As a Safeguards Analyst focusing on Cyber Harms, you will play a critical role in protecting our platform and users from cyber security risks through consistent policy enforcement and trend analysis.. Enforce trust and safety policies with a specific focus on detecting and mitigating potential cyber security risks and harmful use of AI systems. Handle user appeals and communications related to enforcement actions with professionalism and clarity. Experience in offensive cybersecurity, CTFs, or penetration testing (OSCP Certification is not required, but valued). Have a background in ethical hacking/pen-testing/malware analysis
Risk Assessment: Conduct risk assessments and vulnerability analyses of OT systems, recommending mitigation strategies and proactive security measures. Incident Response: Collaborate with the incident response team to develop and test incident response plans for OT systems, as well as assist with remediating gaps identified in our OT architecture through real incidents, audits, assessments, or exercises. Experience with advanced security technologies such as anomaly detection and threat intelligence. Strong knowledge of industrial control systems (ICS), SCADA, and Operational Technology environments.. Joining the Halliburton OT Security Team as an OT Security Architect provides a unique opportunity to contribute to the security and resilience of critical infrastructure in the energy sector while leading a team of talented professionals.
Provide the computing infrastructure to support tier 1, tier two, and application support requests for both in-office and remote team members.. Assists staff in developing methods and processes to improve the effectiveness, efficiency and security of the network services, desktop support and user support functions.. Use tooling and partners to conduct vulnerability assessments, testing internal and external network perimeters for accessibility.. Technical depth of knowledge: IT infrastructure, cloud, application development languages, tools and frameworks, database technologies, web technologies, network architecture, enterprise architecture, and active directory. Security technology experience including but not limited to: firewall, intrusion detection, identity and access management, EDR tools and defenses, encryption, certificate authority, web filtering, anti-malware, phishing simulation, anti-phishing, multi-factor authentication.
Exposure to Mitre framework and equivalent, Hands-on experience in EDR platforms and threat analysis, threat hunting/incident response experience.. Develop, implement, and execute standard procedures for the administration, content management, change management, version/patch management, and lifecycle management of the SIEM/Log Management platforms. Perform hunting exercises using threat intelligence, analysis of anomalous log data and results of historical events and data to detect and response to threats.. Author postmortem reports to be provided to senior leadership following an intrusion or red team engagement. Strong knowledge and work experience in handling vulnerability assessment on cloud-based architecture using Prisma cloud, Wiz.io etc.
Are you a cybersecurity leader with a passion for vehicle security and cutting-edge technology?. Join a dynamic team contributing to the vehicle security ecosystem!. 🎓 MS/BS in Computer Science or Computer Engineering. Technical Architecture & Product Management in Network, Cloud, Information Security, Data Privacy, Embedded Security. Public Key Infrastructure (PKI) – scalable deployments & management
Must have hands on experience with Aviatrix Software Defined Networking and some experience with Cisco ASA and/or Palo Alto Firewalls.. FDA regulatory Compliance of Initial Qualification (IQ) and Operational Qualification (OQ).. 12+ years Extensive network architecting experience with Aviatrix SDN, Cisco networking routing and switching other WAN technologies (MPLS, P2P, WAVE) and Cisco SD-WAN Viptela or similar. Solid understanding SOX, PCI-DSS, or HPIAA regulatory compliance.. Understanding of FDA IT compliance and quality control and/or Good Manufacturing Process (GMP) a plus
This position is expected to conduct penetration testing activities on High Value Asset (HVA) systems owned and operated by federal civilian agencies.. Red Team Testing: Focusing testing activity towards accessing specific target datasets.. THREE or more years’ experience relevant to Penetration Testing or IT Systems Configuration or Risk and Vulnerability Assessment and/or Cybersecurity. CISA AES HVA Assessment certification with proof of certification as a CISAES HVA Pen Test Operator.. One of the following certifications: Offensive Security Certified Professional (OSCP) or GIAC Penetration Tester (GPEN) or Certified Ethical Hacker (CEH) Certification.
The Lead Cloud Network Security Engineer spearheads complex IT Initiatives, designing, implementing, maintaining, and triaging enterprise network security infrastructure and services.. Lead complex IT projects e.g., greenfield/brownfield deployments, vendor to vendor migrations, mergers & acquisitions.. Extensive experience supporting security frameworks & controls for FFIEC, PCI, SOX, CIS, NIST, ISO, etc.. Extensive experience operating within an ITIL ITSM organization with a background using ServiceNow.. Experience using tools such as SolarWinds, Netbrain, LiveAction, ThousandEyes, AppDynamics, ELK, etc.
Description Who We Are Through our service brands Hyundai Motor Finance, Genesis Finance, and Kia Finance, Hyundai Capital America offers a wide range of financial products tailored to meet the needs of Hyundai, Genesis, and Kia customers and dealerships.. Hyundai Capital America is an Equal Opportunity Employer committed to creating a diverse and inclusive culture for our workforce.. Tuition reimbursement What to Expect The Executive Director, Information Protection serves as the head of the Information Protection Department for Hyundai Capital America (HCA) and Hyundai Capital Canada (HCCA) and acts as the technical liaison to executive leadership on threat landscapes, relevant control frameworks, risk management approaches, regulatory requirements, industry standards, and best practices.. Some solutions include Data Loss Prevention (DLP), network access controls, Identity Access Management, endpoint protection, encryption, vulnerability management, content filtering, IDS/IPS, multi-factor authentication, next-gen firewalls, VPN, MSS SOC, and various other solutions used to enforce policies and to ensure that sensitive company information is adequately controlled at rest, in use, in transit, and during disposition.. Maintain transparent and comprehensive lines of communication with senior executive leadership at HCA, HCCA, and Hyundai Capital Services in Korea to ensure enterprise alignment and real-time awareness.
Develop secure configurations and policies for Azure resources, such as Virtual Machines, Storage Accounts, and Azure Kubernetes Service (AKS).. Threat Detection and Incident Response:Leverage Azure Sentinel for threat detection, incident response, and security monitoring.. Risk Management and Compliance:Conduct regular security assessments, vulnerability assessments, and penetration testing to identify and mitigate risks.. Experience using security architecture methodologies and vulnerability management tools.. Experience designing IAM technologies and services (e.g., Active Directory, LDAP, Azure, IAM).
This role also includes app administration, installation, deployments, configurations, versioning, app patching, performance monitoring and :Platform Administration & Maintenance-Manage and optimize PostgreSQL databases, including backups, replication, indexing, and query performance tuning.. -Troubleshoot and resolve system, application, and network & Operations-Review system hardening, data encryption, and access control policies align with security best practices.. -Knowledge of CI/CD tools like GitHub actions, Azure Devops pipelines, or Ansible for automation.. Preferred Qualifications:-Prior experience in IT infrastructure, DevSecOps, or SRE roles.. -Knowledge of OpenID Connect (OIDC) or Ldap as well as IAM tools such as Entra ID, Okta, Active Directory, or centralized authentication mechanisms.
Cyber Technology Services, Inc. is supporting a U.S. Government customer on a large mission critical development and sustainment program to design, build, deliver, and operate a network operations environment including introducing new cyber capabilities to address emerging threats.. CyTech is seeking a Sr. Cyber Security Subject Matter Expert (SME) who can support our customer in the detection, response, mitigation, and reporting of cyber threats affecting the client networks.. Must have an active Top Secret clearance with an ability to obtain TS/SCI clearance. MITRE Adversary Tactics, Techniques and Common Knowledge (ATT&CK). Prior experience with SIEM Technologies (Splunk)
We are looking for an Information Security Manager with CJIS compliance experience.. Lead continuous improvement reviews for response and recovery, including incident response, backups, failover / switchover, disaster recovery, and business continuity. Manage the Third Party Risk Management program and partner with the Procurement working group. Experience working in a highly regulated environment is a plus (e.g., CJIS, HIPAA, FISMA, government, finance/banking, healthcare, or FedRAMP / DoD IL). Strong understanding of cloud security controls, including network security and data protection controls
This role requires 4 days/ week onsite As a Sr. Advanced Security Engineer on our CIS Cyber Resilience Team, you'll be at the forefront of protecting Kroger's digital assets.. Your mission, should you choose to accept it, involves diving deep into application security, pen-testing, and secure coding practices.. Experience with Dynamic Application Security Tools (specifically HCL Appscan, Burp Suite). Experience with PostMan API Platform. Emotional and financial support with free counseling through our Employee Assistance Program and free, confidential financial tools and coaching with Goldman Sachs Ayco.
This role also includes app administration, installation, deployments, configurations, versioning, app patching, performance monitoring and :Platform Administration & Maintenance-Manage and optimize PostgreSQL databases, including backups, replication, indexing, and query performance tuning.. -Troubleshoot and resolve system, application, and network & Operations-Review system hardening, data encryption, and access control policies align with security best practices.. -Knowledge of CI/CD tools like GitHub actions, Azure Devops pipelines, or Ansible for automation.. Preferred Qualifications:-Prior experience in IT infrastructure, DevSecOps, or SRE roles.. -Knowledge of OpenID Connect (OIDC) or Ldap as well as IAM tools such as Entra ID, Okta, Active Directory, or centralized authentication mechanisms.
Firewalls: Checkpoint, Juniper, Palo Alto, Cisco ASA/FTD, Fortinet;. DP/IPS: Fire Power/Sourcefire IPS/IDS, McAfee. Identity & Access Management: Cisco ISE, Aruba Clearpass policy manager;. Good understanding of key technologies such as: VRF, dynamic routing (EIGRP/BGP/OSPF), MPLS, DMVPN, GRE, IPSec VPN. CCNA/CCNP (Enterprise/Security/Data Center); CISSP or equivalent;
We are seeking a skilled Security Analyst with 2-3 years of experience in vulnerability management, particularly within Azure cloud environments to join our client.. Conduct regular vulnerability assessments and penetration testing within Azure cloud infrastructure. 2+ years of hands-on experience in vulnerability management, specifically within Azure cloud environments. Relevant certifications such as Certified Ethical Hacker (CEH), Certified Information Systems Security Professional (CISSP) or similar, preferred. If you are a passionate Security Analyst with a focus on Azure cloud security and vulnerability management, we encourage you to apply and join our dedicated team.
Client : DC Government. The contractor is responsible for the planning, analysis, design, development, testing, quality assurance, configuration, installation, implementation, integration, maintenance, and/or management of networked systems used for the transmission of information in voice, data, and/or video formats.. Manage the agency's telephony infrastructure including voice terminals, VOiP, voice switching, provisioning, analog lines, ACD and IVR systems.. Monitor network infrastructure and systems using tools such as Cisco ISE, Cisco Umbrella, Cisco FMC, SSH, Microsoft Active Directory Tools and Utilities, Microsoft Intune, Kaseya, Cayosoft, RDP, and managing appliances including IDS/IPS devices, firewalls, VMware vCenter, Windows Servers, DHCP, DNS, and other tools as available or necessary.. Certification in network or system administration is highly desired, such as CCNA, CCNP, CCIE, CISSP, MCSE, MCSA, or other related and similar certifications
This role will handle engineering and implementation of solutions, conduct cybersecurity assessments, oversee, and streamline security operations center (SOC) and tools, cyber defense solutions and services, threat hunting, forensics, 3rd party risk and incident response across global IT environment spanning on-premises data centers, private and public cloud services.. Streamline and improve security operations tools, attack vector use-cases, MITTER framework coverage and provide continued posture updates.. Manage the security of the core Microsoft tenant services including Iaas, PaaS, SaaS services, Office 365, Microsoft Windows, SQL, and other 3rd party cloud applications technical components.. Strong hands-on experience in design, deploying and managing Network security, IAM suite of technology solutions/ services, PKI services, Data Security solutions, Product/Application security solutions, SOC solutions and tools, 3rd party risk management.. Strong hands-on experience conducting PEN testing, red/ purple team exercises, tabletop simulations, PEN testing, IR and vulnerability management across IT domains and business where appropriate.
Lead and execute red team operations and penetration tests to identify security weaknesses in clients' networks, systems, and applications. Work closely with clients to enhance their incident response strategies and security awareness based on insights from red team operations. At least 3 years of hands-on experience in cybersecurity roles focused on penetration testing or red team operations. Proficiency with penetration testing tools like Metasploit, Burp Suite, and Cobalt Strike, and scripting languages such as Python and PowerShell. Preferred certifications include OSCP, CEH, GPEN, and GWAPT.