For Candidates
For Candidates

I am...

Cybersecurity sales talent

Technical talent

Have you ever?

01
02
03
04
/
04
how we work
01
/
04
Started a new job, only to find it wasn't what you were expecting?
how we work
02
/
04
Wasted time with recruiters that ghost you or bring you jobs that don't fit?
how we work
03
/
04
Submitted a bunch of job applications with little to no response or feedback?
how we work
04
/
04
Wondered where to go for data-backed career advice?

You have found the right place

We take long term perspective, and want to be a resource throughout your career, not just to fill an open rec today
We want you to find incredible opportunities that are a good fit for you, whether they come from within or outside our jobs network
We look deeper than what’s on your resume, and want to get to know your personality, aspirations, and what makes you tick
Our goal: help you find work you love

How it works

service image
01.
Join Crux
service image
02.
Help us get to know you
service image
03.
Access jobs custom tailored to you
we stand
04.
Receive ongoing career resources and guidance
service
05.
Find work you love
05.
Find work you love

Recent Jobs

Program Chief Information Security Officer CISO
ManTech
State
Maryland
Remote Elig.
On-site
Seniority
Executive
Domain
GRC
Salary ($K)
-
Not disclosed
Chief Information Security Officer
Parsons Corporation
State
Virginia
Remote Elig.
On-site
Seniority
Executive
Domain
Cross-domain
Salary ($K)
180.00
-
Not disclosed
240
IT Security Officer and Director CISO
Pennant Services
State
United States
Remote Elig.
On-site
Seniority
Executive
Domain
GRC
Salary ($K)
-
Not disclosed
Remote
State
Texas
Remote Elig.
Remote
Not disclosed
Seniority
Entry
Domain
Sec ops
Salary ($K)
-
Not disclosed
Protect and Defend

Summary

Binary Defense is seeking a talented SOC Analyst with solid Sumo Logic SIEM experience. This position is remote.

Company Overview

Binary Defense is a trusted leader in security operations, supporting companies of all sizes to proactively monitor, detect and respond to cyberattacks. The company offers a personalized Open XDR approach to Managed Detection and Response, advanced Threat Hunting, Digital Risk Protection, Phishing Response, and Incident Response services, helping customers mature their security program efficiently and effectively based on their unique risks and business needs.

With a world-class 24/7 SOC, deep domain expertise in cyber, and sophisticated technology, hundreds of companies across every industry have entrusted Binary Defense to protect their business. Binary Defense gives companies actionable insights within minutes not hours, the confidence in their program to be resilient to ever-changing threats, and the time back that matters most to their business.

Binary Defense is also the Trusted Cybersecurity Partner of the Cleveland Browns and partners with PGA TOUR players. For more information, visit our website, check out our blog, or follow us on LinkedIn.

  • Actively monitor and investigate security alerts to detect malicious activity at our clients during your shift in our 24x7x365 SOC.
  • Perform Cyber Kill Chain and MITRE ATT&CK analysis on incoming security alerts.
  • Follow documented procedures to properly triage and respond to identified malicious activity, such as escalation or remediation actions.
  • Provide our clients with clear/concise written investigations within the Binary Defense service management system.
  • Communicate and collaborate with Binary Defense clients through the lifecycle of all escalated security investigations.
  • Contribute to general security operations across all clients in the Binary Defense portfolio, whether through escalations, regular meetings, etc.
  • Participate in internal meetings, such as shift turn over, team meetings, etc. to collaborate with your fellow team members and perform knowledge transfer.
  • Perform regular training to stay sharp on the latest technologies, methodologies, etc. (Binary Defense will sponsor this training).
  • Stay up-to-date on the latest vulnerabilities, threats, and attacks around the world.
  • Be a team player and interface regularly with your shift mates and colleagues.

Required Qualifications

  • Bachelor’s Degree in Cyber Security or equivalent work experience.
  • Familiarity with the principals of network and endpoint security, current threats, vulnerabilities, and attack trends. Additionally, analysts should have a working knowledge of security principals and frameworks such as Cyber Kill Chain, MITRE ATT&CK, etc.
  • SOC Analysts must be competent to work at a high technical level and be capable of identifying threats and attack vectors.
  • One or more Cybersecurity certifications.
  • Excellent written and oral communication skills
  • Experience with Security Information Event Management (SIEM) platforms. Must have Sumo Logic experience.
  • Experience with Endpoint Protection platforms, such as: CrowdStrike, Carbon Black, SentinelOne, Cybereason, etc.
  • Willingness to learn and continually improve skills.

Binary Defense offers competitive medical, dental and vision coverage for employees and dependents, a 401k match which vests every payroll, a flexible and remote friendly work environment, as well as training opportunities to expand your skill set (to name a few!). If you’re interested in joining a growing team with great perks, we encourage you to apply!

No items found.
On-site
State
California
Remote Elig.
On-site
Not disclosed
Seniority
Experienced
Domain
Incident response
Salary ($K)
100
-
105
Not disclosed
Protect and Defend
100

Summary:

When you join the Cambridge team, you are part of a skilled and talented global community that is united by a set of core values: commitment, integrity, and perseverance. Join our team and help us confront today’s most threatening and complex obstacles!

Cambridge International Systems, Inc. has a full-time Cybersecurity Specialist III opportunity available based in San Francisco, CA. Qualified candidates for this job must possess a current DoD Secret security clearance.

Salary Range: $100,000.00- $105,000.00

Company Overview:

At Cambridge, we recognize innovation and agility grow through diverse collaboration. Our team is comprised of unique individuals, and it is our policy to provide equal opportunity in recruiting, hiring, training, and promoting individuals in all job categories without regard to race, color, religion, national origin, gender, age, disability, genetic information, veteran status, sexual orientation, gender identity, or any other protected class or category as may be defined by federal, state, or local laws or regulations. It is our firm intent to support equal employment opportunity and affirmative action in keeping with applicable federal, state, and local laws and regulations.

If you are a qualified individual with a disability or a disabled veteran requiring assistance with the application process, please visit https://cbridgeinc.com/accessibility/ for information on how to request assistance.

  • Experience with security tools and techniques used by Cybersecurity teams
  • Experience with incident management and response activities across the incident life cycle to include handling service tickets, responding to security incidents, performing investigations, categorizing and prioritizing events, etc.
  • Knowledge of how data is collected and analyzed from a variety of tools and sources, including IDS alerts, firewall logs, web logs, and network traffic logs to identify IOCs or malicious TTPs
  • Ability to identify, detect, respond, and mitigate sophisticated threats to the client enterprise environment
  • Ability to adapt communications styles and messaging for professionals at all levels

Required Qualifications:

  • Must have a DoD 8570 IAM Level 1Certification such as CEH, GCIH, Security+, etc.
  • Must have attained a bachelor’s degree or higher in a relevant field.
  • 2+ years’ experience

Preferred Qualifications:

  • Experience with security tools and techniques used by Cybersecurity teams
  • Experience with incident management and response activities across the incident life cycle to include handling service tickets, responding to security incidents, performing investigations, categorizing and prioritizing events, etc.
  • Knowledge of how data is collected and analyzed from a variety of tools and sources, including IDS alerts, firewall logs, web logs, and network traffic logs to identify IOCs or malicious TTPs
  • Ability to identify, detect, respond, and mitigate sophisticated threats to the client enterprise environment
  • Ability to adapt communications styles and messaging for professionals at all levels
  • Must have a Secret clearance.
  • Must have a DoD 8570 IAM Level 1 Certification such as CEH, GCIH, Security+, etc.
  • Must have attained a bachelor’s degree or higher in a relevant field.
  • 2+ years’ experience

Security Requirements:

Must possess an active DoD Secret security clearance.

Travel Requirements:

  • In rare occasions, overnight travel may be required.

Physical Environment and Working Conditions:

Cambridge International Systems complies with Temporary Duty Station (TDY)/Outside Continental United States (OCONUS) vaccination requirements. If this position requires OCONUS travel (listed above), Vaccine Recommendations by AOR | Health.mil lists applicable current vaccination requirements by location.

  • Must be able to work in an office environment, sitting at a desk, looking at a computer for most of the workday.
  • Work is physically comfortable; the employee has discretion about sitting, walking, standing, etc.
  • May be required to travel short distances to offices/conference rooms and buildings on site.

Benefits and Perks:

Cambridge International Systems is committed to investing in our employees and their future by providing them with competitive compensation, career development opportunities, comfortable working conditions, and a comprehensive benefits package, some of which are listed below:

  • Medical, dental, vision, Life/AD&D/STD/LTD insurance
  • 401(k) matching and immediate vesting
  • Paid time off and holidays
  • Generous tuition & training assistance program
  • Relocation assistance
  • Sign-on bonuses
  • Referral bonuses
  • Performance-based bonuses
  • Community involvement & outreach
  • Wellness program
  • Employee Assistance Program (EAP)
  • Tickets at Work

Refer to a Friend:

If you know someone who may be interested, please share this posting. We are a growing team and there may be more opportunities like this one here at Cambridge International Systems!

No items found.
Hybrid
State
Virginia
Remote Elig.
Hybrid
Not disclosed
Seniority
Experienced
Domain
Sec ops
Salary ($K)
50
-
100
Not disclosed
Protect and Defend
50

Summary Information about the Role

CloudFit Software is looking for qualified Service Engineers that have the experience and passion to design, deploy, and operate cybersecurity solutions for customers. These solutions include a combination of Commercial off-the-shelf, open-source, and cloud-native technologies. The job will involve learning new technologies, interacting with client stakeholders, and designing new or retrofitting old enclaves to meet the ever-evolving needs of our customers.

What would make you a good fit for this role? It’s easy - a passion for technology and a strong desire to help customers achieve their goals through cybersecurity!

Company Overview

About CloudFit:

CloudFit Software provides customers the ability to quickly iterate on the development of Cloud Solutions while optimizing security, networking, operations, and monitoring through an engineering mindset. At CloudFit Software, we instrument solutions that attempt to reduce the human element by applying automation and engineering to every aspect of a solution's lifecycle. CloudFit focuses on delivering managed scenarios that meet customer business needs. This allows us to provide core operational outcomes while integrating back with the customer’s existing operations teams.

Please be aware many of our positions require the ability to obtain security clearance. Security clearances may only be granted to U.S. citizens. In addition, applicants who accept a conditional offer of employment may be subject to government security investigation(s) and must meet eligibility requirements for access to classified information.

CloudFit is an equal opportunities employer and welcomes applications from all sections of society and does not discriminate on grounds of race, religion or belief, ethnic or national origin, disability, age, citizenship, marital, domestic or civil partnership status, sexual orientation, gender identity, or any other basis as protected by applicable law.

  • Design cloud-native cybersecurity solutions using the Microsoft security stack and possibly others depending on the customer
  • Script custom integrations for security tooling
  • Take accountability for past and future technical implementations, working to modernize and improve their capability to meet the customer's needs
  • Grow professional skill set regularly and quantifiably
  • Transform customer business requirements into definable technological architecture
  • Professional accountability on product feature area from requirement gathering through continued operations
  • Engage in company culture through active participation in regular meetings and customer reviews
  • Apply and Create company and industry best standards for cybersecurity management
  • Encourage and take accountability for reducing toil through automation
  • Support the customer via on-call rotations for cybersecurity incidents when required
  • Adjust to the needs of the customer and project, while maintaining a culture of serving and gratitude
  • Travel up to 50% to support customers in air-gapped environments

Required Qualifications:

  • Perpetual passion for:
  • Improvement
  • Learning new technologies
  • Pushing yourself
  • 1+ Year in the following technologies:
  • Python
  • SIEM
  • Git
  • 2+ years in the following concepts:
  • Continuous Integration and Delivery
  • Deploying distributed applications
  • Windows and Linux system administration
  • 3+ years of familiarity with at least one of the following subject matters:
  • Data Science – SQL and No-SQL database management and Big Data platforms such as Elastic and Spark
  • Incident response – Handling cybersecurity incidents as they come in and working them to completion
  • Operational Management – Platform visibility and monitoring
  • Current Federal Security Clearance or ability to obtain (US Citizenship required)

Preferred Qualifications:

NA

The salary range for this role is $50k - $100k + benefits, & perks. Please note the national salary range listed in the job posting reflects the new hire salary range across levels and U.S. locations that would be applicable to the position. Final salary will be commensurate with the candidate’s final level and location. Also, the range represents salary only and does not include our total rewards package.

CloudFit Benefits & Perks:

CloudFit benefits are designed with wellness in mind, to support what matters the most:

  • CloudFit covers over 90% of medical, 100% of dental and vision, including buy-up options for you and your family!
  • Financial Wellness: 401k, HSA, FSAs, Personal Financial Advisors
  • 3 Weeks of PTO, 13 Paid Company Holidays, 8 Giving Back Hours
  • Wellness Reimbursement Program

Career development for employees at every level is a priority at CloudFit.

  • Unlimited Certification Reimbursement
  • User Friendly Career Development Tools & Resources

CloudFit is committed to providing reasonable accommodations and support in our recruiting processes for candidates with disabilities, long-term conditions, mental health conditions, or sincerely held religious beliefs, or who are neurodivergent or require pregnancy-related support. If you need accommodation, please contact the Talent Acquisition team.

No items found.
Program Chief Information Security Officer CISO
ManTech
State
Maryland
Remote Elig.
On-site
Seniority
Executive
Domain
GRC
Salary ($K)
-
Not disclosed
Chief Information Security Officer
Parsons Corporation
State
Virginia
Remote Elig.
On-site
Seniority
Executive
Domain
Cross-domain
Salary ($K)
180.00
-
Not disclosed
240
IT Security Officer and Director CISO
Pennant Services
State
United States
Remote Elig.
On-site
Seniority
Executive
Domain
GRC
Salary ($K)
-
Not disclosed