The role will support pre-sales/sales initiatives and provide thought leadership for the GCP practice.. Cloud Strategy and Design: Work with clients to understand their business needs and translate them into cloud architecture designs leveraging GCP services (Compute Engine, Kubernetes Engine, BigQuery, Cloud Storage, Pub/Sub, etc. Strong knowledge of GCP services (Compute Engine, Kubernetes Engine, BigQuery, Cloud Storage, etc. Proficiency in cloud-native technologies (Kubernetes, Docker, Terraform, etc. Experience with cloud security practices, including identity and access management (IAM), encryption, and network security.
The Security Architect must have hands-on experience with internet secure gateway, EDR, MDR, ITDR, secure email gateway, firewalls, MFA, scripting, policies, data classification, and cloud security controls. Provide security guidance for third-party risk management and vendor security evaluations. Strong knowledge of DevSecOps, security automation, and scripting (Python, PowerShell, Terraform). Okta, Microsoft Authenticator (MFA), Active Directory (AD), IAM. Strong knowledge of threat intelligence, SIEM, vulnerability management, and incident response.
Millennium Corporation is hiring a Red Team Penetration Tester to work in North Charleston. Provide support by utilizing experience conducting Red Team operations in an MDE environment. Provide support by performing web application and API penetration testing, and Cloud Security Audits. Must have a CFR, Cloud+, CySA+, GCED, GICSP or PenTest+ certification. Demonstrated experience performing vulnerability assessments with the Assured Compliance Assessment Solution (ACAS) tool.
The ideal candidate will have a strong background in cybersecurity, incident response, and threat intelligence, coupled with leadership experience.. Maintain and enhance SIEM (Security Information and Event Management) systems and other security tools.. Hands-on experience with SIEM, IDS/IPS, firewalls, and endpoint security solutions.. Proficiency in incident response, threat hunting, and forensic analysis.. Industry certifications such as CISSP, CISM, CEH, or GIAC are preferred.
As a Safeguards Analyst focusing on Cyber Harms, you will play a critical role in protecting our platform and users from cyber security risks through consistent policy enforcement and trend analysis.. Enforce trust and safety policies with a specific focus on detecting and mitigating potential cyber security risks and harmful use of AI systems. Handle user appeals and communications related to enforcement actions with professionalism and clarity. Experience in offensive cybersecurity, CTFs, or penetration testing (OSCP Certification is not required, but valued). Have a background in ethical hacking/pen-testing/malware analysis
We support a variety of customers including the Space Force’s Space Systems Command (SSC), the National Reconnaissance Office (NRO), and other civil customers (e.g. NASA, NOAA) in order to resolve unique challenges in protecting their ground networks and satellite systems from sophisticated adversaries.. Write software code in Python or Rust languages to develop and improve cybersecurity applications used by the Space Force and other government customers.. Work on teams and projects in the areas of software security, cloud security, container security, mission assessments, orchestration and automation technologies, spacecraft cyber analytics and continuous monitoring.. Experience using SIEM tools, SOAR/Orchestration tools, EDR tools, Penetration Test or Vulnerability Assessment tools, or Incident Response procedures and tools. Hold at least one current security certification (Sec+, CISSP, GSEC, etc)
We are seeking a Virtual Chief Information Security Officer (vCISO) to lead our client company's cybersecurity programs.. Develop and manage incident response plans and protocols to respond to cybersecurity incidents.. Ensure compliance with regulatory and industry standards, such as HIPAA, PCI-DSS, and GDPR.. Strong knowledge of cybersecurity frameworks, standards, and regulations, such as NIST, ISO, CIS, HIPAA, HI-Trust, PCI-DSS, CCPA and GDPR.. Relevant certifications, such as CISSP, CISM, or CISA, are preferred.
As a Vice President team lead member of the Data Loss Prevention (DLP) team, reporting to both the DLP Director and the Business Information Security Officer (BISO), the individual will oversee the monitoring of external electronic communication within the Mizuho environment.. DLP tools - accustomed to one or more DLP tools such as Microsoft DLP (Purview/Defender), Netskope, Global Relay, Archer, ServiceNow, or Securiti.. Certifications: CISM, CISSP, CISA, CIA - Preferred. Mizuho's 60,000 employees worldwide offer comprehensive financial services to clients in 35 countries and 800 offices throughout the Americas, EMEA and Asia. Mizuho Americas is a leading provider of corporate and investment banking services to clients in the US, Canada, and Latin America.. Through its acquisition of Greenhill, Mizuho provides M&A, restructuring and private capital advisory capabilities across Americas, Europe and Asia. Mizuho Americas employs approximately 3,500 professionals, and its capabilities span corporate and investment banking, capital markets, equity and fixed income sales & trading, derivatives, FX, custody and research.
Design, develop, and deploy security technologies and controls for Radian Group, including systems for Security Incident Response, Threat Management, Access Control Management, Security Analytics, Event Management, Network Firewalls, IPS/IDS systems, Vulnerability Assessment, Endpoint Security Controls, and Content Filtering.. CISSP certification required; CISM, CISA, CEH, ITIL, Black/Green belt, and Project Management certifications preferred.. Experience in Security Incident Response, Threat Management, Access Control Management, Security Analytics, Event Management, Network Firewalls, IPS/IDS systems, Vulnerability Assessment, Endpoint Security Controls, and Content Filtering.. We've been recognized by multiple organizations like Bloomberg's Gender-Equality Index, HousingWire's Tech 100, and The Forum of Executive Women's Champion of Board Diversity.. And it means seeing our purpose as one that extends beyond the bottom line - having an impact on communities across the country to help more people achieve the American Dream of homeownership.
This tactical role is ideal for professionals passionate about cyber defense, vulnerability management, threat analysis, and offensive security strategies.. As a Cyber Security Analyst at WarCollar Industries, you will work closely with various teams to maintain continuous situational awareness of cyber threats, collaborate on remediation efforts, and contribute to the development of security strategies.. Assist with threat data enrichment, curation, automation, and dissemination within a threat intelligence platform.. Proficiency with tools including Confluence, ServiceNow, JIRA, Tableau, PowerBI, and Excel.. Services include network defense, computer network attack, secure network design, penetration testing and vulnerability assessment.
Overview We are seeking a full-time Team Leader Identity and Access Management Security in our Olathe, KS location.. In this role, you will be responsible for being a technical subject matter expert with a proven track record in security policy, risk management, and access control.. In this role, you'll collaborate with various teams to identify and implement access control solutions for our internal systems.. In addition, this position will possess a solid understanding of information security principles and be adept at pinpointing gaps in access management.. Specifically, this position will drive our Cyber Security strategy with a focus on a deep conceptual grasp of IAM concepts applicable to our internal solutions.
About the Job: As a Consultant, you will be an active team member on cybersecurity consulting engagements; working on client site to deliver large-scale change initiatives for leading clients across Financial Services, either within Investment Banking, Retail Banking, Wealth and/or Insurance.. You'll work alongside industry leaders to gain insight and experience as the practice continues to expand.. What You’ll Get to Do: Assist with the design and development of Cyber policies, standards and procedures across various domains (e.g., Resilience, Data Security, IT Asset Management Governance, Digital Trust, Cloud Security, Application Security, etc.)
GEICO is seeking an experienced Senior Staff Engineer to solve complex Identity and Access Management-related challenges.. You will help drive our insurance business transformation as we redefine our Identity, Access Management, and Governance strategies.. ·Fluency in DevOps Concepts, Cloud Architecture, and Azure DevOps Operational Framework. ·Fluency and specialization with at least one modern language such as Java, Go, or Rust. Premier Medical, Dental and Vision Insurance with no waiting period
GovCIO is currently hiring for a Security Analyst to support Customs and Border Patrol Enterprise Network Architecture and Engineering Support Services (CBP ENAESS).. The Security Engineer for CBP ENAESS will design, implement, and test security controls to meet DHS and CBP security requirements.. They will collaborate with Information System Security Officers (ISSOs) and the Cyber Security Directorate (CSD) to engineer or re-engineer solutions to resolve Federal Information Security Management Act (FISMA) audit findings.. They will provide security-related information to the ISSO and obtain ISSO approval on CRs to implement a new solution or service or make changes to an existing solution or service.. Bachelor's with 8+ years (or commensurate experience) CBP
We deliver innovative equipment and components, specialty systems, consumable supplies, software and digital solutions, and support services through five operating segments: Engineered Products, Clean Energy & Fueling, Imaging & Identification, Pumps & Process Solutions and Climate & Sustainable Technologies. Build and oversee the Product security program and building security program management methodologies, aligning with the product development teams.. Management of penetration testing used to identify weaknesses in the transmission and storage of data.. Experience managing teams around Common Weakness Enumeration (CWE), Common Vulnerability Scoring System (CVSS), Common Vulnerabilities and Exposures (CVS and Open Web Application Security Project (OWASP. Encryption (both at-rest and in-transit) and related cryptography, authentication services
Wells Fargo is seeking a Senior Lead Digital Product Manager in Cybersecurity acting as a Product Owner as part of Identity Access Management (IAM).. 5+ years of experience in product management or product owner roles, with a focus on cloud security or cloud-native product development.. Relevant cloud security certifications (e.g., AWS Certified Security, Microsoft Certified: Azure Security Engineer, CISSP).. Ability to work a hybrid work schedule - 3 days a week on-site/in office and 2 days a week remote. They are accountable for execution of all applicable risk programs (Credit, Market, Financial Crimes, Operational, Regulatory Compliance), which includes effectively following and adhering to applicable Wells Fargo policies and procedures, appropriately fulfilling risk and compliance obligations, timely and effective escalation and remediation of issues, and making sound risk decisions.
Knowledge of relevant regulations such as GDPR, HIPAA, PCI DSS, and industry-specific requirements.. Governance, Risk, and Compliance (GRC) and Identity and Access Management (IAM). Certified Ethical Hacker (CEH). Certified Information Security Manager (CISM). Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations.
phia is seeking a dedicated Threat Intelligence Analyst to perform all-source cyber intelligence analysis, assessment, and reporting in support of U.S. Federal government organizations.. Conduct trend analysis to support mitigation strategies, crisis response, and operational decision-making.. 5+ years of experience in open-source intelligence collection, analysis, and reporting.. Demonstrated experience conducting impactful cyber and all-source threat intelligence analysis.. phia, LLC is a Northern Virginia-based, small business established in 2011 with a focus on Cyber Intelligence, Cyber Security/Defense, Intrusion Analysis & Incident Response, Cyber Architecture & Capability Analysis, Cyber Policy & Strategy, and Information Assurance/Security.
A client of Innova Solutions is immediately hiring an Information Security Systems Engineer III. Experience administering Next Generation Firewalls (NGFW) (Fortinet, Cisco, or Palo Alto).. Experience with deployment and administration of Enterprise host intrusion and detections systems (Carbon Black or Sentinel One preferred). Benefits: Innova Solutions offers benefits( based on eligibility) that include the following: Medical & pharmacy coverage, Dental/vision insurance, 401(k), Health saving account (HSA) and Flexible spending account (FSA), Life Insurance, Pet Insurance, Short term and Long term Disability, Accident & Critical illness coverage, Pre-paid legal & ID theft protection, Sick time, and other types of paid leaves (as required by law), Employee Assistance Program (EAP).. One of the Largest Staffing Firms in the US – Ranked #13 by Staffing Industry Analysts (SIA, 2024; includes Innova Solutions, Volt, & HireGenics)
Lead and execute red team operations and penetration tests to identify security weaknesses in clients' networks, systems, and applications. Work closely with clients to enhance their incident response strategies and security awareness based on insights from red team operations. At least 3 years of hands-on experience in cybersecurity roles focused on penetration testing or red team operations. Proficiency with penetration testing tools like Metasploit, Burp Suite, and Cobalt Strike, and scripting languages such as Python and PowerShell. Preferred certifications include OSCP, CEH, GPEN, and GWAPT.