ZTNA solutions (e.g., Zscaler, Axis, Prisma Access). Relevant certifications such as CISSP, CISA, CISM, or CCNP Security are a plus. Support and maintain security architecture and controls that meet or exceed FedRAMP requirements, including boundary protections, encryption, and access control. Working knowledge with PowerShell, Ansible, Terraform, RegEx, Chef or Puppet are preferred. Industry-recognized Security certification such as CSSP, CISSP, or Security+, etc., preferred experience with FedRamp
Join to apply for the Cyber Security Engineer role at Berkeley Lab. Lawrence Berkeley National Labs (LBNL) National Energy Research Scientific Computing Center (NERSC) Division has an opening for a Cyber Security Engineer to join the team.. NERSC provides critical HPC and data systems and support for NERSCs 10,000 users researching alternative energy sources, climate science, energy efficiency, environmental science and other DOE mission areas.. Prior experience performing cybersecurity work in areas such as network defense, security monitoring and intrusion detection, vulnerability and risk assessment, penetration testing, or threat intelligence.. Familiarity with a wide range of security tools used for code analysis, penetration testing, and vulnerability scanning, with demonstrated expertise in one or more tools.
Security Automation & DevSecOps: Lead efforts to automate security controls, infrastructure provisioning, deployment, and operational tasks using tools like Terraform, Ansible, and CI/CD pipelines.. Security System Engineering & Operations: Oversee the implementation, monitoring, and continuous improvement of critical security systems and technologies, including Security Information and Event Management (SIEM), Cloud Security Posture Management (CSPM), Intrusion Detection/Prevention Systems (IDS/IPS), Web Application Firewalls (WAF), Data Loss Prevention (DLP), Endpoint Detection and Response (EDR), and secrets management solutions.. Experience: 4+ years of progressive experience in Security Engineering, Application Security, Cloud Security, or DevSecOps , with a proven track record of applying SRE principles to solve complex security challenges and build resilient systems.. Cloud Security Expertise: Deep expertise in cloud platforms, especially AWS, with a strong focus on secure configuration, network security, IAM, data encryption, and operationalizing security within services like EC2, S3, RDS, Lambda, EKS/ECS, VPC, CloudWatch, GuardDuty, Security Hub, WAF, KMS, Secrets Manager.. Security Principles & Architecture: In-depth knowledge of security principles, secure system design patterns, network security, application security, cloud security, data protection, and cryptography.
We are seeking a seasoned and proactive IT Lead to oversee and enhance our organizations IT infrastructure, security posture, and end-user computing environment.. Strong expertise in managing firewalls (e.g., Fortinet, Palo Alto), VPNs, and network security tools.. Proficient in IT asset management systems, ticketing platforms, and monitoring tools.. Certifications such as CCNA/CCNP, CompTIA Security+, Microsoft Certified: Azure Administrator, or CISSP.. Knowledge of DevSecOps and integrating security into CI/CD pipelines.
As a Senior Threat Intelligence Analyst , you will be instrumental in collecting, analyzing, and disseminating cyber threat intelligence that directly informs and enhances our security awareness, detection, response, and defensive capabilities.. Ingest finalized intelligence reports and supporting data into the Threat Intelligence Platform for knowledge management, correlation, hunting, and alerting, ensuring accessibility for internal teams and clients.. Provide intelligence-driven support to Security Operations Center, Threat Hunting, Incident Response, and Vulnerability Management teams.. Be skilled in digital forensics and incident response (full packet capture, host / network, email). GIAC Cyber Threat Intelligence, Certified Cyber Intelligence Analyst
With research and development efforts spanning gene therapy, genome editing, and cell-based technologies, they depend on robust and secure IT systems to drive scientific discovery and operational excellence.. They recently announced a major regulatory milestone for their lead gene therapy program targeting a rare inherited genetic disorder.. Administer Okta SSO platform for identity and access management. Identity and access management tools, especially Okta SSO. Certifications: CISSP, CISM, CompTIA Security+, AWS Certified Solutions Architect, Microsoft Certified: Azure Administrator, Cisco CCNP
Provide infrastructure security design and implementation, delivering robust security controls for cloud (Azure, GCP, OCI), on-premises, and hybrid infrastructure environments.. Configure and manage security tools and technologies, including firewalls, intrusion detection/prevention systems (IDS/IPS), Network Access Controls (NAC), VPN & Zero Trust Network Access.. Strong technical knowledge of modern network and cloud security platforms such as Palo Alto NGF & PRISMA, ClearPass, VPN, SD-WAN, ZTNA, and cloud security technologies like Azure and GCP (AFW, AppGW, Cloud Armor).. Experience with modern compute architectures such as Docker/Kubernetes and Serverless.. Experience with security automation, orchestration, and infrastructure-as-code (IaC) tools like Terraform, ARM, and cloud IaaS/PaaS automation.
Install and maintain security products: Data loss prevention (DLP), Vulnerability Management, Cloud Security, Identity and Access Management, Web Application Firewall (WAF), Static Application Security Testing (SAST), etc.. Ensure proper configuration and tuning of CrowdStrike to align with the environment creating and managing custom dashboards for ongoing visibility and reporting.. Cloud Environments: Google Cloud Platform (GCP), Microsoft Azure, AWS. Security Tools: Data Loss Prevention (DLP), CrowdStrike, Cloudflare. Proficiency with security tools (SIEM, firewalls, vulnerability scanners), cloud platforms (GCP/AWS/Azure)
NSR implements ICT projects by offering innovative solutions, leveraging specialized technical, organizational, and methodological expertise in IT project management, particularly in system maintenance and services supporting information and data security.. Experience and certifications on IT systems and security platforms such as firewalls from leading vendors and open-source solutions (e.g., Cisco, Checkpoint, Fortinet, Palo Alto).. CEH (Certified Ethical Hacker).. GCFA (GIAC Certified Forensic Analyst).. CISM (Certified Information Security Manager).
Hands-on expertise in network security, penetration testing, and compliance frameworks.. CISM (Certified Information Security Manager) - preferred certification.. CEH (Certified Ethical Hacker) - preferred certification.. Additional cloud security, network security, or risk management certifications are a plus.. Proficiency in Nessus, Metasploit, Wireshark, and other vulnerability assessment tools.
Stays abreast of competitive landscape and emerging technologies to best position Comcast Business Services in the marketplace.. Develops sales territory, including cultivation of local partnerships and organizational affiliations.. Demonstrates some knowledge of Network Design, MAN technologies & designs including DSx, OC-x, WDM, Ethernet, Internet Technologies, Functionality & Services, Voice Network Technologies (including VoIP), Data Networking Technologies, Functionality & Services (LAN, MAN, WAN, VPN), Networking Protocols (with an emphasis on Layers 1,2, & 3), Customer Premise Equipment (voice & data), Business Continuity/Disaster Recovery concepts and E-rate Contracting Processes and Procedures.. Consultative Selling; Software-Defined Networking Wide Area Network (SD-WAN); Cybersecurity; Unified Communications as-a-Service (UCaaS); Networking Technologies. Most sales positions are eligible for a Commission under the terms of an applicable plan, while most non-sales positions are eligible for a Bonus.
Provide guidance to the customer to configure their CPEs and integration points.. Experience with Microsoft Active Directory, GPO, AzureAD and Intune. Experience implementing or understanding of regulatory requirements such as PCI DSS, HIPAA, and SOC-2. Security skills and certifications such as CISSP, GCIA GCIH, GCFA, GCFE, CCIE, CCNP, JNCIE or MCSE will be a huge plus. Athenian Project : In 2017, we created the Athenian Project to ensure that state and local governments have the highest level of protection and reliability for free, so that their constituents have access to election information and voter registration.
Were a family-founded company on a mission to create the worlds first AI-powered Personal & Entrepreneurial Resource Planner (PRP), and we need your passion and ambition to help us change how people plan, work, and live.. Conduct vulnerability scanning, penetration testing, and security assessments to detect weaknesses.. Experience with vulnerability scanning tools (Nessus, Qualys, Burp Suite) and penetration testing methodologies.. Familiarity with cloud security in AWS, Azure, or GCP, including IAM and workload protection.. Experience working with DevSecOps , integrating security into CI/CD pipelines.
Lawrence Berkeley National Lab's (LBNL) National Energy Research Scientific Computing Center (NERSC) Division has an opening for a Cyber Security Engineer to join the team.. NERSC provides critical HPC and data systems and support for NERSC's 10,000 users researching alternative energy sources, climate science, energy efficiency, environmental science and other DOE mission areas.. Prior experience performing cybersecurity work in areas such as network defense, security monitoring and intrusion detection, vulnerability and risk assessment, penetration testing, or threat intelligence.. Familiarity with a wide range of security tools used for code analysis, penetration testing, and vulnerability scanning, with demonstrated expertise in one or more tools.. Hybrid work is a combination of performing work on-site at Lawrence Berkeley National Lab, 1 Cyclotron Road, Berkeley, CA and some telework.
Your expertise in digital forensics, threat hunting, malware analysis, and incident response tools will be essential in identifying and mitigating potential security threats.. Perform digital forensics and malware analysis to understand attack vectors and methodologies.. Utilize threat intelligence platforms to enhance our detection and response capabilities.. Familiarity with threat intelligence platforms and their integration into incident response processes.. Relevant security certifications (e.g., GCFA, GCIA, GCIH, CISSP) are a plus.
The Senior Cyber Risk Management Capability Assessor will evaluate the effectiveness and conduct risk assessments of cyber risk management capabilities, including policies, processes, and technical capabilities, leveraging enterprise cyber risk management requirement and control framework.. Certifications (Preferred) : CISSP, CISA, CISM, CRISC, CAP, Security+, or equivalent.. Minimum 3-5 years of experience in cyber security, compliance, cyber risk assessment, or security auditing.. Basic knowledge of cloud-based cyber risk management controls (Azure and / or Oracle Cloud Infrastructure).. Understanding of cyber risk management oversight and administration processes, security architecture, technical security controls, and data protection strategies.
More specifically, we are looking for technical cybersecurity experts with experience in all or some of the following: intelligence collection, incident response, insider threat analysis, network operations, emerging cyber policy, security operations (malware analysis, specialized cloud expertise, forensic experts, penetration testing, and application testing).. Multi-cloud environments (AWS, Azure, GCP) including workload protection, IAM, and secure networking. EDR re-enablement and telemetry validation (e.g., SentinelOne, CrowdStrike, Microsoft Defender for Endpoint). Firewall rulebase analysis and reimplementation (e.g., Palo Alto, Fortinet, Cisco ASA). Endpoint Detection and Response (EDR) tools such as CrowdStrike, SentinelOne, and Microsoft Defender for Endpoint
Als IT Security Consultant / Engineer Network Security bist du unser Experte für sichere IT-Infrastrukturen.. Planung, Implementierung und Optimierung von Firewalls, VPNs, IDS/IPS und anderen Sicherheitslösungen. B. Fortinet, Cisco, Palo Alto), VPN-Technologien und Intrusion Detection Systems. Erfahrung mit Cloud-Security (Azure, AWS, Google Cloud) von Vorteil. Als IT Security Consultant / Engineer Network Security bist du Teil unseres Expertenteams und spielst eine entscheidende Rolle bei der Sicherstellung der Netzwerksicherheit unserer Kunden.
KPMG is currently seeking a Senior Specialist, Identity and Access Management to join our Managed Services practice. Diagnose and resolve Privileged Access Management (PAM) incidents, focusing mainly on PAM based on Information Technology Infrastructure Library (ITIL) Incident Management principles.. Minimum three years of recent experience in Identity and Access Management (IAM) with minimum one year of recent experience in the IAM domain for Incident Management, Change and Problem Management, Service Request Fulfillment, and the IAM domain within an ITIL managed services context.. Bachelor's degree from an accredited college/university in information technology or a related field is required; CyberArk or another equivalent cybersecurity PAM certification is preferred; ITIL certification with a focus on Incident Management is preferred.. Clear understanding of PAM processes, controls, and systems, chiefly CyberArk PAM; experience with Microsoft Azure AD, SailPoint Identity Security Cloud (ISC), Microsoft Identity Manager (MIM), Okta, Ping Identity, and Hitachi Password Manager preferred
We are looking for a Regional Systems Engineer SLED to work closely with an Account Manager SLED in a defined territory.. The Systems Engineer's main mission will be to support the sales organization in all technical matters regarding pre-sales, sales calls, and post-sales.. Pre-sales - assist in qualifying sales leads from a technical standpoint.. 5 - 8 years experience in technical/pre-sales support as a sales or systems engineer. Strong understanding in the following technologies and protocols: RADIUS, PKI, IKE, Certificates, L2TP, IPSEC, FIREWALL, 802.1Q, MD5, SSH, SSL, SHA1, DES, 3DES