Review and enhance the architecture and framework design of VMS solutions, ensuring they support large-scale enterprise-level deployments.. Collaborate with cross-functional teams to drive product innovation and integration across different security platforms including access control, intrusion detection, and video surveillance.. Architect solutions that prioritize interoperability, scalability, and user experience, while maintaining compliance with key industry standards such as CJIS, NIST, and GDPR. Proven track record of designing and implementing scalable, on-prem & cloud-native microservices-driven architectures.. Strong expertise in AI, machine learning, deep learning, computer vision, and NLP technologies.
Stays abreast of competitive landscape and emerging technologies to best position Comcast Business Services in the marketplace.. Develops sales territory, including cultivation of local partnerships and organizational affiliations.. Actively generates new leads with targeted businesses through various prospecting activities, including cold calling, canvassing, customer referrals and partner relationships.. Demonstrates some knowledge of Network Design, MAN technologies & designs including DSx, OC-x, WDM, Ethernet, Internet Technologies, Functionality & Services, Voice Network Technologies (including VoIP), Data Networking Technologies, Functionality & Services (LAN, MAN, WAN, VPN), Networking Protocols (with an emphasis on Layers 1,2, & 3), Customer Premise Equipment (voice & data), Business Continuity/Disaster Recovery concepts and E-rate Contracting Processes and Procedures.. Most sales positions are eligible for a Commission under the terms of an applicable plan, while most non-sales positions are eligible for a Bonus.
Interpret and apply DoD cybersecurity policies and standards such as DISA STIGs, RMF, SCAP, and DFARS.. Tools such as NESSUS, SCCM, VULNERATOR, HBSS, USCYBERCOM CTO Compliance. Deep knowledge of DoD cybersecurity frameworks and policies including DISA STIGs, RMF, SCAP, and DFARS. Tenable Certified Nessus Auditor, IAM Level III (preferred). DISA FSO Certified CCRI Team Lead and certification in penetration testing (e.g., CEH, GPEN, LPT, CEPT)
We are seeking an experienced Senior Consultant with expertise in Microsoft Intune to join our team in Indianapolis.. Configure and manage Windows, macOS, iOS, and Android devices through Intune.. 5+ years of hands-on experience with Microsoft Intune and Azure Active Directory.. Expertise in configuring Intune policies for Windows, macOS, iOS, and Android platforms.. Familiarity with other MDM solutions (e.g., JAMF, VMware Workspace ONE).
Jobs for Humanity is collaborating with Upwardly Global and with Eaton Corporation to build an inclusive and just employment ecosystem.. Minimum five (5) years experience in designing and implementing Identity Privileged Access Management (PAM) solutions with a preference for proficiency in Saviynt CPAM, CyberArk, or equivalent PAM systems. Understanding of Identity Governance (IGA) concepts. Experience with Microsoft LAPS, CyberArk EPM, or other endpoint privilege management solutions, demonstrating technical knowledge with local credential management on Windows and Mac endpoints. Developing integrations between PAM and IGA solutions
What You'll Be Doing: Kaizen (continuously improve) security program maturity and governance for TMHNA business unit and equity dealersCollaborate with TMHNA business units to ensure compliance and risk management strategies integrate into overall business operations.. What We're Looking For: Bachelor's degree in computer science, information assurance, cybersecurity or related field, or equivalent industry experience.. CISSP or CISM (required); CRISC or additional security certifications are a certification a plus.. Knowledge of cloud computing, DevOps, and application security is required.. Up-to-date understanding of a wide range of incident response, system configuration, vulnerability management, and hardening guidelines.
Senior Cyber Security Engineer Job Summary: The Sr. Cyber Security Engineer will be responsible for maintaining, updating, implementing and monitoring Byrider’s strategic and comprehensive enterprise cybersecurity and IT risk management program.. The Sr. Cyber Security Engineer will work closely with the CIO to provide the vision and leadership necessary to manage the risk to the organization and will ensure business alignment, effective governance, system and product availability, integrity and confidentiality.. This position reports to the Chief Information Officer (CIO).. Align the security program with Privacy, Payment, and Lending compliance requirements, such as FTC Safeguards Rule, PCI-DSS, NYDFS, CCPA, and other state specific requirements.. Certified Information Security Manager (CISM) and other related industry certifications a plus
Description : Kodiak Security Operations Engineer Overview: The Information Security Engineer is responsible for designing, implementing, and maintaining security measures within an organization.. The Information Security Engineer contributes to technology projects, creates and updates security standards and policies.. Advanced understanding of IT and Security and Architecture fundamentals is required (Infrastructure, Azure, AWS, Operating Systems, Virtualization, Networking Concepts, Commands and Scripting, Network Security, Operational Security, Threats, Host Security, Access Control, Cryptography, etc. Technical knowledge of security monitoring tools and practical experience with threat detection, threat hunting and incident response are necessary to perform event monitoring in this role.. Requirements: Bachelor's degree in Computer Science, MIS, Information Systems, or equivalent experience Graduate degree and /or relevant certification(s) desired 5 years in Information Security role Travel maybe required to perform job/project duties As required, work after-hours We expect the candidate to uphold Crowe’s values of Care, Trust, Courage, and Stewardship.
The Cybersecurity Growth & Partnerships Director is responsible to drive channel sales development, direct sales execution, strategic partnerships, and market expansion in healthcare IT for medical device cybersecurity.. Work with Product and Marketing teams to refine solution positioning, messaging, and sales enablement tools.. Deep understanding of healthcare cybersecurity regulations and compliance (FDA cybersecurity guidance, HIPAA, NIST, HHS).. At TRIMEDX, we support and protect a culture where diversity, equity and inclusion are the foundation.. Visit our website to view our full Diversity, Equity and Inclusion statement, along with our social channels to see what our team is up to: Facebook , LinkedIn , Twitter.
As MISO's Identity Access Management (IAM) Security Architect , you will play a key role in shaping the future of identity and access management across the organization.. What you'll do as MISO's Identity Access Management (IAM) Security Architect : Design and implement identity-first security strategies, integrating compliance and automation into enterprise systems to enhance security and efficiency.. Hands-on experience with PKI solutions in an IAM system, including certificate lifecycle management (preferred). Relevant certifications such as CISSP, CISA, CISM, GIAC certifications (preferred). (CISM) Certified Information Security Manager (preferred)
Eskenazi Health serves as the public hospital division of the Health & Hospital Corporation of Marion County.. Physicians provide a comprehensive range of primary and specialty care services at the 327-bed hospital and outpatient facilities both on and off of the Eskenazi Health downtown campus as well as at 10 Eskenazi Health Center sites located throughout Indianapolis.. Proactively contributes to Eskenazi Health's mission: Advocate, Care, Teach and Serve with special emphasis on the vulnerable population of Marion County; models Eskenazi Health values. Accredited by The Joint Commission and named one of the nation’s 150 best places to work by Becker’s Hospital Review for four consecutive years and Forbes list of best places to work for women, and Forbes list of America’s best midsize employers’ Eskenazi Health’s programs have received national recognition while also offering new health care opportunities to the local community.. As the sponsoring hospital for Indianapolis Emergency Medical Services, the city’s primary EMS provider, Eskenazi Health is also home to the first adult Level I trauma center in Indiana, the only verified adult burn center in Indiana, the first community mental health center in Indiana and the Eskenazi Health Center Primary Care – Center of Excellence in Women’s Health, just to name a few.
The Federal Reserve System (FRS) National Incident Response Team (NIRT) has an immediate opening for an Intermediate SOC Analyst (Incident Response) position, reporting to a Senior Manager Information Security.. The NIRT, a national service provider for the FRS, delivers effective intrusion detection, incident response, forensics, security intelligence, threat assessment, and penetration testing services.. This role will be a combination of SOC analyst (providing triage of potential security events) and incident handler (investigating and responding to actual security incidents).. You can also expect to develop more specialized skills such computer forensics, phone forensics, malware analysis, and threat hunting on the job and through external training.. The national hiring range for the Intermediate SoC Analyst is $87,800- $120,780 annually.
Plan and design modern telco services to replace legacy copper-based telco solutions.. Degree and minimum years of prior WAN Telecommunications networks experience or years post-Secondary/ Associates Degree and a minimum of years of prior WAN Telecommunications networks experience. Experience designing and implementing network technologies such as SONET, Carrier Ethernet,. Knowledge of WAN/LAN, TDM and Voice switching systems; TCP/IP, specific routing protocols such as OSPF, BGP and RIP; VoIP, DWDM, CTI and VPN technologies. Experience with leading network vendors such as Cisco, Juniper, Ciena, RAD
Job Title: Information Security Analyst - Code and Vulnerability Analysis Location: Indianapolis, IN (Remote) Duration: Months Complete Description: Information security analyst position that functions as primary security code auditor for the agency's primary application.. Convert scan results and remediation recommendations into well-defined stories within Atlassian Jira, aligning with the Scaled Agile Framework (SAFe) for collaboration with development teams.. Draft policies, procedures, and best practices for publication in Atlassian Confluence to ensure consistent security practices across the organization.. Provide regular progress updates to the information security manager.. Expertise in Java programming language and familiarity with secure coding standards and guidelines such as OWASP Top Ten, CERT/CC, MITRE, Sun, and NIST. Experience working with Atlassian toolsets, particularly Jira, ServiceDesk, and Confluence.
Medxcel is here to lead the transformation of healthcare facilities management by incorporating a new approach to providing services.. Created by healthcare, for healthcare, we have a dedicated focus on our people and customers, as well as providing tools, processes, support resources, data analytics and insource strategies that drive results.. As a Cybersecurity Solution Architect at Medxcel, you’ll lead the architecture and design efforts of innovative Cybersecurity solutions and service offerings to protect our network, identities and customer data.. License/Certification: Certified Information Systems Security Professionals (CISSP) certification, Microsoft Certified: Cybersecurity Architect Expert required.. Experience: Minimum Required: 5 plus years of experience in Cybersecurity and Identity architecture and engineering, experience in a similar role with demonstrated relationship building skills resulting in traceable, measurable, impactful results; experience working in team environments and implementing organizational change; strong knowledge of cloud computing technologies (Azure, M365, D365).
Perform regular platform upgrades, vulnerability management, troubleshooting, and performance tuning. Administer data backups and disaster recovery policies. Work closely with DevSecOps teams to design and implement cloud-native solutions. Certifications such as: Azure Solutions Architect Expert, AWS Solutions Architect Professional, CISSP. Experience with Microsoft Intune, Azure Policy, or Azure EntraID
Overall scope includes services/capabilities related to Identity Management, Access Management, Privileged Access Mgt, API Security, and IOT/IDOT.. + Demonstrate knowledge and understanding of the key principles of Identity Access Management is required.. + Self-motivated to identify potential areas of improvement within Identity & Access Management. + Minimum 3+ years of using Sailpoint, Okta, and CyberArk products preferred.. Examples: Kubernetes, Docker, Cloud Build, Spinnaker, Jenkins, Maven etc.
This includes supporting the transformation of the platforms with particular focus on product and ITIL service management, 24X7 availability, business continuity, high-quality end user experience, information security, and cost effectiveness.. Ensure personnel and infrastructure are in compliance with global, regional and local regulations (e.g. FDA, SOX, GDPR. Required experience with audio/visual configuration management tools (e.g., Crestron, Polycom, Neat, and/or Cisco).. Operating in an Infrastructure as Product (IaP) environment.. Supervisory Information Technology Specialist (Data Management/Application Software) System Engineer- Serialization Execution System Applications (SES) Windows Server Platform Operations Engineer We’re unlocking community knowledge in a new way.