The ideal candidate will have 7 to 10 years of networking experience, hold a valid Cisco Certified Network Professional (CCNP) certification, and possess expertise with Palo Alto next-generation firewalls, AWS cloud networking, Cisco Meraki, and the Cisco Nexus platform.. Design, implement, maintain, and troubleshoot complex network infrastructure, including LAN, WAN, wireless networks, Cisco Meraki, and Cisco Nexus environments.. Extensive experience configuring and managing Palo Alto Networks Next-Generation Firewalls.. In-depth knowledge of Cisco Meraki and Cisco Nexus platforms.. Palo Alto Networks Certified Network Security Engineer (PCNSE) certification.
Global-5 is seeking a Web Administrator & IT Support Specialist to manage our web infrastructure, ensuring seamless performance, security, and scalability.. · Perform basic front-end updates (HTML, CSS, JavaScript) for landing pages and content edits.. · Knowledge of website accessibility standards (WCAG, ADA compliance).. · Basic knowledge of GIS and geospatial data visualization for map-based applications.. Global-5 is a national award-winning public information, public relations, and integrated marketing firm proudly serving transportation, transit, and government clients.
As a member of Endo’s IT department and under the supervision of the CISO, the Senior Manager, IT Security Operations is responsible for security tools monitoring and maintaining Endo’s suite of security solutions (applications and services) in alignment with the IT’s strategy and roadmap.. Support organizational and departmental planning around threat assessment, risk mitigation, and implementation of the IT Security roadmap.. Bachelor’s degree or advanced degree preferred; professional security management certification is required, such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA), or other similar credentials.. Experience with GAP assessments, penetration testing and techniques, and patch management.. Security Information and Event Management (SIEM)
Be responsible for security incident and event response and aid in threat and vulnerability research, including triage, remediation and documentation.. Uphold data security by implementing DLP rules, monitoring of sensitive data access, and developing data cataloging tools for search and discovery, data lineage, and data quality improvements.. Experience working with SIEM systems, threat intelligence platforms, security automation and orchestration solutions, intrusion detection and prevention systems (IDS/IPS), file integrity monitoring (FIM), DLP and other network and system monitoring tools.. Experience writing scripts (Python, Perl etc) and SQL, Konw how of Identity Lifecycle Management, Data Loss Prevention, Data Security, Security Assurance, or similar areas in a medium or large corporate environment.. Hands-on experience in the assessment, design, implementation, and configuration of data security products.
Position Title: Network/System Administrator I. Security Clearance Level: Top Secret/SCI, SAP Information eligible, consent for Counterintelligence polygraph. The Air Force (AF) Special Access Program (SAP) Security Support Services (SSS) assists the AF cognizant security authority in oversight of enhanced National Security Objectives supporting AF SAP interests through active and integrated security operations, processes, mechanisms, and management.. Toolkits, SEIMs, Logrhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e.g., SE Linux extensions to RHEL, PitBull, AppArmor, and Sentris), video teleconferencing/VOIP, Oracle/MS SQL database security, and Apache/IIS Web server security.. Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies to include communication security (COMSEC) integration.
Seven (7) years of experience and an Associate's Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security).. Three (3) years of experience and an Master's Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security).. Two (2) years of experience and an Doctorate Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security).. Relevant experience in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering.. Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering.
Support the development of security documentation including System Security Plans (SSP) and Security Controls in accordance with NIST publications and the Risk Management Framework leading to system Authorization to Operate (ATO).. Coordinates with network security and application teams in determining Intrusion Detection Systems/Intrusion Protection Systems (IDS/IPS), Firewall, Security Proxy, Email Security, and Vulnerability Scanning Solutions that will be used with Case Processing.. Must have 5+ years of experience with Risk Management Framework (RMF). Must be able to lead efforts to Update security documentation for NBIB IT PMO systems needed to obtain and maintain Authority to Operate (ATO). Clearance Required: US Citizenship is required to obtain and maintain Top Secret Clearance with SCI
Behind every mission-critical Cloud service is a sophisticated SaaS architecture supporting the largest companies in the world, employing the most advanced software engineering.. We are looking for experienced security engineers to join our efforts in reshaping the cloud services landscape across industry verticals to revolutionize the delivery of Cloud Services to the world's most critical organizations.. The SaaS Cloud Security organization is responsible for securing enterprise-grade software services on behalf of our 25,000 customers, processing over 60 billion transactions per day.. Oracle SaaS Cloud Security operates as a global team of analysts responsible for monitoring and responding to any potential risks to the Oracle SaaS environment.. The SaaS Detection & Response team collectively covers the breadth and depth of Threat Detection Engineering, Security Operations, Incident Response, Threat Intelligence, and Digital Forensics.
The Security Engineer is responsible for overseeing the company's cyber security and compliance strategy.. Employees are required to work from the office at least four days per week (Monday - Thursday), with Friday available for remote work, offering a blend of in-person collaboration and flexibility.. Perform vulnerability assessments, penetration testing, and risk assessments to identify and prioritize potential security risks and vulnerabilities.. Participate in incident response activities, including investigation, containment, and recovery efforts, as needed.. In-depth knowledge of security tools and technologies, such as computer networking, operating systems, computer hardware and software, and virus protection software Proficiency in networking technologies, network security and network monitoring solutions
In this dynamic role, your primary focus will be leveraging Microsoft administration/support portals as well as Azure Entra capabilities to enhance customer's identity management, compliance, secure posture, and access control.. Strong understanding of identity and access management (IAM) principles, protocols, and standards such as SAML, OAuth, OpenID Connect, and SCIM.. Knowledge of cloud security best practices and understanding of regulatory requirements such as GDPR, HIPAA, SOX, etc.. In-depth knowledge of other Microsoft 365 services, including Intune, Autopilot, Defender, MFA and conditional access, GDAP.. Design and implement identity management strategies within tenant Microsoft 365 environments using Azure Entra or other identify management capabilities with the Microsoft suite of administration consoles.
With over 25 years of experience, SeKON specializes in providing large-scale health IT programs in support of federal government customers including the CDC, CMS, DHA, and NIH. Our vision is "To be the premier management and technology consulting firm providing solutions that improve quality of life and work".. Threat Intelligence and Reporting: Monitor threat intelligence reports, alerts, and advisories.. SIEM and SOAR Management: Collect, store, and analyze security logs.. Certifications: Must possess at least one of the following certifications: Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or equivalent.. Proficiency in Splunk's SIEM and event aggregation tool.
Director, IT Security and Compliance. The Director, IT Security and Compliance will lead the strategic development and implementation of robust security programs and compliance frameworks for our organization.. By collaborating with cross-functional teams, you will design and refine risk management processes, oversee internal and external audits, and champion best practices in IT security.. Risk Management: Oversee the identification, assessment, and mitigation of IT security risks, including the execution of vulnerability assessments and threat analyses.. Incident Response: Lead the development and execution of incident response and disaster recovery plans, coordinating with cross-functional teams to minimize the impact of security breaches.
Job Summary: We are seeking a skilled Cloud Engineer with experience in managing Web Application Firewalls (WAF), specifically in cloud environments like AWS. The ideal candidate will have a strong background in Python and Shell scripting, as well as a solid understanding of networking concepts and cloud technologies.. Cloud Platforms: Experience with AWS services including WAF, ALB, API Gateway, Lambda, CloudFront, CloudFormation, ECS, EC-2, S3, RDS, and CloudTrail.. SIEM Experience: Experience with SIEM tools like Splunk, including query writing, dashboards, and lookup tables.. Web Development: Familiarity with frontend (HTML5, JavaScript, CSS, Angular/ReactJS) and backend technologies (Python, Java, SpringBoot, SQL).. Tools Experience: Experience with Postman, Fiddler, or other HTTP proxy tools.
Job Title: Cyber Security Threat Analyst/Specialist - Senior (AWS) Job ID: 24-05052 Location: Concord, CA (Hybrid) Duration: 06 months on W2 contract Description: *LOCAL CANDIDATES ONLY. 3 days onsite and 2 days wfh TOP THINGS: Teamwork, curiosity, tenacity WORK SCHEDULE: Sunday to Thursday (Swing shift) 2 PM to 8 PM. *Client laptop will be provided Department Overview: Responsible for the delivery of information security services including intelligence research, threat assessment, security event monitoring/analysis, vulnerability management and security tool administration in support of Client's enterprise security goals and objectives.. Cyber Threat Specialists produce metrics and statistics that feed complimentary processes in Client such as risk assessment, patching, anti-virus, firewall management, etc.. The Monitoring & Response Team is built with the foundation of a standard SOC but operates differently by utilizing Threat Intelligence in our daily investigations of security events.. Job Responsibilities: Monitors daily cybersecurity activity in shifts through looking at tools to determine if activity is malignant or benign and then engage others as required Provides analysis on malware and escalates as appropriate to incident response Teams
Primary Location: Far South Side-821 East 103rd Street (George Henry Corliss HS). CHARACTERISTICS OF THE CLASS: Under the supervision of the school principal or his/her designee, coordinates computer technology functions at a local school, including installation, troubleshooting, maintenance, and technical support, and performs related duties as required.. Coordinates integration of the LAN (Local Area Network) with CPS WAN (Wide Area Network). Utilizes disaster recovery skills. Physical demands are in excess of those for Light Work.
Dynamic Routing Protocols like BGP, OSPF, EIGRP Strong knowledge in various network security technology such as Firewall, IPS, AV, Micro-segmentation, Zero-Day attack, Cloud security group management, MFA. Exceptional communication skills, including the ability to write network and security documentation, policies, and guidelines that meet industry standards Hypervisor such as KVM or VMWare working knowledge Decision-Making: Tactical: Decisions focus on intermediate-term issues.. All non-sales roles participate in an annual cash bonus program, while sales roles have an incentive plan.. Other Benefits Complementary stand-by cruises, employee discounts on confirmed cruises, plus special rates for family and friends Personal and professional learning and development resources including tuition reimbursement On-site preschool program and wellness center at our Miami #LI-RM2 #LI-Hybrid About Us In addition to other duties/functions, this position requires full commitment and support for promoting ethical and compliant culture.. Carnival Cruise Line is the most popular cruise brand in North America and operates a fleet of ships designed to foster exceptionally safe, fun and memorable vacation experiences at an outstanding value.. Carnival Corporation & plc and Carnival Cruise Line is an equal employment opportunity/affirmative action employer.
The position will provide "day-to-day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.. SE Linux extensions to RHEL, PitBull, AppArmor, and Sentris), video teleconferencing/VOIP, Oracle/MS SQL database security, and Apache/IIS Web server security Experience: 1+ years related experience SAP experience desired Education: Bachelor's degree in a related area or equivalent experience (4 years) Certifications: IAT Level I - within 6 months of hire (Security+ CE, CCNA Security, etc.). Security Clearance: TS/SCI Willingness to submit to a Counterintelligence polygraph.. Other Requirements: Thorough knowledge of Microsoft Windows desktop and server operating systems, Microsoft Exchange Server, and as needed RHEL operating systems administration and associated hardware Working knowledge of CISCO network and switching and virtualization technologies Working knowledge of Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies to include communication security (COMSEC) integration.. Scheduled Weekly Hours: 40 Travel Required: 10-25% Telecommuting Options: Onsite Work Location: USA TX San Antonio Additional Work Locations: We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community.
S3 access management, EC2 snapshot and instantiation, disaster recovery and access management. WordPress installation, configuration, and hosting management in Windows IIS and MySQL. Strong understanding of AWS cloud. Ability to work closely with the head of IT and other seniors to move initiatives.. Ability to provide system Roadmaps, working with the Infrastructure Manager
Candidates MUST be WI residents or willing to relocate to WI at their own expense prior to starting.. Manage and optimize PostgreSQL databases, including backups, replication, indexing, and query performance tuning.. Knowledge of CI/CD tools like GitHub actions, Azure Devops pipelines, or Ansible for automation.. Prior experience in IT infrastructure, DevSecOps, or SRE roles.. Knowledge of OpenID Connect (OIDC) or Ldap as well as IAM tools such as Entra ID, Okta, Active Directory, or centralized authentication mechanisms.
A culture committed to Diversity, Equity, and Inclusion (DEI) and Social Impact.. 12 weeks parental leave at 100% pay and a financial benefit for adoption and surrogacy for non-physician team members.. This role will serve as a LAN/WAN expert and responsibilities will entail recommending and supporting the selection, development, deployment, monitoring, maintenance, and enhancement of DMG’s network technologies for both traditional network and Azure networking.. Strong proficiency with the configuration, troubleshooting, proper operation and best practices of Layer 2 protocols (i.e. Spanning-tree, 802.3ad Link Aggregation, 802.1q Trunking, LLDP/CDP, etc.). Strong knowledge of technologies related to SD-WAN, VPNs, Azure Networking, QoS, VRF's, and Traffic Engineering