Certified Ethical Hacker Jobs in Dallas, TX

Refine Results
41 - 47 of 47 Jobs

Google Cloud Platform Security Engineer

ADDSOURCE

CA

Third Party

Role: Google Cloud Platform Security Engineer (L5) Location: Remote (Canada) Duration: Long Term Job Overview: We are seeking an experienced Security Engineer to join our team and play a pivotal role in the modernization and migration of currency applications and data within the bank environment to Google Cloud Platform (Google Cloud Platform). The primary objective of this role is to ensure that the bank's security posture is robust and resilient throughout the entire cloud transformation pro

Senior Staff Research Engineer

Xoriant Corporation

Remote

Contract

Job Title: Senior Staff Research Engineer Location: USA Remote Duration: 6 months Xoriant reasonably expects the pay rate for this position to be within the following range: $60.00/hour-$.65.00/hour. Position Summary Our work is varied, exciting, and meaningful. We rapidly prototype new capabilities to address specific customer needs. We improve our Internet intelligence through other, unique forms of data collection. We develop, maintain, and use our own tools to perform threat hunting. We stan

Security Architecture SME

Valiant Solutions LLC

Remote

Full-time

Valiant Solutions is seeking a Security Architect SME in the Washington DC Metro area to join our rapidly growing and innovative cybersecurity team! Valiant Solutions is seeking a Security Architect SME to join our rapidly growing and innovative cybersecurity team! The Security Architect SME will lead the development of security architecture guidance, standards, and reference diagrams for on-premise and cloud platforms and systems. This position requires a deep level of understanding of NIST Spe

Security Engineer Healthcare/Eyecare Domain

Sonata Software North America

Remote

Full-time

Sonata Software Overview Sonata is a global technology company specializing in platform-based digital transformation, supporting businesses to become connected, open, intelligent and scalable. Sonata s Platformation methodology brings together industry expertise, platform technology excellence, design innovation and strategic engagement models to deliver sustained value to customers. A trusted partner of world leaders in the retail, manufacturing, distribution, travel, services and software ind

AI Developer

NexGen Data Systems, Inc.

Remote

Full-time

NexGen Data Systems is hiring for an AI DevOps SME. This position will support the Network Engineering team and will be focused on providing Artificial Intelligence and Machine Learning Solutions. This position will frequently interact with customers. This position will be responsible for identifying gaps and opportunities within our cybersecurity architecture, evaluating emerging technologies, and implementing AI/ML-driven solutions to enhance our security posture. Roles & Responsibilities Deve

Information Security Analyst

Techno-Comp, Inc.

Remote

Contract

Job Title: Information Security Analyst Work Location: Ashburn VA or Cary NC or Temple Terrace FL (Remote) Duration: Long Term Contract Job Description: LOCATION: Must be 60 miles from Ashburn VA, Cary NC, or Temple Terrace FL. 100% REMOTE MODEL: Night Shift 12:00 AM 08:00 AM EST, 5 days a week, including weekends. Job Duties: Information Security Analysts are the backbone of the Security Operations Center (SOC), providing crucial support to enterprise-level customers.Tier-1 Security Analysts wi

Cyber SOC Security Analyst Columbia, SC / Remote ((candidate needs to spend 1 week every 3 months)

Software People, Inc.

Remote or Columbia, South Carolina, USA

Contract

Phone/Skype Hire. Mostly remote. The candidate needs to spend 1 week every 3 months at the client site. Location: Columbia, SC / Remote Duration: 12+ months This specific Statement of Work is for a Cyber SOC Experienced Analyst to prevent, detect, investigate, and assist in directing remediation to cyber-attacks and threats against organization enterprise applications, networks, and services by investigating indicators of suspicious and malicious activity, and proactively discovering threats t