Monitor, administer, securely install, configure, and maintain network equipment such as routers, switches, firewalls, Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS), network encryption devices Tactical Fastlane (TACLANE) and Electronic Key Management System (EKMS), load balancers, domain name system (DNS) appliances, F5, AnyConnect, ClearPass, SolarWinds, Palo Alto Firewalls and wireless infrastructure.. Perform disaster recovery operations and data backups when required.. Design, install, configure, test, manage, monitor, support, and troubleshoot all storage and backup components, including addressing disaster recovery site requirements and remotely managing datacenter locations.. Ensure the infrastructure supporting backups is reliable and available.. Required Professional and Vendor Certifications: Security + and 8570 certifications i.e. CCNA
The Network Administrator III is responsible for all aspects of the network administration, including: network implementation, configuration, maintenance, troubleshooting, network security, usage monitoring, enforcement of network standards, and other work as required.. Incumbents are expected to be proficient in the Open Systems Interconnection (OSI) model, client and server systems, systems analysis and architecture, application configuration and integration, telecommunication administration, organizational techniques, application security administration, backup and disaster recovery systems, and related processes used in the Information Technology (IT) Department.. Oversee or perform technical support in the administration and maintenance of network hardware, firewalls, network security devices, internet connectivity, VPN, client/server applications, operating systems, telephone systems, and all other related information and office automation systems and networking hardware or software.. Define and implement internet security using network firewalls, internet content filtering software, intrusion prevention systems, and other current network security techniques using the latest technology.. Proficiency must be demonstrated with the various Windows, Cisco, and Juniper platforms in architecture, design, installation, troubleshooting, and maintenance.
The Network Administrator III is responsible for all aspects of the network administration, including: network implementation, configuration, maintenance, troubleshooting, network security, usage monitoring, enforcement of network standards, and other work as required.. Incumbents are expected to be proficient in the Open Systems Interconnection (OSI) model, client and server systems, systems analysis and architecture, application configuration and integration, telecommunication administration, organizational techniques, application security administration, backup and disaster recovery systems, and related processes used in the Information Technology (IT) Department.. Oversee or perform technical support in the administration and maintenance of network hardware, firewalls, network security devices, internet connectivity, VPN, client/server applications, operating systems, telephone systems, and all other related information and office automation systems and networking hardware or software.. Define and implement internet security using network firewalls, internet content filtering software, intrusion prevention systems, and other current network security techniques using the latest technology.. Proficiency must be demonstrated with the various Windows, Cisco, and Juniper platforms in architecture, design, installation, troubleshooting, and maintenance.
The Network Administrator III is responsible for all aspects of the network administration, including: network implementation, configuration, maintenance, troubleshooting, network security, usage monitoring, enforcement of network standards, and other work as required.. Incumbents are expected to be proficient in the Open Systems Interconnection (OSI) model, client and server systems, systems analysis and architecture, application configuration and integration, telecommunication administration, organizational techniques, application security administration, backup and disaster recovery systems, and related processes used in the Information Technology (IT) Department.. Oversee or perform technical support in the administration and maintenance of network hardware, firewalls, network security devices, internet connectivity, VPN, client/server applications, operating systems, telephone systems, and all other related information and office automation systems and networking hardware or software.. Define and implement internet security using network firewalls, internet content filtering software, intrusion prevention systems, and other current network security techniques using the latest technology.. Proficiency must be demonstrated with the various Windows, Cisco, and Juniper platforms in architecture, design, installation, troubleshooting, and maintenance.
Hireteq is looking for a Cyber Security engineer for a Fulltime role with our client. Minimum of 6 years of related experience in the field of Cybersecurity with expertise in two or more domains like Network Security, Data Protection, Container Security, Endpoint Security, and Cloud Security. Cloud / Container Security: Experience with Kubernetes Security, Container security / CNAPP (Cloud-Native Application Protection Platform tools, CI/CD security policies, GitOps/ Infrastructure as Code. Network Security: Secure Web Gateways, Secure Access Secure Edge (SASE), Firewalls, IDS/IPS technologies.. Endpoint Security: Endpoint Detection and Response, Endpoint Protection, NGAV, DLP and Firewall technologies
Stays abreast of competitive landscape and emerging technologies to best position Comcast Business Services in the marketplace.. Develops sales territory, including cultivation of local partnerships and organizational affiliations.. Actively generates new leads with targeted businesses through various prospecting activities, including cold calling, canvassing, customer referrals and partner relationships.. Demonstrates some knowledge of Network Design, MAN technologies & designs including DSx, OC-x, WDM, Ethernet, Internet Technologies, Functionality & Services, Voice Network Technologies (including VoIP), Data Networking Technologies, Functionality & Services (LAN, MAN, WAN, VPN), Networking Protocols (with an emphasis on Layers 1,2, & 3), Customer Premise Equipment (voice & data), Business Continuity/Disaster Recovery concepts and E-rate Contracting Processes and Procedures.. Most sales positions are eligible for a Commission under the terms of an applicable plan, while most non-sales positions are eligible for a Bonus.
We work with thousands of companies like Venmo, SoFi, several of the Fortune 500, and many of the largest banks to make it easy for people to connect their financial accounts to the apps and services they want to use.. This team is responsible for secure data storage and loss prevention, key management, identity platform, internal authentication systems (employee, device, and service authentication), internal permission management, and access control.. The team also owns several critical services such as Key Management System, Secure Token Service, Sensitive Information Store, Zero Trust Access Gateway, Internal Permissions Dashboard, Internal Authorization Service, and the Vulnerability Management platform.. Leading a skilled software engineering team to deliver on increasingly impactful and ambitious objectives across many security domains, including: Zero Trust, Data Security, Identity and Access Management, Data Loss Prevention, Vulnerability Management, and Supply Chain Security and Integrity.. End-to-end ownership of comprehensive security controls that scale across Plaid's microservices and data platforms and enable efficient and secure product delivery.
10+ years of proven experience in red team operations, penetration testing, and vulnerability assessment. Proficiency with red team tools (e.g., Cobalt Strike, Metasploit, BloodHound, etc.). Proficiency with developing and executing test plans, scripts, and procedures for red team operations. Working knowledge of regulatory and industry security standards (e.g. GDPR, HIPAA, PCI DSS, SOX, NIST, DORA and GLBA). Relevant certifications (e.g., OSCP, CRTO, CEH, CISSP) are a plus
Piper Companies is seeking a Network Security Consultant (Strata) to join a premier cybersecurity organization.. Collaborate with customer's security & network teams to build confidence across the business units impacted by the change to Palo Alto Networks. 5 years of experience with network/security solutions and technologies (BGP, SD-WAN concepts, VXLAN, general routing and switching). High level of experience with Panorama and log collectors. Detailed technical experience in the installation, configuration, and operation of high-end firewall appliances, ideally Palo Alto Networks products
Cyber Threat Intelligence Analyst. Job Description Work as a member of a threat intelligence team responsible for understanding how emerging cyber threats impact the client organization while conducting highly detail-oriented security threat analysis and working with clients to validate and characterize threats.. Perl, or Java Experience with SIEM and Endpoint tools, including Splunk, Defender, QRadar, and ArcSight Experience with penetration testing CEH and Security+ or CSA+ Certification GIAC Cyber Threat Intelligence (GCTI) Certification Clearance: Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information; Top Secret clearance is required.. Benefits: Gridiron offers a comprehensive benefits package including medical, dental, vision insurance, HSA, FSA, 401(k), disability & ADD insurance, life and pet insurance to eligible employees.. Our capabilities include IT Infrastructure & Cloud Services, Cyber Security, Software Integration & Development, Data Solution & AI, and Enterprise Applications.
As a Cyber Threat Intelligence Analyst, you will play a crucial role in identifying and mitigating cyber threats, enhancing NGA's security posture, and protecting critical assets.. Cyber threat intelligence services shall develop and disseminate reports to internal and external stakeholders based on events, alerts, and incidents on NGA systems and networks.. Conduct analysis and research on emerging threats and intelligence by collecting and analyzing commercial and government cyber intelligence reports to provide actionable cyber intelligence to support incident response, vulnerability management, and other cybersecurity initiatives.. Develop, review, and when properly authorized by the Government, disseminate NGA CSOC developed Cyber Intelligence products to internal to NGA and external DoD and IC partners, to include but not limited to threat intelligence reports, significant cyber activity reports, incident investigation reports, and other products as directed by the Government. Coordinate with NGA entities, to include but not limited to Cyber Counterintelligence, Insider Threat, and Red/Blue Team to perform adversary profiling and threat modeling
Overview Abile Group has an exciting and challenging opportunity for a Cyber Threat Intelligence Analyst on a 10 year contract providing Network and Cybersecurity services supporting an Intelligence Community customer.. Conducts analysis and research on emerging threats and intelligence by collecting and analyzing commercial and government cyber intelligence reports to provide actionable cyber intelligence to support incident response, vulnerability management, and other cybersecurity initiatives.. Monitors and assesses the global threat landscape, including threat actors, malware, hacking techniques that may impact NGA systems and networks.. Develops, reviews, and when properly authorized by the Government, disseminates NGA CSOC developed Cyber Intelligence products to internal to NGA and external DoD and IC partners, to include but not limited to threat intelligence reports, significant cyber activity reports, incident investigation reports, and other products as directed by the Government.. Coordinates with NGA entities, to include but not limited to Cyber Counterintelligence, Insider Threat, and Red/Blue Team to perform adversary profiling and threat modeling.
- Must have an active Top Secret clearance with an ability to obtain TS/SCI clearance. - Strong experience with Cyber Security Incident Response training and mentoring. - Prior experience with SIEM Technologies (Splunk). It comprises three industry-leading businesses – Collins Aerospace Systems, Pratt & Whitney, and Raytheon.. Its 185,000 employees enable the company to operate at the edge of known science as they imagine and deliver solutions that push the boundaries in quantum physics, electric propulsion, directed energy, hypersonics, avionics and cybersecurity.
The Security GRC Specialist - Regulatory Lead is an experienced professional in Information Security Governance, Risk management and Compliance functions.. Proficient with MS Office, project management processes, and at least one GRC tool (highly preferred to have experience with RSA Archer). Solid understanding of common security topics (, application security, infrastructure security, vulnerability management, Identity and Access Management, data protection, cyber incident response, cloud security, etc.). Experience in managing risk and compliance (IT audit, IT or cyber risk management, regulatory compliance). Ability to work towards or has achieved at least one Information Security or Risk Management Certification (Security+, CISSP, CCSP, CCSK, CISA, CISM, GSEC, CRISC, etc.)
As Global Cybersecurity Senior Counsel, you will be responsible for advising and providing legal support to Dell’s Chief Information Security Officer and global cybersecurity organization and the Fraud Investigations team under the VP - Global Security Operations, within the Security and Resiliency Organization (SRO).. As part of your role, you will work on some of the most cutting-edge legal issues in partnership with cross-functional business functions including: IT, Privacy, Supply Chain Security, Governance Risk & Compliance and Global Audit.. Provide primary legal counsel to Dell’s CISO and broader cybersecurity organization, including the cybersecurity incident response team (CSIRT), and the VP – Global Security Operations and Fraud Investigations team, on security incidents/data breach and fraud investigations and advise on response and remediation activities.. JD and admission to practice law in the United States with a minimum of 5-7 years relevant law firm, in-house or government experience with a focus on cybersecurity, incident response and compliance.. Experience with counseling clients on cybersecurity and IT compliance matters, insider threat, risk management and audits.
A well-established law firm is looking for an associate with at least 2 years of privacy and cybersecurity experience to join our team in any of our U.S. offices. The ideal candidate should have expertise in advising on cybersecurity compliance, counseling, and incident response, along with a good understanding of U.S. state, federal, and international privacy regulations (e.g., CCPA, COPPA, GDPR, GLBA, HIPAA, TCPA). CIPP or other relevant industry certification is a plus. JD from an ABapproved law school with excellent academic credentials. Interested applicants should submit a resume, law school transcript, and cover letter.
Administration of office WAN/LAN and Unifi Networking and WiFi. Administration of cloud and network infrastructure (VMW, Azure, AWS, GCP). Administration of infrastructure backups, restoration, and disaster recovery testing. Advanced Unifi Networking administration and devices. Understanding of Okta, Zoom, Office , Slack and G-Suite
With an open SaaS platform that supports easy consolidation and enrichment of any data, DataVisor's solution scales infinitely and enables organizations to act on fast-evolving fraud and money laundering activities in real time. Engage with internal business teams on projects to assess for security risk and help deliver secure solutions via threat modeling, code review, penetration testing, and enforcing secure development lifecycle.. Actively participate in Incident Management, Change Management, Security Policy Management and Security Incident Response.. Perform SAST, DAST, Internal Penetration testing on the Applications and the Infrastructure.. Understanding of key security concepts such as cryptography, authentication, authorization, security protocols, or security vulnerabilities as applied to web application security and Cloud-based services
Knowledge of relevant regulations such as GDPR, HIPAA, PCI DSS, and industry-specific requirements.. Governance, Risk, and Compliance (GRC) and Identity and Access Management (IAM). Certified Ethical Hacker (CEH). Certified Information Security Manager (CISM). Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations.
A client of Innova Solutions is immediately hiring an Information Security Systems Engineer III. Experience administering Next Generation Firewalls (NGFW) (Fortinet, Cisco, or Palo Alto).. Experience with deployment and administration of Enterprise host intrusion and detections systems (Carbon Black or Sentinel One preferred). Benefits: Innova Solutions offers benefits( based on eligibility) that include the following: Medical & pharmacy coverage, Dental/vision insurance, 401(k), Health saving account (HSA) and Flexible spending account (FSA), Life Insurance, Pet Insurance, Short term and Long term Disability, Accident & Critical illness coverage, Pre-paid legal & ID theft protection, Sick time, and other types of paid leaves (as required by law), Employee Assistance Program (EAP).. One of the Largest Staffing Firms in the US – Ranked #13 by Staffing Industry Analysts (SIA, 2024; includes Innova Solutions, Volt, & HireGenics)