The Sr. Cyber Security Architect in collaboration with VP Enterprise Architecture, under the general direction of the VP of Infrastructure & Security, will define the architecture and technical vision and strategy of cloud and on-premise security controls across the organization.. Collaborates to establish multi-cloud cybersecurity architecture with a focus on proactive threat detection, security control enforcement and incident response.. Certifications should include CCSP, CISSP, CCSK, and other cloud vendor specific certification.. Progressive information security experience across various information security / information technology risk management domains such as but not limited to: application security, infrastructure security, identity and access management, vulnerability and cyber threat management, security architecture.. Experience with other cloud service providers such as AWS or Azure across SPI (e.g. SaaS, PaaS, IaaS) models and environments (Public, Private, Hybrid).
A Korean IT services and consulting company specializing in providing digital transformation (DX) services operating in the US market to enhance business efficiency and innovation.. With a focus on sustainability and smart technology, the company aims to empower organizations in their digital journeys, fostering growth and competitiveness in an increasingly digital landscape.. We are seeking a skilled Network Administrator to oversee the planning, design, implementation, and maintenance of network and telephony infrastructure.. Certifications Cisco certifications (CCNA, CCNP, CCSP) required. Familiarity with QoS technologies and Cisco VoIP/Unified Communications products
Britive is at the forefront of the emerging cloud security industry with the only modern privileged access management platform that provides unified Privileged Access Visibility, Dynamic Privilege Management and Secrets Governance across cloud infrastructures, platforms & SaaS.. Our patent-pending technology is deployed at several large and Fortune 500 customers and we have repeatedly ranked among the hottest Cloud Security startups.. Backed by top-tier VCs and led by seasoned cybersecurity and cloud industry veterans, Britive combines innovation, expertise, and a strong vision for securing the cloud.. Tech Savvy: Proficient with productivity tools (e.g., Outlook, O365, web conferencing), CRM systems (e.g., Salesforce, Hubspot), and prospecting platforms (e.g., ZoomInfo, Outreach).. We are fully remote (US only, other areas are subject to review).
UCLA is consistently ranked among the top institutions nationally for research funding, having generated $1.7 billion in research grants and contracts in the last fiscal year alone.. The Senior Information Security Compliance Analyst will lead the charge in safeguarding UCLA's information technology systems and data through effective governance practices.. This Analyst will play a vital role in cultivating a proactive cyber risk management culture to fortify the university's cybersecurity posture.. The Senior Information Security Compliance Analyst will positively impact UCLA's operations and culture by protecting University stakeholders' information and data in service of the institution's academic mission.. CISSP, CISA, Security+, CEH, CISM, or equivalent certification.
Director, IT Security and Compliance. The Director, IT Security and Compliance will lead the strategic development and implementation of robust security programs and compliance frameworks for our organization.. By collaborating with cross-functional teams, you will design and refine risk management processes, oversee internal and external audits, and champion best practices in IT security.. Risk Management: Oversee the identification, assessment, and mitigation of IT security risks, including the execution of vulnerability assessments and threat analyses.. Incident Response: Lead the development and execution of incident response and disaster recovery plans, coordinating with cross-functional teams to minimize the impact of security breaches.
In-depth knowledge of DoD's RMF.. Expert knowledge of NIST, DoD, and Army applicable Security Regulations.. Risk Management Framework (RMF), ATO eMASS, POAM. Must have an active Top Secret clearance.. The Family of Companies (FOCs) includes Ke`aki Technologies, Laulima Government Solutions, Kpono Government Services, and Kpili Services, Po`okela Solutions, Kkaha Solutions, LLC, and Pololei Solutions, LLC. Alaka`ina Foundation activities principally benefit the youth of Hawaii through charitable efforts which includes providing innovative educational programs that combine leadership, science & technology, and environmental stewardship.
Team Carney, a dynamic performance solutions company, is seeking a Lead Cloud Engineer.. Open to occasional travel to Fort Meade, MD or Letterkenny Army Depot Chambersburg, PA for site and system access. Must have one or more of the following certifications: Cloud+, Security+, Network+, or CCNA. Must have one or more of the following certifications: VCP, AWS Solutions Architect, or MCSE. Knowledge of technology for implementing security controls, including access control, privileged access management, data security, network security, data loss prevention, Cloud security, vulnerability management, configuration management, privacy, and audits
The Senior Network Engineer is responsible for managing the provisioning, configuration, operation, and maintenance of hardware, software, and associated network infrastructure.. Work with RF and barcode technologies, including mobile scanners and label printing solutions.. Certifications: Required: Cisco CCNP (Data Center or Enterprise), Juniper JNCIP (Data Center or Enterprise), Palo Alto PCNSA Preferred: A+, Network+, Cisco CCIE, Juniper JNCIE (Data Center or Enterprise), Palo Alto PCNSE, AWS Advanced Networking, Azure Network Engineer Associate, VMware Certified Advanced Professional - Network Virtualization. Industry-specific experience in 3PL, warehousing (WMS), transportation (TMS), or fulfillment is a plus.. Experience with warehouse systems, portable scanners, and label printing equipment is preferred.
Implement secure network architectures, including Virtual Private Clouds (VPCs), subnets, routing tables, and network access control lists across AWS, Azure, and other cloud platforms.. Configure and manage cloud networking services for secure connectivity between on-premises and cloud environments, such as AWS Direct Connect, Azure VPN Gateway, and transit gateways.. Knowledge of government network security standards and compliance requirements (e.g., FedRAMP, FISMA).. Experience with automation tools (e.g., Python, Terraform) for network configuration and management. familiarity with NIST - 171 security framework, Azure Defender, AWS security hub, Guarduty, Macie.
The Senior Cisco Network Engineer is a pivotal role, providing operational knowledge and support to the Command-and-Control Support System (C2S2) networks.. Responsibilities include maintaining, installing, updating, and securing network environments using a wide range of Cisco products, such as Cisco IOS, routers, Layer 2 switches, Access Layer switches, ISE, Firepower, and ACI. The engineer will also manage other critical network components like F5, Palo Alto, VMware NSX, SPLUNK, and ServiceNow. This role requires leading projects with minimal oversight, ensuring all network devices and applications are patched, secure, and operating efficiently.. The Senior Cisco Network Engineer will perform DISA Security Technical Implementation Guide (STIG) validations, manage cable systems, develop workflows for Cisco-based assets, and utilize ACAS to monitor security postures.. Must possess ONE of the following 8570 IAT-II certifications: CCNA Security.. CySA+ (Cybersecurity Analyst).
We are looking for a highly skilled Senior Network and Cybersecurity Engineer to assess and strengthen the security and resilience of networks and systems supporting U.S. government and military missions.. Work collaboratively to address complex security challenges while maintaining a proactive approach to threat mitigation.. Relevant Experience : Cybersecurity, network security, vulnerability analysis, reverse engineering, malware analysis, protocol and network analysis, programming, debugging, or working with diagnostic tools like SNORT or traceroute.. Preferred : Leadership experience; certifications such as CEH, CISSP, CISA, or ISSEP.. If you're passionate about cybersecurity, thrive in dynamic environments, and enjoy crafting innovative solutions, we want you on our team.
JSP is seeking a highly skilled Cyber Security Engineer to design, implement, and maintain robust security measures across our IT infrastructure.. The ideal candidate will be responsible for identifying vulnerabilities, performing penetration testing, implementing security controls, and ensuring compliance with industry standards, as well as providing security training, monitoring incidents, and offering technical support.. Firewall technologies (Cisco, Fortinet).. Patch management (SCCM, Intune Co-managed).. Industry certifications such as: CISSP, CISM, CEH, OSCP or similar.
Lead initiatives around application security, cloud security, and data protection.. Own vulnerability management, penetration testing, and incident response across the product.. Unlimited PTO - take the time you need to come to work feeling great!. At Aircall, we believe diversity, equity and inclusion - irrespective of origins, identity, background and orientations - are core to our journey.. We will constantly challenge ourselves to make sure that we live up to our ambitions around diversity, equity and inclusion, and keep this conversation open.
🎖️ FOUNDED BY USAF VETERANS in 2007, we are proud to be a Service-Disabled Veteran Owned Small Business.. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.. Perform with little to no oversight Lead IT ops team on day-to-day management and operations of Networks and implement capabilities vetted through Cybersecurity, ISSE and higher headquarters to maintain JSIG/RMF Authority to Operate and maintain Continuous Monitoring tools and processes Manage COTS & GOTS products to collect, display and remediate a variety of automated system security and system operations/performance functions and metrics.. Microsoft Windows Server, Active Directory Red Hat Enterprise Linux servers, MS Hyper- V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS. Multiple considerations are taken into account when determining the final salary/hour rate, including but not limited to, Contract Wage Determination, education and certifications, relevant work experience, related skills and competencies, as well as Federal Government Contract Labor categories.
Ensure the data center operates at peak efficiency, including environmental controls, power distribution, and data connectivity.. Coordinate incident response efforts in the event of a security breach or cyber-attack.. Experience: Minimum of 5-7 years of experience in data center operations, with at least 3 years in a managerial role.. Technical Skills: Proficiency in data center infrastructure management, network and server administration, server virtualization technologies, data storage solutions, and cybersecurity tools and practices.. Good working knowledge of VMWare, Storage management, and Windows Server administration.
Your expertise in maturity models like DSOMM (DevSecOps Maturity Model), CI/CD pipelines, and vulnerability management tools will be crucial in transforming our security landscape.. Manage vulnerability scanning tools (e.g., Tenable, Qualys, Sonar, Snyk) and prioritize remediation efforts.. Train and mentor developers on secure coding, threat modeling, DevSecOps, and vulnerability management best practices.. Hands-on experience with DevSecOps tools (SAST, DAST, SCA, container security, IaC security).. Experience with implementing maturity measurement frameworks such as DSOMM (DevSecOps Maturity Model) or BSIMM (Building Security in Maturity Model) in an enterprise setting.
Collaborate with our Governance Risk and Compliance (GRC) team to help develop enterprise security standards, guidelines, and policies.. Design, build, maintain, tune, and enhance the effectiveness of our Enterprise Security controls in a wide range of security domains, including: Endpoint Detection and Response (EDR)Email SecurityRansomware ResilienceData Loss Prevention (DLP)/Insider RiskConditional AccessVendor/Business Process Outsourcing (BPO) SecurityDevice Posture and Attestation, Shadow ITThreat and Vulnerability Management (TVM)Identity and Access Management (IAM)Public Key Infrastructure (PKI). Perform risk assessments and security assurance (threat modeling, code review as necessary) on a range of systems that support Grammarly’s business operations: Operating Systems and commercial/open-source desktop applicationsInternally developed Enterprise Infrastructure ServicesThird-Party Software as a Service (SaaS) solutionsNetwork Infrastructure (ZTNA, CASB, VPN). Has working experience in Security Assurance: Penetration Testing, Code Review, Threat Modeling.. Excellent health care (including a wide range of medical, dental, vision, mental health, and fertility benefits)
As we expand our digital presence, we're seeking a talented Full-Stack Web Developer to spearhead our e-commerce and outreach initiatives.. Adopt modular, flexible frameworks (React, Node.js, Python/Django) to accommodate rapid scalability and evolving business needs.. Develop UI/UX design to reinforce brand identity, ensuring visually cohesive and user-centric interfaces.. Mastery of HTML5, CSS3, any JavaScript framework like React/Angular/Vue, and responsive design principles are a must.. Expertise in SQL, and relational databases like PostgreSQL, MySQL, AWS RDS and NoSQL databases like MongoDB, DynamoDB, DocumentDB, including complex query optimization.
DataDog Administration experience on Linux platform to instrument Java based applications running on Tomcat Application Server.. Configuration experience in Infrastructure Monitoring, Network Monitoring and Centralized Logging.. Specific Required Skills 5-8 years strong IT experience and good working knowledge of a variety of technology platforms in a distributed environment including: Microsoft systems (e.g. Windows 2012 and 2016 Server, Active Directory, Exchange, SharePoint), Linux/Unix, VMWare, SQL Server, database architectures, TCP/IP, VPNs, Mainframe, LAN/WAN technologies and architectures. Or similar Log Management experience with ELK Stack – Elasticsearch (search and analytics engine), Logstash (ingest pipeline), and Kibana (visualization and creating dashboards). Experience in writing Shell, Python, Selenium, VuGen scripts
Strong familiarity with common protocols such as TCP/IP, SNMP, BGP, OSPF/RIP/EIGRP, IPSEC, SFTP, STP, LACP, DNS, DHCP, QoS, and VoIP. Familiarity with Cloud technologies and hybrid networking (e.g., Microsoft Azure). Network automation skills using infrastructure as code tools, such as Ansible, Terraform, Pulumi. Knowledge of supporting an enterprise wireless network (e.g. Aruba, Cisco Meraki). Networking certifications are a plus (e.g., CCNA, CCNP, PCSNE, CompTIA Network+)