The Network Administrator III is responsible for all aspects of network administration, including: network implementation, configuration, maintenance, troubleshooting, network security, usage monitoring, enforcement of network standards, and other work as required.. Incumbents are expected to be proficient in the Open Systems Interconnection (OSI) model, client and server systems, systems analysis and architecture, application configuration and integration, telecommunication administration, organizational techniques, application security administration, backup and disaster recovery systems, and related processes used in the Information Technology (IT) Department.. Oversee or perform technical support in the administration and maintenance of network hardware, firewalls, network security devices, internet connectivity, VPN, client/server applications, operating systems, telephone systems, and all other related information and office automation systems and networking hardware or software.. Define and implement internet security using network firewalls, internet content filtering software, intrusion prevention systems, and other current network security techniques using the latest technology.. Proficiency must be demonstrated with the various Windows, Cisco, and Juniper platforms in architecture, design, installation, troubleshooting, and maintenance.
Act as a technical leader on threat and vulnerability management by reviewing and analyzing vulnerability data to identify trends and patterns.. Analyze security data and logs from multiple sources (DLP, SIEM, EDR tools, etc.). Firewalls, IPS, WAF, SIEM, and EDR technologies. Hands-on administration with a broad security understanding of one or more products such as anti-malware/anti-virus, firewalls, web proxies, SIEMs, vulnerability scanners, penetration testing, email filtering, DLP, etc.. Proven ability to create documentation for security related plans including incident response and disaster recovery plans
The Manager of Information security will manage a skilled team dedicated to security engineering, operations, incident response, and the development of security policies and procedures.. Works with general counsel to provide responses to client security audits/questionnaires/RFP’s.. Active participant in Information Security and serves as Technology leader for incident response.. One or more of the following certifications strongly preferred: CISSP, CISM; matriculating candidates considered.. Working knowledge of EDR, Vulnerability Scanning, Firewall, Proxy, PAM/PIM, SIEM and other security-related technologies.
Provide computer & network support for various clients via onsite visits, telephone support, ticket support through Connectwise Manage and Automate, and remote desktop assistance through ScreenConnect.. Network infrastructure implementation, VPN/Active Directory/GPO setup & support, email services, antivirus and disaster recovery, preventative maintenance, etc.. Email support including Exchange and Office 365, Google Suites. Exchange and Office 365 migration, administration, configuration and support including sharepoint & Azure. Expertise with Windows Server 2008 through 2019, Active Directory deployment and administration
Core Focus: Google Cloud Platform (GCP) Expertise.. GCP Service Mastery: Deep knowledge of core GCP services (Compute Engine, Storage, SQL, BigQuery, etc. GCP AI/ML Services: Knowledge of other relevant Google Cloud AI/ML services and APIs (e.g., Natural Language API, Vision API).. Infrastructure Automation: IaC with Terraform or Cloud Deployment Manager.. Experience with security concepts such as encryption, identity management, access control, attack vectors, and penetration testing
The successful candidate will be responsible for maintaining the security posture of our program by conducting compliance checks and vulnerability scanning using the Assured Compliance Assessment Solution (ACAS).. Implement and manage the ACAS suite to conduct regular vulnerability scans across the programs's network infrastructure.. Minimum of 5 years of experience in cybersecurity, with a focus on vulnerability management and compliance.. Proficiency with ACAS or similar vulnerability scanning tools.. Relevant certifications such as CISSP, CEH, CompTIA Security+, or equivalent are preferred.
Digitech is a leading provider of advanced billing and technology services to the EMS transport industry.. Since its founding in 1984, Digitech has refined its software platform to create a cloud-based billing and business intelligence solution that monitors and automates the entire EMS revenue lifecycle.. This is a great opportunity for a recent graduate with internship experience looking for thier first full-time position.. Create, oversee and test security measures (e.g. access authentication and disaster recovery). Windows Server Knowledge: Setup, configuration, and management
The characteristics for each level are:IT Network Support Analyst I (Level 1) performs the more routine tasks and duties assigned within the series.. IT Network Support Analyst II (Level 2) performs the full range of duties & responsibilities assigned within the series.. IT Network Support Analyst III (Level 3) performs the most complex types of duties assigned within the series, including assuming project management responsibilities.. Configure, support, monitor, and maintain the organization’s local area network (LAN), wide area network (WAN), internet systems, and connections to cloud-based technologies, NAS solutions, and virtualized environments.. Manage and maintain Active Directory and Microsoft Exchange infrastructure including DHCP, DNS, user accounts, group policies, and security.
Bachelors Degree required from an accredited, not for profit university or college.. Minimum of 6 years of experience in data security, with a focus on risk assessment, incident response, and security architecture design.. Experience in regulated industries (e.g., healthcare, finance) and familiarity with GDPR, PCI-DSS, HIPAA, or other relevant regulations is a plus.. On-site fitness center and/or reimbursed fitness center membership costs (location dependent), with yoga studio, Pelotons, personal training, group exercise classes. Complimentary gourmet coffee, tea, hot chocolate, fresh fruit, and other healthy snacks
This role will focus on validating secure coding practices, penetration testing and ownership over application security vulnerability management.. Engage in reviews of applications security, including code review as well as dynamic and manual penetration testing of products.. Ongoing facilitation of application vulnerability management. Assists in definition, documentation, and evolution of best practices for application security program. Relevant certifications (e.g., Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP), etc.)
This is a fantastic opportunity for a Security Operations Analyst to join our major, global pharmaceutical client on their latest new-build project based in Ohio, this is a large-scale greenfield capital project and investing more than $1bn.. Work with alerts from the Tier 1 cSOC Analysts, to perform in depth analysis and triage of network security threat activity based on computer and media events, malicious code analysis, and protocol analysis;. Work directly with cyber threat intelligence analysts to convert intelligence into useful detection;. Collaborate with incident response team to rapidly build detection rules and signatures as needed;. Leverages emerging threat intelligence (IOCs, updated rules, etc.)
Collaborate with external security researchers, bug bounty programs, and third-party vendors to identify and triage vulnerabilities. Experience writing code using Python and/or Golang, with the ability to perform secure code reviews in these languages. Experience with common security tooling and processes, including incident response, penetration testing, vulnerability scanning, and code analysis. Experience securing cloud-based applications and infrastructure across AWS, Azure, and GCP. Experience and passion for managing services and tools using Infrastructure as Code (IaC) with Terraform
At World Wide Technology, we work together to make a new world happen.. Founded in 1990, World Wide Technology (WWT) is a global technology solutions provider leading the AI and Digital Revolution.. As a Consulting Solutions Architect (CSA), you will be partnering with Client Managers to provide the technical Pre-Sales work focused on Networking and Automation for our Enterprise customers across the Region.. No two days will be the same as our broad offerings include Infrastructure Modernization, Multicloud Architecture, Security Transformation, Artificial Intelligence (AI) and Digital Strategy among others.. Enterprise-scale technical experience with network security, cloud security, hybrid infrastructures secure, architecture designs, and technology management.
The IT Security Manager will serve in a management role with technical capabilities and strategic planning oversight; responsible for overseeing and managing security programs, projects, personnel, logical/technical administration, security acquisitions, and fiscal budgeting.. Applicant must be fingerprinted and pass a local background check conducted by the Macon-Bibb County Sheriff Department.. Knowledge of IT security risk management concepts, including penetration testing. Knowledge of information security standards and frameworks (i.e., NIST, CIS, CSF, PCI-DSS, SOC, ISO, etc.). The IT Security Manager is required to travel locally on occasion.
Senior Director, Security Architecture. Develop and maintain a strategic security architecture vision for the organization.. Ensure compliance with local, national, and international security standards and regulations.. Professional certifications such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or SABSA Chartered Security Architect.. Prior work in dynamic, hybrid IT environments, including significant experience with cloud security architectures across platforms like AWS, Azure, and Google Cloud.
The Senior Network Engineer is a key member of the Network Operations team.. Experience with Check Point NGX, IPS/IDS, Rapid7 Nexpose, SolarWinds is essential.. Proactively monitor and troubleshoot connectivity for the FTE's Network Infrastructure including campus, roadside, backbone, LAN, Walk-in Centers, partner networks and third-party connectivity. Assist the SRCO team with investigation, triage forensic analysis, and evidence preservation regarding cybersecurity events.. Assist with threat intelligence and hunting by leveraging in place security tools
Utilize Infrastructure as Code (IaC) tools such as Terraform to automate the deployment process efficiently.. Leverage CI/CD pipelines and automation tools like Azure DevOps to streamline infrastructure updates and changes.. Hands-on experience with Infrastructure as Code (IaC) tools such as Terraform. Awareness of FedRAMP, FISMA, and/or Zero Trust Architecture is desired.. Experience with CI/CD pipelines and deployment automation using tools like Azure DevOps
In addition, this role focuses on performing the following Network & Telecommunication Support duties: Develops, administers, and tests IT Systems Software, Hardware, and Databases, Data & Voice Networks, Data Processing Operations, End User Technology & Software Support, Conducts cost/benefit analyses for proposed IT projects as input to the organization’s IT roadmap.. Works with Systems and Network manager on planning and design on network infrastructure plan and implements expansion and maintenance of Storage Area Network and assists Systems and Network Manager designing and planning future growth.. Assumes full responsibility for capacity planning, setup, implementation, maintenance, and support including Storage Area Networks, Archive Systems, Network Area Storage (NAS), Gateways, Stand Alone storage systems, Optical Solutions, etc.. Assists in the support for File Server Operating Systems including Meditech, Windows, Linux, Unix, etc.. 7 Responsible for leading projects in LAN, WAN, Wireless, Storage, and network security appliance.
Job Title: IT Security Specialist. Ensure the Epic EHR system is secure and compliant with federal, state, and organizational security policies, including HIPAA, HITECH, and other applicable regulations.. Respond to and investigate security incidents related to the Epic EHR system, ensuring timely resolution and proper reporting to relevant stakeholders.. Perform risk assessments on new modules or integrations within the Epic EHR, identifying potential security vulnerabilities and developing mitigation strategies.. Work closely with other members of the IT security team to ensure alignment between EHR security and overall organizational cybersecurity strategies.
With our focus on four therapeutic areas –Oncology, Inflammation, General Medicine, and Rare Disease– we reach millions of patients each year.. Site point of contact for the Manufacturing Cyber Resiliency ecosystem, managing and coordinating the execution of various Security Operations, Business Continuity, Networking, Infrastructure, Anomaly Detection, Patch Management and Operations DTI projects.. Strong knowledge of Fortinet UTM/Firewall solutions, including SSL & IPSec VPN, IDS/IPS, Firewalls, Web Proxies, and Web Application Firewall (FortiWeb).. Cloud security certifications like AWS SAC03, Azure AZ-305, GCP – PCA or similar. Demonstrated knowledge and experience in one or more Information Security capability like security monitoring, threat intelligence, network security, data security, endpoint security, technical security assessments, security architecture.