Experience in writing and managing RMF body of evidence documents (e.g., System Security Plan (SSP), Security Compliance Traceability Matrix (SCTM), Risk Assessment Report (RAR), Continuous Monitoring (ConMon) Plan, and Security Assessment Plans and Procedures (SAPP). AWS cloud security knowledge including architecture, design, deployment, and management of cloud security technologies. Experience in configuration and use of cyber defense and vulnerability assessment tools such as ACAS and SCC. Moderate understanding of vulnerability analysis tools such Tenable NESSUS Security products. Scripting experience (Bash/Shell, Python, Perl, PowerShell).
By migrating our technology platforms both on-premises and in the cloud, this person will assist in our digital transformation goals, increased business agility, elastic scalability, enhanced security, and reduction in our support for on-premises commodity solutions.. A copy of a notice regarding the provisions of the Los Angeles County Fair Chance Ordinance is available at:.. Must have hands-on experience and senior level subject matter expertise with various security technologies such as advanced firewall design, packet inspection, IDS/IPS, VPN, SIEM, on-premises and cloud network solutions and components.. Relevant security certifications such as CISSP, CISM, CCSP, advanced network vendor certifications, ISC2 certifications, SANS certifications. Working knowledge in other IT concepts like storage, application development, operating systems, identity authentication & authorization, PAM, SSO, encryption standards, and contract negotiations
Accorian is an established cybersecurity advisory and consulting firm headquartered in New Jersey with regional offices in India, Canada and UAE. In today’s dynamic digital world, we serve a global clientele, helping businesses of all sizes strategize cybersecurity initiatives, identify risks, develop solutions, program management, incident response, penetration testing and achieve necessary compliance. Build relationships with customer executive sponsors, speaking on a frequent cadence to strengthen relationships while uncovering new opportunities. Monitor key performance metrics like customer satisfaction, renewal rate, upsell/cross-sell lead identification, reference-ability, renewal likelihood, adoption, consumption, and customer engagement.. Strong sales skills with a thorough understanding of the consultative sales cycle. Experience in client engagement.
The role offers the chance to lead key infrastructure initiatives, optimize system performance, and shape the future of IT operations. Contribute to disaster recovery planning, including configuring and testing recovery sites for business continuity. Develop comprehensive network security policies, including incident response plans and network segmentation rules. Experience in virtualization, with proficiency in VMWare ESXi and Nutanix AHV. Competence in Active Directory (AD) Management, Exchange Management, and Office 365.
Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network.. Apply your innate curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights. Clearance: Active TS/SCI with polygraph. Degree in related fields (e.g., Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics).. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration.
Provide backup to higher management, and may act on behalf or as a surrogate leader as required.. Detailed technical experience with mainframe, distributed computing environments and network security architecture concepts including topology, protocols, components and principles. Detailed technical experience with Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), attack methodologies and traffic flows for threats and vulnerabilities. Experience acting as a surrogate team leader to assign, review, evaluate and prioritize team efforts. M&T Bank is a Top 11 US bank holding company and one of the best performing and financial stable regional banks in the country, we offer our technology employees a wide range of performance-based career development opportunities.
Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network.. Degree in related fields (e.g., Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics).. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration.. Multiple health insurance options which include a PPO plan with ZERO deductibles and an HSA plan.. Government shutdown protection where employees don't have to use leave for up to 3 days out of the year for inclement weather or budget issues.
The Swift Group in seeking an experienced Security Control Assessor (SCA) to join our team.. The ideal candidate will have a strong background in cybersecurity, extensive experience with compliance and vulnerability scanning tools, and a deep understanding of assessment and authorization processes.. At least 1 year of experience as a Security Control Assessor (SCA) within the past 3 calendar years. Demonstrated hands-on experience with compliance and vulnerability scanning tools (XACTA, RedSeal, Nessus, Splunk, McAfee ePO, and/or other vulnerability scanners). Ability to make recommendations to the IC CISO or designee for improving TTPS for better cyber threat protection
Knowledge of current cybersecurity and technology architectures such as zero trust, IaaS, PaaS, SaaS, virtualization, containerization, DevSecOps, and software-defined networking across a variety of environments and deployments.. Knowledge of Identity and Access Management (IAM), cryptography / key management, secrets management, access controls and security protocols (e.g., multi-factor, SAML, OAuth, OIDC).. Relevant industry certification (e.g., CISSP, CEH, OSCP, Azure, AWS, CISM, CISA).. Through groundbreaking technology and a commitment to stellar experiences for drivers and dealers alike, Cox Automotive employees are transforming the way the world buys, owns, sells - or simply uses - cars.. Cox Automotive employees get to work on iconic consumer brands like Autotrader and Kelley Blue Book and industry-leading dealer-facing companies like vAuto and Manheim, all while enjoying the people-centered atmosphere that is central to our life at Cox. Benefits of working at Cox may include health care insurance (medical, dental, vision), retirement planning (401(k
The NYC Department of Probation (DOP) is a world leader in working creatively and effectively engaging with people under court-mandated community supervision.. -Ensure system security, including firewall configuration, access control. -Develop and implement backup and disaster recovery procedures. Experience in computer operations, technical support, quality assurance (QA), hardware installation, help desk, or as an end user will not be accepted for meeting the minimum qualification. To be eligible for placement in Assignment Level IV, in addition to the Qualification Requirements stated above, individuals must have one year of satisfactory experience in a project leader capacity or as a major contributor on a complex project in data administration, database management systems, operating systems, data communications systems, capacity planning, and/or on-line applications programming.
Develops and implements IT policies and procedures, including those for architecture, security, disaster recovery, standards, purchasing, and service provision.. Participates and recommends in the design and implementation of disaster recovery and business continuity plans, procedures, audits, and enhancements.. Requires a Bachelor of Science Degree with an emphasis in Information Technology/Systems, Computer Science and 5-7 years of related work experience utilizing comprehensive knowledge of network operating systems and network management tools, as well as extensive experience (minimum 5 years) with Network Infrastructure hardware such as fiber optics, bridges, routers, universal cabling, gateways, firewalls, etc.. Requires Cisco CCNA/CCIE, Arista ACE, Palo Alto PCNSA/PCNSE, VMware VCP or equivalent industry certifications.. Expert knowledge of and demonstrated ability with TCP/IP, DNS, OSPF, BGP, SNMP, WAN technologies, VLANs and LAN switching and routing.
Cloud Security Compliance: Oversee cloud security initiatives, ensuring adherence to Zero Trust Architecture (ZTA), FedRAMP, and DoD cybersecurity policies.. Cloud Platform Oversight: Guide the design, implementation, and optimization of multi-tenant Microsoft Azure architecture for enterprise applications.. Process Optimization Automation: Implement strategies to enhance automation, streamline DevSecOps processes, and improve cloud security operations.. Experience: Minimum 5 years of experience in project management, cloud security, or IT operations, with a strong focus on Azure cloud environments.. Agile DevSecOps Knowledge: Experience with Agile Scrum methodologies, CI/CD pipelines, and cloud security automation.
Senior Firewall Engineer. CACI‘s Transport & Cybersecurity Services (TCS) program is actively seeking TS/SCI-cleared Firewall Engineers to join our Network Security Services (NSS) team!. TCS offers a long-term, CACI prime contract opportunity supporting the National Geospatial-Intelligence Agency‘s (NGA) GEOINT mission.. Our team of talented Network and Cybersecurity professionals help design, develop, procure, implement, operate/sustain, and enhance NGA networks and cybersecurity posture in support of national security.. Intrusion Detection Systems / IDS Products (e.g. FireEye, F5 Load Balancer, Cisco FTD, etc.)
· Net+, Sec+, MSCE, CCNA, CCNP, VCP etc.. · Intune (MDM, MAM, CAP, DLP, etc.). · Azure AD / O365. · Disaster recovery, intrusion prevention, data loss prevention, email security. · Security Information and Event Management (SIEM) technologies
Develop and mature the physical security function at Vaxcyte, including access control and monitoring, executive protection, corporate physical security and ongoing monitoring of news and events which may impact Vaxcyte’s operations or employees. BS in a STEM, political science or other technical-related degree preferred and minimum 12 years’ Physical Security experience with at least 5 years of in-house security leadership and developing security programs. Assess the need for the development and establishment of a global security operations center (GSOC). Lead and manage a team of security analysts and operators to the operation of a GSOC. Oversee 24x7 monitoring of security systems, including CCTV, access control, intrusion detection and threat intelligence feeds.
API gateway and management tools like Apigee and Amazon API Gateway. Mobile app development frameworks (e.g., Ionic, Capacitor, React Native, Flutter, or Swift). Document management systems like Hyland Alfresco.. Architecture and detailed design of solutions using cloud platforms like AWS, Microsoft Azure, or Google Cloud.. Authentication protocols (OAuth, JWT) and identity management solutions (e.g. Azure AD, ForgeRock, SailPoint).
Promoting a DevSecOps culture through collaboration and sharing.. GCP), containerization technologies (Docker, Kubernetes), scripting languages (Python, Bash), and CI/CD pipelines. authorization, encryption, vulnerability management, network security, and application security. Familiarity with security tools such as vulnerability scanners, web application firewalls, intrusion detection/prevention systems, SIEM solutions, and security orchestration platforms. The total compensation for this practice may include an annual performance bonus (or other incentive compensation, as applicable), equity, and medical, dental, vision, and other benefits.
Monitors SIEM and Microsoft Azure environment for evidence of current or previous security events, as well as, performs improvements to Splunk alerts, reports, and dashboards. Works with technical operations teams to ensure security controls such as firewalls, MFA, and NAC functioning as expected. 3 – 5 years of work experience as a security analyst or information security engineer. Hands on experience in security software and systems including firewalls, intrusion detection systems, anti-virus/EDR software, identity monitoring solutions, authentication platforms, log management , web-content filtering platforms, and vulnerability management systems. Splunk, Crowdstrike, and Qualys software experience preferred
Minimum of 5 years of experience in Cyber Security, InfoSec, Security Engineering, Network Engineering with emphasis in cyber security issues and operations, computer incident response, systems architecture, data management. Candidates must be United States citizens, hold an active Top Secret clearance with Sensitive Compartmented Information (TS/SCI), and have a positively adjudicated polygraph in order to be considered for this position.. Security Information and Event Management (SIEM) systems (Splunk and/or Splunk Enterprise Security). Web/Email gateway security technologies. Services include network defense, computer network attack, secure network design, penetration testing and vulnerability assessment.
This role will require a deep understanding of LAN/WAN/SDWAN technologies, wireless, cloud networking technologies (primarily Azure) and significant utilization and specialization in Fortinet technologies to join our growing IT team.. Participate as part of the Team of the Disaster Recovery and Resilience implementation.. Establish and maintain metrics and program control mechanisms to track program progress as well as the current state of network architecture.. Strong knowledge and understanding of several network vendor platforms including Fortinet.. Relevant network engineering certification such as Fortinet Certified Solution Specialist, Fortinet Certified Professional, Cyber Ops, or other network specific certifications