Cyber Intelligence Analyst shall provide intelligence on cyber/EW threats to the BMDS. Assist Cyber Assistance Teams (CATs) whose primary goal is to defeat cybersecurity threats at the source and deter or deny future attacks through tailored mitigation strategies.. Coordinate with IC partners to gather cyber intelligence affecting DIB partners, MDS, and specific MDA programs.. Liaise with Command Combatant Commands (CCMDs), MDA, and other stakeholders to coordinate cyber intelligence requirements and studies.. Develop and submit Priority Requirements (PRs) to address MDA's intelligence needs.. Preferred certifications: Security+ (SEC+), Certified Ethical Hacker (CEH), Network+ (Net+), Certified Information Systems Security Professional (CISSP).
CyberArk is seeking a visionary and strategic leader for a newly created team – CYBR Unit – that is CyberArk’s consulting arm specializing in threat research, Identity Security strategy, digital forensics, adversary simulation and business value assessment.. Design cybersecurity advisory strategy and methodology that are visionary and authoritative and engage with security and business leaders of large organizations, such as CIO, CISO, CTO and CPO leaders.. Partner with our incident response and threat assessment teams to ensure rapid and effective handling of security incidents, to engage in a proactive advisory and posture assessment capacity, and to recommend security solutions aligned with customer desired outcomes.. Develop and share cutting-edge thought leadership research and content on emerging cybersecurity threats and trends and be a spokesperson for CyberArk in media and on stage at conferences.. 15+ years in cybersecurity, with extensive experience in threat intelligence, incident response, and risk management.
Oversee the design, implementation, and maintenance of secure, scalable IT systems—both on-premises and cloud-based—to support healthcare operations and electronic medical records (EMR). Oversee the technical implementation of cybersecurity measures, including network and endpoint security, intrusion detection/prevention, vulnerability management, and incident response readiness. Develop, maintain, and communicate infrastructure policies, procedures, and documentation in accordance with NAPA and IT governance protocols. Minimum of 3 years of hands-on experience managing cloud infrastructure, preferably with Microsoft Azure or equivalent platforms (e.g., AWS, Google Cloud). Strong knowledge of healthcare and IT compliance requirements, including HIPAA and other relevant federal and state regulations.
This position is for Day-Shift, and the Senior Threat Intelligence Analyst will be responsible for working towards continuous improvement through new processes, mastering and being a subject matter expert of current processes, waste elimination efforts, and collaboration with teams both within and outside of Cybersecurity.. Research and author Threat Assessment Reports for Risk Organization. Formal IT Security/Network Certification, such as WCNA, CompTIA Network+ and Security +, Cisco CCNA, ISC2 CISSP, GIAC GCIH, GMON, GCFA, GCFE, GREM, GICSP, GRID, or other relevant certifications. Previous experience supporting cyber defense analysis of Operational Technology (OT) Networks, including Industrial Controls Systems (ICS), Supervisory Control and Data Acquisition (SCADA), and Process Control Networks (PCN). Experience with compliance standards: NERC-CIP, SOX, TSA
Data-at-Rest Encryption : Apply and manage encryption solutions for stored data, including managing Thales HSMs to support encryption requirements.. Business Continuity : Develop and test disaster recovery plans, ensure service resilience.. Tenant Security Management : Oversee security configurations and policies within the tenant, conduct regular security audits, and ensure compliance with security standards.. Microsoft Purview Administration : Oversee data governance, risk, and compliance solutions within Microsoft Purview.. Strong understanding of tenant security management, retention policies, and Microsoft Purview.
A nationally recognized property and casualty insurance provider with nearly a century of consistent financial performance. The Vice President of Enterprise Security & Risk Governance will lead the organization's cybersecurity, risk management, and incident response functions. Oversee disaster recovery planning and crisis response initiatives. Assistant Professor of Molecular Biology and Biochemistry.. Temporary Upward Bound and Upward Bound Math-Science Instructor
Your insights will directly influence product strategy, go-to-market plans, and customer enablement initiatives. Your mission: to champion the power of the Cisco 8000 Series Secure Router and help deliver intuitive, secure, and scalable solutions that protect and empower modern enterprises. Experience in network security technologies, including NGFW, IPSec, DDoS protection, malware detection, and encryption. Experience with routing technologies such as SD-WAN and protocols like BGP, OSPF, and EIGRP. Solid understanding of cloud environments (SaaS & IaaS); relevant certifications in cloud, security, or AI are a plus.
CrossCountry Consulting’s Risk and Compliance practice is rapidly growing and looking for technology risk professionals.. Our Technology Risk Advisory services include IT strategy and governance, IT risk assessment, IT audit, cybersecurity, cloud security, privacy and data protection, systems pre-and post-implementation controls evaluation and advisory, systems development life cycle controls assessment, data governance & analytics, RPA (robotics process automation), disaster recovery, SOX and IT project risk management.. Professional certifications such as CISA, CISM, CISSP, CIA or the ability to demonstrate progress towards achieving certification. Expertise working with risks and internal controls, including IT audit, IT compliance, and IT consulting. Additionally, employees can take advantage of generous parental and maternity leave policies, technology stipends, and wellness reimbursement programs, all designed to support both professional growth and personal well-being.
Key Responsibilities: Design, configure, and maintain LAN/WAN, VPN, firewalls, and routing protocols (BGP, OSPF, EIGRP).. Work with cloud platforms (AWS, Azure, GCP) to optimize network infrastructure.. Collaborate with IT teams to automate network operations (Python, Ansible, Terraform).. Expertise in Cisco, Juniper, Palo Alto, or Fortinet technologies.. Experience with firewalls, IDS/IPS, and network security best practices.
The IT Director / Security Officer is responsible for overseeing all information technology operations while serving as the organization's designated HIPAA Security Officer.. Bachelor's degree in IT, Computer Science, Cybersecurity, or related field required; Masters preferred.. Required certifications : CISSP, CISA, CISM, or equivalent security certification.. 5+ years IT management experience in healthcare organizations with 3+ years information security experience with HIPAA compliance.. Review and interpret healthcare IT security regulations including HIPAA Security Rule, encryption requirements, access controls, and security incident response.
As the leading platform for Daily Fantasy Sports, we cover a diverse range of sports leagues, including the NFL, NBA, and Esports titles like League of Legends and Counter-Strike.. Own the roadmap for corporate IT systems, network architecture, device management, identity and access management, and IT service desk.. Design, implement, and manage robust security operations programs covering threat intelligence, application security, vulnerability management, penetration testing, security monitoring, incident response, and employee security awareness training.. Stay current with emerging technology trends, security threats, and regulatory changes impacting the sports gaming industry and advise the business on necessary adaptations.. Strong understanding of modern SaaS environments, device management, identity management (IAM, MDM), GRC, and security frameworks.
The AWS Cloud Architect will work closely with DevOps, security, application, and infrastructure teams to establish cloud governance models while ensuring operational efficiency and security.. Automate infrastructure provisioning using Infrastructure-as-Code (IaC) tools such as Terraform, AWS CloudFormation, or AWS CDK.. Familiarity with Infrastructure as Code (IaC) tools like Terraform, AWS CloudFormation, and AWS CDK.. Knowledge of container orchestration (EKS, ECS, Kubernetes), serverless (Lambda, API Gateway), and microservices architectures.. AWS Certified Solutions Architect – Professional
Candidate must possess an active DOD TS/SCI level security clearance, and be eligible to obtain and maintain a w/CI Poly.. Technical depth in network services and architecture (WAN/LAN/virtual private network (VPN. Advanced routing – BGP. In-depth experience with security domains and industry best practices; business continuity and disaster recovery, emerging technology.. Knowledge in Information Technology Infrastructure Library (ITIL) Foundation.
Sr. Information Security Engineer with Security Clearance Piper Companies is seeking an experienced Information Security Engineer to take a holistic, system–of–systems approach to enhancing and aligning cybersecurity, information assurance, and information management efforts across PEO C3N. T his role is fully onsite located in Aberdeen, Maryland.. Areas of expertise may involve encryption, secure communications (COMSEC/TEMPEST), satellite and mobile network security, tactical internet protection, and cross–domain solutions.. Qualifications of the Information Security Engineer: 10+ years of experience in TCP/IP networking, information security, and managing security for Windows and Linux environments.. Strong understanding of government cybersecurity policies and familiarity with tools such as endpoint protection, SIEM systems, PKI, and auditing technologies used in DoD networks.. Compensation of the Information Security Engineer: Salary range: $100,000 – $150,000, depending on experience.
Our full-stack quantum computing platform uses superconducting devices along with a modular, robust, and scalable architecture.. Our unique approach is based on a decade of technology research and breakthroughs at Yale University's world-renowned quantum labs.. This ensures QCI’s infrastructure is secure, resilient, and capable of supporting our cutting-edge quantum computing platform.. Develop, implement, and maintain security policies, procedures, and best practices to safeguard systems, data, and QCI’s quantum computing platform. Deep understanding of security concepts, including network security, encryption, identity and access management, and compliance standards (e.g., ISO, NIST, PCI-DSS)
Bowhead is seeking a SR Cybersecurity Engineer to support its PEO C3N Contract in Aberdeen, MD. The Cybersecurity Engineer will provide a system-of-systems approach to advancing and synchronizing c security architecture associated with protecting our assets (firewalls, intrusion detection systems, endpoint security systems, SIEM platforms, and threat mitigation) across PEO C3N.. Technical subject areas include encryption technologies, communications security/transmission security, satellite network security, cellular, radio and Tactical Internet security and cross-domain solutions.. Information Management Support: Provide desktop hardware and software support, to include inter-operable and integrated standard office automation desktop software support.. Be capable of providing security engineering analysis on a variety of information systems and guide the development of Cybersecurity policy, network and cyber security architecture, implementation plans, certification and accreditation for PEO C3N systems.. US Citizenship is a requirement for Top Secret clearance at this location.
COMPUTER AND INFORMATION SCIENCE (CIS)/CYBERSECURITY FACULTY, TENURE TRACK page is loaded COMPUTER AND INFORMATION SCIENCE (CIS)/CYBERSECURITY FACULTY, TENURE TRACK Apply locations San Diego County - Cuyamaca College time type Full time posted on Posted 7 Days Ago job requisition id R-02393 Transforming lives through learning isn’t just the vision of the Grossmont-Cuyamaca Community College District. Industry certification, such as CCIS, CompTIA Security+, CISSP, CEH, OWASP. Familiarity with SIEM tools, firewalls, IDS/IPS, cloud security.. Ability to teach online using modern LMS platforms (e.g., Canvas, Blackboard). Similar Jobs (2) COMPUTER SCIENCE FACULTY, TENURE TRACK locations San Diego County - Cuyamaca College time type Full time posted on Posted 11 Days Ago CENTER FOR WATER STUDIES - WATER/WASTEWATER TECHNOLOGY INSTRUCTOR, TENURE TRACK locations San Diego County - Cuyamaca College time type Full time posted on Posted 30+ Days Ago
The Executive Strategic Security Advisor plays a pivotal role in enhancing client cybersecurity posture by acting as a strategic liaison between a client CISO, or a vCISO capability from NuHarbor or another third party, and the practical execution of cybersecurity initiatives. This role requires a unique blend of skills in strategic planning, technical expertise, and exceptional communication skills to ensure seamless alignment of client cybersecurity strategy execution with business objectives and operational excellence. Collaborate with the CISO or vCISO to develop or review and refine the appropriate cybersecurity strategy, ensuring it aligns with business goals and client organizational risk management priorities. Bachelor’s degree in computer science, Cybersecurity, Information Security, or related field and Ten (10) years or more experience in cybersecurity with a proven record of accomplishment in a variety of domains such as endpoint protection, intrusion detection, application security, and secure networking. Professional cybersecurity certifications (e.g., CISSP, CISM, GIAC) are appreciated but not required.
Lead and execute red team operations and penetration tests to identify security weaknesses in clients' networks, systems, and applications.. Work closely with clients to enhance their incident response strategies and security awareness based on insights from red team operations.. At least 3 years of hands-on experience in cybersecurity roles focused on penetration testing or red team operations.. Proficiency with penetration testing tools like Metasploit, Burp Suite, and Cobalt Strike, and scripting languages such as Python and PowerShell.. Preferred certifications include OSCP, CEH, GPEN, and GWAPT.
Wentworth Institute of Technology’s School of Computing & Data Science invites applications for an Open-rank Professor or Lecturer in Cybersecurity or IT for the FALL semester of 2025. Performing service to the university and the profession, which includes academic advising, student engagement, and serving on committees. Particular attention will be given to candidates with a background in cybersecurity, offensive security, network security, software security, malware analysis, digital forensics or information technology. co-educational, nationally ranked university offering career-focused education through 24 bachelor’s and 13 master’s degree programs in areas including Computer Science, Data Science, Cybersecurity, Engineering, Architecture, Design, and Construction Management. E-Verify is an internet-based system that compares information from your Form I-9 to records available to the U.S. Department of Homeland Security (DHS) and Social Security Administration (SSA) to confirm that you are authorized to work in the United States.