Set up firewalls, intrusion detection/prevention systems (IDS/IPS), and antivirus solutions.. Perform penetration testing to evaluate system defenses.. Conduct regular disaster recovery and business continuity testing.. Professional certifications such as CISSP, CISM, CEH, or CompTIA Security is a plus. Hands-on experience with SIEM tools, firewalls, endpoint protection, and encryption technologies.
The Head of Cyber Risk Management is a senior leadership role responsible for establishing, maintaining, and overseeing the organization's comprehensive Cyber Risk Management framework including core components of Governance, Risk, and Compliance.. Own, maintain, and mature the organization's Cyber Risk Management Framework (CRMF), ensuring alignment with industry standards (e.g., NIST CSF, CRI, FFIEC) and specific regulatory frameworks applicable to our industry.. Integrate the Cyber Risk Management program with the overall Enterprise Risk Management (ERM) framework.. Analyze threat intelligence, vulnerability data, and control effectiveness to provide a clear picture of the cyber risk posture.. In-depth understanding of cybersecurity domains: network security, application security, cloud security, data protection, identity and access management, incident response, vulnerability management, third-party risk.
Network Security Analyst Attractivate Consulting Solutions Location: Remote/Hybrid. Position Overview: We're seeking an experienced Network Security Analyst to join our cybersecurity team.. Conduct vulnerability assessments and penetration testing. Firewall and IDS/IPS management. Cloud security expertise (AWS, Azure)
You will collaborate with the CISO (Chief Information Security Officer), CTO, product, devops, and legal/compliance teams.. Who You Are At least 8 years of work experience in software or data engineering, ideally in financial services and/or fintech industry. Experience implementing zero-trust architecture , secrets management (e.g., HashiCorp Vault), and DevSecOps practices. Experience conducting or leading threat modeling , penetration testing , or incident response. Interview Process Intro call with the Head of Talent, 30m
Oversee Security Operations Center (SOC), incident response, vulnerability management, threat intelligence, and endpoint protection.. Drive the maturity of identity and access management (IAM), data loss prevention (DLP), zero trust architecture, and secure DevOps initiatives.. Strong technical foundation in network security, cloud security (GCP, AWS, Azure, OCI), security engineering, and incident response.. Relevant certifications (CISSP, CISM, CISA, CCSP, etc.). Mattel is a leading global toy and family entertainment company with an iconic brand portfolio including Barbie, Hot Wheels, Fisher-Price, and more.
We are seeking a highly skilled Network Security Engineer to join our growing IT security team in London.. Proficiency in configuring and managing security technologies such as Cisco ASA, Palo Alto, Fortinet, or Check Point firewalls.. Hands-on experience in incident response, threat hunting, and forensic analysis.. Professional certifications such as CISSP, CISM, CEH, CCNP Security, or equivalent.. Experience with cloud security in AWS, Azure, or Google Cloud.
Oversee Security Operations Center (SOC), incident response, vulnerability management, threat intelligence, and endpoint protection.. Drive the maturity of identity and access management (IAM), data loss prevention (DLP), zero trust architecture, and secure DevOps initiatives.. Strong technical foundation in network security, cloud security (GCP, AWS, Azure, OCI), security engineering, and incident response.. Relevant certifications (CISSP, CISM, CISA, CCSP, etc.. Mattel offers competitive total pay programs, comprehensive benefits, and resources to help empower a culture where every employee can reach their full potential.
This position demands a deep understanding of company IT infrastructure principles, including roadmap development, security management, and capacity planning.. Conduct vulnerability assessments and penetration testing to identify and remediate security weaknesses.. Experience with security information and event management (SIEM) systems (e.g., Splunk, QRadar).. Experience with cloud security (AWS, Azure/Microsoft Defender, Sentinel, Entra, GCP) is a strong plus.. Preferred QualificationsMicrosoft Certified: Azure Security Engineer Associate or Cybersecurity Architect ExpertCISA, CISM or CISSP (or similar)or CSMInformationAll your information will be kept confidential according to EEO guidelines.
Technical Knowledge and Skills: Minimum of 5+ years of technical experience conducting security incident response and forensic analysis.. Working experience of obtaining Cyber Threat Intelligence and making the information usable through the security incident process.. Operating Systems: UNIX, LINUX, WINDOWS. Network: LAN WAN, Internet, Proxy/Filtering, Firewall, VPN, DMZ Network Protocols: TCP/IP, SNMP, SMTP, NTP, DNS, LDAP, NFS, SAMBA, etc.. Databases: Oracle, SQL, MYSQL. Cloud Platforms: IAAS, PAAS, SAAS. Security Concepts: Encryption, Hardening, etc.. Security GRC. Forensic Analysis Tools.
This Cyber Security Engineer involves tasks like monitoring networks, responding to security incidents, analyzing threats and STIG/Imaging efforts.. Perform penetration testing on avionics and weapon systems.. Deep knowledge of security tools like SIEM, firewalls, and IDS/IPS.. Proficiency with security tools such as firewalls, intrusion detection/prevention systems (IDS/IPS), and SIEM platforms.. Certifications such as CISSP, CEH, or CISM are highly desirable.
Conduct regular vulnerability assessments and penetration testing.. Required Skills: Strong understanding of data loss prevention (DLP), encryption standards, and SIEM tools.. Familiarity with cloud platforms (AWS, Azure, GCP) and their security features.. Knowledge of regulations and compliance standards (, PCI-DSS, NIST).. Preferred Certifications: CISSP (Certified Information Systems Security Professional) CISM (Certified Information Security Manager) CEH (Certified Ethical Hacker) CompTIA Security+ GIAC (Global Information Assurance Certification) CCSP (Certified Cloud Security Professional) ISO/IEC Lead Implementer or Auditor AWS/Azure/GCP Security Certifications Educational Background: Bachelor’s degree in computer science, Cybersecurity, Information Systems, or related field.
This Cyber Security Engineer involves tasks like monitoring networks, responding to security incidents, analyzing threats and STIG/Imaging efforts.. Perform penetration testing on avionics and weapon systems.. Deep knowledge of security tools like SIEM, firewalls, and IDS/IPS.. Proficiency with security tools such as firewalls, intrusion detection/prevention systems (IDS/IPS), and SIEM platforms.. Certifications such as CISSP, CEH, or CISM are highly desirable.
In-depth knowledge of cloud security best practices, principles, and technologies, including IAM, encryption, network security, container security, and serverless security.. Review the design and implementation of secure AWS cloud architecture solutions, including VPC configurations, security groups, IAM policies, encryption mechanisms, and logging and monitoring for the AWS cloud environment.. Conduct vulnerability assessments and penetration testing on AWS infrastructure and applications.. Expertise in implementing, administrating and operating information security technologies such as firewalls, IDS/IPS, SIEM, Antivirus, network traffic analyzers and malware analysis tools.. Strong understanding of AWS cloud security principles and best practices
Experience Must have six years of experience in an information systems security domain with a background in mobile device security, endpoint protection, wireless protection, vulnerability management, incident response and mitigation, threat research and cyber intelligence analysis or other cyber security domain. Certification/Registration/Licensure Must have a current CompTIA Security+ Certification or equivalent in industry certification, background and knowledge within 6 months of placement into the position. Direct experience with anti-virus software, intrusion detection, firewalls and content filtering Experience with hacker techniques and network security principles. Collect threat intelligence and automate systems to consume threat feeds and track adversaries. Examples of such tools are web filtering technology, IDS/IPS appliances, SIEM tools, anti-spam/antivirus systems, data leakage appliances, content screening servers, VPN systems and firewalls.
Intersecting cybersecurity and blockchain, CertiK’s security offerings include security consulting, security reviews, security auditing of smart contracts and blockchains, verification of smart contracts, penetration testing, and more.. Experienced in threat and vulnerability management, penetration testing, and SecOps (intrusion detection, security logging, malware analysis, and forensics).. Experience in programming languages such as Rust, Golang, Solidity.. Passionate with Cryptocurrency/DeFi/Blockchain is a plus.. One of the fastest-growing and most trusted companies in blockchain security, CertiK is a true market leader.
Centurion Consulting Group is currently seeking a Network Security Engineer in Annapolis, MD. This is a hybrid role with a combination of onsite and remote work each week.. Palo Alto Networks Certified Network Security Engineer (PCNSE). Prisma Certified Cloud Security Engineer (PCCSE) – Palo Alto Networks. Palo Alto Networks NGFW services, Intrusion Detection/Prevention, VPNs, Content Filtering, TLS/SSL Inspection, Data Loss Prevention.. Vulnerability management: Nessus, NMAP, Linux/Windows/Unix OS.
Collaborate closely with IT infrastructure, application development, DevSecOps, and business teams to embed security principles throughout technology development and deployment phases.. Deep understanding of defense-in-depth strategies, zero-trust models, identity and access management (IAM), threat modeling, key management techniques, vulnerability assessment techniques, and secure coding practices.. Excellent knowledge of WAF, NG Firewalls, intrusion detection/prevention systems (IDS/IPS), network segmentation, VPNs, network access control (NAC), DMZ design, and DDoS mitigation.. Proficient in cloud security models (IaaS, PaaS, SaaS), cloud-native security tools, encryption and key management, privileged access management (PAM), security posture and compliance within cloud environments.. Our People First Culture celebrates diversity, equity, and inclusion not simply because it’s the right thing to do, but also because it’s the key to our success.
Conduct penetration testing to simulate cyberattacks, using tools like Metasploit, Burp Suite, and Nmap to assess network security resilience and exploit weaknesses.. Hands-on experience with firewalls (e.g., Palo Alto, Cisco ASA, Fortinet) and advanced security appliances.. Expertise in performing vulnerability assessments and penetration testing using tools like Nessus, Burp Suite, Metasploit, and Nmap.. Familiarity with cloud security concepts, including securing cloud infrastructures on AWS, Azure, or GCP.. Relevant certifications like CISSP, CEH, CCNP Security, CompTIA Security+, or GIAC are highly preferred.
The cybersecurity threat intelligence analyst is an advanced and highly trusted role supporting the credit union’s information security program. Applicable knowledge of adversary tactics, techniques and procedures (TTPs), MITRE ATT&ACK framework, CVSS, open source intelligence (OSINT) and deception techniques. Proficient in SIEM, intrusion detection and prevention systems (IDS/IPS), threat intelligence platforms and security orchestration, automation and response (SOAR) solutions to centralize and manage incident and remediation workflow. penetration test, threat testing, monitoring, threat intelligence, Purple Team. - CISSP, GCTI, GCFE,GCIH, GREM, OSCP preferred, but not required.
Industry-recognized certifications such as CompTIA Security+, Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP), or Certified Information Systems Security Professional (CISSP) are strongly preferred.. In-depth understanding of network protocols such as TCP/IP, UDP, DNS, HTTP/HTTPS, and VPN. Proficiency in managing and configuring firewalls (e.g., Palo Alto, Fortinet, Cisco ASA), intrusion detection/prevention systems (IDS/IPS), and load balancers.. Experience with endpoint protection platforms such as CrowdStrike, Symantec, or Microsoft Defender for Endpoint.. Familiarity with cloud-native security tools like AWS GuardDuty, Azure Security Center, or Google Cloud Security Command Center.. Familiarity with infrastructure-as-code (IaC) tools like Terraform or Ansible is a plus.