Signed in as:
filler@godaddy.com
Signed in as:
filler@godaddy.com
The best recruiting resources know what they can and cannot help people find.
Book an appointment or send us a note to get the conversation started!
Monitoring threats and coordinating response
Monitor, assess, and coordinate cyber threat responses
Lead SOC teams
Research and prepare for threats to the business security
Manage application-layer security systems
Analyze threats
Research and provide expertise on threats to the business
Respond to threats and harden systems to prevent future attacks
Monitor and respond the threats to the business
Create the response plan and oversee the disaster recovery
Developing and securing internal systems
Create and manage security processes in the SDLC
Design and implement security processes in the SDLC
Lead teams doing the design and implementation of security processes in the SDLC
Expertise in securing systems and tools in the cloud
Manage and deploy cloud-based security systems.
Create and execute cloud-based security systems.
Lead teams working on cloud-based security projects
Developing and securing internal systems
Lead the technical security of proprietary devices, software, or proprietary products
Manage the technical security of proprietary devices, software, or proprietary products
Manage the application security layer
Manage application-layer security systems
Design and deploy application-layer security systems
Manage the design and deployment application-layer security systems
Developing and securing internal systems
Test and assess cybersecurity vulnerabilities
Create simulated attacks for system hardening
Securing critical systems
Manage and administer networks for internal infrastructure
Manage and administer systems for internal infrastructure
Design and deploy networks and systems for internal infrastructure
Leadership over any general security operations or departments
Strategic executive that runs the entire security program
Developing and securing internal systems
Monitor, assess, and coordinate GRC threat responses
Conduct management oversight of the leadership of the GRC teams
Developing and securing internal systems
Monitor, assess, and coordinate data planning
Monitor, create, and develop business solutions using ML and AI.
Conduct management oversight of the leadership of the Data teams
Contact us to start your search!
SecureRecruit
Atlanta, Georgia, United States
Copyright © 2023 SecureRecruit - All Rights Reserved.
Powered by GoDaddy
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.