Chief Information Security Officer is responsible for delivering strategic vision and operational oversight for the Enterprise Information Security Architecture and Security Operations Center.. Security Operations Management: Lead the security operations team for product and infrastructure, ensuring the implementation of robust security controls, incident response protocols, vulnerability management, and security monitoring.. Extensive experience in independently leading security operations, including incident response, threat intelligence, vulnerability management, and security monitoring.. Proficiency in security architecture design, Product security, responding to vendor questionnaire and cyber security forms, network security, cloud security, identity and access management, encryption, and secure coding practices.. RaySafe is the worldwide leader of X-ray test equipment, real-time staff dosimetry, and radiation survey meters.
Design, configure, and implement Palo Alto solutions including Panorama management console, Prisma cloud services, and Firewall management and support.. Developing and maintaining infrastructure as code (IaC) through Terraform. Firewall Management using Palo Alto Networks Next Generation Firewalls. Endpoint Security, Palo Alto Firewall, Endpoint Detection Response, DNS Security, CyberArk, Entra ID, Cisco ISE. Endpoint Security,Palo Alto Firewall,Endpoint Detection Response,DNS Security,CyberArk,Entra ID,Cisco ISE
Oversee, manage and provide reporting from the Next Generation Firewalls (NGF)s, Anti-Virus, Malware, Security, Information and Event Management (SIEM), Intrusion Detection / Prevention (IDS/IPS), Domain Name Services (DNS), Vulnerability scanners, and other security solutions that comprise the Security Architecture of the organization.. Conduct cloud security analysis of Microsoft Active Directory, Office 365 and PCI-DSS. This can include Microsoft’s cloud solutions such as MCAS, PIM, InTune, SharePoint, One Drive, Teams, M365, AD, DLP, AIP and Exchange Online Protection.. Be the expert in security tools (Azure Security Center, Darktrace, Carbon Black, CyberArk) to assist in detection, prevention, analysis, and remediation of security threats.. Design and develop cloud-specific security policies, standards and procedures e.g., O365/EMS tenant management and configuration, identify management and access control, firewall management, auditing and monitoring, security incident and event management, data protection (DLP, encryption), user and administrator account management, SSO, conditional access controls and password/key management.. Planning, implementing, managing, monitoring, and upgrading security measures for the protection of the organizations data, systems and networks, following industry best practices (CIS, NIST, PCI-DSS).
Design and implement Zero Trust Network Security frameworks, including network segmentation, identity and access management and continuous monitoring.. Proven experience in designing and implementing Zero Trust network security frameworks using Palo Alto Network and/or Zscaler technologies. Sign in to set job alerts for “Director of Security” roles.. Assistant Store Director - Twin Cities, MN Assistant Store Director - Twin Cities, MN Assistant Store Director - Twin Cities, MN Director of Technology - Product Security (Application Security) Security Operations Center (SOC) Manager Minneapolis, MN $106,000.00-$170,000.00 1 week ago. Technical Communications Manager, Splunk Global Security (US Remote Available) Minnesota, United States $105,800.00-$160,000.00 2 weeks ago
The Cybersecurity Intrusion Detection Analyst will work in the Attack Sensing and Warning (AS&W) division which senses changes in subscriber networks through comparison to established baselines and the fusion/integration of closed and open source intelligence to enhance sensing capability.. Proactively analyzes network and systems traffic, event logs, and threat intelligence data, to properly identify and triage susceptibility of core campus technical assets, determine likelihood of exploitation and implement and/or refine preventative and detective security controls. Perform forensic analysis of systems and malware in cases where subscribers lack the capability and ensure relevant IOCs are shared with Warning Intelligence;. Understanding of network hardware devices and experience configuring Access Control Lists or other Firewall or Router configuration experience. Ability to demonstrate strong knowledge of computer security concepts
Endpoint Security: Knowledge of endpoint security solutions such as antivirus, endpoint detection and response (EDR), and mobile device management (MDM) systems for protecting endpoints and ensuring compliance with security policies.. Cloud Security: Experience implementing cloud security best practices and controls in public cloud environments (e.g., AWS, Azure, Google Cloud), including identity and access management (IAM), encryption, data protection, and compliance monitoring.. Data Protection: Familiarity with data protection technologies such as encryption, tokenization, and data loss prevention (DLP) solutions to safeguard sensitive data across the organization's infrastructure.. Disaster Recovery and Business Continuity: Understanding of disaster recovery (DR) planning, backup and restore processes, and business continuity strategies to minimize downtime and ensure data availability in the event of a disaster or outage.. Compliance and Regulatory Requirements: Knowledge of industry-specific compliance standards (e.g., GDPR, HIPAA, PCI DSS) and regulatory requirements related to data privacy, security, and IT governance.
This role will have a heavy focus in our Malware Intelligence and Sandbox (i.e. malware static and dynamic analysis, integrations, reporting and dissemination) including core data assets and analysis which will precipitate a strong underlying technical base as well as the ability to define and execute upon a product strategy.. Technical expertise in tactical and operational threat intelligence including specific uses of data such as malware intelligence, malicious infrastructure identification, networking, and more. Technical expertise in practical intelligence applications across Cyber Threat Intelligence, Threat Hunting, Incident response, red-teaming / blue teaming, and related fields.. Passion for malware analysis and threat intelligence and their ability to improve detections, incident response, SOC, and threat hunting analysts. Blog & Podcast: Learn everything you want to know (and maybe some things you’d rather not know) about the world of cyber threat intelligence
Design, implement, and manage Palo Alto Networks security solutions (Prisma Access, Next Generation FWs, Strata Cloud, GlobalProtect, Cortex XDR) to protect hybrid and cloud environments.. Implement security controls in public cloud environments (AWS, Azure, OCI), including network security groups, identity and access management (IAM), encryption, and multi-factor authentication (MFA).. 5-7 years of experience in security engineering, with hands-on expertise in Palo Alto Networks platforms (Prisma Access, Strata Cloud, GlobalProtect, Cortex XDR).. Significant experience securing public cloud environments (AWS, Azure, OCI) with practical knowledge of cloud security controls, IAM policies, and network security configurations.. Strong understanding of cloud security controls such as network security groups, IAM, VPCs, security auditing, encryption, and logging in AWS, Azure, GCP and OCI.
Expertise in threat analysis, incident response, vulnerability management, and data protection.. Advanced understanding of encryption, identity and access management (IAM), and security information and event management (SIEM).. CISSP required and Industry-recognized certifications such as CISM, CEH, CRISC, or equivalent is highly preferred.. Committed to delivering a Higher Level of Reliability, Acuren provides an unrivaled spectrum of capabilities including inspection, traditional and advanced NDE/NDT, failure analysis, rope access, materials engineering, field engineering, reliability engineering, drones, robotics, V-Deck and condition-based monitoring services.. Our work is critical to the integrity and safety of industrial firms, including petroleum refinery, pipeline, power generation, pulp & paper, mining, pharmaceutical, aerospace and automotive industries.
Network Security & Infrastructure: Design, configure, and maintain secure network infrastructures, including LAN, WAN, VPNs, and firewalls (Cisco, Palo Alto, Fortinet).. Threat & Vulnerability Management: Conduct vulnerability assessments, penetration testing, and risk analysis to enhance security posture.. Security Technologies: Manage firewalls, IDS/IPS, endpoint security, encryption technologies, and SIEM solutions.. Strong knowledge of firewalls (Cisco, Palo Alto, Fortinet), SIEM, IDS/IPS, VPNs, and other security technologies.. CCNP Security, CISSP, CISM, CEH, or other relevant certifications preferred.
The ideal candidate is a collaborative self-starter with technical expertise, knowledge of security attack methods (e.g., MITRE), and the ability to inspire and develop talent.. Experience collaborating across functions such as legal, HR, communications, and IT. Knowledge of threat hunting, risk mitigation, and security frameworks (e.g., NIST CSF, MITRE). Understanding of malware analysis, attack types, vulnerabilities, and insider threat concepts. Reports to Guardian’s Chief Information Security Officer.
Reports To: Manager of Security & Technology. We’re seeking a Cybersecurity Incident Response Engineer to join our team supporting Managed Service Provider (MSP) clients.. Configure and manage cybersecurity tools including firewalls, IDS/IPS, EDR, MDR. Hands-on experience with tools such as SIEM, EDR, MDR. Certifications such as CompTIA Security+, CEH, GCIH, or similar.
The Chief Information Security Officer (CISO) is a senior executive and strategic business partner responsible for establishing and leading a comprehensive, enterprise-wide information security and risk management program.. Enterprise Risk & Compliance Management: Lead a holistic digital risk management program, encompassing technology, data, and third-party/supply chain risks.. Ensure and demonstrate compliance with applicable legal, statutory, and regulatory requirements (e.g., GDPR, CCPA, HIPAA, SOX, PCI DSS) in collaboration with legal and compliance teams.. Cloud Security: Architect and manage a comprehensive security program for multi-cloud and hybrid environments, focusing on secure configuration and cloud-native protection mechanisms.. Extensive, hands-on experience with modern security operations, cyber threat intelligence, vulnerability management, and proven leadership experience in high-stakes crisis and incident response scenarios.
Information System Security Officer - Cleared ISSO (TS SCI eligible). LTS is seeking an experienced Information System Security Officer (ISSO) to support the coordination with business and technology teams, ascertaining system requirements, such as program functions, output requirements, input data acquisition, and system techniques and controls.. Develop and implement business continuity and disaster recovery plans for information systems.. Educate and train employees on best practices for information security, data privacy, and incident response.. Must possess one of the following DoD level III Security professional certifications (CISA, GIAC Certified Incident Handler (GCIH), GIAC Information Security Expert (GSE), GIAC Security Leadership (GLSC), Security Certified Network Architect (SCNA), Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP), and/or Certified Information Systems Auditor (CISA).
The successful candidate will serve as both a frontline security analyst and a technical security engineer, ensuring comprehensive protection of our organization's digital assets.. Detection & Response Security Information and Event Management (SIEM) platforms (Splunk, QRadar, Sentinel, etc.). Security Certifications : At least one information security certification from recognized organizations such as: ISACA (CISA, CISM, CRISC). OpenText (EnCase certifications). CompTIA (Security , CySA , CASP )
The Cloud Security Architect will play a critical role in ensuring the security of our clients' digital infrastructure, applications, and data assets.. As a member of the information security team, the Cloud Security Architect will play a key leadership role in the InfoSec function of security architecture and provide guidance to other enterprise teams for all cloud security-related matters in Azure.. Azure focused Infrastructure as Code (IaC) proficiency with experience deploying secure infrastructure (Bicep/Terraform/ARM). Cloud Security - Information Security Engineer- Remote Solutions Architect, NTT Global Alliance Principal Infrastructure Architect - Direct-Hire/FTE - Remote (Washington DC Metro) Washington, DC $150,000 - $170,000 2 weeks ago. Cyber Defense - Junior Security Operations Center/Incident Response Analyst (REMOTE) We’re unlocking community knowledge in a new way.
How to Become a Network Security Engineer in Australia: careers in IT Definition of a Network Security Engineer The role of a Network Security Engineer is pivotal in today’s digital landscape, where safeguarding sensitive information is paramount.. Overall, a career as a Network Security Engineer is both challenging and rewarding.. A career as a Network Security Engineer requires a robust set of skills that blend technical expertise with analytical thinking.. Moreover, effective communication skills are vital for a Network Security Engineer, as they must collaborate with various stakeholders, including IT teams and management, to ensure that security policies are understood and adhered to.. Career Snapshot for a Network Security Engineer The role of a Network Security Engineer is pivotal in ensuring the smooth operation of technology systems across various industries.
Digital Forensics, Malware Analysis, and Reverse Engineering. AI-Driven Threat Intelligence & Defense: Leveraging machine learning and large language models (LLMs) for predictive threat intelligence, autonomous network defense, and next-generation incident response.. Autonomous Security Operations: Technologies that automate and accelerate security functions, including AI-based vulnerability assessment, autonomous penetration testing, and AI-powered digital forensics and malware analysis.. Programming in Python, JavaScript, Golang, or Rust. Non-profit Organizations, International Affairs, and Defense and Space Manufacturing
The ideal candidate will have extensive experience designing, implementing, and managing enterprise security solutions, securing cloud and on-premises environments, and driving security best practices across the organization.. Cloud Security: Secure Microsoft Azure environments, ensuring compliance with industry standards and frameworks such as NIST, CIS, and Zero Trust Architecture.. Identity & Access Management (IAM): Implement and enforce security policies for Privileged Access Management (PAM), Conditional Access, and Multi-Factor Authentication (MFA).. Strong expertise in Microsoft Security solutions, including: - Microsoft Defender (for Endpoint, Identity, Cloud, and Office 365) - Microsoft Sentinel (SIEM/SOAR) - Entra ID (Azure AD), Conditional Access, and Identity Protection - Microsoft Purview and Compliance solutions. Experience in incident response, threat hunting, and digital forensics.
This position is responsible for administering and optimizing key security platforms-including SIEM, EDR, IAM, and vulnerability management-while supporting compliance with industry regulations and frameworks.. Security Operations & Monitoring Manage and maintain enterprise security tools, including SIEM, EDR, IAM, Vulnerability Management, CSPM, and cloud-native security solutions. Incident Response & Threat Management Contribute to the development and execution of incident response plans. Support data protection initiatives including encryption, PKI, and Data Loss Prevention (DLP). Industry certifications such as CISSP, CISM, CISA, or similar are preferred