Securing Our Technology Jobs

1,756,245 open positions · Updated daily

Securing Our Technology roles are at the forefront of the digital frontier, driven by the relentless rise of ransomware, supply‑chain attacks, and nation‑state espionage. Demand for skilled defenders has surged, pushing companies to offer competitive, fully disclosed compensation packages to attract top talent.

Within this category you’ll find Threat Analysts monitoring for anomalous activity, Incident Responders managing breaches, SOC Engineers configuring SIEM platforms, Red Teamers testing defenses, Blue Teamers hardening networks, Penetration Testers uncovering vulnerabilities, and Security Architects designing zero‑trust frameworks. Each role blends technical vigilance with strategic insight, ensuring that data, infrastructure, and users stay protected.

Salary transparency is critical for cybersecurity professionals because pay gaps can conceal skill disparities and create barriers to entry. With clear, upfront figures, candidates can benchmark their worth, negotiate confidently, and employers can demonstrate fairness—ultimately strengthening the talent pipeline in a field where every dollar fuels stronger defense.

Linux Kernel Developer

Company: IBM

Location: Waterford, IE

Posted Dec 05, 2025

The company is expanding its Linux Kernel Engineering team and seeking mid-senior level developers with 3+ years of professional experience working with the Linux kernel and low-level system software. The role involves designing, optimizing, and contributing to technologies that drive next-generation enterprise systems, collaborating with and mentoring early-career developers, and actively contributing to open-source communities.

PROCESS DELIVERY SPECIALIST-PROCURE TO PAY

Company: IBM

Location: BANGALORE, IN

Posted Dec 05, 2025

The text describes a career opportunity at IBM Consulting, focusing on a role as a Process Associate in Procure to Pay. It highlights the collaborative and innovative work environment, the use of agile methodologies and AI, and the support provided by mentors and coaches. The role involves transaction processing, vendor account management, and adherence to SLAs.

API Security Analyst

Company: IBM

Location: Taguig City, PH

Posted Dec 05, 2025

The job posting is for a Junior API Security Consultant role that requires foundational experience in API development or security, strong interest in securing modern applications, and 3+ years of cybersecurity or SOC experience. The role involves implementing security measures, conducting tests, monitoring API traffic, performing security audits, collaborating with the team, and supporting onsite managed services. Preferred qualifications include API Security Fundamentals certification, CompTIA Security+ or equivalent, and familiarity with MITRE ATT&CK for APIs or OWASP API Security.

Infrastructure Specialist - System Administration

Company: IBM

Location: Multiple Cities

Posted Dec 05, 2025

IBM CIC offers a career with opportunities to work with visionaries across industries, improve hybrid cloud and AI, and make meaningful change for clients. The company provides training, promotion opportunities, diversity and inclusion, work-life balance, and traditional benefits. The role involves developing infrastructure strategies for cloud-based solutions, administering environments, and mentoring junior specialists.

HR Summer Internship 2026

Company: IBM

Location: Armonk, US

Posted Dec 05, 2025

The text is a job posting for an HR internship at IBM's headquarters in Armonk, NY. The internship focuses on various HR functional areas and provides opportunities to work with talented HR professionals, learn new skills, and make an impact. The required education is a high school diploma or GED, with a preferred bachelor's degree. The role requires excellent communication skills, time management, and proficiency in Microsoft Office. Preferred experience includes HR experience.

Security Specialist : 기술적 취약점 진단/분석

Company: IBM

Location: Seoul, KR

Posted Dec 05, 2025

The job description outlines the role and responsibilities of an Associate Security Specialist in a Security Operations Center. The position requires a bachelor's degree, 1 year of experience in vulnerability diagnostics, and proficiency in Korean and English. Preferred experience includes conducting penetration tests, developing exploit code, and assessing cloud infrastructure security.

System Administrator (Citrix)

Company: IBM

Location: QUEZON CITY, PH

Posted Dec 05, 2025

This role offers opportunities for career growth and technical expertise in IBM Consulting, focusing on client collaboration and innovation in cloud and AI solutions. The position emphasizes long-term relationships, technical skills development, and impactful problem-solving in a global environment.

Software Engineer - Database Drivers and Data Integration

Company: IBM

Location: BANGALORE, IN

Posted Dec 05, 2025

The text is a job description for a software engineer role at IBM, focusing on developing tools and products for the AstraDB, Apache Cassandra, and DataStax Enterprise ecosystem. The role involves design, development, integration, and customer support, with a focus on open-source projects and cloud-native technologies.

Package Consultant-SAP HANA SCM SD

Company: IBM

Location: BANGALORE, IN

Posted Dec 05, 2025

This text describes a career in IBM Consulting, emphasizing collaboration with global clients, technical expertise in SAP, and opportunities to drive innovation through hybrid cloud and AI solutions. It outlines role responsibilities, required education, and technical skills needed for the position.

BPOプロジェクトチームリーダー

Company: IBM

Location: Kitakyushu, JP

Posted Dec 05, 2025

IBM Consulting offers long-term relationships and collaboration with global clients. The role involves working with visionaries across industries to improve hybrid cloud and AI solutions. The position is for a BPO project team leader at IBM Japan Staff Operations Co Ltd, requiring business-level Japanese language skills and relevant experience.

Consultant - SAP S/4HANA MM (m/w/d)

Company: IBM

Location: Multiple Cities

Posted Dec 05, 2025

The text describes a role at IBM Consulting where the individual will work closely with clients worldwide to improve their hybrid cloud and AI journey. The role involves advising clients on strategy, business processes, requirements analysis, solution design, and IT implementation with a focus on SAP S4HANA Logistics. The position requires a bachelor's degree, at least 3 years of experience in process consulting in SAP, and knowledge of SAP S4HANA modules. Preferred experience includes strong communication skills, negotiation abilities, and mental flexibility.

Package Consultant-SAP HANA SCM EWM

Company: IBM

Location: Kolkata, IN

Posted Dec 05, 2025

This role offers collaboration with global clients, SAP expertise, and opportunities for professional growth in innovative projects. It emphasizes strategic solutions, technical expertise, and career development through diverse industry experiences.

Frequently Asked Questions

What are typical salary ranges by seniority in Securing Our Technology?
Entry‑level analysts earn $70k–$90k, mid‑level specialists $90k–$120k, senior professionals $120k–$160k, and architects or managers $160k–$220k in the U.S. These ranges reflect cloud‑security focus, threat‑hunting experience, and certifications like CISSP or CEH.
Which skills and certifications are required for Securing Our Technology roles?
Core skills include SIEM (Splunk, QRadar), threat‑hunting, network forensics, Python/Powershell scripting, and cloud security (AWS, Azure, GCP). Certifications such as CISSP, CEH, OSCP, CCSP, and CompTIA Security+ validate expertise and often serve as a hiring criterion.
Can I work remotely in Securing Our Technology positions?
Yes—over 70% of roles offer fully remote or hybrid options. Companies like Microsoft, Google, and CrowdStrike routinely provide remote SOC and threat‑analysis positions, enabling you to work from anywhere while maintaining connectivity with global teams.
What career progression paths exist in Securing Our Technology?
Typical ladders move from Analyst → Senior Analyst → Lead Analyst → Manager → Director → CISO. Engineers can progress from Security Engineer → Senior Engineer → Technical Lead → Security Architect → VP of Security. Continuous certification and hands‑on projects accelerate advancement.
What industry trends shape Securing Our Technology today?
Zero‑trust architecture, AI‑driven threat detection, cloud‑native security, and DevSecOps are defining trends. Supply‑chain risk management and regulatory compliance (GDPR, CCPA, NIST) also drive demand for specialized security expertise.

Related Pages