Apex Order Pickup Solutions is looking for a Firmware Engineering Manager to join the team at our global headquarters in Mason, Ohio. Are you looking for a great opportunity to become a key software technical leader on various exciting new development initiatives in the IoT & SaaS space. As a Software Engineering Manager, you are responsible for leading the software team through the full software development lifecycle within multiple product lines. Identifies & drives the development of software code that implements various security operations such as secure boot, trusted zones, TPM, HSM, data encryption algorithms, PKI, diagnostics access levels, et.. Master level knowledge of OOD, design patterns, data modeling, messaging, session, serialization, persistence, XML, JSON, SOAP, SOA, JavaMail, Restful Web Services, Spring framework, JDBC, Hibernate & other related Java EE technolo.. Cybersecurity certifications such as CEH, Security+, Certified Google Cloud Security Professional,
Maintains core services to include e-mail, voicemail, printing, file sharing, authentication and access control, databases, video surveillance, disaster recovery, and storage systems.. System Administrator II - This position maintains core services to include e-mail, voicemail, printing, file sharing, authentication and access control, databases, video surveillance, disaster recovery, and storage systems.. System Administrator III - This position maintains core services to include e-mail, voicemail, printing, file sharing, authentication and access control, databases, video surveillance, disaster recovery, and storage systems.. Administers information technology management systems such as SCCM, F5 Big-IP LTM /GTM/APM, Enterprise SAN/NAS platforms, Active Directory, ADFS, and Azure Active Directory.. Additional skills required to perform this job should include knowledge of: PowerShell, GIT Source Control, Microsoft Operating System, SCCM, GPOs, firewalls, disaster recovery, and access management policies and processes.
With a commitment to innovation, client service, and strategic growth, the firm is seeking a forward-thinking, strategic and experienced Chief Information Officer (CIO) to lead our technology vision and execution, ensuring our technology infrastructure and systems support our business objectives and maintain the highest levels of security and client confidentiality.. In addition to IT, this role also oversees new business intake, docketing, records, litigation support (and e-discovery) and library and knowledge services.. Assist with renewals of the firm's cyber insurance and professional liability insurance. Deep understanding of the specific technology needs and challenges of law firms, including practice management systems, document management, eDiscovery, and data security requirements. Strong knowledge of data security and data privacy best practices, compliance regulations (e.g., HITRUST, GDPR, CCPA), and cybersecurity principles
You will be our Cyber Defense presence on the air-gapped network and will be part of a team responsible for all cybersecurity functions such as vulnerability management, incident response, threat hunting, and threat detection.. Active Top Secret/SCI clearance with a CI polygraph.. 10+ years of experience in technical security consultancy, security operations, response, vulnerability management, threat detection, or threat hunting.. Experience with SIEM and SOAR security technologies and solutions.. Primary Location: USA.VA.McLean (Tyson's Corner)Primary Location Base Pay Range: $180,600 USD - $271,000 USDAdditional US Location(s) Base Pay Range: $163,400 USD - $282,000 USD
The Cybersecurity Engineer Lead will foster the development the detection engineering and threat hunting services performed by Sherwin-William’s Cyber Fusion Center (CFC).. Assignments at this level will focus primarily on SIEM and Security Orchestration and Automated Response (SOAR) technologies that support the Cyber Fusion Center.. · Lead customization, alerting, tuning, and automation solutions for our SIEM/SOAR platform.. · Experience with SIEM/SOAR solutions, such as Splunk or Sumo Logic.. · Experience working with a Threat Intelligence Platform (TIP) and integrating into a SIEM solution.
Civica's new 140,000 square foot state-of-the-art manufacturing facility in Virginia will soon produce a steady supply of more than three dozen sterile injectables, all drugs that are currently in or near shortage. Leaders from nearly every corner of the diabetes ecosystem are partners in this initiative. The Associate Director of Information & Operational Technology (I&OT) leads Civica's infrastructure, networks, cybersecurity, and compliance efforts for the Petersburg site. Responsible for all technology-related system integrations across different software platforms and systems such as Asset Management System, Active Monitoring System, Operator Management and Access Control System, Alarm Management System, Disaster Recovery System, Historians. Knowledge of pharmaceutical manufacturing processes, regulatory requirements, data integrity guidelines, and FDA expectations.
The Network Services Technician will serve as a member of Management Information Systems Network Support Team. Essential Performance Responsibilities: Provides technical support for administrative equipment and software (SIS, Exchange Internet, etc.). CAT5 and fiber cabling experience needed.. Switch and hub knowledge of various OEMs Implementation of backup/disaster recovery plan for district production systems Supports Microsoft Proxy Server and configuration.. Work with Cox Communications cable modems Working knowledge of Microsoft Windows Workstation and Server.. System software maintenance - upgrades, adding new users to established software, keeping archived copies of software, data and configuration files, and maintaining a written record of all aspects of the software configuration, including directory and file structures and volumes Additional Duties: Perform other duties as assigned by the Management Information Systems Chief Information Officer and Network Manager.
This pivotal role encompasses the management of governance, risk, and compliance aspects pertaining to information security.. Design and promote Tilray’s corporate risk management framework, complete with comprehensive policies, procedures, standards, directives, methodologies, and supporting documentation.. PROFESSIONAL EXPERIENCE/QUALIFICATIONS Bachelor’s degree in Information Technology, Business Administration, or a related field, complemented by professional cybersecurity management certifications (CISSP, CISA, CRISC, etc. A minimum of ten years’ experience in Information Security, Operational Risk, Internal Audit, or a related department, with a deep understanding of data integrity and cybersecurity principles.. If you have concerns regarding the authenticity of any communication purportedly from, for, or on behalf of Tilray, please direct your inquiries to infosec@tilray.com.
Jones Lang LaSalle, an international commercial real estate firm, is seeking a skilled and motivated cloud network engineer with expertise in both traditional networking and cloud networking technologies to join our IT team.. Document firewall deployment, upgrades, and configuration standards Experience with network automation tools such as Ansible, scripting using Terraform, Python Wireless network design, support and troubleshooting.. Technical Skills & Competencies Hands on experience with the Palo Alto firewall management.. Some of these benefits may include: 401(k) plan with matching company contributions Comprehensive Medical, Dental & Vision Care Paid parental leave at 100% of salary Paid Time Off and Company Holidays Flexible and Remote Work Arrangements may be available JLL Privacy Notice Jones Lang LaSalle (JLL), together with its subsidiaries and affiliates, is a leading global provider of real estate and investment management services.. You’re considered fully vaccinated two weeks after you receive the second dose of a two-dose vaccine series (e.g., Pfizer or Moderna) or two weeks after a single-dose vaccine (e.g., Johnson & Johnson/Janssen).
What we"re looking for:*Collaborate with internal stakeholders across various technical functions to create a comprehensive technical roadmap for core enterprise Identity and Access Management (IAM) solutions.. Offer recommendations on IAM and Public Key Infrastructure (PKI) best practices and assist in establishing a centralized IAM service function to support the internal user base.. Lead proof of concept initiatives, product selection, and deployment of IAM and PKI-related solutions.. Demonstrated ability to quickly ramp on different IAM Technology stacks ( eg : Okta )*Strong multitasking skills to manage the demands of multiple projects, issues, and tasks.. Added bonus if you have (Preferred):*Experience with tools such as CloudWatch, RockMon, AppDynamics, DataDog, and Elk Kibana.
Exciting Opportunity for a Mid-Level System Analyst (On-Site in Manhattan, NY). Provide expert support for corporate and enclave firewalls, RADIUS, RSA, and application delivery controllers.. Develop and test disaster recovery plans and prepare documentation for support teams.. Centralized management tools (Cisco Systems Manager, FortiManager). NGFW Threat Management Tools (e.g., web filtering, application filtering)
Job Description Reporting to the IS Network Manager, the Network Technician is part of a team responsible for operating and maintaining the organization’s IT infrastructure, ensuring the reliability, performance, and security of networks throughout the enterprise.. The Network Technician accomplishes these responsibilities by monitoring network performance, conducting testing, identifying root causes of performance issues, and collecting data to promote maximum security and reliability.. Maintains hardware and software such as: servers (physical and virtual), virtualization platform, VOIP phones, firewalls, and any other relevant hardware and software.. Perform regular backups and disaster recovery procedures for network infrastructure.. Knowledge of industry standard networking products like Aruba, Cisco, Palo Alto, Fortinet, Brocade.
In-depth knowledge of UCSD network security standards and systems administration protocols.. Experience configuring and maintaining a moderately sized server room and corresponding infrastructure including local network switches, power distribution, UPS installation and configuration for server shutdown, and out-of-band management for Dell and Supermicro motherboards.. Proven expertise in, and In-depth knowledge of, the principles, methods, and best practices for MS Windows, MacOS, Unix, and Linux systems administration.. Experience with enterprise server storage solutions including hardware and software RAID (and associated CLI and vendor-based management utilities) and common file systems including ZFS on Linux.. Demonstrated experience installing and debugging MacOS, MS Windows, VMware, and Red Hat Linux operating systems, applications and utility software.
Remote Work: Hybrid Overview: At Zebra, we are a community of innovators who come together to create new ways of working to make everyday life better.. Maintains Cloud standards for cloud environments including; GCP, AWS, Azure, and OCI. Qualifications: Minimum Qualifications: Bachelor's Degree required.. Thorough understanding of intra and inter cloud secure routing utilizing native cloud technologies and Palo Alto firewalls Demonstrates knowledge of encryption protocols, as well as means for compromising systems based on known vulnerabilities.. Zebra is a federal contractor and is committed to an alcohol and drug free workplace.. If you are a victim of identity theft contact your local police department.
Tangent Technologies is seeking a seasoned Lead Information Security Analyst with over ten (10) years of experience in Information Security and Cybersecurity program execution, including at least five (5) years in a lead role supporting cybersecurity policies, risk management, certification & accreditation (C&A), and quality assurance.. This individual will lead security assessment and authorization efforts in accordance with NIST and DoD IA standards, supporting mission-critical systems including High Value Assets (HVAs) and AES-assessed environments.. Oversee AES CISA HVA assessments, applying risk-based methodologies to evaluate system security posture and recommend remediation strategies.. Conduct risk assessments, control evaluations, vulnerability management, and mitigation planning across complex environments.. Perform quality control reviews of contractor deliverables, processes, and risk assessments to ensure adherence to standards and continuous improvement.
Axient is currently seeking an Information Systems Security Officer (ISSO) to support our customer in Boulder, CO.. Will work with Information Systems Security Manager (ISSM) to create and maintain Assessment and Authorization (A&A) documentation, including the system security plan, security control assessment, plan of action and milestones to support Authorization to Operate decisions.. Support Space Systems Command (SSC), Space Sensing Tools Application & Processing (TAP) Lab in Boulder, CO and integration support to the Overhead Persistent Infrared (OPIR) Battlespace Awareness Center (OBAC) at Buckley SFB, Aurora, Colorado.. Developing and sustaining enterprise RMF accreditation packages, from concept development and contract pre-acquisition through contractor design and accreditation. Experience: 10+ years of experience working Information Systems Security Manager (ISSM) and creating and maintain Assessment and Authorization (A&A) documentation, including the system security plan, security control assessment, plan of action and milestones to support Authorization to Operate decisions.
Cloud Site Reliability Engineer at Cornerstone onDemand in Boise, Idaho, United States Job Description We are seeking a highly skilled Site Reliability Engineer with 3 years of experience to join our dynamic team.. As a Site Reliability Engineer, you will play a key role in ensuring the availability, performance, and security of our cloud infrastructure.. + Implement best practices for cloud security, including identity and access management, encryption, and network security.. + Sound knowledge of networking concepts, including TCP/IP, DNS, and VPN. + Proficiency in automation and configuration management tools like Ansible, Jenkins, and Bitbucket.. + Thorough understanding of monitoring and alerting tools such as Nagios, New Relic, Grafana, and CheckMk. + Experience with distributed storage technologies such as NFS, Netapp, and Amazon S3, as well as dynamic resource management frameworks (e.g., Kubernetes).
The team is currently focused on increasing the adoption of the selected Enterprise Privileged Access management tool, CyberArk, to reduce the overall risk landscape at AIG. 7+ as a Privileged Access Management (PAM) hands-on practitioner, ideally with experience running an enterprise vault, such as CyberArk, with a strong track record of configuring and maintaining the solution. Extremely proficient using CyberArk AAM. Knowledge of common IT infrastructure technologies and concepts: Directories: LDAP, Windows Active Directory, Azure AD, Okta, etc. Databases: Oracle, SQL, PostgresMainframes: RACF, z/OSNetwork Protocols
Our employees have the experience and vision to meet the needs of savers, borrowers, and businesses in the 21st century.. Administer Microsoft Servers running SQL Server 2016-2022, Windows Server 2016/2022, Netapp and Nimble Storage Arrays, and Virtual environments (VMWare, Hyperv, and Citrix).. Minimum three years experience with MS Server 2016-2022, Active Directory, Storage Area Networks, and Network Attached Storage, Backup and Recovery Software (preferably Commvault), and MS Office Professional including Visio required.. , and Mobile Device Management, and support of iOS Devices with MS Intune/Mobile Aruba Wireless strongly preferred.. Network infrastructure Administration: Cisco routers, switches, and VPN concentrators, Palo Alto Firewall Content Filters, SolarWinds, Microsoft Systems Center.
Identity management solutions, including Microsoft Entra ID and on-premises Active Directory. Microsoft security and privacy products (Defender, Intune, Purview). Cloud-managed network devices (e.g., Cisco Meraki, Fortinet). End-user device management (e.g., Microsoft Intune, Autopilot). Strong understanding of cybersecurity principles, including firewalls, intrusion detection/prevention systems, and vulnerability management.