DoubleVerify is the leader in digital performance solutions, improving the impression quality and audience impact of digital advertising.. Reporting directly to the Sr Director of Corporate Systems, your primary responsibilities include overseeing the strategic direction, development, and implementation of IAM solutions (primarily leveraging Okta) and ensuring the automation team's capability to deliver efficient and robust solutions using Workato.. Direct the IAM infrastructure's design, implementation, and maintenance, focusing on Okta. Drive the integration and migration of applications onto Okta, developing strategies for smooth transitions.. Act as a subject matter expert in Okta and IAM technologies, mentoring team members and troubleshooting complex issues.
The VP & Chief Information Security Officer (CISO) reports to the SVP & Chief Information Officer and is a key member of the IT leadership team.. This will include direct oversight of cybersecurity operations, incident response, governance, third-party risk management, and information security awareness programs.. Manage vendor relationships, resolves issues, and oversees vendor/third-party risk management processes.. CISSP, CISM, or CISA certification required; CSM/CSPO preferred.. Hands-on experience with security technologies: firewalls, IDS, encryption, IAM, MFA, anti-malware, etc.
SOC Operations (to include SIEM, SOAR, EDR, Threat Intelligence)- Perform initial triage of security. DLP & Insider Threat Monitoring- Monitor DLP alert queues and escalate violations to management;. Penetration Testing & Tabletop Exercises- Document results from pen tests and track remediation. Industry recognized security certifications are a plus but not required (e.g. CISSP, CISA, CISM, CEH,. Experience with Splunk Cloud, Qualys, Spirion, Trellix, PAM, Tufin or similar information security tool is
Support current redundancy both within the primary data center at ESOC/West (referred to as “2N”) and at a separate DR data center (Modular Data Center) to enable recovery of critical applications, databases and services as needed.. Develop recovery options for domestic Consular offices and overseas posts to ensure the DR Plan encompasses the full enterprise.. Experience in developing Business Impact Analysis (BIA), identifying gaps & potential impacts of events to prepare Recovery Time Objective (RTO) and Recovery Point Objective (RPO) that meet business needs and contractual obligations.. Strong experience and knowledge of DR strategies across various traditional and cloud environments (AWS, Azure, Hyper-V, VMware & others).. Disaster Recovery certifications are preferred: ABCP, CBCP, MBCP, CBCBP or similar.
Join to apply for the Engineering Manager for IAM (Identity and Access Management) role at Canonical.. We are hiring an Engineering Manager for IAM (Identity and Access Management) to build high-performing Go and Python services and secure identity and access management solutions that will be used across all company products. This is an opportunity for a software engineering manager with a passion for distributed systems operations to help us transform the future of identity management at Canonical. You will work with upstream open source projects, alongside internal teams to deliver high quality software that can be deployed on bare metal, public cloud and Kubernetes. Sr. Director, Engineering - Ads Measurement
Manulife / John Hancock is a leading international financial services provider, helping people make decisions easier, and lives better. Manulife Financial Corporation is a leading international financial services provider, helping people make their decisions easier and lives better. To request a reasonable accommodation in the application process, contact recruitment@manulife.com. If you are applying for this role outside of the primary location, please contact recruitment@manulife.com for the salary range for your location. Manulife/John Hancock offers eligible employees a wide array of customizable benefits, including health, dental, mental health, vision, short- and long-term disability, life and AD&D insurance coverage, adoption/surrogacy and wellness benefits, and employee/family assistance plans.
Build tooling to standardize and scale operational workflows in AWS, Azure and Google Cloud Platform (GCP).. Strong coding skills with with expert-level proficiency in at least one of the following languages - Java (preferred), Golang, C. Fertility and family building benefits including but not limited to adoption, surrogacy, and preservation.. Many teams do offer hybrid options (WFH a day or two a week), allowing our employees to strike the right trade-off for their personal productivity. Senior Manager, Software Engineering, Slack (People Leader) Senior Manager, Software Engineer (Bank Tech) Senior Manager, Software Engineering, Full Stack Laurel, MD $146,000.00-$234,000.00 1 week ago
Within Information Security we blend risk strategy, digital identity, cyber defense, application security and technology solutions as we consider the entire security lifecycle.. Responsibilities include performing digital forensic analysis, following security incident response standard methodologies, malware analysis, identify indicators of compromise, support remediation or coordinate remediation efforts of a security incident, and develop documentation to support the security incident response process.. 5+ years experience in incident response, computer forensics analysis and/or malware reverse engineering;. Understanding of electronic investigation, forensic tools, and methodologies, including: log correlation and analysis, forensically handling electronic data, knowledge of the computer security investigative processes, malware identification and analysis;. Hold or be willing to pursue related professional certifications such as GCFE, GCFA or GCIH
Build tooling to standardize and scale operational workflows in AWS, Azure and Google Cloud Platform (GCP).. Experience in mentoring, serving as a tech lead, or leading an engineering team.. Strong coding skills with expert-level proficiency in at least one of the following languages - Java (preferred), Golang, C. Fertility and family building benefits including but not limited to adoption, surrogacy, and preservation.. Many teams do offer hybrid options (WFH a day or two a week), allowing our employees to strike the right trade-off for their personal productivity.
Northern Trust Technology Risk & Control function is responsible for enabling Global Information Technology to build a strong 1st Line of Defense, foster a control aware culture, deliver compliant and secure technology capabilities, protect customers and meet regulatory requirements. The Principal cybersecurity risk and control officer is part of the InfoSec Control Officer Team, responsible for leading risk and control assessments for core cyber security domains, performing security testing, and evaluating compliance to information security policies and procedures and regulatory requirements. Lead risk and control assessments for core cyber security domains, including vulnerability management, threat management, third-party security due diligence, identity and access management.. 12+ years of technical or audit experience in core cyber security fields such as vulnerability/threat management, Pen-Testing, IAM, Data Protection, IH/IR, AppSec, Network Security, System Administrator, GRC. If you need a reasonable accommodation for any part of the employment process, please email our HR Service Center at MyHRHelp@ntrs.com.
The Identity Access Management (IAM) Manager is a People Leader responsible for leading and developing a team of network administrators, ensuring their skills and performance are aligned with the team's and organization's goals. In addition to access provisioning, the IAM Manager will be responsible for the integration and ongoing maintenance of single sign-on (SSO) technologies, privileged access management applications, and secrets management systems, ensuring seamless and secure access for users across various systems and applications. The IAM Manager must ensure compliance with security policies, standards, regulations, and best practices for identity management, safeguarding the organization against unauthorized access and potential security breaches. Founded in 1848, Westfield is a global leader in property and casualty insurance, delivering superior risk insights and innovative solutions to customers through a diverse portfolio of insurance products. Westfield underwrites commercial, personal, surety, and specialty lines of coverage through a network of leading independent agents and brokers in the United States and specialty products through Lloyd’s of London Syndicate 1200.
As an Associate Engineer on the Identity and Access Management (IAM) team at Casey’s, you will support the design, development, implementation, and maintenance of IAM systems and solutions that align with the organization’s security and business objectives. This entry-level role is ideal for individuals looking to grow their technical skills in cybersecurity and identity management while contributing to the protection of enterprise systems and data. Assist in the development, testing, and deployment of IAM solutions that ensure secure access to systems and data. Stay informed on emerging IAM technologies, regulatory requirements, and industry trends to support continuous improvement. Basic understanding of IAM concepts such as authentication, authorization, Lifecycle management, and role-based access control.
A Principal Engineer – Wireless Networking resolves hardware and software product inquiries escalated from the Help Desk Level 1 support team and ICU Medical field installers. Principal Engineer will drive attainment of key performance metrics via adoption of ICU Medical’s knowledge management process, mentoring staff and participation in departmental initiatives. A Principal Engineer must be able to manage project requirements, project budgets and project outputs. A Principal Engineer must be able to present technical, schedule and financial updates to management. With the acquisition of Hospira Infusion Systems in 2017 and Smiths Medical in 2022, we are now a global market leader with a complete line of clinically-essential IV therapy and high-value critical care products for hospital, alternate site, and home care settings.
We are seeking a highly skilled and motivated penetration testing lead consultant to join our team and lead pen testing engagements. A Bachelor's degree in Computer Information Systems, Computer Science, Business Information Systems or related fields.. 4 years or more of experience performing penetration testing including use of tools and manual processes.. Programming experience in Python, PHP, Perl, Ruby,. Pen testing certification(s) required including OSCP, CEH, CPT, LPT, GPEN, PenTest+ or must obtain one or more security-related certifications within the first year of hire
Were hiring a Cybersecurity Analyst to take the lead in incident response, vulnerability remediation, and enterprise security tool management.. Competitive pay: $71,000-$120,000 + relocation assistance. You'll manage SIEM, firewalls, antivirus, and IAM tools, guide patching efforts, lead compliance initiatives, and stay on the front lines of Cybersecurity threats.. Experience with SIEM, firewalls, vulnerability scanning, and incident response. Familiar with IdPs, antivirus platforms, and compliance frameworks (e.g., NIST, ISO)
We are expanding our engineering team and seeking a highly skilled Senior DevOps Engineer with a strong background in Azure cloud services and Infrastructure as Code (IaC) to join our team.. Design, implement, and maintain secure, scalable Azure cloud infrastructures using Infrastructure as Code (IaC) practices (e.g., Terraform).. Strong knowledge of CI/CD tools (e.g., Azure DevOps) and best practices.. Certifications such as Microsoft Certified: Azure Security Engineer Associate, Azure DevOps Engineer Expert, or similar.. As a leader in casino marketing, we work with over 300 casinos each month, helping them reach more than 10 million people nationwide.
We’re looking for a Cyber Security Compliance Specialist to join our team supporting the U.S. Air Force’s Unified Platform software factory in San Antonio.. We are hiring for both fully remote positions and hybrid roles based in San Antonio, TX. Candidates local to San Antonio should expect a mix of onsite and remote work as part of a hybrid schedule.. Experience with cloud security (AWS preferred), container security, and zero-trust architectures.. Hands-on experience implementing technical controls such as endpoint protection, logging and monitoring, identity management, vulnerability scanning, and encryption.. Strong familiarity with tools such as Nessus, SCAP, Splunk, ACAS, CrowdStrike, and Tenable.
Job Summary: As our Cyber Security Engineer III you’ll work directly with our customers developing, improving, modifing, and assessing security architecture within a hosting- based environment.. Work Location: Our new state of the art Castle located in San Antonio, TX. You'll have the opportunity work a hybrid model with two days in the office and three days remotely.. CISSP, GSEC, CEH or CISM.. Experience with secure network architectures, identity and access management principles, application security, encryption technologies, DNS, SOA, database and web applications.. Familiar with both HIPPA and HITRUST compliance.
From identifying vulnerabilities to supporting disaster recovery strategies, this role is about more than just firewalls and malware—it's about being a critical line of defense in a company that values trust, transparency, and teamwork.. Maintain and improve endpoint protection, patch management, and our backup/disaster recovery plans. Assist our Information Systems Engineers with desktop, network, and software support. Comfortable working with Windows desktop environments; Fortinet/Cisco firewall experience is a plus. Typical hours are Monday–Friday, 8:30 AM–5:30 PM, with occasional on-call coverage during nights and weekends
Dark Wolf Solutions is seeking a highly motivated and experienced Cyber Security Project Engineer SME to supports a diverse set of corporate goals across the organization by conducting technical risk assessments and providing technical risk mitigation guidance on the use of various enabling technologies.. The ideal candidate will be a subject matter expertise in technical risk analysis of enterprise and mission systems, IT systems and networks, mobile and wireless networks, cloud-based computing, network management platforms, communication protocols, scripting or programming products, configuration scripts, and IT hardware and software products in support of technical risk assessment activities.. Gather Body of Evidence (BOE) and assess artifacts, such as CONOPS, use cases, detailed network diagrams, technical design details, procurement methods, and System Security Plan (SSP) to get a holistic view of the interworking parts of a given technology implementation being evaluated, from which real insights can be derived to inform risk assessor’s judgement.. Comprehensive knowledge of communications protocols, including IP, TCP, UDP, HTTP, HTTPS, MPLS, OSPF, IGRP, BGP, SIP, and H.323.. Certified Information Security Manager (CISM), Certified Ethical Hacker.