Cooley is seeking a Technology Cloud Security Architect to join the Security team.. The Technology Cloud Security Architect will work to maintain and monitor the security practices and systems implemented by the Firm within our cloud environments.. The Technology Cloud Security Architect will proactively identify and mitigate cyber threats to minimize architectural and operational risk.. Contribute to Cloud security solutions R&D to evaluate the latest cutting-edge tools against unfilled strategic security capabilities to drive business priorities. Cloud Security Alliance (CCSP, CCSK) (ISC)2
Incident response for cybersecurity and data privacy incidents. Oversight of third party vendors for e-Discovery, data mining, and notice projects. Drafting Crisis Communications for clients. JD from an accredited Law School is required. 7+ years of experience in data privacy and security, with particular focus on data breach and incident response
Telecom Circuit Design/Test Engineer. Plan and design modern telco services to replace legacy copper-based telco solutions.. Experience designing and implementing network technologies such as SONET, Carrier Ethernet, LTE. Knowledge of WAN/LAN, TDM and Voice switching systems; TCP/IP, specific routing protocols such as OSPF, BGP and RIP; VoIP, DWDM, CTI and VPN technologies. Experience with leading network vendors such as Cisco, Juniper, Ciena, RAD
A well-established, national firm is looking to hire a Senior Cyber Incident Response Attorney with 7+ years of experience, on a fully remote basis (must be based in New York).. Oversee forensic investigations, managing third-party vendors, and ensuring compliance with privacy laws such as HIPAA, GLBA, CCPA, and GDPR.. Draft breach notifications, crisis communications, and reports for regulators and insurance carriers.. JD from an accredited Law School. If you are interested in this position, and you meet the requirements of the role, please click 'apply now' to forward an up-to-date copy of your CV. Alternatively, if you would like to discuss this opportunity further, please contact Danni Hubbard for a confidential discussion.
At Palo Alto Networks, everything starts and ends with our mission: Being the cybersecurity partner of choice, protecting our digital way of life.. Conduct client penetration testing to uncover potential vulnerabilities using a mix of tools.. Engage in cloud penetration testing to assess workloads for vulnerabilities, following client approval.. Background in conducting cyber risk assessments using industry standards.. Unit 42 Consulting is Palo Alto Network's esteemed security advisory team, focused on creating a more secure digital world through incident response and risk management.
SCAN Group is the sole corporate member of SCAN Health Plan, one of the nation's leading not-for-profit Medicare Advantage plans, serving more than 285,000 members in California, Arizona, Nevada, and Texas.. As the Chief Information Security Officer (CISO), you will be responsible for establishing and maintaining the enterprise vision, strategy, and programs to ensure that information assets and technologies are adequately protected for both SCAN Health Plan and associated portfolio companies.. The CISO will be the strategic leader for all aspects of information security, including security architecture, risk management framework, incident response, security awareness training, and vulnerability management.. CISSP (Certified Information Systems Security Professional) or Certified Information Security Manager (CISM). Understanding and experience with adherence to information and network security standards (HIPAA, HITECH, HITRUST, PCI and PII compliance), data management, disaster recovery.
SCAN Group is the sole corporate member of SCAN Health Plan, one of the nation's leading not-for-profit Medicare Advantage plans, serving more than 285,000 members in California, Arizona, Nevada, and Texas. As the Chief Information Security Officer (CISO), you will be responsible for establishing and maintaining the enterprise vision, strategy, and programs to ensure that information assets and technologies are adequately protected for both SCAN Health Plan and associated portfolio companies. The CISO will be the strategic leader for all aspects of information security, including security architecture, risk management framework, incident response, security awareness training, and vulnerability management. CISSP (Certified Information Systems Security Professional) or Certified Information Security Manager (CISM).. Understanding and experience with adherence to information and network security standards (HIPAA, HITECH, HITRUST, PCI and PII compliance), data management, disaster recovery.
Our ~15,000 employees create world-class solutions in communications, 5G, automotive, energy, quantum, aerospace, defense, and semiconductor markets for customers in over 100 countries.. Stay up to date with emerging security technologies like SASE, ZTNA, LLM Security, Cloud Security, NGFW, and DDoS. Hands-on experience with testing tools such as BPS, IxLoad, and CyPerf, and their application in cloud and network security environments.. Experience deploying or testing networking and security systems such as SASE, ZTNA, Cloud Security Services, Next-Gen Firewalls, IDS/IPS, etc.. Familiarity with cloud automation and DevOps frameworks/tools like Jenkins, Python, and Terraform.
We are seeking an experienced Vulnerability Management (VM) Cyber Managed Services Senior to join our team in designing, implementing, and managing our comprehensive vulnerability management service offering. Knowledge of general cybersecurity concepts and methods including, but not limited to vulnerability management, privacy, incident response, governance, risk and compliance, enterprise security strategies and architecture. Experience with utilizing Microsoft Excel and/or PowerBi to develop vulnerability management program metrics. Experience with using factors such as EPSS, CVSS, CISA KEV and threat intelligence sources to identify and prioritize vulnerabilities. A cyber security certification such as the CISSP, CEH, or GSEC is a plus
Maintain and configure Cisco routers/switches, firewall, VPN, VLANs∯*∯. Ensure Service Request tickets and Incident Management are addressed within KPI.. Knowledge of Cisco and Arista hardware and network operating system configuration (IOS, IOS-XE, etc.). Knowledge of routing protocols including EIGRP, OSPF, and BGP. Basic understanding of security technologies and concepts including firewalls, IPS, and VPNs
Our client, Antech Diagnostics, is seeking professionals in Fountain Valley, CA. Apply via Lensa today!. NET, PowerShell, TypeScript, SEI CERT Coding Standards, Microsoft Secure Coding Guidelines, Mobile OS-based languages, as well as Azure-related security best-practices for Azure DevOps, Azure Security Center, Key Vault, Azure Policy, Azure AD and role-based access controls.. NET, PowerShell, TypeScript, as well as Azure-related security best-practices for Azure DevOps, Azure Security Center, Key Vault, Azure Policy, Azure AD and role-based access controls.. Relevant certifications such as CISSP, CSSLP, CEH, OSCP, GIAC GWAPT are highly preferred.. Our products and services span 90+ reference laboratories around the globe; in-house diagnostic laboratory instruments and consumables, including rapid assay diagnostic products and digital cytology services; local and cloud-based data services; practice information management software and related software and support; veterinary imaging and technology; veterinary professional education and training; and board-certified specialist support services.
Job Summary:The Information Security Support Specialist will provide operational, administrative, and project-based support to Keck Medicine of Client's Information Security department.. This role plays a critical part in protecting the organization's information assets, ensuring secure access control, and maintaining compliance with security protocols.. The position will focus on Identity and Access Management (IAM) and require strong hands-on experience with SailPoint. Certifications:[Specify if required or preferred: CIAM, CISSP, or related security certification]Education: Bachelors DegreeCertification: Certified Identity and Access Manager
Roles and Responsibilities: A hands- on Brinqa System Administrator.. Data Integration: Set up and maintain data sources, connectors, and integrations to ensure seamless data flow into Brinqa for risk assessment and analysis. Automation: Implement automation workflows and processes to streamline risk assessment and remediation tasks. At least years of experience in IT systems, platform, or cloud engineering with a strong understanding of operating systems (Windows, Linux, and Unix) and network security engineering.. Experience deploying and correlating threat intelligence and vulnerability management solutions.
Head of IT Operations & Systems (National Manager)We are searching for an experienced Head of IT Operations & Systems (National Manager) at our Headquarters facility.. MPA provides after-sales service parts support for Hyundai Motors, Kia Motors, and Genesis.. In addition to the distribution of genuine service parts, the MPA Accessories division develops accessories for Hyundai, Kia, and Genesis - which are installed on new vehicles in the United States and Canada.. Under the leadership of the Vice President Supply Chain & Operations,the Head of IT Operations and Systems is responsible for overseeing IT infrastructure, hardware, and systemsfor 5 Hyundai Mobis affiliate companies operating 17 distribution centers inthe USA, Canada, and Mexico.. in managing IT cyber security practices, firewalls, encryption, IDS/IPS, and compliance.
Responsible for LAN/WAN, wireless technologies, network security, VoIP, and datacenter switching.. Must have Bachelor's Degree in Management Information Systems, Computer Science, or related field.. Certifications strongly preferred in CCNP, CCIE and/or Aruba ACxx.. Must be highly skilled with managing Cisco routers and switches, wireless technologies, cabling systems, firewalls, UPS power systems, SNMP.. Must have experience managing WLAN & VoIP networks, Unix/Linux, Aruba wireless technology, remote access services, network management/monitoring, Palo Alto firewalls, Mobile Device Management.
As a Cloud Infrastructure Engineer at HeyGen, you will design, deploy, and maintain cloud-based infrastructure across platforms like AWS, Azure, or Google Cloud. Automate cloud infrastructure provisioning using Terraform, CloudFormation, or similar tools. Implement best practices for cloud security, including identity and access management (IAM), encryption, and firewalls. Strong expertise in AWS, Azure, or Google Cloud, including key services (EC2, S3, RDS, IAM). Knowledge of cloud security best practices, including IAM, encryption, and network security.
At this time, we have an outstanding career opportunity available, as we're looking for the "right person" to serve as Information Technology Manager for the Information Services Department.. In an Infrastructure Manager, we seek strong technical proficiency encompassing complex network architecture, server management, storage solutions, disaster recovery planning, and fiber optics expertise.. Advanced network concepts, fiber optics, licensed and public domain point to point wireless, and various network platforms encompassing city-wide WAN. The Information Technology Manager differs from the Information Technology Supervisor in that the Information Technology Manager oversees multiple workgroups, including analysts and technicians, and is responsible for both short-term and long-term strategic planning for the City's technology functions.. The Information Technology Manager reports directly to the Chief Information Officer.
Ensure adherence to laws and frameworks such as PCI-DSS, FFIEC, GLBA, SOX, NIST, and other relevant laws through regular cybersecurity compliance audits and risk assessments.. Collaborate with IT, risk management, and compliance teams to ensure internal and third-party vendor cybersecurity practices meet regulatory requirements (e.g., PCI-DSS, FFIEC, GLBA, SOX, NIST) and manage security audits, risk assessments, and internal control evaluations.. Certifications such as CISSP, CISM, CRISC, CGEIT, CISA, and ITIL are highly desirable. Strong knowledge of Information Security risk management frameworks, Governance, Risk, and Compliance process, IT general controls (e.g. asset classification, risk assessments, vulnerability and threat analysis, risk treatment, audit controls and remediation, vendor risk management, and IT risk management & reporting). Working knowledge of California Consumer Privacy Act (CCPA), Gramm-Leach-Bliley Act (GLBA), NYDFS Cybersecurity Regulation, PCI-DSS, FFIEC, SOX, and other relevant laws and regulations.
at Southern California Edison (SCE) and build a better tomorrow.. Extensive experience across various cybersecurity services, including network security, data security, cloud and hybrid cloud security, application security, endpoint security, and IT/OT security.. The employee will report to an SCE facility for a set number of days with the option to work remotely on the remaining days.. This position has been identified as a NERC/CIP impacted position - Prior to being hired, the successful candidate must pass a Personnel Risk Assessment (PRA) or Background Investigation.. Southern California Edison is a proud Equal Opportunity Employer, including disability and protected veteran status.
Develop, implement, and maintain security policies, standards, and procedures in alignment with industry regulations such as HIPAA, HITRUST, and PCI. Third-Party Risk Management. Familiarity with regulatory frameworks such as HIPAA, HITRUST, and PCI. Understanding of AWS security best practices and Infrastructure as Code (IaC) principles. Relevant certifications such as Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), or Certified in Risk and Information Systems Control (CRISC) are highly desirable.