Experience Must have six years of experience in an information systems security domain with a background in mobile device security, endpoint protection, wireless protection, vulnerability management, incident response and mitigation, threat research and cyber intelligence analysis or other cyber security domain.. Certification/Registration/Licensure Must have a current CompTIA Security+ Certification or equivalent in industry certification, background and knowledge within 6 months of placement into the position.. Direct experience with anti-virus software, intrusion detection, firewalls and content filtering Experience with hacker techniques and network security principles.. Collect threat intelligence and automate systems to consume threat feeds and track adversaries.. Examples of such tools are web filtering technology, IDS/IPS appliances, SIEM tools, anti-spam/antivirus systems, data leakage appliances, content screening servers, VPN systems and firewalls.
Comprehensive knowledge of networking, its core protocols and controls (OSI stack, VPNs, IDS/IPS, WAF) is fundamental.. Cloud Security: Strong knowledge of major cloud platforms (Amazon Web Services - AWS, Microsoft Azure, Google Cloud Platform - GCP) and their specific security features and services is essential.. Proficiency in penetration testing techniques and approaches, threat modeling methodologies, and performing comprehensive risk analysis.. Familiarity with security tools like SIEM platforms, network analysis, and IDS/IPS is required.. Certifications such as CISSP, CISM, or CISA are preferred.
Industry-recognized certifications such as CompTIA Security+, Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP), or Certified Information Systems Security Professional (CISSP) are strongly preferred.. In-depth understanding of network protocols such as TCP/IP, UDP, DNS, HTTP/HTTPS, and VPN. Proficiency in managing and configuring firewalls (e.g., Palo Alto, Fortinet, Cisco ASA), intrusion detection/prevention systems (IDS/IPS), and load balancers.. Experience with endpoint protection platforms such as CrowdStrike, Symantec, or Microsoft Defender for Endpoint.. Familiarity with cloud-native security tools like AWS GuardDuty, Azure Security Center, or Google Cloud Security Command Center.. Familiarity with infrastructure-as-code (IaC) tools like Terraform or Ansible is a plus.
Conduct penetration testing to simulate cyberattacks, using tools like Metasploit, Burp Suite, and Nmap to assess network security resilience and exploit weaknesses.. Hands-on experience with firewalls (e.g., Palo Alto, Cisco ASA, Fortinet) and advanced security appliances.. Expertise in performing vulnerability assessments and penetration testing using tools like Nessus, Burp Suite, Metasploit, and Nmap.. Familiarity with cloud security concepts, including securing cloud infrastructures on AWS, Azure, or GCP.. Relevant certifications like CISSP, CEH, CCNP Security, CompTIA Security+, or GIAC are highly preferred.
Experience with Cloud Identity and Access Management, network security, data security, regulatory compliance frameworks, and creating security architectures.. Experience in understanding attacks and mitigation methods, in two or more of the following: network protocols and secure network design; web application security, security assessments and pen testing, authentication and access control, applied cryptography and security protocols, security monitoring and intrusion detection, Incident response and forensics, development of security tools, automation or frameworks.. About the job As a Security Consultant, you will provide excellent technical guidance to customers adopting Google Cloud Platform (GCP) services.. You will provide prescriptive guidance in ensuring customers receive the best of what GCP can offer and will ensure that customers have the best experience in migrating, building, modernizing, and maintaining applications on GCP. Additionally, you will work closely with Product Management and Product Engineering to drive excellence in Google Cloud products and features.. Provide domain expertise in SecOps Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR), cloud security, compliance, and enterprise security best practices.
About the job Chief Information Security Officer Chief Information Security Officer (CISO) Our Client. Our client is a leading Alternative Investments asset manager.. With a commitment to innovation, regulatory excellence, and security, they are seeking a highly skilled Chief Information Security Officer (CISO) to lead their cybersecurity and information security strategy.. The Chief Information Security Officer (CISO) will be responsible for developing and executing Our Client cybersecurity strategy, ensuring compliance with SEC regulations, and safeguarding sensitive investor and corporate data.. Design and manage cyber risk management frameworks , including penetration testing, threat detection, and incident response strategies.
We are seeking a highly skilled Network Security Engineer to join our growing IT security team in London.. Proficiency in configuring and managing security technologies such as Cisco ASA, Palo Alto, Fortinet, or Check Point firewalls.. Hands-on experience in incident response, threat hunting, and forensic analysis.. Professional certifications such as CISSP, CISM, CEH, CCNP Security, or equivalent.. Experience with cloud security in AWS, Azure, or Google Cloud.
Configure, manage, and troubleshoot firewalls (Cisco, Palo Alto, Fortinet) and security devices (IPS/IDS, VPN).. Oversee daily data center operations (hardware, networking, storage) and overall IT infrastructure (network, servers, storage).. June 2025 Skills: Core Technical Expertise: Advanced Networking (Design, WAN/LAN/VLAN/VPN), Firewalls (Cisco, Palo Alto, Fortinet), Server Management (Windows/Linux), Virtualization (VMware/Hyper-V), Access Points (Cisco, Ubiquiti, Aruba), Database Management (SQL Server, MySQL, Oracle), High Availability/Uptime strategies.. IT Team Leadership, Cross-functional Collaboration, Excellent Communication (English essential, Chinese Mandarin a plus), Organizational & Time Management, Problem-Solving & Troubleshooting, Incident Management, Project Management, Documentation.. Cisco CCNA/CCNP, CompTIA Network+, CISSP, CEH.
Conduct regular vulnerability assessments and penetration testing.. Required Skills: Strong understanding of data loss prevention (DLP), encryption standards, and SIEM tools.. Familiarity with cloud platforms (AWS, Azure, GCP) and their security features.. Knowledge of regulations and compliance standards (, PCI-DSS, NIST).. Preferred Certifications: CISSP (Certified Information Systems Security Professional) CISM (Certified Information Security Manager) CEH (Certified Ethical Hacker) CompTIA Security+ GIAC (Global Information Assurance Certification) CCSP (Certified Cloud Security Professional) ISO/IEC Lead Implementer or Auditor AWS/Azure/GCP Security Certifications Educational Background: Bachelor’s degree in computer science, Cybersecurity, Information Systems, or related field.
Join a forward-thinking and rapidly growing organization committed to protecting digital assets and maintaining data integrity.. This role involves monitoring our networks for security breaches, investigating security incidents, and implementing protective measures to safeguard our information systems.. Stay updated on the latest cybersecurity trends and threat intelligence.. Develop and update disaster recovery and incident response plans.. Certifications like CISSP, CISM, CEH, CompTIA Security+, or similar are preferred.
Collaborates closely with enterprise architects to create and implement security standards within SGWS's Enterprise Architecture frameworks.. Design, enhance, and lead the implementation of scalable security architecture solutions encompassing:Cloud security controls, standards, and frameworks (AWS, Azure, GCP) Critical infrastructure, including endpoints, mobile devices, authentication and authorization, logging, and threat detection.. Application security (web application firewalls, secure coding practices)Data security (encryption, data loss prevention)Endpoint security (endpoint detection and response, antivirus)Identity and access management (IAM)Network security (firewalls, IDS/IPS, segmentation)Harden the security of Azure, GCP, AWS Identity as a Service (IaaS), and Platform as a Service (PaaS) infrastructure.. Conduct threat modeling, risk assessments, and vulnerability management.. Experience with compliance regulations (HIPAA, PCI-DSS, GDPR)Experience conducting application vulnerability assessments.
The Incident Response Analyst will engage for the duration of a security incident, leveraging all available detection and response toolsuites, including SIEM, EDR, email security, DNS filtering, and network security appliances, to analyze malicious artifacts and assist with forensic investigations.. Liaise when necessary with external incident response providers to perform digital forensics, malware analysis, and recovery operations.. Collaborate with others within the cyber threat operations team, working closely with peers in vulnerability management, penetration testing and red/blue team exercises, and crisis command and resiliency.. Knowledge/ Experience Required 2+ years of experience in one or more of the following areas: Information Security, Security Operations, Digital Forensics/Incident Response, Cyber Threat Hunting, or Cyber Threat Intelligence.. Familiarity with relevant regulations, such as SOX, GDPR / data privacy, PCI-DSS, etc.
Lead the configuration, maintenance, and monitoring of network security devices (e.g., firewalls, IDS/IPS, NAC systems, proxies). Configure security for cloud & hybrid network security platforms (AWS, Azure, GCP, VMX). Relevant certificates (e.g., CCNA, CCSP, CompTIA Network+ m CompTIA Security+) are highly desirable.. CompTIA Security+ - General cybersecurity & network security fundamentals. Palo Alto Networks Certified Network Security Engineer (PCNSE) - Palo Alto firewall deployment, configuration, & security platform usage
The role requires a deep understanding of security protocols, vulnerability management, network security, and identity management, with a focus on achieving a comprehensive zero-trust framework.. Assist the Army DevOps team using Ubuntu agents and Python scripts to connect with Azure DevOps.. Security Integration: Reconfigure and integrate security technologies such as ACAS, Active Directory, Cisco ASA & Palo Alto/Panorama, Elastic SIEM, Endgame, Cisco ISE, MECM, Microsoft Defender, PAW, Tactical PKI, and MFA for seamless communication and compatibility.. Support for Elastic team, including automation in Azure DevOps, Ansible, Bash, and Python, as well as STIG automation and customer support via Teams, is also part of the role.. Deep knowledge of security tools like ACAS, Elastic SIEM, Cisco ASA, Palo Alto, Endgame, MFA, Active Directory, MECM, and Microsoft Defender.
The role requires a deep understanding of security protocols, vulnerability management, network security, and identity management, with a focus on achieving a comprehensive zero-trust framework.. Support the Army DevOps team using Ubuntu agents and Python scripts to connect to Azure DevOps. Provide Elastic support including STIG automation on Oracle Linux using Bash scripts and customer support via Teams.. Reconfigure and integrate security technologies including ACAS, Active Directory, Cisco ASA & Palo Alto, Elastic SIEM, Endgame EDR, Cisco ISE, MECM, Microsoft Defender, PAW, Tactical PKI, MFA, IAM, endpoint protection, network security, privileged access management, security monitoring, and incident response systems, ensuring compliance with Zero Trust principles.. In-depth knowledge of security tools including ACAS, Elastic SIEM, Cisco ASA, Palo Alto, Endgame, MFA, Active Directory, MECM, and Microsoft Defender.. Familiarity with network firewalls and IPS such as Cisco ASA and Palo Alto.
This is an on-site, hands-on role for someone who can design, implement, and proactively manage a highly secure, high-performance IT environment, while working closely with executive leadership to align technology with business goals.. Deploy and maintain virtualization infrastructure (VMware, Citrix) and containerized environments (Docker, Kubernetes).. Implement and oversee AWS cloud security , including IAM, VPCs, S3, and centralized logging.. Familiarity with infrastructure automation tools such as PowerShell, Bash, Terraform, or Ansible.. Familiarity with scripting/automation (e.g. PowerShell, Python, Terraform, Ansible).
The Information Security Engineer is a key member of the technology team that evaluates the firm’s technology and information systems to develop security strategies and solutions to protect the Firm from internal and external threats.. Build and administer core network and systems security controls, including: firewalls, intrusion detection and prevention, anti-malware, application whitelisting, host intrusion prevention, endpoint detection and response (EDR), privileged access management (PAM), privilege elevation, vulnerability scanners, content monitoring / filtering, security monitoring (SIEM), enterprise authentication and authorization.. Establish architectures and baseline configurations for various security technologies, including: anti-malware, endpoint detection and response (EDR), security monitoring, systems security, network security, identity and access management, public-key infrastructure (PKI), deception technologies, DLP and web/e-mail content filtering.. Serve as a member of the Computer Security Incident Response Team (CSIRT), assisting with incident response (IR) with the IR and security operations center (SOC) efforts.. Assist with threat and vulnerability management activities, including: triage of new vulnerabilities, root cause analysis, threat modeling and mitigation planning.
Configure, manage, and troubleshoot firewalls (Cisco, Palo Alto, Fortinet) and security devices (IPS/IDS, VPN).. Oversee daily data center operations (hardware, networking, storage) and overall IT infrastructure (network, servers, storage).. June 2025 Skills: Core Technical Expertise: Advanced Networking (Design, WAN/LAN/VLAN/VPN), Firewalls (Cisco, Palo Alto, Fortinet), Server Management (Windows/Linux), Virtualization (VMware/Hyper-V), Access Points (Cisco, Ubiquiti, Aruba), Database Management (SQL Server, MySQL, Oracle), High Availability/Uptime strategies.. IT Team Leadership, Cross-functional Collaboration, Excellent Communication (English essential, Chinese Mandarin a plus), Organizational & Time Management, Problem-Solving & Troubleshooting, Incident Management, Project Management, Documentation.. Cisco CCNA/CCNP, CompTIA Network+, CISSP, CEH.
Join a forward-thinking and rapidly growing organization committed to protecting digital assets and maintaining data integrity.. This role involves monitoring our networks for security breaches, investigating security incidents, and implementing protective measures to safeguard our information systems.. Stay updated on the latest cybersecurity trends and threat intelligence.. Develop and update disaster recovery and incident response plans.. Certifications like CISSP, CISM, CEH, CompTIA Security+, or similar are preferred.
As the Chief Information Security Officer (CISO) at Madrigal Pharmaceuticals you will be responsible for establishing and maintaining the enterprise vision, strategy, and program to ensure information assets and technologies are adequately protected.. Establish security requirements and vendor risk management processes for third-party services and cloud providers.. Strong background in incident response, threat intelligence, penetration testing, and vulnerability management.. Hands-on experience with security technologies (e.g., SIEM, firewalls, EDR, IDS/IPS, IAM, DLP).. Industry-recognized certifications preferred: CISSP, CISM, CISA, CRISC, CCISO, or equivalent.