We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
Back

Role Based

Search

Clear Expand Collapse

Application Security Engineer

Identifying, mitigating, and preventing vulnerabilities in software development.

11 items

Chief Information Security Officer

Strategic leadership in cybersecurity, risk management, and regulatory compliance.

34 items

Cloud Security Specialist

Securing cloud environments, workloads, and data against evolving threats.

36 items

Cybersecurity Analyst

Monitoring, detecting, and responding to cyber threats and incidents.

37 items

Cybersecurity Engineer

Designing, implementing, and maintaining secure systems and networks.

26 items

Data Protection Officer

Ensuring compliance with data privacy laws and safeguarding sensitive information.

13 items

Digital Forensics Specialist

Investigating cyber incidents, analyzing digital evidence, and recovering data.

3 items

GRC Specialist

Managing governance, risk, and compliance to align security with business objectives.

21 items

Identity & Access Management/ZT Specialist

Controlling and securing user identities, access, and authentication systems.

16 items

Incident Responder

Detecting, analyzing, and mitigating cyber incidents to minimize impact.

6 items

Malware Analyst

Analyzing, reverse-engineering, and defending against malicious software.

4 items

Network Security Engineer

Securing network infrastructure to prevent, detect, and respond to threats.

32 items

Penetration Tester

Simulating cyberattacks to identify and exploit security vulnerabilities.

26 items

Privacy Engineer

Designing systems to protect user data and ensure regulatory compliance.

3 items

Security Architect

Designing and implementing secure IT and network infrastructures.

19 items

Security Awareness Trainer

Educating users on cybersecurity best practices to reduce human risk.

11 items

Software Developer

Building secure software with embedded cybersecurity controls and defenses.

6 items

SOC Analyst

Monitoring, analyzing, and responding to security threats in real time.

19 items

Threat Intelligence Analyst

Collecting, analyzing, and sharing cyber threat data to prevent attacks.

13 items

Vulnerability Analyst

Identifying, assessing, and prioritizing security vulnerabilities in systems.

8 items

Search

Clear

  
Contact Us

+1-609-356-1499 | info@cybered.io | Sign Up for Our Newsletter

©2024 Information Security Media Group | About ISMG | Privacy & GDPR Statement