You will work collaboratively with Blue Team, Red Team, and other Cybersecurity professionals on overall cyber readiness defense and system accreditation efforts.. Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation Guides (STIG), and conduct Information Assurance Vulnerability Management (IAVM) reviews. Perform automated ACAS scanning, STIG, SCAP checks (Evaluate STIG, Tenable Nessus, etc.). Risk Management Framework (RMF), and the implementation of Cybersecurity and IA boundary defense techniques and various Ienabled appliances.. Examples of these appliances and applications are Firewalls, Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Switch/Routers, Cross Domain Solutions (CDS), EMASS and, Endpoint Security Solution (ESS)
A Department of Defense (DoD) "Secret" level Security Clearance or be able to obtain an interim clearance prior to hire date.. Experience with SDN Technologies and vendors, including SD-WAN, NSX-T, Cisco, Juniper, and open-source solutions.. Certifications: AIT Level II Security Certification (CySA+, GICSP, GSEC, Security+ CE, or SCCP) Cisco CCNA, or VMware VCP, or Palo Alto certification.. Experience developing and maturing complex, collaborative networking projects and working autonomously to move network development forward.. Experience leveraging NetDevOps or DevSecOps to scale enterprise level engineering projects.
Develop and manage Google Cloud Platform (GCP) security strategy; use your extensive knowledge of IT security and architecture to create and implement a comprehensive security strategy for GCP and workbench, ensuring it aligns with the firm's goals and addresses evolving threats.. Support security operations and incident response by providing expert knowledge of GCP in such activities as incident response, threat hunting, forensic analysis, and remediation; assist with identification of insecure or vulnerable configurations, review security changes, and ensure strong integrated security monitoring.. Bachelor's degree from an accredited college or university is preferred; certifications in Certified Information Systems Security Professional (CISSP) and Google Professional Cloud Security Engineer are preferred
Design and implement systems including CCTV, access control, intrusion detection, and biometrics. Lead zoning layouts, mantrap flows, visitor access, and badging protocols. Ensure high resiliency with dual-path communications, UPS backups, and penetration testing programs. Security ecosystems like Genetec, LenelS2, Honeywell, or Avigilon.. Remote-first culture with access to WeWork spaces
KPMG is currently seeking a Senior Specialist, Identity and Access Management to join our Managed Services practice. Diagnose and resolve Privileged Access Management (PAM) incidents, focusing mainly on PAM based on Information Technology Infrastructure Library (ITIL) Incident Management principles.. Minimum three years of recent experience in Identity and Access Management (IAM) with minimum one year of recent experience in the IAM domain for Incident Management, Change and Problem Management, Service Request Fulfillment, and the IAM domain within an ITIL managed services context.. Bachelor's degree from an accredited college/university in information technology or a related field is required; CyberArk or another equivalent cybersecurity PAM certification is preferred; ITIL certification with a focus on Incident Management is preferred.. Clear understanding of PAM processes, controls, and systems, chiefly CyberArk PAM; experience with Microsoft Azure AD, SailPoint Identity Security Cloud (ISC), Microsoft Identity Manager (MIM), Okta, Ping Identity, and Hitachi Password Manager preferred