We are seeking a strategic, mission-driven Federal Chief Technology Officer (CTO) to lead the technological vision and execution of our cybersecurity solutions for federal government clients.. Cybersecurity Architecture & Innovation: Oversee the design, development, and implementation of secure, scalable solutions tailored to federal risk management frameworks (e.g., NIST, FedRAMP, CMMC, FISMA).. Product Development & R&D: Lead the roadmap for cybersecurity platforms and services, incorporating AI, threat intelligence, zero trust architecture, cloud security, and endpoint protection.. Familiarity with OT/ICS security or federal critical infrastructure protection.. Previous experience supporting federal R&D, SBIR/STTR programs, or innovation hubs (e.g., DIU, In-Q-Tel).
SCAN Group is the sole corporate member of SCAN Health Plan, one of the nation's leading not-for-profit Medicare Advantage plans, serving more than 285,000 members in California, Arizona, Nevada, and Texas.. As the Chief Information Security Officer (CISO), you will be responsible for establishing and maintaining the enterprise vision, strategy, and programs to ensure that information assets and technologies are adequately protected for both SCAN Health Plan and associated portfolio companies.. The CISO will be the strategic leader for all aspects of information security, including security architecture, risk management framework, incident response, security awareness training, and vulnerability management.. CISSP (Certified Information Systems Security Professional) or Certified Information Security Manager (CISM). Understanding and experience with adherence to information and network security standards (HIPAA, HITECH, HITRUST, PCI and PII compliance), data management, disaster recovery.
The Disaster Recovery Coordinator will assist with the development of the BC/DR Program including maintenance, execution and testing of the BC/DR Plan, Incident Response Procedures, Business Resumption Procedures, Pandemic Planning, and providing regular status updates to the appropriate Committee(s).. Compliance with any and all BSA/AML/CFT and Sanctions requirements set forth by Bank Policy and Procedure, including but not limited to timely completion of assigned training.. Relevant Business Continuity/Disaster Recovery certifications preferred (MBCP, CBCP or ABCP).. Knowledge of DRII/BCI fundamentals and best practices.. On call 24/7/365 to support business continuity/disaster recovery incidents/events.
The network includes a cardiovascular program recognized by the American College of Cardiology as South Carolina's first HeartCARE CenterTMand an accredited Cancer Center of Excellence affiliated with MUSC Hollings Cancer Center for research and education.. Working knowledge of Cloud Security and supporting Technologies (e.g. AWS, Azure, GCP, SaaS, PaaS, DBaaS), particularly Data Loss Prevention within Microsoft O365, Azure Information Protection & AWS. Security technologies include, but are not limited to: Firewalls, Logging Aggregation Systems, IDS, IPS, SIEM, NAC, and data loss prevention technologies.. It is the policy of LMC to provide equal opportunity of employment for all individuals, and to remain compliant with applicable state and federal laws and regulations.. LMC strives to provide a discrimination-free environment, and to recruit, select, on-board, and employ all employees without regard to race, color, religion, sex, age, disability, national origin, veteran status, or pregnancy, childbirth, or related medical conditions, including but not limited to, lactation.
FIU serves a diverse student body of more than 56,000 and 290,000 Panther alumni.. U.S. News and World Report places dozens of FIU programs among the best in the nation, including international business at No. 2.. Experience and understanding of the following security domains: access control, network security, software development security, security architecture and design, cryptography, and operations security.. In compliance with the Jeanne Clery Disclosure of Campus Security Policy and Crime Statistics Act, the University Police department at Florida International University provides information on crimes statistics, crime prevention, law enforcement, crime reporting, and other related issues for the past three (3) calendar years.. For inquiries regarding nondiscrimination, contact FIU's Office of Civil Rights Compliance and Accessibility at 305.348.
5+ years of experience as Automation Architect and doing web application security testing as per OWASP standards. Ability to perform application vulnerability assessments or application penetration testing, utilizing tools commercial and open source tools.. Experience DevOps tools like DynaTrace, Chef, Splunk and Vagrant.. Web Application Penetration Testing. Application Security Testing Tools: VeraCode, Synopsys, Contrast IAST, Burp Suite, Tamper Data, Live http Headers, Client Fortify, VeraCode, OWASP Top 10, N-Stealth, Hailstorm, Paros, SANS Top 20, Acunetix, Nessus
Experience with Entra ID/Azure Active Directory for identity and access management.. Associate of Applied Science in IT Cyber Security is a plus.. The Town of Fuquay-Varina aims to be a dash-more!. On-site gym (Town Hall and Community Center). Do you possess an Associate of Applied Science in IT Cyber Security?
The Network Security Engineer will be responsible for developing and maintaining the security infrastructure of the organization's computer network.. The engineer will design, implement, and monitor security measures to protect the network and its data from unauthorized access, cyber-attacks, and other security threats.. At least 5 years of experience in network security engineering.. Direct hands-on experience with NAC solutions such as Clearpass or Cisco ISE.. Experience with vulnerability assessment and penetration testing tools.
Integrate ZTNA solutions with existing Identity and Access Management (IAM) systems, including Multi-Factor Authentication (MFA) and Single Sign-On (SSO).. Hands-on experience with one or more leading ZTNA solutions (e.g., Zscaler, Palo Alto Networks Prisma Access, Okta, Cisco Secure Access, Cloudflare Access, Fortinet).. Strong understanding of Identity and Access Management (IAM) principles and technologies (e.g., LDAP, SAML, OAuth, OIDC).. Experience with implementing and managing Multi-Factor Authentication (MFA) solutions.. Relevant security certifications such as CISSP, CISM, CompTIA Security+, or vendor-specific ZTNA certifications are highly desirable.
We focus on cybersecurity, vulnerability analysis, and network defense to support national security missions.. About RealmOne We are a mid-sized science and technology company dedicated to solving complex mission challenges in cybersecurity, data science, and software engineering for government and commercial clients across the U.S.. Develop mitigation strategies to enhance network security.. Qualifications Experience in cybersecurity, systems design, penetration testing, or related fields.. Active Security Clearance with Polygraph required.
Triage security incidents and perform in-depth analysis using cyber threat intelligence, intrusion detection systems, firewalls and other boundary protection devices. Conduct threat hunting activities based on internal and external threat intelligence. Experience interfacing with a variety of cybersecurity teams (such as red team, cyber threat intelligence, data loss prevention, etc). Security certifications such as: Security+, CYSA+, CASP+, GCFA, GCIH, GCFE. Proficient with SIEM technologies (Security Information and Event Management e.g., Splunk/MS sentinel or other SIEM TOOL)
ARESis seeking an experienced cybersecurity analyst to join our security control assessment, vulnerability assessment, software assurance, and risk assessment teams supporting our Nation's ballistic missile defense program.. (Schriever SFB), Huntsville, AL (Redstone Arsenal).. Cybersecurity certification such as CCNSecurity, Security+ CE, GICSP, GSEC, SSCP, CISSP, or CISSM.. Experience supporting key cybersecurity activities including vulnerability assessments, control development, security plan documentation, penetration testing, and the Risk Management Framework (RMF).. Familiarity with cybersecurity tools such as Nessus, Burp Suite, Nmap, ACAS, and others.
Must have purple, blu,e and/or red team expereince.. Manage threat prioritization, incident response, and forensic investigations. Drive red team, blue team, and purple team initiatives to evaluate and enhance security posture. Hands-on expertise in penetration testing and risk-based security analysis. Relevant certifications (e.g., CISSP, CISA, CEH)
The ThreatLocker platform with Application Allowlisting, Ringfencing, Storage Control, Elevation Control, Endpoint Network Control, Configuration Management, and Operational Alert solutions are leading the cybersecurity market toward a more secure approach of blocking the exploits of application vulnerabilities.. Recommend fixes and mitigation strategies, ensuring adherence to security standards (e.g., OWASP Top 10, CWE, NIST).. Collaborate with security engineers, architects, and DevSecOps teams to enhance code security posture.. Security certifications such as OSCP, CSSLP, CEH, or GWAPT.. Familiarity with threat modeling, penetration testing, or red/blue team operations.
Our company offers cutting edge products and services that are rooted in deep subject matter expertise of Safety, Cybersecurity, and Artificial Intelligence fields within embedded computing electronics that power tomorrow's autonomous vehicles.. · Lead/Support verification engineer in security verification test and its vulnerability management. · Lead/Support fuzz testing activities and its vulnerability management. · Lead/Support penetration testing activities and its vulnerability management. · Experience with cyber security in embedded systems is preferred, experience in the automotive or aerospace industry is a plus
Sr. IT Cyber Security Manager. The Sr. IT Cyber Security Manager is responsible for developing, implementing, and managing a robust cybersecurity program aligned with the NIST Cybersecurity Framework and defense-in-depth methodology.. Configure port security, DHCP snooping, and dynamic ARP inspection to prevent MAC flooding, rogue device access, and layer-2 attacks. Integrate security awareness training programs such as KnowBe4 to educate employees on cybersecurity best practices and phishing prevention. Experience with security awareness platforms such as KnowBe4.
This role leads the Security Operations Center (SOC), manages key technologies (e.g., SIEM, EDR, DLP), oversees managed security service providers (MSSPs), and works closely with IT, DevOps, and compliance teams to drive a robust operational security posture.. Oversee configuration, tuning, and maintenance of core security technologies including EDR, DLP, firewalls, IDS/IPS, NAC, WAF, and email security tools.. Monitor effectiveness of tools such as SIEM, EDR, DLP, and firewalls.. Professional certifications such as CISSP, CISM, CISA, or CRISC are strongly preferred.. Proven experience managing enterprise security operations including SOC, vulnerability management, and SIEM platforms.
We're looking for a Lead Cloud Security Engineer to own and fortify the infrastructure layer of our rapidly scaling SaaS application.. You'll leverage your software engineering expertise to embed security into the very fabric of our cloud environment (AWS, Azure, GCP), designing and implementing automated controls that protect our customers' data at scale.. Automate security guardrails within our CI/CD pipelines and IaC deployments, writing robust tools and scripts.. Experience with DevSecOps practices and automation tools (e.g., GitHubActions).. Familiarity with alternative cloud providers, such as Google Cloud Platform (GCP) or AWS is an asset.
Conduct regular security assessments, audits and penetration tests to identify vulnerabilities and recommend solutions. Foster collaboration across IT and other departments to align technology with business goals. Minimum of 10 years of experience in cybersecurity or a related field (CISSP, CISM, CISA highly desirable). Experience in network security, encryption technologies and endpoint security solutions. Proficiency in conducting security assessments and penetration testing
The team drives technology and digital transformation, partners with business leaders to design and execute new strategies through IT and operations services and ensures the necessary IT risk management and security measures are in place and aligned with enterprise architecture standards and principles. Experience working with various identity and access management (IAM) solutions such as CyberArk, Okta, Ping Identity, Entra ID/Azure AD, and other tools supporting SSO, MFA, and PAM. Working knowledge of regulatory requirements and compliance standards such as NYDFS, CCPA, GLBA, PCI-DSS, HIPAA, SOX, and GDPR. Expertise in encryption technologies (e.g., TLS, AES, RSA) and key management practices (e.g., KMS, HSM, PKI). AWS Certified Solutions Architect – Associate or Professional