Resilience: Incident Response, Business Continuity, and Disaster Recovery planning; tabletop exercise design and facilitation. Third Party Risk Management: TPRM program assessments; TPRM program designs (processes, tooling); vendor risk assessments. Regulatory Compliance: Regulatory mapping and horizon scanning; compliance readiness and remediation activities; exam and reporting support. Expertise on systems pre- and post-implementation reviews, third-party risk management, systems development life cycle controls assessment, data analytics, disaster recovery planning, regulatory compliance, and IT project risk management, with a focus on building resilient, secure IT environments aligned with regulatory and operational standards. Professional certification (CISA, CISM, CISSP, CIPT, CIPP, CIPM)
If this describes the next step you want to take, Honeywells Building Automation business (BA) is seeking a Product Security Leader (PSL) for their Security and Access Solutions (SAS) strategic business unit.. You would report to the BA Cybersecurity Chief with matrix reporting to the SAS Vice President and Chief Technology Officer (VP/CTO).. Serve as the SAS VP/CTOs chief advisor on product security and privacy strategies and cyber risk management of their portfolio of products.. 6+ years familiarity securing Cloud, Mobile, and on-premises software including embedded Linux and RTOS software systems and installable Windows client and server software.. Understanding of DevSecOps.
Through accessible resources, thoughtful design, and a focus on developer success, we aim to bridge the gap between cutting-edge blockchain technology and real-world applications.. Manage MacOS environments , providing advanced troubleshooting and support.. Configure and manage security infrastructure, including firewalls, IDS/IPS, SIEM solutions, device management, and endpoint protection systems.. Understanding of cloud networking (e.g., AWS, Azure, Google Cloud) and hybrid network architectures.. Senior Staff Business Systems Analyst, Lead Management Mountain View, CA $147,000.00-$223,000.00 2 weeks ago
Identity Access Management Architecture: Lead the architectural vision, design, and development of comprehensive IAM solutions across the enterprise.. Threat Intelligence and Vulnerability Management: Stay abreast of emerging threats, vulnerabilities, and security trends.. Provide guidance on threat modeling and participate in vulnerability assessment and penetration testing activities.. Required Training/Certifications: Relevant security certifications (e.g., CISSP, CISM, CCSP) are highly desirable.. Holistic Health & Well-being programs
Senior Cyber Security Operator - Top Secret Clearance (SCI Eligible). Join to apply for the Senior Cyber Security Operator - Top Secret Clearance (SCI Eligible) role at JFL CONSULTING, LLC. (e.g., Security+ CE, CySA+, CCNA Security, GSEC).. (e.g., CEH, CySA+, GCIA, GCIH).. Preferred: Advanced certifications such as CISSP (Certified Information Systems Security Professional), OSCP (Offensive Security Certified Professional), or similar.
2+ years of experience in IT infrastructure management, application architecture, risk management, middleware technology, and IT project management. In addition, certain positions may also be subject to the requirements of FINRA, NMLS registration, Reg Z, Reg G, OFAC, the NFA, the FCPA, the Bank Secrecy Act, the SAFE Act, and/or federal guidelines applicable to an agreement, such as those related to ethics, safety, or operational procedures.. Senior Security Engineer, Identity and Access Management, AWS Identity Security SENIOR SECURITY ARCHITECT, TECHNICAL LEAD Sr. Security Engineer, AWS Security Risk and Compliance Washington, DC $129,000.00-$169,000.00 1 week ago. Senior Information Security Analyst/ISSO (TS/SCI with Poly) Fort Meade, MD $70,000.00-$74,000.00 2 weeks ago. Lead Principal Security Engineer TA2-13 HSEN SAP NS2 Sr. Security Automation Engineer Physical Security Architect, DC Security Solutions Engineering Information Systems Security Engineer (ISSE) SME (ISSO/Cybersecurity Architect - SME) Industrial Security Analyst - Security Engineer We’re unlocking community knowledge in a new way.
Resilience: Incident Response, Business Continuity, and Disaster Recovery planning; tabletop exercise design and facilitation. Third Party Risk Management: TPRM program assessments; TPRM program designs (processes, tooling); vendor risk assessments. Regulatory Compliance: Regulatory mapping and horizon scanning; compliance readiness and remediation activities; exam and reporting support. Expertise on systems pre- and post-implementation reviews, third-party risk management, systems development life cycle controls assessment, data analytics, disaster recovery planning, regulatory compliance, and IT project risk management, with a focus on building resilient, secure IT environments aligned with regulatory and operational standards. Professional certification (CISA, CISM, CISSP, CIPT, CIPP, CIPM)
Tenable Security Center, WebInspect, AppScanner, GITLAB, Atlassian JIRA, Atlassian Confluence, SharePoint, and BigFix.. Java, C#, Groovy, Python, Perl, Pup, JavaScript, Ruby, Bash, Powershell, Objective C, identifying vulnerabilities and removing malicious logic.. Deep experience with tools such as Tenable Security Center, Splunk, OWASP Zap, JIRA, and Atlassian collaboration platforms.. Certifications:Certified Ethical Hacker (CEH) or related advanced industry certifications.. Expertise in penetration testing, code vulnerability analysis, and zero-day threat mitigation strategies.
Familiarity with programming languages such as Golang, Rust, Typescript, Python or similar.. Strong technical background in security architecture, CI/CD enablement, cryptography, network security, and application security.. Good understanding of cloud computing technologies and security principles, particularly in AWS, Azure, or GCP environments.. Spark Capital and Avenir Growth Capital co-led the Series D funding round, with additional participation from a group of past investors including Snowflake Ventures and Sutter Hill Ventures.. Dog friendly office
CyberArk is seeking a visionary and strategic leader for a newly created team – CYBR Unit – that is CyberArk’s consulting arm specializing in threat research, Identity Security strategy, digital forensics, adversary simulation and business value assessment.. Design cybersecurity advisory strategy and methodology that are visionary and authoritative and engage with security and business leaders of large organizations, such as CIO, CISO, CTO and CPO leaders.. Partner with our incident response and threat assessment teams to ensure rapid and effective handling of security incidents, to engage in a proactive advisory and posture assessment capacity, and to recommend security solutions aligned with customer desired outcomes.. Area Vice President - Sales Mid-Atlantic. Regional Vice President (RVP) of Sales, FSI - US
We are seeking a highly skilled and experienced Network Architect with expertise in Arista Networks, Ciena Networks, and network automation to join our dynamic team.. Network Design & Architecture: Design and implement scalable, secure, and high-performance network solutions using Arista and Ciena technologies to support enterprise and service provider environments.. Technology Integration: Integrate Arista and Ciena platforms with existing network infrastructure, ensuring seamless interoperability and optimal performance.. Troubleshooting & Problem Resolution: Diagnose and resolve complex network issues across Arista and Ciena platforms, ensuring minimal downtime and maximum reliability.. Vendor Management: Collaborate with vendors (e.g., Arista, Ciena) to evaluate new technologies, manage procurement, and ensure timely delivery of solutions.
Job Title: Senior Information Security Engineer (Crowdstrike, Crible, Logscale). Required experience with Logging solutions such as Cribl, IBM QRoc, CrowdStrike Logscale.. Required experience with CrowdStrike EDR and Logscale.. CrowdStrike NG SIEM. CrowdStrike SIEM connectors
Demonstrated expertise in one or more specific cybersecurity areas including: Penetration Testing, Forensics, Reverse Engineering, Malware Analysis, Advanced Network Security, Policy, Risk, & Compliance. Annual Security and Fire Safety Report: This report is provided pursuant to the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act ("The Clery Act").. The report also includes institutional policies concerning campus security, such as policies concerning alcohol and drug use, crime prevention, the reporting of crimes, sexual assault, and other matters.. You can obtain a copy of this report in printed or alternate formats by contacting the Office of the Vice President for Student Affairs at vpsa.office@wwu.edu.. All new employees must comply with the immunization policy and show employment eligibility verification as required by the U.S. Citizen and Immigration Service before beginning work at WWU. A thorough background check will be conducted on all new hires and rehires, which includes a sexual misconduct background check.
Implement and manage firewall solutions from vendors like Cisco, Palo Alto, Fortinet, and Check Point, including configuring access control lists (ACLs), NAT, VPNs, and intrusion prevention systems (IPS).. Use network monitoring tools and packet analyzers (e.g., Wireshark, SolarWinds, Cisco DNA Center) to identify and address performance bottlenecks and failures.. Proficiency in configuring and managing firewalls (e.g., Cisco ASA/Firepower, Palo Alto, Fortinet, Check Point) and security features like IPS/IDS, NAT, and VPN.. Experience with network monitoring and analysis tools (e.g., Cisco Prime, DNA Center, Wireshark, SolarWinds).. Knowledge of network access control (NAC) solutions such as Cisco ISE or Aruba ClearPass.
Information Security Engineer – Cyber Threat Detection & Response Ryanair Labs are currently recruiting for a Information Security Engineer – Cyber Threat Detection & Response to join Europe’s Largest Airline Group!. The ideal candidate has a strong technical background in detection engineering, incident response and computer forensics.. Hands-on experience with SIEM (e.g., Microsoft Sentinel, Splunk), EDR (e.g., Defender, CrowdStrike). Experience with Azure/AWS cloud security logs and detection use cases. Certifications such as GCIA, GCIH, OSCP, or cloud security (AZ-500, AWS Security Specialty)
Network Engineer - Fortinet Focus Job no: 495074 Closes: 8/6/2025 4:55:00 AM Work Type: Staff Full-Time Locations: Baton Rouge, LA Categories: Information Technology As a Network Engineer with a specialization in Fortinet technologies, you will serve as a technical authority in the architecture, deployment, and lifecycle management of complex network environments.. Reporting directly to the Manager of Networking, your responsibilities will extend beyond day-to-day support to encompass strategic planning, network optimization, and advanced troubleshooting.. If you meet our qualifications and are passionate about advancing your career as a Network Engineer specializing in Fortinet products, we encourage you to apply and become a vital part of our innovative team!. Design and enforce enterprise-wide network security frameworks incorporating Fortinet firewalls, IPsec VPNs, UTM, and segmentation.. Monitor advancements in networking technologies (especially within the Fortinet ecosystem), contributing to roadmap planning and process improvements.
Skills/hands on technical proficiency in multiple cybersecurity-relevant technology disciplines (e.g. in-car networking, cryptography, CPU architectures, operating system internals, application security, digital forensics, incident response, environment hardening, architecture, embedded integration, wireless technologies etc.). Hardware: CPU architecture, Hardware Security Module / Trusted Platform Module (HSM/TPM), wireless technologies: cellular, Wi-Fi, Bluetooth (BT). CI/CD Tools: Jenkins, GitLab CI, Azure DevOps, CircleCI. Databases: SQL (e.g., PostgreSQL, MySQL), NoSQL (e.g., MongoDB, Cassandra), Data Lakes, and Data Warehousing solutions (e.g., Snowflake, Redshift). Infrastructure as Code (IaC): Terraform, AWS CloudFormation, Azure Resource Manager (ARM)
The ideal candidate has hands-on experience with Splunk (SIEM) and Qualys (vulnerability management), and is self-sufficient.. Strong understanding of security frameworks (e.g., MITRE ATT&CK, NIST, CIS).. Experience integrating Qualys with SIEM platforms or ticketing systems (e.g., ServiceNow).. Industries Government Administration. Staff Security Analyst, Threat Intelligence and Investigations Englewood, CO $100,000.00-$168,000.00 1 week ago
Led by its purpose to drive energy transition, Sembcorp delivers sustainable energy solutions and urban developments by leveraging its sector expertise and global track record.. We are seeking a dedicated and experienced OT Cybersecurity Engineer to safeguard the operational technology environments within our power generation and water treatment facilities in Singapore.. The OT Cybersecurity Engineer will be responsible for developing and implementing cybersecurity measures across operational technology environments within power generation and water treatment facilities.. The role involves monitoring OT systems for anomalies using cybersecurity tools (e.g., SIEM, Claroty, Nozomi), leading incident response efforts, and hardening ICS assets such as HMIs, PLCs, RTUs, and engineering workstations.. CCNA, GICSP, CISSP, CISM or SANS ICS/OT certifications.
BUSINESS INFORMATION SECURITY OFFICER - VP page is loaded BUSINESS INFORMATION SECURITY OFFICER - VP Apply locations Princeton, New Jersey Providence, Rhode Island Clifton, New Jersey Austin, Texas Jersey City, New Jersey time type Full time posted on Posted Yesterday time left to apply End Date: September 26, 2025 (30+ days left to apply) job requisition id R-775594 Who we are looking for. A Business Information Security Officer (BISO) who will be an integral part of a team responsible for ensuring the security of the business and functional teams in line with the company security policy and risk tolerance.. Champion the Information Security mandates acting as a liaison between Global Cybersecurity (GSC) and the business units (BU). Hands-on experience or working knowledge in multiple technical & security domains: Threat modeling, Cloud security, Artificial Intelligence, Automation, IAM, firewall, network, secure solution design, VPN, encryption, vulnerability & code review, Windows/Unix/Linux server security, SSO, MFA, industry security framework & standards, various protocols (e.g., TCP/IP, UDP, MPLS, SSL/TLS, SSH, HTTPS, FTP, RDP, ICA, BGP, LDAP, etc.). Preferred: Cloud Security, AI, CRISC, CISM, CISA or similar certifications