Improve your Employability

DemandIndex is a measure of the employability of a person in a particular region based on your current skills.

Are your skills in demand?

Try DemandIndex LITE and find out instantly

Check for Top 10 Skills in demand for Cyber Security. Click here

Current DemandIndex value for Cyber Security is -4.7

Latest Cyber Security jobs
Cyber Security Engineer 100% REmote TECHNICAL SKILLS Must Have AWS Security Groups Firewall Policies Palo Alto Firewalls Panorama Management Routing protocols Nice To Have Ansible GitHub Linux Command Line PCI DSS and/or compliance exposure Python Splunk Terraform JOB DESCRIPTION Engineers solutions in alignment with the Cybersecurity engineering road map, and maintains processes for the delivery of highly-complex secure systems, cyber applicati
Oct-02-25
Apply
[Already Applied]
Job Scope -The role of the Business Analyst (BA) consists of assisting the NextEra Energy (NEE) IT Cybersecurity NERC CIP Compliance team with the implementation of new Identity and Access Management program (IAM) related tools, along with post implementation testing, support, and enhancements. The BA will be accountable for working cross-functionally to deliver quality and timely outcomes. In addition, the BA will assist IT compliance analyst SMEs with various NERC CIP Identity and Access Manag
Oct-02-25
Apply
[Already Applied]
Atlanta, GA
JOB DESCRIPTION: Top skills Professional certifications include CISSP, CISM, CISA, CRISC, or equivalent (preferred Proven experience with MDR solution platforms (highly preferred Experience with Meraki systems (a plus The Opportunity We're seeking a dynamic and growth-minded talent to join us in the role of Cybersecurity Lead to oversee all aspects of the company’s cybersecurity operations, including managing internal security processes and collaborating with key vendors. This
Oct-02-25
Apply
[Already Applied]
Remote, Work from Home
Job Description: · Design, implement, and manage enterprise SIEM (Splunk) solutions for centralized log analysis and real-time event monitoring. · Develop and fine-tune correlation rules, alerts, dashboards, anduse cases to detect anomalous and malicious activity. · Lead data ingestion and normalization from varied enterprise systems (e.g., cloud workloads, endpoints, network devices · Develop and maintain SOAR playbooks to automate incident detection, triage, response, and reco
Oct-02-25
Apply
[Already Applied]
Erie, PA
Job Summary:We are seeking a highly skilled and experienced Auth Subject Matter Expert (SME) contractor to join our team. The ideal candidate will possess deep expertise in directory services, authentication systems, identity and access management (IAM), and related security protocols. This role will be instrumental in supporting and enhancing our authentication infrastructure, security models, and access governance capabilities across enterprise applications and cloud platforms. Key Responsib
Oct-02-25
Apply
[Already Applied]
Job description: Position Summary The IAM Engineer will implement, manage, and maintain the identity and access management infrastructure. The role ensures secure, efficient, and scalable access to digital resources while supporting business objectives and maintaining compliance with security standards. Key Responsibilities IAM Implementation and Administration Design, configure, and manage IAM framework using Microsoft Entra ID (Azure AD), Active Directory, and SSO technologies. Ali
Oct-02-25
Apply
[Already Applied]
Launch Your Career with Cook SystemsReady to elevate your career? Cook Systems, a certified veteran owned IT consulting firm, has been transforming businesses and careers since 1990. Whether you're aiming to work with a Fortune 500 company or a small business, we've got you covered.Our core values: integrity, investment, and innovation drive everything we do, ensuring you grow and succeed in a dynamic, supportive environment. We understand the importance of work life balance and personal growth.
Sep-26-25
Apply
[Already Applied]
Role: - Cyber Security Analyst Bill Rate: $88/hour C2C Location: Warren, NJ Duration: 12+ months/ long-term Interview Criteria: Telephonic + Skype Direct Client Requirement Job details: 1. Demonstrated experience in cyber security or related IT field. 2. Demonstrated experience with adversarial tactics, techniques, & procedures (TTPs 3. Demonstrated experience with computer attack methods and system exploitation techniques. 4. Demonstrated experience with cyber security p
Sep-25-25
Apply
[Already Applied]
Hi, Hope all is well, Please revert me with an updated resume if you would like to apply for this role, Cyber Security Program Manager (3 days/week onsite) Chicago, IL Duration : 6 + months Location : Chicago, IL Local candidates only About the job Cybersecurity Project Manager Identity & Access Management / Data Protection 10+ years of experience A results-oriented cybersecurity program leader who can navigate a large, regulated enterprise, deliver on mission-critical IAM and
Aug-30-25
Apply
[Already Applied]
Nashville, TN
Launch Your Career with Cook SystemsReady to elevate your career? Cook Systems, a certified veteran owned IT consulting firm, has been transforming businesses and careers since 1990. Whether you're aiming to work with a Fortune 500 company or a small business, we've got you covered.Our core values: integrity, investment, and innovation drive everything we do, ensuring you grow and succeed in a dynamic, supportive environment. We understand the importance of work life balance and personal growth.
Aug-30-25
Apply
[Already Applied]