SCAN Group is the sole corporate member of SCAN Health Plan, one of the nation's leading not-for-profit Medicare Advantage plans, serving more than 285,000 members in California, Arizona, Nevada, and Texas.. As the Chief Information Security Officer (CISO), you will be responsible for establishing and maintaining the enterprise vision, strategy, and programs to ensure that information assets and technologies are adequately protected for both SCAN Health Plan and associated portfolio companies.. The CISO will be the strategic leader for all aspects of information security, including security architecture, risk management framework, incident response, security awareness training, and vulnerability management.. CISSP (Certified Information Systems Security Professional) or Certified Information Security Manager (CISM). Understanding and experience with adherence to information and network security standards (HIPAA, HITECH, HITRUST, PCI and PII compliance), data management, disaster recovery.
Serves as a Subject Matter Excerpt (SME) in cybersecurity for the Assessment and Authorization of information systems across the DLA enterprise.. Proven proficiency performing CCRI/ vulnerability assessment/ penetration testing on networks, databases, computer applications and IT frameworks.. o Boundary defense (network policy, router, firewall) o Internal defense (L2 switch, L3 switch)o DNS (policy, BIND/Windows). o HBSS (remote console, AV, ABM, PA, HIPS, ePO). Tenable Certified NESSUS Auditor, IAM level III and IAT level II certifications
We are seeking an experienced Enterprise Architect to lead the alignment of our technology strategy with evolving business needs, with a strong emphasis on innovation, development, and secure infrastructure.. In this pivotal role, you will help shape our organization's technology landscape, enhance operational efficiency, and support a culture of innovation for our DSA employees.. Secure Development Enablement: Integrate security into development processes by promoting secure coding, threat modeling, and vulnerability management.. Architectural Advisory: Provide expert guidance on infrastructure and enterprise architecture design to ensure alignment with business and security requirements.. Network Security: VPNs, SSL/TLS, IPsec, firewalls, IDS/IPS Endpoint Security: EDR, antivirus, MDM systems Cloud Security: IAM, encryption, and compliance in AWS, Azure, or Google Cloud Data Protection: Encryption, tokenization, and DLP tools Disaster Recovery & Business Continuity: DR planning and backup strategies Regulatory Compliance: Understanding of GDPR, HIPAA, PCI DSS, and related frameworks
West Monroe is excited to hire a Cybersecurity - Senior Manager to deliver on full lifecycle Cyber projects for various industries, which may involve security controls audits & remediation, risk advisory, compliance assessments, threat hunting, resiliency planning, application & cloud security, data protection, identity management and/or strategy & roadmap development.. Lead junior consultants on projects, delegate workstreams, and act as career advisor/mentor. Broad knowledge of cybersecurity competencies such as security controls, threat hunting, incident response strategy, cloud security, application security, etc.. Knowledge of leading security solutions/product capabilities for security domains including: Security Monitoring, Governance, System Protection, Network Security Vulnerability Management, Incident Response, Identity and Access Management and Data Protection.. 1-3 years technical experience in one or more areas including Cloud Security, Data Protection (Microsoft Purview or other), Identity and Access Management (Microsoft or others), AI, Threat Hunting, Dark Web Analysis, and Attack Surface Management
Our portfolio includes the iconic Campbell’s brand, as well as Michael Angelo’s, Pace, Pacific Foods, Prego, Rao’s Homemade, Swanson, and V8.. In our Snacks division, we have brands like Cape Cod, Goldfish, Kettle Brand, Lance, Late July, Pepperidge Farm, Snack Factory, and Snyder’s of Hanover.. 2 years of experience as an Information Security Analyst with experience within at least two of the following disciplines: networking, system hardening, identity and access management, or privileged access management. Knowledge of identity and access management principles (SSO, MFA, ModernAuth). Data protection tools and processes – Data Loss Prevention [DLP], Rights Management Services [RMS], Cloud Access Security Broker [CASB]
We are seeking a skilled Web Application Penetration Tester with 2+ years of experience to join our on-site team in Lehi, UT, or Boise, ID. In this role, you will be responsible for identifying, reporting, and mitigating security vulnerabilities in our clients' web applications.. Proficient in using penetration testing tools such as Burp Suite, OWASP ZAP, Nmap, Nessus, and others.. Relevant certifications such as OSCP, CEH, CISSP, GWAPT, or GPEN are a plus.. Application Security Engineer, Secure Development & DevSecOps Security Analyst, Governance, Risk, and Compliance Lehi, UT $104,000.00-$224,000.00 1 week ago. Information Security Engineer II (IAM and Platforms) Full Time Security Engineer (Remote till Pandemic) Salt Lake City, UT Lehi, UT $160,900.00-$297,400.00 1 week ago
Just Energy is a consumer company focused on essential needs, including electricity and natural gas; health and well-being, such as water quality and filtration devices; and utility conservation, bringing energy efficient solutions and renewable energy options to consumers.. · Payment Card Industry Data Security Standard (PCI-DSS) requirement.. · Working experience with the following tools – IDPS, MITRE, SIEM, SOAP, WS Security, PowerShell, and Python scripting. CISSP/GIAC/CCSP certification will be nice to have or work toward any of them.. Cisco IOS, NX-OS, Palo Alto Firewalls, Meraki
Conduct vulnerability analysis, assessments and remediation.. Work with the IT team to establish disaster recovery plans. Conduct and/or lead penetration testing to simulate attacks and identify weak points. Conduct internal and external Cyber Forensics deep-dive incident analysis initiatives.. Respond to events in real time and prepare detailed incident response reports.
We're looking for an IT Network & Infrastructure Architect to help build and evolve a secure, highly available network‑to‑compute foundation that powers Nexamp’s corporate and operational technology. Engineer and optimize WAN / LAN architecture (BGP, OSPF, VPN, QoS) on Palo Alto, Cisco, and Extreme hardware; drive segmentation and zero‑trust principles. Lead Azure Networking: create and secure Virtual Networks (VNets), Virtual Hubs (VHubs), Azure Firewall, route tables, ExpressRoute/BGP peering. Enable and govern Azure IaC best‑practices for Dev/Engineering teams (templates, policies, automation); workloads remain owned by those teams. Experience with or exposure to NERC CIP or other highly compliance driven environments is a plus.
Overview/ Job Responsibilities Sev1Tech is looking for a Lead Cloud Security Architect who will have extensive experience in designing and implementing security measures for cloud-based solutions.. As a Lead Cloud Security Architect, you will be responsible for ensuring the security of our cloud infrastructure and solutions, developing, and implementing security standards and best practices, and providing technical guidance to other security architects and engineers.. Developing and implementing security standards and best practices for cloud infrastructure and solutions in AWS, Azure, OCI, and GCP cloud platforms hosted in FedRAMP and FedRAMP+ environments.. Experience with public cloud providers (certificate preferred) such as AWS, Azure, OCI, and GCP in FedRAMP and FedRAMP+ environments.. Experience with cloud security technologies such as identity and access management, encryption, and network security.
Leverage threat intelligence by integrating actionable insights into threat hunts, detection mechanisms, vulnerability management, preventative controls, and tabletop exercises. Strong knowledge of information security principles, practices, and technologies, including threat monitoring, threat intelligence, threat hunting, vulnerability management, incident response, and security operations.. Demonstrated experience leading penetration testing programs, interpreting results and managing remediation.. Experience securing algorithmic trading environments and quantitative research platforms.. Resting on more than a quarter-century of investing experience, we seek to be the industry’s premier asset manager through delivering superior risk-adjusted returns, adhering to the highest ethical standards, and offering the greatest opportunities to the industry’s brightest talent.
Talent Acquisition Manager at Synergy Business Consulting, Inc. The Sr. Architect, Network Security is responsible for designing and implementing enterprise security strategies, ensuring compliance, and maintaining a secure and scalable network infrastructure.. This role involves multi-vendor firewall migrations, network policy design, penetration testing, and troubleshooting security incidents.. Key technologies include Palo Alto, Juniper SRX, Cisco routing and switching, and cloud security, with at least one certification required (PCNSE, JNCIP-SEC/JNCIE-SEC, CISSP).. The position requires collaboration across IT and business teams, research into emerging security technologies, and occasional international travel (up to 25%).. Candidates must have at least five years of experience in large-scale network security architecture, deployment, and automation.
The Director-IT Security and Infrastructure is responsible for overseeing the strategic management and operation of technology infrastructure, cloud services, identify and access management and the cybersecurity program for Trinity Health Michigan Medical Groups.. Maintains oversight of all the information systems technical infrastructure for Michigan Medical Groups including data center operations, the physical and virtual server environment, storage, LAN/WAN, end-user devices, telephony infrastructure and backup and disaster recovery.. In collaboration with the Vice President-Information Technology, develops the IT Strategic Plan and technical priorities, standards and procedures.. Experience in managing the specific technical areas of data center operations, the physical and virtual server environment, the storage environment, LAN/WAN, end-user devices, telephony infrastructure , backup and disaster recovery.. Direct experience with cyber threat intelligence, incident response, and security operations.
CGS is searching for an experienced Network and Technical Support Manager (NTSM) to support the Joint Base San Antonio (JBSA) Mission Training Complex (MTC) located at Camp Bullis.. The NTSM also serves as the Technical Support Lead (TSL) and shall conduct overall management coordination for all technical, networking, simulation, exercise design, and administrative support.. The TSL assists the Government in the design, development, delivery, and maintenance of simulation systems and tools, and exercises and training events.. The TSL provides strategic solutions for standardizing technology, technical documentation, and technical support models across the JBSA and supported spokes.. Understand and assist the Government with the implementation of RMF through the Assessment and Authorization process, as well as the RMF Assess Only process as required to ensure the authorized use of software, networks, and systems in support of training.
Identity Access Management (IAM). Strong experience in cloud security (AWS preferred, Azure also accepted), infrastructure architecture, and zero trust frameworks. Vice President, Information Security – CISO Senior Security Analyst - IAM/ PAM with (HiPAM (Hitachi Password Manager) - Dallas, TX or NJ Sr Manager, Security Engineering & Architecture Arlington, TX $170,000.00-$190,000.00 2 weeks ago. Staff Security Analyst, Threat Intelligence and Investigations Director, Information Security (Cloud Architecture, AppSec, Data & Product Security focus) Associate Security Architect (Senior Cybersecurity Engineer) Senior Vice President, Cloud Solution Security Architect - C14 - IRVING Irving, TX $156,160.00-$234,240.00 2 weeks ago. Security Design Consultant (Dallas Based) Dallas, TX $100,000.00-$120,000.00 3 weeks ago
We are seeking an experienced Cyber Vulnerability Assessment Analyst SME to join our cybersecurity team in Lorton, United States.. Leading penetration testing. Performing advanced protocol analysis for nation-state and state-sponsored cyber threat actor capabilities. Ensuring an industry best practice implementation utilizing agile practices for scanning and end to end vulnerability remediation. Must possess knowledge of NIST RMF
An important part of the Toyota family is Toyota Financial Services (TFS), the finance and insurance brand for Toyota and Lexus in North America.. Toyota Financial Services (TFS) Technology team is looking for a highly motivated person to fill a role as a Cloud Security Engineer, Lead.. Cyber Security relevant certifications including CISSP, CCSP, CSP Security specific certifications (i.e., AWS Certified Security; Microsoft Certified: Azure Security Engineer Associate; Google Professional Cloud Security Engineer; etc.). Associate Security Architect (Senior Cybersecurity Engineer) Senior Network Security Engineer Palo Alto and Cisco Sr Staff, Infosec Engineer - Selling Channel Security Dallas, TX $118,200.00-$204,300.00 2 weeks ago. Security engineer with HSM/KMS (Utimaco, Thales, Entrust) Senior Platform Engineer - Quality & Security Plano, TX $118,700.00-$198,800.00 2 weeks ago
Riot is a Bitcoin mining and digital infrastructure company focused on a vertically integrated strategy.. The Company has Bitcoin mining data center operations in central Texas and Kentucky, and electrical switchgear engineering and fabrication operations in Denver, Colorado.. Riot is advancing its Bitcoin mining operations through cutting-edge innovation, strategic expansion, and targeted procurement.. Our innovative spirit has positioned us as a leader in the industry, driving advancements that are setting new standards at the intersection of Bitcoin mining and energy.. Technical skills: eDiscovery tools (e.g., Microsoft Purview, Relativity), IAM systems, digital forensics.
Verizon, Digital Forensics and Incident Response Analyst - Application via WayUp Join to apply for the Verizon, Digital Forensics and Incident Response Analyst role at WayUp.. Role Overview The Threat Management Center (TMC) is the first line of defense for Verizon's networks and information systems.. This position involves proactive threat hunting, incident response, and mitigation across Verizon’s on-premises and cloud environments.. Experience in Digital Forensics, Incident Response, or SOC environments.. Certifications such as Security+, CISSP, CEH, GCFA, etc., or cloud security certifications.
Overview Cybersecurity Consultant OT Sensoring & Monitoring Systems Location: Onsite at the Pentagon (3 days remote / 2 days onsite) Clearance Required: Active DoD Top Secret (SCI eligibility required). This mid-level role is ideal for professionals with 35 years of hands-on experience in intrusion detection systems, OT/ICS security, and cyber operations integration.. Working knowledge of OT/ICS protocols and how they map to sensor data and network visibility. Exposure to applying machine learning for anomaly detection in OT/ICS data. Experience fusing data from multiple sensor feeds and threat intelligence sources