Experience Must have six years of experience in an information systems security domain with a background in mobile device security, endpoint protection, wireless protection, vulnerability management, incident response and mitigation, threat research and cyber intelligence analysis or other cyber security domain.. Certification/Registration/Licensure Must have a current CompTIA Security+ Certification or equivalent in industry certification, background and knowledge within 6 months of placement into the position.. Direct experience with anti-virus software, intrusion detection, firewalls and content filtering Experience with hacker techniques and network security principles.. Collect threat intelligence and automate systems to consume threat feeds and track adversaries.. Examples of such tools are web filtering technology, IDS/IPS appliances, SIEM tools, anti-spam/antivirus systems, data leakage appliances, content screening servers, VPN systems and firewalls.
Builders Vision is an impact platform that aims to shift markets and minds for good in pursuit of our vision for a humane and healthy planet.. Implement and oversee formal security policies and procedures framework, covering areas such as access control, data protection, incident response, and change management.. Expert level knowledge of SIEM, EDR, IAM, and DLP.. Advanced certifications such as CISSP, CISM, or CRISC.. Knowledge of cloud security architecture and best practices for major cloud platforms (e.g., AWS, Azure, GCP).
Network Security Engineer (Public Trust Clearance) Contract. Identify and manage projects related to IT security and overall enterprise operations and maintenance, to include the task delegation and status reporting while coordinating activities within the Network and Systems teams and across the IMT department.. Analyzes and reviews IT and physical security events, and traffic flows escalated from automated detection systems utilizing commercial Security Incident and Event Management (SIEM [Tripwire software]), Intrusion Detection and Prevention Systems (IDS/IPS [Palo Alto, Cisco ASA, McAfee, Ironport software]) and log management and database activity monitoring.. Possesses recent (within 1 year) and relevant practical experience using Retina, Gold Disk, Wireshark, Snort, Logger, Nessus, NeXpose, Metasploit, and other security and web assessment tools.. Possesses experience building and maintaining System Security Plans, Incident Response Plans, Contingency Plans and Exercises, Continuity of Operations Plans and exercises, Risk Management Plans and Vulnerability Management Plans in accordance with FISMA, and NIST guidelines.
About the job Chief Information Security Officer Chief Information Security Officer (CISO) Our Client. Our client is a leading Alternative Investments asset manager.. With a commitment to innovation, regulatory excellence, and security, they are seeking a highly skilled Chief Information Security Officer (CISO) to lead their cybersecurity and information security strategy.. The Chief Information Security Officer (CISO) will be responsible for developing and executing Our Client cybersecurity strategy, ensuring compliance with SEC regulations, and safeguarding sensitive investor and corporate data.. Design and manage cyber risk management frameworks , including penetration testing, threat detection, and incident response strategies.
Security Architecture Design: Design and deploy secure data architectures, including encryption, access controls, and data masking, to safeguard sensitive information.. IT, legal, and compliance, to ensure a holistic approach to data security.. Risk Assessment and Vulnerability Management: Ability to identify security risks, perform risk assessments, and address vulnerabilities in a cloud environment.. Security Architecture Design: Expertise in designing secure data architectures, including implementing encryption, access controls, and data masking.. IT, legal, and compliance teams to ensure a holistic approach to data security.
Provide guidance and recommendations on security best practices, standards, and compliance requirements (e.g., GDPR, HIPAA, PCI DSS).. Perform security testing, including penetration testing, vulnerability scanning, and threat modelling.. Analyze security incidents and breaches, and provide incident response and remediation assistance.. Knowledge of security technologies and tools, including SIEM, IDS/IPS, endpoint protection, and encryption.. Certifications such as CISSP, CISM, CEH, or equivalent.
We are seeking a highly skilled Lead Network Security Engineer to oversee the security of our enterprise network infrastructure.. Strong knowledge of firewalls, VPNs, IDS/IPS, SIEM, NAC and endpoint security solutions.. Hands-on experience with security tools such as Palo Alto, Cisco, Fortinet, Check Point, or similar.. Familiarity with cloud security (AWS, Azure, or Google Cloud) and Zero Trust architectures.. Industry certifications such as CISSP, CISM, CCSA, CCNP Security, CEH, or GIAC are highly desirable.
We are seeking a highly skilled Enterprise Architect to lead the design and optimization of our secure network architecture across our hybrid IT environment, spanning both on-premises infrastructure and multiple-cloud platforms (e.g. AWS, Axure, GCP etc).. Collaborating with SOC and threat intel teams to operationalize detection logic and incident response capability. Deep knowledge of cloud platforms (AWS, Azure, Google Cloud) and cloud-native security models.. Industry certifications such as CISSP, CCSP, CCIE, AWS/Azure Security, or SASE-related certifications are a plus.. From health and wellness benefit options including: medical, dental, vision, short and long term disability, basic life insurance, supplemental life insurance, AD&D insurance, identity theft protection, pet insurance and group home & auto insurance.
The Information Security Engineer is a key member of the technology team that evaluates the firm’s technology and information systems to develop security strategies and solutions to protect the Firm from internal and external threats.. Build and administer core network and systems security controls, including: firewalls, intrusion detection and prevention, anti-malware, application whitelisting, host intrusion prevention, endpoint detection and response (EDR), privileged access management (PAM), privilege elevation, vulnerability scanners, content monitoring / filtering, security monitoring (SIEM), enterprise authentication and authorization.. Establish architectures and baseline configurations for various security technologies, including: anti-malware, endpoint detection and response (EDR), security monitoring, systems security, network security, identity and access management, public-key infrastructure (PKI), deception technologies, DLP and web/e-mail content filtering.. Serve as a member of the Computer Security Incident Response Team (CSIRT), assisting with incident response (IR) with the IR and security operations center (SOC) efforts.. Assist with threat and vulnerability management activities, including: triage of new vulnerabilities, root cause analysis, threat modeling and mitigation planning.
The role requires a deep understanding of security protocols, vulnerability management, network security, and identity management, with a focus on achieving a comprehensive zero-trust framework.. Support the Army DevOps team using Ubuntu agents and Python scripts to connect to Azure DevOps. Provide Elastic support including STIG automation on Oracle Linux using Bash scripts and customer support via Teams.. Reconfigure and integrate security technologies including ACAS, Active Directory, Cisco ASA & Palo Alto, Elastic SIEM, Endgame EDR, Cisco ISE, MECM, Microsoft Defender, PAW, Tactical PKI, MFA, IAM, endpoint protection, network security, privileged access management, security monitoring, and incident response systems, ensuring compliance with Zero Trust principles.. In-depth knowledge of security tools including ACAS, Elastic SIEM, Cisco ASA, Palo Alto, Endgame, MFA, Active Directory, MECM, and Microsoft Defender.. Familiarity with network firewalls and IPS such as Cisco ASA and Palo Alto.
Lead security assessments, vulnerability analysis, and penetration testing to identify and mitigate risks.. Strong knowledge of firewalls, VPNs, IDS/IPS, SIEM, NAC and endpoint security solutions.. Hands-on experience with security tools such as Palo Alto, Cisco, Fortinet, Check Point, or similar.. Familiarity with cloud security (AWS, Azure, or Google Cloud) and Zero Trust architectures.. Industry certifications such as CISSP, CISM, CCSA, CCNP Security, CEH, or GIAC are highly desirable.
This is an on-site, hands-on role for someone who can design, implement, and proactively manage a highly secure, high-performance IT environment, while working closely with executive leadership to align technology with business goals.. Deploy and maintain virtualization infrastructure (VMware, Citrix) and containerized environments (Docker, Kubernetes).. Implement and oversee AWS cloud security , including IAM, VPCs, S3, and centralized logging.. Familiarity with infrastructure automation tools such as PowerShell, Bash, Terraform, or Ansible.. Familiarity with scripting/automation (e.g. PowerShell, Python, Terraform, Ansible).
This role involves close collaboration with the Bank's Information Security Incident Manager to support the Incident Response Team's capacity to effectively contain and resolve cybersecurity incidents.. Additionally, the Lead Information Security Analyst provides mentorship and guidance to junior team members, sharing expertise, best practices, and strategies to enhance the SOC's overall efficiency, resilience, and threat response capabilities.. adversarial tactics and techniques, develop effective threat models, analyze and identify potential exposures, and recommend remediation strategies to inform strategic security decisions.. Professional certifications through ISC(2), ISACA, GIAC, OffSec or CompTIA are preferred.. Familiarity with research methods, including OSINT, penetration testing, and vulnerability assessment used to identify and analyze potential security exposures.
Configure, manage, and troubleshoot firewalls (Cisco, Palo Alto, Fortinet) and security devices (IPS/IDS, VPN).. Oversee daily data center operations (hardware, networking, storage) and overall IT infrastructure (network, servers, storage).. June 2025 Skills: Core Technical Expertise: Advanced Networking (Design, WAN/LAN/VLAN/VPN), Firewalls (Cisco, Palo Alto, Fortinet), Server Management (Windows/Linux), Virtualization (VMware/Hyper-V), Access Points (Cisco, Ubiquiti, Aruba), Database Management (SQL Server, MySQL, Oracle), High Availability/Uptime strategies.. IT Team Leadership, Cross-functional Collaboration, Excellent Communication (English essential, Chinese Mandarin a plus), Organizational & Time Management, Problem-Solving & Troubleshooting, Incident Management, Project Management, Documentation.. Cisco CCNA/CCNP, CompTIA Network+, CISSP, CEH.
Security Architecture Design: Design and deploy secure data architectures, including encryption, access controls, and data masking, to safeguard sensitive information.. IT, legal, and compliance, to ensure a holistic approach to data security.. Risk Assessment and Vulnerability Management: Ability to identify security risks, perform risk assessments, and address vulnerabilities in a cloud environment.. Security Architecture Design: Expertise in designing secure data architectures, including implementing encryption, access controls, and data masking.. IT, legal, and compliance teams to ensure a holistic approach to data security.
Cloud & PKI Focus: Expertise in cloud security (AWS or Azure) and extensive experience with PKI infrastructure, certificate lifecycle management, and key management are essential.. Aviation Security Contribution: Will contribute to critical FAA aircraft network security program duties, including securing communication between aircraft and ground systems, collaborating with OEMs, and ensuring the security and integrity of underlying Windows and Linux server infrastructure.. Enterprise-grade Firewalls: (e.g., Cisco Firepower, Palo Alto Networks, Fortinet). Endpoint Detection and Response (EDR): (e.g., CrowdStrike Falcon, Microsoft Defender for Endpoint). Vulnerability Scanning: (e.g., Tenable Nessus, Tanium Comply)
CSM offers excellent health insurance benefits; State Retirement Pension plan; wellness programs; Code Green early closure Fridays in the summer; college closure for spring break and several major holidays, including the week between Christmas and New Year; and for several days in March for Spring Break.. The Network Security Analyst conducts many functions to ensure the confidentiality, integrity, and availability of data and systems throughout the college’s network.. The individual in this position is responsible for vulnerability management, security awareness, incident response and maintaining and keeping the CSM network secure.. The Network Security Analyst reports to the Assistant Director of Network Security.. Maintains up-to-date knowledge of available and emerging network and security technologies through professional reading, attending industry conferences, and professional development (training, education, and participation in professional associations) Reviews advisories posted through CERT, NIPC (National Infrastructure Protection Center), Center for Internet Security, SANS and FBI and recommends appropriate security improvements to the Assistant Director of Network Security.
The Cybersecurity Threat Intelligence Lead will serve as the primary (or SME) on threats against the Bank’s reputation, brand, and systems through multiple threat intelligence sources.. The role will be responsible for design and implementation of threat intelligence systems and will also play a significant role in threat hunting and penetration testing activities.. Mentors other analysts responsible for threat intel, incident response, network, cloud, endpoint and database security.. Strong technology skills, including intermediate proficiency with Microsoft Office (Word, Excel, Outlook, PowerPoint, Visio) SIEM and EDR platforms.. Other beneficial experience, (i.e., VA, IPS, Cloud Security, Routing and Switching, Vulnerability Management, Threat Reputation/Intel Solution, CASB, Python, or Automation/Orchestration), preferred.
The Role: As an Information Security Engineer, you will work with our InfoSec analysts and engineers to locate and improve weak points in our security and mature Cognex’ InfoSec program.. Be a champion for InfoSec to employees on information security policies, procedures, and best practices. Intermediate knowledge of regulatory compliance requirements such as Sarbanes Oxley, PCI-DSS, HIPAA, GDPR, CCPA, etc.. Familiarity with cloud security concepts and practices, including DevSecOps. Industry certifications such as Security+, SSCP, CEH, GSEC, CASP+ are a plus
Union Technologies is reindustrializing America’s defense manufacturing base with a first-of-its-kind Factories-as-a-Stockpile model, integrating advanced robotics, manufacturing, and software into sovereign factory systems at scale.. Conduct vulnerability assessments, penetration testing, and regular audits of IT systems.. Expertise in network architecture, cloud platforms (e.g., AWS, Azure, Google Cloud), and cybersecurity tools and frameworks.. Certifications such as CISSP, CISM, CEH, or equivalent are highly desirable.. UNION is where engineers, builders, and patriots come together to forge factories that protect sovereignty, restore national strength, and manufacture peace.