Proactively conduct threat hunting activities to detect advanced threats that evade traditional security solutions and continuously monitor and analyze threat intelligence sources to stay informed about emerging threats.. 7+ years of experience in cyber threat hunting, incident response, or a related cybersecurity field.. Relevant certifications such as GCIH, GCFA, GNFA, or equivalent is highly desirable.. Familiarity with cloud security and threat hunting in cloud environments.. For all positions requiring access to technology/software source code that is subject to export control laws, employment with the company is contingent on either verifying U.S.-person status or obtaining any necessary license.
We are seeking a skilled and innovative Machine Learning Engineer to join our cybersecurity team. Risk Modeling and Explainability: Develop probabilistic models and statistical frameworks to assess security risk in cloud environments, integrating data from network logs, user behaviors, and threat intelligence to provide actionable risk assessments. Knowledge of cloud computing platforms (AWS, Azure, GCP) and familiarity with securing and monitoring cloud infrastructure. Experience with big data processing platforms and frameworks (Snowflake, Spark) is a plus. Domain Knowledge: Solid understanding of cybersecurity principles, including network security, malware analysis, incident response, and risk assessment in cloud environments.
ManTech seeks a motivated, career and customer-oriented Senior Computer and Information Research Scientist to join our team in DC, Maryland, and Virginia (DMV) area. Experience with network security, intrusion detection/prevention, malware analysis, threat intelligence, security information and event management (SIEM), or security automation. Knowledge of specific application domains, such as incident response, digital forensics, or threat hunting. Senior Scientist – Fault-Tolerant Quantum Algorithms.. Senior Research Specialist Office of the Under Secretary of Defense for Acquisition and Sustainment U.S. Department of Defense Washington, D.C. Metro Area – Proposal Position
Join us as a Principal Cloud Security Architect and discover your superpower.. We are seeking an innovative, adaptable, and results-oriented Principal Cloud Security Architect for our Cybersecurity team.. Deep understanding of cloud security concepts, including network security, data protection, identity management, and threat modeling across major cloud providers.. Strong security foundations, including experience with network security, vulnerability management, penetration testing, security operations, and application security; knowledge of encryption, secure protocols, and best-in-class solutions.. Familiarity with ICS/SCADA/OT environments and standards such as NIST, CIS benchmarks, CSA CCM, and NERC CIP.
At Aurascape, we are redefining the future of network security with cutting-edge solutions that are ground-up AI-native, Cloud-native, and leverage advanced gen AI technologies to safeguard organizations from ever-evolving cyber threats.. This role is ideal for someone with 4-8 years of experience who has deep knowledge of networking and security technologies and an enthusiasm for competitive intelligence and technical marketing.. Competitive Analysis: Conduct in-depth competitive analysis of network security products (including firewall, IPS, zero-trust architecture, cloud security, SASE) to identify strengths, weaknesses, opportunities, and threats in the marketplace.. Deep knowledge of network security architectures , including firewalls, intrusion detection/prevention systems (IDS/IPS), VPNs, SSL/TLS encryption and more.. Be part of an exciting startup opportunity at the forefront of AI-native, Cloud-native network security innovation.
· Conduct penetration testing and vulnerability assessments. · Strong knowledge of cybersecurity frameworks and regulations (NIST, HIPAA, PCI-DSS). · Strong understanding of network security, cloud security, and endpoint security. · Experience with penetration testing and vulnerability assessment tools. Remote working/work at home options are available for this role.
Conduct regular security assessments, vulnerability scans, and penetration testing.. Ensure compliance with industry standards, legal requirements, and organizational policies (e.g., GDPR, HIPAA, PCI-DSS).. Strong understanding of cloud platforms such as AWS, Azure, or Google Cloud.. Experience with security tools and technologies (e.g., firewalls, IDS/IPS, SIEM).. Relevant security certifications such as CISSP, CISM, CEH, or AWS Certified Security - Specialty are preferred.
The role serves as the escalation point collaborating with the Managed Detection and Response (MDR) provider to triage alerts based on relevance and urgency and provides analysis to business stakeholders about the overall security posture in order to mitigate risk.. Responsibilities include threat detection and response, security toolset configuration, leveraging various Threat Intelligence sources to hunt and classify malicious behavior, and coordinating the Vulnerability Management process.. Certification in one or more areas, or willingness to obtain: BTL1, CISSP, GIAC, OSCP, Sec+, CEH or similar.. Skills •Keen understanding of Cybersecurity and Data Protection tools including SIEM, IDS/IPS, AV/EDR, NDR, DLP and other technologies •Understanding of Windows and Linux Operating Systems and networking protocols.. Experience with commercial Vulnerability Management tools (i.e. Tenable, Rapid7, Qualys) a plus.
BenefitsFlexible Work Environment: Enjoy the freedom of remote work while contributing to exciting projects.. Strong understanding of network security, encryption, authentication, and access control.. Familiarity with cybersecurity tools such as SIEM, IDS/IPS, endpoint protection, and vulnerability scanners.. Hands-on experience with incident response, risk assessment, and forensic analysis is a plus.. Nice to have: Industry certifications such as CompTIA Security+, CISSP, CEH, or OSCP.
JT4 is seeking a Cyber Security Analyst for an onsite position at Edwards AFB in California.. In the U.S. federal context, this typically includes the Risk Management Framework (RMF) established by the National Institute of Standards and Technology (NIST), particularly NIST Special Publication 800-37.. Proficiency in security tools and technologies (e.g., SIEM, IDS/IPS, firewalls, antivirus, vulnerability scanners, EDR solutions).. Familiarity with cloud security (AWS, Azure, Google Cloud) and hybrid environments.. DESIRED QUALIFICATIONS: Relevant cybersecurity certifications, such as: CISS, CISM, CEH, Comp TIA Security+, GSEC, CISA, etc.
Design, implement, and maintain access management and privileged access management systems, including identity and access management (IAM) solutions, multi-factor authentication (MFA), and role-based access control (RBAC). Experience with PAM solutions, such as CyberArk. Scripting and automation: Knowledge of scripting languages, such as PowerShell or Python, and experience with automation tools, such as SailPoint's Automation Framework.. Knowledge of SailPoint's access management and governance capabilities, including identity lifecycle management, access certification, and segregation of duties (SoD). Experience with SailPoint's integration with other security solutions, such as IAM, PAM, and SIEM
Job Overview: We are looking for staff-level cybersecurity professionals with a strong background in one or more of DevSecOps, network security, and security architecture.. The ideal candidate will have a minimum of 8+ years of experience in DevSecOps or related fields and a strong understanding of cloud platforms, security automation, and secure coding practices.. Manage infrastructure as code (IaC) using tools like Terraform, OpenTofu, or CloudFormation to ensure secure and scalable deployments.. Qualifications: Minimum of 8+ years of experience in DevSecOps, DevOps, or a related field, with a strong focus on security.. Proficiency with infrastructure as code (IaC) tools such as Terraform, OpenTofu, or CloudFormation.
The Systems Engineer's main mission will be to support the sales organization in all technical matters regarding pre-sales, sales calls, and post-sales. Pre-sales - assist in qualifying sales leads from a technical standpoint. 5 – 8 years experience in technical/pre-sales support as a sales or systems engineer. Knowledge of the following technologies: Routing, Switching, VPN, LAN, WAN, Network Security, Intrusion Detection, and Anti Virus. Solid understanding in the following technologies and protocols: RADIUS, PKI, IKE, Certificates, L2TP, IPSEC, FIREWALL, 802.1Q, MD5, SSH, SSL, SHA1, DES, 3DES.
To excel in this role, you'll need an in-depth understanding of enterprise IT concepts, cloud security, FISMA compliance, digital identity, and privacy—all while closely adhering to NIST standards and emerging Zero Trust implementation guidelines.. Develop/integrate cybersecurity designs for systems and networks with multilevel security requirements or requirements for the processing of multiple classification levels of data Provide internal and external subject matter expertise on Zero Trust and emerging Cybersecurity trends Architect and supervise the deployment of Zero Trust principles across the enterprise, prioritizing network security, data encryption, identity and credential management, and application security.. Create and present briefs and presentations to senior leadership Spearhead the implementation of a comprehensive cybersecurity delivery specifically with technologies like Zscaler, Solarwinds, Crowdstrike, etc.. Experience with implementing and configuring security applications such as Solarwinds, Zscaler, SailPoint, Crowdstrike, TripWire, Azure, etc.. Consultative mindset and ability to map solutions against client challenges Solid understanding of technical concepts and such as Encryption, Multi-Factor Authentication (MFA), Network Segmentation, Data Loss Prevention Experience driving discussions with senior personnel regarding trade-offs, best practices, project management and risk mitigation.
As a Senior Customer Success Engineer (Sr. CSE) at Palo Alto Networks, you will provide advanced technical expertise and leadership for our customers, ensuring they maximize their investment in our products.. Strong understanding of Cloud Access Security Broker (CASB) and Data Loss Prevention (DLP) technologies and their implementation best practices.. Hands-on experience deploying and managing the leading CASB/DLP solutions (Microsoft, Symantec/Broadcom, Netskope, Skyhigh, etc.. Experience in administration/design/architecture of major SaaS applications in the market and their security and data protection features (O365, Google Workplace, SFDC, ServiceNow, Atlassian, Slack, etc.. Relevant certifications (e.g., Certified Cloud Security Professional (CCSP), Palo Alto Certified Network Security Engineer (PCNSE), and Global Information Assurance Certification (GIAC) are a plus.
Executing security and privacy investigations for CRA clients, in preparation of, and in response to, data security matters, which may include ongoing breach detection, threat analysis, incident response and malware analysis;. Assisting in the drafting of forensic reports, affidavits and testifying as an expert in the field of digital forensics and incident response;. Engaging in problem-solving and forensic analysis of digital information using standard evidence handling techniques and computer forensics tools;. Create Indicators of Compromise (IOCs) from analysis to strengthen incident response and threat intelligence efforts;. Digital forensics/incident response training and certifications, including SANS GIAC (GCFA, GCFE, GNFA, GIME), IACIS (CFCE or CIFR), Magnet MCFE, X-ways X-Pert or similar
The ideal candidate will be responsible for identifying, evaluating, and addressing security findings, managing HIPAA compliance requirements, and leading incident response activities.. Must live with proximity to Rockville, MD.Key Responsibilities:Security Findings Management:Analyze and respond to security findings from vulnerability management tools such as Qualys.. Compliance & Risk Management:Conduct periodic compliance checks to ensure adherence to HIPAA, HITRUST, and other regulatory frameworks.. HIPAA Incident Response:Lead investigations into potential HIPAA violations and security incidents involving protected health information (PHI).. Provide guidance and training on security best practices and HIPAA compliance.
Strong knowledge of cloud security principles and experience with cloud platforms like AWS, AZURE, or Google Cloud. Proficiency in network security principles, protocols, and technologies (firewalls, IDS/IPS, VPNs,etc.). Experience with query languages •Familiarity with MITRE ATT&CK Framework, adversary TTPs,and threat intelligence. Security Certifications to include CISA, SSCP, CEH, CAP, GCIH, ECIH, CASP+, SEC+. Experience with implementing automation mechanisms within a SIEM, CSP, or an enterprise environment
The role serves as the escalation point collaborating with the Managed Detection and Response (MDR) provider to triage alerts based on relevance and urgency and provides analysis to business stakeholders about the overall security posture in order to mitigate risk.. Responsibilities include threat detection and response, security toolset configuration, leveraging various Threat Intelligence sources to hunt and classify malicious behavior, and coordinating the Vulnerability Management process.. Certification in one or more areas, or willingness to obtain: BTL1, CISSP, GIAC, OSCP, Sec+, CEH or similar.. Keen understanding of Cybersecurity and Data Protection tools including SIEM, IDS/IPS, AV/EDR, NDR, DLP and other technologies. Experience with commercial Vulnerability Management tools (i.e. Tenable, Rapid7, Qualys) a plus.
Job Title: Security Incident Response Analyst Location: Reston, VirginiaSalary: DOE + full benefitsClearance: Active Public Trust (or ability to obtain)Company Overview:TechSur Solutions is a digital services company whose mission is to enable digital transformation for our customers, improving quality and efficiency.. Continuously monitor security alerts from SIEM (Security Information and Event Management) tools (Splunk, QRadar, ArcSight, etc. Analyze logs from firewalls, IDS/IPS, endpoint security tools, and cloud security platforms.. Conduct digital forensics and malware analysis to determine root causes.. Design, develop, engineer, and implement solutions to MLS requirements.