Conduct IT application testing, cybersecurity tool and systems analysis, system and network administration, and systems engineering support for the sustainment of information technology systems (mobile application testing, penetration testing, application, security, and hardware testing). Conduct cloud penetration testing engagements to assess specific workloads (i.e., AWS, GCP, Azure, containers, or other PaaS and SaaS instances) for vulnerabilities and subsequently attempt to exploit identified weaknesses after receiving permission from client stakeholders. Experience with penetration testing, administering, and troubleshooting major flavors of Linux, Windows, and major cloud IaaS, PaaS, and SaaS providers (i.e., AWS, GCP, and Azure). Experience with security assessment tools, including Nessus, OpenVAS, MobSF. Metasploit, Burp Suite Pro, Cobalt Strike, Bloodhound, and Empire. Knowledge of network vulnerability assessments, web and cloud application security testing, network penetration testing, red teaming, security operations, or 'hunt'
Watershed Security is looking for an Experienced Information System Security Engineer (ISSE) to join our growing team in Washington, DC. Be part of a multifaceted team providing RMF ISSE Support to the Coast Guard.. The successful candidate will be responsible for engineering Systems and achieving and maintaining ATOs. Multiple Positions are available at levels one, two and three (see below for more information). May be required to perform or assist in one or more of the following areas: Risk and Vulnerability Assessments; Cyber Hunting activities; conducting scanning; assessment of system security for compliance of applications; security of computer network hardware; operating system utility/support software; disaster recovery; incident response and digital forensics; vulnerability threat management; cloud security; contingency planning; social engineering; and the development of security procedures.. Level 2: CASP+ or CCSP or Cloud+ or CSSLP. Demonstrated experience in Information Security (INFOSEC); computer security; cryptography; network security; assessment and authorization; incident response investigations; risk analysis; threat and vulnerability scanning, analysis, and management.
Application Security Consultant will act as in internal consultant to development teams and will perform daily, hands-on, software security assessment and remediation activities as part of the application security program. Perform software security activities within the defined application security program including; application vulnerability testing and analysis, code review, use of common tools, written and verbal articulation of remediation recommendations and follow up. Advise development teams on application security controls, methods, and remediations. Secure coding practices, and application vulnerability assessment and penetration testing methodologies.. Understanding of web architecture and protocols (HTTP(S), TCP/IP, ARP, SMTP, DNS, etc).
This position offers a unique blend of Security Operations Center (SOC) duties, threat management, and proactive monitoring, placing you at the forefront of our cybersecurity defenses.. Hands-on experience with vulnerability assessments, penetration testing, and endpoint / network security.. Hubbell Unified Business Services (HUBS) provides corporate shared services to support all businesses across the enterprise.. Functional areas include Engineering, Sales, Operations, Marketing, Finance, Legal, IT, Human Resources, Payroll, Environmental Health & Safety, and Compliance.. About the company Hubbell Incorporated is an American company that designs, manufactures and sells electrical and electronic products for non-residential and residential construction, industrial and utility applications.
Whether you’re working in our four global Home Offices, Distribution Centers or Retail Stores—TJ Maxx, Marshalls, Homegoods, Homesense, Sierra, Winners, and TK Maxx, you’ll find abundant opportunities to learn, thrive, and make an impact.. As Subject Matter Expert (SME) of designated tools supporting Network Security like Firewalls, NAC & Cloud Security. Strong understanding of cybersecurity best practice, risk analysis & assessment, and compliance standards (i.e. NIST CSF, CIS). Major OS (Windows, Linux, & MacOS), scripting, and enterprise change management experience are a plus.. Benefits include Associate discount; 401(k) match; medical/dental/vision; HSA; health care FSA; life insurance; short/long-term disability; paid holidays/vacation /sick/bereavement/parental leave; EAP; incentive programs for management; auto/home insurance discounts; tuition reimbursement; scholarship program; adoption/surrogacy assistance; smoking cessation; child care/cell phone discounts; pet/legal insurance; credit union; referral bonuses.
WSCJTC offers outstanding benefits, choice of state retirement programs including a defined benefit pension plan, advancement opportunities, and flexible/compressed work schedules.. Establish a multi-layered security architecture, integrating firewalls, IDS/IPS, encryption, and access control mechanisms.. Leverage a centralized Identity and Access Management (IAM) system that supports SSO and MFA.. A professional security certification, such as CISSP, CISM, CISA, or Security. Demonstrated experience in configuring, conducting, and analyzing vulnerability scans, or computer forensics.
Confirm compliance and feasibility for monitoring, assessing, and fine-tuning the business continuity and disaster recovery program. Work with System and Network Support team to perform network penetration tests, application vulnerability assessment scans, and risk assessment reviews. Setup and creation of automated backups to ensure that the processes are within specifications laid out by the disaster recovery plan. Coordinates with management, legal counsel, law enforcement, and other necessary agencies to manage any such incidents.. Leads collaborative effort with management and the IT Support team to develop and implement a business continuity and disaster recovery plan
BayFirst Solutions, a subsidiary of Versar, Inc., is seeking a Security Architect (SIEM & SOAR) to support the DHS’ Homeland Security Enterprise Network (HSEN) within the Office of the Chief Information Officer (OCIO), IT Operations, Enterprise Engineering Division (EED).. The candidate’s primary responsibility is to maintain and mature the existing DHS Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR) solutions, and lead the analysis, integration, and testing of this and new security tools and technologies.. Research the latest capabilities of SIEM, SOAR platforms and IT technologies (e.g. firewalls, operating systems, networks, storage, virtualization, AD, IPS, Proxies etc.). Design and implement threat detection, automate incident response processes, integration of various security tools with SIEM and SOAR platforms via APIs.. Maintain SIEM applications to collect and aggregate IDS and IPS data from network sensors, raw data from collection agents, firewalls, proxy servers, DLP, antivirus, vulnerability scanner elements, and other security‐relevant devices.
This role serves as both Data Protection Officer (DPO) for Consumer Privacy and HIPAA Security Officer, ensuring that privacy, compliance, and security are embedded across all facets of our business.. Establish and enforce cybersecurity governance frameworks, ensuring adherence to HIPAA, PCI DSS, GDPR, and evolving regulatory standards.. Oversee network security, endpoint protection, identity and access management (IAM), and cloud security initiatives.. Certifications as an Information Security Professional (CISM, CISA, CISSP, SANS, or equivalent).. Disaster Recovery planning, CSIRT, regulatory compliance (PCI, HIPAA), ITIL.
phia is seeking a dedicated Threat Intelligence Analyst to perform all-source cyber intelligence analysis, assessment, and reporting in support of U.S. Federal government organizations.. Conduct trend analysis to support mitigation strategies, crisis response, and operational decision-making.. 5+ years of experience in open-source intelligence collection, analysis, and reporting.. Demonstrated experience conducting impactful cyber and all-source threat intelligence analysis.. phia, LLC is a Northern Virginia-based, small business established in 2011 with a focus on Cyber Intelligence, Cyber Security/Defense, Intrusion Analysis & Incident Response, Cyber Architecture & Capability Analysis, Cyber Policy & Strategy, and Information Assurance/Security.
At CoinsPaid, we are passionate about crypto, fintech and are putting great effort into building a team that will get the world ready for every-day crypto use.. Manage user identities, roles, and permissions in IAM systems (e.g., Okta, AWS IAM, etc.). Experience with IAM tools (Okta, Azure AD, AWS IAM, CyberArk, SailPoint, ForgeRock, etc.). World Business Annual Awards 2024 - Leading Blockchain & Cryptocurrency Firm in Europe 2024;. World Business Annual Awards 2024 - Best Cryptocurrency Payment Solution Provider Europe 2024;
As the Senior Network Engineer in Houston, Texas, you will be a hands-on technical leader responsible for creating, delivering, and managing enterprise IT and OT networking solutions for the North America Region.. A minimum of five (5) years’ experience in designing and supporting large-scale enterprise and ICS/SCADA network. One or more industry certifications in different technologies disciplines (such as, Azure, AWS, Cisco, Fortinet, Security) is beneficial to the success of the role. Expert in Enterprise Core Networking technologies (LAN, WAN, VPN, SDWAN, Firewall, Network Load balancing, 4/5G Wireless, and WIFI. Expert in the operations, IT Security, disaster recovery, monitor, optimization, and troubleshooting of Microsoft Windows Server environment in an enterprise-scale network
Koniag Data Solutions, LLC, a Koniag Government Services company, is seeking a Senior Configuration Change Management Services ( Cyber Network Security Engineer, Lead) to support KDS and our government customer at Joint Base San Antonio, TX. This position requires the candidate to be able to obtain a Public Trust.. Provides senior-level leadership and strategic direction for the Defense Health Agency's configuration and change management services, with a primary focus on maintaining and enhancing cybersecurity across its global network of military hospitals, medical clinics, and dental clinics.. Directs the development and continuous improvement of DHA's configuration and change management strategy, ensuring alignment with DoD cybersecurity requirements, Risk Management Framework (RMF), NIST guidelines, and various DoD strategies including Zero Trust, ICAM, and Digital Modernization.. Leads initiatives to integrate configuration and change management processes with broader cybersecurity operations, including vulnerability management, threat intelligence, and incident response.. Configuration/Change Enablement Specialist Multiple Positions at San Antonio Tech firm Senior Configuration/Change Enablement Specia Configuration and CDRL Data Manager - TX - On Site Tier 3 Level EM Development and Testing Support Services San Antonio, Texas Metropolitan Area 2 weeks ago
With an open SaaS platform that supports easy consolidation and enrichment of any data, DataVisor's solution scales infinitely and enables organizations to act on fast-evolving fraud and money laundering activities in real time.. Engage with internal business teams on projects to assess for security risk and help deliver secure solutions via threat modeling, code review, penetration testing, and enforcing secure development lifecycle. Actively participate in Incident Management, Change Management, Security Policy Management and Security Incident Response. Perform SAST, DAST, Internal Penetration testing on the Applications and the Infrastructure. Understanding of key security concepts such as cryptography, authentication, authorization, security protocols, or security vulnerabilities as applied to web application security and Cloud-based services
This role is hybrid, requiring 3 days a week in one of our development hubs: Fort Mill SC (Charlotte NC area), San Diego CA, Austin TX, or New York City metro areas. Expertise in network security, zero-trust networking, vulnerability management, IAM, TLS, and encryption generally.. CISSP, CISM, CEH preferred.. Today, LPL is a leader in the markets we serve, serving more than 23,000 financial advisors, including advisors at approximately 1,000 institutions and at approximately 580 registered investment advisor ("RIA") firms nationwide.. As the nation’s leading independent broker-dealer, we offer an integrated platform of cutting-edge technology, brokerage, and investment advisor services.
Join to apply for the Cyber Threat Intelligence Analyst II role at Early Warning. The Cyber Security Threat Intelligence Analyst II is part of a high-performance team, responsible for monitoring and analyzing internal and external threats facing the company networks and correlating those threats into actionable items for the organization.. Intermediate understanding of Adversarial Tactics, Techniques and Common Knowledge framework (MITRE) and other threat modeling frameworks. Maven Family Planning – provides support through your Parenting journey including egg freezing, fertility, adoption, surrogacy, pregnancy, postpartum, early pediatrics, and returning to work.. Sign in to set job alerts for “Threat Intelligence Analyst” roles.
Nightwing provides technically advanced full-spectrum cyber, data operations, systems integration and intelligence mission support services to meet our customers’ most demanding challenges.. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission enablement, and software modernization.. The Cyber Security Project Engineer (CSE) supports the LSA to identify, design, and deploy security controls and subsystems to support the on-premises secure multi tenant infrastructure environment (CUSTOMER).. Advises and assists with the Lifecycle Assessment and Authorization (A&A) process and development of Systems Security Plan (SSP). One or more of the following: CompTIA Security+, CISSP, CISA, CISM, CCSP, SSCP, GIAC Security Essentials
Our unified communications suite (UCaaS) uniquely aligns with the operating needs of MSPs and enables their customers to experience seamless communication and collaboration regardless of physical location.. As a Senior Site Reliability Engineer, you will help ensure the reliable, scalable, secure, performant, and cost-effective operation of Cytracom products and features.. Automation: Use IaC tools like Terraform or Ansible to automate provisioning and configuration management for consistent environments.. Implement firewalling, intrusion detection systems (IDS), vulnerability management processes, and proper encryption.. Incident Response: Participate in on-call rotations to triage and resolve customer-facing issues promptly.
1444069 - Account Executive Security Sales-US Commercial WestThe application window is expected to close on: July 25, 2025Job posting may be removed earlier if the position is filled or if a sufficient number of applications are received.. Your ImpactIn this role, you will be a highly motivated, entrepreneurial-minded sales professional with a keen curiosity about cybersecurity.. Drive double-digit revenue growth through identifying new projects, crafting opportunities, and securing business attachments.. Apply solution-selling methodologies to boost corporate revenue growth, with a consistent record of closing both tactical and strategic opportunities.. Experienced in selling network security solutions (e.g., Intrusion Detection, Firewall, VPN) or SaaS security offerings.