Managing Director, Digital Forensic and Incident Response (DFIR).. Direct digital forensics, threat intelligence gathering, root cause analysis, and remediation planning. 12+ years of experience in cybersecurity, including at least 7 years in incident response or digital forensics. Deep expertise in cyberattack lifecycle, threat actor TTPs, and security frameworks (e.g., NIST, MITRE ATT&CK). Relevant certifications such as CISSP, CISM, GCFA, GCIH, or CISA are preferred.
SCAN Group is the sole corporate member of SCAN Health Plan, one of the nations leading not-for-profit Medicare Advantage plans, serving more than 285,000 members in California, Arizona, Nevada, and Texas.. As the Chief Information Security Officer (CISO), you will be responsible for establishing and maintaining the enterprise vision, strategy, and programs to ensure that information assets and technologies are adequately protected for both SCAN Health Plan and associated portfolio companies.. The CISO will be the strategic leader for all aspects of information security, including security architecture, risk management framework, incident response, security awareness training, and vulnerability management.. CISSP (Certified Information Systems Security Professional) or Certified Information Security Manager (CISM). Understanding and experience with adherence to information and network security standards (HIPAA, HITECH, HITRUST, PCI and PII compliance), data management, disaster recovery.
The best investors and angels you can find: backing from Sequoia, Founders Fund, Abstract Ventures, Michael Ovitz, Gokul Rajaram, Olivia Wilde and the founders of Lyft, Zoom, Doordash, and more. High talent density: our team includes founders with successful exits and builders from Apple, Discord, Spotify, Substack and more, all focused on our mission. Secure coding practices and vulnerability assessmentAuthentication and authorization systems (OAuth, SAML, MFA)Cryptography and key management.. Cloud security (AWS security services, IAM, VPC design)Network security and monitoringContainer and serverless security.. AI/ML security and adversarial attacksDigital forensics and malware analysisBug bounty program managementCan you explain the difference between symmetric and asymmetric encryption without looking it up?
Builders Vision is an impact platform that aims to shift markets and minds for good in pursuit of our vision for a humane and healthy planet.. Implement and oversee formal security policies and procedures framework, covering areas such as access control, data protection, incident response, and change management.. Expert level knowledge of SIEM, EDR, IAM, and DLP. Advanced certifications such as CISSP, CISM, or CRISC. Knowledge of cloud security architecture and best practices for major cloud platforms (e.g., AWS, Azure, GCP).
Key areas of focus include Advanced Email Security, Data Loss Prevention (DLP), Insider Threat prevention, Endpoint Security, Identity and Access Governance, Security Awareness Training, Configuration management and Infrastructure as Code, Incident Response (SOAR automation), Regulatory Compliance and SaaS Security Posture.. Experience with IAM technologies such as Okta, Sailpoint, etc.. Experience with Endpoint Management and Detection technologies such as JAMF, Kandji, Crowdstrike, etc.. Experience with configuration management and infrastructure as code tools (e.g., Ansible, Terraform).. Industry certifications such as CISSP, CISM, CEH, or GIAC are a plus.
Our ~15,000 employees create world-class solutions in communications, 5G, automotive, energy, quantum, aerospace, defense, and semiconductor markets for customers in over 100 countries.. Stay up to date with emerging security technologies like SASE, ZTNA, LLM Security, Cloud Security, NGFW, and DDoS. Hands-on experience with testing tools such as BPS, IxLoad, and CyPerf, and their application in cloud and network security environments.. Experience deploying or testing networking and security systems such as SASE, ZTNA, Cloud Security Services, Next-Gen Firewalls, IDS/IPS, etc.. Familiarity with cloud automation and DevOps frameworks/tools like Jenkins, Python, and Terraform.
As a MacOS ML Engineer, you will build the fundamental software, libraries, tools, and test suites to support autonomous security on Apple devices.. You will adapt the intelligence, models, and research developed by the team to run on macOS. Development and deployment of autonomous security on macOS needs to balance privacy, rigor, visibility, performance, and impact.. In this role, you need to have skills and knowledge across a blend of macOS development best-practices, systems and software engineering, and embedded systems development.. Understanding of MLOps practices including model validation, versioning, monitoring, and deployment in high-security environments.. Background in cybersecurity, malware analysis, digital forensics, or red/blue teaming.
SCAN Group is the sole corporate member of SCAN Health Plan, one of the nation's leading not-for-profit Medicare Advantage plans, serving more than 285,000 members in California, Arizona, Nevada, and Texas.. As the Chief Information Security Officer (CISO), you will be responsible for establishing and maintaining the enterprise vision, strategy, and programs to ensure that information assets and technologies are adequately protected for both SCAN Health Plan and associated portfolio companies.. The CISO will be the strategic leader for all aspects of information security, including security architecture, risk management framework, incident response, security awareness training, and vulnerability management.. CISSP (Certified Information Systems Security Professional) or Certified Information Security Manager (CISM). Understanding and experience with adherence to information and network security standards (HIPAA, HITECH, HITRUST, PCI and PII compliance), data management, disaster recovery.
Managing Director, Digital Forensic and Incident Response (DFIR). Direct digital forensics, threat intelligence gathering, root cause analysis, and remediation planning.. 12+ years of experience in cybersecurity, including at least 7 years in incident response or digital forensics.. Deep expertise in cyberattack lifecycle, threat actor TTPs, and security frameworks (e.g., NIST, MITRE ATT&CK).. Relevant certifications such as CISSP, CISM, GCFA, GCIH, or CISA are preferred.
Chief Information Security Officer is responsible for delivering strategic vision and operational oversight for the Enterprise Information Security Architecture and Security Operations Center.. Security Operations Management: Lead the security operations team for product and infrastructure, ensuring the implementation of robust security controls, incident response protocols, vulnerability management, and security monitoring.. Extensive experience in independently leading security operations, including incident response, threat intelligence, vulnerability management, and security monitoring.. Proficiency in security architecture design, Product security, responding to vendor questionnaire and cyber security forms, network security, cloud security, identity and access management, encryption, and secure coding practices.. RaySafe is the worldwide leader of X-ray test equipment, real-time staff dosimetry, and radiation survey meters.
There will be an emphasis on Network Security, Firewalls, Endpoint Protection, IPS/IDS and SIEM. But we are looking for candidates that have experience in a breadth of IT Security disciplines, and experience architecting security solutions that balance multiple perspectives.. Design, build and help lead implementation of security technologies based on enterprise business strategy, business capabilities and business requirements. 3+ recent years of experience with Network Security and Firewall Architecture/Engineering. Must have experience with Endpoint Protection, IPS/IDS and SIEM. Penetration Testing and/or Threat Assessment experience
Develops and implements a comprehensive Security Operations strategy, encompassing threat monitoring, incident response, vulnerability management, and medical device product security monitoring. Develops and maintains relationships with external security organizations, law enforcement, and other agencies to enhance the threat intelligence and incident response capabilities. Collaborates with other entities such as GRC (Governance, Risk, and Compliance), developing a hosted environment security risk management strategy consistent with changing enterprise-specific and industry-wide risk and regulatory environment. CISSP, GSOC, GMON, GSOM or other relevant cybersecurity certifications. Strong knowledge of incident response, vulnerability management, and security monitoring practices.
Respond quickly to technical incidents, including those affecting branches or trading operations.. Maintain accurate and timely records of all issues in the ITSM/helpdesk ticketing system.. Job Requirements: Diploma or Degree in Information Technology, Computer Engineering, or related field.. 1–2 years of experience in a technical support or IT infrastructure role, preferably in a banking or financial services environment.. Familiarity with compliance standards relevant to financial institutions (e.g., MAS TRM, PCI-DSS).
The Director-IT Security and Infrastructure is responsible for overseeing the strategic management and operation of technology infrastructure, cloud services, identify and access management and the cybersecurity program for Trinity Health Michigan Medical Groups.. Maintains oversight of all the information systems technical infrastructure for Michigan Medical Groups including data center operations, the physical and virtual server environment, storage, LAN/WAN, end-user devices, telephony infrastructure and backup and disaster recovery.. In collaboration with the Vice President-Information Technology, develops the IT Strategic Plan and technical priorities, standards and procedures.. Experience in managing the specific technical areas of data center operations, the physical and virtual server environment, the storage environment, LAN/WAN, end-user devices, telephony infrastructure, backup and disaster recovery.. Direct experience with cyber threat intelligence, incident response, and security operations.
This program will maximize the effectiveness and efficiency of our country’s most important missions both at home and abroad.. 3+ years of experience in analysis, network engineering, network security, vulnerability assessment, technical collection, penetration testing, red teaming, hardware engineering, software reverse engineering, cyber operations, and/or computer exploitation.. 6+ years of experience across technical competencies, such as: analysis, network engineering, network security, vulnerability assessment, technical collection, penetration testing, red teaming, hardware engineering, software reverse engineering, cyber operations, and/or computer exploitation.. Headquartered in Columbia, MD., RealmOne supplies advanced cybersecurity, data science and software engineering services and products to customers in the Government and commercial sectors.. RealmOne has won numerous awards, to include Top Workplaces by the Baltimore Sun. Across more than 20 prime contracts, RealmOne is a premiere innovator for the Government and Department of Defense, and our team is located across the United States.
Managing virtual networks on cloud platforms such as Azure, Google Cloud, AWS, and VMware.. Work Mode: Remote (Work from Home). Switching technologies: VLAN, VXLAN, VTP, VSS on Cisco Catalyst, Nexus, HP, Juniper, SDLAN. Routing: Protocol configuration and troubleshooting for traditional WAN and SDWAN (VeloCloud & Cisco Meraki). Network security protocols, LAN, WAN, wireless networks, DHCP, DNS, Proxy, VPN, TCP/IP, VoIP, virtualization, high availability, disaster recovery, routers, device drivers
Join to apply for the Special Agent: Cybersecurity/Technology Expertise role at Federal Bureau of Investigation (FBI).. Use your cybersecurity background to become an FBI special agent!. The transition from technology to special agent is more than a career move—it’s an opportunity to upskill and become an expert in your field. With specialized training, real-world investigative experience, and access to cutting-edge technology, you’ll refine your troubleshooting and information security skills, enhance your expertise, and develop the foundation to become a leader in your field. Information Security Specialist - Azure Cloud Security Security Operations Center Lead/SOC Lead Senior Cybersecurity Analyst for Incident Response Information Security Analyst - Temporary Lead Cyber Security Analyst (Swing Shift) in Scottsdale Scottsdale, AZ $100,000.00-$125,000.00 3 weeks ago
This role will align with the government's 12-hour shift structure and is a night shift position with working requirements from 7pm to 7am.. SMS offers proven solutions in engineering, operations, cybersecurity, and digital transformation.. Perform threat insight processes to provide analysis to support mitigation and remediation activities.. Vulnerability Management actions to include providing recommendations and responding INFOCON and CPCON changes.. This includes continuous Cybersecurity Monitoring, Intrusion Detection and/or Cyber Incident Response is required.
This role will align with the government's 12-hour shift structure and is a night shift position with working requirements from 7pm to 7am.. SMS offers proven solutions in engineering, operations, cybersecurity, and digital transformation.. Perform threat insight processes to provide analysis to support mitigation and remediation activities.. Vulnerability Management actions to include providing recommendations and responding INFOCON and CPCON changes.. This includes continuous Cybersecurity Monitoring, Intrusion Detection and/or Cyber Incident Response is required.
Lead and execute red team operations and penetration tests to identify security weaknesses in clients' networks, systems, and applications.. Work closely with clients to enhance their incident response strategies and security awareness based on insights from red team operations.. At least 3 years of hands-on experience in cybersecurity roles focused on penetration testing or red team operations.. Proficiency with penetration testing tools like Metasploit, Burp Suite, and Cobalt Strike, and scripting languages such as Python and PowerShell.. Preferred certifications include OSCP, CEH, GPEN, and GWAPT.