Watershed Security is looking for an Experienced Information System Security Engineer (ISSE) to join our growing team in Washington, DC. Be part of a multifaceted team providing RMF ISSE Support to the Coast Guard.. The successful candidate will be responsible for engineering Systems and achieving and maintaining ATOs. Multiple Positions are available at levels one, two and three (see below for more information). May be required to perform or assist in one or more of the following areas: Risk and Vulnerability Assessments; Cyber Hunting activities; conducting scanning; assessment of system security for compliance of applications; security of computer network hardware; operating system utility/support software; disaster recovery; incident response and digital forensics; vulnerability threat management; cloud security; contingency planning; social engineering; and the development of security procedures.. Level 2: CASP+ or CCSP or Cloud+ or CSSLP. Demonstrated experience in Information Security (INFOSEC); computer security; cryptography; network security; assessment and authorization; incident response investigations; risk analysis; threat and vulnerability scanning, analysis, and management.
Implement configuration updates, including adjusting settings, updating signature definitions, and applying new policies across various network security tools as instructed.. Stay updated on emerging security threats and vulnerabilities, providing strategic security recommendations to the management team.. A minimum of 4 years experience within network security engineering focused roles in medium to large scale enterprises. Certifications such as CISSP, CISM, or similar are a plus. Hands-on VPN, ASA, IOS, IPS and Firewall (Cisco, Huawei, Palo Alto, Fortinet, Checkpoint).
With an open SaaS platform that supports easy consolidation and enrichment of any data, DataVisor's solution scales infinitely and enables organizations to act on fast-evolving fraud and money laundering activities in real time.. Engage with internal business teams on projects to assess for security risk and help deliver secure solutions via threat modeling, code review, penetration testing, and enforcing secure development lifecycle. Actively participate in Incident Management, Change Management, Security Policy Management and Security Incident Response. Perform SAST, DAST, Internal Penetration testing on the Applications and the Infrastructure. Understanding of key security concepts such as cryptography, authentication, authorization, security protocols, or security vulnerabilities as applied to web application security and Cloud-based services
Our infrastructure – including USDC, a blockchain-based dollar – helps businesses, institutions and developers harness these breakthroughs and capitalize on this major turning point in the evolution of money and technology.. Understanding of IAM protocols and concepts such as SAML, OIDC, OAuth, and PAM.. Experience with IAM technologies from Okta, Ping, Sailpoint, Savant or Microsoft.. Software development skills in languages such as Python, Golang, or similar.. Director, Field Solutions Architect - AI/Analytics Partner Solutions Architect - Cortex Cloud Solutions Architect, NTT Global Alliance Startup Lead, gt.
Northern Trust is seeking an experienced Insider Threat Intelligence/Counter-Intelligence Analyst to join our Security Operations team.. In this role, you will lead our insider-threat intelligence operations to proactively collect intelligence on nation-state insider threat activities and drive operations to identify potential insider threat activities to Northern Trust.. The ideal candidate will have a deep understanding of nation-state espionage and cyber espionage activities and will be responsible for leading insider threat investigations.. Identify Priority Intelligence Requirements (PIR’s) for state-sponsored espionage and insider threat activities.. Support Purple Team operations to emulate nation-state insider threat TTP’s
Global Tech Infrastructure & Operations – Cloud Engineer III, Cloud Security McDonald's Corporation. Our growth pillars emphasize the critical role technology plays as the best-in-class, global omni-channel restaurant brand.. Implement core cloud security capabilities such as identity & access, data protection, security controls and compliance, vulnerability management, threat detection and response, and logging/monitoring.. Infrastructure as Code (IaC) experience - scripting and automation via AZ CLI/PowerShell, Bash, Bicep, JSON templates etc.. 5+ years of Cloud development and support experience such as Microsoft Azure, Amazon Web Services (AWS) or Google Cloud Platform (GCP) and a Bachelor’s degree or 3 years relevant experience and a Master’s degree.
Dedicated Tech Services, Inc. (DTS) is an award-winning IT consulting firm based in Columbus, OH. We now have an opening for a Cyber Security Engineer.. Endpoint Detection and Response (EDR) tools like CrowdStrike, SentinelOne, or Microsoft Defender ATP.. Vulnerability Management Regular scanning and patch management using tools like Tenable Nessus, Qualys, or Rapid7.. Familiarity with CSPM and CWPP tools (e.g., Prisma Cloud, Azure Security Center).. Identity & Access Management (IAM) Role-Based Access Control (RBAC), Multi-Factor Authentication (MFA), and SSO.
Gainwell is seeking an experienced Network Security Engineer who can provide technical oversight for policy management across various firewall and web application firewall technologies.. Operational experience in NIA/NPA, ZIA/ZPA or similar SSE technologies.. Familiarity with the OSI model, TCP/IP, DNS, VPNs, TLS, routing protocols, and networking troubleshooting tools and techniques in both data center and cloud environments.. Experience working with federal regulations related to information security (FISMA, Computer security Act, HIPPA, MARS-E, GCC etc. What you should expect in this role Fully Remote Opportunity with the option to work anywhere within the United States.
Proficiency in one or more programming languages such as Python, Java, Golang, Rust, C, or C. Detailed technical understanding and/or operational/maintenance experience with combat systems, weapons and stores systems command, control, communications, computers, and intelligence (C4I) avionics hull, mechanical, and electrical (HM&E) and/or other related military operational technology, including embedded systems and supporting platform network and computing environments.. Proven experience in software development of intrusion detection systems (IDS), penetration and red team tooling.. The referenced pay range is based on JHU APL’s good faith belief at the time of posting.. APL provides eligible staff with a comprehensive benefits package including retirement plans, paid time off, medical, dental, vision, life insurance, short-term disability, long-term disability, flexible spending accounts, education assistance, and training and development.
Proficient with identity and access management (IAM) solutions, including on-premises Active Directory and cloud-based identity providers (Azure AD). Architect, implement, and maintain endpoint protection solutions and data loss prevention (DLP) systems, ensuring proper configuration, integration, and optimization. Works with the CIO, CISO, and IT Management to ensure the Security Incident Response Plan is aligned with the Bank's Business Continuity Plan and participates in planning and execution of annual DR tests. Attends training and maintains a basic knowledge of procedures to ensure compliance with laws and regulations governing financial institutions, as they apply to your position and job responsibilities, with an emphasis on the BSA/AML/CIP, Consumer Privacy, Regulation CC, Information Security, Bank Protection Act, FACT-Identity Theft, Information Technology and GLBA.. Senior High Performance Computing (HPC) Systems Administrator Infor CSD (CloudSuite Distribution) Systems Administrator Highland, UT $100,000.00-$150,000.00 31 minutes ago
This is a Hybrid role , requiring 3 days a week onsite at their Charlotte, NC office.. Guide security integration into cloud (AWS, Azure), SaaS (Salesforce, M365), and database environments. 8+ years of experience in Data Security, Cybersecurity, or Cloud Security roles. Experience with Cloud (AWS, Azure) and SaaS (M365, Salesforce) platforms. Certifications: CISSP, CCSP, CISM, or equivalent
Whether you’re working in our four global Home Offices, Distribution Centers or Retail Stores—TJ Maxx, Marshalls, Homegoods, Homesense, Sierra, Winners, and TK Maxx, you’ll find abundant opportunities to learn, thrive, and make an impact.. As Subject Matter Expert (SME) of designated tools supporting Network Security like Firewalls, NAC & Cloud Security. Strong understanding of cybersecurity best practice, risk analysis & assessment, and compliance standards (i.e. NIST CSF, CIS). Major OS (Windows, Linux, & MacOS), scripting, and enterprise change management experience are a plus.. Benefits include Associate discount; 401(k) match; medical/dental/vision; HSA; health care FSA; life insurance; short/long-term disability; paid holidays/vacation /sick/bereavement/parental leave; EAP; incentive programs for management; auto/home insurance discounts; tuition reimbursement; scholarship program; adoption/surrogacy assistance; smoking cessation; child care/cell phone discounts; pet/legal insurance; credit union; referral bonuses.
Drive the deployment and adoption of secure design and requirements across our IT Infrastructure hybrid landscapes.. This includes topics like segmentation and access control, VPN access, firewall management, auditing and monitoring, data protection, user and administrator account management, SSO, conditional access controls, and password/secrets management.. Advanced degree or certifications (e.g., CISSP, CCSP) preferred.. Strong knowledge of security frameworks, encryption, identity and access management (IAM), and zero-trust architectures.. Skills: Expertise in security tools and technologies (e.g., SIEM, DLP, IDS/IPS, firewalls).
Support the deployment, maintenance, and review of security tools (e.g., firewalls, SIEM, antivirus, IDS/IPS).. Learn and apply security best practices in public cloud environments such as AWS, Azure, or GCP.. Basic knowledge of cybersecurity concepts: threat types, risk management, incident response, and data protection.. Familiarity with security tools (e.g., SIEM, antivirus, firewall, vulnerability scanner).. Networking certification (optional but advantageous): Cisco CCNA, CCNP or equivalent
Goldman Sachs is seeking a Vice President Security Software Engineer for the Identity and Access Management (IAM) team within Core Engineering.. Manage the firm’s HSM-backed PKI, including Microsoft ADCS, AWS PCA, and public CAs.. Hands-on experience with HSM-backed PKI (Microsoft ADCS, EJBCA, AWS PCA). Experience with Infrastructure as Code (Terraform, AWS CDK/CloudFormation). Ability to write custom Terraform plugins or AWS CDK constructs
Influence technology decisions by introducing improvements in implementation patterns and architectural design.. Experience in security products, risk management, information security standards, security architecture principles, threat and vulnerability management, including incident response methodologies.. Advanced knowledge of cybersecurity architecture, applications, and technical processes, with considerable in-depth knowledge in one or more technical disciplines (e.g., public cloud, artificial intelligence, machine learning, mobile, etc. Understanding of Identity and Access Management systems and processes in an enterprise environment, familiar with Federated Identity Management, SSO, OAuth, SAML, AD & ADFS, Privileged Access Management, RBAC, etc.. Ability to explain and champion security concepts.
This hybrid role is on-site Tuesday through Thursday in Cary, NC. Remote work on Mondays and Fridays.. Firewall/Network Security: Palo Alto, Fortinet, Zscaler, Firewall Security architecture, Routing, Switching, VPNs, VPN Tuning, Zero Trust Firewalls. SIEM/SOAR: Microsoft Sentinel. Automation: Ansible, Python, or PowerShell. If you have any indication of fraudulent activity, please contact InfoSec@eliassen.com.
We are seeking a highly technical Manager of Information Technology (IT) to lead and support all aspects of our IT operations in a fast-paced telecommunications environment.. Manage endpoint protection, MDM, MFA, and vulnerability management.. Collaborate with engineering and operations teams to support telecom-specific systems (e.g., OSS/BSS platforms, SIP/VoIP infrastructure, NMS/EMS tools).. Firewalls (e.g., Fortinet, Palo Alto), switching/routing, SD-WAN, and VPN solutions. Virtualization (VMware ESXi, Hyper-V), backup platforms (Veeam, Commvault), and cloud infrastructure (Azure/AWS)
Title: PCL Information Security Officer (BISO). PCL Information Security Officer (BISO) plays a critical role in safeguarding PCL's information assets, ensuring compliance with security policies, and mitigating potential risks.. These projects and activities span across Identity and Access Management, Governance Risk and Compliance, Security Architecture, Maritime Safety, Infrastructure Application and Data Security, and Threat Management.. Critical Professional Related Technical/Computer Skills: Deep understanding and familiarity with core concepts of network security, security architecture, security operation, vulnerability management, cloud security, application security, security awareness program and threat intelligence.. Experience with security technologies and tools, including SIEM, IDS/IPS, endpoint protection, encryption, access control, firewalls, Vulnerability Management, etc.