Cybersecurity & Network Management Jobs

Secure enterprise systems with these Cybersecurity & Network roles. Prevent breaches, protect data, and maintain robust IT infrastructures.

Data Loss Prevention (DLP) Engineera day ago
PaymentusCharlotte, NC

DLP systems can be both appliance-based and host-based with components for network monitoring, discovery scanning, and perimeter protection. Paymentus is seeking a Data Loss Prevention (DLP) Engineer with a foundational understanding of Privileged Access Management (PAM) and Identity and Access Management (IAM) to join our growing Cyber Security team. Provide assessment/audit support during internal or external security audits, including but not limited to PCI-DSS and SOC2 audits. Knowledge of PCI DSS, HIPAA, GDPR regulations. Current information security certifications such as CISM, CRISC, or CISSP.

Senior Cybersecurity Engineera day ago
Moseley Technical ServicesHuntsville, AL

Industry-recognized professional certifications such as CISSP, CASP+, GCIH, GCFA, GNFA, GREM. Extensive expertise in SOC operations, incident response, threat hunting, and vulnerability management required. Experience in an incident response, forensics, threat hunting, or incident investigation role in large-scale environments. Experience with industry security tooling in SIEM/SOAR platforms (Fortinet, AT&T AlienVault, Avanan, Preveil, Bricata, Elastic is a plus). Ability to tune correlation rules and outcomes via security information and event management (SIEM) and security orchestration, automation, and response (SOAR) platforms.

Cyber Security Engineera day ago
Top Secret Clearance JobsAustin, TX

The Opportunity CACI is seeking a skilled Cyber Security Engineer to support the design, implementation, and maintenance of secure systems and networks.. Proficient in security toolsets, such as vulnerability assessment tools (e.g., Nessus, Qualys), intrusion detection systems, and SIEM platforms.. Advanced certifications, such as CISSP, CEH, or Certified Cloud Security Professional (CCSP).. Knowledge of Infrastructure as Code (IaC) tools, such as Terraform or Ansible, for secure infrastructure management.. Hands-on experience with threat intelligence platforms and cyber threat hunting.

Network Security Engineer2 days ago
Cyber UKPalo Alto, CA

We are seeking a highly skilled Network Security Engineer to join our growing IT security team in London.. Proficiency in configuring and managing security technologies such as Cisco ASA, Palo Alto, Fortinet, or Check Point firewalls.. Hands-on experience in incident response, threat hunting, and forensic analysis.. Professional certifications such as CISSP, CISM, CEH, CCNP Security, or equivalent.. Experience with cloud security in AWS, Azure, or Google Cloud.

Cyber Security Engineer SMEa day ago
Govcio LLCAlbany, NY

GovCIO is currently hiring for a Cyber Security Engineer SME. This position will be located in Rome, NY and will be an onsite position. Hands-on experience with cybersecurity tools and technologies, including intrusion detection systems, firewalls, encryption, secure coding practices, and vulnerability management solutions.. Proficiency in conducting threat modeling, penetration testing, and incident response planning.. Advanced cybersecurity certifications such as CISSP, CISM, CEH, or equivalent. Experience in cyber threat intelligence and integrating cybersecurity solutions into ISR or other mission-critical systems.

Sr. Incident Response Engineer20 hours ago
Baylor Scott & White HealthBoston, MA

The Sr. Incident Response Engineer will take on the lead cyber security incident responder role on the Baylor Scott & White Health cyber defense team.. Partner with cyber threat intelligence, the vulnerability management team, and technology remediation groups to deliver shared outcomes that measurably improve our efficacy to detect, respond to, and remediate vulnerabilities. Experience with Intrusion Detection and Prevention Systems (IDS/IPS), Firewall and Network Log analysis, Security Information and Event Management (SEIM) tools, threat intelligence services, and malware analysis. Certified Information Security Manager (CISM) certification. FOR508: Advanced Incident Response, Threat Hunting, and Digital Forensics

Lead Cybersecurity Analyst2 days ago
Alliant EnergyMadison, WI

+ Onboard data, configure integrations, and setup security alerting for the security information and event management (SIEM) solution, which includes parsing and analyzing large, complex data sets and integrating into the security case management system.. + Leverage knowledge in multiple security disciplines, such as Windows, Unix, Linux, data loss prevention (DLP), endpoint controls, databases, wireless security, and data networking, to offer global solutions for a complex heterogeneous environment.. + Certification Relevant information security certifications (e.g., CISSP, CISA, CISM, CRISC, or GIAC) or the ability to gain a certification within 6 months of hire.. These include PCI, FISMA, GLBA, FERPA, NERC CIP, HIPAA, or SOX.. Access Control Management Application Security Cloud Networking Cybersecurity Risk Management DevSecOps Identity and Access Management (IAM) Incident Management Incident Response Information Security Management IT Risk Management Intrusion Detection IT Security Management Network Penetration Testing Network Security Management Security Architecture Design Security Governance Threat Modeling Vulnerability Management

Lecturer - Information And Cybersecurity - School of Informationa day ago
University of California BerkeleyBerkeley, CA

Faculty comprise a mix of disciplines, including information, computer science, economics, political science, law, sociology, design, media studies, and more.. Our alumni have careers in diverse fields, such as data science, user experience design and research, product management, engineering, information policy, cybersecurity, and more.. Maintaining Course Operations: Use the learning management system (LMS) and other educational technology tools to manage course websites, post assignments, and communicate with students effectively.. Advancing Online Pedagogy: Engage in faculty development programs to stay current on the latest research, tools, and practices for effective online teaching.. Special Topics: AI-Driven Threat Detection, Blockchain Security, Cloud Security, Critical Infrastructure Security, Cyber Threat Intelligence, Cyber Resilience, Incident Response, IoT Security, Post-Quantum Cryptography, Privacy-Preserving Machine Learning, Social Engineering, Zero Trust Security

Cyber Security Engineer I, II, III Or Senior2 days ago
Tri - State Generation And Transmission Association, IncDenver, CO

Provision, tune, maintain, monitor, and troubleshoot network security equipment including but not limited to network firewalls, Security Information and Event Management (SIEM), intrusion detection/prevention systems, various computer network defense (CND) tools, and network access control software.. Configure, implement, and maintain identity and access management (IAM) tools including Active Directory services, single sign-on (SSO), multifactor authentication (MFA), privileged access management (PAM), and certificate services.. Experience in security technologies (firewall, antivirus, intrusion detection/prevention, security information event monitoring, vulnerability scanning, data loss prevention, encryption, PKI, Identify Access Management, Rights Management Services, etc. Experience in Sarbanes-Oxley (SOX) and North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) compliance.. Tri-State's electricity is generated from coal, natural gas and hydropower, with a rapidly increasing supply generated from wind and solar.

Senior Vulnerability Assessment Analyst17 hours ago
Ntt DataFairfax, VA

All of the duties listed support one or more of the following cybersecurity related functions; information security, SPAA, incident response, cyber security, insider threat, computer forensics, vulnerability assessment and management, network data capture, intrusion detection, log management, auditing, security incident and event management (SIEM), and penetration testing. Minimum 10 years of documented work experience performing any combination of or more years of experience in blue or red team, vulnerability analysis and risk management, information system security, computer forensics, or insider threat. Examples of tools include SourceFire, Arcsight, Splunk, NetWitness, Guidance Software, Digital Guardian, SureView, Intelliview, Nessus, and Foundstone. Experience using one or more of the following security tools: SourceFire, Arcsight, Splunk, NetWitness, Guidance Software, Digital Guardian, SureView, Intelliview, Nessus, and Foundstone. Master's degree in computer science, information systems analysis, science/technology, information management, computer engineering, or electrical/electronic engineering.

Sr Cybersecurity Engineera day ago
GM FinancialArlington, TX

Said technologies may include, but are not limited to: Data Loss Prevention (DLP), Security Incident Event Management (SIEM), User Behavior Analytics, Host Intrusion Prevention (HIPS) and Web/Email Gateway.. Engineer, design, install and support security technologies such as Data Loss Prevention (DLP), Host Intrusion Prevention (HIPS), Security Incident and Event Managers (SIEM), Endpoint Security, Vulnerability Management (VM), Email user and entity behavior analytics, Certificate Management, SSL encryption and decryption, Identity Management, Cloud Security, Database Security, Web Gateways. Using information from threat intelligence feeds, incident response and SIEM analysis, identifies and deploys custom rules and policies to security technologies to further protect information assets. Experience securing cloud deployments on common platforms like Microsoft Azure, Amazon Web Services, or Google Cloud Platform. One or more security related certifications, such as CISSP, CCNP-Security, GIAC, CEH, CPTS, is highly preferred

Cybersecurity Engineera day ago
Barry - Wehmiller Companies IncDallas, TX

BW Design Group is a fully integrated architecture, engineering, construction, system integration, and consulting firm committed to helping our clients realize their most critical goals from Strategy to Commercialization.. Risk Assessment & Threat Analysis: Conduct thorough risk assessments, vulnerability assessments, and threat analyses on OT systems, including SCADA, DCS, and PLCs, to proactively identify and mitigate cybersecurity risks.. System Hardening & Patch Management: Develop and enforce policies and procedures for system hardening, patching, and vulnerability management tailored to OT environments.. Technical Skills: Proficiency in industrial control systems (ICS) and SCADA, DCS, and PLC technologies.. Experience with network security, firewalls, intrusion detection, and prevention systems specific to OT. Strong understanding of SIEM, threat intelligence platforms, and incident response procedures in OT environments.

Cyber Security Operations Leada day ago
Ball CorporationWestminster, CO

Responsible for a broad range of security tasks, including the day-to-day security administration of network security devices, as well as the management of technologies, such as firewall, intrusion detection, intrusion prevention, data loss prevention, antivirus, anti-spam, antispyware, and security information and event management (SIEM) tools.. Develop and maintain incident response plans, disaster recovery plans, and business continuity strategies to ensure resilience in the face of cybersecurity threats.. Industry-recognized certifications such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or Certified Information Systems Auditor (CISA). Hybrid On-Site Work Environment: Based in Colorado, this position requires regular in-person engagement by working on-site for three (3) or more days per work week (with core collaboration days of Tuesday, Wednesday and Thursday).. Hiring Salary Range: $ 93,100 -142,140 (Salary to be determined by the applicants education, experience, knowledge, skills, and abilities, as well as internal equity and alignment with market data.)

IT SPECIALIST - SR. IT SPECIALIST - Cybersecurity10 hours ago
Southwest Research InstituteSan Antonio, TX

Support vulnerability and threat assessment operations.. Monitoring and maintaining endpoint protection and response (EDR) and Security Orchestration, Automation and Response (SOAR) systems.. Monitoring and maintaining the Enterprise Vulnerability Management and Penetration Testing programs.. 3-7 years: Experience working with network security platforms such as Endpoint Protection, Threat Intelligence.. 3-7 years: Experience with administration of modern operating systems (e.g.- Windows Server, Windows Desktop and Linux).

Senior Security ArchitectMar 26
IFlow IncWilmington, DE

Lead/conduct vulnerability assessments, penetration testing, and red/purple teaming exercises.. Design and implement robust Identity and Access Management (IAM) and Role-Based Access Control (RBAC) models.. Experience in Implement data security measures, including data loss prevention (DLP) and encryption.. SME in Deploy and manage SIEM and SOAR platforms (Sentinel, Falcon FDR, Demisto).. SME Utilize EDR and XDR solutions (CrowdStrike, Defender) for endpoint protection.

Senior Cybersecurity Engineer (Data Protection)14 hours ago
AmentumAlbany, NY

This is a fully remote and hands-on role, responsible for ensuring Amentum assets are protected from cyber threats.. This role provides technical expertise in multiple areas of cybersecurity to include Data Loss Prevention (DLP), Messaging, Cloud Security, Endpoint Security and Incident Response.. Cover all aspects of Data Protection, especially Data Loss Prevention (DLP).. Solid understanding of system and network security technologies and related concepts, e.g. boundary protection, network segmentation, firewalls, endpoint security, threat hunting, data protection.. Experience with Proofpoint preferred.

Systems Engineer, Large Enterprise3 hours ago
FortinetHartford, CT

We are looking for a Systems Engineer to work closely with a Named Account Manager in a defined territory.. The Systems Engineer's main mission will be to support the sales organization in all technical matters regarding pre-sales, sales calls, and post-sales.. Responsibilities: Pre-sales - assist in qualifying sales leads from a technical standpoint.. Required Skills: 5 – 8 years experience in technical/pre-sales support as a sales or systems engineer 5 - 7 years experience in LAN/WAN/Internet services administration Knowledge of the following technologies: Routing, Switching, VPN, LAN, WAN, Network Security, Intrusion Detection, and Anti Virus.. Strong understanding in the following technologies and protocols: RADIUS, PKI, IKE, Certificates, L2TP, IPSEC, FIREWALL, 802.1Q, MD5, SSH, SSL, SHA1, DES, 3DES Experience with encryption and authentication technologies required Strong presentation skills Education: Bachelors Degree or equivalent experience.

Sr. Cloud Cyber Security Engineer3 hours ago
SentaraVirginia Beach, VA

City/StateVirginia Beach, VAOverviewWork ShiftFirst (Days) (United States of America)Sentara Healthcare is seeking to hire a qualified individual to join our team as a Senior Cloud Cyber Security Engineer.. Minimum Requirements: Proven experience (5 years) in cloud security roles, with a strong understanding of cloud platforms and services (AWS, Azure, or GCP).. Experience with cloud security assessment tools, vulnerability scanning, and penetration testing techniques.. Cloud security controls: Identity and Access Management (IAM), Encryption, Network Security, Compliance, Logging and Monitoring, Vulnerability Management, Disaster Recovery and Business Continuity, Cloud Access Security Broker (CASB), and Multi-Factor Authentication (MFA).. Knowledge of various technical frameworks and concepts (MITRE ATT&CK, CIS, Kill Chain, etc)Experience working in a highly regulated environment.

Information Systems Security Engineer2 hours ago
Abacus TechnologiesHoover, AL

Security Solutions & Architecture: Design, implement, and manage security solutions, including firewalls, intrusion detection systems, endpoint protection, and cloud security.. Threat Management & Incident Response: Conduct risk assessments, identify vulnerabilities, and respond to security incidents with root cause analysis and remediation.. Strong knowledge of network security, encryption, security protocols, and cloud security (AWS, Azure, Google Cloud).. Experience with security tools (SIEM, firewalls, IDS/IPS, endpoint protection) and scripting languages (Python, PowerShell, Bash).. Relevant certifications such as CISSP, CISM, CEH, or CompTIA Security+ preferred.

Cyber Security Specialist3 hours ago
Strategic Data Systems (SDS)Bridgeport, CA

Design and implement data network security measures; operate Network Intrusion Detection and Forensics.. Supervise operation of Electronic Key Management System and Public Key Infrastructure (PKI).. Operate Host Based Security System (HBSS), firewalls, Intrusion Prevention Systems, Intrusion Detection Systems, Virtual Private Networks and related security operations.. Evaluate communication hardware and software for efficiency and DOD compliance.. Perform LAN / BAN / WAN administration and test complex large‐scale computer integrated networks.