Your expertise in digital forensics, threat hunting, malware analysis, and incident response tools will be essential in identifying and mitigating potential security threats. Perform digital forensics and malware analysis to understand attack vectors and methodologies. Utilize threat intelligence platforms to enhance our detection and response capabilities. Familiarity with threat intelligence platforms and their integration into incident response processes. Relevant security certifications (e.g., GCFA, GCIA, GCIH, CISSP) are a plus.
We’re seeking a future team member for the role of Senior Blockchain Security Engineer to join our Information Security Division – ISD Digital Asset Security. 5+ years in financial enterprise security with 3+ years on digital asset and blockchain technology required. Blockchain, cryptocurrency forensics, cloud security, secure deployment pipelines, and infrastructure as code security. Systems Security (security architecture, application security, database security, network security, mobile security, cloud security, data center security, defensive development, SSDLC (secure software development life cycle), static code analysis, dynamic code analysis, system analysis). Enterprise Security (compliance, security strategy and tactics, physical security, security awareness training, threat and risk assessment, forensics, proactive and reactive corporate security programs).
We are seeking a skilled and innovative Machine Learning Engineer to join our cybersecurity team. Risk Modeling and Explainability: Develop probabilistic models and statistical frameworks to assess security risk in cloud environments, integrating data from network logs, user behaviors, and threat intelligence to provide actionable risk assessments. Knowledge of cloud computing platforms (AWS, Azure, GCP) and familiarity with securing and monitoring cloud infrastructure. Experience with big data processing platforms and frameworks (Snowflake, Spark) is a plus. Domain Knowledge: Solid understanding of cybersecurity principles, including network security, malware analysis, incident response, and risk assessment in cloud environments.
RSM US LLP, the First Choice Advisor to the Middle Market seeks a Security & Privacy Risk Consulting (SPRC) Principal (owner) to join our Risk Consulting Services, SPRC Practice.. Additionally, this individual must possess a variety of skill sets such as pursuing, performing, and overseeing cyber program transformation efforts that include: alignment to governance frameworks such as (HIPAA, SSF, NIST, ISO, FISMA, etc.. implementation of cyber solutions/products/programs such as threat intelligence/management, data protection/data loss prevention, cloud security, edge protection, endpoint detection and response, identity and access management, zero trust, vulnerability management, Business and Clinical Continuity/Disaster Recovery, Third Party risk management. Deep knowledge and understanding of healthcare related cybersecurity standards (e.g., HIPAA, PCI, MARS-E, etc), including industry and federal guidance.. RSM will consider for employment qualified applicants with arrest or conviction records in accordance with the requirements of applicable law, including but not limited to, the California Fair Chance Act, the Los Angeles Fair Chance Initiative for Hiring Ordinance, the Los Angeles County Fair Chance Ordinance for Employers, and the San Francisco Fair Chance Ordinance.
Join us as a Principal Cloud Security Architect and discover your superpower.. We are seeking an innovative, adaptable, and results-oriented Principal Cloud Security Architect for our Cybersecurity team.. Deep understanding of cloud security concepts, including network security, data protection, identity management, and threat modeling across major cloud providers.. Strong security foundations, including experience with network security, vulnerability management, penetration testing, security operations, and application security; knowledge of encryption, secure protocols, and best-in-class solutions.. Familiarity with ICS/SCADA/OT environments and standards such as NIST, CIS benchmarks, CSA CCM, and NERC CIP.
Conduct technical assessments using standard industry tools such as Nessus, Security Hub, Prisma Cloud, and Burp Suite Pro.. Assess and analyze cyber security documentation for client information systems in accordance with FISMA, NIST RMF for Federal Civilian Agencies, RMF for DoD IT, FedRAMP, and departmental standards. A bachelor's degree in IT/Computer Science or related field or equivalent experience. Solid familiarity with general enterprise technology with focus on security and compliance such as architecture, firewall, router, load balancer, operating systems, SEIM, IDS/IPS, HIDS, malware analysis and protection, content filtering, perimeter access controls, logical access controls, identity and access management, data loss prevention, application firewalls, vulnerability scanners, security incident response, Identity Access Management (IAM). Experience with application security tools and vulnerability management, such as SAST, DAST, penetration testing, container security, open-source vulnerability management
At Aurascape, we are redefining the future of network security with cutting-edge solutions that are ground-up AI-native, Cloud-native, and leverage advanced gen AI technologies to safeguard organizations from ever-evolving cyber threats.. This role is ideal for someone with 4-8 years of experience who has deep knowledge of networking and security technologies and an enthusiasm for competitive intelligence and technical marketing.. Competitive Analysis: Conduct in-depth competitive analysis of network security products (including firewall, IPS, zero-trust architecture, cloud security, SASE) to identify strengths, weaknesses, opportunities, and threats in the marketplace.. Deep knowledge of network security architectures , including firewalls, intrusion detection/prevention systems (IDS/IPS), VPNs, SSL/TLS encryption and more.. Be part of an exciting startup opportunity at the forefront of AI-native, Cloud-native network security innovation.
Provide expertise to evaluate, assess and make recommendations to address DoD and Intelligence Community (IC) Risk Management Framework and Authority to Operate (AO) policies and requirements at multiple classification levels (up to TS/SCI) to gain approval/recertification for pilot efforts related to digital capabilities, digital infrastructure, software applications.. Support Security and Operations (DevSecOps), AI/ML algorithms and other digital services which includes identifying alternate strategies to manage risk to enterprise responsibilities while pursuing state of the art capabilities.. This will include, but not limited to, in-person meetings at Langley-Eustis for meetings with ACC/CCC.. Strong understanding of multi-factor authentication (MFA), single sign-on (SSO), role-based access control (RBAC), and privileged access management (PAM).. Experience with data encryption, data loss prevention (DLP), and data classification.
ManTech seeks a motivated, career and customer-oriented Senior Computer and Information Research Scientist to join our team in DC, Maryland, and Virginia (DMV) area. Conduct research in computer science areas relevant to NOSC operations, such as network security, intrusion detection, threat intelligence, and security automation. Experience with network security, intrusion detection/prevention, malware analysis, threat intelligence, security information and event management (SIEM ), or security automation. Knowledge of specific application domains, such as incident response, digital forensics, or threat hunting. ManTech International Corporation considers all qualified applicants for employment without regard to disability or veteran status or any other status protected under any federal, state, or local law or regulation.
Job Overview: We are seeking a highly skilled Lead Security Engineer to join our cybersecurity team with a focus on Endpoint, MDM (Mobile Device Management), IoT, and Cloud Security.. Key Responsibilities: Design, deploy, and manage MDM solutions (e.g., Google MDM, Intune, Jamf, AirWatch) to secure endpoints, including mobile phones, tablets, laptops, and desktops.. Technical Skills include proficiency in MDM platforms (Google MDM, Microsoft Intune, Jamf), knowledge of endpoint security tools (EDR, antivirus, encryption), experience with operating systems (Windows, macOS, iOS, Android), and familiarity with IAM systems (Azure AD, Okta).. Our Opportunity Natera is a leader in cfDNA testing, dedicated to oncology, women’s health, and organ health.. Natera is an Equal Opportunity Employer committed to diversity and inclusion.
Global IT Infrastructure and Cybersecurity Strategy: Develop and execute the global strategy for IT infrastructure and cybersecurity, ensuring alignment with business goals and industry best practices to support sustainable, secure, and scalable infrastructure across all regions (US, LATAM, EMEA, APAC).. Utilize Crowdstrike for endpoint protection, Cisco Global Protect VPN for secure remote access, and Palo Alto firewalls for perimeter security.. Vendor Management and Third-Party Collaborations: Manage relationships with external vendors, including 24/7 Security Operations Centers (SOC) and virtual Chief Information Security Officers (vCISO), to enhance the organization's security monitoring, threat management, and incident response capabilities.. Leadership Experience: 10+ years in IT leadership roles with proven experience in managing global IT infrastructure and cybersecurity operations, including the future strategic ownership of Global IT Support for a large, distributed organization with follow-the-sun support across multiple regions (US, EMEA, LATAM, APAC).. Technical Expertise: Deep knowledge of key technologies such as Cisco switches, Palo Alto firewalls, WAN, Crowdstrike, Cisco Global Protect VPN, and working with external 24/7 Security Operations Centers (SOC) and vCISO services to enhance cybersecurity resilience.
Note: These roles primarily support overnight shift work (5 PM – 8 AM).. We’re seeking a team of 5 skilled Tier 2 Night Shift Incident Response Engineers to join a 24x7 Cybersecurity Operations Center supporting a large client.. 3+ years of hands-on experience in cybersecurity, focusing on intrusion detection, incident response, and threat intelligence. Experience utilizing threat intelligence to anticipate and respond to risks. Genius Road, LLC is proud to be a Certified Women’s Business Enterprise, an Equal Opportunity Employer and values diversity.
Leidos is seeking an experienced Incident Response Analyst to support this highly visible cyber security operations center (SOC) for Customs Border Protection (CBP), cyber analysis, application development, and a 24x7x365 support staff.. Knowledge of TCP/UDP/IP networking, familiarity with packet analysis tools such as WireShark, and a general understanding of networking protocols similar to COMPTIA Network+. Bachelor's Degree and 4-8 years of experience be in the areas of incident detection and response, remediation malware analysis, or computer forensics.. Clearance: A Secret Clearance is required with the ability to obtain a Top Secret SCI. In addition to specific security clearance requirements all CBP SOC employees are required to successfully complete a CBP Background Investigation to support this program. One of the following certs: CCNA, CCNP, CCSP, CEH, CNDA, DCITA, ECES, ECSA, ECSP, ECSS, ENSA, GCIA, GCIH, GISF, GNFA, GPPA, GWEB, LPT, OSCP, OSEE, SEI, CCISO
This role combines deep expertise in identity and access management, security architecture, workflow automation, and cyber threat detection.. Collaborate with DevSecOps teams to embed security checks and automated scanning into CI/CD pipelines.. Hands-on experience with IAM, secure authentication protocols, and access control systems.. Knowledge of secure software development practices, encryption, and DevSecOps integration.. Proven experience with identity management and access control systems.
First Quality is a diversified family of companies manufacturing consumer products ranging from Absorbent Hygiene (adult incontinence, feminine care, and baby care), Tissue (bath and towel), and Industrial (print and packaging materials), serving institutional and retail markets throughout the world.. We are seeking an Information Security Engineer for our First Quality Enterprise working remotely from the Eastern Time Zone. This position provides leadership and in-depth expertise in all security aspects surrounding the implementation and operation of Information Technology solutions to improve the ability of the organization to protect the confidentiality, availability, and integrity of its information assets.. Lead vulnerability management program working closely with the patching team to limit the vulnerability attack surfaceBe or become the lead SME for various security tools including CASB, the Vulnerability Scanning Suite, EPP, etc to maintain and improve the functionality of our security tools.. Knowledge of IT security controls - firewalls, SIEM platforms, NAC, CASB, DLP, IPS/IDS, encryption, authentication, tokenization, XDR/EDR tools and desktop virtualization security.. , security assessment tools, vulnerability scanners, intrusion prevention systems, VMware, VDI, encryption, public key infrastructure (PKI).
Union Technologies is reindustrializing America’s defense manufacturing base with a first-of-its-kind Factories-as-a-Stockpile model, integrating advanced robotics, manufacturing, and software into sovereign factory systems at scale.. Conduct vulnerability assessments, penetration testing, and regular audits of IT systems.. Develop processes for IT resource management, backups, and disaster recovery.. Expertise in network architecture, cloud platforms (e.g., AWS, Azure, Google Cloud), and cybersecurity tools and frameworks.. Certifications such as CISSP, CISM, CEH, or equivalent are highly desirable.
As a member of the Information Security team, the Senior Cybersecurity Engineer is responsible for protecting the company from intrusions, malware, threat actors, and other forms of cyber attacks.. Supports the creation of business continuity/disaster recovery plans, to include conducting disaster recovery tests, publishing test results, and making changes necessary to address deficiencies. Conducts network monitoring and intrusion detection analysis using various computer network defense (CND) tools, such as intrusion detection/prevention systems (IDS/IPS), firewalls, host-based security system (HBSS), etc.. Supports ongoing functional and performance tuning efforts for SIEM, EDR, DLP, SEG, and Vulnerability Management solutions and platforms.. Works with threat intelligence and/or threat-hunting teams
Key focus areas include defensive security platforms, cloud security, SOC operations, threat and vulnerability management, and security engineering.. Key ResponsibilitiesLead daily operations of the Security Operations Center (SOC), including incident response and threat management, ensuring rapid detection and resolution of cybersecurity incidents.. Oversee daily operations of core cybersecurity tools/platforms including but not limited to, SIEM, EDR, IDS/IPS, email security and cloud security solutions, and vulnerability scanners.. certifications such as CISSP, GCIH, GIAC, CISA, CEH, or equivalent are preferred.. Strong technical expertise in cybersecurity tools, platforms and processes: SIEM, EDR, threat intelligence, vulnerability assessment, cloud platforms, and attack methodologies (IOCs, TTPs).
Strong knowledge of cloud security principles and experience with cloud platforms like AWS, AZURE, or Google Cloud. Proficiency in network security principles, protocols, and technologies (firewalls, IDS/IPS, VPNs,etc.). Experience with query languages •Familiarity with MITRE ATT&CK Framework, adversary TTPs,and threat intelligence. Security Certifications to include CISA, SSCP, CEH, CAP, GCIH, ECIH, CASP+, SEC+. Experience with implementing automation mechanisms within a SIEM, CSP, or an enterprise environment
Bachelor's degree in Computer Science, Information Technology, or a related field.. Extensive knowledge of security technologies, including firewalls, intrusion detection and prevention systems, and encryption.. Professional certifications, such as CISSP, CISM, or SANS GIAC, are highly desirable.. Intermediate knowledge of cloud security products as part of a cloud strategy Advanced understanding Cloud best practices on leveraging the capabilities to secure by design Application Security with Application Development background is highly encouraged Awareness of ZeroTrust methodologies