Senior Red Hat Enterprise Linux Engineer.. As a Senior RHEL Engineer, you will be responsible for leading the deployment and management of Red Hat OpenShift clusters, ensuring high availability and security. Architect and deploy containerized applications using Red Hat OpenShift, ensuring optimal performance and scalability. Transition OpenShift cluster operations from connected to partially disconnected environments, ensuring seamless deployment of critical security updates. Implement and manage cloud security best practices, including identity and access management (IAM), encryption, and network security.
The Director of Security Operations is a hands-on technical and leadership role responsible for managing and enhancing the firm's security operations, including SIEM, incident response, threat detection, data leakage prevention, and vulnerability management.. Provide strategic leadership and tactical execution of security operations, ensuring the effectiveness of monitoring, incident response, threat detection, and vulnerability management.. Define and track key performance indicators (KPIs) for incident response, vulnerability management, threat intelligence to measure and drive security improvements.. Hands-on experience with cloud security, identity & access management tools, and vulnerability management solutions.. Industry-recognized certifications such as CISSP, CISM, GIAC, or CCSP.
As a Vice President team lead member of the Data Loss Prevention (DLP) team, reporting to both the DLP Director and the Business Information Security Officer (BISO), the individual will oversee the monitoring of external electronic communication within the Mizuho environment.. DLP tools - accustomed to one or more DLP tools such as Microsoft DLP (Purview/Defender), Netskope, Global Relay, Archer, ServiceNow, or Securiti.. Certifications: CISM, CISSP, CISA, CIA - Preferred. Mizuho's 60,000 employees worldwide offer comprehensive financial services to clients in 35 countries and 800 offices throughout the Americas, EMEA and Asia. Mizuho Americas is a leading provider of corporate and investment banking services to clients in the US, Canada, and Latin America.. Through its acquisition of Greenhill, Mizuho provides M&A, restructuring and private capital advisory capabilities across Americas, Europe and Asia. Mizuho Americas employs approximately 3,500 professionals, and its capabilities span corporate and investment banking, capital markets, equity and fixed income sales & trading, derivatives, FX, custody and research.
The Manager of Cybersecurity and IT Governance is responsible for overseeing and coordinating the organization's efforts to protect its information assets from cyber threats and ensure compliance with relevant laws and regulations. Additionally, they communicate and collaborate with various internal and external stakeholders, such as senior management, IT staff, vendors, customers, and regulators, to provide guidance, support, and reporting on cybersecurity and IT governance matters. Relevant certifications such as: Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), CompTIA Security+, Certified Information Security Manager (CISM), and/or Certified Information Systems Auditor (CISA).. At least five (5) years of demonstrated proficiency in various cybersecurity domains such as risk management, incident response, cloud security, cybersecurity data analysis, and policy development. IT Governance, Risk, and Compliance: Working with IT and security teams to understand the scope of your cybersecurity framework and document its strengths and limitations.
About the job Seeking Cybersecurity Business Development Manager for Boulder & Denver Region. We are a leading Managed Security Services Provider (MSSP) specializing in cybersecurity solutions for private sector companies.. Our team delivers comprehensive endpoint protection, network security, and compliance solutions to keep our clients' digital assets secure against sophisticated and fast evolving threats.. We are seeking a dynamic and results-driven Business Development Manager in Colorado for the cities of Boulder, Denver, Colorado Springs and its surrounding regions.. Prospect and generate new leads through market research, networking, and targeted outreach
Whether a customer wants to grow their business, buy a home, or feel confident in their retirement plan, they have a partner in Ameris Bank. We serve customers in our locations across the Southeast, Mid-Atlantic and nationwide through our extensive digital offerings and mobile app.. This role oversees a multidisciplinary team responsible for threat intelligence, countermeasures, security alerting and monitoring, incident response, and digital forensics.. Strong knowledge of threat intelligence frameworks (e.g., MITRE ATT&CK, Diamond Model, Kill Chain).. 10+ years of experience in cybersecurity with a focus on threat intelligence, incident response, and digital forensics required.. GIAC certifications such as GCFA, GREM, or GCIH certifications preferred.
At Resilience, we’re creating a new category that integrates cybersecurity, cyber insurance, and cyber risk management.. Our integrated cyber risk solutions connect risk quantification software, cybersecurity experts, and A+ rated cyber insurance, all purpose-built for middle and large organizations.. We are a cybersecurity company, a Cyber and Tech E&O-focused MGA, a fintech startup, and a data science powerhouse, all purposefully built into one.. Maintain an updated understanding of the cyber insurance market landscape within the designated territory.. Deep knowledge of the cyber insurance markets across assigned territory.
This position is expected to conduct penetration testing activities on High Value Asset (HVA) systems owned and operated by federal civilian agencies.. Red Team Testing: Focusing testing activity towards accessing specific target datasets.. THREE or more years’ experience relevant to Penetration Testing or IT Systems Configuration or Risk and Vulnerability Assessment and/or Cybersecurity. CISA AES HVA Assessment certification with proof of certification as a CISAES HVA Pen Test Operator.. One of the following certifications: Offensive Security Certified Professional (OSCP) or GIAC Penetration Tester (GPEN) or Certified Ethical Hacker (CEH) Certification.
Exposure to Mitre framework and equivalent, Hands-on experience in EDR platforms and threat analysis, threat hunting/incident response experience.. Develop, implement, and execute standard procedures for the administration, content management, change management, version/patch management, and lifecycle management of the SIEM/Log Management platforms. Perform hunting exercises using threat intelligence, analysis of anomalous log data and results of historical events and data to detect and response to threats.. Author postmortem reports to be provided to senior leadership following an intrusion or red team engagement. Strong knowledge and work experience in handling vulnerability assessment on cloud-based architecture using Prisma cloud, Wiz.io etc.
Company Overview iboss is a cloud security company that enables the modern workforce to connect securely and directly to all applications from wherever they work.. Built on a containerized cloud architecture, iboss delivers security capabilities such as SWG, malware defense, RBI, CASB and data loss prevention to all connections via the cloud, instantaneously and at scale.. This eliminates the need for traditional network security appliances, such as VPNs, firewalls and web gateway proxies, which are ineffective at protecting a cloud-first and mobile world.. The Senior Manager will oversee a team of global technical Support Engineers who interface directly with our Enterprise (Commercial, Government, K12) customers via live chat, ticket system, and telephone to assist them with technical support issues or inquiries.. Excellent communication skills both verbal and written and 7 + years of experience designing and supporting multilayer IP networks; routing and understanding network security; firewalls, intrusion prevention, risk assessment, pen testing, content filtering, PKI, SSL/TLS
ITSM Engineer opportunity in Fairmont, WV, or Boulder, CO Minimum fully adjudicated Secret and Interim Top Secret clearance required. Create incident tickets when reports of service outage or disruption are received, conduct triage, and where possible take action to restore service.. Candidate must be a US citizen with current active DOD Secret or Top-Secret clearance.. Experience with Implementation and maintenance of Next Generation Firewall Features (Application aware filtering, DNS, IPS, Web filtering, SSL Inspection). Experience with automation tools such as Netbrain, Ansible, XSOAR, Fortimanager, Panorama.
We were founded over 30 years ago and continue to be a pioneer in the payment (FinTech) industry.. About This Opportunity We are actively seeking a remote Senior Security Engineer with strong Palo Alto Networks firewall migration experience.. Responsibilities Act as lead engineer on a multi-year project to migrate primarily Cisco to Palo Alto Networks firewalls.. Strong experience in Palo Alto Expedition and Panorama.. Ability to communicate security and data governance related concepts to a broad range of technical and non-technical staff both verbally and in writing.
Top Skills & Years of Experience: Lead complex security assessments, including penetration testing, vulnerability scanning, and risk assessments, to identify and mitigate security vulnerabilities.. (8 years)Manage and improve vulnerability management programs, ensuring timely identification and remediation of security weaknesses.. Proficiency in security assessment tools and techniques, including penetration testing and vulnerability scanning.. Relevant security certifications (e.g., CISSP, CISM, CEH, OSCP) are highly desirable.. Project details: The Security Analyst IV will be responsible for leading and executing complex security assessments, incident response activities, and vulnerability management programs.
Job Summary: We are seeking an experienced Cloud Infrastructure Manager to lead and manage our multi-cloud networking and infrastructure, ensuring secure, efficient, and cost-effective connectivity between customers and our datacenters.. This role is responsible for designing, optimizing, and maintaining cloud networking solutions across AWS, Azure, and Google Cloud Platform (GCP) while implementing cost-control and governance strategies.. Automate infrastructure provisioning and scaling using Infrastructure-as-Code (IaC) tools (Terraform, CloudFormation, ARM Templates).. 5+ years of hands-on experience managing cloud networking and infrastructure across AWS, Azure, and GCP.. Hands-on experience with Infrastructure-as-Code (IaC) tools like Terraform, CloudFormation, or ARM templates.
The Agency Information Security Officer will provide consultative, professional advice and expertise about security issues to agency and executive management as the agency subject matter expert on information security matters.. This individual will serve as a central point of contact on security related matters for agencies to assist in their strategic planning, operational needs, incident response operations, and regulatory compliance efforts.. Third-Party Risk Management – Evaluate vendor and third-party security controls to ensure compliance with state security requirements and industry standards.. Business Continuity & Disaster Recovery – Collaborate with agencies to develop and test business continuity and disaster recovery plans to ensure resilience in the event of a security incident or disruption.. MINIMUM QUALIFICATIONS:Self-motivated leader with 5 to 7 years of experience in a leadership role, information security, relationship management, and cross-functional goal achievement;Experience with regulatory compliance & policy implementation Experience in Incident response & threat mitigationBachelor’s degree in information technology or related field.
Duties: Provide engineering level oversight and level 3 support of the current network security environment including Firewall, IDS/IPS, email filtering, web filtering, NAC, Virtual Private Network (VPN), and Multifactor Authentication.. Conduct research on emerging products, services, protocols, and standards relative to the information security arena related to VPN and MFA. Work with IT Security product vendors and service providers, to evaluate potential security offerings, including product evaluations, pilots and proof of concept installations.. Leverage a wide range of security technologies including, but not limited to: logical access controls, identity and access management, LDAP, security incident response, privileged access management, database and system monitoring, end user password management and single sign on systems as well as network device integration.. Requirements: Requires a Bachelor’s degree or foreign equivalent in Computer Science, Computer Engineering, Information Technology or a closely related field, and four (4) years of experience as a Network Security Engineer/Specialist, or related position, in a large production IT environment administering and supporting multiple medium to small size applications.. ASA, PaloAlto and PulseSecure VPN; Large application support and change management; and Rollout of new technologies and migrations, specifically Firewall migrations and customer
The opportunity The Technology Assurance, Risk, and Policy (TARP) function within Information Security strives to create and promote a holistic Governance, Risk, and Compliance (GRC) program by creating a robust, resilient, and proactive governance framework, supported by a strategic risk management approach and stringent compliance structures.. It aims to integrate and align its GRC initiatives in line with the global firm's objectives and emerging threats within the cybersecurity landscape.. The Control & Risk Assessment team sits within PRC Enablement & Awareness and aims to directly enables the GRC program by designing control testing and risk assessment methodology to measure and quantify compliance to policies and control objectives.. The Control & Risk Assessment Leader will need to build a network of multi-departmental and multi-level stakeholders inclusive of, but not limited to Information Security, Client and Enterprise Technology, Data Protection, Global and Enterprise Risk Management, Internal Audit, Area and Regional Risk & Data teams, Service Line Quality Leaders, etc.. and regulatory requirements like GDPR and SOX. Skilled in Microsoft Office and M365 products; primarily Word, Excel, PowerPoint, SharePoint, PowerApps, and PowerBI. Experience with RSA Archer or other GRC tools.
As the leading software provider exclusively dedicated to powering social impact, expand what is possible across the nonprofit and education sectors, at companies committed to social responsibility, and for individual change makers.. The ideal candidate will have a proven history of offering technical security consultation and architectural advice on cloud security (Azure/AWS), identity and access management (IAM), privileged access management (PAM), Active Directory, data protection, logging, and other cybersecurity capabilities.. Comprehensive knowledge/understanding of securing cloud computing architectures (Azure, AWS and/or Google Cloud Platform) using identities, network and endpoint security controls, data protection, etc.. Prefer CISSP-ISAAP, SABSA, TOGAF. Industry recognized certifications demonstrating security expertise: Prefer CISSP, CCSP, CRISC, SANS/GIAC, Azure security, AWS security.. #LI-REMOTE Blackbaud is a remote-first company which embraces a flexible remote work culture.
Wells Fargo is seeking a Senior Lead Digital Product Manager in Cybersecurity acting as a Product Owner as part of Identity Access Management (IAM).. 5+ years of experience in product management or product owner roles, with a focus on cloud security or cloud-native product development.. Relevant cloud security certifications (e.g., AWS Certified Security, Microsoft Certified: Azure Security Engineer, CISSP).. Ability to work a hybrid work schedule - 3 days a week on-site/in office and 2 days a week remote. They are accountable for execution of all applicable risk programs (Credit, Market, Financial Crimes, Operational, Regulatory Compliance), which includes effectively following and adhering to applicable Wells Fargo policies and procedures, appropriately fulfilling risk and compliance obligations, timely and effective escalation and remediation of issues, and making sound risk decisions.
The SOC consists of a variety of highly-skilled, technical staff performing Monitoring and Analysis, Cyber Incident Handling, Threat Intelligence & Hunting, non-compliance reporting, user activity monitoring, malware and forensic analysis, vulnerability assessments and penetration testing of on-prem and cloud environments. Furthermore, the SOC Manager coordinates 24x7 staffing to support mission-critical operations, including incident response, and manages surge support. Active DoD-issued Top Secret with Sensitive Compartmented Information (TS/SCI) Security Clearance is required at start;.. IAT Level III (CISSP GCIH,) or GCIA certification is required at start;.. Familiarity or experience in Intelligence Driven Defense, Cyber Kill Chain methodology, and/or MITRE ATT&CK framework is preferred;