hired. Your post-secondary education should cover areas relating to cyber security, such as data management, computer architecture, network fundamentals, and files and databases.
Cyber security employers typically look for candidates who have the following skills and qualities:
- Strong analytical skills and the ability to assess risks.
- In-depth knowledge of computer systems and networks.
- Keen attention to detail.
- The ability to implement new methods for protecting computer systems and networks.
- Effective problem-solving skills.
Update Your Cyber Security Resume
Do you have the skills and qualifications cyber security employers are looking for? Now make them stand out on your resume. Need some help with that? Try reading our information security specialist resume template to get a feel for how to organize information about your background. A solid cover letter will also boost the chances that your resume will be viewed. Have no experience writing a cover letter? Monster offers a wide array of cover letter samples and cover letter writing tips. Our recommended checklists will help you composed and format an effective cover letter.
Interviewing for a Cyber Security Job
It's natural to feel anxious before an interview. But there's no need to worry. Employers conduct interviews to evaluate candidates for suitability—you have the knowledge and the background and all you have to do is learn how to talk about it. Monster can help you prepare strong answers to even the toughest of interview questions. We offer an in-depth list of commonly asked interview questions so you know what to expect.
How Much Do Cyber Security Jobs Pay?
One of the most rewarding perks to working in cyber security is the pay. The median cyber security salary varies by position and level of experience. For example, cyber security engineers earn an average yearly salary of $102,809. Cyber security analysts earn an average of $91,675 per year. You can use our Salary Tool to find out how much you can expect to earn in your location. You can also learn about the skills you'll need to move up to an advanced cyber security position.
Monster Can Help You Secure Your Next Cyber Security Job
Want to get a feel for what cyber security jobs are available? Put together a profile on Monster to browse our list of jobs. You can also receive free alerts for new job postings and advice from our career experts delivered straight to your inbox.