Cybersecurity & Network Management Jobs
Secure enterprise systems with these Cybersecurity & Network roles. Prevent breaches, protect data, and maintain robust IT infrastructures.
Join a forward-thinking biotechnology company dedicated to revolutionizing cancer research and therapy with AI-powered drug discovery.. Their platform combines high-throughput screening with cutting-edge machine learning and computational biology to expedite the creation of life-saving treatments.. Cloud Security & Infrastructure Protection Secure AWS environments, including IAM, VPCs, S3, EC2, Lambda, and Kubernetes.. Security Automation & DevSecOps Integrate security measures into CI/CD pipelines to uphold infrastructure-as-code (IaC) security best practices.. Expertise in DevSecOps practices and infrastructure-as-code security (Terraform, CloudFormation, Ansible, or Pulumi).
The Security Architect must have hands-on experience with internet secure gateway, EDR, MDR, ITDR, secure email gateway, firewalls, MFA, scripting, policies, data classification, and cloud security controls.. Provide security guidance for third-party risk management and vendor security evaluations.. Strong knowledge of DevSecOps, security automation, and scripting (Python, PowerShell, Terraform).. Okta, Microsoft Authenticator (MFA), Active Directory (AD), IAM. Strong knowledge of threat intelligence, SIEM, vulnerability management, and incident response.
Work with IT infrastructure team to evaluate, implement and enhance the network perimeter security, endpoint security, SIEM, secured remote access, MFA, Identity Access Management and Privileged Access Management.. IT Security Management of various aspects, e.g. network security, server security, application security, end point security, email security, physical access security, logical access security, etc.. Good working knowledge of security risk management, security governance framework and compliance (IT Security Audit / log review), technical vulnerability management (vulnerability assessment, penetration testing), application security, security technologies), security incident response and security assessment.. Data Loss Prevention (e.g., Symantec, ForcePoint, Digital Guardian). It will be advantageous to have at least one of these certifications: CISA, CISSP, or CISM.
Cloud & PKI Focus: Expertise in cloud security (AWS or Azure) and extensive experience with PKI infrastructure, certificate lifecycle management, and key management are essential.. Aviation Security Contribution: Will contribute to critical F ircraft network security program duties, including securing communication between aircraft and ground systems, collaborating with OEMs, and ensuring the security and integrity of underlying Windows and Linux server infrastructure.. Enterprise-grade Firewalls: (e.g., Cisco Firepower, Palo Alto Networks, Fortinet). Endpoint Detection and Response (EDR): (e.g., CrowdStrike Falcon, Microsoft Defender for Endpoint). Vulnerability Scanning: (e.g., Tenable Nessus, Tanium Comply)
The Director will work closely with cross-functional teams to align technology solutions with business objectives and drive continuous improvement across the IT landscape.. Lead efforts and conduct regular vulnerability assessments, penetration testing, and security audits.. Knowledge and experience with endpoint protection, identity management, and access control protocols. Skills in using security information and event management (SIEM) systems.. Preferred Security Certifications: CISSP/ CISM/ CISA etc
Develop secure identity and access management (IAM) strategies, implementing Public Key Infrastructure (PKI), Identity, Credential, and Access Management (ICAM), Attribute-Based Access Control (ABAC), and Role-Based Access Control (RBAC).. Conduct advanced threat analysis, risk assessments, and vulnerability management, applying proactive security measures to mitigate potential cyber threats and ensure mission-critical system resilience.. Advanced networking certifications beyond CCNP ENSLD, such as CCIE Security, AWS Advanced Networking, or GIAC Certified Enterprise Defender (GCED).. Expert-level proficiency in cross-domain security solutions, including Tactical CDS, Multi-Level Security (MLS), and Guard-based architectures.. Strong background in developing cybersecurity roadmaps, performing gap analyses, and implementing long-term strategic security initiatives.
Zachary Piper Solutions is currently seeking a SOC Analyst to join our Cyber Threat Fusion Center (CFTC) team in Lanham, MD. This is an ON-SITE position critical in safeguarding our network and assets, ensuring robust security measures and procedures are maintained.. This SOC Analyst will play a pivotal role in incident response, threat hunting, and security analysis within a high-stakes environment protecting substantial assets for the IRS.. Utilize a deep understanding of endpoint analysis, leveraging tools and knowledge in PowerShell, and cloud security tools (e.g., Defender, AWS Security tools) to strengthen our security posture.. Demonstrate proficiency in writing and understanding Snort (or Defender) rules, with a strong capability in utilizing SIEM tools, specifically Splunk, for detailed incident analysis and resolution.. Ability to obtain an IRS Public Trust clearance.
Experience with enterprise risk management, disaster recovery, and incident response.. Lead efforts to achieve and maintain compliance with relevant regulations and standards (e.g., NIST, PCI-DSS, GDPR, etc. Familiarity with security governance frameworks (e.g., NIST, ISO, PCI-DSS).. Cybersecurity frameworks and regulations (NIST, PCI-DSS, CIS, GDPR, HIPAA, and other relevant standards).. Implement API security measures, including OAuth, OpenID Connect, and API gateway security policies to protect against unauthorized access and data exposure.
Security Solutions & Architecture: Design, implement, and manage security solutions, including firewalls, intrusion detection systems, endpoint protection, and cloud security.. Threat Management & Incident Response: Conduct risk assessments, identify vulnerabilities, and respond to security incidents with root cause analysis and remediation.. Strong knowledge of network security, encryption, security protocols, and cloud security (AWS, Azure, Google Cloud).. Experience with security tools (SIEM, firewalls, IDS/IPS, endpoint protection) and scripting (Python, PowerShell, Bash).. Relevant certifications such as CISSP, CISM, CEH, or CompTIA Security+.
Perform vulnerability assessments, penetration testing, and security audits to identify and address potential threats to information systems.. Expertise in vulnerability assessment tools (e.g., Nessus, Qualys) and penetration testing.. Familiarity with cloud security principles (AWS, Azure, GCP) and securing cloud-based infrastructures.. Proficiency with security tools such as SIEM (Security Information and Event Management), IDS/IPS, and endpoint protection systems.. Certifications such as CISSP, CISM, CISA, or other recognized information security certifications.
The ideal candidate will have a strong understanding of banking security frameworks, fraud prevention, and regulatory compliance (e.g., FFIEC, PCI-DSS, GLBA).. Ensure adherence to financial industry regulations, including FFIEC, GLBA, PCI-DSS, SOX, and GDPR.. Strong knowledge of banking security regulations, fraud prevention, and compliance standards (FFIEC, GLBA, PCI-DSS).. Hands-on experience with penetration testing, vulnerability management, and incident response.. Certifications preferred: CISSP, CISM, CEH, GIAC, Security+.
Configure, manage, and optimize firewall rules and security policies across multiple vendors (e.g., Palo Alto, Fortinet, Cisco, Check Point, Aryaka).. Deploy and manage Next-Generation Firewalls (NGFWs) with deep packet inspection (DPI), threat intelligence feeds, and advanced rule configurations.. Experience managing and securing multi-location networks using vendors such as Cisco, Meraki, Ubiquiti, or Fortinet.. Working knowledge of SD-WAN technologies (e.g., Cato, Zscaler, Aryaka, Fortinet, Cisco Viptela) with a security-first approach.. Experience with identity and access management (IAM) solutions, such as Okta, Azure AD, and Cisco ISE.
Implement and manage security technologies including firewalls, intrusion detection/prevention systems (IDS/IPS), endpoint protection, and security information and event management (SIEM) tools.. Conduct vulnerability assessments, penetration testing, and regular security audits to identify risks and develop mitigation strategies.. Experience with vulnerability management tools (Nessus, OpenVAS, Qualys) and penetration testing tools (Kali Linux, Metasploit).. Familiarity with cloud security best practices for AWS, Azure, or GCP environments.. Industry certifications such as CISSP, CISM, CEH, or OSCP.
Implement cloud security controls such as IAM and encryption.. Certifications: Possession of industry-recognized certifications such as Security +, Cysa+ , GMON, GSEC, CISSP, CISM, CEH, GIAC, CCSP, or similar are required.. Proficiency in tools and technologies used in cyber security operations such as EDR, XDR, SIEM, SOAR, etc.. Experience with cloud security, particularly in environments like AWS, Azure, or Google Cloud.. Comprehensive knowledge of malware analysis, threat modeling, and vulnerability management.
Essential functions Incident Response Specialist III is a highly skilled and experienced security professional with a deep understanding of incident response methodologies, security technologies, and threat intelligence.. Analyze threat intelligence to identify potential risks to the organization.. GIAC Certified Incident Handler (GCIH) or equivalent.. GIAC Certified Forensic Analyst (GCFA) or equivalent.. Job Type: Full-time Benefits: Full Benefits Package Clearance: TS\SCI Work Location: Miami, FL Company Overview: Athena Technology Group, Inc. (ATG) is a Service-Disabled Veteran Owned Small Business (SDVOSB) focused on Information Technology and Communications consulting, system engineering, integration, deployment and operation of state-of-the-art command and control and information systems that deliver critical network centric solution to the warfighter.
Zachary Piper Solutions is seeking a PKI Cyber Consultant to join a long-term DOD program located in Ft Meade, Maryland.. The PKI Cyber Consultant will help the government better understand PKI policies and how to configure an environment using specific policies and directives.. Responsibilities for the PKI Cyber Consultant include:Provide PKI expertise to help the infrastructure including the cloud, network boundaries, cross domains, and endpoint technologies.. Brief senior leadership on defensive strategies, threat analysis, and enterprise-wide PKI policies.. IAT II Certification such as Sec+ or CySa+Active Top Secret Clearance with SCI eligibility Compensation for the PKI Cyber Consultant include:Compensation: $
Director – CybersecurityLocation: Charlotte, NCMajor Duties & ResponsibilitiesThe Director, Cybersecurity leads Company’s cybersecurity program in order to protect the organization's critical IT and OT systems and assets using the CIS Controls and NERC CIP cybersecurity frameworks and practices.. Provide technical cybersecurity support to the NERC CIP program staff to facilitate identification of efficient solutions to meet compliance obligations.. ‒ Security risk assessments‒ Active Directory‒ Data Loss Prevention‒ Identity and access management approaches (e.g., Azure Active Directory, OKTA MFA, SSO)‒ Office 365 security concepts, policies, settings, and practices‒ Email security through Mimecast.. Experience understanding and implementing regulatory requirements and industry standards related to IT and OT security, such as NERC CIP, the NIST cybersecurity and CIS Controls frameworks, SOC1/2, PCI, HIPAA, CCPA/GDPR or related security frameworks.. ‒ Support for power generation control systems‒ KACE patching platforms‒ Malwarebytes EDR/MDR platforms‒ SumoLogic SIEM‒ NERC CIP program support‒ Ethical hacking‒ Disaster recovery training and experience‒ Scripting and source code programming languages that the cybersecurity team will be using.
Chief Information Security Officer (CISO). As the Chief Information Security Officer (CISO) at Madrigal Pharmaceuticals you will be responsible for establishing and maintaining the enterprise vision, strategy, and program to ensure information assets and technologies are adequately protected.. Strong background in incident response, threat intelligence, penetration testing, and vulnerability management.. Hands-on experience with security technologies (e.g., SIEM, firewalls, EDR, IDS/IPS, IAM, DLP).. Industry-recognized certifications preferred: CISSP, CISM, CISA, CRISC, CCISO, or equivalent.
Experience leveraging information security technologies such as antivirus, IDS/IPS, SIEM, endpoint detection & response, DLP, data encryption, proxies, and network access control as it relates to responding to cyber incidents.. Ability to provide technical expertise and support to clients, IT management and staff in cybersecurity threat risk assessments, development, testing and the implementation and operation of appropriate information security plans, procedures, and control techniques designed to prevent, minimize or quickly recover from cyber-attacks or other serious events.. Must demonstrate strong incident response and threat analysis experience, including leveraging SIEM technology.. Experience with key information security technologies such as SIEM, firewalls, intrusion detection/prevention systems, vulnerability assessment, encryption, identity and access control systems, anti-malware, and security event analysis. Experience working in a team environment, with experience teaching and learning from other team members.
Security Solutions & Architecture: Design, implement, and manage security solutions, including firewalls, intrusion detection systems, endpoint protection, and cloud security.. Threat Management & Incident Response: Conduct risk assessments, identify vulnerabilities, and respond to security incidents with root cause analysis and remediation.. Strong knowledge of network security, encryption, security protocols, and cloud security (AWS, Azure, Google Cloud).. Experience with security tools (SIEM, firewalls, IDS/IPS, endpoint protection) and scripting languages (Python, PowerShell, Bash).. Relevant certifications such as CISSP, CISM, CEH, or CompTIA Security+ preferred.