If this describes the next step you want to take, Honeywells Building Automation business (BA) is seeking a Product Security Leader (PSL) for their Security and Access Solutions (SAS) strategic business unit.. You would report to the BA Cybersecurity Chief with matrix reporting to the SAS Vice President and Chief Technology Officer (VP/CTO).. Serve as the SAS VP/CTOs chief advisor on product security and privacy strategies and cyber risk management of their portfolio of products.. 6+ years familiarity securing Cloud, Mobile, and on-premises software including embedded Linux and RTOS software systems and installable Windows client and server software.. Understanding of DevSecOps.
Job Title: Lead Tier 2 SOC Analyst. Provides incident response process, threat intelligence review, incident investigation and reporting.. Collect, review, and interpret threat intelligence from internal and external sources (e.g., open-source intelligence, commercial feeds, or industry reports) to identify potential threats and vulnerabilities.. Communicate relevant threat intelligence findings to Tier 1 and Tier 3 teams, as well as other stakeholders, to improve situational awareness and preparedness.. Guide and mentor Tier 1 and Tier 2 analysts, providing training on incident response techniques, tools, and best practices.
This leader will specialize in one of the following domains: Zero Trust (including Identity & Access Management), Cloud Security, Network Security, Security Operations & Response, or Strategy & GRC. The role is pivotal in shaping client engagements, building domain-specific practices, and delivering high-impact security transformation programs. Domain Ownership: Lead one of the five security pillars, with deep expertise in either Zero Trust, IAM, Cloud Security, Network Security, Security Operations, or GRC. Strong understanding of regulatory frameworks (e.g., NIST, ISO, SOC, HIPAA, PCI DSS). Experience with security technologies such as Okta, SailPoint, Palo Alto, Splunk, Azure/AWS/GCP security services. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations.
This leader will specialize in one of the following domains: Zero Trust (including Identity & Access Management), Cloud Security, Network Security, Security Operations & Response, or Strategy & GRC. The role is pivotal in shaping client engagements, building domain-specific practices, and delivering high-impact security transformation programs.. Domain Ownership : Lead one of the five security pillars, with deep expertise in either Zero Trust, IAM, Cloud Security, Network Security, Security Operations, or GRC. Strong understanding of regulatory frameworks (e.g., NIST, ISO, SOC, HIPAA, PCI DSS).. Experience with security technologies such as Okta, SailPoint, Palo Alto, Splunk, Azure/AWS/GCP security services.. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations.
Senior Cyber Security Operator - Top Secret Clearance (SCI Eligible). Join to apply for the Senior Cyber Security Operator - Top Secret Clearance (SCI Eligible) role at JFL CONSULTING, LLC. (e.g., Security+ CE, CySA+, CCNA Security, GSEC).. (e.g., CEH, CySA+, GCIA, GCIH).. Preferred: Advanced certifications such as CISSP (Certified Information Systems Security Professional), OSCP (Offensive Security Certified Professional), or similar.
Resilience: Incident Response, Business Continuity, and Disaster Recovery planning; tabletop exercise design and facilitation. Third Party Risk Management: TPRM program assessments; TPRM program designs (processes, tooling); vendor risk assessments. Regulatory Compliance: Regulatory mapping and horizon scanning; compliance readiness and remediation activities; exam and reporting support. Expertise on systems pre- and post-implementation reviews, third-party risk management, systems development life cycle controls assessment, data analytics, disaster recovery planning, regulatory compliance, and IT project risk management, with a focus on building resilient, secure IT environments aligned with regulatory and operational standards. Professional certification (CISA, CISM, CISSP, CIPT, CIPP, CIPM)
Demonstrates deep understanding of cybersecurity concepts, technologies, and industry trends, including cloud security, network security, zero trust, and threat intelligence. Working knowledge of Bluesky, Threads, TikTok, Reddit, and other social platforms. Familiarity with dashboards such as Google Looker Studio, Tableau, etc.. Relevant experience working in a B2B, cyber, content marketing, or digital communications agency environment at a Senior Campaign Manager or Campaign Director level. We provide equal employment opportunities to all employees and applicants for employment and prohibit discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, reproductive health decisions and family responsibilities, qualifying acts of violence, or any other characteristic protected by federal, state or local laws.
Manages SOC staff to perform monitoring, threat hunting, analysis, resolution, and reporting of security incidents and vulnerabilities across all IT Infrastructure systems and applications.. Collaborate with internal and external stakeholders for threat intelligence sharing.. Continuously update and test the incident response plan to ensure preparedness for emerging cyber threats.. 10 years experience in a lead role managing major data center or IT Security Operations Center supporting a broad range of IT capabilities.. Relevant industry certifications, including, but not limited to GIAC Security Operations Manager (GSOM), GIAC Certified Incident Handler (GCIH), GIAC Certified Detection Analyst (GCDA), GIAC Certified Intrusion Analyst (GCIA), EC-Council Certified Incident Handler (ECIH) or other relevant certifications.
Experience developing and tuning detections using logs, telemetry, and threat intelligence.. Strong understanding of attack techniques (MITRE ATT&CK framework) and incident response methodologies.. Experience with cloud security monitoring (AWS, Azure, GCP).. Certifications such as GIAC (GCDA, GCIH, GCFA), OSCP, CISSP, or relevant credentials.. While some positions are available as fully remote, we’ve found that we’re at our best when we’re purposely together on a regular basis, typically three days each week.
Create and maintain detection content, ensuring it is up-to-date with the latest threat intelligence.. In-depth knowledge of threat hunting methodologies and experience working as a threat hunter.. Certifications related to cyber security and detection engineering (e.g., GIAC Certified Detection Analyst, Splunk Certified User).. Familiarity with other security information and event management (SIEM) tools and technologies.. Security Operations Center (SOC) Analyst Security Operations Center (SOC) Analyst - Mid Washington, DC $120.00-$125.00 2 weeks ago
Brands, the Senior Director of Security Operations will report directly to the Global CISO and lead the enterprise-wide function responsible for proactive threat detection, incident response, security monitoring, and operational resilience.. Lead a team of ~30 [SE1] global professionals across SOC operations, incident response, threat intelligence, vulnerability management, and engineering.. Oversee the performance and evolution of SIEM, SOAR, EDR/XDR, vulnerability scanning, and threat intel platforms.. Extensive experience with security platforms and frameworks including SIEM, SOAR, EDR/XDR, MITRE ATT&CK, NIST CSF, and cloud-native security tooling (AWS, Azure, GCP).. We have the four distinctive, relevant and easy global brands –KFC, Pizza Hut, Taco Bell and The Habit Burger Grill
Tenable Security Center, WebInspect, AppScanner, GITLAB, Atlassian JIRA, Atlassian Confluence, SharePoint, and BigFix.. Java, C#, Groovy, Python, Perl, Pup, JavaScript, Ruby, Bash, Powershell, Objective C, identifying vulnerabilities and removing malicious logic.. Deep experience with tools such as Tenable Security Center, Splunk, OWASP Zap, JIRA, and Atlassian collaboration platforms.. Certifications:Certified Ethical Hacker (CEH) or related advanced industry certifications.. Expertise in penetration testing, code vulnerability analysis, and zero-day threat mitigation strategies.
Valitana is a rapid growing FinTech startup providing cutting-edge SaaS solutions for institutional investors.. Valitana is seeking a highly motivated and versatile individual to serve as our DevOps, Information Security, and IT Support Lead. This hybrid role is ideal for a technical professional with a passion for operational excellence, cybersecurity, and hands-on support.. Manage security infrastructure including access control, penetration testing, and compliance.. Hands-on experience with device management tools such as MS Intune.. Employees also receive a comprehensive benefits package that includes an employer matched retirement plan, healthcare with medical, dental, vision, telemedicine, and PTO.
Identity Access Management Architecture: Lead the architectural vision, design, and development of comprehensive IAM solutions across the enterprise.. Threat Intelligence and Vulnerability Management: Stay abreast of emerging threats, vulnerabilities, and security trends.. Provide guidance on threat modeling and participate in vulnerability assessment and penetration testing activities.. Required Training/Certifications: Relevant security certifications (e.g., CISSP, CISM, CCSP) are highly desirable.. Holistic Health & Well-being programs
We are looking for a skilled Information Security Engineer to lead and participate in security incident response activities and enhance our cybersecurity posture.. Conduct thorough investigations and digital forensics to identify causes and recommend future mitigation strategies.. 5+ years of experience developing mainframe security solutions using RACF, REXX, zSecure, CARLa, and other tools.. 5+ years of experience with Resource Access Control Facility (RACF), including issuing commands and performing diagnostics.. 5+ years of experience with Job Control Language (JCL) and Time Sharing Options (TSO).
Cybersecurity Operations: Support the enhancement of capabilities for cybersecurity operations, including threat detection, incident response, and vulnerability management.. Certifications: CompTIA Security+, AWS Certified Solutions Architect are a plus.. Familiarity with cloud platforms (AWS, Azure, Google Cloud) and an interest in learning about Kubernetes or other container orchestration platforms.. Certifications: Entry-level certifications such as CompTIA Security+ or AWS Certified Cloud Practitioner are beneficial.. DevOps Knowledge: Basic understanding or interest in DevOps practices, including CI/CD pipelines and infrastructure as code (IaC).
Juris Doctorate (JD) degree with 4 to 6 years of experience as an attorney, preferably in a financial, insurance or regulatory environment.. Work with TransUnions Insider Threat, Vulnerability Management, and Incident Response teams to address, manage, and resolve threats and vulnerabilities.. This is a hybrid position and involves regular performance of job responsibilities virtually as well as in-person at an assigned TU office location for a minimum of two days a week.. Spousal, domestic partner, and other eligible dependent coverage is available on select health and welfare plans.. Regular, fulltime non-sales positions may be eligible to participate in TransUnions annual bonus plan.
Conduct Federal Information Security Modernization Act (FISMA) and Assessment and Authorization (A&A) audits, as well as supporting Command Cyber Readiness Inspections efforts (CCRI).. Perform all steps of the Risk Management Framework (RMF) process, from categorization, control selection, implementation and analysis, authorization, and continuous monitoring and assist in tenant onboarding and modernization of systems to NCE.. Utilize knowledge of server and database operating systems (Windows Server, Windows 10, Linux, Kubernetes, Docker, SQL, etc.). , network and security devices (switches, routers, firewalls, IDS/IPS such as HBSS, VPNs), and cloud technologies (AWS highly preferred) to assess Change Control Board (CCB) proposals for cybersecurity impact and make recommendations on adoption.. FBI Special Agent: Cybersecurity/IT Expertise Arlington, VA $99,461.00-$128,329.00 1 week ago
The Information Systems Security Manager (ISSM) will perform duties for the Optiv+ClearShark information systems environments, both unclassified and classified, will own and manage the information system security program for Optiv + ClearShark and will report directly to the Senior Corporate Counsel.. The ISSM will assist in the development of procedures and runbooks; act as the subject matter expert in a variety of cybersecurity domains such as Identity and Access Management, Vulnerability Management, Endpoint Protection, Incident Response activities, etc.. Lead third-party risk management tasks such as conducting risk assessments for vendors and services.. Work in partnership with the Facility Security Officer (FSO) to meet NISPOM and NISP requirements.. Must have experience with several of the following: Microsoft, O365, Active Directory, Splunk, ServiceNow, SailPoint, Qualys, CASB, Prisma Access, Tenable, XSIAM, or other cybersecurity tools.
2+ years of experience in IT infrastructure management, application architecture, risk management, middleware technology, and IT project management. In addition, certain positions may also be subject to the requirements of FINRA, NMLS registration, Reg Z, Reg G, OFAC, the NFA, the FCPA, the Bank Secrecy Act, the SAFE Act, and/or federal guidelines applicable to an agreement, such as those related to ethics, safety, or operational procedures.. Senior Security Engineer, Identity and Access Management, AWS Identity Security SENIOR SECURITY ARCHITECT, TECHNICAL LEAD Sr. Security Engineer, AWS Security Risk and Compliance Washington, DC $129,000.00-$169,000.00 1 week ago. Senior Information Security Analyst/ISSO (TS/SCI with Poly) Fort Meade, MD $70,000.00-$74,000.00 2 weeks ago. Lead Principal Security Engineer TA2-13 HSEN SAP NS2 Sr. Security Automation Engineer Physical Security Architect, DC Security Solutions Engineering Information Systems Security Engineer (ISSE) SME (ISSO/Cybersecurity Architect - SME) Industrial Security Analyst - Security Engineer We’re unlocking community knowledge in a new way.