Oversee Security Operations Center (SOC), incident response, vulnerability management, threat intelligence, and endpoint protection.. Drive the maturity of identity and access management (IAM), data loss prevention (DLP), zero trust architecture, and secure DevOps initiatives.. Strong technical foundation in network security, cloud security (GCP, AWS, Azure, OCI), security engineering, and incident response.. Relevant certifications (CISSP, CISM, CISA, CCSP, etc.. Mattel offers competitive total pay programs, comprehensive benefits, and resources to help empower a culture where every employee can reach their full potential.
Oversee Security Operations Center (SOC), incident response, vulnerability management, threat intelligence, and endpoint protection. Drive the maturity of identity and access management (IAM), data loss prevention (DLP), zero trust architecture, and secure DevOps initiatives. Strong technical foundation in network security, cloud security (GCP, AWS, Azure, OCI), security engineering, and incident response. Relevant certifications (CISSP, CISM, CISA, CCSP, etc. Mattel is a leading global toy and family entertainment company with an iconic brand portfolio including Barbie, Hot Wheels, Fisher-Price, and more.
Lead and evolve the enterprise cyber security program, aligning with business priorities, risk posture, and regulatory requirements.. Oversee Security Operations Center (SOC), incident response, vulnerability management, threat intelligence, and endpoint protection.. Drive the maturity of identity and access management (IAM), data loss prevention (DLP), zero trust architecture, and secure DevOps initiatives.. Build, lead, and mentor a high-performing, diverse cybersecurity team across technical and GRC domains.. Support cyber incident response planning, tabletop exercises, and executive-level simulations.
Meta Security is looking for an Incident Response Engineer with experience in the identification, containment, and mitigation of security incidents.. Knowledge of operating systems, file systems, and memory structures as well as experience in host and memory forensics (including live response) on Windows, macOS and Linux. Background in malware analysis, digital forensics, intrusion detection, and/or threat intelligence. Broad knowledge across the Security domain, as well as deep focus in one (or more) areas such as Logs and events processing, Incident Management, Digital Forensics, Detection and/or response tool development. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Experience with Cloud Identity and Access Management, network security, data security, regulatory compliance frameworks, and creating security architectures.. Experience in understanding attacks and mitigation methods, in two or more of the following: network protocols and secure network design; web application security, security assessments and pen testing, authentication and access control, applied cryptography and security protocols, security monitoring and intrusion detection, Incident response and forensics, development of security tools, automation or frameworks.. About the job As a Security Consultant, you will provide excellent technical guidance to customers adopting Google Cloud Platform (GCP) services.. You will provide prescriptive guidance in ensuring customers receive the best of what GCP can offer and will ensure that customers have the best experience in migrating, building, modernizing, and maintaining applications on GCP. Additionally, you will work closely with Product Management and Product Engineering to drive excellence in Google Cloud products and features.. Provide domain expertise in SecOps Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR), cloud security, compliance, and enterprise security best practices.
Support includes monitoring activities, developing cyber threat analysis, identifying mitigation and / or remediation courses of action, sharing actionable cyber threat intelligence used in organizational IT asset protection, trending strategic cyber threats, and situational awareness.. Analyze unclassified and classified sources of information and cyber threat intelligence on foreign and / or domestic cyber threats, including recommended mitigation and / or remediation actions.. Prioritizing cyber threat actor tactics, techniques, and procedures (TTPs), based on recent and relevant threat intelligence reporting.. Possess a strong cyber security background with experience in host-based and network based forensics related to the identification of advanced cyber threat activities, intrusion detection, incident response, malware analysis, and security content development (e.g., signatures, rules, etc.. Certifications: Certified Ethical Hacker (CEH) preferred
Conduct research in computer science areas relevant to NOSC operations, such as network security, intrusion detection, threat intelligence, and security automation.. Experience with network security, intrusion detection/prevention, malware analysis, threat intelligence, security information and event management (SIEM), or security automation.. Knowledge of specific application domains, such as incident response, digital forensics, or threat hunting.. FBI Special Agent: Cybersecurity/IT Expertise. Security (SOC) Analyst, Secret Clearance Required
At Aurascape, we are redefining the future of network security with cutting-edge solutions that are ground-up AI-native, Cloud-native, and leverage advanced gen AI technologies to safeguard organizations from ever-evolving cyber threats.. This role is ideal for someone with 4-8 years of experience who has deep knowledge of networking and security technologies and an enthusiasm for competitive intelligence and technical marketing.. Competitive Analysis: Conduct in-depth competitive analysis of network security products (including firewall, IPS, zero-trust architecture, cloud security, SASE) to identify strengths, weaknesses, opportunities, and threats in the marketplace.. Deep knowledge of network security architectures , including firewalls, intrusion detection/prevention systems (IDS/IPS), VPNs, SSL/TLS encryption and more.. Be part of an exciting startup opportunity at the forefront of AI-native, Cloud-native network security innovation.
Design and implement Zero Trust Network Security frameworks, including network segmentation, identity and access management and continuous monitoring.. Proven experience in designing and implementing Zero Trust network security frameworks using Palo Alto Network and/or Zscaler technologies. Sign in to set job alerts for "Director of Security" roles.. Assistant Store Director - Twin Cities, MN Assistant Store Director - Twin Cities, MN Assistant Store Director - Twin Cities, MN Director of Technology - Product Security (Application Security) Security Operations Center (SOC) Manager Minneapolis, MN $106,000.00-$170,000.00 1 week ago. Technical Communications Manager, Splunk Global Security (US Remote Available) Minnesota, United States $105,800.00-$160,000.00 2 weeks ago
Develop and implement automated solutions for network provisioning, configuration management, and security enforcement using tools such as Terraform, Ansible, or Python.. Hands-on experience with technologies such as Cisco, Palo Alto, Fortinet, Zscaler, Cloudflare, and SD-WAN solutions.. Experience with security automation tools (e.g., Terraform, Ansible, PowerShell, Python).. Familiarity with frameworks such as MITRE ATT&CK, NIST CSF, Zero Trust, and architectural models (e.g., TOGAF, SABSA).. Relevant certifications such as: CISSP, CISSP-ISSAP, GIAC (GCPN, GCIA) Cisco CCNP/CCIE Security, Azure/AWS Security Specialty TOGAF, Certified Cloud Security Professional (CCSP) DevSecOps or cloud-native architecture certifications
Perform continuous monitoring of enterprise networks using SIEM tools (e.g., Splunk Enterprise Security and Microsoft Sentinel). Strong understanding of incident response, threat hunting, and vulnerability management. GIAC Certified Incident Handler (GCIH). GIAC Certified Forensic Analyst (GCFA). Hands-on experience with threat intelligence platforms and malware analysis
The ideal candidate will be responsible for conducting cutting-edge research, with a strong emphasis on data analysis and trend reporting, to design and develop novel algorithms and systems that advance cybersecurity operations, threat detection, and incident response, ultimately improving cyber network defense.. Conduct research in computer science areas relevant to NOSC operations, such as network security, intrusion detection, threat intelligence, and security automation.. + Experience with network security, intrusion detection/prevention, malware analysis, threat intelligence, security information and event management (SIEM), or security automation.. + Knowledge of specific application domains, such as incident response, digital forensics, or threat hunting.. ManTech International Corporation, as well as its subsidiaries proactively fulfills its role as an equal opportunity employer.
Manager of Security & Technology. Configure and manage cybersecurity tools including firewalls, IDS/IPS, EDR, MDR. Hands-on experience with tools such as SIEM, EDR, MDR. Certifications such as CompTIA Security+, CEH, GCIH, or similar.. Experience with cloud security monitoring (AWS, Azure, GCP).
Expertise in threat analysis, incident response, vulnerability management, and data protection.. Advanced understanding of encryption, identity and access management (IAM), and security information and event management (SIEM).. CISSP required and Industry-recognized certifications such as CISM, CEH, CRISC, or equivalent is highly preferred.. Committed to delivering a Higher Level of Reliability, Acuren provides an unrivaled spectrum of capabilities including inspection, traditional and advanced NDE/NDT, failure analysis, rope access, materials engineering, field engineering, reliability engineering, drones, robotics, V-Deck and condition-based monitoring services.. Our work is critical to the integrity and safety of industrial firms, including petroleum refinery, pipeline, power generation, pulp & paper, mining, pharmaceutical, aerospace and automotive industries.
Lead the configuration, maintenance, and monitoring of network security devices (e.g., firewalls, IDS/IPS, NAC systems, proxies). Configure security for cloud & hybrid network security platforms (AWS, Azure, GCP, VMX). Relevant certificates (e.g., CCNA, CCSP, CompTIA Network+ m CompTIA Security+) are highly desirable.. CompTIA Security+ - General cybersecurity & network security fundamentals. Palo Alto Networks Certified Network Security Engineer (PCNSE) - Palo Alto firewall deployment, configuration, & security platform usage
Endpoint Security: Knowledge of endpoint security solutions such as antivirus, endpoint detection and response (EDR), and mobile device management (MDM) systems for protecting endpoints and ensuring compliance with security policies.. Cloud Security: Experience implementing cloud security best practices and controls in public cloud environments (e.g., AWS, Azure, Google Cloud), including identity and access management (IAM), encryption, data protection, and compliance monitoring.. Data Protection: Familiarity with data protection technologies such as encryption, tokenization, and data loss prevention (DLP) solutions to safeguard sensitive data across the organization's infrastructure.. Disaster Recovery and Business Continuity: Understanding of disaster recovery (DR) planning, backup and restore processes, and business continuity strategies to minimize downtime and ensure data availability in the event of a disaster or outage.. Compliance and Regulatory Requirements: Knowledge of industry-specific compliance standards (e.g., GDPR, HIPAA, PCI DSS) and regulatory requirements related to data privacy, security, and IT governance.
Leading the end-to-end security strategy for the company’s cellular network, ensuring compliance with Indonesian cybersecurity laws and telecom regulations.. Expertise in telecom network security architecture (5G, 4G, Core Network, NFV/SDN, Cloud).. Experience in penetration testing, ethical hacking, SOC management, and cyber intelligence.. Experience in Zero Trust Architecture, SIEM, SOAR, network forensics, and automated threat detection.. Strong knowledge of GSMA security guidelines, 3GPP security frameworks, and telecom fraud prevention.
Oversee IAM strategies, network protection, incident response, and system monitoring.. Manage security incidents and post-event analysis to improve resilience.. Drive role-based access controls and disaster recovery procedures.. Strong knowledge of cloud security (AWS preferred), IAM, and regulatory standards.. Bonus: CEH, CISA, CCSK, SANS/GIAC certifications
Install, maintain, and configure Cisco VoIP phone system, and voice mail systems. EDR/NDR/XDR solutions (e.g.: SentinelOne, Crowdstrike, Darktrace, ExtraHop, Carbon Black, Defender for Endpoint). Perimeter defense solutions such as IPS, IDS, Email Gateways (e.g.: Proofpoint, Mimecast, etc.). Privileged Access Management solutions (e.g.: CyberArk, Okta, etc). SIEM technologies (Cribl, Splunk Cloud/Enterprise, MS Sentinel, etc)
The Director, Cybersecurity Engineering & Operations will lead the design, implementation, and management of the organization’s cybersecurity infrastructure and operations, with a strong emphasis on IAM, DLP, Monitoring, Threat Intelligence analysis and compliance with financial regulations (e.g., PCI DSS, GDPR, SOX, FFIEC).. Oversee the integration of cybersecurity tools (e.g., Splunk, CrowdStrike, Palo Alto Networks, etc.). Oversee role-based access control (RBAC), multi-factor authentication (MFA), and privileged access management (PAM) solutions (e.g., SailPoint, CyberArk, Active Directory, etc. Manage identity lifecycle processes, including provisioning, de-provisioning, and regular access reviews, to ensure compliance with Korean SOX, GDPR, and PCI DSS.. · Expertise in SIEM (e.g., Splunk), EDR (e.g., CrowdStrike), and network security tools (e.g., Palo Alto).