Support vulnerability and threat assessment operations.. Monitoring and maintaining endpoint protection and response (EDR) and Security Orchestration, Automation and Response (SOAR) systems.. Monitoring and maintaining the Enterprise Vulnerability Management and Penetration Testing programs.. 3-7 years: Experience working with network security platforms such as Endpoint Protection, Threat Intelligence.. 3-7 years: Experience with administration of modern operating systems (e.g.- Windows Server, Windows Desktop and Linux).
You'll be the frontline of cyber defense - not watching from the sidelines, but actively commanding the response when every second counts working in tandem with the FBI. Lead threat monitoring activities to detect and analyze complex security incidents using SIEM tools, IDS/IPS, EDR, and other advanced security platforms.. Leverage threat intelligence sources to inform proactive threat hunting and incident analysis, maintaining awareness of evolving threat landscapes.. Work closely with SOC leadership, incident response teams, and threat intelligence analysts to strengthen the organization's overall security posture.. Advanced knowledge of encryption, vulnerability assessment, penetration testing, cyber forensics, intrusion detection, and incident response and remediation.
Key focus areas include defensive security platforms, cloud security, SOC operations, threat and vulnerability management, and security engineering. Lead daily operations of the Security Operations Center (SOC), including incident response and threat management, ensuring rapid detection and resolution of cybersecurity incidents. Oversee daily operations of core cybersecurity tools/platforms including but not limited to, SIEM, EDR, IDS/IPS, email security and cloud security solutions, and vulnerability scanners. Professional certifications such as CISSP, GCIH, GIAC, CISA, CEH, or equivalent are preferred. Strong technical expertise in cybersecurity tools, platforms and processes: SIEM, EDR, threat intelligence, vulnerability assessment, cloud platforms, and attack methodologies (IOCs, TTPs).
Faculty comprise a mix of disciplines, including information, computer science, economics, political science, law, sociology, design, media studies, and more. Our alumni have careers in diverse fields, such as data science, user experience design and research, product management, engineering, information policy, cybersecurity, and more. Maintaining Course Operations: Use the learning management system (LMS) and other educational technology tools to manage course websites, post assignments, and communicate with students effectively. Advancing Online Pedagogy: Engage in faculty development programs to stay current on the latest research, tools, and practices for effective online teaching. Special Topics: AI-Driven Threat Detection, Blockchain Security, Cloud Security, Critical Infrastructure Security, Cyber Threat Intelligence, Cyber Resilience, Incident Response, IoT Security, Post-Quantum Cryptography, Privacy-Preserving Machine Learning, Social Engineering, Zero Trust Security
Experience Must have six years of experience in an information systems security domain with a background in mobile device security, endpoint protection, wireless protection, vulnerability management, incident response and mitigation, threat research and cyber intelligence analysis or other cyber security domain.. Certification/Registration/Licensure Must have a current CompTIA Security+ Certification or equivalent in industry certification, background and knowledge within 6 months of placement into the position.. Direct experience with anti-virus software, intrusion detection, firewalls and content filtering Experience with hacker techniques and network security principles.. Collect threat intelligence and automate systems to consume threat feeds and track adversaries.. Examples of such tools are web filtering technology, IDS/IPS appliances, SIEM tools, anti-spam/antivirus systems, data leakage appliances, content screening servers, VPN systems and firewalls.
We are seeking a highly skilled Network Security Engineer to join our growing IT security team in London.. Proficiency in configuring and managing security technologies such as Cisco ASA, Palo Alto, Fortinet, or Check Point firewalls.. Hands-on experience in incident response, threat hunting, and forensic analysis.. Professional certifications such as CISSP, CISM, CEH, CCNP Security, or equivalent.. Experience with cloud security in AWS, Azure, or Google Cloud.
This position demands a deep understanding of company IT infrastructure principles, including roadmap development, security management, and capacity planning.. Minimum 5 years of progressive experience in Information Technology/Information Security, including network security configuration, management of firewall/VPN devices, any on-site/cyber security solutions setup/development/management Proven experience with firewall management (e.g., Palo Alto, Cisco ASA, Fortinet), IDS/IPS, VPNs, and other security technologies.. Experience with security information and event management (SIEM) systems (e.g., Splunk, QRadar).. Experience with cloud security (AWS, Azure/Microsoft Defender, Sentinel, Entra, GCP) is a strong plus.. Microsoft Certified: Azure Security Engineer Associate or Cybersecurity Architect Expert CISA, CISM or CISSP (or similar) certification.
Certifications such as Certified Information Security Manager (CISM), CompTIA CySA+, Cisco Certified Network Associate (CCNA), Certified Ethical Hacker (CEH), or equivalent.. Manage firewalls, VPNs, intrusion detection/prevention systems (IDS/IPS), and endpoint security solutions, including iPads, MacBooks, Chromebooks, and Windows PCs. Implement and maintain email security, anti-malware, and data loss prevention (DLP) policies.. Ensure secure configurations of Windows/Linux servers, Active Directory, O365, VoIP, and virtualization platforms.. Conduct penetration testing, vulnerability scanning, and patch management for all network devices and systems.. Travel within the tri-county region as well as across the state as needed.
Experience leveraging information security technologies such as antivirus, IDS/IPS, SIEM, endpoint detection & response, DLP, data encryption, proxies, and network access control as it relates to responding to cyber incidents.. Ability to provide technical expertise and support to clients, IT management and staff in cybersecurity threat risk assessments, development, testing and the implementation and operation of appropriate information security plans, procedures, and control techniques designed to prevent, minimize or quickly recover from cyber-attacks or other serious events.. Must demonstrate strong incident response and threat analysis experience, including leveraging SIEM technology.. Experience with key information security technologies such as SIEM, firewalls, intrusion detection/prevention systems, vulnerability assessment, encryption, identity and access control systems, anti-malware, and security event analysis. Experience working in a team environment, with experience teaching and learning from other team members.
This fully remote position requires strong project management expertise, an in-depth understanding of cybersecurity practices, and the ability to drive cross-functional teams toward the successful delivery of initiatives aligned with business and security objectives.. Experience with cloud security projects (AWS, Azure, GCP).. Fully remote work with flexible hours.. Familiarity with cybersecurity tools such as SIEM, IDS/IPS, endpoint protection, and vulnerability scanners.. Nice to have: Industry certifications such as CompTIA Security+, CISSP, CEH, or OSCP.
As the Chief Information Security Officer (CISO) at Madrigal Pharmaceuticals you will be responsible for establishing and maintaining the enterprise vision, strategy, and program to ensure information assets and technologies are adequately protected.. Establish security requirements and vendor risk management processes for third-party services and cloud providers.. Strong background in incident response, threat intelligence, penetration testing, and vulnerability management.. Hands-on experience with security technologies (e.g., SIEM, firewalls, EDR, IDS/IPS, IAM, DLP).. Industry-recognized certifications preferred: CISSP, CISM, CISA, CRISC, CCISO, or equivalent.
Develop and implement automated solutions for network provisioning, configuration management, and security enforcement using tools such as Terraform, Ansible, or Python.. Hands-on experience with technologies such as Cisco, Palo Alto, Fortinet, Zscaler, Cloudflare, and SD-WAN solutions.. Experience with security automation tools (e.g., Terraform, Ansible, PowerShell, Python).. Familiarity with frameworks such as MITRE ATT&CK, NIST CSF, Zero Trust, and architectural models (e.g., TOGAF, SABSA).. Relevant certifications such as: CISSP, CISSP-ISSAP, GIAC (GCPN, GCIA) Cisco CCNP/CCIE Security, Azure/AWS Security Specialty TOGAF, Certified Cloud Security Professional (CCSP) DevSecOps or cloud-native architecture certifications
We: Aretec, a leading provider of innovative technology solutions for federal agencies, specializing in cybersecurity, data analytics, and insider threat detection.. A minimum of 5 years of dedicated experience in cloud security architecture, with a focus on Zero Trust models.. Solid background in implementing and managing SSL/TLS, including hands-on experience with public key infrastructure (PKI).. Proficient in scripting and automation with languages such as Python or PowerShell.. This position requires the candidate to obtain and maintain an active DoD Top Secret/SCI clearance.
Leading the end-to-end security strategy for the company’s cellular network, ensuring compliance with Indonesian cybersecurity laws and telecom regulations.. Expertise in telecom network security architecture (5G, 4G, Core Network, NFV/SDN, Cloud).. Experience in penetration testing, ethical hacking, SOC management, and cyber intelligence.. Experience in Zero Trust Architecture, SIEM, SOAR, network forensics, and automated threat detection.. Strong knowledge of GSMA security guidelines, 3GPP security frameworks, and telecom fraud prevention.
Collaborates closely with enterprise architects to create and implement security standards within SGWS's Enterprise Architecture frameworks.. Design, enhance, and lead the implementation of scalable security architecture solutions encompassing:Cloud security controls, standards, and frameworks (AWS, Azure, GCP) Critical infrastructure, including endpoints, mobile devices, authentication and authorization, logging, and threat detection.. Application security (web application firewalls, secure coding practices)Data security (encryption, data loss prevention)Endpoint security (endpoint detection and response, antivirus)Identity and access management (IAM)Network security (firewalls, IDS/IPS, segmentation)Harden the security of Azure, GCP, AWS Identity as a Service (IaaS), and Platform as a Service (PaaS) infrastructure.. Experience with compliance regulations (HIPAA, PCI-DSS, GDPR)Experience conducting application vulnerability assessments.. SGWS complies with all federal, state and local laws concerning consideration of a qualified applicant's arrest and/or criminal conviction records.
Carpenter Technology Corporation is a leading producer and distributor of premium specialty alloys, including titanium alloys, nickel and cobalt based superalloys, stainless steels, alloy steels and tool steels.. Building on its history of innovation, Carpenter’s wrought and powder technology capabilities support a range of next-generation products and manufacturing techniques, including novel magnetic materials and additive manufacturing.. (Firewall, VPN, ACLs, Instruction Prevention, Malware Detection, Threat Intelligence, Micro-segmentation, etc.). Security certifications such as CISSP, CISA, CISM, CCSP, GCIH, GCIA, GSEC and CEH. Minimum 7 years of related experience with Access Management, Security Operations, Network Security, Vulnerability Management, Compliance, or Audit
Perimeter defense solutions such as IPS, IDS, Email Gateways (e.g.: Proofpoint, Mimecast, etc.). Privileged Access Management solutions (e.g.: CyberArk, Okta, etc) SIEM technologies (Cribl, Splunk Cloud/Enterprise, MS Sentinel, etc) Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job.. Bachelors' Degree in IT or Computer Science preferred 8+ years of related IT experience Ethernet, TCP/IP, DHCP, DNS, Active Directory, VOIP\ Knowledge of IPS/IDS and NAC technologies and their implementation Cisco wired technologies, including switches, and routers Cisco wireless technologies, including WLC, AP, AP Modes FlexConnect and CAPWAP Cisco ACI and Nexus for Data Center Palo Alto Panorama and Firewalls.. Advanced networking on Palo Alto firewalls Advanced knowledge of BGP Experience working with SolarWinds including IPAM and NMS modules F5 LTM load balancing.. Cisco CCNP / CCIE Cisco ACI Palo Alto PCNSE Salary Range - $98,060 to $151,008 Powered by JazzHR
Vulnerability Assessments: Conduct penetration testing and vulnerability scans to identify weaknesses, providing remediation strategies.. Automation & Tooling: Develop security automation for cloud environments (e.g., AWS), CI/CD workflows, and DevSecOps practices to enhance scalability.. Certifications: CISSP, CISM, or CompTIA Security+ preferred.. Programming: Scripting skills (Python, Bash) and familiarity with Infrastructure as Code (IaC) tools like Terraform.. Application Security: Secure coding practices, vulnerability management, and integration into DevOps pipelines.
Bachelor’s or Master’s degree in Cybersecurity, Computer Science, Information Security, or equivalent experience.. Strong understanding of network security, encryption, authentication, and access control.. Familiarity with cybersecurity tools such as SIEM, IDS/IPS, endpoint protection, and vulnerability scanners.. Hands-on experience with incident response, risk assessment, and forensic analysis is a plus.. Nice to have: Industry certifications such as CompTIA Security+, CISSP, CEH, or OSCP.
Use automation tools like Ansible, Puppet, or Chef to manage the network infrastructure.. Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) are also important as they can detect and prevent attacks by monitoring suspicious activities within the network.. Encryption and Cryptography : Knowledge of SSL (Secure Sockets Layer), Public Key Infrastructure (PKI), and other encryption techniques is vital.. SSL is used to enable secure connections over the internet, while PKI provides a framework for managing public keys and digital certificates necessary for secure communication and authentication.. Penetration Testing : Conducting penetration tests is crucial for identifying vulnerabilities in systems.