Information Security Analyst. Review third-party application security vulnerabilities and recommend updates.. Conduct regular vulnerability scans and penetration testing.. Manage Intrusion Detection (IDS), Prevention (IPS), Data Loss Prevention (DLP) and Cryptography/Encryption solutions.. Preferred certifications: Security+, CISA, CISSP, CISM, or CEH.
Provide infrastructure security design and implementation, delivering robust security controls for cloud (Azure, GCP, OCI), on-premises, and hybrid infrastructure environments. Configure and manage security tools and technologies, including firewalls, intrusion detection/prevention systems (IDS/IPS), Network Access Controls (NAC), VPN & Zero Trust Network Access. Strong technical knowledge of modern network and cloud security platforms such as Palo Alto NGF & PRISMA, ClearPass, VPN, SD-WAN, ZTNA, and cloud security technologies like Azure and GCP (AFW, AppGW, Cloud Armor). Experience with modern compute architectures such as Docker/Kubernetes and Serverless. Experience with security automation, orchestration, and infrastructure-as-code (IaC) tools like Terraform, ARM, and cloud IaaS/PaaS automation.
PingWind is seeking a Cyber Incident Response Tier II Analyst to support our VA customer at Hines, IL Martinsburg, WV, or Austin, TX.. GIAC Certified Incident Handler (GCIH). Leverage Security Orchestration, Automation, and Response (SOAR) platforms to streamline and automate incident response processes, including enrichment, containment, and remediation actions. Experience performing root cause analysis of malware leveraging PowerShell, using tools such as MDE advanced hunting (KQL) and Splunk to identify infection paths, attacker behavior, and persistence mechanisms. Employee Assistance Program through Sun Life Financial EAP Guidance Resources
CCSP, GIAC, CISSP, other security credentials or related experience.. Experience with cloud environments, in particular Google Compute Platform (GCP), Amazon Web Service (AWS), and Microsoft Azure.. Deep familiarity with cloud security platforms, such as Wiz, Orca Security, Divvycloud, Palo Alto Prisma Cloud, etc. Additional understanding of other cybersecurity practices, such as encryption, identity and access management (IAM), network security, vulnerability management, and incident response.. We place the highest value on creating a safe environment where our employees can grow and contribute, and refuse to discriminate on the basis of race, color, religious belief, sex, age, disability, national origin, alienage or citizenship status, marital status, partnership status, caregiver status, sexual and reproductive health decisions, gender identity or expression, sexual orientation, or any other protected characteristic.
Open Systems Technologies Corporation is looking for a SOC Operations Analyst to join our high performing cyber team in support of a large SOC enterprise environment.. Work with the security team to perform tests and uncover network vulnerabilities, such as penetration testing.. Examines recovered data for relevant information and performs dynamic analysis to include timeline, statistical, and file signature analysis.. Performs real-time cyber defense handling tasks to support deployable Incident Response Teams (IRTs).. We offer a comprehensive benefit package that includes 3 weeks paid time off, 2 weeks Holiday pay, medical/dental/vision coverage, STD, LTD, Life Insurance, AD&D, and 401k with up to 4% match.
Establish and track key performance indicators (KPIs) to measure the effectiveness of incident response activities, vulnerability management, threat intelligence, and compliance efforts.. Certifications: Certified Information Systems Security Professional (CISSP), Certified Protection Professional (CPP), Certified Information Security Manager (CISM), or Certified Information Privacy Professional (CIPP) are highly desirable.. Significant expertise in Security Operations Center (SOC) operations, threat hunting, incident investigation, endpoint protection, security frameworks, managing external Managed Detection and Response (MDR) partners, cloud security, and strategic planning.. Proficient with various security tools and technologies, including Security Information and Event Management (SIEM), identity and access management systems, endpoint protection solutions, application security protocols, data security measures, and cloud security environments.. Millennium Physician Group (MPG) is committed to the full inclusion of all qualified individuals.
This encompasses data centers, networking hardware, telecommunications, cloud services, wired and wireless connectivity, and disaster recovery.. Demonstrated strong technical knowledge of networking (LAN/WAN), firewalls, cloud platforms (e.g., AWS, Azure), virtualization (e.g., VMware), storage systems, and enterprise systems architecture.. Compliance Standards: Familiarity with educational compliance standards and regulations such as FERPA, CIPA, ADA, GLBA, and NIST. Emerging Technologies: Awareness of current and emerging technologies in networking and infrastructure, such as SD-WAN, IoT, and edge computing.. Preferred Qualifications: Experience in higher education or public sector environments Professional certifications such as CCNP, PMP, CISSP, or similar. If hired, you will enjoy the following ECLARO Benefits: k Retirement Savings Plan administered by Merrill Lynch Commuter Check Pretax Commuter Benefits Eligibility to purchase Medical, Dental & Vision Insurance through ECLARO Apply Now Success!
Job Overview: The Security Architect Lead reporting to the AVP of Security Architecture is a role that has direct responsibility for designing/architecting IT security solutions, leading operational security activities, serving as an expert in cybersecurity protection, detection, response, and recovery activities, and being able to lead Cyber Incident Response activities.. Knowledge of current cyber threat actors, APTs, and the MITRE ATT&CK and NIST Frameworks.. Certifications and Licenses: One or more certifications desired: CISSP, GCIH, CCNA, C|EH, CISA, GPEN, CHFI Scheduling Requirements: Full-time Day Essential Functions: Strong command of cybersecurity organization practices, operations risk management processes, principles, architectural requirements, engineering threats and vulnerabilities, including incident response methodologies.. Experience in SIEM, IPS, IDS, NAC, Threat Assessments.. Experience in leading critical cybersecurity areas including: cyber incident response, disaster recovery, cybersecurity monitoring, remediation and information governance.
Conduct cloud security assessments and Penetration testing.. Perform Incident Response and Forensics evaluation using security information and event management (SIEM) tools.. Design enhancements in Identity and Access Management products ForgeRock and SailPoint.. Perform Security Incident Response and Forensics evaluation using security information and event management (SIEM) tools.. Experience with AWS security features such as Security Groups, Network Access Control List, Firewall, WAF, Guard Duty, Macie, CloudTrail, CloudWatch, Control Tower, etc.
8 years’ experience in collecting and aggregating threat intelligence from various sources, such as open-source intelligence (OSINT), dark web forums, and commercial threat intelligence feeds.. 5 years of experience using cybersecurity tools and technologies for threat intelligence analysis, such as threat intelligence platforms (TIPs), security information and event management (SIEM) systems, and malware analysis tools.. Aggregate and evaluate threat intelligence from diverse sources such as open-source intelligence (OSINT), dark web forums, and commercial feeds to identify relevant and actionable insights for the organization.. Utilize cybersecurity tools and platforms—including Threat Intelligence Platforms (TIPs), Security Information and Event Management (SIEM) systems, and malware analysis tools—to conduct threat research and enrich investigative findings.. Map TTPs to the MITRE ATT&CK framework to aid in correlation to attack vendors with specific threat actors.
Job Overview: We are looking for staff-level cybersecurity professionals with a strong background in one or more of DevSecOps, network security, and security architecture.. The ideal candidate will have a minimum of 8+ years of experience in DevSecOps or related fields and a strong understanding of cloud platforms, security automation, and secure coding practices.. Manage infrastructure as code (IaC) using tools like Terraform, OpenTofu, or CloudFormation to ensure secure and scalable deployments.. Qualifications: Minimum of 8+ years of experience in DevSecOps, DevOps, or a related field, with a strong focus on security.. Proficiency with infrastructure as code (IaC) tools such as Terraform, OpenTofu, or CloudFormation.
Threat Intelligence Analyst (Sr., Jr. Multiple Roles) Full-time.. Interest in learning about Windows, Linux, Database, Application, Web server, firewall, SIEM log analysis. Experience with digital analysis and forensics tools like Encase, Palantir, i2 Analyst’s Notebook, FTK, or similar, or extensive statistical analysis tools (including MS Excel). Experience on an Incident Response team performing Tier I/II incident triage. Certified Ethical Hacker (CEH), SFCP, GCIA.
The role serves as the escalation point collaborating with the Managed Detection and Response (MDR) provider to triage alerts based on relevance and urgency and provides analysis to business stakeholders about the overall security posture in order to mitigate risk.. Responsibilities include threat detection and response, security toolset configuration, leveraging various Threat Intelligence sources to hunt and classify malicious behavior, and coordinating the Vulnerability Management process.. Certification in one or more areas, or willingness to obtain: BTL1, CISSP, GIAC, OSCP, Sec+, CEH or similar.. Keen understanding of Cybersecurity and Data Protection tools including SIEM, IDS/IPS, AV/EDR, NDR, DLP and other technologies. Experience with commercial Vulnerability Management tools (i.e. Tenable, Rapid7, Qualys) a plus.
We are currently seeking a talented individual to become a Network Security Engineer.. ESSENTIAL DUTIES AND RESPONSIBILITIESWe are seeking a highly skilled and motivated Network Security Engineer to join our dynamic IT team.. The Network Security Engineer will play a crucial role in identifying potential vulnerabilities, mitigating risks, and responding to security incidents to ensure the confidentiality, integrity, and availability of our network infrastructure.. Assist in the design and implementation of disaster recovery and business continuity plans related to network security.. Experience with cloud security and virtualization.
Join a world-class academic healthcare system, UChicago Medicine , as a Senior Cybersecurity Penetration Tester in our Information Security department.. This is a remote, work from home opportunity and you may be based outside of the greater Chicagoland area.. Research, plan, and execute complete penetration testing and red team operations to identify software/network/cloud potential exploits, vulnerabilities, and other weaknesses in security controls.. 5 years plus of significant, recent relevant experience in IT security penetration testing or red teaming with deep knowledge of scanning tools and vulnerability enumeration. Certifications relevant to adversarial security testing such as CEH, Pentest+, GPEN, and OSCP
AAC Inc is seeking a highly skilled and motivated professional to join our team as a Senior Cybersecurity Specialist to support efforts at the MCCOG. MCCOG is a specialized unit responsible for overseeing and executing defensive cyber operations, network operations, and cybersecurity for Marine Corps Enterprise Network (MCEN).. It supports the overall mission readiness of the Marine Corps by defending against cyber threats, ensuring operational security, and supporting the Marines in cyberspace operations worldwide.. · Develop and execute Government approved security policies, plans, and procedures; implement data network security measures; operate and monitor network intrusion detection and forensic systems; conduct IS security incident handling; support Continuity of Operations Plan/Disaster Recovery (COOP/DR) plans, and perform certification of IS and networks.. · Perform other information security duties including operation of Electronic Key Management System (EKMS) and maintenance of Public Key Infrastructure (PKI).. Operate Host Based Security System (HBSS), firewalls, Intrusion Prevention Systems (IPS), Intrusion Detection Systems (IDS), other point of presence security tools, Virtual Private Networks (VPNs), and related security operations.
Governance, Risk & ComplianceMaintain and evolve PACS Services' cybersecurity governance framework to support HIPAA, SOX, and other applicable. Security Operations & Incident ResponseManage daily security operations, including event monitoring, threat detection, alert triage, and response , test, and refine incident response and disaster recovery procedures and ensure documentation is up to. Security Architecture & Technology ManagementEvaluate, implement, and manage security tools and technologies such as SIEM, EDR, identity management, and encryption systems.. Collaborate with IT infrastructure, cloud, and application teams to integrate security into architecture and DevOps practices.. Collaboration & Strategic IntegrationServe as the primary point of contact for external cybersecurity partners, threat intelligence feeds, and managed service providers.
Symmetrio is actively seeking multiple Identity and Access Management (IAM) Engineers on behalf of our client, a large enterprise organization based in Philadelphia, PA. In this role, you will lead the design, deployment, and management of identity platforms including Okta, Microsoft Entra ID (Azure AD), and related IAM tools.. Design, deploy, and maintain IAM solutions, including SSO, MFA, identity lifecycle management, and privileged access management.. Administer and optimize Okta and Entra ID environments, including user provisioning, authentication policies, and integration with SaaS and on-premise applications.. Okta Identity Cloud (SSO, Universal Directory, Lifecycle Management). Knowledge of Zero Trust Architecture, Identity Governance & Administration (IGA), and least privilege principles.
Our employees are our greatest asset as we work to achieve our bold ambitions, and we’re looking for the next wave of passionate and ambitious people ready to make a direct impact.. Security professional with a strong technical background in Cyber Security, Windows / Linux, Network Security, Security Operations Center (SOC), Cloud Security (AWS, Azure), MITRE ATT&CK or similar frameworks, Threat Analysis, IT Operations and Incident response. Proficiency in digital forensics, malware analysis, and threat hunting.. Information Security Certification (CISSP, GSEC, GPEN, CEH, etc.). For jobs in the United States: Gilead Sciences Inc. is committed to providing equal employment opportunities to all employees and applicants for employment, and is dedicated to fostering an inclusive work environment comprised of diverse perspectives, backgrounds, and experiences.
Senior Security Intelligence Engineer, Incident Response Threat Intelligence, ACTI, ACTI Job ID: 2866756 | Amazon.com Services LLC. The Threat Intelligence for Global Enterprise Response (TIGER) team, part of Amazon Cyber Threat Intelligence (ACTI), is responsible for developing actionable intelligence on advanced cyber threats to Amazon employees and company assets. Draft and publish finished written threat intelligence products based on findings. 5 years experience across system security, network security, application security, and/or digital forensics. Experience with modern threat intelligence platforms (TIPs), especially the Vertex Project's Synapse, and their APIs.