Cybersecurity & Network Management Jobs
Secure enterprise systems with these Cybersecurity & Network roles. Prevent breaches, protect data, and maintain robust IT infrastructures.
Title: PCL Information Security Officer (BISO). PCL Information Security Officer (BISO) plays a critical role in safeguarding PCL's information assets, ensuring compliance with security policies, and mitigating potential risks.. These projects and activities span across Identity and Access Management, Governance Risk and Compliance, Security Architecture, Maritime Safety, Infrastructure Application and Data Security, and Threat Management.. Deep understanding and familiarity with core concepts of network security, security architecture, security operation, vulnerability management, cloud security, application security, security awareness program and threat intelligence.. Experience with security technologies and tools, including SIEM, IDS/IPS, endpoint protection, encryption, access control, firewalls, Vulnerability Management, etc.
Your expertise will be crucial in mitigating risks and protecting our organization's digital assets in cloud platforms like AWS, Microsoft Azure, and Google Cloud.. Contribute to the development and definition of our cloud security posture, enabling cyber resilience and implementing various zero trust initiatives.. Relevant certifications such as AWS Certified Security - Specialty, Azure Security Engineer Associate, Certified Cloud Security Professional (CCSP), or similar are preferred but not required.. Proficiency in scripting and automation (e.g., Python, PowerShell, Terraform).. Familiarity with infrastructure as code (IaC) tooling.
Utilize security tools such as DISA eMASS, ACAS, HBSS, and other Information Assurance (IA) technologies to conduct security assessments.. Conduct vulnerability analysis, penetration testing, network security monitoring, and incident response as required.. Hands-on experience with security tools like DISA eMASS, ACAS, HBSS, or similar IA solutions.. Proficiency in at least three (3) of the following six (6) areas: Vulnerability Analysis Network Security Monitoring Incident Response & Forensics Penetration Testing / Red Teaming Threat Intelligence & Risk Assessment Security Architecture & Engineering. Experience with Cloud Security (AWS, Azure, DoD cloud environments).
Assess and improve cloud security posture using tools such as Prisma Cloud, AWS Config, and Azure Security Center.. Experience with Cloud Security Posture Management (CSPM) tools, including Prisma Cloud.. Strong knowledge of security frameworks such as MITRE ATT&CK, NIST CSF, and CIS Benchmarks.. CompTIA Network+ and Security+ certifications or equivalent experience.. Preferred certifications include AWS Certified Security Specialty, Microsoft Azure Security Engineer Associate, CCSK, CCSP, or equivalent.
This role requires a Top Secret/SCI clearance due to the sensitive nature of the work and the criticality of protecting national security information.. Collaborate with stakeholders to develop and enforce Zero Trust policies, ensuring alignment with government directives and frameworks such as NIST and FISMA.. Advanced degrees and relevant certifications (e.g., CISSP, CISM, CEH) are highly desirable.. Technical Skills: Proficiency in Zero Trust technologies and frameworks, including identity and access management (IAM), network segmentation, micro-segmentation, endpoint security, and threat intelligence.. Knowledge of cloud security and experience with cloud service providers such as AWS, Azure, or Google Cloud.
Senior Cloud Security Architect. V-Soft Consulting is currently hiring for a Senior Cloud Security Architect for our premier client in Atlanta, Georgia. Experience in threat hunting, penetration testing, or security vulnerability assessments in AWS environments.. Design, build, and maintain secure AWS cloud architectures, incorporating best practices for identity and access management, data encryption, network security, and secure software development lifecycle.. Ensure compliance with industry regulations and standards such as NIST, HIPPA, IRS and SSA in AWS cloud environments.
-Provide engineering and administrative support for security components, including firewalls, data loss prevention (DLP) tools, endpoint security solutions (e.g., Qualys, Tenable Nessus, Splunk, CrowdStrike), content filtering, anti-spam software, and multifactor authentication (MFA) technologies.. -Support the Chief Information Security Officer (CISO) in responding to security incidents and managing incident response teams.. -Hands-on experience with cybersecurity tools such as Splunk, Tenable Nessus, Qualys, CrowdStrike, Palo Alto, Cisco, or similar platforms. -CISM (Certified Information Security Manager). -CEH (Certified Ethical Hacker)
A recognized financial services company is currently seeking an experienced professional to join their team as their new Cloud Security Engineer.. The qualified professional in this role can sit at either the company's Los Angeles or NYC-based office.. Strong knowledge of Azure Security controls and configurations Experience with on prem to Azure Cloud Migration Strong working knowledge of API Security
At Oracle Cloud Infrastructure (OCI) we build the future of the cloud for Enterprises.. Cloud Security: In-depth knowledge of cloud security principles and best practices, including securing cloud infrastructure, services, and applications in platforms; OCI experience is a plus.. Industry certifications such as CISSP, CISM, CRISC, GIAC, or OCI/AWS/GCP/Azure Security Specialty are highly preferred.. Hands-on experience with security operations, incident response, cloud security (OCI, AWS, Azure, GCP), identity & access management (IAM), and data protection.. Endpoint Detection and Response (EDR) tools (such as CrowdStrike, Carbon Black).
As we build on our legacy, we are deepening our commitment to elevating the dialysis experience through digital solutions and advanced services, while looking beyond kidney care and investing in transforming vital organ therapies.. The Cyber Incident Response Consultant will be a key member of our Information Security team serving as the lead cyber security incident responder for Vantive's cyber defense.. Expertise in network security, endpoint security, malware analysis, digital forensics, and threat intelligence.. Proficiency with security tools such as SIEM, IDS/IPS, EDR, and forensic analysis software.. One or more computer forensics and information security certifications: CISSP, CCSK, CCSP, CISA/CISM (preferred).
Network Security Engineer Lead. TheNetwork Security Engineer Leadwill perform a variety of broad network engineering tasks focused on the design, implementation, testing, and troubleshooting of the RNEC-NCR intricate network infrastructure.. Install new modified hardware, operating systems, and software applications ensuring integration with Information Assurance (IA) security integrity requirements for the enclave.. Establish communication links capable of providing required bandwidth to support effective and efficient connectivity and digital communications between Fort Belvoir and offsite government facilities.. Install government Public Key Infrastructure (PKI) server-side certificates and implement Secure Sockets Layer (SSL) and other secure methods of data transmission, including support to the VPN and VPN servers, CITRIX, and Structured Query Language (SQL) servers.
Cloud Security Architect | Permanent | No Sponsorship Available ABOUT OUR CLIENT. Leverage Azure Sentinel for threat detection, incident response, and security monitoring.. Conduct security assessments, vulnerability assessments, and penetration testing.. Experience using security architecture methodologies and vulnerability management tools.. Experience designing IAM technologies and services (e.g., Active Directory, LDAP, Azure, IAM).
This position requires strong experience withCisco and Palo Alto firewalls, SD-WAN using Meraki, routing and switching, loadbalancing (F5), and network design for multi-datacenter environments, includinghybrid Azure Cloud solutions.. Design and manage SD-WAN solutions using Cisco Meraki, optimizing performance and security for remote and branch office connectivity.. Minimum of 8-10 years of experience in network engineering, with a focus on Cisco, Palo Alto firewalls, SD-WAN (Meraki), F5, routing, switching, and network design.. Strong experience in firewall management and network security tools such as Palo Alto, Cisco ASA, or similar technologies.. Relevant certifications (e.g., CCNP, CCIE, PCNSE, F5, Meraki, Azure Networking certifications) are highly desirable.
Incident Reporting: Immediately report any security incidents to the Information Systems Security Officer (ISSO) and IT Service Group (ITSG) leadership.. Vulnerability Scanning and Reporting: Regularly scan for vulnerabilities and exploits within the organization's systems, reporting findings to NOAA Cybersecurity and coordinating the response to identified issues.. Relevant Certifications: Industry-recognized certifications such as CISSP (Certified Information Systems Security Professional), CISM (Certified Information Security Manager), CompTIA Security+, or equivalent certifications are required.. Access Control and Data Protection: Strong understanding of access control technologies, identity management systems, and data protection methods to ensure security of sensitive information.. Advanced Certifications: Additional certifications such as Certified Ethical Hacker (CEH), CompTIA Cybersecurity Analyst (CySA+), or other advanced certifications are a plus.
JT4 is seeking a Cyber Security Analyst for an onsite position at Edwards AFB in California.. In the U.S. federal context, this typically includes the Risk Management Framework (RMF) established by the National Institute of Standards and Technology (NIST), particularly NIST Special Publication 800-37.. Proficiency in security tools and technologies (e.g., SIEM, IDS/IPS, firewalls, antivirus, vulnerability scanners, EDR solutions).. Familiarity with cloud security (AWS, Azure, Google Cloud) and hybrid environments.. DESIRED QUALIFICATIONS: Relevant cybersecurity certifications, such as: CISS, CISM, CEH, Comp TIA Security+, GSEC, CISA, etc.
The Cybersecurity Incident Response Lead will oversee the incident response and threat intelligence programs to safeguard critical assets and data.. Serve as a trusted advisor to executive leadership, management committees, and the board on cyber risk issues.. · Regulatory Compliance and Audit ReadinessEnsure adherence to cyber risk management regulations, including FFIEC and other applicable laws.. Represent the bank during regulatory examinations, audits, and executive presentations on cyber risk topics.. Relevant industry certifications (CISSP, CISM, GIAC) are strongly preferred
Conduct in-depth cyber threat analysis, assess vulnerabilities, produce threat intelligence reports, collaborate on security strategies, and support cyber incident response.. 8 years’ experience in collecting and aggregating threat intelligence from various sources, such as opensource intelligence (OSINT), dark web forums, and commercial threat intelligence feeds.. 8 years’ experience in producing high-quality written and oral reports, briefings, and presentations to communicate threat intelligence findings, assessments, and recommendations to stakeholders at all levels of the organization.. 5 years of experience using cybersecurity tools and technologies for threat intelligence analysis, such as threat intelligence platforms (TIPs), security information and event management (SIEM) systems, and malware analysis tools.. CompTIA Security + is required.
We continue to expand our product lines and deploy groundbreaking solutions that enable safety across the healthcare supply chain.. The DevSecOps Engineer role is responsible for integrating security into every stage of our development lifecycle.. The DevSecOps will identify vulnerabilities, enforce best practices, and ensure compliance with industry standards.. Conduct vulnerability assessments and penetration testing of web apps and networks.. Strong understanding of AWS services, including IAM, EC2, S3, RDS, and ECS.
Teach participants to analyze Azure core functions, including virtual machines (VMs), storage, networking, and Identity Access Management (IAM), and guide them in navigating Azure logging sources and log types.. Provide hands-on instruction on configuring and utilizing tools like PowerShell modules, Microsoft Defender Suite, and Microsoft Sentinel for security orchestration, automation, and response (SOAR).. Facilitate labs and exercises that allow participants to apply new skills in realistic scenarios, such as configuring Microsoft Sentinel, integrating threat intelligence, and mapping security controls to frameworks like MITRE ATT&CK®.. In-depth understanding of Azure architecture, logging sources, PowerShell, Microsoft Defender Suite, Sentinel, and SOAR.. Relevant certifications (e.g., Azure Security Engineer, Azure Administrator, CISSP, GCFA, GCIH).
Monitor security alerts and notifications from various sources, including SIEM systems, IDS/IPS, and endpoint protection tools.. Utilize threat intelligence sources to identify emerging threats and vulnerabilities.. Analyze threat intelligence to enhance incident detection and response capabilities.. Experience with security technologies, including SIEM, IDS/IPS, endpoint protection, and network monitoring tools.. Employee Assistance Program through Sun Life Financial EAP Guidance Resources