About eStreet SecurityeStreet Security, a subsidiary of SkillPatron Corporation, is a leading provider of cybersecurity solutions and services. We are committed to protecting our clients from the ever-evolving threat landscape by offering cutting-edge technology, expert consulting, and comprehensive training. We foster a collaborative and inclusive environment where our employees are empowered to innovate and make a real impact in the cybersecurity industry.Job DescriptionAs a Cybersecurity Specialist at eStreet Security, you will be a key member of our team, responsible for protecting our organization and clients from cyber threats. This role offers the unique opportunity to work across a wide range of cybersecurity disciplines, gaining experience and expertise in multiple areas.Responsibilities:Depending on your skills and interests, you may be responsible for one or more of the following areas:Application Security: Assess and secure applications throughout the software development lifecycle, identifying and mitigating vulnerabilities.Blue Team Operations: Defend networks and systems from cyber attacks, monitor for threats, and respond to incidents.Cloud Security: Design, implement, and maintain security measures for cloud-based infrastructure and applications.Compliance: Ensure adherence to industry regulations and standards, such as GDPR, HIPAA, PCI DSS, etc.Cryptography/Cryptology: Develop and analyze cryptographic algorithms to protect sensitive data.Cybersecurity Policy: Develop, implement, and enforce cybersecurity policies and procedures.Cybersecurity Product Management: Define product requirements, manage product roadmaps, and work with engineering teams to deliver innovative cybersecurity solutions.Cybersecurity Research: Stay up-to-date on the latest threats and vulnerabilities, conduct research, and publish findings.Cybersecurity Sales Engineering: Provide technical expertise to support sales teams in selling cybersecurity products and services.Data Privacy: Develop and implement policies and procedures to protect personal and sensitive data.DevSecOps: Integrate security into the software development and operations lifecycle.Digital Forensics: Investigate cybercrimes and security incidents, and collect and analyze evidence.Identity and Access Management (IAM): Manage user identities and access controls to ensure the right people have the right access to the right resources.Incident Response: Respond to and investigate security incidents, containing and mitigating damage.Industrial Control Systems (ICS) Security: Secure critical infrastructure systems from cyber threats.IoT (Internet of Things) Security: Secure IoT devices and networks from vulnerabilities.Malware Analysis: Analyze and reverse engineer malware to understand its behavior and develop countermeasures.Mobile Security: Secure mobile devices and applications from threats.Network Security: Design, implement, and maintain network security solutions to protect against unauthorized access and data breaches.Penetration Testing/Ethical Hacking: Simulate cyber attacks to identify vulnerabilities and weaknesses in systems and applications.Red Teaming: Emulate real-world adversaries to test and improve an organization's defenses.Risk Management: Identify, assess, and mitigate cybersecurity risks to the organization.Security Architecture: Design and implement secure systems and architectures, considering both business and technical requirements.Security Auditing: Assess security controls' effectiveness and identify improvement areas.Security Awareness Training: Develop and deliver training programs to educate employees about cybersecurity risks and best practices.Security Operations Center (SOC) Analysis: Monitor, analyze, and respond to security events in real time.Security Training/Education: Develop comprehensive training programs for cybersecurity professionals.Threat Intelligence: Collect, analyze, and disseminate threat intelligence to inform security decision-making.vCISO (Virtual Chief Information Security Officer): Provide strategic cybersecurity guidance and leadership on a part-time or as-needed basis.Vulnerability Assessment: Identify and prioritize vulnerabilities in systems and applications.Qualifications:Bachelor's or Master's degree in Cybersecurity, Computer Science, or a related field, or a minimum of three years of equivalent work experience in a relevant role.Relevant certifications (e.g., CISSP, CISA, CEH, etc.) are a plus and may be required for some roles.Strong understanding of cybersecurity principles, practices, and technologiesExperience with a variety of security tools and techniquesExcellent problem-solving and analytical skillsStrong communication and interpersonal skillsWord processing (e.g., Microsoft Word, Google Docs)Spreadsheets (e.g., Microsoft Excel, Google Sheets)Presentation software (e.g., Microsoft PowerPoint, Google Slides)Collaboration tools (e.g., JIRA, Slack, Microsoft Teams)Compliance management software (optional, depending on role)Privacy management software (optional, depending on role).Benefits:Competitive salary and benefits packageOpportunity to work on challenging and impactful projectsComprehensive on-the-job trainingOpportunities for career advancement.How To ApplyTo apply, please share your resume with us via our online application system: AuthorizationeStreet Security is an E-Verify employer. E-Verify is a web-based system that allows enrolled employers to confirm the eligibility of their employees to work in the United States. Therefore, only candidates authorized to work in the U.S. are eligible for positions with our clients. Equal Opportunity EmployerWe are an equal opportunity employer and value diversity at our company. We also ensure that our clients adhere to equal-opportunity employment practices. We do not discriminate based on race, religion, color, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status.Important NoteeStreetSecurity does not require or seek to collect a fee or payment from candidates in the application or interview process. We do not conduct interviews by text messaging. Nor does eStreet require copies of IDs, passports, or other identification as a part of the interview process. If you have experienced these requests, this is a scam, and you may wish to consider making a report to ReportFraud.ftc.gov or IC3.gov.See less recblid r6qbzj6oeorp60o3cytjforoblatae eStreet Security
...Hard Rock - JobID: 55346 [Restaurant Associate / Greeter / Team Member] As a Host at Hard Rock, you'll: Be the initial contact with the guests; Start guests off with a positive experience at the front door; Greet, seat and page guests; Answer the phone, open doors, and...
...Bench Jeweler James Free Jewelers is currently seeking an experienced bench jeweler. We are looking for candidates with knowledge of stone setting, sizing, polishing, and jewelry repair. Job Description: Our bench jewelers are dedicated to delivering a customer...
...REQUIRED SKILLS (RANK IN ORDER OF IMPORTANCE): - Project management skills - People skills - Strong background in project management... ...and external organizations, including vendors performing outsourced work, in the compilation and management of information needed...
...your best every day are the core values we live by in order to provide dynamic guest service at the Denali Backcountry Lodge. As a Baker, you will be responsible for preparing a wide variety of breads, rolls, pastries and other baked goods. You will work independently...
International Steel Trade Manager A large Asian steel trading company with a subsidiary in the United States is hiring an International Steel Trade Manager. Responsibilities: ~ Develop steel markets in the United States and other North American countries. ...