Must possess an active Top-Secret clearance with the ability to obtain SCI. Deep understanding of user credentials, identities, authentication, SSO, applications, workloads, endpoints, networks, data, automation, security analytics, SIEM, SOAR, threat intelligence.. Hands-on experience with cloud computing technologies, especially AWS (Amazon Web Services), Azure, or GCP (Google Cloud Platform). Collaborate on Archer module customization to encompass Zero Trust, Privileged Access Management (PAM), Supply Chain Risk Management (SCRM), and Generative AI requirements.. Architect Zero Trust technologies within the environment covering IAM, Network Segmentation, Encryption, and integrations with other customer applications such as CyberArk and Tanium.
Digital Forensics, Malware Analysis, and Reverse Engineering. AI-Driven Threat Intelligence & Defense: Leveraging machine learning and large language models (LLMs) for predictive threat intelligence, autonomous network defense, and next-generation incident response.. Autonomous Security Operations: Technologies that automate and accelerate security functions, including AI-based vulnerability assessment, autonomous penetration testing, and AI-powered digital forensics and malware analysis.. Programming in Python, JavaScript, Golang, or Rust. Lead Application / Cloud Solutions Architect
We are seeking a skilled and detail-oriented Threat Intelligence Analyst to join our cybersecurity team.. Key Responsibilities: Monitor and analyze threat intelligence feeds, indicators of compromise (IOCs), and emerging cyber threats.. Develop and maintain threat intelligence databases, dashboards, and knowledge bases.. + years of experience in cybersecurity, with at least year in threat intelligence or a related field.. Familiarity with threat intelligence platforms (TIPs), SIEM tools (, Splunk, QRadar), and MITRE ATT&CK framework.
10+ years of demonstrable experience as a Chief Information Security Officer or in a similar senior-level cybersecurity role.. Relevant certifications in cybersecurity, such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or Certified Information Systems Auditor (CISA).. Expertise in secure software development and DevSecOps practices.. Understanding of artificial intelligence and machine learning applications in security.. Multilingual proficiency for international security collaboration.
Reporting to the Chief Information Officer (CIO), the Head of Information Security focuses on cybersecurity (not physical security) and serves as the organization’s top advisor on information protection and compliance matters. Key priorities for the coming year include strengthening security compliance (e.g. SOX, PCI-DSS), enhancing Governance, Risk, and Compliance (GRC) processes, improving intrusion detection and incident response capabilities, and advancing business continuity and disaster recovery readiness. Regulatory Compliance & Risk Management: Lead the enterprise GRC program, ensuring security controls and processes meet all relevant regulatory and industry standards (such as PCI-DSS for payment security and SOX for financial controls). Experience: Extensive professional experience in information security and IT risk management, including demonstrated success in leading cybersecurity teams or programs at the enterprise level.. Technical Expertise: Demonstrated expertise in key security domains and technologies – including risk assessment, incident response, security operations (SIEM/SOC monitoring, intrusion detection systems), identity and access management, and cloud security controls.
$17 million contract awarded by U.S. Space Force’s Space Systems Command (SSC) to offer its zero trust access control.. Named in Gartner research on Cyber-Physical Systems Protection Platforms, Zero Trust Network Access, Remote Privileged Access Management, and CPS Secure Remote Access.. In-depth understanding and practical knowledge of LAN, WAN, firewalls, routers, VPN, IPSec, DPI. Experience in crypto, PKI, Microservice architecture and large scale infrastructure.. Strong communication skills and expert system level skills on Linux OS such as Ubuntu, Alpine, Red Hat Linux
10+ years of demonstrable experience as a Chief Information Security Officer or in a similar senior-level cybersecurity role.. Relevant certifications in cybersecurity, such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or Certified Information Systems Auditor (CISA).. Expertise in secure software development and DevSecOps practices.. Understanding of artificial intelligence and machine learning applications in security.. Multilingual proficiency for international security collaboration.
Configure, monitor, and maintain cybersecurity platforms, including SIEM, EDR, XDR, NDR, SOAR, and MTD, to ensure stable and efficient operations.. Conduct cyber risk assessments, vulnerability management, and penetration testing to identify and remediate security gaps.. EDR/XDR: CrowdStrike, TrendMicro, SentinelOne, Symantec. Certifications: CCNP (Network & Security), CCT (Datacenter), MCSE, MCSA, MCP, VMware will be added advantage.. Strong incident response, threat hunting, and cyber risk assessment capabilities.
Own and maintain the IT Security Policy, Disaster Recovery Plan, and Incident Response protocols in accordance with internal standards and audit readiness requirements.. vPenTest for automated penetration testing and vulnerability validation.. CATO Networks for secure SD-WAN and cloud-native network security, including SASE architecture and Zero Trust Network Access (ZTNA).. Professional certifications such as CISSP, CISM, CISA, or CRISC strongly preferred.. Experience with SIEM, IAM, DLP, endpoint protection, and cloud security tools.
We are seeking a highly skilled Cyber Security Manager to lead our organization's security efforts, with a strong emphasis on securing the Microsoft 365 platform and enterprise network infrastructure.. Enforce identity and access management (IAM), including MFA, conditional access policies, role-based access control (RBAC), and privileged identity management (PIM).. Conduct penetration testing, log analysis, and threat intelligence to proactively identify and remediate vulnerabilities.. Hands-on experience with firewalls, endpoint security, IDS/IPS, SIEM solutions, and vulnerability management tools.. Professional certifications such as CISSP, CISM, Microsoft Security certifications (SC-200, SC-300, SC-400), or CEH are preferred.
Our mission-first software and data engineering platform modernizes data operations, utilizing advanced workflows, CI/CD, and secure DevSecOps practices.. Hands-on experience with next-gen firewalls (Palo Alto, Cisco ASA/Firepower), IDS/IPS, and VPN technologies.. Proficiency with SIEM platforms (Splunk, QRadar, Sentinel, etc.). Experience with vulnerability scanning and remediation tools (Nessus, Qualys, OpenVAS).. Cloud security expertise (AWS Security Hub, Azure Defender, GCP Security Command Center).
Manage and maintain security-related hardware and software, including firewalls, IDS/IPS, SIEM systems, and endpoint security solutions.. Ensure compliance with industry standards (e.g., PCI DSS, HIPAA, GDPR) and internal security policies.. Effectively administrate Windows Active Directory, Symantec Endpoint Protection, VMware, Veeam Backup, SolarWinds and Ivanti.. Good technical skill in LAN/WAN, configuration and troubleshooting server, storage and tape library hardware knowledge.. Knowledge of networking such as Fortinet, Sophos and Cisco switch, router, and firewall.
Design, implement, and manage cybersecurity solutions, including firewalls, intrusion detection and prevention systems (IDS/IPS), virtual private networks (VPNs), endpoint protection platforms, data loss prevention (DLP) tools, and security information and event management (SIEM) systems.. Perform regular vulnerability assessments and penetration testing and prioritize remediation of identified risks.. Professional certifications such as CISA, CISSP or equivalent.. Working knowledge of regulatory compliance standards, including HIPAA and other data protection frameworks.. Minimum of 3 years of hands-on experience with security tools and technologies such as firewalls, intrusion detection/prevention systems (IDS/IPS), security information and event management (SIEM), and data loss prevention (DLP).
Architect, deploy, and maintain security infrastructure components, including Intrusion Detection/Prevention Systems (IDS/IPS), Security Information and Event Management (SIEM) platforms, Endpoint Detection and Response (EDR) solutions, and Web Application Firewalls (WAFs).. Comprehensive understanding of cloud security services, including AWS (e.g., IAM, Security Groups, GuardDuty) and GCP (e.g., Cloud Armor, Security Command Center).. Proficiency with security tools such as vulnerability scanners, SIEM, DAST, and intrusion detection systems (e.g., Wazuh, Zeek, Suricata), as well as endpoint protection solutions (e.g., Sentinel One).. Proficiency in scripting languages such as Python, PowerShell, or Bash for security automation and tool integration.. Relevant certifications such as CISSP, OSCP, or CISM are highly preferred.
Cloud Platforms: Design and implement solutions on AWS, Azure, or GCP — including networking, security, compute, storage, and IAM configurations.. Application Integration: Define API architecture (REST, SOAP, GraphQL), middleware integration (MuleSoft, Dell Boomi), and microservices communication patterns.. Infrastructure as Code (IaC): Hands-on in Terraform, CloudFormation, ARM templates for automated provisioning.. DevOps Enablement: Integrate CI/CD pipelines (Jenkins, GitLab CI, Azure DevOps) into solution delivery.. Cloud: AWS Certified Solutions Architect – Professional, Microsoft Certified: Azure Solutions Architect Expert, Google Professional Cloud Architect.
We are seeking a dedicated and hands-on Cyber Security Engineer to help safeguard our cloud and hybrid environments.. Deploy and maintain security controls for cloud/hybrid environments (AWS, Azure, Kubernetes, Docker, etc. Support threat intelligence and vulnerability management efforts.. Proficiency with SIEM tools (e.g., Microsoft Sentinel, Splunk or Securonix).. Relevant certifications preferred (e.g., CompTIA Security+, AWS Security Specialty, CEH).
The Resident Network Engineer will support and troubleshoot Juniper network systems, ensuring secure and efficient network operations.. Provide guidance on deploying and configuring Juniper products to align with design standards.. Deep understanding of IP networking protocols and routing technologies such as OSPF, BGP, MPLS, and IPv6.. Proven expertise in network security practices, including firewalls, NAT, DDoS mitigation, IPS/IDS, and application-level security.. Skilled in configuring and operating Juniper routers, firewalls, and switches, with exposure to EX and MX Series devices.
Cybersecurity Analyst, Network Security Analyst, Information Security Analyst, Intrusion Detection Analyst, Threat Analyst, Security Operations Center (SOC) Analyst, Incident Response Analyst, Cyber Threat Intelligence Analyst, Penetration Tester, Vulnerability Analyst, etc.. Cybersecurity, Computer Science, Information Technology, Network Security, Information Systems, Data Analytics, Software Engineering, Electrical Engineering, Risk Management, Security Studies, etc.. Knowledge of threat intelligence platforms. Experience with penetration testing tools. We are a growing small business and a trusted federal contractor offering full scope consulting services in information technology, cybersecurity, and analyst workforce development.
We are seeking a highly skilled Cyber Security Manager to lead our organization's security efforts, with a strong emphasis on securing the Microsoft 365 platform and enterprise network infrastructure.. Enforce identity and access management (IAM), including MFA, conditional access policies, role-based access control (RBAC), and privileged identity management (PIM).. Conduct penetration testing, log analysis, and threat intelligence to proactively identify and remediate vulnerabilities.. Hands-on experience with firewalls, endpoint security, IDS/IPS, SIEM solutions, and vulnerability management tools.. Professional certifications such as CISSP, CISM, Microsoft Security certifications (SC-200, SC-300, SC-400), or CEH are preferred.
EDR/XDR (e.g., CrowdStrike, Defender for Endpoint). Firewall and IDS/IPS management (e.g., Palo Alto, Cisco, Snort). Strong experience with identity and access management (IAM), privileged access management (PAM), and zero trust architectures.. GIAC (GSEC, GCIA, GCIH, or similar). CEH, CISM, AWS/Azure Security Specialty, or OSCP