As a Senior RHEL Engineer, you will be responsible for leading the deployment and management of Red Hat OpenShift clusters, ensuring high availability and security.. Architect and deploy containerized applications using Red Hat OpenShift, ensuring optimal performance and scalability.. Transition OpenShift cluster operations from connected to partially disconnected environments, ensuring seamless deployment of critical security updates.. Implement and manage cloud security best practices, including identity and access management (IAM), encryption, and network security.. RedHat certifications - RHCE, RedHat Certified - OpenShift, RHCSA, etc.
Lead strategic planning and execution for switching, wireless networking, router, SD-WAN, and 4G/5G product lines, including software revenue and margin growth. Identify and develop new business opportunities across SMB, consumer networking, cloud, security, and health tech sectors. Understand and manage RFQ, RFP, and quotation processes in collaboration with product management. 10+ years of professional experience in business development, account management, or product strategy.. Business Development Director / Alliance Development Director
Incident Response Lead - Senior Computer Network Defense (CND) Analyst Tyto Athene is searching for an Incident Response SME to support threat monitoring, detection, event analysis, and incident reporting.. Utilizing SIEM technologies, you will provide the client with a fully comprehensive array of analytical activities in support of external threat monitoring, detection, event analysis, and incident reporting efforts to include analysis of inbound and outbound internet traffic, suspicious e-mail messages, and cloud security logs.. Major Cloud Providers (AWS, Azure, GPC). Highlights of our benefits include Health/Dental/Vision, 401(k) match, Flexible Time Off, STD/LTD/Life Insurance, Referral Bonuses, professional development reimbursement, and maternity/paternity leave. With over 50 years of experience, Tyto Athene proudly support Defense, Intelligence, Space, National Security, Civilian, Health, and Public Safety clients across the United States and worldwide.
This leader will specialize in one of the following domains: Zero Trust (including Identity & Access Management), Cloud Security, Network Security, Security Operations & Response, or Strategy & GRC. The role is pivotal in shaping client engagements, building domain-specific practices, and delivering high-impact security transformation programs.. Domain Ownership: Lead one of the five security pillars, with deep expertise in either Zero Trust, IAM, Cloud Security, Network Security, Security Operations, or GRC. Strong understanding of regulatory frameworks (e.g., NIST, ISO, SOC, HIPAA, PCI DSS).. Experience with security technologies such as Okta, SailPoint, Palo Alto, Splunk, Azure/AWS/GCP security services.. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations.
Managing Director, Cyber Risk (Finance). Managing Director, Digital Forensic and Incident Response (DFIR) As the Managing Director for our DFIR business, you will lead a high-performing team of cybersecurity professionals in providing rapid response to cyber incidents and strategic guidance to clients across various industries.. Direct digital forensics, threat intelligence gathering, root cause analysis, and remediation planning.. Deep expertise in cyberattack lifecycle, threat actor TTPs, and security frameworks (e.g., NIST, MITRE ATT&CK).. Relevant certifications such as CISSP, CISM, GCFA, GCIH, or CISA are preferred.
A key leader, the Cloud Security Architect will drive the security related efforts related to design, implementation, and maintenance of secure cloud environments leveraging cloud-native services and security tooling for proactive risk reduction on GCP and other environments.. Lead the design, implementation, and automation of security controls in public cloud environments, including: IAM (Identity and Access Management) Detection and Monitoring CI/CD Security Configuration Management Container Security Network Security Data Protection Utilize Infrastructure as Code (IaC) tools like Terraform and container orchestration platforms like Kubernetes to automate security configurations and ensure infrastructure is secure by design.. Proven experience in designing, implementing, and automating security controls in cloud environments, including IAM, detection and monitoring, CI/CD security, configuration management, container security, and ideally using IaC tools.. Relevant certifications such as Professional Google Cloud Engineer, Cloud Architect, Cloud Security Engineer, CCSP, CISSP or equivalent.. Proven hands-on experience with Google Cloud Native Security Services such as Chronicle, Cloud Armor, Cloud Firewall, IDS, Certificate Manager, KMS, Secret Manager, DLP
Vigilantly monitor events through Managed Detection and Response (MDR), Endpoint Detection and Response (EDR), Security Information and Event Management (SIEM) systems, and other ticketing portals to identify anomalous activities.. + Support evidence collection for compliance with PCI-DSS, SOX, and other regulatory requirements.. + Familiarity with concepts or technologies such as SIEM, secure mail gateway, endpoint detection and response, secure internet gateway, RADIUS or TACACS, packet flow, TCP/UDP traffic, firewall, and IDS/IPS within a security operations center.. + Having a Cisco certification, such as CCNA, CCNP, or CCT, is a plus, demonstrating expertise in networking, routing, and switching.. Candidates are expected to hold or obtain within the first 12 months of employment at least one of the following certifications: SSCP, SANs training (401 or 503 preferred), Network+, Security +, or an equivalent certification, underlining a commitment to professional development in the cybersecurity field.
Anarust Inc. is seeking a highly motivated and experienced Remote Information Security Analyst to join our growing team.. Conduct vulnerability assessments and penetration testing to identify and remediate security weaknesses.. Experience with security tools and technologies such as SIEM, IDS/IPS, vulnerability scanners, and penetration testing tools.. Knowledge of network security, operating system security, and application security.. Familiarity with cloud security concepts and technologies (e.g., AWS, Azure, GCP).
Job Title: Insider Threat Analyst IV | Exempt. The United States Patent and Trademark Office (USPTO), Cybersecurity Division, has a requirement to support a Cyber Threat Intelligence (CTI) capability within USPTO. This support includes monitoring activities, developing cyber threat analysis, identifying mitigation and remediation courses of action, sharing actionable cyber threat intelligence used in organizational IT asset protection, trending strategic cyber threats and situational awareness.. · Analyze unclassified and classified sources of information and cyber threat intelligence on foreign and domestic cyber threats, including recommended mitigation and remediation actions, as well as indicators of compromise (IOC’s) that could affect USPTO information systems and /or networks.. · A minimum of seven (7) years of professional experience with a solid understanding of incident response, insider threat investigations, forensics, cyber threats, and information security.. · Cyber related Certificates showing SME in Threat Intel, Defense/Blue teaming, digital forensics, and/or working with the cyber kill chain, IOCs, TTPs of APTs etc.
CFS is a systems integration company that is focused on the physical security for the U.S. Federal Government with locations and personnel throughout the U.S. and globally.. CFS is a leader in the design, integration, installation, maintenance and operation of technically complex integrated physical security management systems.. CFS is seeking an Cyber Security Specialist.. Conduct regular vulnerability assessments and penetration testing to identify weaknesses in systems and applications.. Knowledge of network protocols, security vulnerabilities, and threat intelligence.
We are looking for a Computer Network Defense Analyst (CNDA)to join a growing team in multiple location such as Annapolis Junction, MD and Salt Lake City, UT. Responsibilities: Use information collected from a variety of sources (e.g., intrusion detection systems, firewalls, network traffic logs, and host system logs) to identify potential vulnerabilities, respond to cyber events that occur, and defend against events that might occur. Experience with Computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering. Foreign Language may count toward experience requirements. Desired: Relevant Certs or Specialized Training would include (but not limited to): JCAC graduate, CEH, CFR, CySA+, GCIH, CNDSP Security Clearance: A current government clearance, background investigation, and polygraph are required. Determination of official compensation or salary relies on several different factors including, but not limited to: level of position, complexity of job responsibilities, geographic location, work experience, education, certifications, Federal Government contract labor categories, and contract wage rates.
This leader will specialize in one of the following domains: Zero Trust (including Identity & Access Management), Cloud Security, Network Security, Security Operations & Response, or Strategy & GRC. The role is pivotal in shaping client engagements, building domain-specific practices, and delivering high-impact security transformation programs.. Domain Ownership : Lead one of the five security pillars, with deep expertise in either Zero Trust, IAM, Cloud Security, Network Security, Security Operations, or GRC.. Strong understanding of regulatory frameworks (e.g., NIST, ISO, SOC, HIPAA, PCI DSS).. Experience with security technologies such as Okta, SailPoint, Palo Alto, Splunk, Azure/AWS/GCP security services.. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations.
Lead Enterprise Data Protection StrategyDefine and execute data security plans aligned with business objectives and risk priorities. Guide security integration into cloud (AWS, Azure), SaaS (Salesforce, M365), and database environments. 8+ years of experience in a Data Security/Encryption, Cloud Security, Cybersecurity Delivery Management, or Gen AI Tool Implementation-focused role – We are NOT looking for Cyber Security Engineering experience. A minimum of a Bachelor’s Degree in Computer Science, Cybersecurity, or other relevant field; Master’s Degree in relevant field and/or CISSP, CCSP, or CISM Certifications preferred. Improved adoption of classification and DLP tools by business units
COMPUTER AND INFORMATION SCIENCE (CIS)/CYBERSECURITY FACULTY, TENURE TRACK page is loaded COMPUTER AND INFORMATION SCIENCE (CIS)/CYBERSECURITY FACULTY, TENURE TRACK Apply locations San Diego County - Cuyamaca College time type Full time posted on Posted 7 Days Ago job requisition id R-02393 Transforming lives through learning isn’t just the vision of the Grossmont-Cuyamaca Community College District. Industry certification, such as CCIS, CompTIA Security+, CISSP, CEH, OWASP. Familiarity with SIEM tools, firewalls, IDS/IPS, cloud security.. Ability to teach online using modern LMS platforms (e.g., Canvas, Blackboard). Similar Jobs (2) COMPUTER SCIENCE FACULTY, TENURE TRACK locations San Diego County - Cuyamaca College time type Full time posted on Posted 11 Days Ago CENTER FOR WATER STUDIES - WATER/WASTEWATER TECHNOLOGY INSTRUCTOR, TENURE TRACK locations San Diego County - Cuyamaca College time type Full time posted on Posted 30+ Days Ago
SBG, a DSS, Inc. company, specializing in engineering, information technology, cyber-security, intelligence, and training, is looking for a hard-working results-oriented Systems Administrator IV. We are seeking highly motivated individuals with a positive attitude looking to join our rapidly growing company. Must have active TS clearance. Create and manage network accounts, enforce access control, and ensure adherence to network security protocols. Implement and maintain network security tools, such as Firewalls, Anti-virus solutions and Intrusion Detection/Prevention Systems (IDS/IPS).. Must possess an active Top Secret (TS) clearance