Cybersecurity & Network Management Jobs
Secure enterprise systems with these Cybersecurity & Network roles. Prevent breaches, protect data, and maintain robust IT infrastructures.
Join a forward-thinking biotechnology company dedicated to revolutionizing cancer research and therapy with AI-powered drug discovery.. Their platform combines high-throughput screening with cutting-edge machine learning and computational biology to expedite the creation of life-saving treatments.. Cloud Security & Infrastructure Protection Secure AWS environments, including IAM, VPCs, S3, EC2, Lambda, and Kubernetes.. Security Automation & DevSecOps Integrate security measures into CI/CD pipelines to uphold infrastructure-as-code (IaC) security best practices.. Expertise in DevSecOps practices and infrastructure-as-code security (Terraform, CloudFormation, Ansible, or Pulumi).
Implement cloud security controls such as IAM and encryption.. Certifications: Possession of industry-recognized certifications such as Security +, Cysa+ , GMON, GSEC, CISSP, CISM, CEH, GIAC, CCSP, or similar are required.. Proficiency in tools and technologies used in cyber security operations such as EDR, XDR, SIEM, SOAR, etc.. Experience with cloud security, particularly in environments like AWS, Azure, or Google Cloud.. Comprehensive knowledge of malware analysis, threat modeling, and vulnerability management.
Essential functions Incident Response Specialist III is a highly skilled and experienced security professional with a deep understanding of incident response methodologies, security technologies, and threat intelligence.. Analyze threat intelligence to identify potential risks to the organization.. GIAC Certified Incident Handler (GCIH) or equivalent.. GIAC Certified Forensic Analyst (GCFA) or equivalent.. Job Type: Full-time Benefits: Full Benefits Package Clearance: TS\SCI Work Location: Miami, FL Company Overview: Athena Technology Group, Inc. (ATG) is a Service-Disabled Veteran Owned Small Business (SDVOSB) focused on Information Technology and Communications consulting, system engineering, integration, deployment and operation of state-of-the-art command and control and information systems that deliver critical network centric solution to the warfighter.
Automate security processes using SOAR, scripting (Python, PowerShell), and threat intelligence integrations.. Stay ahead of evolving cyber threats and contribute to strategic security initiatives.. Technical Expertise: Deep knowledge of SIEM (Splunk, QRadar, Microsoft Sentinel), EDR, IDS/IPS, and firewalls.. Strong understanding of network protocols, threat intelligence, malware analysis, and cloud security.. Certifications (Preferred): CISSP, GCIA, GCIH, CISM, OSCP, or equivalent.
Architecture & Design: Develop secure network architectures, optimize firewall configurations, and ensure secure access control policies.. Incident Response: Collaborate with stakeholders to create incident response plans, investigate security incidents, and support rapid mitigation efforts.. Tooling & Automation: Advise on and integrate advanced security solutions, including IDS/IPS systems, SIEM platforms, and network monitoring tools.. Experience: 5+ years of experience in network security, including firewall management, intrusion detection/prevention, and network segmentation.. Certifications: Industry certifications such as CISSP, CISM, CCSP, or CCNP Security are preferred.
Carpenter Technology Corporation is a leading producer and distributor of premium specialty alloys, including titanium alloys, nickel and cobalt based superalloys, stainless steels, alloy steels and tool steels.. Building on its history of innovation, Carpenter Technology's wrought and powder technology capabilities support a range of next-generation products and manufacturing techniques, including novel magnetic materials and additive manufacturing.. Contributes as needed with Identity and Access Management (IAM) duties including user account provisioning, password vaulting, periodic access review, and encryption key management. Minimum 5 years of related experience with Access Management, Security Operations, Network Security, Vulnerability Management, Compliance, or Audit.. Adoption of security best practices and industry standards (e.g. NIST, ISO, CIS, COBIT, etc
Collaborate closely with IT infrastructure, application development, DevSecOps, and business teams to embed security principles throughout technology development and deployment phases.. Deep understanding of defense-in-depth strategies, zero-trust models, identity and access management (IAM), threat modeling, key management techniques, vulnerability assessment techniques, and secure coding practices.. Excellent knowledge of WAF, NG Firewalls, intrusion detection/prevention systems (IDS/IPS), network segmentation, VPNs, network access control (NAC), DMZ design, and DDoS mitigation.. Proficient in cloud security models (IaaS, PaaS, SaaS), cloud-native security tools, encryption and key management, privileged access management (PAM), security posture, and compliance within cloud environments.. Our People First Culture celebrates diversity, equity, and inclusion not simply because it’s the right thing to do, but also because it’s the key to our success.
Experience with enterprise risk management, disaster recovery, and incident response.. Lead efforts to achieve and maintain compliance with relevant regulations and standards (e.g., NIST, PCI-DSS, GDPR, etc. Familiarity with security governance frameworks (e.g., NIST, ISO, PCI-DSS).. Cybersecurity frameworks and regulations (NIST, PCI-DSS, CIS, GDPR, HIPAA, and other relevant standards).. Implement API security measures, including OAuth, OpenID Connect, and API gateway security policies to protect against unauthorized access and data exposure.
Experience with secure coding practices and knowledge of vulnerability mitigation techniques.. Knowledge of network security, including firewalls, IDS/IPS systems, and packet analysis.. Preferred Skills: Knowledge of API security, access control, and secure integration of third-party services.. Understanding of reverse engineering and malware analysis techniques.. Familiarity with cloud security and services and security practices around them.
Implement and manage security technologies including firewalls, intrusion detection/prevention systems (IDS/IPS), endpoint protection, and security information and event management (SIEM) tools.. Conduct vulnerability assessments, penetration testing, and regular security audits to identify risks and develop mitigation strategies.. Experience with vulnerability management tools (Nessus, OpenVAS, Qualys) and penetration testing tools (Kali Linux, Metasploit).. Familiarity with cloud security best practices for AWS, Azure, or GCP environments.. Industry certifications such as CISSP, CISM, CEH, or OSCP.
Title: Cyber Security Analyst. Construct and exploit threat intelligence to detect, respond, and defeat advanced persistent threats (APTs).. 2+ years of experience in Computer Science, Cyber Security, Security Engineering or Network Engineering, including cyber security issues and operations, computer incident response, systems architecture, data management.. Incident response, forensics, or threat hunting in AWS or Azure.. Web/Email gateway security technologies.
This is an unpaid internship with opportunities to gain real-life experiences and career development.. Our skills include Micro-fencing, mobile strategy, data analytics, and more.. Analyze and understand threat intelligence information and how it might impact the organization.. Maintain knowledge and awareness of the following standards: HIPAA, FERPA, FOIA, CIPA, and PCI.. Ability to analyze and interpret security logs and threat intelligence.
Architect, deploy, and maintain security infrastructure components, including Intrusion Detection/Prevention Systems (IDS/IPS), Security Information and Event Management (SIEM) platforms, Endpoint Detection and Response (EDR) solutions, and Web Application Firewalls (WAFs).. Comprehensive understanding of cloud security services, including AWS (e.g., IAM, Security Groups, GuardDuty) and GCP (e.g., Cloud Armor, Security Command Center).. Proficiency with security tools such as vulnerability scanners, SIEM, DAST, and intrusion detection systems (e.g., Wazuh, Zeek, Suricata), as well as endpoint protection solutions (e.g., Sentinel One).. Proficiency in scripting languages such as Python, PowerShell, or Bash for security automation and tool integration.. Relevant certifications such as CISSP, OSCP, or CISM are highly preferred.
Conduct vulnerability assessments, penetration testing, and security audits to identify and address weaknesses.. 5+ years of experience in designing, deploying, and managing cloud infrastructure security on GCP or Azure or OCI. Strong knowledge of cloud computing platforms, such as Azure, OCI or Google Cloud Platform.. Experience with security technologies and tools, such as firewalls, intrusion detection systems (IDS), SIEM, and vulnerability scanners.. GCP, Azure, OCI certifications such as Associate Cloud Engineer, Professional Cloud Architect
With our innovative deep web & dark web monitoring, cyber threat intelligence, attack surface management, risk management, vulnerability management, incident response, penetration testing, red teaming, brand intelligence, takedown & disruption, consulting services, and cybersecurity training, we provide unmatched guidance to organizations across industries, regions, and the globe, regardless of their size.. As a dependable partner and seasoned authority, we cultivate robust partnerships with our clients, guaranteeing enduring triumph through our collaborative efforts.. Design, implement, and manage enterprise-grade firewall solutions to enforce network security policies and protect against advanced threats.. Firewall/Network Security: Palo Alto, Fortinet, Zscaler, Firewall Security architecture, Routing, Switching, VPNs.. Experience in cloud security, end-point security, and SIEM preferred.
All of the duties listed support one or more of the following cybersecurity related functions; information security, SPAA, incident response, cyber security, insider threat, computer forensics, vulnerability assessment and management, network data capture, intrusion detection, log management, auditing, security incident and event management (SIEM), and penetration testing.. Minimum 10 years of documented work experience performing any combination of or more years of experience in blue or red team, vulnerability analysis and risk management, information system security, computer forensics, or insider threat.. Examples of tools include SourceFire, Arcsight, Splunk, NetWitness, Guidance Software, Digital Guardian, SureView, Intelliview, Nessus, and Foundstone.. Experience using one or more of the following security tools: SourceFire, Arcsight, Splunk, NetWitness, Guidance Software, Digital Guardian, SureView, Intelliview, Nessus, and Foundstone.. Master's degree in computer science, information systems analysis, science/technology, information management, computer engineering, or electrical/electronic engineering.
The Director will work closely with cross-functional teams to align technology solutions with business objectives and drive continuous improvement across the IT landscape.. Lead efforts and conduct regular vulnerability assessments, penetration testing, and security audits.. Knowledge and experience with endpoint protection, identity management, and access control protocols. Skills in using security information and event management (SIEM) systems.. Preferred Security Certifications: CISSP/ CISM/ CISA etc
We are seeking a highly skilled and detail-oriented IT Security Analyst to join our team at Johnson Health Tech, a leading manufacturer of fitness equipment.. Risk Assessment & Mitigation : Conduct regular security audit tasks, vulnerability assessments, and support 3rd party penetration testing, identifying potential risks and recommending appropriate mitigations.. Third-Party Risk Management : Evaluate and monitor the security posture of third-party vendors and contractors, ensuring they meet required security standards for data access and sharing.. Relevant certifications (e.g., CISSP, CISM, CEH, CompTIA Security+) are highly preferred.. Familiarity with the security challenges and technologies used in manufacturing environments, including IoT (Internet of Things) devices and industrial control systems (ICS).
Chief Information Security Officer (CISO). As the Chief Information Security Officer (CISO) at Madrigal Pharmaceuticals you will be responsible for establishing and maintaining the enterprise vision, strategy, and program to ensure information assets and technologies are adequately protected.. Strong background in incident response, threat intelligence, penetration testing, and vulnerability management.. Hands-on experience with security technologies (e.g., SIEM, firewalls, EDR, IDS/IPS, IAM, DLP).. Industry-recognized certifications preferred: CISSP, CISM, CISA, CRISC, CCISO, or equivalent.
Director – CybersecurityLocation: Charlotte, NCMajor Duties & ResponsibilitiesThe Director, Cybersecurity leads Company’s cybersecurity program in order to protect the organization's critical IT and OT systems and assets using the CIS Controls and NERC CIP cybersecurity frameworks and practices.. Provide technical cybersecurity support to the NERC CIP program staff to facilitate identification of efficient solutions to meet compliance obligations.. ‒ Security risk assessments‒ Active Directory‒ Data Loss Prevention‒ Identity and access management approaches (e.g., Azure Active Directory, OKTA MFA, SSO)‒ Office 365 security concepts, policies, settings, and practices‒ Email security through Mimecast.. Experience understanding and implementing regulatory requirements and industry standards related to IT and OT security, such as NERC CIP, the NIST cybersecurity and CIS Controls frameworks, SOC1/2, PCI, HIPAA, CCPA/GDPR or related security frameworks.. ‒ Support for power generation control systems‒ KACE patching platforms‒ Malwarebytes EDR/MDR platforms‒ SumoLogic SIEM‒ NERC CIP program support‒ Ethical hacking‒ Disaster recovery training and experience‒ Scripting and source code programming languages that the cybersecurity team will be using.