Resideo is seeking a strategic and experienced leader to oversee the global cloud infrastructure, Site Reliability Engineering (SRE) for our large-scale, connected products ecosystem and CloudOps. This role will drive the performance, reliability, security, and operational excellence of our multi-cloud environments (Azure), supporting millions of IoT devices and trillions of data points and events. Develop automated deployment, monitoring, and recovery systems using technologies like Kubernetes, Terraform, Ansible, and CI/CD pipelines. Implement robust security practices and ensure cloud security, compliance with standards such as SOC2, GDPR, and NIST, and oversee the zero-trust security model for IoT data protection. 5+ years of hands-on experience with tools like Terraform, Ansible, CDK, Pulumi for Infrastructure-as-Code (IaC), and managing cloud-native architectures.. Solid understanding of security-first cloud architectures, DevSecOps, and compliance standards (SOC2, GDPR, NIST)
This position is for Day-Shift, and the Senior Threat Intelligence Analyst will be responsible for working towards continuous improvement through new processes, mastering and being a subject matter expert of current processes, waste elimination efforts, and collaboration with teams both within and outside of Cybersecurity.. Research and author Threat Assessment Reports for Risk Organization. Formal IT Security/Network Certification, such as WCNA, CompTIA Network+ and Security +, Cisco CCNA, ISC2 CISSP, GIAC GCIH, GMON, GCFA, GCFE, GREM, GICSP, GRID, or other relevant certifications. Previous experience supporting cyber defense analysis of Operational Technology (OT) Networks, including Industrial Controls Systems (ICS), Supervisory Control and Data Acquisition (SCADA), and Process Control Networks (PCN). Experience with compliance standards: NERC-CIP, SOX, TSA
Data-at-Rest Encryption : Apply and manage encryption solutions for stored data, including managing Thales HSMs to support encryption requirements.. Business Continuity : Develop and test disaster recovery plans, ensure service resilience.. Tenant Security Management : Oversee security configurations and policies within the tenant, conduct regular security audits, and ensure compliance with security standards.. Microsoft Purview Administration : Oversee data governance, risk, and compliance solutions within Microsoft Purview.. Strong understanding of tenant security management, retention policies, and Microsoft Purview.
A nationally recognized property and casualty insurance provider with nearly a century of consistent financial performance. The Vice President of Enterprise Security & Risk Governance will lead the organization's cybersecurity, risk management, and incident response functions. Oversee disaster recovery planning and crisis response initiatives. Assistant Professor of Molecular Biology and Biochemistry.. Temporary Upward Bound and Upward Bound Math-Science Instructor
We are seeking a visionary and strategically minded Chief Information Officer (CIO) to lead our technology and product strategy. Certifications (Preferred / Bonus) : CISSP, CISM, PMP, or Product Management certifications (e.g. Pragmatic Institute, SAFe, or Scrum.org).. Champion the adoption of emerging technologies (e.g., AI, blockchain, digital identity) to enhance services and differentiate the business. Oversee and enhance the organization's NOC / SOC operations, including disaster recovery planning, tiered support escalation, and on-call rotation strategies, with a focus on maximizing system uptime, ensuring rapid incident response, and maintaining business continuity across all critical infrastructure. 10–15 years of progressive IT experience, with a minimum of 5 years in a senior leadership capacity (CIO, CTO, VP of IT / Product).
San Francisco / Flight Systems – Embedded Systems / Full time / On-site. You will conduct security audits, perform penetration testing, and resolve vulnerabilities in software and firmware stacks.. 5+ years experience with security architecture design, cryptography, zero-trust implementations, bonus if in aviation or aerospace. Deep expertise in embedded Linux, bootloaders, and network stacks. Our standard interface enables us to fly multiple customer payloads on the same satellite, with capabilities such as earth imagery, weather & climate /science data collection, IoT connectivity, in-orbit demonstrations, and national security missions.
Chief Information Security Officer is responsible for delivering strategic vision and operational oversight for the Enterprise Information Security Architecture and Security Operations Center.. Security Operations Management: Lead the security operations team for product and infrastructure, ensuring the implementation of robust security controls, incident response protocols, vulnerability management, and security monitoring.. Extensive experience in independently leading security operations, including incident response, threat intelligence, vulnerability management, and security monitoring.. Proficiency in security architecture design, Product security, responding to vendor questionnaire and cyber security forms, network security, cloud security, identity and access management, encryption, and secure coding practices.. RaySafe is the worldwide leader of X-ray test equipment, real-time staff dosimetry, and radiation survey meters.
Lead the design and implementation of security measures across infrastructure and application layers (GCP, Azure, Kubernetes). Strong background in risk assessment, threat modeling, vulnerability management. Hands-on experience with GCP, Azure, or AWS. Familiarity with secure coding practices, especially in JavaScript/TypeScript and Node.js. By applying, you consent to data processing for recruitment purposes, in accordance with GDPR and our privacy policy here.
As a Consulting Solutions Architect (CSA), you will be partnering with Client Managers to provide the technical Pre-Sales work focused on Networking and Automation for our Enterprise customers across the Region.. No two days will be the same as our broad offerings include Infrastructure Modernization, Multicloud Architecture, Security Transformation, Artificial Intelligence (AI) and Digital Strategy among others.. Develop and maintain the enterprise’s data protection architecture, including backup, disaster recovery, and encryption frameworks.. Evaluate and recommend data protection tools and technologies, such as DLP, DRM, CASB, and secure file-sharing systems.. Enterprise-scale technical experience with Data Center solutions, network security, cloud security, hybrid infrastructures secure, architecture designs, and technology management.
This program will maximize the effectiveness and efficiency of our country’s most important missions both at home and abroad.. 3+ years of experience in analysis, network engineering, network security, vulnerability assessment, technical collection, penetration testing, red teaming, hardware engineering, software reverse engineering, cyber operations, and/or computer exploitation.. 6+ years of experience across technical competencies, such as: analysis, network engineering, network security, vulnerability assessment, technical collection, penetration testing, red teaming, hardware engineering, software reverse engineering, cyber operations, and/or computer exploitation.. Headquartered in Columbia, MD., RealmOne supplies advanced cybersecurity, data science and software engineering services and products to customers in the Government and commercial sectors.. RealmOne has won numerous awards, to include Top Workplaces by the Baltimore Sun. Across more than 20 prime contracts, RealmOne is a premiere innovator for the Government and Department of Defense, and our team is located across the United States.
The Director-IT Security and Infrastructure is responsible for overseeing the strategic management and operation of technology infrastructure, cloud services, identify and access management and the cybersecurity program for Trinity Health Michigan Medical Groups.. Maintains oversight of all the information systems technical infrastructure for Michigan Medical Groups including data center operations, the physical and virtual server environment, storage, LAN/WAN, end-user devices, telephony infrastructure and backup and disaster recovery.. In collaboration with the Vice President-Information Technology, develops the IT Strategic Plan and technical priorities, standards and procedures.. Experience in managing the specific technical areas of data center operations, the physical and virtual server environment, the storage environment, LAN/WAN, end-user devices, telephony infrastructure, backup and disaster recovery.. Direct experience with cyber threat intelligence, incident response, and security operations.
With more than 500 millionaire employee-owners in our Employee Stock Ownership Plan (ESOP). Provide system support for all aspects of cabling and networking hardware and software products. Maintain all network hardware and software including router, switches, wireless controller, VPN appliances, PBX’s and intercom systems. Design, Engineer, and Maintain security solutions, including firewall, intrusion prevention systems and VPN’s. Aid in development of business continuity, incident response, and disaster recovery plans and maintain current knowledge of plan executables.
Design/install/operations of VPN, SoHo, WAF, IDS, DDoS, Partner Access Solutions, Network Security Stack powering Zero-Trust, Firewalls and microsegmentation protecting CCS operations infrastructure (SIEM, DataLake, WAF, IDS, SOC dashboards).. Must have experience designing and maintaining full-stack web applications using Python and relevant frameworks (Django, Flask). Knowledge of front-end technologies (e.g., HTML, CSS, JavaScript, Angular/React). Databricks Platform, Django Development, Flask (Web Framework), Python (Programming Language) Compensation. Most sales positions are eligible for a Commission under the terms of an applicable plan, while most non-sales positions are eligible for a Bonus.
Provide legal advice and counsel on privacy and data security matters.. Manage data governance policies and support privacy program operations.. Advise on AI and data governance initiatives and support cybersecurity incident response.. Membership in good standing in the Virginia State Bar or other US states, with the ability to operate with a Virginia corporate counsel certificate.. IAPP certifications (CIPP-US, CIPM) are preferred.
Respond quickly to technical incidents, including those affecting branches or trading operations.. Maintain accurate and timely records of all issues in the ITSM/helpdesk ticketing system.. Job Requirements: Diploma or Degree in Information Technology, Computer Engineering, or related field.. 1–2 years of experience in a technical support or IT infrastructure role, preferably in a banking or financial services environment.. Familiarity with compliance standards relevant to financial institutions (e.g., MAS TRM, PCI-DSS).
Managing virtual networks on cloud platforms such as Azure, Google Cloud, AWS, and VMware.. Work Mode: Remote (Work from Home). Switching technologies: VLAN, VXLAN, VTP, VSS on Cisco Catalyst, Nexus, HP, Juniper, SDLAN. Routing: Protocol configuration and troubleshooting for traditional WAN and SDWAN (VeloCloud & Cisco Meraki). Network security protocols, LAN, WAN, wireless networks, DHCP, DNS, Proxy, VPN, TCP/IP, VoIP, virtualization, high availability, disaster recovery, routers, device drivers
Sr. Information Security Engineer with Security Clearance Piper Companies is seeking an experienced Information Security Engineer to take a holistic, system–of–systems approach to enhancing and aligning cybersecurity, information assurance, and information management efforts across PEO C3N. T his role is fully onsite located in Aberdeen, Maryland.. Areas of expertise may involve encryption, secure communications (COMSEC/TEMPEST), satellite and mobile network security, tactical internet protection, and cross–domain solutions.. Qualifications of the Information Security Engineer: 10+ years of experience in TCP/IP networking, information security, and managing security for Windows and Linux environments.. Strong understanding of government cybersecurity policies and familiarity with tools such as endpoint protection, SIEM systems, PKI, and auditing technologies used in DoD networks.. Compensation of the Information Security Engineer: Salary range: $100,000 – $150,000, depending on experience.
The Executive Strategic Security Advisor plays a pivotal role in enhancing client cybersecurity posture by acting as a strategic liaison between a client CISO, or a vCISO capability from NuHarbor or another third party, and the practical execution of cybersecurity initiatives. This role requires a unique blend of skills in strategic planning, technical expertise, and exceptional communication skills to ensure seamless alignment of client cybersecurity strategy execution with business objectives and operational excellence. Collaborate with the CISO or vCISO to develop or review and refine the appropriate cybersecurity strategy, ensuring it aligns with business goals and client organizational risk management priorities. Bachelor’s degree in computer science, Cybersecurity, Information Security, or related field and Ten (10) years or more experience in cybersecurity with a proven record of accomplishment in a variety of domains such as endpoint protection, intrusion detection, application security, and secure networking. Professional cybersecurity certifications (e.g., CISSP, CISM, GIAC) are appreciated but not required.
Lead and execute red team operations and penetration tests to identify security weaknesses in clients' networks, systems, and applications.. Work closely with clients to enhance their incident response strategies and security awareness based on insights from red team operations.. At least 3 years of hands-on experience in cybersecurity roles focused on penetration testing or red team operations.. Proficiency with penetration testing tools like Metasploit, Burp Suite, and Cobalt Strike, and scripting languages such as Python and PowerShell.. Preferred certifications include OSCP, CEH, GPEN, and GWAPT.
Wentworth Institute of Technology’s School of Computing & Data Science invites applications for an Open-rank Professor or Lecturer in Cybersecurity or IT for the FALL semester of 2025. Performing service to the university and the profession, which includes academic advising, student engagement, and serving on committees. Particular attention will be given to candidates with a background in cybersecurity, offensive security, network security, software security, malware analysis, digital forensics or information technology. co-educational, nationally ranked university offering career-focused education through 24 bachelor’s and 13 master’s degree programs in areas including Computer Science, Data Science, Cybersecurity, Engineering, Architecture, Design, and Construction Management. E-Verify is an internet-based system that compares information from your Form I-9 to records available to the U.S. Department of Homeland Security (DHS) and Social Security Administration (SSA) to confirm that you are authorized to work in the United States.