Improve your Employability

DemandIndex is a measure of the employability of a person in a particular region based on your current skills.

Are your skills in demand?

Try DemandIndex LITE and find out instantly

Check for Top 10 Skills in demand for Security; Penetration Testing. Click here

Current DemandIndex value for Security; Penetration Testing is -8.5294

Latest Security; Penetration Testing jobs
IT Security Specialist with Ping Federate Addison Texas ( 3 days WFO, 2 days WFH) Look for candidate within TX Duration: 12 months MUST HAVE SKILL: PingFederate + Container + OpenShift or Kubernetes 7+ years of experience in Information Security Strong hands-on experience with industry standard SSO technologies and protocols (OAuth, OpenID Connect, FIDO, SCIM, LDAP, SAML) Strong expertise in administration (including policy management) and support of Identity and Authentication s
Apr-27-24
Apply
[Already Applied]
Sacramento, CA
($) : $60k - $130k/year
Information Security Lead Sacramento, CA 6+ months Required Skills: Must have a minimum of five (5) years of experience applying security policies, standards, testing, modification, and implementation. At least three (3) years of that experience must be in information security analysis. 7 years' experience within the last 10 years providing security vulnerability and risk assessment services. Security Certification either Certified Information Systems Security Professional (CISSP) or Cert
Apr-26-24
Apply
[Already Applied]
Sacramento, CA
($) : $60k - $130k/year
Security Analyst Sacramento, CA 6+ months Onsite Required Skills: 3 years demonstrated experience assessing the security of complex integrated applications with the following characteristics: o Internet accessible databases containing personal (confidential) information. o Availability, backup, recovery, and data integrity issues of 24/7 systems. o Very large database and high-volume online system, that includes over 1 million records and 100K transactions a year Multiple tier applicatio
Apr-26-24
Apply
[Already Applied]
($) : Market
Job Description:We are seeking an experienced and knowledgeable Security and Technology Consultant to join our team. The ideal candidate will possess a deep understanding of security principles and technologies, coupled with a strong grasp of risk management concepts. This individual will play a critical role in decision-making processes, drawing upon their extensive experience in large enterprise environments to ensure the security and integrity of our systems and data.Responsibilities:Particip
Apr-26-24
Apply
[Already Applied]
This position will be responsible for cloud control validation and evidence gathering process re-engineering and Playbook documentation. Requires strong understanding of Azure and/or Google, overall strong cloud technology and security knowledge. Strong experience in technical writing, process development, process mapping, process flow diagraming and process re-engineering. Conduct evidence gathering in support of validation of cloud controls then pivot to developing Playbooks that will en
Apr-24-24
Apply
[Already Applied]
($) : BASED ON EXPERIENCE
The Security Architect shall lead information technology security initiatives, identify security issues and provide solutions and mitigations, and train, mentor, and lead other security positions to improve the overall security of the Agency. This position will evaluate existing security strategies. The Security Architect will verify the security of the systems and maintain compliance with changing system configurations and security requirements. ; five (5) years of experience as a Security Arch
Apr-24-24
Apply
[Already Applied]
wyoming, WI
($) : BASED ON EXPERIENCE
The document manager shall oversee and manage the company's documents to ensure efficient accessibility and security. three (3) years of experience as a Document Manager including prior experience working on public sector healthcare system implementation projects; current work assignments (client name); and home office location.
Apr-24-24
Apply
[Already Applied]
10+ years of relevant IT experience Implementation of best practice IT policies and procedures Technology research, testing, installation, troubleshooting IT Service Management practices and relationship building Responsibilities: Technical expertise in security policies, device management, Google Workspaces, etc. Support IT training and professional development Virus threat response, project planning, helpdesk escalation Interact with remote staff, advise CIO on business needs
Apr-23-24
Apply
[Already Applied]
Will support Cloud Security tasks specific to developing/documenting codifiable cloud security control parameters for Azure and GCP platforms/services. Will have experience with Information Security industry and government standard frameworks Will have experience navigating and working with Cloud Service Provider platforms and associated services and controls (Azure and/or Google You will be required to use your understanding of industry benchmarks and control requirements to document
Apr-23-24
Apply
[Already Applied]
Cheyenne, WY
($) : BASED ON EXPERIENCE
1 Project Manager: The Proposer shall propose a Project Manager who shall remain assigned to the project.The Project Manager shall oversee the project and serve as the focal and single point of contactfor all day-to-day technical and functional matters relating to the execution of the project.The Project Manager is responsible for managing and reporting on project timelines and meeting project milestones.The Proposer shall provide an individual résumé; a list of their qualification
Apr-23-24
Apply
[Already Applied]