Cybersecurity & Network Management Jobs
Secure enterprise systems with these Cybersecurity & Network roles. Prevent breaches, protect data, and maintain robust IT infrastructures.
You'll work on a variety of cybersecurity and digital risk topics, applying generalist consulting skills to strategic cybersecurity & digital risk questions.. Delivering operational resilience through incident response, business continuity, and disaster recovery planning. Designing / implementing vulnerability management, including conducting vulnerability assessmentsPerforming penetration testing, incident management, BCP, and/or DRP. BCG pioneered strategy consulting more than 50 years ago, and we continue to innovate and redefine the industry.. Paid Parental Leave and other family benefits such as elective egg freezing, surrogacy, and adoption reimbursement
The Chief Architect MUST HAVE AN ACTIVE SECRET CLEARANCE and has demonstrated experience designing, architecting, and managing large scale network infrastructures, and is responsible for all the technology of an Enterprise Zero Trust Architecture deployment.. Knowledge of cloud platforms and services is important, familiarity with cloud providers such as Amazon Web Services (AWS), Microsoft Azure, or Google Cloud Platform (GCP) is valuable.. Experience with Identity and Access Management (IAM) principles for authentication, authorization, and access control including designing and implementing IAM solutions, technologies like single sign-on (SSO), multi-factor authentication (MFA), and privilege management.. Desired Qualifications Experience with next generation firewall technology (Palo Alto, Check Point, Fortinet, Versa etc. Certificates within network/security domain (CCNA, CCNP, CCIE, PCNSE, etc
SIEM experience required with Splunk preferred. Utilize advanced tools, such as host based digital forensics or malware analysis capabilities, to identify incidents’ root causes, scope, and impact.. Collaborate with cyber threat hunting and cyber threat intelligence teams.. Accurately document triage findings, and intake reports of external cybersecurity events from SOC customers via phone or email in the SOCs Incident Management System(IMS).. Perform research into emerging threats and vulnerabilities to aid their prevention and mitigation Help shape the evolution of processes and procedures of the SOC
As a Threat Intelligence Analyst you will have the opportunity to work in a thriving and robust environment across multiple specialty areas by analyzing cybersecurity information, investigating cybersecurity incidents and events, and protecting & defending against threats to MassMutual's digital assets.. Our penetration testing, bug bounty and responsible disclosure function assesses our applications to make sure they are secure in both pre and post-production environments.. Cybersecurity certification like GCTI, GCFA, CCTHP.. System and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).. Prior experience teaching and mentoring others in security threat intelligence.
Our team of U Krewers are on a mission to inspire every organization to become a great place to work through our award-winning HR technology built for all.. That's why our benefits help you thrive personally and professionally, from wellness programs and tuition reimbursement to U Choose — a customizable expense reimbursement program that can be used for more than 200+ needs that best suit you and your family, from student loan repayment, to childcare, to pet insurance.. You will support leading production level projects to completion as a contributor and a collaborator between multiple stakeholder teams including the AppSec functions, Red Team, IAM, Security Operations Center (SOC), vulnerability management, Threat Intelligence, GRC, Incident Response, Disaster Recovery, and product development.. 4 years of hands-on security engineering, vulnerability analysis, AppSec, pentesting/red teaming, networking, operating systems, SAAS, and Cloud security experience.. Bug bounty or other differentiated skill sets and experiences.
Defines and owns a multi-year cybersecurity roadmap and key performance indicators focused on reducing cyber risk. Creates quarterly, annual, and long-term cybersecurity and cyber risk management goals, articulates strategies, defines metrics, and provides necessary updates to executive leadership and the Security Steering Committee. Leads Security Incident Responses, Vulnerability assessments, Third Party Information Security assessments, Data Protection and Encryption, Identity & Access Management, and Privileged User Access to protect both customer and employee data. Coordinates responsive actions for disaster recovery, business continuity, and incident response plans. Hands-on experience leading one or more of the following functions is required: GLBA/privacy, third-party risk management, cyber resilience planning/response, strategy/board reporting
The cloud security architect role is responsible for architecting, implementing, and advising a secure cloud infrastructure supporting business needs.. A cloud security architect is highly technical and proficient in cybersecurity and systems administration across a wide variety of infrastructure types (SaaS, IaaS, PaaS).. Proficient in one or more: Terraform, Kafka, Kubernetes, scripting (Python, JavaScript, Bash).. Proven use with zero trust network access, encryption, web application firewalls, data protection, vulnerability management, API security, IaC.. Licenses: Preferable, but not required: CISSP, CISM, CRISC, CISA, GCIH, GCFA, GCFE
The mission of TikTok's Global Security Organization is to build and earn trust by reducing risk and securing our businesses and products.. As a Network and Web Application Security Specialist in the Security Operations team, you will lead technical validation, deployment, and management of security platforms, tools, and technologies to enforce robust security controls across TikTok's infrastructure.. Relevant certifications in information security, such as CISSP, SSCP, CAP, CCSP, CISM, or CSX-P, or applicable equivalent experience.. At TikTok, our mission is to inspire creativity and bring joy.. TikTok's global headquarters are in Los Angeles and Singapore, and we also have offices in New York City, London, Dublin, Paris, Berlin, Dubai, Jakarta, Seoul, and Tokyo.
The Chief Information Security Officer (CISO) is responsible for developing, implementing, and maintaining a comprehensive security strategy to protect PERA's digital assets, mitigate risks, and ensure compliance with industry regulations and best practices. Professional certification as a Certified Information Systems Security Professional (CISSP), Certified Chief Information Security Officer (CCISO), Certified Information Security Manager (CISM), or Certified Risk and Information Systems Control (CRISC) required. Experience with security technologies and controls such as firewalls, intrusion detection systems, vulnerability scanners, encryption, penetration testing, privileged access management, vendor risk management, data loss prevention, and mobile device management. Certified Information Systems Security Professional (CISSP), Certified Chief Information Security Officer (CCISO), Certified Information Security Manager (CISM), Certified Risk and Information Systems Control (CRISC) or other similar credentials. We offer a generous paid time off plan as well as paid volunteer hours, PERA's defined benefit plan, 401(k) and 457 defined contribution plans (including employer match on the 401(k), as applicable), tuition assistance, on-the-job training, free access to an on-site fitness center, free on-site parking or RTD subsidy, and more.
This position requires strong experience withCisco and Palo Alto firewalls, SD-WAN using Meraki, routing and switching, loadbalancing (F5), and network design for multi-datacenter environments, includinghybrid Azure Cloud solutions.. Design and manage SD-WAN solutions using Cisco Meraki, optimizing performance and security for remote and branch office connectivity.. Minimum of 8-10 years of experience in network engineering, with a focus on Cisco, Palo Alto firewalls, SD-WAN (Meraki), F5, routing, switching, and network design.. Strong experience in firewall management and network security tools such as Palo Alto, Cisco ASA, or similar technologies.. Relevant certifications (e.g., CCNP, CCIE, PCNSE, F5, Meraki, Azure Networking certifications) are highly desirable.
As a Cloud Security Engineer, you will play a crucial role in designing, implementing, and maintaining security measures to protect our cloud-based infrastructure across multiple platforms including AWS, GCP, and Azure.. The ideal candidate will have expertise in cloud security best practices, container security, automation tools such as Terraform, and programming languages like Golang and Python.. The scope of the Security Operations team includes Application Security, Detection Operations, Incident Response, Infrastructure Security, Penetration Testing, and Threat Intelligence.. Automate security processes using Terraform and other infrastructure-as-code (IaC) tools.. Our four employee-led Opendoor Employee Resource Groups amplify diverse voices and promote collaboration and inclusion.
Lawrence Berkeley National Lab’s (LBNL) National Energy Research Scientific Computing Center (NERSC) Division has an opening for a Cyber Security Engineer to join the team.. NERSC provides critical HPC and data systems and support for NERSC’s 10,000 users researching alternative energy sources, climate science, energy efficiency, environmental science and other DOE mission areas.. Experience with Linux/Unix system administration, and some familiarity in the use of configuration automation tools such as puppet or ansible.. Previous experience with network security, incident response, intrusion detection, forensics, vulnerability assessments, threat hunting, penetration testing, cyber threat intelligence, or similar cyber security role.. Hybrid work is a combination of performing work on-site at Lawrence Berkeley National Lab, 1 Cyclotron Road, Berkeley, CA and some telework.
Deep understanding of cybersecurity principles, SOC operations, and incident response techniques. Ability to develop and implement strategic initiatives to enhance the effectiveness of SOC operations. Proficiency in security operations, incident response, threat analysis, and cybersecurity tools such as, EDR (Endpoint Detection and Response), SIEM (Security Information and Event Management), Intrusion Detection/Prevention Systems (IDS/IPS), and Log Analysis for both on premises and cloud based environments. One of the following certifications is required CISSP, GCIH, CISM, CISA. A DOE Q or Top Secret level security clearance is required to start
We specialize in Cyber Security, Customer Experience, Infrastructure, and advanced technologies such as Machine Learning and Artificial Intelligence.. Cybersecurity Design and Implementation: Cybersecurity design solutions and implementation for on-prem, cloud, and hybrid environments including but not limited to next-gen firewalls, zero trust, NAC solution (Cisco ISE), Segmentation and Software Defined Networks ( such as SD-Access,) SASE, cloud security, emerging AI-based security solutions, SIEM, and XDR. Hands-on experience with security technologies such as firewalls, IDS/IPS, Cisco ISE, segmentation technique SIEM, DLP, VPNs, and cloud security solutions.. Strong understanding of networking protocols (TCP/IP, OSI model, routing and switching). Experience with cloud security platforms (AWS, Azure, GCP)
This is a contract hybrid role for a vCISO Cybersecurity Consultant located in the New York City Metropolitan Area. The consultant will be responsible for conducting cybersecurity assessments, ensuring application, network, and information security, performing vulnerability assessments, and developing incident response plans.. Application Security and Network Security proficiency. CISSP, CISM, or other relevant certifications. This role demands a unique blend of technical expertise, client management skills, and a deep understanding of cyber risk management strategies.. Riskigy Cybersecurity & Tech Advisors offers Fractional CISO (vCISO), CIO, and CTO compliance consulting services to help organizations develop and implement comprehensive cybersecurity strategies, conduct risk assessments, establish incident response plans, and ensure compliance with industry regulations.
On the AWS Penetration Testing team, you will be responsible for the delivery of continuous assessments.. You will be responsible for application, and hardware penetration testing.. Perform penetration testing complex proprietary software and hardware for AWS services. - Minimum of 1 years of experience in security testing (Penetration testing, Vulnerability testing, Red teaming, bug hunting or CTF experience)- Minimum of 1 years of experience with manually auditing source code (One or more of: Java, Ruby, Python, JavaScript, Rust, C, others) to find security issues.. - Minimum of 1 years of professional experience with security engineering practices such as in web application security, network security, authentication and authorization protocols, cryptography, automation and other software security disciplines.
Description Job Title: Sr. Cloud Security Architect Location(s): Frisco, Texas Pay Range: $90 - $100hr W2. - ECP - Electronic Check Processing - OTC - Over the Counter Network Job Requirements: Azure Expertise: o Microsoft Azure Cloud experience (GovCloud preferred).. o Familiarity with Azure security tools/platforms (, Azure AD, Sentinel, Defender, Monitor, Key Vault).. INFOSEC Certifications: CISSP, CCSP, CISM.. Crowdstrike Falcon EDR for Azure.
Leverage Security Orchestration, Automation, and Response (SOAR) or Security Information and Event Management (SIEM) tools to identify threat patterns, enrich investigations, and build automation-supported workflows. Develop expertise on the Capital One threat landscape using internal data, threat trends, and operational metrics to clearly communicate the Capital One threat landscape to senior executives, to include the Chief Information Security Officer and Chief Information Officer.. Proactively build and maintain relationships with partner teams, including but not limited to Cyber Intelligence, Red Team, Insider Threat, and Hunt teams.. Conduct time-sensitive analysis during cyber investigations, including active threat hunting, malware analysis, and campaign enrichment. Support the tactical intelligence-to-detection pipeline, to include malware reverse engineering, TTP analysis, and association mapping in a TIP (threat intelligence platform) for future pivoting
About the Opportunity The Federal Reserve System (FRS) National Incident Response Team (NIRT) has an immediate opening for an Intermediate SOC Analyst (Incident Response) position, reporting to a Senior Manager Information Security.. The NIRT, a national service provider for the FRS, delivers effective intrusion detection, incident response, forensics, security intelligence, threat assessment, and penetration testing services.. This role will be a combination of SOC analyst (providing triage of potential security events) and incident handler (investigating and responding to actual security incidents).. You can also expect to develop more specialized skills such computer forensics, phone forensics, malware analysis, and threat hunting on the job and through external training.. Manage security incidents and conducts incident analysis, containment, protection, mitigation, and recovery activities across the FRS. Evaluate incident response workflow processes.
Job Posting Title Cloud Security Architect/Engineer Date Tuesday, March 12, 2024 City Mclean State VA Country United States Working time Full-time. Maximus Federal, a leading provider of technology-enabled solutions for federal agencies, is seeking a highly skilled Cloud Security Architect/Engineer.. Maximus TCS (Technology and Consulting Services) Internal Job Profile Code: TCS022, T4, Band 7 Job Description: As a Cloud Security Architect/Engineer at Maximus Federal, you will play a crucial role in securing our customer's cloud infrastructure and applications.. Conduct in-depth security assessments and audits of cloud environments, utilizing tools such as AWS Inspector, Azure Security Center, or Google Cloud Security Command Center.. Collaborate with IT and cybersecurity teams to embed security into the DevOps pipeline, leveraging automation tools like Terraform, Ansible, or Chef for secure infrastructure provisioning.