This role will lead a cross-functional team spanning Incident Response, Threat Intelligence, Threat Hunting, Red Teaming, and Attack Surface Management (ASM), working closely with other security domains and technology teams to drive measurable reduction in cyber risk.. Build and mature proactive threat hunting and intel programs using telemetry from SIEM, EDR, ASM, and external threat feeds.. Manage red team and penetration testing efforts (internal and third-party), simulating adversary behaviors to identify vulnerabilities and resilience gaps in people, process, and technology.. Deep understanding of threat actor tactics (MITRE ATT&CK, kill chain, etc.). Experience with EDR, SIEM, ASM, SOAR, and threat intel platforms (e.g., CrowdStrike, Splunk, Wiz, Mandiant, Recorded Future)
Discover a career in banking at Fifth Third Bank. GENERAL FUNCTIONThe Director, Threat Intelligence and Threat Emulation, reporting to the Sr. Vice President Cybersecurity Threat Interdiction will have responsibility for creating and implementing the strategic goals and objectives of the Threat Intel and Threat Emulation Team, and people management.. The position will also be responsible for the management of cybersecurity threat emulation operations to effectively test of and collect learnings for the detection and response capabilities of the Intel and DART teams.. Knowledge or experience related to management of cyber defense and/or cyber intelligence operations.. Knowledge of cyber defense technologies such as DLP, SIEM, TIP, IDS/IPS, Advanced Malware Detection, etc. Preferred CISSP, GIAC, or CISM certification.
As a Security Engineer, Application Security you will be responsible for identifying and mitigating security vulnerabilities within software applications through building security tools, code reviews, penetration testing, and security assessments. Perform Security Assessments: Conduct regular security assessments, code reviews, and penetration testing to identify vulnerabilities in applications and software. Vulnerability Management: Track, analyze, and manage vulnerabilities in applications, providing guidance and support for remediation efforts. Deep understanding of security technologies, tools, and best practices, including experience with secure coding practices, threat modeling, risk assessments, and incident response. OpenAI is an AI research and deployment company dedicated to ensuring that general-purpose artificial intelligence benefits all of humanity.
As the Chief Information Security Officer (CISO), you will be responsible for establishing and maintaining the enterprise vision, strategy, and programs to ensure that information assets and technologies are adequately protected for both SCAN Health Plan and associated portfolio companies.. Chief Information Security Officer. The CISO will be the strategic leader for all aspects of information security, including security architecture, risk management framework, incident response, security awareness training, and vulnerability management.. CISSP (Certified Information Systems Security Professional) or Certified Information Security Manager (CISM). Understanding and experience with adherence to information and network security standards (HIPAA, HITECH, HITRUST, PCI and PII compliance), data management, disaster recovery.
Participate in system audits and perform testing for disaster recovery or SOX controls, ensuring a secure processing environment that protects the integrity and availability of the managed systems. Experience with network hardware, including routers, switches, firewalls, and VPN appliances (e.g., Aruba Networks, Juniper Mist, Palo Alto Networks). Proficiency in network security practices and technologies (e.g., IDS/IPS, NAC, SSL, IPsec). Experience with virtualization technologies (e.g., VMware, Hyper-V) and cloud networking (e.g., AWS, Azure). Proficiency in scripting languages (e.g., Python, Perl, Bash) for network automation.
In this role, you will lead and deliver high-impact cyber risk and assurance engagements, helping clients navigate regulatory requirements, manage information security risks, and enhance their cybersecurity posture. Delivering digital risk and cyber security engagements.. Hands-on experience with tools and platforms used for cyber risk assessments, vulnerability scanning, and audit processes.. Strong understanding of information security domains such as access control, encryption, vulnerability management, network security, and incident response. Medical Benefits, Prescription Benefits, FSA, Dental Benefits, Vision Benefits, Life and AD&D, Voluntary Life and AD&D, Disability Benefits, Voluntary Benefits, 401 (K) Retirement, Nationwide Pet Insurance, Employee Assistance Program.
In support of this, we are looking for a leader for our Cyber Intelligence team whose mission is to leverage cyber threat intelligence for good, to counter, disrupt and mitigate cyber adversaries targeting Capital One customers, associates, infrastructure and brand.. Create mechanisms to "connects the dots" between different spaces in order to highlight cyber threats across fraud, cybercrime and advanced threat activities. At least 9 years of experience working in cybersecurity or information technology performing incident response, threat hunting, threat intelligence, forensics, or offensive security. Certified Information Systems Security Professional (CISSP), Certified Cloud Security Professional (CCSP), AWS Certification, or Certified Fraud Examiner (CFE) certification. This role is also eligible to earn performance based incentive compensation, which may include cash bonus(es) and/or long term incentives (LTI).
As a Security Engineer, Application Security you will be responsible for identifying and mitigating security vulnerabilities within software applications through building security tools, code reviews, penetration testing, and security assessments. Perform Security Assessments: Conduct regular security assessments, code reviews, and penetration testing to identify vulnerabilities in applications and software. Vulnerability Management: Track, analyze, and manage vulnerabilities in applications, providing guidance and support for remediation efforts. Deep understanding of security technologies, tools, and best practices, including experience with secure coding practices, threat modeling, risk assessments, and incident response. OpenAI is an AI research and deployment company dedicated to ensuring that general-purpose artificial intelligence benefits all of humanity.
Strong understanding of web application security, cloud security (GCP preferred), and secure coding practices.. Experience with TypeScript and GCP (GKE and other core services).. Autoimmune disorder, for example, lupus, fibromyalgia, rheumatoid arthritis, HIV/AIDS. Neurodivergence, for example, attention-deficit/hyperactivity disorder (ADHD), autism spectrum disorder, dyslexia, dyspraxia, other learning disabilities.. Traumatic brain injury
Network Security Engineer (Public Trust Clearance).. Identify and manage projects related to IT security and overall enterprise operations and maintenance, to include the task delegation and status reporting while coordinating activities within the Network and Systems teams and across the IMT department. Analyzes and reviews IT and physical security events, and traffic flows escalated from automated detection systems utilizing commercial Security Incident and Event Management (SIEM [Tripwire software]), Intrusion Detection and Prevention Systems (IDS/IPS [Palo Alto, Cisco ASA, McAfee, Ironport software]) and log management and database activity monitoring. Possesses recent (within 1 year) and relevant practical experience using Retina, Gold Disk, Wireshark, Snort, Logger, Nessus, NeXpose, Metasploit, and other security and web assessment tools. Possesses experience building and maintaining System Security Plans, Incident Response Plans, Contingency Plans and Exercises, Continuity of Operations Plans and exercises, Risk Management Plans and Vulnerability Management Plans in accordance with FISMA, and NIST guidelines.
5+ years of detection engineering, incident response, or threat hunting experience.. Knowledge of EDR, SIEM, SOAR, or related security tools.. Experience performing security operations or investigations involving large-scale Kubernetes environments.. Experience with threat intelligence, malware analysis, infrastructure as code, detection engineering, or forensics.. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.
Digital Consultants is seeking a Cybersecurity Engineer with strong systems and network engineering experience to support Counter-UAS and traditional Airspace Security networks and systems for a sponsor in Washington, DC. The ideal candidate is a hands-on practitioner with deep technical expertise in configuring, securing, and managing critical infrastructure in high-security environments. Clearance: Top Secret/SCI. Ten (10) years of experience implementing and maintaining cybersecurity control requirements, including system hardening, vulnerability assessment, and incident response. Hands-on experience with Cisco network infrastructure, Windows OS environments, and cybersecurity compliance processes (e.g., ATO). Experience may include plan, implement, upgrade, and/or monitor cybersecurity measures to improve cyber defense and maintain a cyber-resilient network; assess cybersecurity vulnerabilities for risks and propose and implement remediation actions or risk mitigation strategies; ensure appropriate security controls are in place that will safeguard digital files and electronic infrastructure; and respond to computer security breaches to re-establish protections and make required reports.
As a Principal Cybersecurity Architect at JPMorgan Chase within the Cybersecurity and Technology Controls, youprovide expertise to enhance and develop architecture platforms based on modern cloud-based technologies as well as support the adoption of strategic global solutions.. , AWS, Azure, GCP). Hands-on experience with security assessment tools, vulnerability scanning tools, and penetration testing methodologies. CISSP, CISM, or other relevant certifications. Experience with security incident response and forensic investigation techniques is a plus.
Provide escalation support and participate in on-call rotation for critical incidents.. Strong knowledge of networking protocols (TCP/IP, BGP, OSPF, etc. Familiarity with Aruba ClearPass Policy Manager,Palo Alto Firewall, Checkpoint Firewall, Alcatel Omni Switch Series.. Experience with cloud networking (AWS, Azure) is an advantage.. Relevant certifications such as CCNA, CCNP, or equivalent are preferred.
As the Information Security Manager, you will own the Turing Information Security Program.. Your focus will be on core organizational security needs, including data protection, incident response, disaster recovery, and risk management.. Leading risk assessments, vulnerability management, and incident response. Experience implementing and maintaining centralized device management and IT asset management. Create a job alert for this search Information Security Manager
Whether a customer wants to grow their business, buy a home, or feel confident in their retirement plan, they have a partner in Ameris Bank. We serve customers in our locations across the Southeast, Mid-Atlantic and nationwide through our extensive digital offerings and mobile app.. Lead the design and implementation of the organization's cybersecurity architecture, covering areas such as network security, cloud security, endpoint security, data protection, IAM and application security.. Evaluate and recommend security technologies, tools, and services to enhance the organization's security posture, including SIEM, IDS/IPS, firewalls, and endpoint protection.. Strong knowledge of cloud security (AWS, Azure, M365, SaaS) and traditional IT infrastructure.. Expert understanding of identity governance & administration concepts and solutions, identity & access management systems and processes.
Object Technology Solutions, Inc (OTSI) has an immediate opening for a Global IT Cyber Security Manager. Global IT Cyber Security Manager- (Hybrid - Houston, TX). The Global IT Cyber Security Manager is responsible for developing, implementing, and managing a robust cybersecurity program aligned with the NIST Cybersecurity Framework and defense-in-depth methodology.. Configure port security, DHCP snooping, and dynamic ARP inspection to prevent MAC flooding, rogue device access, and layer-2 attacks. OTSI works with 100+ enterprise customers, of which many are Fortune ranked, OTSI focuses on industry segments such as Banking, Financial Services & Insurance, Healthcare & Life Sciences, Energy & Utilities, Communications & Media Entertainment, Engineering & Telecom, Retail & Consumer Services, Hi-tech, Manufacturing, Engineering, transport logistics, Government, Defence & PSUs.
Collaborate with MDR and SIEM partners to manage and resolve security incidents.. Strong foundation in cybersecurity, including IAM, data protection, and incident response.. Experience with Microsoft Defender, MS365 Intune MDM, and Microsoft Sentinel.. Hands-on experience with platforms such as Azure Sentinel, Tenable Nessus, BeyondTrust (Bomgar), Mimecast, Palo Alto Networks, Burp Suite, Pentera, and Kali Linux.. Cybersecurity certifications such as Security+, CEH, Cybersecurity Analyst+, GIAC, Cisco CyberOps, or Microsoft Security.
Softek Inc. is seeking an experienced Network Infrastructure Architect to provide strategic architectural leadership for the DHS Enterprise Engineering Division (EED), supporting comprehensive HSEN capabilities and services. This role requires deep expertise in LAN/WAN, enterprise wireless networking, network security engineering, collaboration tools, cloud hosting, and advanced communication services. The Architect will drive the consolidation and standardization of DHS’s diverse communication networks, significantly enhancing collaboration, operational efficiency, and the overall homeland security response capabilities. Lead architectural design for the integration, scalability, interoperability, and flexibility of DHS HSEN and LAN-A networks. Guide strategic initiatives to evaluate emerging technologies, implement cloud solutions, and enhance collaboration platforms to streamline DHS network operations.
Experience in cloud platforms such as Google Cloud, AWS or Azure and how to leverage their security features and services.. Secure development methodologies such as threat modeling, static source code reviews, dynamic application security assessments, penetration testing, and security best practices.. Experience in implementation of latest standards and technologies in authentication, authorization, auditing, cryptography, PKI, federation, OAuth, MFA, OIDC, and data security at rest, in transit and in use.. Experience with security tools and technologies, such as encryption, authentication, authorization, firewalls, web application firewalls, intrusion detection/prevention systems, vulnerability scanning, penetration testing, etc.. Experience with agile development methodologies and DevSecOps practices.