DoD Public Key Infrastructure (PKI) Service.. Network Security Incident Response and Reporting.. Certified Information Security System Professional (CISSP) or Certified Information Security Manager or Cyber Security Leadership Certification (GSLC).. Must have experience overseeing and managing unified communications. Must be posses an active Secret security clearance and have the ability to obtain a Top Secret.
Division Manager @ Daley And Associates | IT Staffing, Permanent Placement and Executive Search. No relocation assistance provided.. Monitor security incidents, investigate threats, and lead incident response.. Expertise in network security, cloud security, identity management, and encryption.. Proficiency in security tools (SIEM, vulnerability management, incident response).
Join to apply for the Practice Director, Cyber and Information Security Services role at Toptal. With $200+ million in annual revenue and team members based around the globe, Toptal is the world’s largest fully remote workforce.. Strong understanding of cloud security, network security, application security, and threat intelligence.. Experience with security tooling, including SIEM, endpoint protection, identity & access management, and vulnerability management.. Regularly and reliably attend scheduled virtual team meetings on camera.
Within Information Security we blend risk strategy, digital identity, cyber defense, application security and technology solutions as we consider the entire security lifecycle.. Responsibilities include performing digital forensic analysis, following security incident response standard methodologies, malware analysis, identify indicators of compromise, support remediation or coordinate remediation efforts of a security incident, and develop documentation to support the security incident response process.. 5+ years experience in incident response, computer forensics analysis and/or malware reverse engineering;. Understanding of electronic investigation, forensic tools, and methodologies, including: log correlation and analysis, forensically handling electronic data, knowledge of the computer security investigative processes, malware identification and analysis;. Hold or be willing to pursue related professional certifications such as GCFE, GCFA or GCIH
Manages and maintains cloud infrastructure (AWS, Azure, GCP), including virtualization (VMware, Hyper-V) and automation (Terraform, Ansible).. Microsoft Certified: Azure Administrator Associate. AWS Certified Solutions Architect - Associate. Red Hat Certified System Administrator (RHCSA). CompTIA CySA+ (Cybersecurity Analyst)
This role focuses on building a scalable, secure, and modular platform with expertise in data ingestion, API integrations, threat detection, identity management, UI dashboards, and microservices architecture.. Experience developing customizable, interactive dashboards with cybersecurity-specific visualizations (e.g., MITRE ATT&CK mappings, threat timelines). Proficiency in microservices, Kubernetes, Docker, and CI/CD pipelines. Build secure REST, GraphQL, and Webhook APIs with integrations for platforms like CrowdStrike and Okta. Develop customizable dashboards with MITRE ATT&CK mappings, threat timelines, and drill-down features
Digital Consultants is seeking a Cybersecurity Engineer with strong systems and network engineering experience to support Counter-UAS and traditional Airspace Security networks and systems for a sponsor in Washington, DC. The ideal candidate is a hands-on practitioner with deep technical expertise in configuring, securing, and managing critical infrastructure in high-security environments.. Clearance: Top Secret/SCI. Ten (10) years of experience implementing and maintaining cybersecurity control requirements, including system hardening, vulnerability assessment, and incident response.. Hands-on experience with Cisco network infrastructure, Windows OS environments, and cybersecurity compliance processes (e.g., ATO).. Experience may include plan, implement, upgrade, and/or monitor cybersecurity measures to improve cyber defense and maintain a cyber-resilient network; assess cybersecurity vulnerabilities for risks and propose and implement remediation actions or risk mitigation strategies; ensure appropriate security controls are in place that will safeguard digital files and electronic infrastructure; and respond to computer security breaches to re-establish protections and make required reports.
We use advanced cryptography called zero-knowledge proofs to scale Ethereum infinitely without compromising on security or decentralization.. Oversee vulnerability management, detection, and incident response.. Hands-on experience with threat modeling, penetration testing, intrusion detection, and forensics.. or Golang - Rust is preferred, but not required.. Experience working in blockchain or zero-knowledge proof-based systems.
Network Security Engineer (Public Trust Clearance). Identify and manage projects related to IT security and overall enterprise operations and maintenance, to include the task delegation and status reporting while coordinating activities within the Network and Systems teams and across the IMT department.. Analyzes and reviews IT and physical security events, and traffic flows escalated from automated detection systems utilizing commercial Security Incident and Event Management (SIEM [Tripwire software]), Intrusion Detection and Prevention Systems (IDS/IPS [Palo Alto, Cisco ASA, McAfee, Ironport software]) and log management and database activity monitoring.. Possesses recent (within 1 year) and relevant practical experience using Retina, Gold Disk, Wireshark, Snort, Logger, Nessus, NeXpose, Metasploit, and other security and web assessment tools.. Possesses experience building and maintaining System Security Plans, Incident Response Plans, Contingency Plans and Exercises, Continuity of Operations Plans and exercises, Risk Management Plans and Vulnerability Management Plans in accordance with FISMA, and NIST guidelines.
We are seeking a highly skilled Network Security Engineer to join our growing IT security team in London.. Proficiency in configuring and managing security technologies such as Cisco ASA, Palo Alto, Fortinet, or Check Point firewalls.. Hands-on experience in incident response, threat hunting, and forensic analysis.. Professional certifications such as CISSP, CISM, CEH, CCNP Security, or equivalent.. Experience with cloud security in AWS, Azure, or Google Cloud.
We use advanced cryptography called zero-knowledge proofs to scale Ethereum infinitely without compromising on security or decentralization.. Oversee vulnerability management, detection, and incident response.. Hands-on experience with threat modeling, penetration testing, intrusion detection, and forensics.. or Golang - Rust is preferred, but not required.. Experience working in blockchain or zero-knowledge proof-based systems.
We use advanced cryptography called zero-knowledge proofs to scale Ethereum infinitely without compromising on security or decentralization.. Oversee vulnerability management, detection, and incident response.. Hands-on experience with threat modeling, penetration testing, intrusion detection, and forensics.. or Golang - Rust is preferred, but not required.. Experience working in blockchain or zero-knowledge proof-based systems.
Our Client is seeking a passionate and driven Cybersecurity Consultant – Cyber Risk & Architecture).. The ideal candidate will have a strong foundation in cyber security governance, design, and architecture, and will play a key role in ensuring the secure implementation of IT solutions across a range of enterprise environments.. A degree in Cyber Security, Information Technology, or a related field, or possession of a recognized professional cybersecurity qualification (e.g., CISSP or equivalent).. Minimum 2 years of experience in the cybersecurity domain, particularly in governance, architecture, and design.. Strong understanding of enterprise security technologies, such as: Endpoint Security Identity and Access Management Network Security Data Loss Prevention Vulnerability and Compliance tools
Conduct cybersecurity awareness training, technical advisory and consultancy through regular security messages, eLearning or webinars.. Assist Head Cybersecurity on their investigations where necessary on computer security breaches.. Experienced in systems and tools: Nessus VA, Compliance Scan, Trellix, Trendmicro AV, Windows/Linux.. CISM (Certified Information Security Manager). SSCP (Systems Security Certified Practitioner)
We are seeking a skilled Versa SD-WAN Network Engineer/Architect to lead the design, deployment, optimization, and support of secure SD-WAN solutions for enterprise clients.. Key Responsibilities: Lead the design, deployment, and optimization of Versa SD-WAN solutions, ensuring seamless implementation across client environments.. Experience configuring and provisioning Versa SD-WAN devices and services.. Cloud & Infrastructure: Experience with hybrid cloud networking including platforms like AWS, GCP, OpenStack. Engineering services include Data Translation, CAD/CAM/CAE, Process & Product Engineering, Prototyping, and Testing/Validation within a wide range of markets and industries.
Set up WAN/LAN interfaces, NAT configurations, and firewall policies to ensure secure and reliable network connectivity. Implement both static and dynamic routing protocols within firewall environments. Implement structured cabling and networking solutions using equipment from CISCO, Juniper, and Alcatel. Hands-on experience with network protocols (TCP/IP, BGP, OSPF, VLANs) and firewall configuration.. Certifications such as CCNA, CCNP, PCNSE, NSE or equivalent are advantageous.
As a Senior Threat Intelligence Analyst on Insikt Group’s Strategic and Persistent Threats (SPT) team, you will lead efforts to track state-sponsored APT campaigns, mentor peers in intrusion analysis, represent Insikt Group’s expertise externally, and support Recorded Future’s Analyst-on-Demand service.. Experience with open-source intelligence-gathering tools and techniques. Experience with Windows, iOS, Android, macOS, or malware analysis. Proficiency in a high-priority foreign language, with preference for Arabic, Chinese, Farsi, Korean, Portuguese, Russian, or Spanish. Blog & Podcast: Learn everything you want to know (and maybe some things you’d rather not know) about the world of cyber threat intelligence
Oversee regulatory responses (e.g., OCR, SEC, FTC, state AGs, GDPR authorities) and manage complex multi-jurisdictional notification strategies.. CIPP or other privacy certifications preferred but not required.. Ability to operate fully remote or work hybrid in any major U.S. market.. Government Audit Partner - GPS & NFP Industry Lead Tax Partner - Transferrable Book or firm Cincinnati, OH. General Manager | Ohio Markets Shaner Hotel Group General Manager, VetRad (Veterinary Teleradiology - Remote) Engineering Manager - Public Cloud, Python, Golang Engineering Manager - Public Cloud, Python, Golang Cleveland, OH
Role Summary As a member of Splunk's Workforce Identity and Access Management (IAM) team, the Senior Security Engineer will lead the design and implementation of identity services and platforms, mainly Privileged Access Management (PAM) solutions.. What you'll get to do Work with IAM Leads to develop and drive PAM strategy, roadmap, and plan. Lead the design, engineering, and deployment of Privileged Access Management (PAM) solutions. Demonstrated ability in IAM with 5+ years of experience in implementing, integrating, and supporting end-to-end Privileged Access Management (PAM) solutions. Hands-on production experiences with PAM products such as CyberArk, Delinea, BeyondTrust
Junior Network Administrator. Hybrid with 3 days a week onsite.. Support incident response efforts by identifying, analyzing, and escalating potential security threats. Perform basic vulnerability scans and support patch management. Microsoft 365, Cisco and/or Fortinet experience would be a plus