Do you have a job vacancy that you need filled? Drop us a line: [email protected]
NO AGENCIES: This is a free service for the community.

It should be pointed out that the “Posted” field denotes when we here at Liquidmatrix posted the gig to the job board. This does not indicate the freshness of the posting per se. If you find a stale link please email us to let us know. We’ll remedy that in short order. This is a courtesy board and we do not vouch for any of these companies. Please do your homework.

Position
Company
Description
Posted
Where
Category
Skill
Remote?
Nessus Vulnerability Research EngineerTenableThe Vulnerability Research Engineer is part of the Research Department. Tenable maintains a staff of engineers who keep track of all new publicized vulnerabilities and then develop "plugins" for the Nessus vulnerability scanner. These "plugins" are short programs that efficiently and accurately test scanned systems for the presence of the vulnerability. Often, being able to accurately test for the vulnerability involves analyzing vendor-supplied security patches, manually configuring vulnerable targets in a virtual environment, analyzing the system or application to reliably understand the impact of the vulnerability then developing a method to test for the vulnerability remotely.Aug 1, 2012Maryland, USAR&DMediumN/A
Senior Security Consultant-APITenableTenable's Professional Services organization performs Tenable product installation, configuration, customizations, and security audits for our clients, and is looking to hire a security consultant with expertise developing scripts and tools that leverage the Tenable product APIs to meet customer needs.Aug 1, 2012Maryland, USAPro ServHighN/A
Research Engineer (Quality Assurance)TenableTenable Network Security is the editor of Nessus, the world most popular vulnerability scanner, deployed across the globe among many customers ranging from the U.S. government to local CPA companies. We are looking for a talented and meticulous individual to help us review and test new security checks we release into our plugin feed.Aug 1, 2012Maryland, USAR&DMediumN/A
C Software Engineer - NessusTenableTenable Network Security is looking for a qualified Unix Developer to join our product development team. This position will involve optimizing a network scanning engine, extending a scripting language as well as writing optimized Unix shell scripting rules.Aug 1, 2012Maryland, USAR&DMediumN/A
Senior Security ResearcherRapid7The ideal candidate is an experienced developer with strong skills in Java and Ruby and experience or demonstrated interest in the security industry.Aug 1, 2012Toronto, ON, CanadaCoderMed-HighN/A
Software DevelopereSentireThis dynamic role provides a breadth of experience across a wide range of responsibilities at all levels of the product development lifecycle. You will be responsible for helping to optimize our database technology for data capture and analytics, including I/O management, CPU utilization, caching algorithms and advanced algorithms for data manipulation. Your output will include data aggregation and report generation.Aug 1, 2012Cambridge, ON, CanadaCoderMediumN/A
QA DevelopereSentireWe need to hire someone who is passionate about new technologies and has a strong attention to detail. If that describes you and you have what it takes to work in a diverse, dynamic environment, we want to talk to you right away!Aug 1, 2012Cambridge, ON, CanadaCoderMediumN/A
Access Provisioning AnalystThe DominionThe Access Provisioning Analyst is responsible for setting up user access and designing user roles. We're a growing team with a long term plan on improving security for our business which includes improving our user provisioning processes. Please apply via the Workopolis link.Aug 1, 2012Toronto, ON, CanadaAccess ControlMediumNo
Malware Researcher (and others)SeculertResponsibilities
Analyze malicious code, document and transition results in reports, presentations, and technical exchanges
Design, prototype, document, develop malicious code analysis methods and tools.
Identify and document high impact, emerging, and complex active security threats.
Jan 10, 2012TBDCoderMediumN/A
Software Engineer / Analyst (Security)AtsecAre you an expert in the architecture of operating systems, networking, or virtualization software? Do you have a sound understanding of security issues associated with these technologies?

atsec is looking for a senior level individual with a technical background to join our team of security analysts and consultants as full-time employee in sunny Austin, Texas. We are a diverse, international group of over forty security professionals and are seeking to augment our team with technology experts that will take leading roles in performing standards-based and customized security assessments, evaluations, and testing of software products for our clients.
Jan 9, 2012Austin, TX, USACoderHighNo
Application Security Consultant/MPTVeracodeVeracode looking for a smart, energetic and motivated individual to add to our team of consultants. We are open to applicants at various career levels from mid-senior.Jan 3, 2012VariousPro ServMediumN/A
Application Security AnalystVeracodeWe are looking for professionals with experience programming and or reviewing code in several of C, C++, C#, .NET, Java, PHP, Objective-C, ColdFusion and/or Ruby on Rails as well as application security experience.Jan 3, 2012Burlington, MA, USACoderMediumNo
Security Program ManagerVeracodeThe Security Program Manager position at Veracode is a consulting role to ensure the adoption of Veracode’s solutions throughout our client’s IT delivery and Security organization. Success is driven by our customer’s ability to establish an enterprise-wide Application Risk Management Program as well as realizing full utilization of our subscription services.Jan 3, 2012Burlington, MA and West Coast USA(Pro Serv) ManagementMedium-HighN/A
Security ConsultantVeracodeWe are looking for driven and dynamic individuals interested in pursuing an application security consulting position that have prior hands-on programming or security experience in a customer support role. The Security Consultant will work in the Client Services organization within Veracode.Jan 3, 2012Burlington, MA, USAPro ServMediumN/A
Solutions Architect/Sales Engineer (Pre-Sales)VeracodeThe Veracode Solutions Architect (SA) plays a critical role in building and sustaining customer relationships while driving the adoption of Veracode solutions in order to surpass our revenue goals. The Solutions Architect works very closely with sales to build long-term business relationships and position Veracode to win new business. The Solutions Architect is a high impact, very visible role responsible for ensuring pervasive enterprise adoption of Veracode solutions, and closing enterprise transactions.Jan 3, 2012Mid-west, West Coast USAPre Sales
ERT Security EngineerRapid7The Security Research and Development Team is responsible for enhancing the core features of NeXpose; its ability to scan hosts and networks to remotely detect all kinds of security vulnerabilities, e.g.: remote arbitrary code execution, weak SSH password, missing security update, world-readable /etc/shadow, authentication bypass, infection by well-known backdoor, predictable TCP ISN, insecure configuration of network services, XSS, obsolete operating system versions, SQL injections, directory traversals, JSP/ASP source code disclosure, denial of services in RPC services, unused built-in account not disabled, privilege escalation, etc.Jan 3, 2012Austin, TX, USACoderMediumNo
Sr. Network Software EngineerRapid7Come lead the next revolution from Rapid7, the leading Unified Vulnerability Management software provider. Located in Toronto, Ontario, Canada, Rapid7's Scan Engine team is utilizing cutting edge technologies to push our network scanning technologies to the highest levels of performance and capability in the Network Security industry. We seek a self-organized, highly motivated, technical leader who is passionate to "make it happen." The ideal candidate will be an experienced software engineer with network programming experience who has delivered software in use by thousands, preferably at an ISV, and has demonstrated success working with dispersed and distributed teams. This is an exciting opportunity to be part of a revolution in vulnerability management and is open to enthusiastic and talented software developers.Jan 3, 2012Toronto, ON, CanadaCoderHighN/A
Technical Support Engineer 3TenableWith little to no supervision, performs a variety of computer systems administration and support tasks, including analyzing, constructing, documenting, testing, maintaining, troubleshooting and supporting of PC hardware, operating systems, software applications, peripherals, and communication devices including hand-held devices for the entire organization. Performs a variety of project tasks and requires good communications skills with the ability to work with users diplomatically and skillfully. Exercises judgment and decision making in the diagnosis and resolution of computer hardware and software problems. Performs full range of work assigned to this class and works with considerable independence and initiative. Jan 3, 2012N/ACustomer SupportMediumN/A
MCIRT Network AnalystMandiantReview security-related events, assessing risk and validity, as well as reporting
on identified incidents
Analyze network-based indicators of compromise or network traffic to assist in
generating new attack signatures
Analyze additional log, forensic, malware, or other IR-related data, as needed
Jan 3, 2012Alexandria, VA; Los Angeles, CAIncident ResponseMediumNo
Event Analyst, Incident Analyst, Incident HandlerMandiantAs an Analyst or Handler in MCIRT, you will provide vital security services to MANDIANT clients (Fortune 500, Federal
government agencies, etc.), review and validate emerging threats, follow established methodologies, recommend
and promulgate process improvement, grow new service line capabilities and author clear and concise client facing
deliverables.
Jan 3, 2012Redwood City, CA; Mountain View, CA USAIncident ResponseMediumNo
Cyber Security EngineerMitreJoin MITRE, a Fortune Magazine’s “100 Best Companies to Work For” for the tenth year in a row. As a member of a cutting-edge cyber analysis team you will support data extraction and forensic analysis across a broad spectrum in a challenging and rewarding operational environment for a federal law enforcement sponsor. You will interface daily with the sponsor and the rest of the team in a fast-paced environment to further the organization’s goals. This position will be primarily located at our sponsor’s facilities in Crystal City, VA.Jan 1, 2012Crystal City, VA, USAForensics, Incident ResponseMediumNo
Cyber Security EngineerMitreJoin MITRE, a Fortune Magazine’s “100 Best Companies to Work For” for the tenth year in a row. As a member of a cutting-edge cyber analysis team you will support data extraction and forensic analysis across a broad spectrum in a challenging and rewarding operational environment for a federal law enforcement sponsor. You will interface daily with the sponsor and the rest of the team in a fast-paced environment to further the organization’s goals. This position will be primarily located at our sponsor’s facilities in Crystal City, VA.Jan 1, 2012Crystal City, VA, USAForensics, Incident ResponseEntryNo
Security AnalystZeniMax MediaMaintains, monitors, and optimizes operational security systems such firewall, IDS/IPS, vulnerability scanners, VPN, web application firewall, etc.

Ensures studio servers, network devices, and applications meet established organizational and industry security guidelines

Implements information security program under the supervision of Network Operations and Platform leadership team to meet studio security and risk management objectives

Recommends additions and changes to security and information system standards, policies and procedures

Effectively communicates technical information to Network Operations staff members and other corporate-wide staff

Supports network operations team in response to outages and other non-security tasks as necessary
Sept 19, 2011Hunt Valley, MD, USANetwork SecurityMediumNo
Technical Project Manager Red TeamGeneral ElectricThe Technical Project Manager will serve as a technical security resource responsible for managing Red Team engagements. including information gathering, coordination of resources and reporting to stakeholders. The TPM will serve as the primary interface with customers and provide expertise, establish trust and confidence and ensure that the customer and the technical team remain aligned throughout the project.Aug 26, 2011Glen Allen, Virginia, USA.(Technical) ManagementMedium-HighNo
Senior Red Team AnalystGeneral ElectricThe Senior Red Team Analyst is responsible for leading and delivering controlled threat simulation services against company assets and actively mentoring Red Team Analysts. Red Teaming includes threat research, structured attack development, vulnerability research and exploit development/testing, scripting, controlled exploitation of configuration weaknesses and software vulnerabilities, evasion of detection mechanisms and more.Aug 26, 2011Glen Allen, Virginia, USA.PentesterMedium-HighNo
Red Team AnalystGeneral ElectricThe Red Team Analyst is responsible for delivering controlled threat simulation services against company assets. Red Teaming includes threat research, structured attack development, vulnerability research and exploit development/testing, scripting, controlled exploitation of configuration weaknesses and software vulnerabilities, evasion of detection mechanisms and more.Aug 26, 2011Glen Allen, Virginia, USA.PentesterEntry-MediumNo
Sr. Technology Planner - SecurityCanadian TireThis individual will be responsible for the strategic on-going planning and design of security-related aspects of Canadian Tire's enterprise-wide computing environment. The focus will be on developing and maintaining security technology roadmaps, driving the introduction of new technology where needed, planning lifecycle maintenance of the current security technology footprint and participating in the technical design of project infrastructure solutions for a wide range of business needs.
You will be called upon on a regular basis to participate in the planning process (providing technical assessments, recommending possible solutions, providing effort estimates) for both new projects and operational initiatives covering a wide range of business needs.
Aug 19, 2011Toronto, ON, CANetwork SecurityMedium-HighNo
Specialist Information SecurityErnst & YoungAs a Security Consultant, the individual will be responsible for providing security guidance to IT project teams responsible for delivering business solutions. The Security Consultant will identify and prioritize security-related requirements, promote secure-by-default designs and ensure information systems and infrastructure will be secured throughout system development life cycle (SDLC). The Security Consultant will also be expected to perform risk assessments of information systems and infrastructure, develop appropriate risk treatment and mitigation options, and effectively articulate findings and recommendations to IT project teams and management. The successful candidate will have broad experience over an array of information security and technical disciplines and be able to provide pragmatic, business-aligned security guidance.
The Security Consultant will be expected to work on multiple projects and tasks concurrently.
Aug 16, 2011Secaucus, NJ OR Atlanta, GA, USPro ServMedium-HighNo
IT Security ConsultantProtivitiFast-growing security practice seeking all levels of security consultants to support its PCI DSS, risk management, incident response, and penetration testing services. Competitive salary and generous benefits. Technical experience in *nix, Windows, networking, and/or software development highly desired (you don’t have to go deep in every area, but deep in at least one). Existing PCI QSA’s highly desired. CISSP/CISA preferred. We are the high-quality provider in the market and help our Fortune 1000 clients secure their most valuable assets. Between 50-70% travel required, depending on location and position.

Email Adam Brand at (firstname dot lastname protiviti.com) for details.
Aug 11, 2011Los Angeles, CA; San Francisco, CA; Phoenix, AZ; Denver, CO; Chicago, IL; St. Louis, MO; Houston, TX; Dallas, TX; Philadelphia, PA; New York, NY; Orlando, FL.Pro ServMedium-HighVaries
Penetration TesterProtivitiFast-growing security practice seeking all levels of security consultants to support its PCI DSS, risk management, incident response, and penetration testing services. Competitive salary and generous benefits. Technical experience in *nix, Windows, networking, and/or software development highly desired (you don’t have to go deep in every area, but deep in at least one). Existing PCI QSA’s highly desired. CISSP/CISA preferred. We are the high-quality provider in the market and help our Fortune 1000 clients secure their most valuable assets. Between 50-70% travel required, depending on location and position.

Email Adam Brand at (firstname dot lastname protiviti.com) for details.
Aug 11, 2011Philadelphia, PA; New York, NYPentesterMedium-HighNo
Security ResearcherAlert LogicBased in Houston, TX, Alert Logic is seeking a Security Researcher to work with our team of research engineers in analyzing new threats, proactively finding vulnerabilities and writing detection logic for these attacks. The Security Researcher must be skilled in reverse engineering, exploit development, memory corruption vulnerabilities, and various web technologies.Aug 8, 2011Houston, TX, USResearchMedium-HighNo
Program Manager, IT Security & Risk AssuranceCity of EdmontonYour objectives in this role ........ develop, implement and monitor a strategic, comprehensive IT Security and Risk Assurance program to ensure the integrity, confidentiality and availability of electronic information owned, controlled or processed by the City of Edmonton. As the Program Manager you will also develop, communicate, and ensure compliance with the City of Edmonton's IT security directives, standards, and procedures. To oversee IT risk assurance, you will identify, evaluate, and report on information security risks, work with business leaders to identify acceptable levels of risk, and implement practices that meets compliance and regulatory requirements for information security.Aug 5, 2011Edmonton, AB, CAManagementHighNo
Director, Professional Services WorldwideSourcefireEvangelizing and positioning Sourcefire solutions to commercial and Federal customers
Manage Professional Services Engagement Schedule and timesheets
Manage Utilization of Security Consultants
Drive Professional Services Revenue and Bookings
Enable partners to deliver Sourcefire Services
Work with sales team to quote and scope professional services worldwide
Track and manage expenses for team
Develop and maintain existing and new professional service offerings
Work with engineering and business development teams to bundle 3rd party approved offerings into Sourcefire Services
Develop career paths for security consultants to promote growth
SME on Sourcefire 3D solutions
Evangelizing and positioning Sourcefire solutions to commercial and Federal customers
Thorough understanding of the technology landscape
Proven planning, customer services and administrative abilities capable of managing a highly complex and diversified range of duties
Aug 1, 2011Columbia, MD, USPro ServHighNo
Systems/Sales EngineerCore SecurityThis position requires the ability to deliver technical presentations to network and security professionals both in person and via phone/web conferencing. The role involves the development and maintenance of strong technical relationships with our partners, customers and engineering team in order to establish new opportunities and support existing ones. Along with pre-sales responsibilities, SEs also provide product training to our current customers, partners and prospects and conduct vulnerability assessments as part of Core's software and services offerings.Aug 1, 2011Chicago, IL, USNetwork Security / Pre SalesMediumNo
Senior Security ConsultantsOracleAs a member of our team, consultants participate in broad, complex, and critical Oracle security engagements, providing guidance and direction to project team members, clients, and partners.

The consultant will be responsible for designing and implementing Oracle Access Management, Provisioning, User Management and Directory Services solutions for the Oracle Application Server Identity Management Suite.

Tasks include analysis of business requirements, solution design, solution implementation, code development, and presentations as necessary.
Aug 1, 2011US or CanadaApplication SecurityMedium-HighYes
Security Security SpecialistRogersRogers is seeking a Senior Security Specialist to provide Production Support. Reporting to the Enterprise Production Manager at the Rogers Park Brampton campus this individual will provide production support to our Enterprise Security applications and processes as well as provide day-to-day production support by managing issues, changes, problems and incidents. This individuals will work closely with project teams to ensure support and knowledge transfer for project initiatives.Aug 1, 2011Brampton, ON, CAIncident ResponseMediumNo
IT AuditorLoblawsThe IT auditor develops and completes comprehensive reviews of internal controls on applications, infrastructure (networks, operations systems etc), security, projects & system development life cycle within the Information Technology Division. The IT auditor also works closely with Operational, Distribution Centre, Store Audit teams and Internal Control Compliance in matters related to information technology.Aug 1, 2011Brampton, ON, CAIT AuditMediumNo
Senior Security Consultant, Principal Security Consultant (.pdf)NeohapsisA Security Consultant is responsible for supporting the sale, delivery and
management of security and information risk related consulting services. A
consultant must have extensive information security experience–security program
implementation, policy and governance, monitoring, assessment and audit, and
security operations. Individuals must have in-depth experience in application
security, network security, and information security program and risk management.
A consultant must be able to evaluate and determine an organizations overall
information security maturity, and propose tactical and strategic advisory services to
improve a client’s overall program and risk posture. The consultant position requires
the skill set to think outside the Information Technology activities, but rather the
business process needs, and its Information Security and governance
requirements. We require a strong commitment to clients and a passion to lead and
mentor. This position requires the ability to work with consulting teams to assure the
client’s success, and ultimately, the success of the company.
July 29, 2011Chicago, IL; Dallas, TX; Boston, MA; Washington, DC; San Jose, CA, USPro ServHighVaries
Security Engineer - Penetration TestAmazonAmazon is one of the largest providers of web services and software in the world. Not only does the company build and/or operate hundreds of the top web properties, it also produces software for all types of networks and devices. Among the over 500 web properties and hundreds of stand-alone applications are some of the most innovative and intriguing new technologies in the world, including the Kindle, mobile applications for all major platforms, and all manner of cloud computing web services.
An integral part of securing these technologies is to understand and verify the risks inherent in them. Therefore, we are searching for world-class security engineers to engage in offensive security testing – penetration testing, of everything Amazon builds and operates. If you want a “get-out-of-jail-free” card to attack some of the most exciting technologies available today, you need to talk to us.

NB. Other positions at Amazon
July 29, 2011Seattle, WA, USPentesterMedium-HighNo
Sr. Security EngineerBloombergBloomberg needs a versatile security professional with expertise in Windows or UNIX and a practical understanding of real world hacking

Responsibilities Include:
-Examine platforms and technologies for exploitable vulnerabilities using
dynamic and static analysis
-Prove exploitability of suspected vulnerabilities
-Provide design and architecture recommendations to a wide array of product teams and network engineers
-Consult teams on best practices for creating secure applications
-Perform web application penetration testing
July 29, 2011New York, NY, USPentesterMedium-HighNo
Forensic and Incident Response ExpertiSEC PartnersiSEC Partners is currently looking for forensics experts and skilled incident responders to help our clients defend their systems and respond to breaches. Job duties will include providing high-end consulting and support to F500 companies and cutting-edge research into current technologies and attacks.

Other positions at iSEC
July 29, 2011San Francisco, CA, USForensicsMedium-HighVaries
Cyber Security EngineerRackspaceResponsibilities:
- Develops, improves, modifies, and assesses security architecture in a hosting based environment
- Leads complex network, server and application security assessments and identifies solutions to enhance or create new business opportunities, integrating multiple technologies at times
- Provides technical and systems consultation and actively works with internal clients and technical management to eliminate risk exposures
- Conduct security and vulnerability assessments on new product offerings
- Works with system engineers, developers and architects to implement secure coding practices, technical documentation standards, patching guidelines, QA processes, deployment procedures and configuration management
- Ensures that the computing environments are kept current with service and software update releases, and evaluates assessment tools for selection and integration into these environments
- Develops and executes security testing plans which may include managing joint efforts with 3rd party vendors

Other positions at Rackspace
July 29, 2011San Antonio, TX, USNetwork SecurityMediumNo
Security & Compliance Internal Tools DeveloperTripwireThe role: As an SCS Internal Tools Developer, you will help build internal systems to drive efficient workflow, provide new insight and solve one-off problems quickly. You will be responsible for an entire project, from gathering requirements to launching and maintaining your work of art in a cross functional environment. You have maximum flexibility in how you prioritize project(s) and run with them. We want a smart, quick, and creative person who is a self-starter; who will dig deep into the systems and find various ways to improve them.July 28, 2011Portland, OR, USApplication SecurityMediumNo
Application Security AnalystRealex PaymentsThe ideal candidate will have either an infrastructure security or
development background but above all they must have a real passion for
all things security including application security. The right
candidate would receive training and mentoring from our existing
application security staff who regularly speak at the large security
conferences around the world, release open source security tools and
are seen as experts in this space.

Apply to [email protected] The position is required immediately.
July 28, 2011Dublin, IEApplication SecurityMediumNo
Windows Software EngineerInvinceaWe are looking for a Senior level C++ Developer to help design and build our innovative products. You will design and develop our revolutionary desktop security products primarily in a Windows desktop environment with C++. A well rounded technical background is needed. Windows/C++ is our primary environment but we also run on Linux and use other languages and technologies. July 28, 2011Fairfax, VA, USApplication SecurityJunior-MediumNo
Principal Software EngineerBarracuda NetworksThe Principal Software Engineer is responsible for the continuing development of BarracudaWare's server and desktop/laptop data protection products including new feature design and implementation and defect resolutions. The ideal candidate will be able to quickly determine and clearly articulate to team members the effects of new features on the entire product. Demonstrated experience with refactoring patterns is a must. July 28, 2011Fresno, CA, USApplication SecurityMedium-HighNo
Professional Services ConsultantMcAfeeMcAfee, Inc. Professional Services seeks Network and Threat Forensics Any analysis for our intelligence community client. These analytical sertyanalysis, threat analysis and reporting, information assurance, netwand computer network operations (CNO)synchronization planning and suppthreat characterization capabilities that will forecast, alert, the analyst. The Threat Forensics Analyst performs static and dynamic analysis,development of mitigation strategies working directly with the customer awithin the organization.July 28, 2011Reston, VA, USPro ServMediumNo
Director, Information and Technology SecurityFirstOntario Credit UnionWorking with IT management and staff, the Board of Directors, the Executive Team, the Risk Management/Compliance department as well as the Senior Management Team; your job would be in part, to make this concept of a unique banking experience empowered by members being owners, come to life through the policies, practices and decisions of the Information Technology Division. The Director, Information & Technology Security role is to provide hands on technical vision and leadership for developing, supporting and monitoring IT security initiatives. As the subject matter expert the Director has the overall responsibility for proactively safeguarding all technology services and data against security breaches and vulnerability issues.July 26, 2011Toronto, Ontario, CanadaInformation SecurityHighNo
Security ArchitectIBMOur IBM Canada Security Team is looking to add a Solution Architect to our current team to provide technical leadership to our customers, support the Sales Team to win business, and create content rich solutions for our Canadian and Corporate Global Customers.

The best candidate will possess skills/experience like the following below. Also, the best candidate will have experience working in a Global Enterprise Environment where collaboration and value add are expected in the role.
July 26, 2011Toronto, Ontario, CanadaInformation SecurityHighMaybe
Senior Information Security OfficerEntrustThe Senior Information Security Officer is responsible for the design, implementation and management of information security controls, policies and procedures to mitigate risk and enhance the organization’s security services. This role will collaborate with multilevel stakeholders to ensure the confidentiality, integrity and availability of information data.July 26, 2011Kanata, Ontario, CanadaInformation SecurityHighNo
Network Security Consultant/Penetration TesterRapid7Rapid7's Professional Services Organization performs security audits and penetration testing for our clients and is looking to hire a security consultant(s) to expand our rapidly growing practice.July 26, 2011Boston, MA, USNetwork SecurityMediumMaybe
Senior Security EngineerZyngaZynga is looking for a talented Security Engineer to come and join their dynamic team! If you have a strong sense of ownership and see problems through completion, we’d love to talk to you. We are looking for a self-starter who would love the opportunity to work at one of the fastest growing companies in the web 2.0 space.
This person will join a growing Network Operations team based in San Francisco, with responsibilities in our San Francisco main office and occasional visits to multiple South Bay datacenter locations. Hours are flexible, but will often require late evening and 24x7 responses to critical issues on a fast-growing, high volume network infrastructure.
July 26, 2011San Francisco, CA, USNetwork SecurityHighNo
Computer Network Operations (CNO) - OperatorNational Security AgencyWe are looking for people with a solid understanding of network penetration techniques, tools, and methodologies that can defend a network from attack. You should have broad expertise with multiple operating systems and a strong networking background to include network security devices. If you routinely visit network security websites, attend conferences, or maintain your own network we would like to talk to you! July 26, 2011Ft. Meade, MD, USSecurity OperationsMediumNo
Information Security Director, Cloud ComputingSalesforce.comSalesforce.com has one of the best Information Security teams in the world and growing this piece of the business is a top priority! Our Information Security teams work hand in hand with the business to ensure the highest security around all of our applications.July 26, 2011San Francisco, CA, USCloud SecurityHigh+No
Linux Appliance EngineerTenableTenable Network Security is looking for a qualified individual to assist in the development of our Linux based virtual and hardware appliances. This position will augment Tenable's existing appliance program which consists of making virtual and hardware images of all of Tenable existing products. The LUA programming language is used to render the configuration of all appliances. CVS, the RPM process, and VMware are heavily leveraged in the build process of the existing appliances. The right candidate will also have opportunities to assist other Tenable groups with their scripting needs.July 26, 2011Columbia, MD, USVirtualization / HardwareMediumNo
Technical Program Manager-Risk Management-Information SecurityAmazonAmazon.com is looking for a technical program manager focused on programmatically managing risk within Amazon and its subsidiaries. If you enjoy working in a rapidly changing environment and influencing the strategic direction of a large global organization, this position will provide you with a challenging opportunity. You will be responsible for coordinating 3rd party vulnerability testing, assisting with internal security reviews, working with internal teams to address compliance and audit issues, and enhancing the organization’s information security programJuly 26, 2011Seattle, WA, USRisk ManagementHighNo
Application Security SpecialistWhitehat SecurityIn this role you will have access to thousands of well-known and famous websites. Your job will be to actively root through these websites looking for all of the ways a blackhat could use to break into a site. This position will teach you to master the basics of web application security and secure software engineering. You will learn what it takes to become a skilled hacker and have opportunities to advance into more senior Security Engineering positions at WhiteHat if you demonstrate the required aptitude and skills. This experience will also launch your career in the rapidly growing web application security industry.July 26, 2011Santa Clara, CA, US / Houston, TX, USApplication SecurityEntryNo
Security Program Manager - Trustworthy ComputingMicrosoftIn this role, you will have broad influence across Microsoft and work as a security advisor to a portfolio of products and online services that may include teams such as Office, Azure, IE, Silverlight, Visual Studio, SQL, Exchange, Bing, MSN, etc. In addition to ensuring that these products and online services meet the requirements of the Security Development Lifecycle (SDL) you will help to evaluate, understand and resolve complex security issues, and, where necessary, you will make further recommendations to development teams to deliver a safer experience to customers.July 26, 2011Redmond, WA, USInformation SecurityHighNo

(Image used under CC from cwgcph)