· Manage vulnerability detection and remediation processes across the network environment using tools like Nessus or Qualys. · Oversee firmware and software patch management for all network hardware. · Maintain a real-time inventory of network assets including IPs, firmware versions, and configuration status. · Proficiency in configuring and securing network devices from vendors such as Cisco, Fortinet, Palo Alto, or Juniper. · Relevant certifications such as CCNP, CISA, CISSP, or CEH are strongly preferred
This position is for Day-Shift, and the Senior Threat Intelligence Analyst will be responsible for working towards continuous improvement through new processes, mastering and being a subject matter expert of current processes, waste elimination efforts, and collaboration with teams both within and outside of Cybersecurity.. Research and author Threat Assessment Reports for Risk Organization. Formal IT Security/Network Certification, such as WCNA, CompTIA Network+ and Security +, Cisco CCNA, ISC2 CISSP, GIAC GCIH, GMON, GCFA, GCFE, GREM, GICSP, GRID, or other relevant certifications. Previous experience supporting cyber defense analysis of Operational Technology (OT) Networks, including Industrial Controls Systems (ICS), Supervisory Control and Data Acquisition (SCADA), and Process Control Networks (PCN). Experience with compliance standards: NERC-CIP, SOX, TSA
Our work affects the entire company and takes place at all levels of the stack, from infrastructure to web application security, as well as mobile apps, IT, and autonomous vehicles.. Conduct penetration testing, code review and breach readiness across our online and mobile infrastructure. Threat modeling, code review, penetration testing against cloud environments and/or mobile (IOS/Android). Computer networking concepts and protocols, application and network security methodologies. Lyft Pink - Lyft team members get an exclusive opportunity to test new benefits of our Ridership Program
Develops and implements a comprehensive Security Operations strategy, encompassing threat monitoring, incident response, vulnerability management, and medical device product security monitoring. Develops and maintains relationships with external security organizations, law enforcement, and other agencies to enhance the threat intelligence and incident response capabilities. Collaborates with other entities such as GRC (Governance, Risk, and Compliance), developing a hosted environment security risk management strategy consistent with changing enterprise-specific and industry-wide risk and regulatory environment. CISSP, GSOC, GMON, GSOM or other relevant cybersecurity certifications. Strong knowledge of incident response, vulnerability management, and security monitoring practices.
Automate NSG rule deployments using Azure Policy, PowerShell, or Terraform to ensure consistency.. Experience with DevSecOps practices and Infrastructure as Code (IaC). Ensure compliance with GDPR, HIPAA, PCI-DSS, or industry-specific regulations.. Hands-on experience with firewall management (Palo Alto, Fortinet, Cisco ASA, or Azure Firewall).. Knowledge of DevSecOps and Infrastructure as Code (IaC) practices.
Year RoundCOLLABORATION | AUTHENTICITY | PURPOSE | EMPOWERMENTAlterra Mountain Company is a family of iconic year-round mountain destinations, the world's largest heli-skiing operation, and Ikon Pass - the premier ski and snowboard season pass offering access to more than 50 iconic mountain destinations around the world.. WHAT WE OFFERFree Ikon Pass for all eligible employees + additional free skiing / riding privileges across the family of Alterra Mountain Company resorts for eligible employees and their dependentsDiscounted skiing / riding for friends and family of eligible employees across the family of Alterra Mountain Company resortsFlexible Time Off (FTO) and Paid Time Off (PTO) policies for eligible employees to relax and rechargeGenerous discounts on outdoor gear, apparel, rental cars, etc.. This includes participation in multiple projects and efforts to identify needs and verify alignment with the strategic security roadmap.. Extensive technical breadth, with depth in one or more technical and security domainsExperience in network design processes, including understanding of security objectives, operational objectives, and trade-offs Proven skills in risk assessment, cybersecurity controls selection, vulnerability assessment and penetration testing Ability to work well under minimal supervision and drive security initiatives linked to strategic milestones.. Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Certified Information Security Manager (CISM), Certified Cloud Security Practitioner (CCSP), Certified Cloud Architect (CCA), Certified Cloud Professional (CCP) or other relevant Global Information Assurance Certification (GIAC) certifications The base salary range below represents the low and high end of the Alterra Mtn Co Shared Services Inc. salary range for this position.
This role is a member of the CISO of America’s team and will provide control design guidance and conduct independent control assessments within the Cybersecurity GRC function.. High technical knowledge across Cybersecurity domains such as Identity Access Management, Data Security, Configuration Management, Log Generation, Incident Response, security risk assessment/testing methodologies, Secure Software Development Lifecycle, evaluating the adequacy and efficiency of internal controls; and identifying issues resulting from internal and/or external compliance examinations especially in cloud environments.. Regulatory Knowledge: Knowledge of domestic and international banking regulations (Reg W, Basel II, FFIEC, GDPR, etc.. Technical Understanding: Understanding of the regulatory environment and regulations related to technology risk, and Office of the Comptroller of the Currency (OCC) and Federal Reserve Board (FRB) expectations.. Certifications: Professional certifications such as CCAK, CISA, CRISC, CISM, CGEIT, CSX, CISSP.
The ideal candidate is proactive, detail-oriented, and experienced in modern security tools, penetration testing, vulnerability management, and security compliance frameworks.. 3–7 years of experience in cybersecurity roles, with focus areas in penetration testing, DevSecOps, or compliance frameworks.. Security+, CEH, OSCP, CISSP, or GSEC Certified DevSecOps Professional, AWS Certified Security. Specialty, or Cloud+ Experience with FedRAMP, NIST RMF, or CMMC compliance processes (Strongly Preferred). Neurodivergence, for example, attention-deficit/hyperactivity disorder (ADHD), autism spectrum disorder, dyslexia, dyspraxia, other learning disabilities
Data Intelligence, LLC is seeking a skilled Information Systems Security Officer (ISSO) to support a top-tier federal client engaged in national security and counterterrorism operations.. Ensure compliance with agency security policies, FISMA, and other applicable regulations.. Demonstrated experience and knowledge of security technologies, tools, and methodologies (e.g., firewalls, IDS/IPS, SIEM systems). Demonstrated experience and knowledge with compliance requirements (FISMA). Top Secret / SCI with CI Polygraph
As a Security Engineer you will lead security implementation and compliance efforts for a cloud based monitoring and oversight solution, ensuring adherence to federal security standards and managing the Authority to Operate (ATO) process within the environment.. Ensure compliance with FISMA, NIST, and other US federal security requirements.. Expert knowledge of NIST cybersecurity framework and FISMA requirements.. Preferred Qualifications Relevant security certifications (CISSP, CISM, Security+).. Experience with DevSecOps and security automation.
It is the largest investor-owned water utility in New England and among the seven largest in the U.S. Based in Bridgeport, CT, it has been in the public water supply business since 1857.. Aquarion Water Company is a wholly-owned subsidiary of Eversource.. Job Summary An exciting opportunity to join our highly skilled technical team as a Senior Network Security Engineer is available at Aquarion Water Company.. Administrate procurement/contracts activities of network and related security assets. Preferred Requirements Cisco routing, Voice/data communications, Network architecture and Network services such as DNS, DHCP, Systems security, Application Architecture, Network monitoring and alerting, Firewall configuration maintenance, and Network protocol traffic management
Configure and install network equipment including routers, switches, firewalls, wireless access points, NAC, VPN and load balancers.. Azure/AWS/GCP public cloud network specialization certifications. 2+ hands-on experience with cloud platforms – Azure, AWS, or GCP. Normally work in an office environment; however, occasionally may work in a laboratory, assembly areas and field service machine shop.. while working in Engineering laboratory, assembly areas and field service machine shop.
The CISO is responsible for overseeing and managing the organization's information security program, ensuring the protection of sensitive data and compliance with regulatory requirements.. Lead incident response efforts and manage security breaches.. Develop and implement quantum-safe encryption methods to protect sensitive data.. Ensure the organization's security infrastructure is prepared for the advent of quantum computing threats.. Collaborate with quantum engineers to integrate quantum-resistant algorithms into security protocols.
We are seeking an experienced Information Security Officer (ISO) to oversee IT, security, and compliance for our organization.. The ISO will be responsible for developing and implementing a comprehensive security strategy, managing a team of IT & Cyber Security & GRC personnel, and collaborating with business and engineering teams to ensure all security, regulatory, and compliance requirements are met.. Endpoint & SaaS Deployment: select and roll out collaboration, identity, and productivity tooling (Okta, Google Workspace, O-365, JAMF, Intune, etc. Help-Desk & ITSM Governance: set SLAs for ticket triage, change management, and problem management; publish metrics and drive service-quality improvements.. Operate and tune SIEM/EDR, vulnerability scanners, and cloud-security posture-management tools; ensure 24×7 monitoring coverage.
We provide network security testing and network security audits that include router and firewall configuration, managed switch installation, wireless access point deployment, as well as data and voice network cabling.. Stay a step ahead of malware, bad actors, and every possible security risk by choosing the robust network support security service provided by Brixin.. We monitor your network around the clock and identify and resolve even the smallest loophole in your system in the least time possible.. Simplify your firewall administration with Sonicwall firewall and Meraki firewall solutions, which are included in our robust network support security.. Router and Firewall Configuration and Testing
Automate identity operations using PowerShell, Microsoft Graph API, and Terraform, with emphasis on reproducibility and scalability.. Enforce identity governance and entitlement management policies across users, apps, and services using Microsoft Entra ID Governance.. Design and lead implementation of adaptive MFA and passwordless authentication strategies.. Experienced in developing and deploying automation workflows using PowerShell scripting, Microsoft Graph API integration, and identity focused Terraform modules.. Certifications such as SC-300, CIST, CIMP, CIAM, CAMS, Azure Security, CISSP, or credentials with a specialization in Identity and Access Management are strongly preferred.
Conduct open-source intelligence (OSINT) gathering to support red team operations, social engineering engagements, and external threat profiling. Maintain awareness of the latest vulnerabilities, attack techniques, threat actor tactics, and industry developments; assist in developing internal penetration testing methodologies, standard operating procedures, and security testing templates. CEH, OSCP, SANS, CompTia Pentest+, CISA, CISSP, etc.). Information Systems Security Officer (ISSO) III Fall River, MA $102,000.00-$138,000.00 3 weeks ago. Facility Security Officer/ Information Systems Security Manager Middletown, RI $89,221.00-$96,540.00 3 weeks ago
Wentworth Institute of Technology’s School of Computing & Data Science invites applications for an Open-rank Professor or Lecturer in Cybersecurity or IT for the FALL semester of 2025. Performing service to the university and the profession, which includes academic advising, student engagement, and serving on committees. Particular attention will be given to candidates with a background in cybersecurity, offensive security, network security, software security, malware analysis, digital forensics or information technology. co-educational, nationally ranked university offering career-focused education through 24 bachelor’s and 13 master’s degree programs in areas including Computer Science, Data Science, Cybersecurity, Engineering, Architecture, Design, and Construction Management. E-Verify is an internet-based system that compares information from your Form I-9 to records available to the U.S. Department of Homeland Security (DHS) and Social Security Administration (SSA) to confirm that you are authorized to work in the United States.
The Executive Strategic Security Advisor plays a pivotal role in enhancing client cybersecurity posture by acting as a strategic liaison between a client CISO, or a vCISO capability from NuHarbor or another third party, and the practical execution of cybersecurity initiatives. This role requires a unique blend of skills in strategic planning, technical expertise, and exceptional communication skills to ensure seamless alignment of client cybersecurity strategy execution with business objectives and operational excellence. Collaborate with the CISO or vCISO to develop or review and refine the appropriate cybersecurity strategy, ensuring it aligns with business goals and client organizational risk management priorities. Bachelor’s degree in computer science, Cybersecurity, Information Security, or related field and Ten (10) years or more experience in cybersecurity with a proven record of accomplishment in a variety of domains such as endpoint protection, intrusion detection, application security, and secure networking. Professional cybersecurity certifications (e.g., CISSP, CISM, GIAC) are appreciated but not required.
Lead and execute red team operations and penetration tests to identify security weaknesses in clients' networks, systems, and applications.. Work closely with clients to enhance their incident response strategies and security awareness based on insights from red team operations.. At least 3 years of hands-on experience in cybersecurity roles focused on penetration testing or red team operations.. Proficiency with penetration testing tools like Metasploit, Burp Suite, and Cobalt Strike, and scripting languages such as Python and PowerShell.. Preferred certifications include OSCP, CEH, GPEN, and GWAPT.