Position # : PennDOT - TAS2 A4 SC2 (Security Vulnerability Team Lead) (760722). 5 Years of Extensive experience with Tenable Security Center a must.. Department : PennDOT. This candidate serves as the Security Vulnerability Team Lead within the Information Security Office of Pennsylvania’s Infrastructure and Economic Development IT Delivery Center (IED DC) which includes the Department of Transportation (PennDOT), PA Emergency Management Agency (PEMA) and the Department of Community and Economic Development (DCED).. · Primary role is as the subject matter expert (SME) for the management and administration of the delivery center’s vulnerability management program.
CISSP CompTIA Security CySA CEH or GIAC certifications (e.g. GCIH GCIA) Splunk Core Certified User / Power User Cisco Certified CyberOps Associate.. Experience in other tools and protocols as applicable such as Nessus Endgame CrowdStrike Gray Noise Shodan Bacnet MODBus SCADA systems and PCAP.. Knowledge of threat intelligence frameworks (e.g. MITRE ATT&CK) and vulnerability management practices.. GIAC Penetration Tester (GPEN). ArcGIS,Intelligence Community Experience,GIS,Python,Computer Networking,Data Collection,Intelligence Experience,R,Relational Databases,Analysis Skills,Data Management,Application Development
At Resilience, we're creating a new category that integrates cybersecurity, cyber insurance, and cyber risk management.. Our integrated cyber risk solutions connect risk quantification software, cybersecurity experts, and A+ rated cyber insurance, all purpose-built for middle and large organizations.. We are a cybersecurity company, a Cyber and Tech E&O-focused MGA, a fintech startup, and a data science powerhouse, all purposefully built into one.. As the program scales, it will increasingly involve the enablement and automation of Threat Hunting, GRC, and Security Architecture workflows.. Experience with Endpoint Detection and Response (EDR) such as Crowdstrike.
Intrepid Solutions is building a cyber team for new work at Fort Meade, MD, and Augusta, GA.. The Enterprise Architect will develop and maintain business, systems, and information processes to support enterprise mission needs; develops information technology (IT) rules and requirements that describe baseline and target architectures.. Knowledge of computer networking concepts and protocols, and network security methodologies. Knowledge of network access, identity, and access management (e.g., public key infrastructure [PKI]). Active Top Secret / SCI. TS/SCI required upon application for initial consideration.
As a Cyber Security engineer. Support innovation and digital transformation across the Laboratory as a cybersecurity expert.. These include AWS, Azure, Azure AD and Okta Identity Management.. Certifications such as CISSP, CISSP-ISSEP, SANS GIAC Security Essentials, SANS GIAC Cloud Security Essentials, or GIAC Public Cloud Security. The Johns Hopkins University Applied Physics Laboratory (APL) brings world-class expertise to our nations most critical defense, security, space and science challenges.
Add to Favorites Senior Engineering Project Manager, Security, Apple Services Engineering (ASE). As a Sr. Security Engineering Program Manager in ASE, you are both a technical and functional expert in the world of securing enterprise servers and services at scale.. This role will work directly with senior engineering leaders to design, build, and deliver industry leading security designs such as Private Cloud Computing.. Expertise in hardware security root of trust, TPM/SEP, or hardware isolation models.. At Apple, base pay is one part of our total compensation package and is determined within a range.
We are seeking a Network/System Administrator I to help contribute to our success and help us solve problems with innovation through intelligence.. The position will provide "day-to-day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.. Toolkits, SEIMs, Logrhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e.. SE Linux extensions to RHEL, PitBull, AppArmor, and Sentris),video teleconferencing/VOIP, Oracle/MS SQL database security, and Apache/IIS Web server security. Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies to include communication security (COMSEC) integration
Technical Knowledge & Expertise: In-depth knowledge of IP/MPLS routers and switches, including vendors such as Nokia, Cisco, Juniper, Brocade, and others.. Configuration & Troubleshooting: Configure, optimize, and troubleshoot Nokia, Cisco, Brocade, and Juniper IP/MPLS routers and switches, ARRIS Cable Modem Termination Systems, and Palo Alto Networks firewalls, ensuring efficient network performance.. Cisco CCNA, Nokia NRS-I, Juniper JNCIA or equivalent Cisco CCNP, Nokia NRS-II, Juniper JNCIP or equivalent, SCTE DEP Cisco CCIE, Nokia SRA, Juniper JNCIE or equivalent, SCTE IPEP. Cisco CCNA, Nokia NRS-I, or equivalent. Cisco CCIE, Nokia SRA, or equivalent, SCTE IPEP
Intelligence & Security provides services and products to the Department of Defense, the intelligence community, federal law enforcement officials, and troops deployed around the world.. Responsible for supporting adherence to all aspects of a rigorous Risk Management Framework (RMF) compliance program as stipulated by NISPOM/DAAPM, JSIG, STIGs and associated NIST publications.. Obtain and maintain Authority to Operate (ATO) approvals by adhering to the Risk Management Framework (RMF).. Support cybersecurity efforts throughout the RMF process to include the development and management of System Security documentation, Plans of Action and Milestones (POA&Ms), assessing and auditing systems security controls, and continuous monitoring of controls.. AWS Solution Architect Professional
The Network Analyst plans, coordinates, and executes installation and configuration of new network nodes (local and wide area) including hardware or software, as well as is responsible for the monitoring and maintenance of those and existing networks.. Design and implement network architectures, including LANs and WANs, and LAN-to-LAN and WAN-to-WAN communications and connections in accordance with company's architectural guidelines and network standards to provide a suitable climate to run production applications and to allow telecommunications throughout the company worldwide.. Cisco Wireless, Firewall and VPN infrastructure maintenance and installation, 1 year experience. Incumbent must be able to work long hours, including nights and weekends, especially during busy time periods (e.g., project implementation, IT Security incident investigation, etc.). Cisco CCNA but, CCNP is preferred.
Strategic Business Systems is seeking a Senior Network Engineer to join our team of qualified, diverse individuals.. Required Security Clearance: Top Secret/SCI (willing to sit for CI Poly). May supervise other network support and client server specialists and plan, coordinate, and implement network security measures; and will provide leadership/mentorship to junior & mid level network engineers.. The overarching INFOSEC and COMSEC security requirements for the Agency network add to the complexity of these positions.. The candidate selected for hire must possess an active Top Secret/SCI security clearance, per client security requirements.
Demonstrates advanced and broad knowledge and expertise in the audit field, information technology auditing, including the areas of logical security, network security, change management, problem management, physical security, disaster recovery and business continuity planning, data privacy, and application controls.. Prepares the initial draft of audit reports or SOX control testing reports that includes an overall rating or the assessment of the effectiveness of internal controls and that will be presented to the Management Audit Committee and the Audit Committee of the board of directors.. Six to 10 years of relevant auditing, controls testing, or information systems experience, a portion of which was obtained in a public accounting firm, insurance company, or equivalent experience.. Certified Information Systems Auditor (CISA) designation or a CPA with a Certified Information Technology Professional (CITP) certification.. We aspire to see people for what they bring to our corporate culture by supporting an inclusive work environment, including an emphasis on a healthy work-life balance, development opportunities, and a casual dress code.
The Cloud Security - Architecture - Principal will leverage broad technical knowledge of cloud security best practices of key public cloud offerings of providers such AWS, Azure, and GCP to establish secure design patterns, to architect integrations among cloud and/or on-premises infrastructures.. 5+ Years of experience in Cyber Security field as an Information Security Architect or Cloud Security Architect. 4+ years of experience in AWS as a Cloud Security Architect/Engineer and must be certified in the cloud technologies/infrastructures.. Preferred industry recognized experience in security (e.g., CISSP, CCSK, CISA, CISM, CEH). Work on assessments of compliance and standards including and not limited to NIST, FedRAMP, FIPS, etc.
Employee Resource Groups and Programs offered include the Young Professionals Group, Women at Wade Trim, Diversity, Equity and Inclusion, Professional Development, Leadership Development, Rotation Program, Mentor Program, Sustainability Program, and Wellness Program.. Secure Windows operating systems via Microsoft Endpoint Manager & CrowdStrike Falcon. Operating knowledge of Windows 10 Operating Systems, Windows Server, and Kali Linux is required. Knowledge of coding/scripting languages such as Python, Perl, PowerShell, Bash, etc., is required. Professional Certifications in CompTIA Security+, CompTIA Network+, and CompTIA CySA+ a plus
The position requires a broad foundation of IT/Security architectural experience with an understanding of Internet, server/storage technologies, cloud services/integrations are a must.. The candidate will be responsible for designing complex and innovative solutions addressing vulnerability detection, threat and risk analysis, network intrusion, securing technology assets across the application, infrastructure, cloud and data tiers and development/implementation of vulnerability mitigation strategies.. Identifies software weaknesses that could lead to exploitable vulnerabilities such as SQL injection, cross-site scripting, cross-site request forgery, buffer overflows, use of hard-coded passwords, weak encryption, sensitive data.. Seasoned professional with detailed technical knowledge of techniques, standards and state-of-the art capabilities for authentication and authorization, applied cryptography, security vulnerabilities and remediation.. Participate in the Company’s emergency management processes, cyber security and storm plans.
The Senior Cyber Security Analyst must have a deep understanding of information security protocols and a passion for protecting Community First Health Plans Inc. (Community First) healthcare data.. Must possess one or more of the following certifications: CISSP, CASP+, CRISC, CISA. Healthcare experience is highly desirable.. Must have a functional understanding of federal/state regulations and compliance mandates, including but not limited to HIPAA, HITRUST, SOC, and other regulatory audits.. MITRE ATT&CK experience in building threat detections, performing threat hunting and/or conducting incident response.. Five years minimum with below technologies or areas: Network Security: IDS/IPS, NGFW, NGAV Operating Systems: Windows, Linux, macOS. Security: EDR/XDR, SIEMs, Data Loss and Prevention (DLP), Vulnerability Scanning and Assessment tools.
Prefer to hire in our Austin location for a hybrid schedule, 3 days a week in office.. eBay is looking for outstanding developers with a security background to join our Cloud Security Team. The ideal candidate will excel at building and maintaining security products in the cloud security domain.. js, Vue.js, Ember.. Experience in Identity Governance and knowledge on general Security and IAM (Identity and access management) domains are helpful.. Experience building and deploying applications on Kubernetes and any hands-on experience with Kubernetes and Istio.
- Job Title: Salesforce Developer/System Admin. - Task Management: Task Accomplishment Plan and Monthly Status Report. - System Security Plan: Information Gathering, Identity and Access Management, Vulnerability Scanning & Monitoring Requirements, Log Management Plan. - Implement Access control Requirements and Remediation work as directed by Client.. - Ongoing Vulnerability Scanning: Identify Scanning Tool Alternatives, Implement Selected Scanning Tool, Conduct Initial Scans and Train Client Resources.
Are you ready to be part of a cutting-edge cybersecurity project that will make a huge impact on the security of DOD/Intel community?. Experience with ICS/SCADA/IOT devices and software, computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering.. Experience in reducing risk to space systems, fixing systems of highest importance, hardening systems in development, and crypto resiliency. Top Secret SCI w/PolygraphThis position is part of our Federal Solutions team.. Parsons equally employs representation at all job levels for minority, female, disabled, protected veteran and LGBTQ+.
Manages Microsoft Azure environment, Microsoft Exchange/Outlook, Microsoft Office 365 tenants and Microsoft Defender.. Manages Mobile Device Management systems such as Microsoft Intune.. Ensures security through access controls, backups and firewalls under the direction of the Technical Director (TD) and the Chief Information Security Officer (CISO).. Must have experience with teleconferencing tools, contact centers (UCCS, UCCX, T-Mobile or similar). Telephony/Teleconferencing technologies (UCCS, UCCX, Dialpad or similar).