
Subscribe and hire now!
Information Security/Cybersecurity proffesional with hands-on experience in technical and compliance.
Cyber defenseIncident responseISO 27001Network securityPCI DSSRisk managementVulnerability management
Bio
I am a Cybersecurity proffesional with experience in compliance, vulnerability management and implementation of ISO27001 and PCI DSS standards. With more than 4 years of experience in the cybersecurity industry, I have developed a wide range of technical and leadership skills that have allowed me to carry out successful projects …
Private information
Get full access to all talent profiles here on infosec-jobs.com in just a few minutes...
Location
Subscribe and hire now!Last updated about 2 months ago
Role interests
Cyber Security AnalystInformation Security AnalystInformation Security LeadInformation Security ManagerInformation Security Officer
Mid-level / Intermediate
Job type interests
Full Time
More profiles like this
-
Full TimeContract
EntryMid Entry-levelMid-level
United States
Results-driven Cyber Security Analyst with expertise in security analysis, incident response, and threat monitoring
Bash Black box CrowdStrike Cyber defense Firewalls IDS Incident response IPS ISO 27001 Linux Log analysis Network security +10
Cyber Security Analyst Cyber Security Engineer Cyber Security Incident Responder +4 -
Full Time
MidSenior Mid-levelSenior-level
United States
ClearanceSr. System Admin | TS/SCI | CASP+ | Sec+
Active Directory Application security AWS CASP+ Cloud Cyber defense Database Admin Endpoint security Malware Risk management Security+ Security Clearance +1
Cloud Cyber Security Analyst Cloud Security Architect Cloud Security Engineer +7 -
Full TimeContract
MidSenior Mid-levelSenior-level
Cybersecurity Pro: Protecting Data, Strengthening Security, Pursuing Excellence.
CISSP Compliance Cyber defense Forensics Nessus NIST NIST Frameworks Risk analysis Risk assessment Risk Assessment Report Risk management Security+ +4
Cyber Security Analyst Cyber Security Consultant Cyber Security Engineer +7 -
Full TimePart TimeFreelanceContract
MidSenior Mid-levelSenior-level
Nepal
Offensive Security Engineer, 4+ yrs in fin-tech, telecom, insurance. Expert in Pen Testing, Red Teaming, …
Active Directory APIs Cloud Cryptography Cyber defense Cyber Kill Chain Ethical hacking ISO 27001 MITRE ATT&CK Network security NIST Frameworks PCI DSS +5
Cyber Security Manager Cyber Security Researcher Cyber Security Specialist +5 -
Full Time
Mid Mid-level
Venezuela
Remote onlyIT Support / Security Analyst / Blue Team / Red Team Operator
Cloud Kali Linux Network security Risk analysis Security+ Security analysis SQL Server
Application Security Analyst Cloud Cyber Security Analyst Cyber Security Analyst -
Full TimeFreelance
Mid Mid-level
India
Information Security professional with a 6+ year background in Information Security, Risk Management, TPRM, Audit, …
Audits Governance Risk management Vendor management
GRC Analyst Information Security Analyst -
Full TimeContract
Mid Mid-level
United States
Cyber Security Analyst 🖥️🔐 Blue Team Operator 🛅💻 || USMC Veteran 🦅🌎⚓️ || CySA+ || …
CrowdStrike EDR Incident response Malware SIEM Splunk Threat detection Threat intelligence
Cyber Security Analyst Cyber Security Engineer Cyber Security Incident Responder +4 -
Part TimeTemporaryInternshipFreelance
EntryMid Entry-levelMid-level
India
Clearance Remote onlysecurity analyst
Application security Bash Burp Suite Golang Linux Network security Offensive security Python Security Assessment Report Vulnerability management Web application testing
Application Security Analyst Cyber Security Analyst Network Security Engineer +2 -
Full Time
Mid Mid-level
United States
Blockchain and Cyber Security Analyst
Azure Blockchain Cyber defense Security+ Security analysis Threat intelligence
Cyber Security Analyst Cyber Threat Intelligence Analyst Information Security Consultant -
Full TimePart TimeFreelanceContract
Mid Mid-level
Pakistan
ClearancePenetration Tester & Information Security Consultant
APIs Application security Audits Burp Suite CEH Endpoint security Forensics Incident response Internet of Things Kali Mobile security Network security +10
Cyber Security Threat Hunter Information Security Consultant Information Security Engineer +6