Also part of NYU Langone Health is the Laura and Isaac Perlmutter Cancer Center, a National Cancer Institute designated comprehensive cancer center, and NYU Grossman School of Medicine, which since 1841 has trained thousands of physicians and scientists who have helped to shape the course of medical history.. At NYU Langone Health, equity, diversity, and inclusion are fundamental values.. We embrace diversity, inclusion, and individual skills, ideas, and knowledge.. Evaluate and manage relationships with Palo Alto, Fortinet, F5 and other third-party security vendors, ensuring that outsourced security services meet the organization's requirements and compliance standards.. Collaborate with senior management to define and manage the network security budget, ensuring optimal utilization of resources and investment in security technologies.
Experience with Penetration Testing, Red and Blue teaming experience is a plus.. Along with our public affiliate Clearway Energy, Inc., our portfolio comprises approximately 11.6 GW of gross generating capacity in 26 states, including 9.1 GW of wind, solar, and battery energy storage assets, and over 2.5 GW of conventional dispatchable power generation providing critical grid reliability services.. Along with our public affiliate Clearway Energy, Inc., our portfolio comprises approximately 11.8 GW of gross generating capacity in 26 states, including 9.1 GW of wind, solar, and battery energy storage assets, and over 2.8 GW of flexible dispatchable power generation providing critical grid reliability services.. Clearway offers all eligible employees working 20+ hours per week a comprehensive menu of benefits: generous PTO, medical, dental & vision care, HSAs with company contributions, health FSAs, dependent daycare FSAs, commuter benefits, relocation, & a 401(k) plan with employer match, a variety of life & accident insurances, fertility programs, adoption assistance, generous parental leave, tuition reimbursement, & benefits for employees in same-sex marriages, civil unions & domestic partnerships.. Have you worked in the energy sector, including renewable, gas, coal, or oil?
Check Point Infinity External Risk Management, otherwise known as Cyberint, continuously reduces external cyber risk by managing and mitigating an array of external cyber security threats with one unified solution.. 3+ years in a leadership role (player/coach or manager) within enterprise cybersecurity sales.. Minimum of 5+ years of proven success in selling cybersecurity and/or threat intelligence solutions to enterprise clients.. Holds one or more recognized cybersecurity certifications (e.g., CISSP, CISM, CEH, GIAC), demonstrating a strong foundation in security principles and practices.. Technically astute and able to confidently communicate complex cyber and threat intelligence solutions to both technical and non-technical audiences.
ACES is seeking a Cybersecurity Policy Analyst to support DoD CIO. Hybrid Work requires ACTIVE TS/SCI CLEARANCE on 5 Year Contract starting in Feb/Mar at offices in the Pentagon, Arlington, VA.. Assist in planning, analysis, development, and implementation of cybersecurity strategies aligned with DoD CIO priorities, goals, and objectives.. Assist in enhancing enterprise-wide cybersecurity risk management frameworks, including migration from DIACAP to RMF, and provide analytical support for RMF deployment and functionality.. Perform systems security, risk, and vulnerability assessments, advising on measures of effectiveness and providing support for CJCSI, CJCSM, and emerging technology evaluations such as 5G and IoT systems.. Support the development and implementation of cybersecurity standards for technologies including control systems, IoT, weapon systems, and cloud capabilities, with additional support for FedRAMP initiatives.
Senior Threat Hunter - On-site one day a week Washington, DC. Join to apply for the Senior Threat Hunter - On-site one day a week Washington, DC role at AXXUM TECHNOLOGIES LLC. As a Senior Threat Hunter, you will participate in threat actor investigations, develop detection methodologies, and support incident response and monitoring functions.. Assist in incident response activities such as host triage, malware analysis, remote system analysis, and remediation.. Analyze network traffic, IDS/IPS/DLP events, packet captures, and firewall logs.
Your expertise in TypeScript, Python, Kubernetes, CI/CD, and terraform orchestration will be crucial in identifying and mitigating potential security vulnerabilities.. Minimum 5+ years of experience as a Security Engineer with a focus on product security, with a strong background in securing cloud-based environments (AWS, Azure, GCP) and understanding of Infrastructure as Code (IaC) security practices.. Expertise in various security domains such as application security, network security, security operations, and incident response.. Familiarity with a wide range of AWS services, including but not limited to VPC, EC2, Lambda, Amazon RDS, and S3.. Proficiency with security tools and technologies, such as firewalls, IDS/IPS, vulnerability scanners, WAF, SIEM, and encryption solutions.
Strategic Ventures is currently recruiting a Malware Analyst to join our team at Ft. Meade, MD. The Malware Analyst will support efforts required for delivery of Mission Assurance (MA) products as part of the effort to facilitate, evaluate, and report on malware in support of cyberspace operations.. Often and without source code or documentation, perform system analysis, reverse engineering, as well as best practice malware analytics methodologies and analysis on Windows, Android, or UNIX-based platforms. Create malware detection topologies; conduct vulnerability assessments/penetration tests of information systems. 10+ years of experience as a Malware Analyst. Knowledge of Metasploit, x86, x64, penetration testing, python, BSides organizer, and Capture the Flag competition
They are now seeking an experienced Senior Technology & Cyber Risk specialist to join their team in Singapore.. Design and lead the enterprise-wide technology and cyber risk management framework, ensuring comprehensive identification, assessment, and mitigation of emerging threats. Develop and maintain technology and cyber risk appetite statements, key risk indicators, and thresholds to support proactive risk monitoring. Ensure compliance with relevant regulatory requirements and industry best practices across jurisdictions, including technology and cyber risk frameworks. Lead, mentor, and develop a high-performing technology and cyber risk team, embedding a strong risk culture across the organization
We are seeking a Senior Network Engineer to join our dynamic team.. Serve as product owner for Palo Alto technologies, including VPN, logging, Azure Firewall, Panorama, and GlobalProtect. Proficiency in: Cisco LAN/WAN hardware, Layer 2/3 Networking, TCP/IP, DHCP, Palo Alto (Panorama, VPN, GlobalProtect, Azure Firewall), Ansible, Python. Prior experience acting as a product owner or lead on major network/security initiatives. Level 2 or 3 Network and Systems Support Manager Information Security Engineer-Level 2- Cloud Systems Engineer I - High Performance Computing Systems Engineer Fall 2025 Internship (Mason, OH) We’re unlocking community knowledge in a new way.
Positions are located at the SOCOM Headquarters at MacDill, AFB FL, and at the TSOC and Component locations in the United States and abroad.. Performs systems administration, maintenance, computer security, and support for servers on networks and Computer Network Defense-Service Provider (CND-SPs). Provides systems administration, maintenance, computer security, and support for physical servers,. Must have experience with SIEM, log analysis, vulnerability analysis, and some scripting experience.. Peraton Overview Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy.
Analyze telemetry data from diverse sources to detect known and unknown security incidents using various security tools, such as SIEM, EDR, and network traffic analysis.. Engage with threat hunting, event analysis, and incident response squads to identify threats and vulnerabilities seen internally.. Participate in security incident response activities and help develop mitigation and remediation strategies.. Proficiency with security tools and technologies, such as SIEM, EDR, IDS, IPS, network traffic analysis, endpoint security controls, SOAR, and/or cloud security.. Security certifications such as GIAC, CEH, or similar are a plus.
This position is in Pleasant Grove, Utah with hybrid work from home days available and will report to the Senior Manager of Security & Compliance.. Utilize security testing tools, such as Tenable & Aikido, to perform scanning of code, containers, domains, APIs, etc.. Minimum of 2 years in a hands-on InfoSec/Cybersecurity role, including exposure to vulnerability management, network defense, and/or application security.. Certified Ethical Hacker (CEH). CYSA+, A+, Network+, or equivalent.
Using predictive analytics and advanced machine learning trained on billions of signals to power RiskOS, Socure has created the most accurate identity verification and fraud prevention platform in the world.. About the Role We are looking for a dynamic and experienced leader to head our Information Security, IT, Governance, Risk, and Compliance (GRC) functions, ensuring that our technology, processes, and policies continue to meet the demands of a fast-evolving regulatory landscape and an ever-changing threat environment.. Reporting to the CTO, you will develop and execute a strategic roadmap for information security, IT operations, regulatory compliance, and risk management.. Champion security and compliance best practices across the organization through training, awareness programs, and effective stakeholder engagement.. Relevant industry certifications (e.g., CISSP, CISM, CRISC, CISA)
Works under the direction of the Chief Information Officer.. Advise Chief Information Officer on risk levels and security posture.. Manager the Town and School’s cyber security and incident response program.. Provide after action reports (identify lessons learned and recommend improvement) for cyber incidents to Chief Information Officer, Town Manager and Superintendent of Schools.. Bachelor’s degree in Information Systems or related field; CompTIA Security+ and CISSP, or 15+ years in IT security and operations in lieu of education/certifications.
Additionally, the candidate must have at least 10 years of Cisco experience, with proven expertise in Cisco network hardware, including routers, switches, firewalls, and unified communications equipment.. Minimum 10 years of Cisco experience; proven expertise with Cisco network hardware, including routers, switches, firewalls, unified communications equipment. Experience with Cisco network hardening, including routers, switches, firewalls, unified communications equipment. Minimum 10 years of Cisco experience; proven expertise with Cisco network hardware, including routers, switches, firewalls, unified communications equipment.. Experience with Cisco network hardening, including routers, switches, firewalls, unified communications equipment.
As an experienced and strategic Senior Director of Cyber Security Detection and Response, you bring a wealth of knowledge in cybersecurity principles and a keen understanding of detection engineering, threat intelligence, and the MITRE ATT&CK framework.. Establishing repeatable and scalable processes around threat hunting, forensics, insider threat, and security content development.. Streamlining threat intelligence lifecycles, resulting in more efficient and effective threat management.. Strong experience with SIEM platforms (e.g., Splunk, Elastic, QRadar) and the MITRE ATT&CK framework.. Relevant certifications such as CISSP, GCIH, GCFA, or equivalent.
As a key member of the Applied Cryptography team, the Associate Cybersecurity Engineer will focus on supporting the designing, implementing, and managing Public Key Infrastructure (PKI) solutions to enhance our organization's data security posture.. Support the development and maintenance of comprehensive documentation for PKI enrollment, management and integration processes for Visa applications, ensuring clarity and ease of understanding for stakeholders.. Seasoned Engineer on Key Management and Hardware Security Modules (HSM).. Understanding on the Cloud PKI and Key Management implementations on AWS, Azure and GCP.. Understanding and experience with the cryptography algorithms, and public key infrastructure (PKI).
Perform adversarial threat emulation (Red Teaming) and penetration testing to assess the performance of aeronautical systems, subsystems, equipment (platform IT), and on government networks including Windows domains, Linux systems, switches, routers, and other connected network devices.. Experience operating open source and commercial tools such as Metasploit, Burp Suite, Cobalt Strike, NMAP, Core Impact, etc.. Experience in one or more of the following cybersecurity disciplines: Penetration testing of modern Windows and Linux operating systems and IP-based networks; Exploit and malware development targeting modern operating systems and defenses; Reverse engineering; Web application penetration testing; Software development; Hardware hacking; Cryptography; Software defined networks; Digital forensics; Control systems; and/or Radio Frequency (RF). Industry certification of EC-Council Certified Ethical Hacker (C|EH) and ISC2 Certified Information Systems Security Professional (CISSP) or their equivalents are required.. Be able to obtain one or more of the following vendor certifications within 6 months of being hired: Offensive Security Certified Engineer (OSCE); Offensive Security Certified Professional (OSCP); and GIAC Certified Exploit Researcher and Advanced Penetration Testers (GXPN)
Ability to obtain a DoD Secret Clearance Demonstrated proficiency in: Enterprise network architecture. Configuration of network hardware such as Cisco, Juniper, or similar platforms. Preferred Qualifications: Active DoD Secret Clearance or higher. Certifications such as CCNA, CCNP, CompTIA Network+, or Security+. Working knowledge of network automation, scripting (e.g., Python, Ansible), or zero-trust architecture
Lead and execute red team operations and penetration tests to identify security weaknesses in clients' networks, systems, and applications.. Work closely with clients to enhance their incident response strategies and security awareness based on insights from red team operations.. At least 3 years of hands-on experience in cybersecurity roles focused on penetration testing or red team operations.. Proficiency with penetration testing tools like Metasploit, Burp Suite, and Cobalt Strike, and scripting languages such as Python and PowerShell.. Preferred certifications include OSCP, CEH, GPEN, and GWAPT.