We are looking for a strong business technical writer for: cyber security, digital transformation, ai and tech in general. If you know someone tag them or shoot me a message. #contract
Kristin Hague’s Post
More Relevant Posts
-
Hi I am looking for a Job title: Cyber Security Technical Writer Location: Remote Duration: 6 Months Interview: MS Teams video Work Auth : NO H1B Job Description: As both subject matter experts and highly-skilled technical writers, they are often responsible for producing documentation regarding the strategies that minimize security risks to a company, creating data reports, developing manuals known as SOPs (Standard Operating Procedures) for employees to follow, and simplifying complex technical information for a wider audience. Clarity and Accessibility – Cybersecurity often contains complicated jargon that is not easily understandable by readers unfamiliar with the field. However, cybersecurity technical writers are specialized in rewriting information to be clearer for readers to understand. Organization and Planning – Cybersecurity technical writers can develop documentation for employees to follow in the event that a cyber-attack or data breach does occur, identifying and explaining the best courses of action. These specialized writers are familiar with the danger cyber threats pose to a company, as well as what the possible consequences could be should one happen. Thus, their job is to ensure your company is prepared to the best extent possible to handle any unfortunate event swiftly and efficiently. Endlessly Learning and Evolving – Cybersecurity technical writers are highly skilled at researching and keeping up with trends, meaning they can ensure a business always has the most up-to-date security procedures and can plan effectively against ever-evolving cyber threats. No matter how big or small a business is, hiring one of these writers is highly recommended if your business handles personal data of any kind, and wants to feel secure that data is out of the reach of malicious parties. Efficient and Effective – Cybersecurity technical writers have keen eyes and are highly detail-oriented, making sure nothing is out of place and that things are running smoothly. This reduces internal confusion, miscommunication, and overall streamlines operations. Please share me profile to [email protected] #cybersecurity #technicalwriter #technical #c2c #w2 #remote
To view or add a comment, sign in
-
Recruiters: Ever feel like who you are interviewing doesn't seem legit? If your spidey senses were telling you something was off, you were probably right, and chances are, it was a North Korean spy! Woof. Do yourself a favor and listen to this: https://lnkd.in/gTsqFr_k Now my question is, what is LinkedIn going to do about fake profiles and authenticating humans to combat this fraud and threat to our national security?
To view or add a comment, sign in
-
We are hiring #Technical_Writer - #Vulnerability_Management for one of my Client in Remote/ San Antonio, TX interested candidates please send resumes to [email protected] +1(254) 244-6784 Role: Technical Writer - Vulnerability Management Location: Remote/ San Antonio, TX Experience:- 10+ Visa status: Strictly Don’t share F1, OPT, OPT EAD, L2 EAD and H4 EAD work permit Profiles JOB DESCRIPTION: Role Description: · Hands-on experience with vulnerability management tools and technical understanding and experience assessing vulnerabilities and identifying weaknesses in multiple operating system platform s, servers, databases, and applications. · Experience with vulnerabi lity management i n a large global environmen t, whi le worki ng with multidiscipl inary teams. · Producing visual izations of data to monitor for developing trends/patterns and highlighting areas of potentia l improvement. · Working with internal stakeholders to develop and implement effective vulnerability mitigation strategies. · Identifies security risks, threats, misconfigurations, and · vulnerabilities of existing networks, systems, applications, and APIs, and develops solutions to remediate identified threats. · Experience writing technical documentation for IT solutions, including operational guides and compliance documentation. · Identify and make recommendations for process and tool improvements. · Evaluating cyber threats, vulnerabilities, and risks and effectively · communicating them through written polici es and procedures. · Researching and documenting security best practices for devices, applications, and emerging technologies. · Ability to develop and update cybersecurity policy documents, system security plans, baselines, and threat models for deployment and risk acceptance decisions. · Coordi nate and ensure technical requirements of cyber security are appropriately documented and integrated into the overall site security efforts. · Review and analyze planned projects and initiatives that may have an impact on the cyber security policies and procedures. · Evaluate compliance with the organization's security pol icies and making recommendations for areas of improvement. · Written and verbal communication skills with the ability to · collaborate through all parts of the business. · High-performance skillset which not only understands the threat spaces as it relate to risks but is also able to meet the technical challenge of communicating this out to teams and stakeholders. · Proven experience working in a technical writing position. · Excellent written and verbal communication skills. · Able to write in explanatory and procedural styles for multiple audiences and Skilled at prioritization and multi-tasking
To view or add a comment, sign in
-
I wanted to share a personal experience with the community at large, especially with those in or care about cybersecurity. I applied for a role on Indeed and received a notification to complete a virtual interview. I have never recieved a request like this before so I was very curious so I clicked through. Indeed would record my answer to three questions and transcribe my response. Upon reading the privacy policy the recording would be used for transcription purposes and be sent to OpenAI. I took some time to think about this and here is my opinion and my advice as a cybersecurity practitioner. 1. I see this as "paying" for an interview, for a role I may not get. 2. The cost for this chance, is my contextual work experience and how I communicate (this is gold to A.I.) 3. Who benefits the most ...OpenAI, a for-profit company I took a moment to think what type of prompt could be created that would respond using this information and from millions of others. Take note, responses may contain company, role, group or individual names. "ChatGTP: Create a resume for a hypothetical candidate for a Cybersecurity Manager who worked for Company A from MM/YY to MM/YY and as a Cybersecurity Analyst at Company 2... and as a Cybersecurity Engineer at Company 3..... each job will have a 3 bullets describing with what the employee did. The first bullet will describe a project he managed with a successful metric. The second bullet will describe a day-to-day reporting scenario with senior stakeholders on a schedule. The third bullet will describe how he mentored his peers with examples" Needless to say, I withdrew my application as the cost was too high. For other job seekers I take the time to read the privacy notice if you receive such a request. My work experience is more valuable then a potential job and regardless what happens, OpenAI gets the gold.
To view or add a comment, sign in
-
#Hiring Imagine a job where your words help protect businesses from online threats. Your writing won’t just be for attention; it will make a real impact by educating people about cybersecurity. We’re seeking someone who understands cybersecurity and can turn complex ideas into simple, engaging stories. You’ll work with teams from marketing, product, and IT security to create content that is easy to understand and informative. If you're passionate about cybersecurity and have the gift of turning complex topics into engaging content, we’d love to hear from you. Be the one to tell the story that matters. Ready to defend the digital world with your words? 𝗔𝗽𝗽𝗹𝘆 𝗻𝗼𝘄: https://lnkd.in/d4dEs7qz #Securityium #HiringNow #Hiring #CyberSecurity #ContentWriter #TechnicalContentWriter #ContentCreation
To view or add a comment, sign in
-
🔐 Different Roles in Cybersecurity: Key Players Protecting Our Digital World 🌐 Cybersecurity is a dynamic and rapidly evolving field with various specialized roles that work together to safeguard our digital environments. Here’s a look at some of the major roles: 👉 Security Analyst Role: Monitor networks for security breaches, investigate violations, and install software to protect sensitive information. Skills Needed: Analytical thinking, attention to detail, and knowledge of security tools and protocols. 👉 Penetration Tester (Ethical Hacker) Role: Simulate cyberattacks to identify vulnerabilities in systems before malicious hackers can exploit them. Skills Needed: Programming, understanding of network security, and problem-solving skills. 👉 Security Architect Role: Design and implement network and computer security architecture for an organization. Skills Needed: Systems thinking, deep understanding of security protocols, and project management. 👉 Chief Information Security Officer (CISO) Role: Lead the cybersecurity strategy and ensure the protection of information assets at an organizational level. Skills Needed: Leadership, strategic planning, risk management, and extensive cybersecurity knowledge. 👉 Incident Responder Role: Act quickly to mitigate damage during a security breach, analyze incidents, and implement measures to prevent future breaches. Skills Needed: Crisis management, forensic analysis, and quick decision-making. 👉 Security Consultant Role: Advise organizations on best practices for securing their digital assets and help develop security strategies. Skills Needed: Broad cybersecurity knowledge, communication skills, and analytical thinking. 👉 Cryptographer Role: Develop algorithms, ciphers, and security systems to encrypt sensitive information and protect data. Skills Needed: Mathematics, cryptography, and problem-solving skills. 👉 Security Software Developer Role: Create and maintain security software that helps protect systems from cyber threats. Skills Needed: Programming, software development, and understanding of security vulnerabilities. Cybersecurity professionals play a crucial role in defending against cyber threats. Whether you're interested in preventing attacks or responding to them, there's a role for you in this exciting field! #CyberSecurity #TechCareers #DigitalSafety #CyberRoles #SecurityAnalyst #EthicalHacker #SecurityArchitect #CISO #IncidentResponder #SecurityConsultant #Cryptographer #SecuritySoftwareDeveloper #GradGurukul
To view or add a comment, sign in
-
We are #hiring, #ApplicationSecurityEngineer, A digital guardian, a protector of the unseen, skilled in the arcane arts of secure coding and cloud sorcery As a Senior Application Security Engineer, you'll be the first line of defense against cyber threats, wielding cutting-edge tools and techniques to protect our containerized applications on the cloud. Your Mission: Unmask the Dark Web: Conduct deep-dive security audits, uncovering hidden vulnerabilities in our applications. Forge a Secure Future: Collaborate with development teams to embed security into every line of code, creating a fortress of impenetrable software. Command the Arsenal: Master a vast array of security tools, from static and dynamic analysis to penetration testing, to thwart the most sophisticated attacks. Navigate the Cloud: Secure our applications in the ever-evolving cloud landscape and guarding against threats. Your Qualifications: A Keen Eye: A sharp mind and a passion for problem-solving. A Master of the Arcane: Deep knowledge of secure coding practices, cloud security, threat modeling, and DevSecOps. A Warrior's Arsenal: Proficiency in SAST and DAST tools, such as Fortify, Veracode, and Burp Suite. The Digital Battlefield: Knowledge of cloud platforms, container technologies, and programming languages. The Language of Strategy: Excellent communication skills to convey complex security concepts to diverse audiences. Let's revolutionize cybersecurity together. Connect to discuss more on the opportunity #cybersecurity #informationssecurity #applicationsecurity #cybersecurityjobs #cloudsecurity #devsecops #SAST #DAST #vulnerabilityassessment #penetrationtesting #threatmodeling #securecoding #career #jobs #SAST #DAST #cloudsecurity #threatmodeling
To view or add a comment, sign in
-
I have received a lot of scam emails/texts for jobs since looking for a role. I saw someone post on linkedin where they were scammed. Two things I use to make sure they don't get me: If recruiters send you a link, check it by right-clicking the URL and selecting "copy link" then past it in this free URL scanner from Cloudflare: https://lnkd.in/eQgsQNFS You can also analyze the email message/header. In Outlook, you will select the "..." in the email then select View -> View Message Source. You will copy this and paste it into this email analyzer -> https://lnkd.in/exu76G8E In Gmail, it's even simpler. Here is the article: https://lnkd.in/eb9QKeqr Also if a "recruiter" sends you a text through text, never click on it! Have them send you an email instead and do the above steps. If they don't want to do that they are not worth your time. Stay safe job searchers!
URL Scanner | Cloudflare Radar
radar.cloudflare.com
To view or add a comment, sign in