Would you relocate for a career boost, outstanding professionals to collaborate with, and a corporate campus that makes going into the office amazing?. Status: Onsite – Hybrid after onboarding 1 day a week WFH.. Pet Insurance for dogs and cats. 3+ years of experience in security architecture with domain expertise in network security or cloud security and one or more other IT domains (IT/OT, IAM, Network, DevSec Ops, Application Security etc.). Experience in security architecture, focusing on network or cloud security.
Develop secure configurations and policies for Azure resources, such as Virtual Machines, Storage Accounts, and Azure Kubernetes Service (AKS).. Leverage Azure Sentinel for threat detection, incident response, and security monitoring.. Conduct regular security assessments, vulnerability assessments, and penetration testing to identify and mitigate risks.. Experience using security architecture methodologies and vulnerability management tools.. Experience designing IAM technologies and services (e.g., Active Directory, LDAP, Azure, IAM).
Global-5 is seeking a Web Administrator & IT Support Specialist to manage our web infrastructure, ensuring seamless performance, security, and scalability.. · Perform basic front-end updates (HTML, CSS, JavaScript) for landing pages and content edits.. · Knowledge of website accessibility standards (WCAG, ADA compliance).. · Basic knowledge of GIS and geospatial data visualization for map-based applications.. Global-5 is a national award-winning public information, public relations, and integrated marketing firm proudly serving transportation, transit, and government clients.
Provide computer & network support for various clients via onsite visits, telephone support, ticket support through Connectwise Manage and Automate, and remote desktop assistance through ScreenConnect.. Network infrastructure implementation, VPN/Active Directory/GPO setup & support, email services, antivirus and disaster recovery, preventative maintenance, etc.. Email support including Exchange and Office 365, Google Suites. Exchange and Office 365 migration, administration, configuration and support including sharepoint & Azure. Expertise with Windows Server 2008 through 2019, Active Directory deployment and administration
We are seeking an expert-level Data Privacy Technology Consultant with deep technical expertise in computer forensics, privacy control testing, and consumer-facing product assessments. 8 or more years of experience in data privacy, cybersecurity, or digital forensics, with a focus on privacy technology assessments. Experience working in digital forensics, incident response, or threat intelligence related to privacy and security. Proficiency with tools used for web tracking analysis, forensic investigations, and privacy compliance testing. CIPT (Certified Information Privacy Technologist) or CIPP certification (CIPP/E, CIPP/US, CIPM) strongly preferred.
In your duties, as Technical Director/Principal - Cyber Security, you will be responsible for the growth and strategic direction of your Practice Area in collaboration with the CSO and VP of Solutions Development.. Direct contract responsibilities require expertise across traditional and evolving domains including: Application Security, Cloud Security, Incident Response, Network Security, and Risk Management.. The ideal candidate will be seen as a subject matter expert in one or more of: Offensive Cyber, Defensive Cyber, Cross Domain Solutions, Risk Management Framework, and/or Zero Trust.. DoD Secret Clearance, Top Secret preferred. Experience supporting one or more of TIAGs primary customer agencies including: US Navy, US Army, and/or Department of Homeland Security.
Astrion offers comprehensive services that boost preparedness, optimize performance, and ensure success across various domains, from Cyber to Digital, Mission and Systems, servicing our nation's Civilian, Defense and Space communities.. To ensure that cybersecurity policy is implemented correctly on systems, the Cybersecurity Engineer shall ensure compliance with DoD and Air Force certification and accreditation policies, specifically Department of Defense Instruction (DoDI) 8510.01, Risk Management Framework (RMF) for DoD Information Technology.. The Cybersecurity Engineer shall ensure that all application deliverables comply with DISA Application Security Development Security Technical Implementation Guide (STIG), which includes the need for source code scanning to mitigate vulnerabilities associated with SQL injections, cross-site scripting and buffer overflows.. Develop, review, and update the System Security Plan (SSP) for the mission system to align with current RMF controls and their compliance status. Perform validation of systems, including development of criteria and procedures using agile Development Security Operations (DevSecOps) entrance and exit criteria throughout the product lifecycle
Seven (7) years of experience and an Associate's Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security).. Three (3) years of experience and an Master's Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security).. Two (2) years of experience and an Doctorate Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security).. Relevant experience in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering.. Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering.
Support the development of security documentation including System Security Plans (SSP) and Security Controls in accordance with NIST publications and the Risk Management Framework leading to system Authorization to Operate (ATO).. Coordinates with network security and application teams in determining Intrusion Detection Systems/Intrusion Protection Systems (IDS/IPS), Firewall, Security Proxy, Email Security, and Vulnerability Scanning Solutions that will be used with Case Processing.. Must have 5+ years of experience with Risk Management Framework (RMF). Must be able to lead efforts to Update security documentation for NBIB IT PMO systems needed to obtain and maintain Authority to Operate (ATO). Clearance Required: US Citizenship is required to obtain and maintain Top Secret Clearance with SCI
Assist in third-party risk management by evaluating vendor security compliance and governance requirements.. Experience in governance, risk, and compliance (GRC) tools and methodologies.. Familiarity with security technologies such as SIEM, endpoint protection, access control, and vulnerability management.. Relevant certifications such as CISA, CISM, CISSP, CRISC, or Security+.. Knowledge of cloud security compliance frameworks (AWS, Azure, or Google Cloud)
As we garner more industry attention - just check out our accomplishments and awards by CES Innovation, iF Design, IGA, and Red Dot - we also need driven and talented people to join our team.. If you're down-to-earth, approachable, and easy to strike up a conversation with, this may be a great fit for you.. As an Information Security Analyst, this role is vital in protecting the organization's IT infrastructure and ensuring the confidentiality, integrity, and availability of systems and data.. 3+ years of experience in information security, with a strong background in security event analysis, incident response, vulnerability management, and risk assessment.. Relevant security certifications such as CISSP, CISM, CEH are a plus.
Position Title: Network/System Administrator I. Security Clearance Level: Top Secret/SCI, SAP Information eligible, consent for Counterintelligence polygraph. The Air Force (AF) Special Access Program (SAP) Security Support Services (SSS) assists the AF cognizant security authority in oversight of enhanced National Security Objectives supporting AF SAP interests through active and integrated security operations, processes, mechanisms, and management.. Toolkits, SEIMs, Logrhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e.g., SE Linux extensions to RHEL, PitBull, AppArmor, and Sentris), video teleconferencing/VOIP, Oracle/MS SQL database security, and Apache/IIS Web server security.. Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies to include communication security (COMSEC) integration.
Sr. Network Security Engineer (Juniper). Hands-on experience with Juniper firewalls, routers, and switches.. Familiarity with IDS/IPS, NAT, and load balancing.. Understanding of network protocols (TCP/IP, BGP, OSPF, etc. Maintain and update firewall rules and access control lists.
Collaborate with offensive testers such as red team and penetration testers to build and integrate AI solutions into offensive security tools and frameworks. 1+ years of demonstrated familiarity with machine learning frameworks and libraries such as TensorFlow, PyTorch, or Jupyter Notebook. 1+ years of offensive security techniques/ knowledge, including penetration testing, vulnerability assessment, and exploit development. Experience with natural language processing (NLP) and computer vision. We believe everyone–of every race, gender, sexuality, age, location and income–deserves the opportunity to live their healthiest life.
Bachelor s degree in Cybersecurity, Data Privacy, Computer Science/Engineering, Information Systems, or related technical discipline, or equivalent experience/training. 2+ years of experience in data discovery and/or data protection, including data loss prevention. Knowledge of data management disciplines such as data discovery, data governance, data classification, and data privacy. Understanding of data protection regulations, such as GDPR and CCPA. Ability to interact with enterprise product teams, data analysts, and data governance teams for cross functional efforts
Best Workplaces in Illinois in 2024 by Best Companies Group and Illinois SHRM (Society for Human Resource Management). Oversee the deployment, maintenance, and optimization of Microsoft Azure, M365, Intune, Defender, Entra, and other related technologies.. Ensure the implementation of cloud security best practices, including identity and access management (IAM), networking, encryption, and compliance standards.. 8+ years of experience managing and supporting Microsoft platforms (Azure, M365, Intune, Defender, Entra).. 3+ years of experience in cloud engineering, with a strong focus on Microsoft Azure services, cloud infrastructure, and hybrid cloud solutions.
The Security Engineer is responsible for overseeing the company's cyber security and compliance strategy.. Employees are required to work from the office at least four days per week (Monday - Thursday), with Friday available for remote work, offering a blend of in-person collaboration and flexibility.. Perform vulnerability assessments, penetration testing, and risk assessments to identify and prioritize potential security risks and vulnerabilities.. Participate in incident response activities, including investigation, containment, and recovery efforts, as needed.. In-depth knowledge of security tools and technologies, such as computer networking, operating systems, computer hardware and software, and virus protection software Proficiency in networking technologies, network security and network monitoring solutions
Be responsible for security incident and event response and aid in threat and vulnerability research, including triage, remediation and documentation.. Uphold data security by implementing DLP rules, monitoring of sensitive data access, and developing data cataloging tools for search and discovery, data lineage, and data quality improvements.. Experience working with SIEM systems, threat intelligence platforms, security automation and orchestration solutions, intrusion detection and prevention systems (IDS/IPS), file integrity monitoring (FIM), DLP and other network and system monitoring tools.. Experience writing scripts (Python, Perl etc) and SQL, Konw how of Identity Lifecycle Management, Data Loss Prevention, Data Security, Security Assurance, or similar areas in a medium or large corporate environment.. Hands-on experience in the assessment, design, implementation, and configuration of data security products.
As a member of Endo’s IT department and under the supervision of the CISO, the Senior Manager, IT Security Operations is responsible for security tools monitoring and maintaining Endo’s suite of security solutions (applications and services) in alignment with the IT’s strategy and roadmap.. Support organizational and departmental planning around threat assessment, risk mitigation, and implementation of the IT Security roadmap.. Bachelor’s degree or advanced degree preferred; professional security management certification is required, such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA), or other similar credentials.. Experience with GAP assessments, penetration testing and techniques, and patch management.. Security Information and Event Management (SIEM)
Identity & Access Management Own and improve our Single Sign-On (SSO) configuration and provisioning processes. Manage and evolve our Identity and Access Management (IAM) systems to meet security and compliance needs. Collaborate on IT policy development and CISM (Certified Information Security Manager)-related practices. Proficiency in managing IAM tools, MDM platforms (like Apple Business Manager, JumpCloud, Okta, and other), and networking equipment.. Experience with networking infrastructure such as UniFi and Fortinet.