Conduct IT application testing, cybersecurity tool and systems analysis, system and network administration, and systems engineering support for the sustainment of information technology systems (mobile application testing, penetration testing, application, security, and hardware testing). Conduct cloud penetration testing engagements to assess specific workloads (i.e., AWS, GCP, Azure, containers, or other PaaS and SaaS instances) for vulnerabilities and subsequently attempt to exploit identified weaknesses after receiving permission from client stakeholders. Experience with penetration testing, administering, and troubleshooting major flavors of Linux, Windows, and major cloud IaaS, PaaS, and SaaS providers (i.e., AWS, GCP, and Azure). Experience with security assessment tools, including Nessus, OpenVAS, MobSF. Metasploit, Burp Suite Pro, Cobalt Strike, Bloodhound, and Empire. Knowledge of network vulnerability assessments, web and cloud application security testing, network penetration testing, red teaming, security operations, or 'hunt'
Watershed Security is looking for an Experienced Information System Security Engineer (ISSE) to join our growing team in Washington, DC. Be part of a multifaceted team providing RMF ISSE Support to the Coast Guard.. The successful candidate will be responsible for engineering Systems and achieving and maintaining ATOs. Multiple Positions are available at levels one, two and three (see below for more information). May be required to perform or assist in one or more of the following areas: Risk and Vulnerability Assessments; Cyber Hunting activities; conducting scanning; assessment of system security for compliance of applications; security of computer network hardware; operating system utility/support software; disaster recovery; incident response and digital forensics; vulnerability threat management; cloud security; contingency planning; social engineering; and the development of security procedures.. Level 2: CASP+ or CCSP or Cloud+ or CSSLP. Demonstrated experience in Information Security (INFOSEC); computer security; cryptography; network security; assessment and authorization; incident response investigations; risk analysis; threat and vulnerability scanning, analysis, and management.
Application Security Consultant will act as in internal consultant to development teams and will perform daily, hands-on, software security assessment and remediation activities as part of the application security program. Perform software security activities within the defined application security program including; application vulnerability testing and analysis, code review, use of common tools, written and verbal articulation of remediation recommendations and follow up. Advise development teams on application security controls, methods, and remediations. Secure coding practices, and application vulnerability assessment and penetration testing methodologies.. Understanding of web architecture and protocols (HTTP(S), TCP/IP, ARP, SMTP, DNS, etc).
PingWind is seeking a Cyber Incident Response Tier II Analyst to support our VA customer at Hines, IL Martinsburg, WV, or Austin, TX.. GIAC Certified Incident Handler (GCIH). Leverage Security Orchestration, Automation, and Response (SOAR) platforms to streamline and automate incident response processes, including enrichment, containment, and remediation actions. Experience performing root cause analysis of malware leveraging PowerShell, using tools such as MDE advanced hunting (KQL) and Splunk to identify infection paths, attacker behavior, and persistence mechanisms. through Sun Life Financial EAP Guidance Resources
As the Senior Network Engineer in Houston, Texas, you will be a hands-on technical leader responsible for creating, delivering, and managing enterprise IT and OT networking solutions for the North America Region.. A minimum of five (5) years’ experience in designing and supporting large-scale enterprise and ICS/SCADA network. One or more industry certifications in different technologies disciplines (such as, Azure, AWS, Cisco, Fortinet, Security) is beneficial to the success of the role. Expert in Enterprise Core Networking technologies (LAN, WAN, VPN, SDWAN, Firewall, Network Load balancing, 4/5G Wireless, and WIFI. Expert in the operations, IT Security, disaster recovery, monitor, optimization, and troubleshooting of Microsoft Windows Server environment in an enterprise-scale network
Sr. Cloud Network Security SME (Azure/GCP/OCI , Palo, Fortinet, R&S). Design, implement, and manage secure cloud network architectures in Azure & GCP, including VNet Gateways, ExpressRoute, VNet Peering, VPNs, and BGP routing.. Design, implement, and optimize BGP routing for hybrid/multi-cloud architectures, including route advertisements, ASN configurations, and path selection in Azure (ExpressRoute/VPN Gateway) and GCP (Cloud Router, HA VPN, Interconnect).. Architect and secure GCP networking components, including VPC peering, Shared VPC, Cloud Load Balancing, and Hybrid Connectivity (Partner/Private Interconnect) with BGP-based dynamic routing.. Strong understanding of cloud security controls (WAF, DDoS protection, IDS/IPS, SIEM integrations).
Join to apply for the Cyber Threat Intelligence Analyst II role at Early Warning. The Cyber Security Threat Intelligence Analyst II is part of a high-performance team, responsible for monitoring and analyzing internal and external threats facing the company networks and correlating those threats into actionable items for the organization.. Intermediate understanding of Adversarial Tactics, Techniques and Common Knowledge framework (MITRE) and other threat modeling frameworks. Maven Family Planning – provides support through your Parenting journey including egg freezing, fertility, adoption, surrogacy, pregnancy, postpartum, early pediatrics, and returning to work.. Sign in to set job alerts for “Threat Intelligence Analyst” roles.
Overview GovCIO is seeking an experienced Cyber Security Engineer to lead and enhance our organization's corporate cybersecurity program.. This position will be located in Fairfax, VA and will be an onsite or fully remote position within the United States.. Wide ranging experience identifying, analyzing, and responding to threats using SIEM, EDR, and SOAR tools (e.g., Rapid7 InsightIDR).. Vulnerability Management & Pen Testing Skilled in scanning, prioritizing, and remediating vulnerabilities.. Experience with tools like Rapid7 InsightVM (Nexpose), Nessus, and Qualys, and knowledge of CVSS scoring and exploit chains.
Koniag Data Solutions, LLC, a Koniag Government Services company, is seeking a Senior Configuration Change Management Services ( Cyber Network Security Engineer, Lead) to support KDS and our government customer at Joint Base San Antonio, TX. This position requires the candidate to be able to obtain a Public Trust.. Provides senior-level leadership and strategic direction for the Defense Health Agency's configuration and change management services, with a primary focus on maintaining and enhancing cybersecurity across its global network of military hospitals, medical clinics, and dental clinics.. Directs the development and continuous improvement of DHA's configuration and change management strategy, ensuring alignment with DoD cybersecurity requirements, Risk Management Framework (RMF), NIST guidelines, and various DoD strategies including Zero Trust, ICAM, and Digital Modernization.. Leads initiatives to integrate configuration and change management processes with broader cybersecurity operations, including vulnerability management, threat intelligence, and incident response.. Configuration/Change Enablement Specialist Multiple Positions at San Antonio Tech firm Senior Configuration/Change Enablement Specia Configuration and CDRL Data Manager - TX - On Site Tier 3 Level EM Development and Testing Support Services San Antonio, Texas Metropolitan Area 2 weeks ago
Confirm compliance and feasibility for monitoring, assessing, and fine-tuning the business continuity and disaster recovery program. Work with System and Network Support team to perform network penetration tests, application vulnerability assessment scans, and risk assessment reviews. Setup and creation of automated backups to ensure that the processes are within specifications laid out by the disaster recovery plan. Coordinates with management, legal counsel, law enforcement, and other necessary agencies to manage any such incidents.. Leads collaborative effort with management and the IT Support team to develop and implement a business continuity and disaster recovery plan
This role serves as both Data Protection Officer (DPO) for Consumer Privacy and HIPAA Security Officer, ensuring that privacy, compliance, and security are embedded across all facets of our business.. Establish and enforce cybersecurity governance frameworks, ensuring adherence to HIPAA, PCI DSS, GDPR, and evolving regulatory standards.. Oversee network security, endpoint protection, identity and access management (IAM), and cloud security initiatives.. Certifications as an Information Security Professional (CISM, CISA, CISSP, SANS, or equivalent).. Disaster Recovery planning, CSIRT, regulatory compliance (PCI, HIPAA), ITIL.
We deliver 1.1 billion gallons of high-quality drinking water per day to 8.5 million New York City residents and more than 1 million people in Upstate New York, and we collect and treat an average of 1.3 billion gallons of wastewater per day.. The IT Security Specialist role is a key responsibility needed in the ongoing technical, consultative, and administrative efforts to effectively safeguard the agency’s IT infrastructure, networks, and information system data from internal and external intrusion.. Under administrative direction of the Bureau’s Information Security Officer the IT Security Specialist will be responsible for establishing and administering information security policies and practices, governance and reporting, training and awareness, vulnerability and risk assessment, remediation, business continuity and work closely with teams across the organization to implement a consistent security strategy.. The IT Security Specialist will serve as subject matter expert on IT Security, identity, and access infrastructure; provide IT security architectural guidance; design security solutions; conduct IT risk assessments and recommend mitigation solutions, oversee multiple projects, and supervise employees.. Perform eDiscovery and digital forensics and conduct network security policy orchestration.
Whether you’re working in our four global Home Offices, Distribution Centers or Retail Stores—TJ Maxx, Marshalls, Homegoods, Homesense, Sierra, Winners, and TK Maxx, you’ll find abundant opportunities to learn, thrive, and make an impact.. As Subject Matter Expert (SME) of designated tools supporting Network Security like Firewalls, NAC & Cloud Security. Strong understanding of cybersecurity best practice, risk analysis & assessment, and compliance standards (i.e. NIST CSF, CIS). Major OS (Windows, Linux, & MacOS), scripting, and enterprise change management experience are a plus.. Benefits include Associate discount; 401(k) match; medical/dental/vision; HSA; health care FSA; life insurance; short/long-term disability; paid holidays/vacation /sick/bereavement/parental leave; EAP; incentive programs for management; auto/home insurance discounts; tuition reimbursement; scholarship program; adoption/surrogacy assistance; smoking cessation; child care/cell phone discounts; pet/legal insurance; credit union; referral bonuses.
With an open SaaS platform that supports easy consolidation and enrichment of any data, DataVisor's solution scales infinitely and enables organizations to act on fast-evolving fraud and money laundering activities in real time.. Engage with internal business teams on projects to assess for security risk and help deliver secure solutions via threat modeling, code review, penetration testing, and enforcing secure development lifecycle. Actively participate in Incident Management, Change Management, Security Policy Management and Security Incident Response. Perform SAST, DAST, Internal Penetration testing on the Applications and the Infrastructure. Understanding of key security concepts such as cryptography, authentication, authorization, security protocols, or security vulnerabilities as applied to web application security and Cloud-based services
This position offers a unique blend of Security Operations Center (SOC) duties, threat management, and proactive monitoring, placing you at the forefront of our cybersecurity defenses.. Hands-on experience with vulnerability assessments, penetration testing, and endpoint / network security.. Hubbell Unified Business Services (HUBS) provides corporate shared services to support all businesses across the enterprise.. Functional areas include Engineering, Sales, Operations, Marketing, Finance, Legal, IT, Human Resources, Payroll, Environmental Health & Safety, and Compliance.. About the company Hubbell Incorporated is an American company that designs, manufactures and sells electrical and electronic products for non-residential and residential construction, industrial and utility applications.
This role is hybrid, requiring 3 days a week in one of our development hubs: Fort Mill SC (Charlotte NC area), San Diego CA, Austin TX, or New York City metro areas. Expertise in network security, zero-trust networking, vulnerability management, IAM, TLS, and encryption generally.. CISSP, CISM, CEH preferred.. Today, LPL is a leader in the markets we serve, serving more than 23,000 financial advisors, including advisors at approximately 1,000 institutions and at approximately 580 registered investment advisor ("RIA") firms nationwide.. As the nation’s leading independent broker-dealer, we offer an integrated platform of cutting-edge technology, brokerage, and investment advisor services.
KVG is a proven mission support provider internationally recognized for innovative, creative, and cost-efficient support solutions.. We are seeking self-motivated Cyber Security Analyst who are passionate about identifying Cyber Security anomalies.. You will be responsible for keeping the company's security systems up to date and creating documentation and planning for all security-related information, including incident response and disaster recovery plans.. · Monitoring and initial response to potentially malicious or anomalous activity based on event data from a wide range of IT systems components, including SIEM, IDS/IPS, Firewalls, WAF, Web Access Security and DLP systems, and other sources.. · Performing both internal and external security audits, continuously updating the company’s incident response and disaster recovery plans.
Our unified communications suite (UCaaS) uniquely aligns with the operating needs of MSPs and enables their customers to experience seamless communication and collaboration regardless of physical location.. As a Senior Site Reliability Engineer, you will help ensure the reliable, scalable, secure, performant, and cost-effective operation of Cytracom products and features.. Automation: Use IaC tools like Terraform or Ansible to automate provisioning and configuration management for consistent environments.. Implement firewalling, intrusion detection systems (IDS), vulnerability management processes, and proper encryption.. Incident Response: Participate in on-call rotations to triage and resolve customer-facing issues promptly.
1444069 - Account Executive Security Sales-US Commercial WestThe application window is expected to close on: July 25, 2025Job posting may be removed earlier if the position is filled or if a sufficient number of applications are received.. Your ImpactIn this role, you will be a highly motivated, entrepreneurial-minded sales professional with a keen curiosity about cybersecurity.. Drive double-digit revenue growth through identifying new projects, crafting opportunities, and securing business attachments.. Apply solution-selling methodologies to boost corporate revenue growth, with a consistent record of closing both tactical and strategic opportunities.. Experienced in selling network security solutions (e.g., Intrusion Detection, Firewall, VPN) or SaaS security offerings.