Disaster Recovery: Develop and implement disaster recovery and business continuity plans to minimize downtime and data loss.. Deep knowledge of security architecture, vulnerability management, identity and access management, and incident response activities.. Oversee security architecture, vulnerability management, identity and access management, and incident response activities.. Deep expertise in network architecture, cloud computing, data center operations, and virtualization technologies.. Founded in 1966, Heitman is a global real estate investment management firm.
Develops and implements a comprehensive Security Operations strategy, encompassing threat monitoring, incident response, vulnerability management, and medical device product security monitoring.. Develops and maintains relationships with external security organizations, law enforcement, and other agencies to enhance the threat intelligence and incident response capabilities.. Collaborates with other entities such as GRC (Governance, Risk, and Compliance), developing a hosted environment security risk management strategy consistent with changing enterprise-specific and industry-wide risk and regulatory environment.. CISSP, GSOC, GMON, GSOM or other relevant cybersecurity certifications.. Strong knowledge of incident response, vulnerability management, and security monitoring practices.
Top Secret/SCI w/Poly. Must possess an active, current Top Secret/Sensitive Compartmented Information (TS/SCI) clearance with polygraph;. 8+ years of experience working in three or more of the following: analysis, network engineering, network security, offensive experience, technical collection, penetration testing, "red teaming", hardware engineering, software reverse engineering, and computer exploitation;. 7+ cumulative years of experience with at least three of the following: SIGINT, MASINT, HUMINT, or OSINT collection capabilities and dissemination systems;. Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy.
Join to apply for the VP, Security Engineer - CWAF (Remote) role at Jenius Bank.. Proficiency in configuring and managing enterprise-grade firewalls (e.g., Palo Alto, Fortinet, Cisco, etc. Experience with network protocols (TCP/IP, DNS, HTTP/HTTPS) and security technologies (IDS/IPS, DDoS mitigation, VPNs).. Preferred Skills Certifications such as CISSP, CEH, CISM, CCNP Security, or equivalent.. Familiarity with DevSecOps practices and tools (e.g., CI/CD pipelines, infrastructure as code, ACLs/Allowlisting).
In addition, we are proud of the leading-edge science coming out of our discovery labs, including early-stage research programs that leverage our extensive ion channel expertise and drug discovery capabilities to identify validated drug targets and develop new product candidates.. This position reports to the Senior Director, Information Security & IT Risk Management and will be in Boston, MA, USA. The level of the position will be commensurate with the candidate’s education and industry experience.. Partner with the SVP, Information Security & IT Risk Management and with the IT business partners to facilitate discussions with functional leaders to document practices for managing Restricted and Confidential information, and to establish additional controls as needed.. Industry-recognized certifications such as CompTIA A+ Cyber, GIAC GCIH/GSEC, or SSCP.. Finance Systems and Reporting Senior Manager SENIOR MANAGER, INNOVATION (PhD or MD required) Boston, MA $175,300.00-$322,900.00 2 weeks ago
Task Force Talent is seeking a Network Engineer with an active TS/SCI FSP security clearance to support a unique government contract.. They work on very interesting, usually highly technical roles in cybersecurity, software development, data science, and related areas for well-known companies and government organizations.. Knowledge of LAN, WAN, TCP/IP, UDP, GRE, IPSec, VPN, WireGuard, Routing, and Software and Hardware Firewalls. Our clients include seed to Series B startups working on AI, cybersecurity, quantum computing, and other novel technologies.. We also work with small to medium size government contractors, and we help leading venture capital firms find talent for their portfolio companies.
Threat Assessment and Mitigation. Strong understanding of Cryptography, Authentication, Authorization, Secrets Management, Data Security, Web Technologies, and Cloud Security.. Experience implementing and managing security solutions like EDR/XDR, IAM/PAM, Web Proxies, SIEM, SOAR. Solid experience with Windows, MacOS, and Linux operating systems, including virtualization, containers, and cloud technologies.. Broad knowledge and experience across the information security domain, including familiarity with endpoint, email, network, identity management, cloud security, vulnerability management, incident response, and threat intelligence
CACI's Transport & Cybersecurity Services (TCS) program is actively hiring a team of TS/SCI cleared Network Engineers to support an Intelligence Community customer's wide-area (WAN), local-area (LAN), and campus-area (CAN) networks across multiple security domains.. TCS offers a long-term, CACI prime contract opportunity supporting the National Geospatial-Intelligence Agency's (NGA) GEOINT mission.. Our team of talented Network and Cybersecurity professionals help design, develop, procure, implement, operate/sustain, and enhance NGA networks and cybersecurity posture in support of national security.. Network analysis tools (HP/Microfocus Network Automation and Network Node Manager, Juniper Secure Analytics, Infoblox, Riverbed.). Supporting IP services to connect to NIPRNET, SIPRNET, and JWICS (IPv4, VPN, IPv6, Multicast, QOS, SDN, SNMP, VOIP, VTC, etc.)
This role is all about driving the firm's Information Security Governance, Risk, and Compliance (GRC) program forward-with purpose, creativity, and a touch of fun.. Develop and implement vendor risk management policies and procedures.. Strong understanding of IT systems and information security practices, including enterprise IT infrastructure and architecture, operating systems, servers, web applications, endpoint and network security, identity and access management, security protocols, cloud security, cryptography, secure coding, SSDLC, penetration testing, vulnerability management, patch management, SIEM, etc.. Prior third-party risk management experience.. Bachelor's degree in information security governance, risk, compliance, or IT-related majors.
You will analyze SIGINT and cybersecurity data across multiple OSI network layers, bringing a solid understanding of logical and physical IP core infrastructure, communication devices, their network connections, and traffic movements. Relevant experience includes computer or information systems design, development, and analysis, as well as engineering hardware and software, programming, computer and network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and network and systems administration. Background in hardware/software engineering, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, or network and systems administration. Degree in related fields (e.g., Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). RealmOne has won numerous awards, to include Top Workplaces by the Baltimore Sun. Across more than 20 prime contracts, RealmOne is a premiere innovator for the Government and Department of Defense, and our team is located across the United States.
As an Information Security Engineer II, you will play a key role in securing APIs across cloud and hybrid environments. This role is ideal for someone with a strong technical foundation in security engineering, a passion for automation, and experience with modern DevSecOps practices. The ISE is focused on securing the network through the operations of intrusion detection system/intrusion prevention system (IDS/IPS), data loss prevention (DLP), Proxy, enterprise anti-virus and anti-malware solutions, log management, and vulnerability scanning and remediation. Proactively monitor and investigate network security alerts from managed security service provider and in-house security tools. Industry Standard Certifications such as, but not limited to: CompTIA A+, CompTIA Network +, CompTIA Security +, ISC2 CISSP, and EWS are preferred.
We have a client seeking a seeking a highly motivated and resourceful Data Compliance, Security & Resilience Lead to spearhead their global data compliance efforts, third-party risk management, and security audit readiness.. This role is pivotal in ensuring compliance with international data protection laws (e.g., GDPR, LGPD, UK GDPR) and maintaining operational resilience through ownership of Disaster Recovery (DR) exercises, penetration testing, and open source license compliance.. AML Enhanced Due Diligence Manager - VP/SVP Houston, TX $120,000.00-$180,000.00 2 weeks ago. Senior Manager, CIB & Research Compliance Officer Houston, TX $99,790.00-$190,995.00 1 week ago. Lending Compliance Manager (Full Time)-Plano/Amarillo/Sugar Land Houston, TX $115,000.00-$145,000.00 2 weeks ago
Configure and manage security tools such as Splunk, Sophos, KnowBe4, Qualys, AWS, etc.. Our HQ is based at our state of the art home office in the historic Bell Works complex located in Holmdel Township, New Jersey. from restaurants and retail to art and culture the Bell Works “Metroburb” is a microcosm of innovation, possibility, and inspiration and WorkWave is proud to be a part of it. Pharmacy, urgent care, bank, restaurants, florist, gym, dentist, outdoor patio bar and weekly farmers market all conveniently located on the first floor - making running errands on a break a breeze.. When in the office kick back in our common area, play a game of arcade basketball, video games in our game rooms or face off in a ping pong match
Revive RX is the premier licensed pharmacy specializing in health, wellness, and restorative medicine.. Review IT security reports and conduct audits of access control systems.. CISSP certification required ; CISA certification is a plus.. Experience in incident response, threat analysis, and vulnerability management.. Proficiency with security tools such as firewalls, SIEM, IDS/IPS, antivirus, and encryption software.
The contractor is responsible for the planning, analysis, design, development, testing, quality assurance, configuration, installation, implementation, integration, maintenance, and/or management of networked systems used for the transmission of information in voice, data, and/or video formats.. Manage the agency's telephony infrastructure including voice terminals, VOiP, voice switching, provisioning, analog lines, ACD and IVR systems.. Monitor network infrastructure and systems using tools such as Cisco ISE, Cisco Umbrella, Cisco FMC, SSH, Microsoft Active Directory Tools and Utilities, Microsoft Intune, Kaseya, Cayosoft, RDP, and managing appliances including IDS/IPS devices, firewalls, VMware vCenter, Windows Servers, DHCP, DNS, and other tools as available or necessary.. Certification in network or system administration is highly desired, such as CCNA, CCNP, CCIE, CISSP, MCSE, MCSA, or other related and similar certifications. FBI Special Agent: Cybersecurity/IT Expertise Arlington, VA $99,461.00-$128,329.00 1 week ago
Threat Hunting & Threat Assessment. Strong background in SOC operations, SIEM, threat intelligence, and digital forensics.. Strong understanding of MITRE ATT&CK framework, TTPs (Tactics, Techniques, and Procedures), and cyber kill chain.. Hands-on experience with cloud security (AWS, Azure, GCP) is a plus.. Certifications such as GCIH, GCFA, CISSP, CISM, or OSCP are highly desirable.
The Director, Cybersecurity Governance, Risk, and Compliance manages a team with responsibilities spanning policy management, risk assessments, business continuity / disaster recovery, third-party risk, audit support, security awareness and compliance monitoring.. Ensure enterprise compliance with regulatory, contractual, and industry standards (e.g., SOX, PCI DSS), serving as the executive liaison to auditors and regulators.. Professional certifications such as CISSP, CISM, CRISC, or CISA preferred.. Associate Director, Security Delivery Management. Director, Senior Cloud Security Architect
Cloud Security Engineer is responsible for leading the first line of defense for Information Security services around Cloud application, infrastructure, platform security, and related matters.. The Cloud Security Engineer will also be responsible for coordinating with internal teams to implement data loss prevention and cloud security solutions aligned with corporate business objectives and regulatory requirements.. · Designing and maintaining end user solutions for data leakage prevention, endpoint FW strategies, proxy filtering, and Active directory controls/remediation. · 2+ years working experience with Cloud security technologies/vendors (e.. g., CASB, DLP and Proxy ) direct experience with Symantec solution preferred
Interface and partner with customer success and threat intelligence liaisons to align customer expectations with Halcyon, ensuring service delivery excellence and customer satisfaction in commercial contexts.. Knowledge in areas relevant to commercial sectors: Cloud Security, Endpoint Defense, Modern Malware Lifecycle, Threat Intelligence, Security Operations, Incident Response, Endpoint Management, Identity Protection, and Computer Forensics.. CISSP, CEH, GIAC GCFA, GCIH, or similar certifications, with relevance to commercial sectors.. Neurodivergence, for example, attention-deficit/hyperactivity disorder (ADHD), autism spectrum disorder, dyslexia, dyspraxia, other learning disabilities. Traumatic brain injury
Lead and execute red team operations and penetration tests to identify security weaknesses in clients' networks, systems, and applications.. Work closely with clients to enhance their incident response strategies and security awareness based on insights from red team operations.. At least 3 years of hands-on experience in cybersecurity roles focused on penetration testing or red team operations.. Proficiency with penetration testing tools like Metasploit, Burp Suite, and Cobalt Strike, and scripting languages such as Python and PowerShell.. Preferred certifications include OSCP, CEH, GPEN, and GWAPT.