The role offers the chance to lead key infrastructure initiatives, optimize system performance, and shape the future of IT operations. Contribute to disaster recovery planning, including configuring and testing recovery sites for business continuity. Develop comprehensive network security policies, including incident response plans and network segmentation rules. Experience in virtualization, with proficiency in VMWare ESXi and Nutanix AHV. Competence in Active Directory (AD) Management, Exchange Management, and Office 365.
Perform assessments on-site at vendor locations or remotely via conference calls.. Demonstrate in-depth knowledge of concepts, best practices and controls in a breadth of information security areas/domains; these information security areas include risk management, access control, cryptography, physical security, security architecture and design, network security, application & operations security and compliance/incident management.. Strong technical and/or IT audit background and practical knowledge of a wide variety of technologies which include server infrastructure & operating systems, network & web infrastructures, database architecture and intrusion detection/prevention systems.. Proficient working knowledge within the following risk domains/technologies: Database and application security, IDS/IPS technologies, System/Access Administration, Firewall technologies, Network Architecture, Security Event Logging & Monitoring, Key Management/Tokenization, Database/Application/Network Layer Secure Protocols, Physical and Environmental Security, Secure Software/Code Development, Change Management, Vulnerability Management.. IT Risk Management/Audit industry certification (such as CISSP, CISA, CRISC, etc.)
The VP of Security/Chief Information Security Officer (CISO) is a senior executive role responsible for establishing and overseeing the company's enterprise security strategy, policies, and risk management framework. Reporting to the President and Chief Operating Officer, the VP of Security/CISO will lead efforts to secure cloud-based government solutions , manage incident response, strengthen corporate governance, and implement robust security procedures across the software development lifecycle (SDLC). Lead the organization's threat intelligence, risk management, and vulnerability management programs. Operational expertise in common regulatory and security frameworks, such as StateRAMP, SOC2, NIST CSF, MITRE ATT&CK, and zero-trust security models. Relevant certifications highly preferred, such as CISSP, CISM, CISA, CCSP, or AWS Security Specialty.
This role is critical in managing cloud security operations, driving security standardization, and enhancing the organization's cloud security posture through constant assessment and innovative solutions.. Extensive knowledge of cloud security architectures and cloud-native platforms (AWS, Azure, GCP).. Strong experience with security configuration management and cloud security frameworks (e.g., NIST, CIS Benchmarks). Proficiency in automation and tooling for cloud security, such as Infrastructure as Code (IaC) and CI/CD pipeline security.. Certified Chief Information Security Officer (CCISO)
Develop relationships with technical/key stakeholders to understand the customer’s business with a focus on Strategic, Tier 1, and ‘at-risk’ customers.. Partner with Product, Operations, Services, and SOC to ensure customer success during critical moments.. Strong technical background in cybersecurity, including experience with various SIEM and Endpoint Protection platforms, such as Splunk, Devo, AlienVault USMA, Carbon Black, CrowdStrike, etc.. The company offers a personalized Open XDR approach to Managed Detection and Response, advanced Threat Hunting, Digital Risk Protection, Phishing Response, and Incident Response services, helping customers mature their security program efficiently and effectively based on their unique risks and business needs.. Binary Defense is also the Trusted Cybersecurity Partner of the Cleveland Browns and partners with PGA TOUR players.
Bachelor s degree in Cybersecurity, Data Privacy, Computer Science/Engineering, Information Systems, or related technical discipline, or equivalent experience/training. 2+ years of experience in data discovery and/or data protection, including data loss prevention. Knowledge of data management disciplines such as data discovery, data governance, data classification, and data privacy. Understanding of data protection regulations, such as GDPR and CCPA. Ability to interact with enterprise product teams, data analysts, and data governance teams for cross functional efforts
Ironwood is also advancing apraglutide, a next-generation, long-acting synthetic GLP-2 analog being developed for rare gastrointestinal diseases, including short bowel syndrome with intestinal failure, as well as several earlier stage assets. Oversees the vision, design, development, and review of company information systems and software investments (now and in the future), factoring compatibility of emerging technologies, vendor services, and internal resources. Annually assesses and benchmarks compliance to NIST CSF (cybersecurity framework) in tandem with enterprise penetration testing to ensure alignment to industry standard security controls. Leads the creation and maintenance of the information systems disaster recovery, cybersecurity insurance and business continuity plans while monitoring changes in local, state, federal regulations and accreditation standards affecting information security, to make recommendations to the leadership and on the need for policy changes. Strong technical expertise in cloud-based infrastructure management, particularly with Microsoft Azure.
Weber has been the world’s premiere manufacturer of charcoal and gas grills and accessories since 1952.. Professional security management certification, such as a Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA) or other similar credentials, is desired.. Technical expertise in network security knowledge, to include VPN, firewall, network monitoring, intrusion detection, web server security and wireless security, cloud, OT, and the Internet of Things (IoT).. Proficiency with at least one scripting language (e.g., Perl, Python and PowerShell).. Practical experience with database security, content filtering, vulnerability scanning and anti-malware.
Lead digital evidence investigations for internal stakeholders, focused mainly on internal investigations for HR and Legal.. GCIH, GCFA, GNFA, GREM, GHTI or other industry-relevant certification(s). Minimum 4 years of related incident response or cyber threat hunting / intelligence experience. Familiarity with Cloud structure and security monitoring capabilities for GCP, AWS, Azure and O365. Advanced incident response skills to include host-based forensics, memory forensics, network forensics, packet capture analysis, and static / dynamic malware analysis
Participates in risk assessment and risk management by working closely with the Change Incident Manager, Information Security and Project Managers to reduce incidents and minimize change risks of IT production environment and report situations of non-compliance.. Technical network (e.g. CCNA, CCNP Security) and security certifications highly desirable (e.g. CISA, CISSP, GCIH);. Web Proxy, IPS, IDS, VPN, Identity Management, Email/Spam filter and SIEM experience preferred.. Must be well versed in operating systems such as Linux as well as Windows environments, Active Directory, VPN systems, encryption schemas and algorithms, various authorization and authentication mechanisms/software, network monitoring and sniffing, TCP/IP networks and vulnerability and threat management tools (including network-based scanners).. Experience in cloud or highly-virtualized environments, such as Amazon Web Services, Microsoft Azure, VMWare ESXi, Nutanix, etc.
The Product Security IR Analyst will be the primary team member from the ISRC to utilize our global Product Threat Intelligence & Vulnerability Management Tool. This role will work closely with leads from each of our unique business units (e.g., Powertrain and Electronics unit) to coordinate continual cybersecurity activities related to our products.. Manage the Product Threat Intelligence & Vulnerability Management tool.. Implement and refine vulnerability management processes tailored to the unique requirements of automotive products.. Collaborate with business units to establish incident response playbooks and guidelines, ensuring a proactive and unified approach to addressing product security incidents.. At least four years of hands-on experience in utilizing threat intelligence and vulnerability management tools, preferably within the automotive product sector, to effectively monitor, track, and mitigate vulnerabilities or incident response.
Plan and design modern telco services to replace legacy copper-based telco solutions.. Degree and minimum years of prior WAN Telecommunications networks experience or years post-Secondary/ Associates Degree and a minimum of years of prior WAN Telecommunications networks experience. Experience designing and implementing network technologies such as SONET, Carrier Ethernet,. Knowledge of WAN/LAN, TDM and Voice switching systems; TCP/IP, specific routing protocols such as OSPF, BGP and RIP; VoIP, DWDM, CTI and VPN technologies. Experience with leading network vendors such as Cisco, Juniper, Ciena, RAD
The Cybersecurity Operations Analyst for Caesars is responsible for implementing the Cybersecurity program and strategy at a tactical and operational level (network, infrastructure, applications, and databases) to ensure that security controls are functioning efficiently and effectively, more specifically in the realm of security logging, monitoring, alert management, incident handling, vulnerability and configuration management.. to better understand risks, insufficiencies in our solutions, staffing shortages, etc.. ; report security metrics and statistics to the CISO and other key stakeholders such as the CTO. Experienced in several security tools (IPS/IDS, DLP, scanners, forensics tools, ethical hacking tools, and very knowledgeable in security processes.. CISSP, CISA, CISM, GSEC, or related certification(s) preferred.
The Cloud security architect will play a critical role in ensuring the security of our client's digital infrastructure, applications, and data assets.. As a member of the information security team, the Cloud Security Architect will play a key leadership role in the InfoSec function of security architecture and provide guidance to other enterprise teams for all cloud security related matters in Azure.. Azure focused Infrastructure as Code (IaC) proficiency with experience deploying secure infrastructure (Bicep/Terraform/ARM). Strong familiarity with Snowflake and related security concepts including data encryption and masking, auditing and monitoring, RBAC and leveraging least privilege principles.. Cloud Security Certifications, CISSP or CCSP certifications preferred.
DGR Systems, a growing premier technology consulting company, is actively seeking a Senior Network Engineer experienced in the architecture, design, and implementation of enterprise networks to join our highly competent team.. The Senior Network Engineer will take on a leadership role in designing and implementing cutting-edge enterprise networks while providing crucial support to our networking practice.. Troubleshoots LAN/WAN, SD-WAN, routing, switching, VPN, firewall, and VoIP equipment, including a broad range of devices (Cisco, Meraki, Fortinet, etc. Develop and maintain technical deliverables including network assessments, capacity planning, detailed design documents, implementation/test plans configuration templates and scripts.. At a glance, DGR Systems was founded in 2009 in Tampa, Florida, and provides full-service solutions in the areas of Modern Workplace (Endpoint Solutions, Collaboration), Security (Identity and Access Management, Zero Trust, Information Protection) Modern Infrastructure and Cloud, and Applications (Collaboration Apps, SQL Reporting, Power Platform).
Uphold and reinforce professional and technical standards (e.g. refer to specific PwC tax and audit guidance), the Firm's code of conduct, and independence requirements.. 5 years of hands-on experience in network security, cybersecurity engineering, or security consulting, including practical implementation, configuration, troubleshooting, and management of security technologies such as firewalls, IDS/IPS, SIEM, endpoint security, and cloud security solutions. Certification(s)Preferred: AWS/Microsoft Solutions Architect, CCNP Security, PCNSE, or ZCCP. Master's Degree in Computer Engineering, Computer Programming, Computer Science, Computer and Information Science, Cybersecurity, Information Technology, Management Information Systems preferred. Learn more about how we work: PwC does not intend to hire experienced or entry level job seekers who will need, now or in the future, PwC sponsorship through the H-1B lottery, except as set forth within the following policy:.
Conducts cyber threat intelligence, computer and network intrusion detection, incident response, and cybersecurity forensic investigations under occasional guidance.. Determines whether an incident should be handled locally or reported to the IT Security Response Team. Works with the IT support staff to repair a system, restore service, and preserve evidence of the incident.. Has determined the behavior and purpose of a simple malware threat and eliminated it from the Company's computers.. - Possesses sufficient fundamental proficiency to successfully demonstrate Digital Forensics capability on system and network data in practical applications of moderate difficulty.. - Demonstrates the ability to successfully review basic Internet connections and internal networks to identify standard hacker/cracker threats.
Develop secure configurations and policies for Azure resources, such as Virtual Machines, Storage Accounts, and Azure Kubernetes Service (AKS).. Leverage Azure Sentinel for threat detection, incident response, and security monitoring.. Conduct regular security assessments, vulnerability assessments, and penetration testing to identify and mitigate risks.. Experience using security architecture methodologies and vulnerability management tools.. Experience designing IAM technologies and services (e.g., Active Directory, LDAP, Azure, IAM).
Our Mission At Dobbs Defense, we deliver mission-centric IT, Cyber, and data analytics solutions for our government and commercial clients through the convergence of automation, innovation, training, and education.. Job Description Dobbs Defense Solutions is seeking a Network Engineer to add to our team.. The engineer will be supporting a robust, world-wide communications network, providing office automation packages.. The engineer will document management tools and collaboration, voice, and video tools in a secure, flexible, distributed architecture supporting a classified DoD IT system.. Responsible for monitoring network hardware operations to ensure properly set configuration options.
IT Security Specialist (ONSITE) Location: Raleigh, NC Duration: 12+ Months Job Description: The Epic/EHR Security Coordinator is responsible for overseeing and ensuring the security of the organization's Epic Electronic Health Record (EHR) system.. Security Management & Compliance: Ensure the Epic EHR system is secure and compliant with federal, state, and organizational security policies, including HIPAA, HITECH, and other applicable regulations.. Security Certifications (e.g., CISSP, CISM, HCISPP) are highly desirable.. Experience with HIPAA compliance, healthcare IT security audits, and risk management.. Required 7 Years Knowledge of role-based access control (RBAC), identity management, and data encryption as it relates to healthcare information systems.