Hireteq is looking for a Cyber Security engineer for a Fulltime role with our client. Minimum of 6 years of related experience in the field of Cybersecurity with expertise in two or more domains like Network Security, Data Protection, Container Security, Endpoint Security, and Cloud Security. Cloud / Container Security: Experience with Kubernetes Security, Container security / CNAPP (Cloud-Native Application Protection Platform tools, CI/CD security policies, GitOps/ Infrastructure as Code. Network Security: Secure Web Gateways, Secure Access Secure Edge (SASE), Firewalls, IDS/IPS technologies.. Endpoint Security: Endpoint Detection and Response, Endpoint Protection, NGAV, DLP and Firewall technologies
Piper Companies is seeking a Network Security Consultant (Strata) to join a premier cybersecurity organization.. Collaborate with customer's security & network teams to build confidence across the business units impacted by the change to Palo Alto Networks. 5 years of experience with network/security solutions and technologies (BGP, SD-WAN concepts, VXLAN, general routing and switching). High level of experience with Panorama and log collectors. Detailed technical experience in the installation, configuration, and operation of high-end firewall appliances, ideally Palo Alto Networks products
Job Title: Application Offensive Security Consultant Job Location: Jersey City, NJ Job Type: Contract (Hybrid) Job Summary Join our Application Security team as part of our Technology Risk initiative to support offensive security assessments and provide expert guidance on key projects.. As an Application Offensive Security Consultant, you will be responsible for penetration testing, security assessments, and vulnerability identification across applications and APIs. Key Responsibilities Conduct offensive security testing on applications and APIs. Perform manual penetration testing to identify vulnerabilities beyond automated scans.. 4+ years of hands-on experience with penetration testing tools, such as: Burp Suite OWASP ZAP Strong understanding of: OWASP Top 10 vulnerabilities MITRE ATT&CK Framework Ability to manually discover vulnerabilities beyond automated scanning.. Preferred Qualifications (Nice to Have) Certifications in offensive security/penetration testing, such as: OSCP (Offensive Security Certified Professional) CEH (Certified Ethical Hacker) Experience in Red Teaming and Adversarial Testing.. Active participation in Capture the Flag (CTF) competitions or platforms like TryHackMe, HackTheBox. Ability to work under pressure, manage multiple tasks, and adapt to dynamic security challenges.
Administration of office WAN/LAN and Unifi Networking and WiFi. Administration of cloud and network infrastructure (VMW, Azure, AWS, GCP). Administration of infrastructure backups, restoration, and disaster recovery testing. Advanced Unifi Networking administration and devices. Understanding of Okta, Zoom, Office , Slack and G-Suite
About the Opportunity The Federal Reserve System (FRS) National Incident Response Team (NIRT) has an immediate opening for an Intermediate SOC Analyst (Incident Response) position, reporting to a Senior Manager Information Security.. The NIRT, a national service provider for the FRS, delivers effective intrusion detection, incident response, forensics, security intelligence, threat assessment, and penetration testing services.. This role will be a combination of SOC analyst (providing triage of potential security events) and incident handler (investigating and responding to actual security incidents).. You can also expect to develop more specialized skills such computer forensics, phone forensics, malware analysis, and threat hunting on the job and through external training.. Manage security incidents and conducts incident analysis, containment, protection, mitigation, and recovery activities across the FRS. Evaluate incident response workflow processes.
Successful candidates will have experience with budgeting, procurement via Purchase Orders, tracking financial actuals, forecasting, maintaining, and collecting KPIs from security functions/teams, light schedule orchestration, strategy presentations, and light project management or portfolio management.. Optimize Vendor Risk Management : Conduct thorough security assessments of third-party vendors and partners.. Foster collaboration by working across Endeavor’s Business Units and Fucntional Areas: Support the meeting logistics of the Data Governance and Information Security Working Group and other cross-functional teams, as needed.. Sustain and support the IT Risk Management program: Leverage Governance Risk and Compliance tools and process to drive the documentation, ownership, and resolutions of risks across the organization.. We understand this can only be accomplished when we lead with a lens of diversity, equity, and inclusion in everything we do.
The Cybersecurity Operations Engineer will report to the Senior Manager, Cybersecurity Operations under the direction of the Chief Information Security Officer (CISO).. Strong knowledge of information security principles, technologies, and best practices, including risk management, vulnerability management, incident response, and security operations. Experience implementing and maintaining security tools; EDR/XDR, SIEM, Vulnerability Management, Privileged Access Management, Privileged Remote Access. Experience with regulatory compliance frameworks (e.g., GDPR, HIPAA, SOX) and industry standards (e.g., NIST, CMMC, ISO ). Cybersecurity certifications, such as CASP+, GSE, CISSP
Job Summary: We are seeking an experienced Cloud Infrastructure Manager to lead and manage our multi-cloud networking and infrastructure, ensuring secure, efficient, and cost-effective connectivity between customers and our datacenters.. This role is responsible for designing, optimizing, and maintaining cloud networking solutions across AWS, Azure, and Google Cloud Platform (GCP) while implementing cost-control and governance strategies.. Automate infrastructure provisioning and scaling using Infrastructure-as-Code (IaC) tools (Terraform, CloudFormation, ARM Templates).. 5+ years of hands-on experience managing cloud networking and infrastructure across AWS, Azure, and GCP.. Hands-on experience with Infrastructure-as-Code (IaC) tools like Terraform, CloudFormation, or ARM templates.
CGI Federal is hiring an Identity and Access Management (IAM) Engineer SME to work with a skilled and motivated team of professionals on a high-visibility Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) cyber security program.. In addition, candidates must have the ability to obtain and maintain a DHS CISA EOD/Public Trust clearance. 5+ years of experience with SailPoint IdentityIQ (IIQ), CyberArk, or Broadcom CA PAM, to include Access Certification, Automated Provisioning, and Governance. Familiarity with RSA, Radiant Logic, Oracle, Centrify, and other IAM products. Understanding of networking (TCP/IP, OSI model), operating system fundamentals (Windows, UNIX, mainframe), and security technologies (firewalls, IDS/IPS, etc.)
As a diversified, national organization, Centene's technology professionals have access to competitive benefits including a fresh perspective on workplace flexibility.. Executes enterprise-wide Incident Response Plan. Partners with business units to accomplish enterprise-wide remediation and develops and delivers presentations to senior leadership team.. Or equivalent experience acquired through accomplishments of applicable knowledge, duties, scope and skill reflective of the level of this position.. Technical Skills: One or more of the following skills are desired: Knowledge of Other: Tools, techniques and processes (TTP) used by threat actors Knowledge of Other: Indicators of compromise (IOC) Experience with Other: Endpoint protection and enterprise detection & response software (such as CrowdStrike, Proofpoint, Microsoft Defender, Splunk, or query languages like SPL, KQL, or SQL) Knowledge of Other: Network and infrastructure technologies including routers, switches, firewalls, etc.. Actual pay will be adjusted based on an individual's skills, experience, education, and other job-related factors permitted by law.
As a Senior Network Engineer/Administrator you will help ensure today is safe and tomorrow is smarter.. Our work depends on this role to maintain HRSA's Hosting, Network, Security, Server, Identity and Access Management, and Tier II Operations in support of the HRSA mission.. That includes: Network, Security, DNS, DHCP, VOIP, Identity and Access Management, and Server Operations.. § Looking for a leader to drive the identified efforts and able to perform trouble shooting to determine root cause analysis (RCA).. Cisco ASA Firewall 5500 / Firepower (A Must)
Our company offers cutting edge products and services that are rooted in deep subject matter expertise of Safety, Cybersecurity, and Artificial Intelligence fields within embedded computing electronics that power tomorrow's autonomous vehicles.. · Lead/Support verification engineer in security verification test and its vulnerability management. · Lead/Support fuzz testing activities and its vulnerability management. · Lead/Support penetration testing activities and its vulnerability management. · Experience with cyber security in embedded systems is preferred, experience in the automotive or aerospace industry is a plus
The Information Security Manager works closely with the Information Security Team and IT Service Management Team to help develop and maintain APEI’s Information Security Program and is responsible for the advanced analysis and development of the integration, testing, operations, and maintenance of cloud security systems.. In addition to technical skills, a cloud manager also requires leadership and managerial skills.. Professional experience in Microsoft Azure/AWS/GPC technologies and products, including SQL, Cloud Data Warehouse, Active Directory, Analytics, and productivity products.. Ability to configure, monitor, and troubleshoot network infrastructure devices (Cloud-based Network Security Groups (NSG), Wi-Fi Access Points, Routers, Switches, Servers (Physical and Virtual), UPSs, Network, and Application Load Balancers, VPN and Remote access solutions, remote access services support, access control, and identity, management tasks.. AZ-300 Microsoft Azure Architect Technologies
The Principal Network Security Engineer leads the implementation and evolution of network security tools and processes for complex enterprise scenarios.. Experience with on-prem data centers, offices, colocated hosting services such as Equinix, and all major cloud services such as AWS, Azure, GCP, and OCI.. Advanced expertise in Infrastructure as Code strategies, experience with Terraform and Ansible, and other automated code deployment systems for infrastructure.. Industry certifications such as CISSP, CCIE, CCNP Security, FCX, PCNSE, CISM, CEH, GSEC, CCSP, or other relevant advanced network and security certifications.. Highly experienced with network security concepts related to Threat and Vulnerability Management, system architecture, and Internet technology.
Advise senior management (, Chief Information Officer [CIO]) on risk levels and security posture.. Interface with external organizations (, public affairs, law enforcement, Command or Component Inspector General) to ensure appropriate and accurate dissemination of incident and other Computer Network Defense information.. Knowledge of Risk Management Framework (RMF) requirements.. Knowledge of how traffic flows across the network (, Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).. Knowledge of system and application security threats and vulnerabilities (, buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).
Participate in vulnerability assessments and penetration testing activities to identify and address potential security weaknesses. Possess either a Certified Ethical Hacker (CEH) or a GIAC Certified Incident Handler (GCIH). A minimum of (4) four years of related experience on a Computer Incident Response Team (CIRT), Computer Emergency Response Team (CERT), Computer Security Incident Response Center (CSIRC) or a Security Operations Center (SOC).. A minimum of (6) six months experience in one or more of the following areas: computer network penetration testing/techniques; computer evidence seizure, computer forensic analysis, data recovery; computer intrusion analysis/incident response, intrusion detection; computer network surveillance/monitoring; network protocols, network devices,. Experience with common Cybersecurity tools such as Splunk, HBSS, Nessus
SCHIE delivers the core infrastructure and foundational technologies for Microsoft's over 200 online businesses including Bing, MSN, Office 365, Xbox Live, Skype, OneDrive, and the Microsoft Azure platform globally with our server and data center infrastructure, security and compliance, operations, globalization, and manageability solutions.. We are looking for a Senior C loud Security Engineer who will tackle interesting security challenges impacting hybrid cloud systems around the globe in collaboration with a dedicated group of IS&T subject matter experts embedded within the Microsoft Silicon engineering organization.. Certification in one or more of the following technologies: Microsoft Cybersecurity Architect, Microsoft Security Operations Analyst Associate, Microsoft Azure Security Engineer, Google Professional Cloud Security Engineer, AWS Certified Security Specialty, CCSP, CISSP, CISA, CISM.. Analyze security controls including Azure Firewall, Network Security Groups, Azure Sentinel, Microsoft Defender ATP, Access Control Lists, Active Directory Domain Services, and Azure Active Directory among others.. Perform hands-on configuration activities in areas such as Identity & Access Management, Azure Firewall, Network Security Groups, Azure Sentinel, Microsoft Defender ATP, Access Control Lists, Active Directory Domain Services, and Azure Active Directory among others.
Primary consumer of cloud security posture management tools and technology and serve as a subject matter expert for the risk assessment and remediation of findings.. Develop terraforms or IaC to maintain cloud security policies, standards, and procedures.. Microsoft Endpoint Manager – Intune and Configuration Manager. Demonstrated knowledge of Azure architecture and core services such as Virtual Machines, Group Policy, MFA, Azure Active Directory, Management Groups, Resource Groups, Azure Regions, Azure Functions, Azure Networking, Azure IPsec Connections, Network Security Groups, Azure VDI, and Firewalls.. Knowledge of network architectures, including VNETs, subnets, VPNs, and ExpressRoute, along with an understanding of Azure security tools and features like Azure Active Directory, Network Security Groups, and Azure Key Vault.
2-4 years of combined experience in either incident response, threat intelligence, threat hunting, or cybercrime investigations. Experience in one or more information security domains: threat Intelligence analysis and research - security monitoring/detection and incident response - security architectures, principles, and assessment methodologies - network and operating systems security - development of security tooling. Technical domain knowledge with Linux, Windows, or MacOS based systems - network infrastructure - cloud products (e.g. AWS, GCP, Azure). Dropbox is committed to investing in the holistic health and wellbeing of all Dropboxers and their families.. Parental benefits including: Parental Leave, Child and Adult Care, Day Care FSA, Fertility Benefits, Adoption and Surrogacy Support, and Lactation Support
CSE will assist in the monitoring of customer network traffic, analyze security logs, investigate potential security incidents and help lead the response when threats are detected.. Advanced Analysis: Investigate Threat and DLP alerts analyzing patterns to prioritize threats.. Policy Refinement: Help fine-tune detection tools by providing feedback to the CTO and InfoSec team.. 3+ years working with a SIEM in a content development or Incident Response role. Understanding of the MITRE ATT&CK framework