Continuously monitor physical security systems, including surveillance cameras and access control systems, to detect and assess potential security threats.. BA/BS degree in Information Technology, Cybersecurity, Security Management, Criminal Justice, or related field, or equivalent work experience. Experience with advanced physical security systems and threat intelligence tools i.e. Everbridge, Ontic and Genetec. Physical Security Professional (PSP) or Physical Security Certification (PSC), Certified Protection Professional (CPP) or similar.. Experience working in a General Security Operations Center (GSOC)
Design, deploy, and support telecom systems including PBX, VoIP, SIP, and mobile communication networks.. Implement network security protocols and ensure regulatory compliance (e.g., FCC, GDPR).. Strong knowledge of VoIP systems (e.g., Cisco Call Manager, Asterisk, Avaya).. Familiarity with networking protocols and technologies: TCP/IP, SIP, RTP, QoS, MPLS.. Experience with cloud telephony platforms (e.g., Twilio, RingCentral, Zoom Phone).
DoD Public Key Infrastructure (PKI) Service. Network Security Incident Response and Reporting. Rack Elevation Creation and Documentation. Certified Information Security System Professional (CISSP) or Certified Information Security Manager or Cyber Security Leadership Certification (GSLC). Must have experience overseeing and managing unified communications.
Minimum of a Top Secret Clearance, with ability to obtain TS/SCI.. As a Cyber Threat Intelligence Analyst, you will be responsible for providing analysis on relevant threats to the customer environment in support of the overall defensive effort.. You will be a key component in providing additional tactical context surrounding adversarial TTPs and support to the Network Security Monitoring and Incident Response teams.. Ability to develop specific expertise, discerns patterns of complex threat actor behavior, and communicates a comprehension of current and developing Cyber threats. Experience with analytic tool, including Augury, Splunk, Elastic, TAC, Palantir, Shodan, Analyst Notebook or other threat intelligence platform preferred
Implement and oversee cybersecurity protocols , including threat monitoring, incident response, and workforce security training. Manage cross-domain security solutions and compliance with RMF and COMSEC requirements.. Office 365 & GCC High – Hands-on management of Microsoft Office 365, GCC High environments , and related tools.. Security Focus – Familiarity with network security, RMF, cross-domain solutions, and COMSEC. Our consultants bring expertise in the Department of Defense, Intelligence Community, and federal entities , providing solutions in all-source analysis, mission support services, and IT infrastructure.
Major League Soccer (MLS) is seeking an experienced Chief Information Security Officer (CISO) to lead data privacy, compliance, and cybersecurity initiatives.. The ideal candidate has deep expertise in data governance, access controls, privacy impact assessments (PIAs), and third-party risk management.. Secure engineering processes and the software development lifecycle by implementing security measures such as code review, vulnerability testing, security education, and establishing DevSecOps practices.. Oversee third-party Information Security risk management, ensuring vendor compliance with MLS's security and privacy requirements.. Technical expertise in encryption, identity & access management (IAM), secure software development (DevSecOps), and cloud security.
diploma/GED required Seven (7) years or more expert level experience with SD-WAN, network switching (capacity planning & VLANs), network routing (OSPF. EIGRP, BGP), WAN technologies (MPLS, VPLS, VPN, QoS) and network security).. required Seven (7) years or more expert level experience with logical design models (L2/L3, VPC, VDC, Datacenter Zones, Spanning tree, VFR, VTP, VLANs, physical cabling).. required Three (3) years or more experience with architectural and network support of Cloud Network Infrastructures and Managed Services on Azure and AWS. required Three (3) years or more experience with deep-inspection firewalls, intrusion and threat protection platforms, RADIUS, DNS, NTP, monitoring, and logging.. advanced required CCNP, CCNA AWS or Azure certification Travel: 1-10% Safety Sensitive Onsite visits to certain Ryder and customer accounts require the adherence of the site’s employee safety standards and protocols.. This may include some of the following: (Hard hat, steel toe shoe, eye protection DOT Regulated: No Applicants from California, Colorado, Hawaii, New Jersey, New York City, and Washington: Salary is determined based on internal equity; internal salary ranges; market data/ranges; applicant’s skills; prior relevant experience; certain degrees or certifications, etc.
Focus: Olin Corporation is hiring an Information Security Systems Specialist to be located at the Winchester Lake City Army Ammunition Plant in Independence, MO. This role represents the Information Security department within project teams across the Modernization & Innovation organization to assess the Cybersecurity needs of new IT and OT systems which include servers, desktops, switches, SCADA, PLC, NAE, etc.. Minimum of 1 certification from the following: CompTIA Security+Systems Security Certified Practitioner (SSCP)Certified Information Systems Security Professional (CISSP)Certified Information Systems Manager (CISM)Certified Ethical Hacking (CEH)GIAC Information Security Professional (GISP). Knowledge of information security concepts and technologies such as networking, network segmentation, vulnerability scanners, firewalls, IPS\IDS, network analysis tools, data loss prevention, security event management, encryption technologies, proxies, cloud services, mobile devices, etc.. This position requires successful vetting as an Employee Possessor in accordance with Department of Justice and the Bureau of Alcohol, Tobacco, Firearms and Explosives.. The US Government does not allow non-US citizens on-site at the Lake City Army Ammunition Plant.
Oversee all security incident investigation activities including root cause analysis, reverse engineering, digital forensics, and after-action reporting.. Manage the threat intelligence processes to include proactive monitoring of external threat intel feeds and internal security incident and event monitoring solutions to proactively identify and protect the organization against known and emerging threats.. Deploy, maintain, and monitor the enterprise technology solutions that support this function including vulnerability scanners, SIEM solutions, Anti-virus, EDR, endpoint threat management, and forensics tools.. Knowledge of digital forensics to investigate security breaches and gather evidence.. Additional Information: Location: 633 Third Avenue, NYC Reporting to The Director, Cybersecurity Operations Schedule: Fully Remote Pay Range: $162,000.00-$267,200.00 Helpful Links : #LI-POST #LI-REMOTE Closing MSK is an equal opportunity and affirmative action employer committed to diversity and inclusion in all aspects of recruiting and employment.
Northwestern Mutual is looking for enthusiastic technologists who want to grow their career in DevSecOps – Data Security.. We need an experienced DevSecOps engineer who has a strong background in database systems across both on-premise and cloud technologies.. Your expertise in data security, DevSecOps practices, and cloud technologies will be instrumental in safeguarding our organization's sensitive information and ensuring compliance with industry standards and regulation.. Understanding of a wide-range of cybersecurity capabilities including data security, security engineering, identify & access management, incident response, logging & monitoring, and penetration testing. Relevant certifications from GIAC, ISC(2) and other recognized cybersecurity industry organizations
Have 3 years of experience with identity and access management.. Have 2 years of experience in vulnerability management within a Salesforce application environment.. Have 2 years of experience in vulnerability management using multiple vulnerability scan tools for both Cloud and On-Prem scenarios.. Have experience with managing requirements and deployment pipeline Azure DevOps.. Possess current Salesforce Certifications - Technical Architect, Application Architect, System Architect, B2B Solution Architect, B2C Solution Architect.
Translate networking principles into crypto equipment configurations for secure communications.. Support VPNs, firewalls, IDS/IPS, and secure enclave architectures.. Strong knowledge of TCP/IP, LAN/WAN, Cisco/Juniper networking, and security protocols.. Familiarity with DISA STIGs, RMF, eMASS, and ACAS.. Certifications preferred: CCNP, Security+, CISSP, or CEH.
These projects and activities span across Identity and Access Management, Governance Risk and Compliance, Security Architecture, Maritime Safety, Infrastructure Application and Data Security, and Threat Management.. Deep understanding and familiarity with core concepts of network security, security architecture, security operation, vulnerability management, cloud security, application security, security awareness program and threat intelligence.. Experience with security technologies and tools, including SIEM, IDS/IPS, endpoint protection, encryption, access control, firewalls, Vulnerability Management, etc.. Our portfolio of leading cruise brands includes Carnival Cruise Line, Holland America Line, Princess Cruises and Seabourn in North America; P&O Cruises, and Cunard Line in the United Kingdom; AIDA in Germany; Costa Cruises in Southern Europe; and P&O Cruises in Australia.. Carnival Corporation & plc and Carnival Cruise Line is an equal employment opportunity/affirmative action employer.
Oversight and maintenance of the IAM systems disaster recovery and business continuity plan, network security, system and software architecture and design to ensure that information is secured during all lifecycle phases.. Experience with tools such as Saviynt, SailPoint, and other IAM tools.. Practical knowledge of security technologies and business solutions specifically Identity and Access Management, and cloud security.. Experience with IAM solutions and implementation (Saviynt, SailPoint, etc.). For Union and Prevailing Wage roles compensation and benefits may vary from the listed information above due to Collective Bargaining Agreements and/or local governing authority.
Help support the identity and access governance team with IAM program management assistance and privileged access management, roles and rules management, SOD management and other IAM compliance related activities.. - Saviynt, SailPoint IIQ or IDN, Oracle Identity Governance, One Identity, or other user identity lifecycle management solution products or role-based access control solutions;. - Azure AD, ForgeRock, Ping Identity, OKTA, or other single sign-on, multi-factor and federation solutions;. Must have 2 years of experience in defining or re-engineering IAM related processes, including incident management, change management, and configuration management.. Must be eligible to obtain a certification in CISSP, CISM, CISA, CIPT, CIPM, CRISC or other relevant certification within one year of hire.
Install, configure, and maintain MySQL database instances (on-premises and cloud-based).. Monitor database performance and optimize queries, indexing, and schema design.. Implement backup, restore, and disaster recovery procedures.. Implement security best practices, including access control, encryption, and compliance (GDPR, PCI-DSS).. Automate database administration tasks using scripts (Shell, Python, SQL).
The Network Engineer III is responsible for implementing, updating and maintaining physical and logical networks and network connectivity, electronics (switches, routers, Wi-Fi access points) and network security (firewall protection), and for monitoring and managing network performance.. Bachelor’s Degree and 5 plus years’ experience supporting Ethernet-based LAN switches and router hardware/software in a medium sized network environment.. Multiple entry or comparable network certifications (e.g. CCENT, CCT, CCNA).. Knowledge of specialized network hardware such as F5 load balancers, Palo Alto firewalls, DNS/DHCP servers, and VPN appliances.. Knowledge of advanced routing protocols such as OSPF, MPLS, and Multiprotocol BGP.
This position is based at the Loews Hotels & Co Business Services Center in Franklin, TN.. Located in major city centers and resort destinations from coast to coast, the Loews portfolio features one-of-a-kind properties that go beyond Four Diamond standards and embrace their “uniquely local” community to curate exciting, approachable and local travel experiences for guests.. Enhance and maintain endpoint security platforms and processes including Anti-Virus, Anti Malware, Encryption, System Hardening, EDR, MDM, Web Content Management, DNS Security, Identity Solutions SIEM and Patch Management.. Mobile device management, Cloud, security, and investigations. Knowledge of Security Technologies from Ivanti, Mobile Iron, Sentinel One, LogRhythm, Sophos, Cisco Umbrella and CyberArk
Selectek has a contract-to-hire opportunity in Greenwood Village, CO for a skilled CAD Designer to join our team and provide design documentation for commercial and hospitality projects.. The successful candidate will collaborate with designers and engineers across various disciplines, including architecture, MEP, and interior design.. - Assist Project Managers with Programming efforts, creation of SDs, DDs, CDs, and Punch List assistance.. - Gain proficiency in understanding our company’s products, services, and processes across various business silos such as Access Control & Surveillance, Sound Masking, Structured Cabling, and VoIP Wired and Wireless Networking Solutions.. - Familiarity with electrical systems, Audio/Visual systems, structured cabling, networks, CCTV, access control, and intrusion detection.
The Systems Security Administration and Engineering group is seeking asenior security specialist to assist a newly established security team.. Theposition requires a high degree of technical proficiency and familiaritywith software and network security issues as well as systems administrationexperience.. The environment consists of a large number ofservers running SunOS, AIX, RedHat Linux, and SUSE Linux.. The role requiresextensive experience securing multiple UNIX servers.. REQUIREMENTS: UNIX system internals, network programming principles, host-based securityprocedures; C programming, Korn and Perl scripting; Security-consciouscoding practices and understanding of how malicious code can take advantageof security vulnerabilities; Networking protocols (TCP/IP); Familiaritywith service protocols (HTTP, HTTPS, SSL, SSH, SMTP, POP3, DNS, FTP);Encryption and authentication fundamentals as well as a solid understandingof cryptographic standards.