infosec-jobs.com
Search
Emails
Saved
Profile
Salaries
Post a Job
Post a Job
Find Talent
Find Talent
Log in
Log in
Direct access to Monitoring talent
Find and hire great Monitoring talent in InfoSec / Cybersecurity.
Application Security Analyst
Application Security Architect
Application Security Engineer
Application Security Sales Specialist
Application Security Specialist
Azure Security Engineer
Business Information Security Officer
Chief Information Security Officer
Cloud Cyber Security Analyst
Cloud DevSecOps Engineer
Cloud Security Architect
Cloud Security Automation Specialist
Cloud Security Engineer
Cloud Security Engineering Manager
Cloud Security Operations Engineer
Compliance Analyst
Compliance Manager
Compliance Specialist
Computer Forensic Software Engineer
Corporate Infrastructure Security Engineer
Corporate Security Engineer
Cyber Analyst
Cyber Assurance Manager
Cyber Defense Center Analyst
Cyber Engineer
Cyber Intelligence Analyst
Cyber Program Manager
Cyber Security Analyst
Cyber Security Architect
Cyber Security Compliance Analyst
Cyber Security Consultant
Cyber Security Culture Specialist
Cyber Security Endpoint Engineer
Cyber Security Engineer
Cyber Security Incident Responder
Cyber Security Manager
Cyber Security Project Manager
Cyber Security Researcher
Cyber Security Specialist
Cyber Security Technologist
Cyber Security Threat Hunter
Cyber Security Training Specialist
Cyber Technologist
Cyber Threat Analyst
Cyber Threat Intelligence Analyst
Data Privacy Manager
Data Security Analyst
Data Security Engineer
Detection and Response Engineer
Detection Engineer
DevOps Security Engineer
DevSecOps Director
DevSecOps Engineer
DevSecOps Staff Engineer
Digital Forensics Analyst
Director of Information Security
Director of Product Security
DLP Security Engineer
Enterprise Security Engineer
Ethical Hacker
Fortinet Firewall Engineer
GCP Network Security Engineer
Global Information Security Specialist
Global Technical Support Consultant
GRC Analyst
GRC Manager
GRC Specialist
Head of Cyber Security
Head of Information Security
Head of Security
Head of Security Operations
IAM Engineer
Incident Response Analyst
Incident Response Engineer
Incident Response Manager
Information Security Analyst
Information Security Architect
Information Security Compliance Analyst
Information Security Compliance Lead
Information Security Compliance Manager
Information Security Consultant
Information Security Engineer
Information Security GRC Analyst
Information Security GRC Manager
Information Security Lead
Information Security Manager
Information Security Officer
Information Security Policy Analyst
Information Security Program Manager
Information Security Risk Analyst
Information Security Specialist
Information System Security Engineer
Information System Security Officer
Information Systems Security Engineer
Information Systems Security Manager
Information Systems Security Officer
Infosec Risk Manager
Infrastructure Consultant
Infrastructure Security Engineer
Insider Threat Analyst
IT Security Administrator
IT Security Analyst
IT Security Auditor
IT Security Consultant
IT Security Engineer
IT Security Lead Consultant
IT Security Manager
IT Security Operations Specialist
IT Security Specialist
Lead Application Security Engineer
Lead Information Security Engineer
Lead Security Engineer
Linux Endpoint Security Engineer
Malware Analyst
Malware Reverse Engineer
Network and Security Engineer
Network Security Administrator
Network Security Analyst
Network Security Architect
Network Security Engineer
o365 Security Architect
Offensive Security Engineer
Penetration Tester
Penetration Testing Engineer
Principal Application Security Engineer
Principal Cloud Security Engineer
Privacy Manager
Privacy Officer
Product Security Engineer
Product Security Manager
Risk and Compliance Analyst
SecOps Engineer
Security Administrator
Security Analyst
Security Analytics Lead
Security Architect
Security Compliance Analyst
Security Compliance Manager
Security Compliance Specialist
Security Consultant
Security Engineer
Security Engineering Lead
Security Engineering Manager
Security Lead
Security Operations Analyst
Security Operations Center Analyst
Security Operations Engineer
Security Operations Lead
Security Operations Manager
Security Operations Team Lead
Security Researcher
Security Software Engineer
Security Specialist
SIEM Engineer
SOC Analyst
SOC Engineer
SOC Manager
Software Reverse Engineer
Software Security Analyst
Software Security Engineer
Systems Security Engineer
Technical Consultant
Threat Hunter
Threat Hunting Lead
Threat Intelligence Analyst
Threat Researcher
Vulnerability Analyst
Vulnerability Management Analyst
Vulnerability Management Engineer
Vulnerability Researcher
Windows Endpoint Security Engineer
Monitoring
Experience level 🤓
Entry-level / Junior
Mid-level / Intermediate
Senior-level / Expert
Executive-level / Director
Africa
Asia/Pacific
Europe
Middle East
North America
South America
Andorra
Argentina
Australia
Austria
Bahrain
Belgium
Bulgaria
Cameroon
Canada
Croatia
Cyprus
Czechia
Denmark
Egypt
Estonia
Finland
France
Germany
Greece
Hungary
India
Ireland
Israel
Italy
Japan
Kuwait
Luxembourg
Malaysia
Malta
Mauritius
Mexico
Moldova
Montenegro
Morocco
Netherlands
New Zealand
Nigeria
Norway
Oman
Philippines
Poland
Portugal
Qatar
Romania
San Marino
Singapore
Slovakia
Slovenia
South Africa
Spain
Sweden
Switzerland
Tunisia
Ukraine
United Arab Emirates
United Kingdom
United States
Full Time
Part Time
Temporary
Internship
Freelance
Contract
17 profiles
found
Reset
Share
Search
Full Time
Part Time
Temporary
Mid
Senior
Mid-level
Senior-level
A CISSP who loves cryptography, Linux, logging, and regular expressions
Automation
Azure
Bash
CISSP
Cloud
Compliance
Cryptography
Linux
Log analysis
Log files
Monitoring
Vulnerabilities
+2
Cyber Security Architect
Cyber Security Consultant
Cyber Security Engineer
+6
Full Time
Part Time
Contract
Entry
Mid
Entry-level
Mid-level
France
Remote
only
cybersecurity analyst
Blue team
CISSP
Cloud
Endpoint security
Ethical hacking
Forensics
IDS
Incident response
Malware
Metasploit
MITRE ATT&CK
Monitoring
+9
Application Security Analyst
Cyber Security Architect
Cyber Security Engineer
+5
Full Time
Mid
Mid-level
United States
Threat Analyst
Compliance
Monitoring
Risk management
Infosec Risk Manager
IT Security Manager
Risk and Compliance Analyst
Full Time
Part Time
Contract
Entry
Mid
Entry-level
Mid-level
United States
Clearance
Remote
only
Results-driven Information Security Professional
Audits
Compliance
DoD RMF
Governance
Monitoring
Nessus
POA&M
Privacy
Risk management
RSA
SailPoint
Security+
+1
Cyber Security Compliance Analyst
GRC Analyst
GRC Specialist
+6
Full Time
Part Time
Contract
Executive
Executive-level
United States
Seasoned CISO with a strong IT and compliance background
Blockchain
Compliance
Cyber Kill Chain
Endpoint security
Ethical hacking
Incident response
Intrusion detection
Intrusion prevention
IT infrastructure
Monitoring
Network security
OSINT
+3
Chief Information Security Officer
Full Time
Contract
Entry
Mid
Entry-level
Mid-level
United States
Remote
only
Hi, I'm a cybersecurity analyst who has experience with efficiently monitoring, investigating, and analyzing cybersecurity incidents.
ACAS
Active Directory
CND
Compliance
DIACAP
DISA
IDS
Incident response
IPS
Monitoring
Nessus
Network security
+13
Cyber Analyst
Cyber Defense Center Analyst
Cyber Security Researcher
+4
Full Time
Contract
Senior
Senior-level
Mr. Estes
Ansible
Audits
Automation
AWS
CISA
Cloud
Compliance
Cyber defense
DISA
FedRAMP
IT infrastructure
Linux
+9
Cyber Security Architect
Cyber Security Manager
Cyber Security Specialist
+2
Full Time
Contract
Entry
Mid
Entry-level
Mid-level
Philippines
Remote
only
Security Analyst
Endpoint security
Log analysis
Monitoring
Network security
Offensive security
Product security
Qualys
SecOps
Security+
Security analysis
SIEM
Vulnerability management
Cyber Security Analyst
SOC Analyst
Full Time
Mid
Mid-level
India
Clearance
--SOC Analyst at Wipro || Actively looking for job change || Cyber Security Analyst || SOC || SIEM …
Cyber Kill Chain
DDoS
EDR
Endpoint security
IDS
IPS
Jira
Log analysis
Malware
Monitoring
Nessus
QRadar
+5
Cyber Defense Center Analyst
Incident Response Analyst
SOC Analyst
Full Time
Contract
Entry
Mid
Entry-level
Mid-level
Remote
only
Ph.D In Information Technology Management | Information Technology | Cybersecurity | CompTIA Security+
CompTIA
Firewalls
Monitoring
Network security
Security+
SIEM
Chief Information Security Officer
Cyber Security Analyst
Head of Information Security
+1
Full Time
Entry
Mid
Entry-level
Mid-level
Italy
SOC Analyst - SIEM and Vulnerability Management
Azure
CompTIA
Log analysis
Monitoring
Nessus
Qualys
Security+
Security Assessment Report
SIEM
SOC
Splunk
Vulnerabilities
+2
Cyber Security Analyst
Information Security Analyst
IT Security Analyst
+5
Full Time
Entry
Entry-level
Spain
Clearance
Remote
only
Cyberintelligence Specialist
Cloud
CrowdStrike
Cyber defense
EDR
Endpoint security
Firewalls
Forensics
IDS
Incident response
IPS
ISO 27001
Malware
+11
Cyber Threat Intelligence Analyst
Insider Threat Analyst
SOC Analyst
Full Time
Entry
Mid
Entry-level
Mid-level
Remote
only
Cybersecurity Analyst
Computer Science
Cyber defense
Incident response
Monitoring
Python
SIEM
SOAR
SOC 1
Cyber Analyst
Cyber Security Analyst
Full Time
Mid
Mid-level
United States
Remote
only
Threat Management and Response Analyst
EDR
Monitoring
SIEM
Application Security Analyst
Cyber Threat Analyst
GRC Analyst
+1
Full Time
Executive
Executive-level
India
Global IT Infrastructure I IT Architechture I IT Security I App Security I Information Security I Cyber Security …
Audits
Compliance
Cyber defense
Internet of Things
IT infrastructure
Monitoring
SQL Server
Cyber Security Manager
Information Security Manager
Full Time
Contract
Entry
Mid
Entry-level
Mid-level
United States
Looking for a Cyber Security or SOC position
Cyber defense
Log analysis
Monitoring
Cyber Security Analyst
SOC Analyst
Full Time
Mid
Senior
Mid-level
Senior-level
United States
Clearance
Cybersecurity Infrastructure Engineer | ISSE | Vulnerability Assessment
ACAS
Big Data
DoD RMF
Firewalls
Intrusion prevention
IPS
Malware
Monitoring
RSA
Splunk
Vulnerability management
Cyber Engineer
Cyber Security Engineer
Information System Security Engineer
Talent by Job Type ⏰
All
Full Time
talents
All
Part Time
talents
All
Temporary
talents
All
Internship
talents
All
Freelance
talents
All
Contract
talents
Talent by Experience 🤓
All
Entry-level / Junior
talents
All
Mid-level / Intermediate
talents
All
Senior-level / Expert
talents
All
Executive-level / Director
talents
Talent by Region 🌍
All talents in
Africa
All talents in
Asia/Pacific
All talents in
Europe
All talents in
Middle East
All talents in
North America
All talents in
South America
Search
Emails
Saved
Profile