For Candidates
For Candidates

I am...

Cybersecurity sales talent

Technical talent

Have you ever?

01
02
03
04
/
04
how we work
01
/
04
Started a new job, only to find it wasn't what you were expecting?
how we work
02
/
04
Wasted time with recruiters that ghost you or bring you jobs that don't fit?
how we work
03
/
04
Submitted a bunch of job applications with little to no response or feedback?
how we work
04
/
04
Wondered where to go for data-backed career advice?

You have found the right place

We take long term perspective, and want to be a resource throughout your career, not just to fill an open rec today
We want you to find incredible opportunities that are a good fit for you, whether they come from within or outside our jobs network
We look deeper than what’s on your resume, and want to get to know your personality, aspirations, and what makes you tick
Our goal: help you find work you love

How it works

service image
01.
Join Crux
service image
02.
Help us get to know you
service image
03.
Access jobs custom tailored to you
we stand
04.
Receive ongoing career resources and guidance
service
05.
Find work you love
05.
Find work you love

Recent Jobs

Chief Information Security Officer
ElectronX
State
Illinois
Remote Elig.
Hybrid
Seniority
Senior
Domain
GRC
Salary ($K)
-
Not disclosed
Vice President of Information Security CISO
Driscoll's
State
California
Remote Elig.
On-site
Seniority
Executive
Domain
Cross-domain
Salary ($K)
248.00
-
Not disclosed
300
Cybersecurity Senior Engineer
Truist
State
North Carolina
Remote Elig.
On-site
Seniority
Senior
Domain
Network Security
Salary ($K)
-
Not disclosed
On-site
State
Texas
Remote Elig.
On-site
Not disclosed
Seniority
Entry
Domain
Network Security
Salary ($K)
-
Not disclosed
Protect and Defend

Company Overview

Enflite believes that each employee makes a significant contribution to our success. That contribution should not be limited by the assigned responsibilities. Therefore, this position description is designed to outline primary duties, qualifications and job scope, but not limit the individual nor the organization to only the work identified. It is our expectation that each employee will offer his/her services wherever and whenever necessary to ensure the success of our endeavors.

Job Summary

Position Summary:

This position is responsible for ensuring security of the organization’s systems and data. In addition, the position is responsible for desktop support, which includes resolving potential or actual technical issues, troubleshooting different software packages, hardware devices and other applications.

Essential Functions:

  • Administer security controls to prevent malware delivery, execution and extent of cyber incidents
  • Analyze detected vulnerabilities and implement security measures to resolve the identified vulnerabilities
  • Provide cybersecurity recommendations to leadership based on significant threats and vulnerabilities
  • Ensure all systems security operations and maintenance activities are properly documented and updated as necessary
  • Ensure cybersecurity-enabled technologies reduce identified risk to an acceptable level.
  • Verify minimum security requirements are in place for all applications
  • Working knowledge of a wide range of applications
  • Provide organization-wide desktop support as necessary

Additional Functions:

  • Address user tickets regarding hardware, software and networking
  • Walk customers through installing computer peripherals
  • Ask targeted questions to diagnose problems
  • Guide users with step-by-step instructions
  • Conduct remote troubleshooting
  • Test alternative pathways to resolve an issue
  • Customize desktop applications to meet user needs
  • Record technical issues and solutions in Help Desk
  • Direct unresolved issues to the next level of support personnel
  • Follow up with clients to ensure their systems are functional
  • Report customer feedback and potential product requests
  • Help create technical documentation and manuals
  • Maintain printing infrastructure

Qualifications

Job Specifications (Knowledge, Skills, and Abilities):

  • Experience with Microsoft SQL Server
  • Ability to set priorities, meet deadlines, and multitask
  • Excellent teamwork skills and high degree of initiative required
  • Work independently and possess a high level of self-motivation and initiative
  • Knowledge of network security practices and anti-virus programs
  • Hands on experience with Windows and Microsoft Office applications
  • Must be able to lift 50 lbs.

Education, Certifications and Experience:

  • High School Diploma or GED
  • AA/AS in Computer Science or related field or equivalent
  • Minimum of 1 year of experience required

Physical Demands and Work Environment:

Working conditions are normal for that of a manufacturing/machine shop/office environment.

All employees are expected to adhere to Company safety policies and wear personal protective equipment when exposed to work areas or performing tasks where it is required.

Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities, and activities may change at any time with or without notice.

This position must meet Export Control compliance requirements, therefore a “US Person” as defined by 22 C.F.R. § 120.15 is required.

The characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. The information contained in this job description is for compliance with the Americans with Disabilities Act (ADA) and is not an exhaustive list of the duties that may be required for this position. Additional duties are performed by the individuals currently holding this or similar positions and additional duties may be assigned.

Our Competitive Benefits Include:

  • Medical, dental, vision insurance with generous portion of premium paid by Enflite
  • 401(k) with company match
  • Life insurance, disability insurance
  • Paid time off
  • Paid company holidays
  • Annual discretionary bonus eligibility
  • Fun activities each month (past events have included cookouts, baking competitions, cornhole tournaments, water balloon fights)
No items found.
On-site
State
North Carolina
Remote Elig.
On-site
Not disclosed
Seniority
Senior
Domain
GRC
Salary ($K)
-
Not disclosed
Oversee and Govern

The Role:

Hearst's Internal Audit Department is seeking an experienced Cybersecurity Audit Supervisor to lead the development and execution of a comprehensive cybersecurity audit program. The Cybersecurity Audit Supervisor is responsible for identifying and evaluating risks, assessing the design and effectiveness of cybersecurity controls, and providing independent and objective reporting to key stakeholders across Hearst. Hearst is looking for a team player who is enthusiastic about creating a culture of accountability and integrity.

The Team:

The Cybersecurity team is a newly formed group within the Hearst Internal Audit Department and is dedicated to providing independent and objective audits over the organization's cybersecurity risk management and control environment. Our mission is to continuously evaluate and strengthen Hearst's cybersecurity framework, ensuring resilience against evolving cyber risks and compliance with company policy, industry standards, and regulations.

The Company:

Hearst is one of the nation’s largest global, diversified information, services and media companies. Hearst has been innovating for more than a century, leading with purpose, integrity and a culture of care, with a mission to inform audiences and improve lives. The company’s diverse portfolio includes global financial services leader Fitch Group; Hearst Health, a group of medical information and services businesses; Hearst Transportation, which includes CAMP Systems International, a major provider of software-as-a-service solutions for managing maintenance of jets and helicopters; ownership in cable television networks such as A&E, HISTORY, Lifetime and ESPN; 35 television stations; 24 daily and 52 weekly newspapers; digital services businesses; and more than 200 magazines around the world. Hearst is always moving forward, investing in healthcare solutions to improve patient outcomes and technology that curbs emissions; providing vital analysis, data and software to the global financial services industry; delivering important service and investigative journalism; and inspiring audiences with sports and entertainment programming. With a commitment to maintaining the highest quality in its products and services, Hearst is dedicated to serving the communities it operates in, both civically and philanthropically.

  • Develop and implement a risk-based cybersecurity audit plan that aligns with industry frameworks (e.g., NIST CSF) and regulatory requirements.
  • Lead and execute cybersecurity audits across Hearst's diverse business units, assessing the design and operating effectiveness of controls.
  • Evaluate the adequacy of cybersecurity risk management processes and governance structures.
  • Partner with the second line of defense (e.g., risk management, compliance) to leverage their expertise and insights in cybersecurity risk management.
  • Prepare comprehensive audit reports that clearly communicate findings, risks, and actionable recommendations to senior management and the board.
  • Track and report on the implementation of management's action plans to address audit findings.
  • Stay abreast of the latest cybersecurity trends and best practices to ensure the audit program remains relevant and effective.
  • Provide technical guidance and training to the wider Hearst Internal Audit Department.
  • Build and maintain strong relationships with stakeholders across the organization to foster a culture of cybersecurity awareness and collaboration.
  • Other duties as assigned.

Required Qualifications:

  • Big 4 experience.
  • 3+ years of relevant work experience in cyber auditing.
  • Professional certification such as CISA, CISSP, CISM, or other relevant designations.
  • Fluent in English. Additional languages are a plus.
  • Ability to travel based on the scope of businesses subject to testing.

Preferred Knowledge and Skills:

  • Experience with cybersecurity risk management in a large, complex organization.
  • Proven understanding of cybersecurity frameworks (e.g., NIST CSF), risk management principles, and regulatory requirements.
  • Experience with various audit methodologies and techniques, including risk-based auditing.
  • Experience with cybersecurity or IT audit, with a proven track record of leading and executing audits.
  • Knowledge of relevant cybersecurity laws, regulations, and industry standards (e.g., NIST CSF, ISO 27001, GDPR).
  • Experience with cloud security and other emerging technologies.
  • Positive attitude who is self-motivated with a strong work ethic.
  • Inquisitive critical thinker who is professionally skeptical.
  • Ability to motivate and guide others, with a drive for continuous improvement.
  • Demonstrated analytical abilities.
  • Excellent oral and written communication skills with the ability to effectively communicate with business leaders across all levels of the organization.
  • Strong project management and organizational skills; and the ability to prioritize tasks to meet deadlines and effectively manage changing priorities.
  • Refined interpersonal skills with the ability to collaborate confidently and professionally with a diverse range of people.

NA

No items found.
On-site
State
Ohio
Remote Elig.
On-site
Not disclosed
Seniority
Experienced
Domain
IAM
Salary ($K)
-
Not disclosed
Operate and Maintain

Overview

The Identity & Access Management Engineer is responsible for the operational management, design, development, and support of the Nationwide Children?s Hospital Identity & Access Management (IAM) technology stack, processes and infrastructure.

Why Nationwide Children's Hospital?

The moment you walk through our doors, you feel it. When you meet our patient families, you believe it. And when you talk with anyone who works here, you want to be part of it. Welcome to Nationwide Children’s Hospital, Where Passion Meets Purpose.

Here, Diversity, Equity and Inclusion are integrated into our core values and practices. We are passionate about building, sustaining and evolving an inclusive and equitable environment. We are seeking individuals who live these values and want to share their experiences and efforts in support of our collective mission.

We’re 16,000 strong. And it takes every one of us to improve the lives of the kids we care for, and the kids around the world we’ll never meet. Kids who live healthier, fuller lives because of the knowledge we share. We know it takes a Collaborative Culture to deliver on our promise to provide the very best, innovative care and to foster new discoveries, made possible by the most groundbreaking research. Anywhere.

Ask anyone with a Nationwide Children’s badge what they do for a living. They’ll tell you it’s More Than a Job. It’s a calling. It’s a chance to use and grow your talent to make an impact that truly matters. Because here, we exist simply to help children everywhere.

Nationwide Children’s Hospital. A Place to Be Proud.

  • Maintains and monitors operations of IAM technologies for efficiency, availability, and security.
  • Leads or assists functional or technical delivery of IAM solutions to end users as an individual contributor or team member based on guidance from team leadership.
  • Leads or assists with the analysis, design, and implementation of NCH's IAM initiatives, including requirements gathering and translation between business terms and technical requirements.
  • Serves as an escalation point for operational issues related to the IAM infrastructure and processes, including occasional after-hours support.
  • Contributes to the evaluation and determination of software tools and operational feasibility of solutions.
  • Partners with vendors to optimize software configurations while ensuring high availability and ease-of-use.
  • Develops training material for primary support roles as well as system documentation, including DR plans.
  • Builds and maintains positive relationships with immediate team members, project teams, other internal IT departments, customers, end-users, and external contacts.

Required Qualifications

Education: Bachelor's Degree in Computer Science or related field or equivalent

Skills:

  • Proficiency with database systems, SQL and data modeling principles.
  • Proficiency with scripting languages. PowerShell experience highly preferred.
  • Excellent customer service, communication (oral and written), troubleshooting and problem-solving skills.
  • Basic project management skills including ability to gather business requirements.
  • In-depth understanding of the Identity Management lifecycle, Cloud Identity & Security, Single Sign-On (SSO), Privileged Access Management (PAM), Federated Identity, Access Control & Governance and concepts regarding authentication and authorization.

Experience:

  • 3+ years experience providing systems analysis, design, development, and administration.
  • 2+ years experience with development environments/languages such as .Net (C#, VB), C/C++, Java.
  • Experience with IAM protocols such as OAuth, OpenID Connect, SAML.
  • Experience with the following technologies preferred: LDAP and Directory Services (including cloud). Active Directory/Azure AD, AWS, etc.
  • Identity & Access Management related industry solutions such as: Microsoft Identity Manager (MIM), Okta, Ping Identity, SailPoint, CyberArk, Thycotic, BeyondTrust, Centrify, etc.

Preferred Qualifications

  • Experience in Healthcare environments highly preferred.

The above list of duties is intended to describe the general nature and level of work performed by individuals assigned to this classification. It is not to be construed as an exhaustive list of duties performed by the individual so classified, nor is it intended to limit or modify the right of any supervisor to assign, direct, and control the work of employees under his/her supervision.

EOE M/F/Disability/Vet

No items found.
Chief Information Security Officer
ElectronX
State
Illinois
Remote Elig.
Hybrid
Seniority
Senior
Domain
GRC
Salary ($K)
-
Not disclosed
Vice President of Information Security CISO
Driscoll's
State
California
Remote Elig.
On-site
Seniority
Executive
Domain
Cross-domain
Salary ($K)
248.00
-
Not disclosed
300
Cybersecurity Senior Engineer
Truist
State
North Carolina
Remote Elig.
On-site
Seniority
Senior
Domain
Network Security
Salary ($K)
-
Not disclosed