Familiarity with M365 security and compliance features, such as Microsoft Defender, Microsoft Information Protection, and Data Loss Prevention (DLP). Cloud Security: Knowledge of how to protect sensitive information within Microsoft 365 by using security and compliance features is crucial. Active Directory: Knowledge of identity and access management through Active Directory (now Entra), Windows Azure AD, and identity synchronization tools is very important. California residents: Qualified applications with arrest or conviction records will be considered for employment in accordance with the Los Angeles County Fair Chance Ordinance for Employers and the California Fair Chance Act. Beacon Hill Technologies covers a broad spectrum of IT positions, including Project Management and Business Analysis, Programming/Development, Database, Infrastructure, Quality Assurance, Production/Support and ERP roles.
Position Summary As the leader of Network Operations team within a Scaled Agile Framework (SAFe) environment, the Network operations Manager oversees the technical expertise and execution of the team that builds and supports critical IT infrastructure that ensures the business integrity and continuity of Lids retail operations.. Familiarity with supporting and troubleshooting network and equipment such as; TCP/IP, DHCP, DNS, Ethernet, Frame Relay, ATM, OSPF, VoIP, BGP, Network security tools, and packet analyzers.. Experience configuring and supporting Cisco networking tools e.g., Nexus, Catalyst, ISR, ASR, Meraki.. Experience managing workflows in the following areas: Network topologies and protocols - including BGP, HSRP, and OSPF Cloud architecture and services VPN, VPN Posturing, VLAN, LAN, and WAN. Fortinet firewalls.. CCNA, CCNP or equivalent certification preferred.
Medxcel is here to lead the transformation of healthcare facilities management by incorporating a new approach to providing services.. Created by healthcare, for healthcare, we have a dedicated focus on our people and customers, as well as providing tools, processes, support resources, data analytics and insource strategies that drive results.. As a Cybersecurity Solution Architect at Medxcel, you’ll lead the architecture and design efforts of innovative Cybersecurity solutions and service offerings to protect our network, identities and customer data.. License/Certification: Certified Information Systems Security Professionals (CISSP) certification, Microsoft Certified: Cybersecurity Architect Expert required.. Experience: Minimum Required: 5 plus years of experience in Cybersecurity and Identity architecture and engineering, experience in a similar role with demonstrated relationship building skills resulting in traceable, measurable, impactful results; experience working in team environments and implementing organizational change; strong knowledge of cloud computing technologies (Azure, M365, D365).
The IT Security & Compliance Analyst is responsible for ensuring that the organization's IT systems, processes, and policies comply with applicable laws, regulations, and industry standards.. The IT Security & Compliance Analyst also plays a critical role in supporting audits, ensuring data protection, and driving continuous improvement of IT compliance programs.. Participate in incident response activities related to security and compliance issues, including investigation, remediation and documentation.. Perform regular proactive reviews or audits to identify potential areas of improvement to compliance, security risk and vulnerability, analyze impact and drive improvements.. If you believe you've been a victim of a phishing scam, please contact your local government cyber authority to report.
As a Sr Network Security Engineer, you will be responsible for implementing and maintaining the security infrastructure of our network systems both on-prem and in the cloud.. The ideal candidate should possess in-depth knowledge of network security technologies including CloudFlare Magic Transit (a plus) and WAF, F5 ASM and AFM, DDOS, Palo Alto next gen firewalls, and AWS security groups and firewalls, strong network troubleshooting abilities, and a proactive approach to mitigating risks.. Conducts emergency support and troubleshooting of troubleshoots firewalls, network links, hardware problems, or applications Prepares firewall/network security gear for deployment in the data centers or AWS Participates in the analysis and implementation of 3rd party solutions for company applications with the ability to understand the impact and analyze the risk.. Strong demonstrated knowledge of Palo Alto and F5 devices and technologies Strong knowledge of network security principles, protocols, and technologies, such as firewalls, IDS/IPS, VPNs, encryption, authentication, access control, WAF, DDOS Proficiency in network infrastructure design, implementation, and support, including routers, switches, load balancers, and other network devices.. Experience with network monitoring and security tools, such as SIEM, packet analyzers, vulnerability scanners, and penetration testing tools.
Rearc is looking for a Cybersecurity Threat Detection Engineer with proactive communication skills, a foundation in DevSecOps, Detection-As-Code, deep purple team technical expertise, and an entrepreneurial approach to join our growing Cybersecurity practice.. You will craft tailored security detections to strengthen our clients' cybersecurity efforts by leveraging Security Information and Event Management (SIEM), Security Orchestration Automation and Response (SOAR), Endpoint Detection and Response (EDR), and Network Detection and Response (NDR) services.. Strong cloud, security, SIEM and data engineering fundamentals.. Prior programming experience in Python, Golang, or PowerShell. Founded in 2016 by engineers instrumental in The Wall Street Journal's transformation to a cloud-native architecture, we recognize that engineers are the driving force behind digital transformation and cloud adoption efforts.
Focusing on cloud security and security architecture, you will lead technical discussions, guide strategic and tactical security architecture efforts, design and drive remediation and implementations, and serve as a technical security leader for both traditional and cloud-based security architectures.. Effectively lead and motivate client engagement teams and provide technical leadership in assessing, designing, and implementing security and IT risk solutions.. Knowledge of key cloud security standards (e.g., NIST, CIS, ISO, CSA STAR).. Knowledge in cloud/security technologies like IAM, 2FA, SIEM, PKI, DDoS mitigation, endpoint security, etc.. Relevant certifications (e.g., CISSP, CISM, CCSP, cloud certifications).
Perform regular platform upgrades, vulnerability management, troubleshooting, and performance tuning. Administer data backups and disaster recovery policies. Work closely with DevSecOps teams to design and implement cloud- solutions. Certifications such as: Azure Solutions Architect Expert, AWS Solutions Architect Professional, CISSP. Experience with Microsoft Intune, Azure Policy, or Azure EntraID
Reporting to the Senor Vice President, Information Technology, the Manager, Information Security, Governance & Risk will serve as the enterprise authority on information security, risk, and governance across CareRx's technology estate.. This strategic leadership role is responsible for defining and maturing the organization's information security program, overseeing security operations, and embedding robust IT governance and risk management frameworks across the enterprise.. Strategic IT Risk ManagementLead the implementation of a formal IT Risk Management Framework, incorporating qualitative and quantitative risk assessments, treatment plans, and residual risk monitoring.. Certifications strongly preferred: CISSP, CISM, CRISC, CISA, or equivalent.. Strong working knowledge of TRA/PIA processes, third-party risk, and incident response planning.
The Information Security Architect - Data Protection develops and guides the implementation of security architectures that protect sensitive data and ensure business continuity by mitigating associated risks.. This position focuses on supporting Data Protection solutions, including Data Loss Prevention, File and Database activity monitoring, and encryption technologies, and requires collaboration with various stakeholders to ensure compliance with IT, privacy, and security standards.. Participate in evaluations and recommend solutions to support enterprises security controls including: networking, firewalls, IDS/IPS, data loss prevention, application security, infrastructure security, and data security. Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Security Auditor (CISA), etc.. In connection with this, all employees must comply with both the Health Insurance Portability Accountability Act of 1996 (HIPAA) as described in the Notice of Privacy Practices and Privacy Policies and Procedures as well as all data security guidelines established within the Company’s Handbook of Privacy Policies and Practices and Information Security Policy.
GEICO is seeking an experienced Senior Staff Engineer to solve complex Identity and Access Management-related challenges.. You will help drive our insurance business transformation as we redefine our Identity, Access Management, and Governance strategies.. Position Description Our Senior Staff Engineer works with our Staff and Sr. Engineers to innovate and build new systems, improve, and enhance existing systems as well as identify new opportunities to apply your knowledge to solve critical problems.. You will lead and drive design, implementation, and maintenance of a robust workforce and workload identity management solutions and governance framework.. to help secure your financial future and preserve your health and well-being, including: Premier Medical, Dental and Vision Insurance with no waiting period
Coordinate with the level 2 security analysts and other teams for incident response and recovery activities and ensure the implementation of appropriate countermeasures and remediation actions.. Coordinate with the level 2 security analysts and other teams for complex or high-severity incidents that require further investigation or performance evaluation and feedback sessions for the level 2 senior security analysts and identify their training and development needs and opportunities.. Participate in calls with client stake holders throughout the months (monthly, quarterly, bi-weekly, Threat Hunting, etc.). Experiences and skills you'll use to solveA bachelor's degree in a relevant area of study with a preference for Computer Science or Computer EngineeringIndustry certifications (CISSP/GIAC suite/EC-Council) are an assetMinimum of 6 years in Information TechnologyMinimum of 4 years in Information SecurityProficient in Incident Response and ManagementKnowledge of various security tools (e.g. SIEM, EDR, etc.). Learn more about our Application Process and Total Rewards Package at: ca/en/life-at-pwc PwC Canada acknowledges that we work and live across Turtle Island, on the land that is now known as Canada, which are the lands of the ancestral, treaty and unceded territories of the First Nations, Métis and Inuit Peoples.
Licenses and/or professional accreditation such as GIAC, CISSP, CISM, CCSP, CEH Security+, or other Information Security certificates.. Experience with security information and event management (SIEM) tools, SOAR, privileged access management, identity access management.. / F-SSO security practices Knowledge of SIEM / MDR / Mail managed services.. Knowledge and experienced with network security services, including: IAM, DLP, AV, NAC. Experience with AI tools, such as CoPilot, Amazon Bedrock and ChatGPT. Experience with security information and event management (SIEM) tools, SOAR, privileged access management, identity access management Experienced with Cloud Security practices (Azure, Amazon, etc
Knowledge of tools used in security event analysis, incident response, computer forensics, network and endpoint architecture, or other security operational areas.. Understanding of cyber defense operations to include the incident response, containment, and remediation process, cyber threat intelligence, or security architecture.. Part of Google Cloud, Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services.. Our unique combination of renowned frontline experience responding to some of the most complex breaches, nation-state grade threat intelligence, machine intelligence, and the industry's best security validation ensures that Mandiant knows more about today's advanced threats than anyone.. Identify, incorporate, and articulate cloud security best practices such as DevSecOps strategy, Zero Trust design, and cloud incident response.
You will be hands-on, driving security initiatives, and providing expert guidance across a range of security domains.. Support and implement security operations and IT cloud service infrastructure projects, focusing on incident response, cyber program development, and security technology , enhance, install, configure, and maintain specialized cyber security and cloud infrastructure solutions (e.g., incident response solutions, infrastructure modernization, vulnerability management, identity and access management).. Mature and develop security governance standards and supporting processes in cyber risk, including vulnerability management and incident response activities.. Conduct Third-Party Risk Management evaluations in accordance with defined processes.. Support and implement Computer Forensics capabilities for risk mitigation, investigation, and incident response.
The IT Security & Compliance Analyst is responsible for ensuring that the organization's IT systems, processes, and policies comply with applicable laws, regulations, and industry standards.. The IT Security & Compliance Analyst also plays a critical role in supporting audits, ensuring data protection, and driving continuous improvement of IT compliance programs.. Participate in incident response activities related to security and compliance issues, including investigation, remediation and documentation.. Perform regular proactive reviews or audits to identify potential areas of improvement to compliance, security risk and vulnerability, analyze impact and drive improvements.. If you believe you've been a victim of a phishing scam, please contact your local government cyber authority to report.
Plan and design modern telco services to replace legacy copper-based telco solutions.. Degree and minimum years of prior WAN Telecommunications networks experience or years post-Secondary/ Associates Degree and a minimum of years of prior WAN Telecommunications networks experience. Experience designing and implementing network technologies such as SONET, Carrier Ethernet,. Knowledge of WAN/LAN, TDM and Voice switching systems; TCP/IP, specific routing protocols such as OSPF, BGP and RIP; VoIP, DWDM, CTI and VPN technologies. Experience with leading network vendors such as Cisco, Juniper, Ciena, RAD
Job DescriptionWe are seeking a seasoned Level 3 SOC Analyst to play a critical role in leading incident response efforts, supporting the development and maturity of SOC operations, and mentoring junior analysts.. Relevant security certifications are required, such as CISSP, CISM, GIAC, CompTIA CySA+/Security+, CISA, or SANS. Experience with Microsoft Defender Endpoint, CSPM/CWP, or similar endpoint/cloud security technologies, with the ability to recommend mitigations based on threat intelligence.. Familiarity with cloud transformation initiatives, cloud security operations, and architectural best practices for platforms like Azure, AWS, or Google Cloud.. Nice to Have:Hands-on experience with multi-cloud security (Azure, AWS, GCP).
You will play a key role in modernizing IAM frameworks, enforcing governance policies, and enhancing DevSecOps security automation in multi-cloud environments.. Implement IAM-based secrets injection into AI/ML pipelines for Azure Machine Learning and Vertex AI workloads.. Hands-on experience with OAuth 2.0, mTLS, JWT, and API gateway IAM policies (Apigee, Azure API Management).. Ability to design secure secrets retrieval models for CI/CD pipelines, Ansible playbooks, and VMs. Proficiency in Terraform, Ansible, and GitHub Actions for IAM policy automation.. Familiarity with GCP IAM policy bindings, Terraform IAM modules, and Azure RBAC automation.
15+ years' of Experience in Embedded Systems and at least 8 years of Experience in Cyber Security, with a focus on embedded systems security •Extensive experience in Designing and implementing robust security architectures for embedded systems, ensuring security by design for hardware and software.. Extensive experience in Performing security risk assessments, vulnerability assessments, and threat modeling for embedded systems.. Extensive experience in Identifying potential threats (e.g., physical tampering, data interception, unauthorized access) and recommend mitigation strategies •Experience in Analyzing security breach incidences and performing RCA and FMEAs on the overall system and designs for those and come up with recommendations.. Experience in Defining, Developing, and applying encryption and decryption methods, secure boot processes, secure key management, and access control mechanisms, HSM for embedded devices.. Experience in Conducting penetration testing, code reviews, and fuzz testing to identify and fix security vulnerabilities in embedded systems and Developing security test plans to ensure compliance with security requirements and industry standards.