Gruve Tech Inc is seeking an experienced Cybersecurity Incident Response Manager or Director to join our Professional Services team.. Use threat intelligence and advanced analytics to identify and address potential threats.. Industry certifications such as CISSP, CISM, or CEH. Proficiency in SIEM tools (e.g., Splunk, QRadar) and SOAR platforms. Strong understanding of: Network security, Endpoint and cloud security, digital forensics, malware analysis, and threat intelligence.
Network Protection: Implement and manage network security solutions such as firewalls, VPNs, intrusion detection and prevention systems, SIEM tools, endpoint protection, vulnerability management, and data loss prevention to safeguard client networks.. Required Qualifications Experience: Minimum of 5 years’ experience configuring and maintaining Palo Alto Networks, Juniper, Ruckus, Cisco, Aruba, or Meraki hardware, with at least 3 years leading network architecture and implementation—including LAN, WAN, WLAN, and physical installation—and practical experience integrating cybersecurity measures, ideally within an MSSP or MSP environment.. Certifications: Certifications such as the CCNP, CCIE, CISSP. Network Acquisition Manager - Latin America San Jose, CA $90,720.00-$220,400.00 3 weeks ago. Software Engineering Manager, Network Routing Principal Product Manager – LinkedIn Audience Network (LAN) Mountain View, CA $70,000.00-$130,000.00 1 week ago
Intersecting cybersecurity and blockchain, CertiK’s security offerings include security consulting, security reviews, security auditing of smart contracts and blockchains, verification of smart contracts, penetration testing, and more. Experienced in threat and vulnerability management, penetration testing, and SecOps (intrusion detection, security logging, malware analysis, and forensics). Experience in programming languages such as Rust, Golang, Solidity. Passionate with Cryptocurrency/DeFi/Blockchain is a plus. About the Company One of the fastest-growing and most trusted companies in blockchain security, CertiK is a true market leader.
Oversee Security Operations Center (SOC), incident response, vulnerability management, threat intelligence, and endpoint protection.. Drive the maturity of identity and access management (IAM), data loss prevention (DLP), zero trust architecture, and secure DevOps initiatives.. Strong technical foundation in network security, cloud security (GCP, AWS, Azure, OCI), security engineering, and incident response.. Relevant certifications (CISSP, CISM, CISA, CCSP, etc.. Mattel offers competitive total pay programs, comprehensive benefits, and resources to help empower a culture where every employee can reach their full potential.
We are seeking a skilled and detail-oriented Threat Intelligence Analyst to join our cybersecurity team.. Key Responsibilities: Monitor and analyze threat intelligence feeds, indicators of compromise (IOCs), and emerging cyber threats.. Develop and maintain threat intelligence databases, dashboards, and knowledge bases.. + years of experience in cybersecurity, with at least year in threat intelligence or a related field.. Familiarity with threat intelligence platforms (TIPs), SIEM tools (, Splunk, QRadar), and MITRE ATT&CK framework.
Minimum 7 years’ experience in information security with a minimum of 4 years’ experience in incident response. Certified Information Systems Security Professional (CISSP) required plus two current security related certifications (e.g. CCNA, CCNP, CEH, GIAC, EnCE). Advanced event analysis leveraging SIEM tools (especially in Splunk (ES. Demonstrated proficiency in network security concepts, such as security event correlation, TCP/IP concepts, DNS, firewall technologies, IPS/IDS, Endpoint protection, routers, switches, perimeter security, authentication, encryption, and VPN solutions. Experience with implementing Security Orchestration, Automation and Response (SOAR) tools
Minimum 7 years’ experience in information security with a minimum of 4 years’ experience in incident response. Certified Information Systems Security Professional (CISSP) required plus two current security related certifications (e.g. CCNA, CCNP, CEH, GIAC, EnCE). Advanced event analysis leveraging SIEM tools (especially in Splunk (ES. Demonstrated proficiency in network security concepts, such as security event correlation, TCP/IP concepts, DNS, firewall technologies, IPS/IDS, Endpoint protection, routers, switches, perimeter security, authentication, encryption, and VPN solutions. Experience with implementing Security Orchestration, Automation and Response (SOAR) tools
Our mission-first software and data engineering platform modernizes data operations, utilizing advanced workflows, CI/CD, and secure DevSecOps practices.. Hands-on experience with next-gen firewalls (Palo Alto, Cisco ASA/Firepower), IDS/IPS, and VPN technologies.. Proficiency with SIEM platforms (Splunk, QRadar, Sentinel, etc.). Experience with vulnerability scanning and remediation tools (Nessus, Qualys, OpenVAS).. Cloud security expertise (AWS Security Hub, Azure Defender, GCP Security Command Center).
Cloud Platforms: Design and implement solutions on AWS, Azure, or GCP — including networking, security, compute, storage, and IAM configurations.. Application Integration: Define API architecture (REST, SOAP, GraphQL), middleware integration (MuleSoft, Dell Boomi), and microservices communication patterns.. Infrastructure as Code (IaC): Hands-on in Terraform, CloudFormation, ARM templates for automated provisioning.. DevOps Enablement: Integrate CI/CD pipelines (Jenkins, GitLab CI, Azure DevOps) into solution delivery.. Cloud: AWS Certified Solutions Architect – Professional, Microsoft Certified: Azure Solutions Architect Expert, Google Professional Cloud Architect.
Our mission-first software and data engineering platform modernizes data operations, utilizing advanced workflows, CI/CD, and secure DevSecOps practices.. Hands-on experience with next-gen firewalls (Palo Alto, Cisco ASA/Firepower), IDS/IPS, and VPN technologies.. Proficiency with SIEM platforms (Splunk, QRadar, Sentinel, etc.). Experience with vulnerability scanning and remediation tools (Nessus, Qualys, OpenVAS).. Cloud security expertise (AWS Security Hub, Azure Defender, GCP Security Command Center).
You will collaborate with the CISO (Chief Information Security Officer), CTO, product, devops, and legal/compliance teams.. Who You Are At least 8 years of work experience in software or data engineering, ideally in financial services and/or fintech industry. Experience implementing zero-trust architecture , secrets management (e.g., HashiCorp Vault), and DevSecOps practices. Experience conducting or leading threat modeling , penetration testing , or incident response. Interview Process Intro call with the Head of Talent, 30m
We are seeking a dedicated and hands-on Cyber Security Engineer to help safeguard our cloud and hybrid environments.. Deploy and maintain security controls for cloud/hybrid environments (AWS, Azure, Kubernetes, Docker, etc. Support threat intelligence and vulnerability management efforts.. Proficiency with SIEM tools (e.g., Microsoft Sentinel, Splunk or Securonix).. Relevant certifications preferred (e.g., CompTIA Security+, AWS Security Specialty, CEH).
Chief Information Security Officer (CISO). As the Chief Information Security Officer (CISO) at Madrigal Pharmaceuticals you will be responsible for establishing and maintaining the enterprise vision, strategy, and program to ensure information assets and technologies are adequately protected.. Strong background in incident response, threat intelligence, penetration testing, and vulnerability management.. Hands-on experience with security technologies (e.g., SIEM, firewalls, EDR, IDS/IPS, IAM, DLP).. Industry-recognized certifications preferred: CISSP, CISM, CISA, CRISC, CCISO, or equivalent.
Zachary Piper Solutions is seeking Tier 3 Network Engineers to support a critical program for Department of Energy, National Nuclear Security Agency in Washington, D.C. and Manassas, VA. The team is seeking a skilled engineer to design, implement, and maintain secure, high-performance network infrastructures in support of stockpile management, nonproliferation and nuclear security.. Active Top Secret and/or DOE Q clearance. Extensive experience configuring Cisco routers and switches(IOS/NX-OS), as well asPalo Alto Next-Generation Firewalls and VPNs.. Strong technical background in both Windows and Unix/Linux environments, with expertise in network security, traffic analysis, incident response, vulnerability assessment, packet inspection, and system hardening.. In-depth knowledge of Layer 2 and Layer 3 networking protocols, encryption standards, and communication protocols, including but not limited to: TLS/SSL, IPsec, SSH, BGP, VLAN, LLDP, LACP, ARP, 802.1X, DNS, AES, and NTP.
$17 million contract awarded by U.S. Space Force’s Space Systems Command (SSC) to offer its zero trust access control.. Named in Gartner research on Cyber-Physical Systems Protection Platforms, Zero Trust Network Access, Remote Privileged Access Management, and CPS Secure Remote Access.. In-depth understanding and practical knowledge of LAN, WAN, firewalls, routers, VPN, IPSec, DPI. Experience in crypto, PKI, Microservice architecture and large scale infrastructure.. Strong communication skills and expert system level skills on Linux OS such as Ubuntu, Alpine, Red Hat Linux
Work with cybersecurity teams to integrate SIEM (e.g., Splunk, Sentinel, QRadar) and threat intelligence solutions.. Automate network operations using Python, Ansible, Terraform, and REST APIs. Implement log management and correlation for security event detection.. Experience with Cisco, Juniper, Palo Alto, Fortinet, and Aruba network solutions.. Proficiency in network security solutions (NGFW, IPS/IDS, SIEM, NAC, DDoS protection).. Scripting and automation skills in Python, Ansible, Terraform, or PowerShell.
Under the direction of the VP, IT, the IT Security Analyst protects the organization's technology infrastructure, computer systems, networks, and data from security breaches and cyber threats, unauthorized access, and other security breaches.. Certified Ethical Hacker (CEH). Certified Information Security Manager (CISM). Three plus years of experience in Security Roles, Cybersecurity / IT Security Analyst roles focused on critical infrastructure for IT/OT environments and security. Advance security certification (preferred), such as CISSP, CISM, CRIC, CISA, CGEIT.
Minimum Clearance Required to Start: minimum a DoD Industrial Security Clearance of at least SECRET. NexThreat is seeking an experienced Cyber Security Engineer III. Tasks will include designing, implementing, and maintaining security systems; conducting vulnerability assessments and penetration testing; developing and enforcing security policies and procedures; and responding to security incidents. The role requires a deep understanding of cybersecurity principles, technologies, and best practices, often with experience in areas like network security, cloud security, endpoint protection, and incident response. Risk Management Framework (RMF), and the implementation of Cybersecurity and IA boundary defense techniques and various Ienabled appliances. Examples of these appliances and applications are Firewalls, Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Switch/Routers, Cross Domain Solutions (CDS), EMASS and, Endpoint Security Solution (ESS);
Hands-on experience with IDS/IPS, VPNs, SD-WAN, and cloud security controls.. Deep knowledge of network security monitoring and threat intelligence tools.. Proficiency in securing LAN/WAN environments, firewalls (Palo Alto, Cisco, Fortinet), and cloud-based security.. Familiarity with SIEM, intrusion detection/prevention systems, and vulnerability management.. CCNA, CCNP, CCIE, CISSP, MCSE, MCSA, or equivalent.
As a Network Security Systems Engineer, you will leverage your deep expertise in network architecture, advanced security protocols, and DoD systems to inform the design, implementation, and defense of secure networks critical to national security.. Guide comprehensive security audits, penetration testing, and risk assessments, proactively identifying vulnerabilities and developing sophisticated mitigation strategies. Experience implementing and managing COMSEC solutions and cross-domain security controls. and Rust, and their application in network security. Industry-recognized cybersecurity certification (e.g., Security+, CISSP, CEH, CASP+) or a relevant networking certification (e.g., CCNA Security, CCNP Security) is desired