Collaborate with cloud security and DevSecOps teams to integrate encryption and key management into CI/CD pipelines and Infrastructure as Code (IaC) deployments.. Stay ahead of advancements in cryptographic algorithms, quantum computing risks, and emerging IoT security frameworks.. Drive innovation in encryption automation, integrating key management with DevSecOps, and Infrastructure as Code (IaC).. Hands-on Experience with key management systems (HashiCorp Vault, ASW KMS, Azure Key Vault, OCI KMS).. Experience with Kubernetes, Terraform, Ansible, Chef, and CI/CD automation.
Our work depends on Software Developer joining our team to support DoD Red Team’s assessments support external customers and target sites, not DTRA. These projects support critical defense capabilities managed by multiple DoD and/or US Government customers. Senior DoD stakeholders such as the Joint Chiefs of Staff, Combatant Commanders, the DoD Chief Information Officer, Undersecretary of Defense for Intelligence, and other DoD Component Heads provide direct guidance on the projects the DoD Red Team supports. Required Technical Skills: Offensive Security Experienced Pentester (OSEP), Advanced Windows Exploitation (OSEE), Exploit Researcher and Advanced Penetration Tester (GXPN), Reverse Engineering Malware (GREM).. In addition, desired skills/certifications are: Host-based computer forensics, network-based forensics, cyber incident response, cyber-criminal investigation, intrusion detection/analysis, designing countermeasures and mitigations against potential exploitations of programming language weaknesses and vulnerabilities, cyber red teaming, network penetration testing, security operations center analysis, defensive cyber operations, or offensive cyber operations. Scheduled Weekly Hours: 40 Travel Required: Less than 10% Telecommuting Options: Hybrid Work Location: USA VA Fort Belvoir Additional Work Locations: Total Rewards at GDIT: Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match.
The mission of the penetration testing team is to protect Fidelity's assets and our customers' livelihoods from the threat of exploitation by malicious adversaries. Preferred: OSCP, GWAPT, GXPN, GPEN, LPT, CEH, CISSP or other industry security certifications. Demonstrated experience with common penetration testing and vulnerability assessment tools such as nmap, Wireshark, Nessus, NeXpose, BackTrack, Metasploit, AppScan, WebInspect, Burp Suite Professional, Acunetix, Arachni, w3af, NTOSpider.. The Penetration Testing team forms part of Security Assessment group within Enterprise Cybersecurity (ECS). Please be advised that Fidelity's business is governed by the provisions of the Securities Exchange Act of 1934, the Investment Advisers Act of 1940, the Investment Company Act of 1940, ERISA, numerous state laws governing securities, investment and retirement-related financial activities and the rules and regulations of numerous self-regulatory organizations, including FINRA, among others.
Business Title: Director, Senior Cloud Security Architect.. KPMG is currently seeking a Director, Senior Cloud Security Architect to join our Global Information Solution Group which is part of KPMG International. Minimum ten years of recent experience such as security architecture, threat modelling experience, identity management and authentication, software development, cryptography, penetration testing, cloud security, mobile security, and network security.. Certifications such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Azure Cybersecurity Expert, or equivalent are highly desirable.. In-depth understanding of cloud security principles, best practices, and industry frameworks such as Cloud Security Alliance (CSA), Center for Internet Security (CIS), National Institute of Standards and Technology (NIST), and International Organization for Standardization (ISO)
Partner Solutions Engineers work closely with our partners to educate, empower, and ensure their success delivering Cloudflare security, reliability and performance solutions. Networking technologies including TCP, UDP, DNS, IPv4 + IPv6, BGP routing, GRE, SD-WAN, MPLS, Global Traffic Management.. Internet security technologies including DDoS and DDoS mitigation, Firewalls, TLS, VPN, DLP. Detailed understanding of workflow from user to application including hybrid architectures with Azure, AWS, GCP. Athenian Project: In 2017, we created the Athenian Project to ensure that state and local governments have the highest level of protection and reliability for free, so that their constituents have access to election information and voter registration.
We offer unlimited PTO, a flexible remote work policy, and a supportive environment that prioritizes sustainable, long-term performance. Lead security assessments, penetration testing, and vulnerability management for AI systems to proactively mitigate risks. Strong experience in penetration testing, vulnerability assessments, and security incident response. Hands-on experience with cloud security practices, especially within Microsoft Azure, including identity management, access controls, and secure networking configurations. Certifications such as CISSP, CEH, CompTIA Security+, or relevant Microsoft Azure security certifications.
Join to apply for the Associate Principal/Digital Forensics, Incident Response & Cybersecurity (Forensic Services practice) role at Charles River Associates. Leading security and privacy investigations for CRA clients, in preparation of, and in response to, data security matters, which may include ongoing theft of trade secret investigations, cyber breach detection, threat analysis, incident response and malware analysis;. Experience in a hands-on technical role functioning as a testifying expert, digital forensic examiner, incident responder, network forensic analyst or malware analyst;.
This full-time role reports directly to the executive leadership responsible for information and cyber risk, and it plays a lead role in implementing and maintaining security strategies that support both business continuity and regulatory compliance. Solid understanding of SIEM, IDS/IPS, endpoint protection, IAM, DLP, and modern threat intel tools.. Deep knowledge of network and host-based intrusion detection, VPNs, PKI, EDR, and compliance configuration standards.. CISSP, CISM, or advanced SANS certifications (e.g., GSE).. 40% Security Infrastructure Engineering (SIEM, IAM, VPN, Endpoint Security)
We are on the hunt for a VP of Product Marketing with rich expertise in cybersecurity - specifically with a background in malware analysis and threat intelligence, and/or Application Security (AppSec) and software development lifecycle (SDLC), particularly in AST, SCA, or SAST. Implement and manage cross-functional processes supporting messaging and campaign strategy development and new product introduction engagement, including sales enablement and sales support.. Develop and curate strong and pointed messaging, campaign, and sales enablement assets including presentations, videos, demos, solution maps, white papers, data sheets for learning purposes.. Work closely with Demand Generation, Field Marketing, Channel Marketing, Sales Enablement, Sales, and RL executives. 15+ years of experience in product marketing and related marketing functions in the cybersecurity industry, preferably within the software supply chain security or threat intelligence space.
Join to apply for the Managing Director, Cyber Risk role at Kroll.. Direct digital forensics, threat intelligence gathering, root cause analysis, and remediation planning. 12+ years of experience in cybersecurity, including at least 7 years in incident response or digital forensics. Deep expertise in cyberattack lifecycle, threat actor TTPs, and security frameworks (e.g., NIST, MITRE ATT&CK). Relevant certifications such as CISSP, CISM, GCFA, GCIH, or CISA are preferred.
Stays abreast of competitive landscape and emerging technologies to best position Comcast Business Services in the marketplace.. Develops sales territory, including cultivation of local partnerships and organizational affiliations.. Demonstrates some knowledge of Network Design, MAN technologies & designs including DSx, OC-x, WDM, Ethernet, Internet Technologies, Functionality & Services, Voice Network Technologies (including VoIP), Data Networking Technologies, Functionality & Services (LAN, MAN, WAN, VPN), Networking Protocols (with an emphasis on Layers 1,2, & 3), Customer Premise Equipment (voice & data), Business Continuity/Disaster Recovery concepts and E-rate Contracting Processes and Procedures.. Product Positioning; Direct Selling; Prospecting; Business Sales; Lead Generation; Cold Calling. Most sales positions are eligible for a Commission under the terms of an applicable plan, while most non-sales positions are eligible for a Bonus.
Network Engineer (Hybrid) Clearance Requirement: Active Secret Clearance or higher. Maintain day-to-day network operations and perform disaster recovery and data backup procedures as needed.. 6+ years of experience with Juniper and Palo Alto firewalls.. Basic scripting experience (e.g., Python, Ansible, TCL, Bash).. Juniper or Palo Alto certifications.
Design and implement systems including CCTV, access control, intrusion detection, and biometrics. Lead zoning layouts, mantrap flows, visitor access, and badging protocols. Ensure high resiliency with dual-path communications, UPS backups, and penetration testing programs. Security ecosystems like Genetec, LenelS2, Honeywell, or Avigilon.. Remote-first culture with access to WeWork spaces
We are seeking a Senior Security Engineer to join our team, focusing on defining security workflows and incident response (IR) strategies.. Define and refine security workflows and incident response strategies.. Experience with Security Orchestration, Automation, and Response (SOAR) platforms.. Ideal but not required: Cloud security experience.. You'll have the opportunity to work on the bleeding edge of technology and drive true innovations, all while collaborating closely with industry veterans who are dedicated to defend the market from the new wave of AI-driven attacks.
Also, should have knowledge of 3rd Party security assessments and applicability of SOC1 and SOC2 reports and concepts of vendor risk management.. Application Security - Experience with the design of security controls for multi-tier business solutions including the design of application-level access and entitlement management, data tenancy and isolation, encryption, and logging.. Cloud Security –Technical understanding of virtualization, cloud infrastructure, and public cloud offerings and experience designing security configuration and controls within cloud-based solutions in Microsoft Azure Google GCP, Amazon AWS and other vendors.. Infrastructure Security – Experience with the integration of common infrastructure security technologies and solutions into business solution architectures including the integration of identity & access management, intrusion detection and prevention, security monitoring, and data encryption solutions.. Cloud security certifications such as AZ-300 Azure Architect Technologies, CISSP or security related certifications.
This role provides technical expertise in multiple areas of cybersecurity to include Cloud Security and Endpoint Security.. Experience in Threat Intelligence/Hunting using KQL.. Solid Microsoft Azure experience, including M365.. Solid understanding of system and network security technologies and related concepts, e.g. boundary protection, network segmentation, firewalls, endpoint security, threat hunting and data protection.. Azure GCC-H exposure is desired.
Join to apply for the Litigation Associate (Privacy and Cybersecurity) role at Mintz. Our pretrial, discovery, trial and appellate efforts are designed to solve clients' problems through a collaborative, results-driven approach.. Applicants should have a comprehensive complex litigation skill set and experience in risk assessment, forensic and government investigations, crisis communications and response, and state and federal regulatory enforcement actions.. Responsibilities will include analysis of complex regulatory matters and investigations, advising clients on crisis management and cybersecurity incident response, brief and motion drafting, legal research, running document production, deposition prep, expert discovery and trial practice.. Graduated with a JD or LLM from an ABaccredited law school
Overview We are seeking a Director of IT Security to lead and mature our enterprise security program, strengthen our cyber defense posture, and ensure risk-aligned, business-driven protection across a rapidly evolving technology landscape.. Ensure comprehensive integration of cybersecurity principles into business strategies, disaster recovery, business continuity, access management, incident response, and enterprise risk management activities.. Industry-recognized certifications required (e.g., CISSP, CISM, CRISC, CISA).. Proven experience building and leading security teams, with responsibility for security operations, incident response, identity and access management, and regulatory compliance.. Deep expertise across multiple domains such as enterprise security architecture, cloud security, vulnerability management, IT controls, and threat intelligence.
Granite's philanthropy is unparalleled with over $300 million in donations to organizations such as Dana Farber Cancer Institute, The ALS Foundation and the Alzheimer's Association to name a few.. We are seeking a highly skilled and motivated Network Security Engineer to join our team.. This role requires in-depth knowledge of various network technology and vendor implementations including Fortinet, Cisco.. Proficiency in designing and implementing network solutions using vendors such as Fortinet, Cisco.. Experience operating and maintaining data center grade Fortinet equipment, experience planning and conducting upgrade cycles for Fortinet equipment.
Wentworth Institute of Technology’s School of Computing & Data Science invites applications for an Open-rank Professor or Lecturer in Cybersecurity or IT for the FALL semester of 2025.. Performing service to the university and the profession, which includes academic advising, student engagement, and serving on committees.. Particular attention will be given to candidates with a background in cybersecurity, offensive security, network security, software security, malware analysis, digital forensics or information technology.. co-educational, nationally ranked university offering career-focused education through 24 bachelor’s and 13 master’s degree programs in areas including Computer Science, Data Science, Cybersecurity, Engineering, Architecture, Design, and Construction Management.. E-Verify is an internet-based system that compares information from your Form I-9 to records available to the U.S. Department of Homeland Security (DHS) and Social Security Administration (SSA) to confirm that you are authorized to work in the United States.