Since Core Sound Imaging began in 2007, we have focused on delivering a superior customer experience with Studycast® - an advanced software as a service (SaaS) image storage and reporting solution (cloud PACS).. Coordinate regular security assessments, vulnerability scans, and penetration tests to identify and remediate security vulnerabilities and weaknesses.. Monitor and analyze security events and incidents, investigate security incidents, and provide incident response and remediation support as needed.. Strong technical skills in areas such as network security, SASE, endpoint security, cloud security, identity and access management, encryption, and security monitoring.. Proficiency in security assessment tools and technologies, vulnerability management tools, SIEM platforms, and incident response tools.
The Company: Varonis (Nasdaq: VRNS) is a leader in data security, fighting a different battle than conventional cybersecurity companies.. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation.. Customers use Varonis to automate a wide range of security outcomes, including data security posture management (DSPM), data classification, data access governance (DAG), data detection and response (DDR), data loss prevention (DLP), and insider risk management.. Understanding of cloud architectures (e.g., AWS, Azure, GCP) and IAM solutions (e.g. Okta, Azure AD, or AWS IAM). Familiarity with firewalls, VPNs, IDS/IPS, and network protocols (TCP/IP, DNS, SSL/TLS).
Hands-on experience in Cisco routers and switches (Catalyst and Nexus series), Palo Alto firewalls, SDWAN, Software-Defined Networking (SDN), load balancing, manage and design network infrastructures, and configuring enterprise LAN, WAN, and VPN technologies. Knowledge of network protocols (802.1q, 802.1x, STP, BGP, OSPF, EIGRP, PAGP, LACP, VRRP, etc. Knowledge of Cisco Viptela SDWAN, Cisco Application Centric Infrastructure (ACI), and cloud networking is a plus. Assist clients in the daily maintenance of voice and data network infrastructure including LAN, WAN, Wireless, VoIP, and NICs. Leverage the use of workflow ticketing systems such as ServiceNow.
The Senior Audit Manager (SAM) of Cybersecurity and IT Risk Management will support the Director IA, CNB Cybersecurity and IT Risk Management, and the Senior Director, IA, US Technology in providing independent, objective assurance over the design and operation of CNB's IT risk management practices, governance processes and the system of internal controls.. Examples of audit subject matter includes cybersecurity operations, data protection and data privacy, identity and access management, IT risk management, security architecture and engineering, cloud computing, IT risk management, network securities, vulnerability management, API security, etc.. Plans, leads and executes on the annual Audit Plan for CNB IT Cybersecurity and IT Risk Management audit universe, ensuring that audits conform to local and global regulatory and internal audit requirements.. In depth knowledge of financial services banking technology and related risks (e.g. cloud technologies, IT operations, data center services, storage & databases, server virtualization, cybersecurity operations, data privacy, data protection, cryptography, data loss prevention).. CISM - Certified Information Security Manager
The Senior Director of Security Intelligence and Operations will be responsible for maintaining and influencing enterprise-wide vision, operational strategy, and program for ensuring that information assets are appropriately protected.. On a daily basis they will be leading the company's security intelligence and operations , including cyber threat intelligence, incident response, threat detection and prevention, vulnerability management and security vendor mangement.. The Senior Director reports directly to the Chief Information Security Officer (CISO) and is responsible for a team of security professionals.. Service manager solutions: Archer, ServiceNow. Networking: Cisco, Juniper, Checkpoint; WAN/LAN network design; Application Firewalls
With over 30 years of experience, Unison Therapy Services has established a sterling reputation of success in providing evidence-based, family-first therapies to children with autism and other developmental disabilities.. That's why our services are multidisciplinary, covering a wide spectrum of support areas including speech, occupational and physical therapy, mental health, academic assistance, and behavioral support.. While we prefer a local/hybrid or onsite candidate, we are open to fully remote status with quarterly travel to Walnut Creek, CA offices.. Minimum of 2 years of experience in project management, project scheduling, quality assurance testing, preparing documentation and specifications, and technical writing.. Deep understanding of cybersecurity frameworks, risk management principles, and compliance regulations (e.g., HIPAA, PCI DSS, GDPR, NIST).
✅ Oversee security tools such as SIEM, EDR, DLP, MFA, and firewalls for enhanced protection.. 🔹 Hands-on expertise with security technologies: SIEM, EDR, IDS/IPS, VPNs, and firewalls.. 🔹 Experience with incident response, vulnerability management, and security best practices.. 🔹 Industry certifications such as CISSP, CISM, CEH, or Security+ are highly desirable.. 🚀 A fully remote role offering flexibility and work-life balance.
No opportunity for fully remote work.. Palo Alto PCNSE / ZScaler ZCCIA / Fortinet NSE4 / Pulse PCS: Administration and Configuration. Cisco CCIE - Routing and Switching (Desired) / Arista ACE. Palo Alto, FortiNet, Cisco ASA & FirePower firewalls. Hands on knowledge of F5 Networks, Load balancer (LTM, GTM, Vipron).
Monitors and maintains Firewalls and corresponding management tools (FMC, ASDM), Intrusion Prevention Systems (IPS), Vulnerability Management (VM), Cisco Umbrella domain name security, Client network Access Control, Posturing, and Profiling, IPsec VPN tunnels, AnyConnect remote users and security module, Third Party Partner Security Incident and Event Manager (SIEM), and other network and cloud security tools.. Monitor and Maintain the IPS signatures, Block lists, URL reputation lists, and malware file lists to ensure the latest security recommendations are implemented.. Use NCAOC-provided resources to attain Security Professional Certificates, (Ex. Cisco CCNA routing and switching, CCNA Security, CCNP Security, CISSP) Knowledge, Skills, and Abilities: Knowledge of enterprise network security technologies: Cisco FTD and ASA firewalls, IPS, FMC, IPsec tunnels, AnyConnect client, Cisco Client, Cisco Umbrella, Third Party SIEM, DDI, DNS, VLANS, NAT Cisco Secure Endpoint (AMP), Load Balancing IP/Domain/URL security intelligence sources (Virus Total, TALOS, etc.). Knowledge and or possession of Security Profession Certificates, (Cisco CCNA routing and switching, CCNA Security, CCNP Security, CISSP) is preferred but not required.. Skills: Skills in enterprise security technology; fundamental knowledge of the following, IPsec, IPS/IDS Snort Engine, SIEM, Identity Services Engine (Client), Vulnerability Management, Access Control/AAA; networking fundamentals in the areas of enterprise network topology, routers, switches, servers, NAT, DNS; TCP/IP architecture and functionality, Wireshark and interface captures, and log searching to assist in troubleshooting configuration and network security related problems.
The candidate will own the creation and dissemination of technical go-to-market collateral aimed at new and existing NetApp customers, NetApp internal technical teams, and NetApp sales partners.. This will require maintaining a technical understanding of security technologies (Identity and Access Management (IAM), privacy controls, encryption, auditing/logging, certifications & compliance/GRC, etc.). Strategic and technical knowledge in key areas, including familiarity with secure-by-design concepts, NIST Cybersecurity Framework, cloud security, and Zero Trust architectures as well as certifications and compliance such as FIPS, CC, STIG, and DoDIN APL.. Certifications such as CompTIA Security+, CISSP, or similar credentials demonstrating knowledge of security are highly preferred.. At NetApp, we embrace a hybrid working environment designed to strengthen connection, collaboration, and culture for all employees.
Basic Function The Global Business Services (GBS) Network Management team oversees and supports Wolters Kluwer’s Enterprise Network, spanning multiple public/private clouds, data centers, and offices in North America, Europe, and Asia Pacific.. Wolter Kluwer is on an exciting journey to move to a public cloud-based WAN using Infrastructure as Code, and it is looking for a Senior Network Engineer (Cloud) to be a part of the team.. The Senior Network Engineer (Cloud) will be responsible for the management, maintenance, support, and development of the networking in Cloud, which will span over 150 global locations and is integral to the company's success.. High degree of expertise in Cloud networking - Virtual Networks, NSGs, Transit Gateways, DNS, Traffic Manager, Route 53, Express Routes, Cloud WANs, SDWAN etc.. Hands on experience in CI/CD & Azure DevOps. Experience in working with monitoring, complex troubleshooting & debugging, supporting public cloud networks.
Provide mentorship and technical guidance to Tier 1 and Tier 2 RapidScale Managed Network NOC personnel. Extensive technical knowledge of current network hardware, protocols, and Internet standards, including routers, switches (layer 2/3), firewalls, remote access, VPN, IPsec, BGP, VLAN, VRF, and QoS. Thorough technical knowledge of various technologies such as Fortigate, SD-WAN, Cisco Routers, and Cisco Meraki.. Any of the following Certifications: Cisco CCNP, Fortinet NSE4-7, VMware/Velocloud SD-WAN, Cisco SD-WAN Solutions (300-415 ENSDWI) Exam. With exciting investments and innovations across transportation, communications, cleantech and healthcare, our family of businesses - which includes Cox Automotive and Cox Communications - is forging a better future for us all.
Administer and support identity management, user access control, and security protocols.. Expertise in Windows Server & Client Operating Systems and Office 365 Administration.. Strong understanding of networking concepts, Cisco Networking, VPN, and MFA.. Experience with cloud platforms (AWS, Azure, or GCP) is a plus.. Ability to manage security measures, disaster recovery planning, and endpoint protection.
Description: Reporting to the IT Security Manager the IT Security Analyst is a position based in North Carolina. Hands on experience on security testing tools such as Burp Suite Mimikatz Cobalt Strike PowerSploit Metasploit Qualys Web Inspect or other tools included within the Kali Linux distribution. Coordinate and execute IT security projects for Arista at multiple locations. Experience with CSPM tools such as WIZLacework Google Security Command Center. BA or BSc in Computer Science Management Information Systems Information Assurance or related field
Bridge organizational goals with cyber threat protection in large entities.. Maintain compliance of internal IT security controls by meeting internal and external information security requirements, proactively integrating cybersecurity into new technology initiatives from the start.. Minimum of 5 years of Cyber security experience with demonstrated ability to understand major cyber frameworks (NIST/ISO).. Strong capability to understand business structures in the fintech space.. Experience with incident response, risk management, and security audits.
Digital Forensics & Incident Response (DFIR) Engineer Atlanta, Georgia Zebulon, North Carolina On-site Job Description Become part of a team solving the most significant Cybersecurity & IT Challenges and helping keep the world’s largest and most elite brands safer from cyber threats.. Maverc Technologies is a proven and effective small business partner and consultant, recognized as a leader in providing cyber security and IT services to the Federal, State, and local Government and within the Intelligence Community.. countermeasures to address a variety of threats around leveraging automation, ML, and/or AI advanced threat hunting techniques types of digital forensics data and how to recognize them.. Core expertise in Digital Forensics & Incident Response (DFIR), Threat Hunting and Incident Response (Tier 3 level) Deep forensic analysis on endpoints Understanding forensic artifacts on machines Strong communication and organizational skills Ability to clearly articulate technical knowledge Must be concise and direct in responses Team collaboration and openness to feedback Certifications (preferred) : Industry certifications in general technology (e.g.. Security+, CySA+, GIAC Certified Incident Handler (GCIH), GIAC Certified Forensic Examiner (GCFE), GIAC Cloud Forensics Responder (GCFR), GIAC Certified Forensic Analyst (GCFA), GIAC Network Forensic Analyst (GNFA), GIAC Reverse Engineering Malware Certification (GREM), etc.
We are looking for a Pre-Sales Systems Engineer to work closely with our SMB sales teams.. The Pre-Sales Systems Engineer's main mission is to support the sales organization in all technical matters related to pre-sales, opportunity management, and customer success.. Continuous self-improvement and learning to keep technical leadership of applicable technologies (data center, SDN (Software Defined Networking), public cloud, security, networking, etc.). 1-year relevant pre/post-sales experience and bachelor's degree in Engineering Technology, Computer Science, Computer Engineering, or related field subject. Principles of cyber threat management and incident response
IT Security Specialist (ONSITE) Location: Raleigh, NC Duration: 12+ Months Job Description: The Epic/EHR Security Coordinator is responsible for overseeing and ensuring the security of the organization's Epic Electronic Health Record (EHR) system.. Security Management & Compliance: Ensure the Epic EHR system is secure and compliant with federal, state, and organizational security policies, including HIPAA, HITECH, and other applicable regulations.. Security Certifications (e.g., CISSP, CISM, HCISPP) are highly desirable.. Experience with HIPAA compliance, healthcare IT security audits, and risk management.. Required 7 Years Knowledge of role-based access control (RBAC), identity management, and data encryption as it relates to healthcare information systems.
Develop and maintain the technical IT/cyber capabilities including all phases of the software development lifecycle and software stack which includes threat modeling of application designs, static application security testing (SAST), software composition analysis (SCA), dynamic application security testing (DAST), and penetration testing.. Lead efforts related to designing, planning, enhancing, and testing all cybersecurity technologies used throughout the enterprise including base-lining current systems, trend analysis, and capacity planning as required for future systems requirements and new technologies.. Deep specialized and/or broad functional knowledge in applied enterprise information security technologies including but not limited to firewalls, intrusion detection/prevention systems, network operating systems, identity management, database activity monitoring, encryption, content filtering, and Mainframe security. Other security certifications (e.g. CCNA Security, GSEC, GCED, GPPA, etc.). Other technical Certifications (e.g. CCNA, RHCE, MCSE, etc.)
With our focus on four therapeutic areas –Oncology, Inflammation, General Medicine, and Rare Disease– we reach millions of patients each year.. Site point of contact for the Manufacturing Cyber Resiliency ecosystem, managing and coordinating the execution of various Security Operations, Business Continuity, Networking, Infrastructure, Anomaly Detection, Patch Management and Operations DTI projects.. Strong knowledge of Fortinet UTM/Firewall solutions, including SSL & IPSec VPN, IDS/IPS, Firewalls, Web Proxies, and Web Application Firewall (FortiWeb).. Cloud security certifications like AWS SAC03, Azure AZ-305, GCP – PCA or similar. Demonstrated knowledge and experience in one or more Information Security capability like security monitoring, threat intelligence, network security, data security, endpoint security, technical security assessments, security architecture.