Cybersecurity & Network Management Jobs

Secure enterprise systems with these Cybersecurity & Network roles. Prevent breaches, protect data, and maintain robust IT infrastructures.

IT SPECIALIST - SR. IT SPECIALIST - Cybersecurity2 days ago
Southwest Research InstituteSan Antonio, TX

Support vulnerability and threat assessment operations.. Monitoring and maintaining endpoint protection and response (EDR) and Security Orchestration, Automation and Response (SOAR) systems.. Monitoring and maintaining the Enterprise Vulnerability Management and Penetration Testing programs.. 3-7 years: Experience working with network security platforms such as Endpoint Protection, Threat Intelligence.. 3-7 years: Experience with administration of modern operating systems (e.g.- Windows Server, Windows Desktop and Linux).

Director, Information Security & Compliance4 hours ago
ConductorNew York, NY

We are looking for a Director, Information Security to join our team at Conductor reporting to our Chief Financial Officer.. Develops and oversees effective disaster recovery policies and standards to align with the enterprise business continuity management (BCM) program goals, Own technical security questionnaires, security policy reviews, configuration standards, third-party audits, Security process automation and tooling.. Certification in one or more of the following: Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA), Certified in Risk and Information Systems Control (CRISC) or other similar credentials is preferred.. Deep knowledge of SIEM, Vulnerability Management, Penetration Testing, IAM, IDS/IPS, advanced encryption at rest techniques, and other security protocols.. Experience dealing with external entities like auditors and customer Significant Experience with Amazon Web Services Experience with modern virtualization technologies (Docker, Kubernetes, etc.)

SOC Analyst4 days ago
ExelareJersey City, NJ

This role requires an individual who can effectively monitor, analyze, and respond to security incidents across multiple domains, including Network, Application, Cloud, DevSecOps, Endpoint, IoT, IAM, Incident Response, Threat Intelligence, Compliance and Risk, and Data Security.. Experience with vulnerability management and penetration testing tools (e.g., Nessus, Metasploit).. Familiarity with compliance standards (e.g., GDPR, HIPAA, PCI DSS).. Certifications (preferred):CompTIA Security+, CEH, CISSP, GSEC, or equivalent.. Certified Incident Handler (GCIH) or Certified Threat Intelligence Analyst (CTIA).

Cybersecurity AnalystMar 11
ManatalNew York, NY

Conduct vulnerability assessments and penetration testing to identify potential risks.. Familiarity with cybersecurity tools such as SIEM, IDS/IPS, endpoint protection, and vulnerability scanners.. Hands-on experience with incident response, risk assessment, and forensic analysis is a plus.. Nice to have: Industry certifications such as CompTIA Security+, CISSP, CEH, or OSCP.Why Join Us?. Our employees enjoy a work culture that promotes diversity, equity, and inclusion.

Security Cloud Engineer (Remote)Mar 03
JazzHRWashington, DC

Responsibilities:In-depth knowledge of cloud security best practices, principles, and technologies, including IAM, encryption, network security, container security, and serverless security.. Review the design and implement secure AWS cloud architecture solutions, including VPC configurations, security groups, IAM policies, encryption mechanisms, and logging and monitoring for the AWS cloud environment.. Responsibilities:Expertise in implementing, administrating and operating information security technologies such as firewalls, IDS/IPS, SIEM, Antivirus, network traffic analyzers and malware analysis tools.. May also leverage dynamic and static code assessment tools to measure vulnerability of applications throughout the SDLC.Minimum Education/Certification Requirements:BS Degree in IT, Computer Science, or Engineering, or equivalent experience Masters Degree in Engineering or Computer Science is Highly Preferred Skills: Skills Required / Desired Amount of Experience Minimum of 15 years of experience working in the field of Cloud cybersecurity.. Required 10 Years Strong understanding of AWS cloud security principles and best practices.

Senior Security ArchitectMar 26
CEIPAL CorpWilmington, DE

Lead/conduct vulnerability assessments, penetration testing, and red/purple teaming exercises.. Design and implement robust Identity and Access Management (IAM) and Role-Based Access Control (RBAC) models.. Experience in Implement data security measures, including data loss prevention (DLP) and encryption.. SME in Deploy and manage SIEM and SOAR platforms (Sentinel, Falcon FDR, Demisto).. SME Utilize EDR and XDR solutions (CrowdStrike, Defender) for endpoint protection.

Cyber Security NetworkMar 12
OorwinSanta Ana, CA

o Automate security processes using Infrastructure-as-Code (IAC) tools like Terraform and Ansible.. · Strong knowledge of firewalls (Palo Alto, Cisco ASA, Fortinet), VPNs, IDS/IPS, and endpoint security solutions.. · Proficiency in security automation, scripting (Python, Bash, PowerShell), and Infrastructure-as-Code (IAC) tools (Terraform, Ansible).. · Certifications: CISSP, CCNP Security, CISM, CEH, AWS/Azure Security Specialty.. Knowledge of DevSecOps, CI/CD security pipelines, and security governance models.

Cloud Security SMEMar 03
E - SolutionsStorden, MN

Cloud Security SME (also known as a cybersecurity specialist).. Security Architecture Design: Developing and implementing secure cloud architectures aligned with business requirements and compliance standards.. Security Awareness: Educating employees about cloud security best practices and promoting a security-conscious culture.. Areas of Expertise: Cloud Platforms: Deep understanding of major cloud providers (AWS, Azure) and their security features.. Threat Intelligence: Knowledge of emerging threats and attack vectors in the cloud environment.

Cybersecurity EngineerMar 03
WorkableColumbus, OH

Responsibilities: Implement and manage IAM policies (AWS IAM, Okta, Azure AD), enforce MFA, and ensure proper RBAC; conduct periodic User Access Reviews and implement access logging per compliance requirements.. Integrate and analyze threat intelligence feeds (e.g., VirusTotal, CrowdStrike) to detect and mitigate advanced threats.. Implement secure communication protocols, monitor data transmission, and enforce DLP (Data Loss Prevention) policies to prevent data exfiltration.. Hands-on experience with SIEM (e.g., Splunk, ELK stack), EDR/XDR (e.g., CrowdStrike, SentinelOne), IAM (e.g., Okta, Azure AD), and security automation tools (e.g., Ansible, Chef, Terraform).. Relevant certifications such as CISSP, CEH, Azure – Specialty, or similar cloud security certifications are a plus.

Director, Information Security & ComplianceMar 03
GarysGuideNew York, NY

We are looking for a Director, Information Security to join our team at Conductor reporting to our Chief Financial Officer.. Certification in one or more of the following: Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA), Certified in Risk & Information Systems Control (CRISC) or other similar credentials is preferred.. Deep knowledge of SIEM, Vulnerability Management, Penetration Testing, IAM, IDS/IPS, advanced encryption at rest techniques, & other security protocols.. Experience dealing with external entities like auditors & customer Significant Experience with Amazon Web Services Experience with modern virtualization technologies (Docker, Kubernetes, etc.). Ability to manage vendor/supplier relationships, including contract negotiation, ongoing maintenance & support, & problem-resolution Conductor's R&D organization is currently operating in a hybrid manner with the team working minimally two days in our NYC HQ office (Monday & Thursday) with work from anywhere the other three days)

Penetration Tester Cybersecurity SpecialistMar 07
CareerPlugHerndon, VA

Job Overview:We are seeking a skilled Penetration Tester with strong expertise in cybersecurity assessment, vulnerability management, and security tools such as Qualys, Nessus, Burp Suite, Metasploit, and more.. Strong understanding of network security, cloud security (AWS, Azure, GCP), and application security.. Deep knowledge of OWASP Top 10, MITRE ATT&CK framework, CVSS scoring, and security frameworks.. Certifications preferred: CEH, OSCP, GPEN, CISSP, or equivalent.. Nice to Have:Experience with cloud security testing in AWS, Azure, or GCP.Knowledge of Zero Trust security models and threat intelligence platforms.

Senior Security Cloud Engineer - RemoteMar 03
Lorven TechnologiesStorden, MN

Hands-on experience with cloud security tools and services such as AWS Security Hub, AWS native security services, Cloud Trail, guard duty, security groups, and Cloud Watch.. Review the design and implementation of secure AWS cloud architecture solutions, including VPC configurations, security groups, IAM policies, encryption mechanisms, and logging and monitoring for the AWS cloud environment.. Conduct vulnerability assessments and penetration testing on AWS infrastructure and applications.. Position Responsibilities: Expertise in implementing, administrating and operating information security technologies such as firewalls, IDS/IPS, SIEM, Antivirus, network traffic analyzers and malware analysis tools.. Utilizes advanced experience with scripting and tool automation such as Perl, PowerShell, Regex.

Incident Response And Threat Intelligence Specialist2 hours ago
PSEGBethpage, NY

Experience leveraging information security technologies such as antivirus, IDS/IPS, SIEM, endpoint detection & response, DLP, data encryption, proxies, and network access control as it relates to responding to cyber incidents.. Ability to provide technical expertise and support to clients, IT management and staff in cybersecurity threat risk assessments, development, testing and the implementation and operation of appropriate information security plans, procedures, and control techniques designed to prevent, minimize or quickly recover from cyber-attacks or other serious events.. Must demonstrate strong incident response and threat analysis experience, including leveraging SIEM technology.. Experience with key information security technologies such as SIEM, firewalls, intrusion detection/prevention systems, vulnerability assessment, encryption, identity and access control systems, anti-malware, and security event analysis. Experience working in a team environment, with experience teaching and learning from other team members.

Enterprise Security Architect2 hours ago
Southern Glazers Wine & SpiritsMiramar, FL

This individual understands IT Enterprise Architecture and works with the enterprise architects to ensure that security standards are created and implemented into SGWS's Enterprise Architecture frameworks.. Designing and implementing a robust and scalable security architecture that encompasses: Network security (firewalls, IDS/IPS, segmentation) Application security (web application firewalls, secure coding practices) Data security (encryption, data loss prevention) Endpoint security (endpoint detection and response, antivirus) Identity and access management (IAM) Cloud security (AWS, Azure, GCP) Developing and maintaining a security roadmap that aligns with industry trends and emerging threats.. Conducting threat modeling, risk assessments, and vulnerability management Developing and enforcing security policies, standards, and procedures Security harden Azure, GCP, AWS Identity as a Service (IaaS) and Platform as a Service (PaaS) infrastructure.. Implementing and managing security tools and technologies Collaborating with incident response teams to investigate and respond to security incidents.. Collaborate with incident response teams to investigate and respond to security incidents.

Cybersecurity Analysta day ago
Zoho RecruitManchester by the Sea, MA

Conduct vulnerability assessments and penetration testing to identify potential risks.. Familiarity with cybersecurity tools such as SIEM, IDS/IPS, endpoint protection, and vulnerability scanners.. Nice to have: Industry certifications such as CompTIA Security+, CISSP, CEH, or OSCP.. Nice to have: Industry certifications such as CompTIA Security+, CISSP, CEH, or OSCP. Benefits Why Join Us?. Our employees enjoy a work culture that promotes diversity, equity, and inclusion.

Network Security Architect Analyst4 hours ago
Crossfire ConsultingNew York, NY

Job Description: *TELECOMMUTING IS AVAILABLE UPON SUCCESSFUL COMPLETION OF AN ONSITE PERFORMANCE PERIOD AND AGREED UPON SCHEDULE. Responsibilities: Develop, implement, and manage comprehensive network security design, policies, plans, and procedures, encompassing security architectures, firewall policies, intrusion detection systems, and security data collection systems.. Assist in planning, implementing, and testing disaster recovery procedures, actively participating in formal risk assessments related to network operation and security.. Implement and maintain Azure and Windows Active Directory security measures.. Project Management experience is preferred, and relevant certifications such as CISSP, CCNA, or CompTIA Security+ are a plus.. Relevant certifications such as CISSP, CCNA, or CompTIA Security+ are a plus.

PKI Cyber Consultant3 hours ago
Piper CompaniesFort Meade, MD

Zachary Piper Solutions is seeking a PKI Cyber Consultant to join a long-term DOD program located in Ft Meade, Maryland.. Responsibilities for the PKI Cyber Consultant include: Provide PKI expertise to help the infrastructure including the cloud, network boundaries, cross domains, and endpoint technologies.. Brief senior leadership on defensive strategies, threat analysis, and enterprise-wide PKI policies.. Required Qualifications for the PKI Cyber Consultant include: 8 years of experience in Information Technology or related DOD environments Expertise with Public Key Infrastructure (PKI) Experience with Windows Servers, IP Addressing and maintenance, key network monitoring protocols, vmware, etc.. IAT II Certification such as Sec+ or CySa+ Active Top Secret Clearance with SCI eligibility Compensation for the PKI Cyber Consultant include: Compensation: $

Cybersecurity Analyst3 hours ago
Apex SystemsChesapeake, VA

Relevant certifications (, CISSP, CISM, CEH, CompTIA Security+) are highly desirable.. Minimum of 3-5 years of experience in cybersecurity, with a strong understanding of network security, endpoint security, and threat management.. Hands-on firewall configuration experince with Cisco and/or Palo Alto Proven experience in conducting risk assessments , vulnerability assessments, and incident response.. Key Responsibilities: - Develop, implement, and monitor a strategic, comprehensive enterprise cybersecurity and IT risk management program to ensure the integrity, confidentiality, and availability of information.. We do not discriminate or allow discrimination on the basis of race, color, religion, creed, sex (including pregnancy, childbirth, breastfeeding, or related medical conditions), age, sexual orientation, gender identity, national origin, ancestry, citizenship, genetic information, registered domestic partner status, marital status, disability, status as a crime victim, protected veteran status, political affiliation, union membership, or any other characteristic protected by law.

Cybersecurity Analysta day ago
Green ProfessionalsManchester by the Sea, MA

Conduct vulnerability assessments and penetration testing to identify potential risks.. Familiarity with cybersecurity tools such as SIEM, IDS/IPS, endpoint protection, and vulnerability scanners.. Nice to have: Industry certifications such as CompTIA Security+, CISSP, CEH, or OSCP.. Nice to have: Industry certifications such as CompTIA Security+, CISSP, CEH, or OSCP. Benefits Why Join Us?. Our employees enjoy a work culture that promotes diversity, equity, and inclusion.

Services Solutions Architect, SecurityMar 03
JobviteDallas, TX

Experience designing and implementing secure cloud infrastructure as code (IaC) with tools like Terraform or Azure Resource Manager.. Proficiency with endpoint protection, extended detection and response (XDR), and enterprise mobility management (EMM) solutions like Microsoft Defender, CrowdStrike, or Palo Alto Cortex.. Threat Intelligence and Incident Response Experience with threat intelligence platforms (TIPs), SIEM solutions (e.g., Splunk, Sentinel), and threat-hunting techniques.. Application and Data Security Knowledge of application security principles, including secure coding practices, application security testing (SAST/DAST), and DevSecOps integration.. Understanding of security considerations in emerging areas like IoT/OT security, container security (Kubernetes, Docker), and blockchain.