You will monitor, detect, investigate, and respond to security incidents using SIEM, EDR, and threat intelligence platforms.. Lead the monitoring, detection, investigation, and response to security incidents using SIEM, EDR, and threat intelligence platforms.. Thorough understanding of cybersecurity principles, including threat detection, vulnerability management, intrusion detection/prevention, and incident response.. Familiarity with cyber threat intelligence (TAXII/STIX and YARA) and experience with security automation such as Python, SOAR solutions.. The department consists of six areas: Administration, Fiscal Services, Budget and Strategic Planning, Purchasing, Information Technology, and Geographical Information Systems (GIS).
Lead and evolve the enterprise cyber security program, aligning with business priorities, risk posture, and regulatory requirements.. Oversee Security Operations Center (SOC), incident response, vulnerability management, threat intelligence, and endpoint protection.. Drive the maturity of identity and access management (IAM), data loss prevention (DLP), zero trust architecture, and secure DevOps initiatives.. Build, lead, and mentor a high-performing, diverse cybersecurity team across technical and GRC domains.. Support cyber incident response planning, tabletop exercises, and executive-level simulations.
Oversee Security Operations Center (SOC), incident response, vulnerability management, threat intelligence, and endpoint protection. Drive the maturity of identity and access management (IAM), data loss prevention (DLP), zero trust architecture, and secure DevOps initiatives. Strong technical foundation in network security, cloud security (GCP, AWS, Azure, OCI), security engineering, and incident response. Relevant certifications (CISSP, CISM, CISA, CCSP, etc. Mattel offers competitive total pay programs, comprehensive benefits, and resources to help empower a culture where every employee can reach their full potential.
The Sr. Network Architect will design, implement, and maintain enterprise-level network infrastructure, including LAN, WAN, wireless, SD-WAN, and cloud networking technologies, and develop network security strategies and implement security protocols, such as firewalls, intrusion detection/prevention systems, and access control systems, to protect against advanced cyber threats.. They will develop network capacity planning, disaster recovery, and business continuity plans.. They will have expertise knowledge of Optical systems (Passive and active DWDM), VoIP and other real-time applications, SDN, IoT integration, and the ability to Support OSPF and other network protocols.. Company 3, including its various business units and family of brands, provides a full range of Creative Services for content creators, including conceptual design, pre-vis, look development, ideation and rapid prototyping, 3D animation/CGI, motion graphics/designers, matte painting, compositing, dailies and production services, color grading, post-production finishing, marketing/trailers, live-action production, experiences, and more.. An employee’s pay position within the range may be based on several factors including, but limited to, relevant education, qualifications, certifications, experience, skills, seniority, geographic location, local currency exchange rates, performance, shift, travel requirements, sales or revenue-based metrics, applicable law, and business or organizational needs.
SCAN Group is the sole corporate member of SCAN Health Plan, one of the nation's leading not-for-profit Medicare Advantage plans, serving more than 285,000 members in California, Arizona, Nevada, and Texas. As the Chief Information Security Officer (CISO), you will be responsible for establishing and maintaining the enterprise vision, strategy, and programs to ensure that information assets and technologies are adequately protected for both SCAN Health Plan and associated portfolio companies. The CISO will be the strategic leader for all aspects of information security, including security architecture, risk management framework, incident response, security awareness training, and vulnerability management. CISSP (Certified Information Systems Security Professional) or Certified Information Security Manager (CISM).. Understanding and experience with adherence to information and network security standards (HIPAA, HITECH, HITRUST, PCI and PII compliance), data management, disaster recovery.
As a Cloud Infrastructure Engineer at HeyGen, you will design, deploy, and maintain cloud-based infrastructure across platforms like AWS, Azure, or Google Cloud. Implement best practices for cloud security, including identity and access management (IAM), encryption, and firewalls. Cloud Platforms: Strong expertise in AWS, Azure, or Google Cloud, including key services (EC2, S3, RDS, IAM). Infrastructure as Code (IaC): Experience with Terraform, CloudFormation, or similar tools for automating infrastructure. Security: Knowledge of cloud security best practices, including IAM, encryption, and network security.
Conduct technical assessments using standard industry tools such as Nessus, Security Hub, Prisma Cloud, and Burp Suite Pro.. Assess and analyze cyber security documentation for client information systems in accordance with FISMA, NIST RMF for Federal Civilian Agencies, RMF for DoD IT, FedRAMP, and departmental standards. A bachelor's degree in IT/Computer Science or related field or equivalent experience. Solid familiarity with general enterprise technology with focus on security and compliance such as architecture, firewall, router, load balancer, operating systems, SEIM, IDS/IPS, HIDS, malware analysis and protection, content filtering, perimeter access controls, logical access controls, identity and access management, data loss prevention, application firewalls, vulnerability scanners, security incident response, Identity Access Management (IAM). Experience with application security tools and vulnerability management, such as SAST, DAST, penetration testing, container security, open-source vulnerability management
Principal Security Automation Engineer (SOAR)-Remote. Additionally, the Principal Security Engineer leads the SOC's security automation architecture and strategic roadmap, develops metrics to measure program maturity and value, and supports the Information Security Incident Response program to protect information systems from unauthorized access, use, disclosure, disruption, modification, inspection, recording, or destruction.. Relevant licenses or certifications such as CISSP, GCIH, GIAC, or SOAR-specific credentials.. Experience with SIEM solutions and threat intelligence platforms.. Our People First Culture celebrates diversity, equity, and inclusion.
Our ~15,000 employees create world-class solutions in communications, 5G, automotive, energy, quantum, aerospace, defense, and semiconductor markets for customers in over 100 countries.. Stay up to date with emerging security technologies like SASE, ZTNA, LLM Security, Cloud Security, NGFW, and DDoS.. Hands-on experience with testing tools such as BPS, IxLoad, and CyPerf, and their application in cloud and network security environments.. Experience deploying or testing networking and security systems such as SASE, ZTNA, Cloud Security Services, Next-Gen Firewalls, IDS/IPS, etc.. Familiarity with cloud automation and DevOps frameworks/tools like Jenkins, Python, and Terraform.
As the Chief Information Security Officer (CISO), you will be responsible for establishing and maintaining the enterprise vision, strategy, and programs to ensure that information assets and technologies are adequately protected for both SCAN Health Plan and associated portfolio companies.. The CISO will be the strategic leader for all aspects of information security, including security architecture, risk management framework, incident response, security awareness training, and vulnerability management.. CISSP (Certified Information Systems Security Professional) or Certified Information Security Manager (CISM). Understanding and experience with adherence to information and network security standards (HIPAA, HITECH, HITRUST, PCI and PII compliance), data management, disaster recovery.. Thorough understanding of Active Directory, Network/Remote Access Security, Systems Security (Windows, Unix, Mainframe), Application and Web Security, Firewalls and Intrusion Detection Systems, TCP/IP, Proxy, SPAM Filtering, SIEMs, Vulnerability Scanners, IDS/IPS, SQL.
Department Overview Motorola's Access Control Division's (previously OpenPath, now Avigilon Alta) mission is to improve your workday with smart office technology at your front door.. Interface with legal, data governance, and engineering teams on policy enforcement and control mapping.. Strong understanding of technical concepts: SAST, DAST, SCM, IdP, Kernel, Firmware, WAF, firewalls, IDS/IPS, SIEM, cloud security, etc.. Certifications such as CISM, CISSP, CISA, CRISC, or CIPM are strongly preferred.. High emotional intelligence and team leadership experience across cultures/time zones.
The Information Security Specialist will possess knowledge and experience in standard methodologies used in certification and accreditation processes; extensive experience following NIST guidelines in risk assessment and management; conducting vulnerability analysis; developing mitigation plans; and performing penetration testing, password protection testing and application security testing.. CRISC – Certified in Risk and Information Systems Control. CISM (Certified Information Security Manager). -Applying risk management principles, including conducting audits, security assessments, and interpreting industry-standard security frameworks (, NIST, ISO , CIS).. -Conducting and supporting security operations, control assessments, audit remediation, and enterprise risk governance initiatives.
- Compliance & Risk Management: Ensure network security compliance with relevant regulatory requirements (e.g., GDPR, HIPAA, PCI-DSS).. Proficiency in performing penetration testing and vulnerability assessments, Familiarity with operating systems (Windows, Linux) and cloud security platforms (AWS, Azure), Knowledge of encryption, authentication, and authorization protocols.. Certified Ethical Hacker (CEH). Certified Information Security Manager (CISM). The teams within USDS that deliver on this commitment daily span across Trust & Safety, Security & Privacy, Engineering, User & Product Ops, Corporate Functions and more.
We are seeking an experienced Network Administrator with expertise in Extreme Networks Shortest Path Bridging (SPB) Fabric and Aruba networking solutions.. Ensure compliance with industry security standards (NIST, CIS, PCI-DSS, etc. Automate network configurations using Python, Ansible, or Terraform.. Experience with network automation tools (Ansible, Terraform, Python scripting) is a plus.. Certifications such as Extreme Networks Certified Specialist (ECS), Aruba Certified Switching Associate (ACSA), or CCNP are preferred.
The SR. Engineering Tech (CYBERSECURITY) responsibilities will act as a SCADA Network technical lead in the design, development, and daily support of Supervisory Control and Data Acquisition (SCADA) Network and Security infrastructures.. The ideal candidate will exude competence and demonstrated knowledge of Industrial Control System (ICS) LAN / WAN networking and best practices in SCADA network architecture and security design, including knowledge of ICS security infrastructures and best practices.. This position will also work closely with the IT network and project management teams, and SCADA network/security consultants overseeing the design, development, proof of concept, and upgrade of the organization's SCADA network communications infrastructure.. Job RequirementsSPECIAL REQUIREMENTS (Required):Knowledge of industrial control systems 1/0 technologies and SCADA Protocols (Modbus, DNP3, CIP).. Working knowledge of Cellular, Microwave, Telco services, WAN, LAN , switching, routing, VPN, VLAN.Evaluate products and vendors, administration of cyber tools and systems.
Information Security Analyst - $110K+ DOEOn-Site | Anaheim, CAFull-Time | Direct HireStart Immediately | Excellent Benefits Are you a cybersecurity pro who thrives in high-growth, tech-forward environments?. A leading health & wellness brand is hiring a hands-on Information Security Analyst to help safeguard its digital infrastructure, protect customer data, and support compliance across the. is a key opportunity to bring your security expertise to a collaborative team where your contributions will directly impact operations, risk management, and digital trust.. Apply today and become a vital part of a mission-driven, innovation-powered team transforming how health and wellness products reach millions of customers.. We do not discriminate based on age, ethnicity, gender, nationality, religious belief, or sexual orientation.
Certifications: Relevant certifications such as CISSP, CISM, CEH, or CompTIA Security+ are highly desirable.. Familiarity with regulatory requirements such as GDPR, HIPAA, and PCI-DSS. Founded in 1985, Westport Properties (“WPI”) is an owner-operator of self storage, multifamily and industrial properties across the United States.. As of March 2024, WPI has approximately 15.2 million square feet of self storage space under management and its total assets under management is approaching $3.2 billion with its US Storage Centers brand as well as over 650 multifamily units while employing over 600 people nationwide.. WPI is a founding partner of the 501(c)3 Kure-It, a non-profit organization that raises money for underfunded cancer research, and Charity Storage, a 501(c)3 that uses vacant storage units to raise money for local charities.
Lewis Brisbois is seeking an experienced Senior Network Engineer who will report to the Chief Information Officer.. The Senior Network Engineer collaborates closely with cross-functional teams to assess requirements, troubleshoot issues and optimize network performance.. Implement and enforce network security policies, including firewalls, VPNs, and intrusion detection systems.. Practical experience with networking protocols, such as:TCP/IP, BGP, OSPF, VLANs, and others.. Solid understanding of network security practices and tools, including:Firewalls, Intrusion Detection Systems (IDS), and VPN configurations.
The Information Security Specialist will possess knowledge and experience in standard methodologies used in certification and accreditation processes; extensive experience following NIST guidelines in risk assessment and management; conducting vulnerability analysis; developing mitigation plans; and performing penetration testing, password protection testing and application security testing.. Familiarity with vulnerability management, threat intelligence analysis, and security architecture design in support of risk and compliance objectives.. Foundational knowledge of technical environments including IT security, networking, and systems administration, with awareness of tools such as SIEM (e.g., Microsoft Sentinel), firewalls, and other endpoint/network security platforms.. CRISC – Certified in Risk and Information Systems Control. CISM (Certified Information Security Manager)