Role: Network Security Engineer. Five or more years of Network and Security Engineering experience, with an emphasis on security products from Radware, Fortinet, Cisco and Palo Alto.. Experience in network security hardening and controls as well experience using network monitoring and logging tools (i.e. SolarWinds, LiveNX, ELK). Hands on engineering level experience with Radware, Palo Alto, Fortinet and Cisco security products, including their management platforms. CCNA/CCNP/CISSP a plus.
DevSecOps Integration: Embed security into every stage of the software development lifecycle.. Apply and enforce industry-standard security frameworks, including CIS Benchmarks, AWS Foundational Security Best Practices (FSBP), and Microsoft Cloud Security Benchmark (MCSB).. Experience with Infrastructure as Code (IaC) tools such as Terraform.. Experience ensuring compliance with GDPR, HIPAA, and cloud security frameworks such as CIS, AWS/FSBP, and Microsoft/MCSB.. Skills with GitHub/Azure-DevOps, PowerShell, Bash, AWS/Azure CLI.
The AWS Cloud Operations Manager will oversee the design, optimization, and management of cloud infrastructure on AWS to ensure performance, scalability, and compliance with security standards for Boston Medical. This role leads a team of engineers while driving automation, cost efficiency, and continuous improvement through DevOps practices. The manager is responsible for monitoring, incident response, backup, and disaster recovery strategies, ensuring alignment with business continuity goals. Collaborating with cross-functional teams, the manager also supports cloud migrations and contributes to a Center of Excellence for cloud operations. Deep knowledge of AWS services, cloud security, and infrastructure as code is essential, along with a commitment to Boston Medical Center’s mission of delivering exceptional care without exception.
We are seeking an expert-level Data Privacy Technology Consultant with deep technical expertise in computer forensics, privacy control testing, and consumer-facing product assessments. 8 or more years of experience in data privacy, cybersecurity, or digital forensics, with a focus on privacy technology assessments. Experience working in digital forensics, incident response, or threat intelligence related to privacy and security. Proficiency with tools used for web tracking analysis, forensic investigations, and privacy compliance testing. CIPT (Certified Information Privacy Technologist) or CIPP certification (CIPP/E, CIPP/US, CIPM) strongly preferred.
Beyond automation engineering, you will collaborate with SOC, Threat Intelligence, and DevOps teams to ensure that incident response playbooks, security tooling, and cloud security controls are seamlessly integrated into CI/CD pipelines and DevSecOps workflows. Contribute to post-incident reviews and root cause analysis (RCA), driving security automation improvements to prevent repeat incidents. Hands-on expertise with SOAR, SIEM, XDR, and security telemetry platforms (e.g., Chronicle, Splunk, AWS Security Hub, GCP Security Command Center). Advanced certifications such as CISSP, GCP Professional Security Engineer, AWS Security Specialty, CKS (Certified Kubernetes Security Specialist), GCIH, GCFA, or OSCP. Familiarity with adversary emulation frameworks (Atomic Red Team, CALDERA, or MITRE ATT&CK Evaluations).
Collaborate with various IT teams to understand the requirements for current and new systems such as intrusion detection systems, application security systems, authentication systems, identity management, and access control.. Lead efforts to provide baseline, periodic, and ongoing information security risk and vulnerability management and penetration testing.. Education: Bachelors degree in computer science, Information Security, Business or Engineering; or equivalent work experience is required; CISA and/or CISSP certification preferred.. This represents the presently-anticipated low and high end of Reed Smiths pay range for this position.. Reed Smiths success depends heavily on the effective utilization of qualified people, regardless of their race, ancestry, religion, color, sex, age, national origin, sexual orientation, gender identity and/or expression, disability, veterans status, or any characteristic protected by law.
Bachelor s degree in Cybersecurity, Data Privacy, Computer Science/Engineering, Information Systems, or related technical discipline, or equivalent experience/training. 2+ years of experience in data discovery and/or data protection, including data loss prevention. Knowledge of data management disciplines such as data discovery, data governance, data classification, and data privacy. Understanding of data protection regulations, such as GDPR and CCPA. Ability to interact with enterprise product teams, data analysts, and data governance teams for cross functional efforts
Job Description & Requirements Universal Orlando Resort believes in-person collaboration is key to our success.. This role Universal Orlando Resort believes in-person collaboration is key to our success.. EDUCATION: Bachelor’s degree in Computer Science or equivalent or CIPT. Technical network (e.g. CCNA, CCNP Security) and security certifications highly desirable (e.g. CISA, CISSP, GCIH) or equivalent combination of education and experience.. Must be well versed in operating systems such as Linux as well as Windows environments, Active Directory, VPN systems, encryption schemas and algorithms, various authorization and authentication mechanisms/software, network monitoring and sniffing, TCP/IP networks and vulnerability and threat management tools (including network-based scanners).. Overtime hours may be required to meet project deadline Experience in cloud or highly-virtualized environments, such as Amazon Web Services, Microsoft Azure, VMWare ESXi, Nutanix, etc.
Provide guidance concerning corporate manufacturing applications, OPC architecture data flow, anti-virus solutions, MS Windows patching, etc.. Will be working with multiple types of SCADA/DCS/QCS systems (Honeywell, Invensys, ABB, Rockwell, Emerson).. Must possess fundamental knowledge of control systems (DCS, PLC, HMI) and architecture.. Industry security certifications, such as Certified Information Systems Security Professional (CISSP), Systems Security Certified Practitioner (SSCP) or Global Information Assurance Certification (GIAC).. Our benefits plan includes - medical, dental, vision, flexible spending and health savings accounts, life insurance, ADD, disability, retirement, paid vacation/time off, educational assistance, and may also include infertility assistance, paid parental leave and adoption assistance.
This role will support manual Penetration Testing of Centene's internal environment including Web Applications and API's.. Participate in the penetration testing team’s customer outreach program to develop and strengthen relationships with other technical teams within the cyber defense organization.. Familiarity with current cyber security trends, technologies, and attacks; understanding of routing, remote access, proxies, firewalls, TCP/IP, email gateways/filters, encryption, network scanning, packet sniffing and injection, advanced network reconnaissance, persistence techniques, and wireless network exploitation concepts; remote and local exploitation techniques; security evasion techniques; social engineering techniques, proficiency in programming languages (python, go, ruby, etc.). Experience with Pen Testing tools such as ffuf, Sqlmap, nmap, Wireshark, Postman, and Kali Linux.. CEH, OSCP certification, or relevant cybersecurity certification preferred
Founded in 1835, State University of New York (SUNY) Brockport is an exceptional regional comprehensive public university that offers high-quality undergraduate and graduate degree programs in the arts, business, education, health, humanities, social sciences, and STEM. The University's curriculum is grounded in the liberal arts and sciences and emphasizes experiential learning. The Joey Jackson Intercultural Center, named after a Brockport alum who is a prominent criminal defense attorney and CNN legal analyst, was created to provide an inclusive and supportive environment for underrepresented students, to help our faculty members connect with students outside of the classroom, and to provide students with opportunities for leadership development, celebration, and collaborations. Interest and ability to teach classes in one or more, but not limited to the following areas of Cybersecurity: Computer/Network Security, Information Assurance, Ethical hacking, Incident response, Database and Web security, Cryptography, Software and System security. Possession of relevant cybersecurity certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or CompTIA Security+. Pre-employment drug test and DOT physical may be required for positions requiring a valid Class A or B CDL driver's license with passenger endorsement.
Location: North America, Remote Job Summary: The IT Security Manager is responsible for managing and maintaining the overall cybersecurity posture of the Company through the delivery of a comprehensive program of interlinked tools, techniques and processes drawn from industry best practices.. Among other duties, the role will actively engage in incident detection and response, process & compliance audits, technical penetration testing and demonstrating strong communication and project management skills.. Our pay-for-performance philosophy provides recognition and prestige, coupled with a competitive compensation package.. A reasonable estimate of the pay range for this position is $91,000 - $167,000.. There are several factors taken into consideration in determining the base salary, including but not limited to: job-related qualifications, skills, education, and experience, as well as job location and the value of other elements of an employee’s total compensation package.
Employs advanced forensic tools and techniques for attack reconstruction, including dead system analysis and volatile data collection and analysis.. Supports internal HR/Legal/Ethics investigations as forensic subject matter expert.. Performs network traffic analysis utilizing raw packet data, net flow, IDS, and custom sensor output as it pertains to the cyber security of communications networks.. Correlates actionable security events from various sources including Security Information Management System (SIMS) data and develops unique correlation techniques.. May conduct malware analysis of attacker tools providing indicators for enterprise defensive measures, and reverse engineer attacker encoding protocols.
TS/SCI - Polygraph required. Provide systems engineering/cybersecurity support to weapons and space cybersecurity assessments. Agnostic of threat, help translate adversarial mindset, threat intelligence into actionable mitigations within possible areas of CNO and CND (Computer Network Defense), System design, Network architecture / administration, Continuity of Operations.. Working knowledge of the DoD Information Network (DODIN), DoD IT system and network certification and accreditation processes (i.e., RMF), to include system security authorization agreements and current and emerging cybersecurity threats. Akina is a Woman Owned, Service Disabled, Veteran Owned, Small Business, looking for talented and ambitious individuals to join our team.
We do this by offering exceptional benefits, flexible schedules, and the tools necessary to achieve success through paid training, mentoring, and the opportunity to work alongside top-notch security professionals.. Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Exploitation Analyst, Digital Network Exploitation Analyst, Target Digital Network Analyst, Cyber Network Defense Analyst by improving, protecting, and defending our Nation‘s Security.. Responsibilities include analyzing SIGINT and cybersecurity data across various OSI network layers, understanding IP core infrastructure, communication devices, network connectivity, and traffic patterns.. Background in hardware/software engineering, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, or network and systems administration.. A Degree in Computer Science or related fields (Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics).
Our Mission At Dobbs Defense, we deliver mission-centric IT, Cyber, and data analytics solutions for our government and commercial clients through the convergence of automation, innovation, training, and education.. Job Description Dobbs Defense Solutions is seeking a Network Engineer to add to our team.. The engineer will be supporting a robust, world-wide communications network, providing office automation packages.. The engineer will document management tools and collaboration, voice, and video tools in a secure, flexible, distributed architecture supporting a classified DoD IT system.. Responsible for monitoring network hardware operations to ensure properly set configuration options.
API gateway and management tools like Apigee and Amazon API Gateway. Mobile app development frameworks (e.g., Ionic, Capacitor, React Native, Flutter, or Swift). Document management systems like Hyland Alfresco.. Architecture and detailed design of solutions using cloud platforms like AWS, Microsoft Azure, or Google Cloud.. Authentication protocols (OAuth, JWT) and identity management solutions (e.g. Azure AD, ForgeRock, SailPoint).
We are looking for a talented and experienced Senior Identity and Access Management (IAM) Engineer.. This individual will have in-depth experience with identity management technologies, specifically Okta, Active Directory (AD), Entra ID/Azure AD, and other IAM tools.. IAM Solutions Design & Implementation: Lead the design, development, and deployment of IAM solutions using Okta, Azure AD/Entra ID, and Active Directory, ensuring seamless integration across the enterprise.. Access Management: Administer and configure role-based access control (RBAC), single sign-on (SSO), multi-factor authentication (MFA), and self-service password reset solutions.. Troubleshooting & Support: Provide expert-level troubleshooting support for identity-related incidents, including Active Directory, Okta, and Azure AD integrations.
New York | Salary: $235,000 – $260,000 A premier law firm is seeking a partnership-track associate with 2–3 years of experience to join its Global Privacy and Cybersecurity practice in New York.. This is an outstanding opportunity to build your career in one of the most sophisticated and internationally recognized privacy law teams in the world.. Join a collegial, internationally ranked team known for shaping global privacy standards.. You’ll gain cutting-edge exposure across legal, regulatory, and operational privacy issues while building deep expertise in a field with limitless potential.. $235,000 – $260,000 (based on experience and qualifications) Comprehensive benefits, wellness programs, and professional development support Powered by JazzHR
The Global Business Services (GBS) Network Management team oversees and supports Wolters Kluwer’s Enterprise Network, spanning multiple public/private clouds, data centers, and offices in North America, Europe, and Asia Pacific.. High degree of expertise in Cloud networking - Virtual Networks, NSGs, Transit Gateways, DNS, Traffic Manager, Route 53, Express Routes, Cloud WANs etc.. Hands-on expertise and experience with Terraform (or similar).. Hands on experience in CI/CD & Azure DevOps.. Practical experience with network protocols, IP Addressing, DDI (Schemas, VLANS, DNS, DHCP, IPAM), SolarWinds, PRTG