Jobs Near Me
  • Home
  • Search Jobs
  • Register CV
  • Post a Job
  • Employer Pricing
  • Contact Us
  • Sign in
  • Sign up
  • Home
  • Search Jobs
  • Register CV
  • Post a Job
  • Employer Pricing
  • Contact Us
Sorry, that job is no longer available. Here are some results that may be similar to the job you were looking for.

2 jobs found

Email me jobs like this
Refine Search
Current Search
director cybersecurity data protection and insider threat
Target
Director Cybersecurity - Data Protection and Insider Threat
Target Minneapolis, Minnesota
The pay range is $163,000.00 - $294,000.00 Pay is based on several factors which vary based on position. These include labor markets and in some instances may include education, work experience and certifications. In addition to your pay, Target cares about and invests in you as a team member, so that you can take care of yourself and your family. Target offers eligible team members and their dependents comprehensive health benefits and programs, which may include medical, vision, dental, life insurance and more, to help you and your family take care of your whole selves. Other benefits for eligible team members include 401(k), employee discount, short term disability, long term disability, paid sick leave, paid national holidays, and paid vacation. Find competitive benefits from financial and education to well-being and beyond at . About Us Target is an iconic brand, a Fortune 50 company, and one of America's leading retailers. Target as a tech company? Absolutely. We're the behind-the-scenes powerhouse that fuels Target's passion and commitment to cutting-edge innovation. We anchor every facet of one of the world's best-loved retailers with a strong technology framework that relies on the latest tools and technologies-and the brightest people-to deliver incredible value to guests online and in stores. Target Technology Services is on a mission to offer the systems, tools and support that guests and team members need and deserve. We drive industry-leading technologies in support of every angle of the business, and help ensure that Target operates smoothly, securely and reliably from the inside out. Our high-performing teams balance independence with collaboration, and we pride ourselves on being versatile, agile and creative. Use your skills, experience, and talents as a member of a world-class cyber security team! About the Role As the Director of Cybersecurity - Data Protection & Insider Threat, you will lead and shape the strategy for Target's Data Protection and Insider Threat programs. This role is accountable for overseeing the teams responsible for building and enforcing the controls, processes, and policies that safeguard Target's sensitive data, as well as detecting, investigating, and responding to data loss and insider threats. You will: Enhance and evolve data protection capabilities to prevent data loss, misuse, or unauthorized exposure. Lead the Insider Threat function, including detection, response, and prevention of malicious insider activity. Help build and enforce enterprise-wide policies around data governance and security controls. Partner with stakeholders across business and technology functions to strengthen insider threat posture and align data protection practices with organizational priorities. Provide vision and strategic direction for Insider Threat and Data Protection analysts, ensuring successful execution of security programs that address enterprise risks. Foster a culture of continuous improvement, innovation, and collaboration. Serve as a trusted advisor to business and technology leaders on insider threat risks and data protection practices. Responsibilities Develop and execute long-term strategy for Insider Threat and Data Protection programs. Establish robust monitoring, detection, and response capabilities using SIEM, SOAR, UEBA, RBA, and DLP technologies. Lead the creation and enforcement of policies for data management, handling, and protection. Identify and address enterprise-wide risks related to insider threats and data exposure. Build strong stakeholder relationships across the enterprise and influence product and technology roadmaps to enhance security posture. Drive cross-functional initiatives and collaborate with other cybersecurity, engineering, and business teams. Provide coaching, performance management, and career development for a team of analysts. Effectively communicate technical issues, risks, and strategies to both technical and non-technical audiences, including senior leadership. Stay current on emerging threats, technologies, and best practices to continuously enhance program capabilities. About You 4+ years of cybersecurity experience, with demonstrated expertise in insider threat, data protection, or related security domains. Proven leadership experience managing cybersecurity teams or functions. Hands-on knowledge of SIEM, SOAR, UEBA, RBA, and DLP tools. Strong problem-solving skills with ability to resolve complex technical issues with minimal assistance. Demonstrated ability to build strong cross-functional partnerships and influence enterprise strategy. Adept at communicating technical issues in training, mentorship, and executive settings. Committed to process improvement and continuous innovation. Strong written and verbal communication skills, with ability to present complex security concepts clearly to varied audiences. Deep understanding of insider threat landscape and modern data protection practices. Self-directed learner who stays current with evolving cybersecurity trends and threats. This position will operate as a Hybrid/Flex for Your Day work arrangement based on Target's needs. A Hybrid/Flex for Your Day work arrangement means the team member's core role will need to be performed both onsite at the Target HQ MN location the role is assigned to and virtually, depending upon what your role, team and tasks require for that day. Work duties cannot be performed outside of the country of the primary work location, unless otherwise prescribed by Target. Click here if you are curious to learn more about Minnesota. Benefits Eligibility Please paste this url into your preferred browser to learn about benefits eligibility for this role: Americans with Disabilities Act (ADA) In compliance with state and federal laws, Target will make reasonable accommodations for applicants with disabilities. If a reasonable accommodation is needed to participate in the job application or interview process, please reach out to . Non-accommodation-related requests, such as application follow-ups or technical issues, will not be addressed through this channel.
10/21/2025
Full time
The pay range is $163,000.00 - $294,000.00 Pay is based on several factors which vary based on position. These include labor markets and in some instances may include education, work experience and certifications. In addition to your pay, Target cares about and invests in you as a team member, so that you can take care of yourself and your family. Target offers eligible team members and their dependents comprehensive health benefits and programs, which may include medical, vision, dental, life insurance and more, to help you and your family take care of your whole selves. Other benefits for eligible team members include 401(k), employee discount, short term disability, long term disability, paid sick leave, paid national holidays, and paid vacation. Find competitive benefits from financial and education to well-being and beyond at . About Us Target is an iconic brand, a Fortune 50 company, and one of America's leading retailers. Target as a tech company? Absolutely. We're the behind-the-scenes powerhouse that fuels Target's passion and commitment to cutting-edge innovation. We anchor every facet of one of the world's best-loved retailers with a strong technology framework that relies on the latest tools and technologies-and the brightest people-to deliver incredible value to guests online and in stores. Target Technology Services is on a mission to offer the systems, tools and support that guests and team members need and deserve. We drive industry-leading technologies in support of every angle of the business, and help ensure that Target operates smoothly, securely and reliably from the inside out. Our high-performing teams balance independence with collaboration, and we pride ourselves on being versatile, agile and creative. Use your skills, experience, and talents as a member of a world-class cyber security team! About the Role As the Director of Cybersecurity - Data Protection & Insider Threat, you will lead and shape the strategy for Target's Data Protection and Insider Threat programs. This role is accountable for overseeing the teams responsible for building and enforcing the controls, processes, and policies that safeguard Target's sensitive data, as well as detecting, investigating, and responding to data loss and insider threats. You will: Enhance and evolve data protection capabilities to prevent data loss, misuse, or unauthorized exposure. Lead the Insider Threat function, including detection, response, and prevention of malicious insider activity. Help build and enforce enterprise-wide policies around data governance and security controls. Partner with stakeholders across business and technology functions to strengthen insider threat posture and align data protection practices with organizational priorities. Provide vision and strategic direction for Insider Threat and Data Protection analysts, ensuring successful execution of security programs that address enterprise risks. Foster a culture of continuous improvement, innovation, and collaboration. Serve as a trusted advisor to business and technology leaders on insider threat risks and data protection practices. Responsibilities Develop and execute long-term strategy for Insider Threat and Data Protection programs. Establish robust monitoring, detection, and response capabilities using SIEM, SOAR, UEBA, RBA, and DLP technologies. Lead the creation and enforcement of policies for data management, handling, and protection. Identify and address enterprise-wide risks related to insider threats and data exposure. Build strong stakeholder relationships across the enterprise and influence product and technology roadmaps to enhance security posture. Drive cross-functional initiatives and collaborate with other cybersecurity, engineering, and business teams. Provide coaching, performance management, and career development for a team of analysts. Effectively communicate technical issues, risks, and strategies to both technical and non-technical audiences, including senior leadership. Stay current on emerging threats, technologies, and best practices to continuously enhance program capabilities. About You 4+ years of cybersecurity experience, with demonstrated expertise in insider threat, data protection, or related security domains. Proven leadership experience managing cybersecurity teams or functions. Hands-on knowledge of SIEM, SOAR, UEBA, RBA, and DLP tools. Strong problem-solving skills with ability to resolve complex technical issues with minimal assistance. Demonstrated ability to build strong cross-functional partnerships and influence enterprise strategy. Adept at communicating technical issues in training, mentorship, and executive settings. Committed to process improvement and continuous innovation. Strong written and verbal communication skills, with ability to present complex security concepts clearly to varied audiences. Deep understanding of insider threat landscape and modern data protection practices. Self-directed learner who stays current with evolving cybersecurity trends and threats. This position will operate as a Hybrid/Flex for Your Day work arrangement based on Target's needs. A Hybrid/Flex for Your Day work arrangement means the team member's core role will need to be performed both onsite at the Target HQ MN location the role is assigned to and virtually, depending upon what your role, team and tasks require for that day. Work duties cannot be performed outside of the country of the primary work location, unless otherwise prescribed by Target. Click here if you are curious to learn more about Minnesota. Benefits Eligibility Please paste this url into your preferred browser to learn about benefits eligibility for this role: Americans with Disabilities Act (ADA) In compliance with state and federal laws, Target will make reasonable accommodations for applicants with disabilities. If a reasonable accommodation is needed to participate in the job application or interview process, please reach out to . Non-accommodation-related requests, such as application follow-ups or technical issues, will not be addressed through this channel.
Vulnerability Assessment Analyst
CALIBRE Systems Springfield, Virginia
CALIBRE is an employee-owned mission focused solutions and digital transformation company. We are currently seeking a Vulnerability Assessment Analyst to support work we are doing in Springfield, VA. This position will be on site. This position performs assessments of systems and networks within the NE or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Measures effectiveness of defense-in-depth architecture against known vulnerabilities. Additional duties: Analyze organization's cyber defense policies and configurations and evaluate compliance with regulations and organizational directives. Conduct and/or support authorized penetration testing on enterprise network assets. Maintain deployable cyber defense audit toolkit (e.g., specialized cyber defense software and hardware) to support cyber defense audit missions. Maintain knowledge of applicable cyber defense policies, regulations, and compliance documents specifically related to cyber defense auditing. Prepare audit reports that identify technical and procedural findings, and provide recommended remediation strategies/solutions. Conduct required reviews as appropriate within environment (e.g., Technical Surveillance, Countermeasure Reviews TSCM , TEMPEST countermeasure reviews). Perform technical (evaluation of technology) and nontechnical (evaluation of people and operations) risk and vulnerability assessments of relevant technology focus areas (e.g., local computing environment, network UNCLASSIFIED 96 UNCLASSIFIED and infrastructure, enclave boundary, supporting infrastructure, and applications). Make recommendations regarding the selection of cost-effective security controls to mitigate risk (e.g., protection of information, systems and processes). Required Skills Skill in conducting vulnerability scans and recognizing vulnerabilities in security systems. Skill in assessing the robustness of security systems and designs. Skill in detecting host and network based intrusions via intrusion detection technologies (e.g., Snort). Skill in mimicking threat behaviors. Skill in the use of penetration testing tools and techniques. Skill in the use of social engineering techniques. (e.g., phishing, baiting, tailgating, etc.). Skill in using network analysis tools to identify vulnerabilities. (e.g., fuzzing, nmap, etc.). Skill in reviewing logs to identify evidence of past intrusions. Skill in conducting application vulnerability assessments. Skill in performing impact/risk assessments. Skill to develop insights about the context of an organization's threat environment Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). Ability to identify systemic security issues based on the analysis of vulnerability and configuration data. Ability to apply programming language structures (e.g., source code review) and logic. Ability to share meaningful insights about the context of an organization's threat environment that improve its risk management posture. Ability to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). required Experience Knowledge of computer networking concepts and protocols, and network security methodologies. Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy. Knowledge of cybersecurity and privacy principles. Knowledge of cyber threats and vulnerabilities. Knowledge of specific operational impacts of cybersecurity lapses. Knowledge of application vulnerabilities. Knowledge of cryptography and cryptographic key management concepts Knowledge of data backup and recovery. Knowledge of host/network access control mechanisms (e.g., access control list, capabilities lists). Knowledge of cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). Knowledge of network access, identity, and access management (e.g., public key infrastructure, Oauth, OpenID, SAML, SPML). Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol TCP and Internet Protocol IP , Open System Interconnection Model OSI , Information Technology Infrastructure Library, current version ITIL ). Knowledge of programming language structures and logic. Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language PL/SQL and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). Knowledge of systems diagnostic tools and fault identification techniques. Knowledge of what constitutes a network attack and a network attack's relationship to both threats and vulnerabilities. Knowledge of interpreted and compiled computer languages. Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks). Knowledge of cyber attackers (e.g., script kiddies, insider threat, non-nation state sponsored, and nation sponsored). Knowledge of system administration, network, and operating system hardening techniques. Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks). K0179: Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). Knowledge of security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model). Knowledge of ethical hacking principles and techniques. K0210: Knowledge of data backup and restoration concepts. Knowledge of system administration concepts for operating systems such as but not limited to Unix/Linux, IOS, Android, and Windows operating systems. Knowledge of infrastructure supporting information technology (IT) for safety, performance, and reliability. Knowledge of an organization's information classification program and procedures for information compromise. Knowledge of packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump). Knowledge of cryptology. Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services. K0342: Knowledge of penetration testing principles, tools, and techniques. Knowledge of an organization's threat environment. Knowledge of Application Security Risks (e.g. Open Web Application Security Project Top 10 list) Must haves: Current/Active TS/SCI security clearance 4+ years experience IAT Level 2 Certification (Comp TIA Security+ or CCNA or CISSP Two Penetration Testing Certifications (e.g., GPEN, GWAT, GCIH, CEH, GPYC, LPT, CPT)
10/01/2025
Full time
CALIBRE is an employee-owned mission focused solutions and digital transformation company. We are currently seeking a Vulnerability Assessment Analyst to support work we are doing in Springfield, VA. This position will be on site. This position performs assessments of systems and networks within the NE or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Measures effectiveness of defense-in-depth architecture against known vulnerabilities. Additional duties: Analyze organization's cyber defense policies and configurations and evaluate compliance with regulations and organizational directives. Conduct and/or support authorized penetration testing on enterprise network assets. Maintain deployable cyber defense audit toolkit (e.g., specialized cyber defense software and hardware) to support cyber defense audit missions. Maintain knowledge of applicable cyber defense policies, regulations, and compliance documents specifically related to cyber defense auditing. Prepare audit reports that identify technical and procedural findings, and provide recommended remediation strategies/solutions. Conduct required reviews as appropriate within environment (e.g., Technical Surveillance, Countermeasure Reviews TSCM , TEMPEST countermeasure reviews). Perform technical (evaluation of technology) and nontechnical (evaluation of people and operations) risk and vulnerability assessments of relevant technology focus areas (e.g., local computing environment, network UNCLASSIFIED 96 UNCLASSIFIED and infrastructure, enclave boundary, supporting infrastructure, and applications). Make recommendations regarding the selection of cost-effective security controls to mitigate risk (e.g., protection of information, systems and processes). Required Skills Skill in conducting vulnerability scans and recognizing vulnerabilities in security systems. Skill in assessing the robustness of security systems and designs. Skill in detecting host and network based intrusions via intrusion detection technologies (e.g., Snort). Skill in mimicking threat behaviors. Skill in the use of penetration testing tools and techniques. Skill in the use of social engineering techniques. (e.g., phishing, baiting, tailgating, etc.). Skill in using network analysis tools to identify vulnerabilities. (e.g., fuzzing, nmap, etc.). Skill in reviewing logs to identify evidence of past intrusions. Skill in conducting application vulnerability assessments. Skill in performing impact/risk assessments. Skill to develop insights about the context of an organization's threat environment Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). Ability to identify systemic security issues based on the analysis of vulnerability and configuration data. Ability to apply programming language structures (e.g., source code review) and logic. Ability to share meaningful insights about the context of an organization's threat environment that improve its risk management posture. Ability to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). required Experience Knowledge of computer networking concepts and protocols, and network security methodologies. Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy. Knowledge of cybersecurity and privacy principles. Knowledge of cyber threats and vulnerabilities. Knowledge of specific operational impacts of cybersecurity lapses. Knowledge of application vulnerabilities. Knowledge of cryptography and cryptographic key management concepts Knowledge of data backup and recovery. Knowledge of host/network access control mechanisms (e.g., access control list, capabilities lists). Knowledge of cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). Knowledge of network access, identity, and access management (e.g., public key infrastructure, Oauth, OpenID, SAML, SPML). Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol TCP and Internet Protocol IP , Open System Interconnection Model OSI , Information Technology Infrastructure Library, current version ITIL ). Knowledge of programming language structures and logic. Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language PL/SQL and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). Knowledge of systems diagnostic tools and fault identification techniques. Knowledge of what constitutes a network attack and a network attack's relationship to both threats and vulnerabilities. Knowledge of interpreted and compiled computer languages. Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks). Knowledge of cyber attackers (e.g., script kiddies, insider threat, non-nation state sponsored, and nation sponsored). Knowledge of system administration, network, and operating system hardening techniques. Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks). K0179: Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). Knowledge of security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model). Knowledge of ethical hacking principles and techniques. K0210: Knowledge of data backup and restoration concepts. Knowledge of system administration concepts for operating systems such as but not limited to Unix/Linux, IOS, Android, and Windows operating systems. Knowledge of infrastructure supporting information technology (IT) for safety, performance, and reliability. Knowledge of an organization's information classification program and procedures for information compromise. Knowledge of packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump). Knowledge of cryptology. Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services. K0342: Knowledge of penetration testing principles, tools, and techniques. Knowledge of an organization's threat environment. Knowledge of Application Security Risks (e.g. Open Web Application Security Project Top 10 list) Must haves: Current/Active TS/SCI security clearance 4+ years experience IAT Level 2 Certification (Comp TIA Security+ or CCNA or CISSP Two Penetration Testing Certifications (e.g., GPEN, GWAT, GCIH, CEH, GPYC, LPT, CPT)

Modal Window

  • Blog
  • Contact
  • About Us
  • Terms & Conditions
  • Privacy
  • Employer
  • Post a Job
  • Search Resumes
  • Sign in
  • Job Seeker
  • Find Jobs
  • Create Resume
  • Sign in
  • Facebook
  • Twitter
  • Instagram
  • Pinterest
  • Youtube
Parent and Partner sites: IT Job Board | Search Jobs Near Me | RightTalent.co.uk | Quantity Surveyor jobs | Building Surveyor jobs | Construction Recruitment | Talent Recruiter | London Jobs | Property jobs
© 2008-2025 My Jobs Near Me