AV, EDR, incident response, forensics, SIEM, firewall, HIPS/IDS, etc.. 2+ years of relevant experience in sales engineering, IT, consulting, Digital Forensics and Incident Response. Knowledge of malware, threat intelligence, and/or sandbox analysis.. Certifications such as CEH, CISSP, OSCP, and SANS or participating in security events such as capture the flag is a bonus. Category:Sales, Keywords:Pre-Sales Engineer, Location:Austin, TX-78703
As a key Megazone Cloud’s Managed Services Delivery Team member, you will be responsible for proactive cloud platform management, incident response, and technical escalations to ensure operational excellence for our clients' AWS and Azure environments.. Manage cloud-based databases, such as AWS RDS, Aurora, Azure PaaS DB, and on-prem solutions like Oracle or open-source databases.. Configure and manage cloud security policies, identity access management (IAM), encryption, and compliance controls.. Database Management Experience : Experience with AWS RDS, Aurora, Azure PaaS DB, or traditional databases like Oracle or MySQL. Hands-on experience with Infrastructure as Code (IaC), such as Terraform or CloudFormation.
The Chief Information Security Officer position at the City of Tucson's Information Technology (IT) Department is responsible for the development and implementation of a comprehensive citywide information security program.. Certification in: Certified Information Security Auditor (CISA), CompTIA+ Security. Active membership in professional information security organizations (ISSA, ISACA etc. J0763 - Chief Information Security Officer. If you believe you have been a victim of discrimination, you may file a complaint with the City of Tucson's Office of Equal Opportunity Programs, U.S. Equal Employment Opportunity Commission (EEOC) or Arizona Attorney General's Office of the Civil Rights Division (ACRD).
The IT Security Manager will serve in a management role with technical capabilities and strategic planning oversight; responsible for overseeing and managing security programs, projects, personnel, logical/technical administration, security acquisitions, and fiscal budgeting.. Applicant must be fingerprinted and pass a local background check conducted by the Macon-Bibb County Sheriff Department.. Knowledge of IT security risk management concepts, including penetration testing. Knowledge of information security standards and frameworks (i.e., NIST, CIS, CSF, PCI-DSS, SOC, ISO, etc.). The IT Security Manager is required to travel locally on occasion.
Immediate need for a talented Network Security Engineer.. Undergrad or Graduate in Computer Science/ Electronics/Networking Telecom Industry Experience.. Strong knowledge in handling Nextgen Firewalls, Cyber Security aspects.. Network Monitoring fundamentals using Netflix/IPFix.. AWS cloud platform experience.
The Senior Network Engineer is a key member of the Network Operations team.. Experience with Check Point NGX, IPS/IDS, Rapid7 Nexpose, SolarWinds is essential.. Proactively monitor and troubleshoot connectivity for the FTE's Network Infrastructure including campus, roadside, backbone, LAN, Walk-in Centers, partner networks and third-party connectivity. Assist the SRCO team with investigation, triage forensic analysis, and evidence preservation regarding cybersecurity events.. Assist with threat intelligence and hunting by leveraging in place security tools
This role requires an active Top Secret/SCI with the eligibility to obtain a CI/Poly. The position is in Fayetteville, North Carolina.. Implement and monitor database security measures, ensuring compliance with DoD security standards, including encryption, access control, and audit trails.. Experience with cloud-based platforms like AWS, Azure, or Google Cloud, including data migration and integration.. Strong understanding of database management systems (DBMS) such as SQL Server, Oracle, or PostgreSQL.. Experience implementing and managing data loss prevention (DLP) solutions.
This is a fantastic opportunity for a Security Operations Analyst to join our major, global pharmaceutical client on their latest new-build project based in Ohio, this is a large-scale greenfield capital project and investing more than $1bn.. Work with alerts from the Tier 1 cSOC Analysts, to perform in depth analysis and triage of network security threat activity based on computer and media events, malicious code analysis, and protocol analysis;. Work directly with cyber threat intelligence analysts to convert intelligence into useful detection;. Collaborate with incident response team to rapidly build detection rules and signatures as needed;. Leverages emerging threat intelligence (IOCs, updated rules, etc.)
Powered by the Xage Fabric, the company's Identity & Access Management, remote access, and dynamic data security solutions allow customers to secure, manage, and transform operations.. With its distributed, scalable, and easy-to-operate Fabric, Xage solves the complex digitization challenges of the real-world operations we rely on.. About the role In this role you will be working as a principal engineer on our Fabric development team.. Fluent in one of Go/Java/Rust/C. Named in Gartner research on Cyber-Physical Systems Protection Platforms, Zero Trust Network Access, Remote Privileged Access Management, and CPS Secure Remote Access.
Conduct detailed analysis of security events, using SIEM, EDR, and other security technologies to investigate incidents.. You have 5+ years of experience with incident response tools such as SIEM, SOAR, EDR, IDS/IPS, and forensic investigation tools.. You have some experience in threat intelligence analysis and threat hunting techniques. You are certified in areas relating to digital forensics and incident response.. Last year, we became a billion-dollar business , and our tribe expanded by a cool thousand people - theres nearly 5,000 of us now.
The Chief Information Security Officer position at the City of Tucson's Information Technology (IT) Department is responsible for the development and implementation of a comprehensive citywide information security program.. Certification in: Certified Information Security Auditor (CISA), CompTIA+ Security. Active membership in professional information security organizations (ISSA, ISACA etc. J0763 - Chief Information Security Officer. If you believe you have been a victim of discrimination, you may file a complaint with the City of Tucson's Office of Equal Opportunity Programs, U.S. Equal Employment Opportunity Commission (EEOC) or Arizona Attorney General's Office of the Civil Rights Division (ACRD).
Information Technology - IT Security Director Ravens Under Armour Performance Center, Owings Mills, Maryland, United States of America. IT Security Director. The primary responsibilities include assessing risks and driving security policies/governance/compliance across the organization (including third-party vendors) to ensure secure configuration of systems and appropriate awareness of employees.. This position will also focus on ensuring organizational compliance with PCI-DSS, PII, HIPAA, and NFL Security guidelines.. Previous experience with PCI-DSS, HIPAA, PII, NIST, cloud security and other security standards and compliance audits
Digitech is a leading provider of advanced billing and technology services to the EMS transport industry.. Since its founding in 1984, Digitech has refined its software platform to create a cloud-based billing and business intelligence solution that monitors and automates the entire EMS revenue lifecycle.. This is a great opportunity for a recent graduate with internship experience looking for thier first full-time position.. Create, oversee and test security measures (e.g. access authentication and disaster recovery). Windows Server Knowledge: Setup, configuration, and management
Monitor, analyze, and respond to cybersecurity threats and incidents using HBSS, ACAS, SIEM and WAF tools.. 5 or more years of hands-on experience with ACAS (Nessus) for vulnerability scanning and compliance reporting.. Must have 5 or more years with RMF including roles such as the security control assessor.. IAT Level II - CompTIA Security+ or SSCP (Systems Security Certified Practitioner).. Other security-related certs that are accepted (in addition to the above two certs) for the DoD IAT Level 2 include the following: CCNA Security; CySA+; GICSP; GSEC.
You’ll report to the Senior Director of Cybersecurity Architecture, Cloud Security, and DevSecOps and be responsible for defining and socializing reference architectures, standards, and controls across technology on-premises, in the cloud, and within development processes.. At Cox, you’ll find a workplace where relationships are crafted with care and successes are celebrated with high fives.. At least one relevant cybersecurity certification – CISSP, CISM, CISA, etc.. If you’re interested in bringing people closer through broadband, smart home tech and more, join Cox Communications today!. With exciting investments and innovations across transportation, communications, cleantech and healthcare, our family of businesses – which includes Cox Automotive and Cox Communications – is forging a better future for us all.
Oversight and maintenance of the IAM systems disaster recovery and business continuity plan, network security, system and software architecture and design to ensure that information is secured during all lifecycle phases.. Experience with tools such as Saviynt, SailPoint, and other IAM tools.. Practical knowledge of security technologies and business solutions specifically Identity and Access Management, and cloud security.. Experience with IAM solutions and implementation (Saviynt, SailPoint, etc.). For Union and Prevailing Wage roles compensation and benefits may vary from the listed information above due to Collective Bargaining Agreements and/or local governing authority.
Good understanding of Technologies such Web Application Firewall, Key Management, Secrets Handling, knowledge on the tools which provide services like Single Sign-On, MFA, enabling data security principles in the cloud platforms.. The role demands knowledge and experience around cloud security architectures and solutions design, review and risk assessment #LI-LP2 What's in it For You?. Learning & Development: LinkedIn Learning access; internal Talent Marketplace with opportunities to work on projects cross-company; Ten Thousand Coffees Thomson Reuters café networking.. Social Impact: Ten employee-driven Business Resource Groups; two paid volunteer days annually; Environmental, Social and Governance (ESG) initiatives for local and global impact.. Our industry-leading products and services include highly specialized information-enabled software and tools for legal, tax, accounting and compliance professionals combined with the world’s most global news services – Reuters.
Obsidian Security is seeking a skilled product manager with deep expertise in cybersecurity and a passion for artificial intelligence (AI) to lead the development of cutting-edge security products.. Own product strategy and roadmap for AI-based cybersecurity products (e.g., threat detection, behavior analytics, anomaly detection, threat intelligence, etc. Conduct extensive market research to understand customer pain points, emerging trends, and the competitive landscape in SaaS security, with a focus on identity and data security.. Experience with AI/ML technologies: anomaly detection, supervised/unsupervised learning, NLP/LLMs, graph analytics, etc.. Familiarity with SIEM, SOAR, EDR/XDR, IAM, or cloud security products.
An Enterprise AI Security Architect is essential for safeguarding an organization's artificial intelligence systems.. This role involves creating, implementing, and managing robust security frameworks specifically designed for AI applications and machine learning operations on hybrid multi-cloud platforms and technologies.. They are tasked with executing comprehensive information security, IT risk management processes, and establishing automated capabilities to support reliable AI practices.. Implement security standards and frameworks like CIS Benchmarks, NIST AI RMF and ISO to AI projects.. Ensure adherence to pertinent security regulations and compliance standards, such as HIPAA, HITRUST, and PCI DSS.