Cybersecurity & Network Management Jobs
Secure enterprise systems with these Cybersecurity & Network roles. Prevent breaches, protect data, and maintain robust IT infrastructures.
Conduct regular vulnerability assessments, penetration testing, and risk analysis to identify potential threats and weaknesses in the organization’s infrastructure.. Proficiency in security tools such as SIEM, anti-virus software, IDS/IPS, and vulnerability scanners.. Experience with cloud security (AWS, Azure, Google Cloud) and securing cloud infrastructure.. Certified Ethical Hacker (CEH). Certified Information Security Manager (CISM)
Support vulnerability and threat assessment operations.. Monitoring and maintaining endpoint protection and response (EDR) and Security Orchestration, Automation and Response (SOAR) systems.. Monitoring and maintaining the Enterprise Vulnerability Management and Penetration Testing programs.. 3-7 years: Experience working with network security platforms such as Endpoint Protection, Threat Intelligence.. 3-7 years: Experience with administration of modern operating systems (e.g.- Windows Server, Windows Desktop and Linux).
Zachary Piper Solutions is seeking a PKI Cyber Consultant to join a long-term DOD program located in Ft Meade, Maryland.. Responsibilities for the PKI Cyber Consultant include: Provide PKI expertise to help the infrastructure including the cloud, network boundaries, cross domains, and endpoint technologies.. Brief senior leadership on defensive strategies, threat analysis, and enterprise-wide PKI policies.. Required Qualifications for the PKI Cyber Consultant include: 8 years of experience in Information Technology or related DOD environments Expertise with Public Key Infrastructure (PKI) Experience with Windows Servers, IP Addressing and maintenance, key network monitoring protocols, vmware, etc.. IAT II Certification such as Sec+ or CySa+ Active Top Secret Clearance with SCI eligibility Compensation for the PKI Cyber Consultant include: Compensation: $
Our client is seeking a Full-Time Manager, Cybersecurity Operations to support US based LNG export facility and service the global demand for North American natural gas.. Provide regular updates to leadership and stakeholders on cybersecurity performance, key performance indicators (KPIs), and threat intelligence.. In-depth knowledge of cybersecurity principles, including network security, application security, threat intelligence, and incident response.. Expertise in vulnerability management, cloud security, and endpoint protection.. Relevant certifications such as CISSP, CISA, or CISM preferred.
Security Solutions & Architecture: Design, implement, and manage security solutions, including firewalls, intrusion detection systems, endpoint protection, and cloud security.. Threat Management & Incident Response: Conduct risk assessments, identify vulnerabilities, and respond to security incidents with root cause analysis and remediation.. Strong knowledge of network security, encryption, security protocols, and cloud security (AWS, Azure, Google Cloud).. Experience with security tools (SIEM, firewalls, IDS/IPS, endpoint protection) and scripting languages (Python, PowerShell, Bash).. Relevant certifications such as CISSP, CISM, CEH, or CompTIA Security+ preferred.
As a leader in media workflow automation, video processing, quality monitoring, and live streaming solutions, we empower the biggest names in media, entertainment, and technology—including CBS, BBC, CNN, FOX, and Comcast—to deliver flawless video experiences.. We are looking for an Information Security Manager to drive our cybersecurity, risk management, and compliance efforts, ensuring that Telestream remains secure, compliant, and resilient against evolving cyber threats.. Lead vulnerability management, penetration testing, and security risk assessments to identify and mitigate threats.. 5+ years of experience in cybersecurity, information security, or IT risk management.. Strong experience with security tools such as SIEM, firewalls, EDR, IDS/IPS, IAM, and cloud security solutions.
Develop and maintain comprehensive documentation for network topology, detailed diagrams, runbooks, and maintain a repository for Infrastructure/network/security documentation using tools such as Confluence, SharePoint, or Atlassian.. Hands-on experience with network technologies, including Aruba/Cisco/Arista, Fortinet, Palo Alto, Aruba enterprise wireless infrastructure or equivalent.. Experience with SIEM, IDS/IPS, endpoint security, and penetration testing tools.. Familiarity with cloud Infrastructure and security (AWS, Azure, Google Cloud) and hybrid network environments.. Scripting and automation experience (Python, PowerShell, or Bash) Relevant certifications preferred (CCNP, CISSP, or equivalent).
Corporate Recruiter/ Talent Acquisition/Strategic Recruitments/Employee HR Training@ Delta Electronics Americas Role: Sr. Information Security Specialist. Vulnerability Management Lead vulnerability scanning and penetration testing to identify weaknesses in the system and applications.. Security Monitoring & Risk Management Oversee and fine-tune security monitoring tools and SIEM (Security Information and Event Management) systems for proactive detection of suspicious activities.. Hands-on experience with vulnerability assessment tools and techniques (e.g., Nessus, OpenVAS, Nexpose).. Experience in incident response, digital forensics, and malware analysis.
Participate in regular network security assessments, vulnerability assessment, and assist in penetration testing to identify and mitigate potential risks.. Act as a technical writer to create, revise, and maintain security documentation and policies related to network security.. and network security technologies (Firewalls, SDWAN, Wireless, IDS/IPS, VPN, SIEM, etc. Experience with cloud security best practices and solutions (AWS, Azure, GCP).. Non-Sales employees may be eligible for a discretionary incentive bonus, while Sales employees may be eligible for a sales commission.
Design Secure Cloud Environments : Develop and implement cloud-native security architectures for platforms like AWS, Azure, and Google Cloud , incorporating zero-trust principles , identity and access management (IAM) , and data encryption strategies.. Harness Emerging Technologies : Evaluate the implications of AI, machine learning, IoT , and blockchain for cloud security, incorporating these innovations into client strategies.. Proficiency in container security technologies , including Kubernetes, Docker, and tools like Aqua Security, Prisma Cloud, or Sysdig.. Advanced certifications such as CISSP, CCSP, GIAC GCSA, GCPN, or SABSA.. Expertise in vulnerability management using tools like Qualys, Tenable, or Nessus, integrated with cloud security practices.
Experience designing and implementing secure cloud infrastructure as code (IaC) with tools like Terraform or Azure Resource Manager.. Proficiency with endpoint protection, extended detection and response (XDR), and enterprise mobility management (EMM) solutions like Microsoft Defender, CrowdStrike, or Palo Alto Cortex.. Experience with threat intelligence platforms (TIPs), SIEM solutions (e.g., Splunk, Sentinel), and threat-hunting techniques.. Understanding of security considerations in emerging areas like IoT/OT security, container security (Kubernetes, Docker), and blockchain.. Multiple Industry recognized Certifications i.e.: CCIE, GCIH, CISSP, CompTIA Security
Harden embedded Linux, RTOS, and bare-metal environments against cyber threats.. Conduct threat modeling, penetration testing, and vulnerability assessments.. Python, and embedded Linux security tools.. Understanding of hardware security features (TPM, HSM, ARM TrustZone, Secure Enclaves, etc. Security certifications (e.g., CISSP, OSCP, CEH, GIAC, or similar).
Providing in-depth expertise on securing Google Cloud environments (GCP), including designing and implementing security best practices for compute, storage, networking, and identity management.. Implementing and maintaining security controls and technologies, including firewalls, intrusion detection/prevention systems (IDS/IPS), endpoint detection and response (EDR), vulnerability scanners, and SIEM solutions.. Experience with security tools and technologies, such as SIEM, IDS/IPS, firewalls, endpoint detection and response (EDR), vulnerability scanners, and penetration testing tools.. Relevant certifications such as CISSP, CISM, GCIH, or similar are desirable.. Experience with compliance requirements (CCPA, PCI DSS, HIPAA, FISMA, SOX).
Builders Vision is an impact platform that aims to shift markets and minds for good in pursuit of our vision for a humane and healthy planet.. Implement and oversee formal security policies and procedures framework, covering areas such as access control, data protection, incident response, and change management.. Expert level knowledge of SIEM, EDR, IAM, and DLP.. Advanced certifications such as CISSP, CISM, or CRISC.. Knowledge of cloud security architecture and best practices for major cloud platforms (e.g., AWS, Azure, GCP).
Automate security processes using Infrastructure-as-Code (IAC) tools like Terraform and Ansible.. Strong knowledge of firewalls (Palo Alto, Cisco ASA, Fortinet), VPNs, IDS/IPS, and endpoint security solutions.. Proficiency in security automation, scripting (Python, Bash, PowerShell), and Infrastructure-as-Code (IAC) tools (Terraform, Ansible).. Certifications: CISSP, CCNP Security, CISM, CEH, AWS/Azure Security Specialty.. Knowledge of DevSecOps, CI/CD security pipelines, and security governance models.
Sr. VP IT Recruiting at Shain Associates Seeking an experienced Product Manager – Key Management to lead the strategy development and lifecycle management of enterprise key management and cryptographic security solutions.. Lead market research and analysis to identify emerging trends in cryptographic security, post quantum cryptography, and financial cybersecurity threats.. Stay ahead of advancements in post-quantum cryptography (PQC), confidential computing, homomorphic encryption, tokenization, and blockchain security.. Lead the adoption of Zero Trust security models, integrating key management with Identity & Access Management (IAM), Secure Enclaves, and Zero Trust Architecture (ZTA).. Security certifications such as CISM, CISSP, CCSP, and AWS Security Specialty.
We are seeking a highly skilled Cyber Security Manager to lead our organization's security efforts, with a strong emphasis on securing the Microsoft 365 platform and enterprise network infrastructure.. Enforce identity and access management (IAM), including MFA, conditional access policies, role-based access control (RBAC), and privileged identity management (PIM).. Conduct penetration testing, log analysis, and threat intelligence to proactively identify and remediate vulnerabilities.. Hands-on experience with firewalls, endpoint security, IDS/IPS, SIEM solutions, and vulnerability management tools.. Professional certifications such as CISSP, CISM, Microsoft Security certifications (SC-200, SC-300, SC-400), or CEH are preferred.
We are seeking a highly skilled Network Security Engineer to join our growing IT security team in London.. Proficiency in configuring and managing security technologies such as Cisco ASA, Palo Alto, Fortinet, or Check Point firewalls.. Hands-on experience in incident response, threat hunting, and forensic analysis.. Professional certifications such as CISSP, CISM, CEH, CCNP Security, or equivalent.. Experience with cloud security in AWS, Azure, or Google Cloud.
Network & Cloud Security – Secure infrastructure, applications, and cloud environments (AWS, Azure, Google Cloud).. Identity & Access Management (IAM) – Implement MFA, RBAC, and IAM best practices.. Information Security & IT Risk Management. Identity & Access Management (IAM, MFA, RBAC). Relevant security and networking certifications such as CISSP, CRISC, or CISM.
Industry-recognized certifications such as CompTIA Security+, Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP), or Certified Information Systems Security Professional (CISSP) are strongly preferred.. Network Security: In-depth understanding of network protocols such as TCP/IP, UDP, DNS, HTTP/HTTPS, and VPN. Proficiency in managing and configuring firewalls (e.g., Palo Alto, Fortinet, Cisco ASA), intrusion detection/prevention systems (IDS/IPS), and load balancers.. Endpoint Security: Experience with endpoint protection platforms such as CrowdStrike, Symantec, or Microsoft Defender for Endpoint.. Familiarity with cloud-native security tools like AWS GuardDuty, Azure Security Center, or Google Cloud Security Command Center.. Familiarity with infrastructure-as-code (IaC) tools like Terraform or Ansible is a plus.