The Cyber Incident Response Analyst will work a 4-day work week; 10 hours per shift.. Threat Intelligence and Vulnerability Management. Knowledge of threat intelligence, vulnerability management, and security incident response best practices.. Relevant certifications including GIAC Certified Incident Handler (GCIH), Certified Incident Response Handler (GCFA) or similar. Experience with threat intelligence, vulnerability management, and security incident response
Information Security Analyst. Review third-party application security vulnerabilities and recommend updates.. Conduct regular vulnerability scans and penetration testing.. Manage Intrusion Detection (IDS), Prevention (IPS), Data Loss Prevention (DLP) and Cryptography/Encryption solutions.. Preferred certifications: Security+, CISA, CISSP, CISM, or CEH.
A deep understanding of core industry components of Cloudflare solutions (and a desire to learn more):Internet security technologies including DDoS and DDoS mitigation, Firewalls, TLS, VPN, DLP. Networking technologies including TCP, UDP, DNS, IPv4 + IPv6, BGP routing, GRE, SD-WAN, MPLS, Global Traffic Management. Some scripting or programming experience with one or more of JavaScript, Python, Golang, BASH. Understanding of, or experience with, regulatory requirements such as FedRAMP, GDPR, PCI DSS, HIPAA, SOC-2, ISO/IEC.. In 2017, we created the Athenian Project to ensure that state and local governments have the highest level of protection and reliability for free, so that their constituents have access to election information and voter registration.
Open Systems Technologies Corporation is looking for a SOC Operations Analyst to join our high performing cyber team in support of a large SOC enterprise environment.. Work with the security team to perform tests and uncover network vulnerabilities, such as penetration testing.. Examines recovered data for relevant information and performs dynamic analysis to include timeline, statistical, and file signature analysis.. Performs real-time cyber defense handling tasks to support deployable Incident Response Teams (IRTs).. We offer a comprehensive benefit package that includes 3 weeks paid time off, 2 weeks Holiday pay, medical/dental/vision coverage, STD, LTD, Life Insurance, AD&D, and 401k with up to 4% match.
Establish and track key performance indicators (KPIs) to measure the effectiveness of incident response activities, vulnerability management, threat intelligence, and compliance efforts.. Certifications: Certified Information Systems Security Professional (CISSP), Certified Protection Professional (CPP), Certified Information Security Manager (CISM), or Certified Information Privacy Professional (CIPP) are highly desirable.. Significant expertise in Security Operations Center (SOC) operations, threat hunting, incident investigation, endpoint protection, security frameworks, managing external Managed Detection and Response (MDR) partners, cloud security, and strategic planning.. Proficient with various security tools and technologies, including Security Information and Event Management (SIEM), identity and access management systems, endpoint protection solutions, application security protocols, data security measures, and cloud security environments.. Millennium Physician Group (MPG) is committed to the full inclusion of all qualified individuals.
Job Overview: The Security Architect Lead reporting to the AVP of Security Architecture is a role that has direct responsibility for designing/architecting IT security solutions, leading operational security activities, serving as an expert in cybersecurity protection, detection, response, and recovery activities, and being able to lead Cyber Incident Response activities.. Knowledge of current cyber threat actors, APTs, and the MITRE ATT&CK and NIST Frameworks.. Certifications and Licenses: One or more certifications desired: CISSP, GCIH, CCNA, C|EH, CISA, GPEN, CHFI Scheduling Requirements: Full-time Day Essential Functions: Strong command of cybersecurity organization practices, operations risk management processes, principles, architectural requirements, engineering threats and vulnerabilities, including incident response methodologies.. Experience in SIEM, IPS, IDS, NAC, Threat Assessments.. Experience in leading critical cybersecurity areas including: cyber incident response, disaster recovery, cybersecurity monitoring, remediation and information governance.
Job Overview: We are looking for staff-level cybersecurity professionals with a strong background in one or more of DevSecOps, network security, and security architecture.. The ideal candidate will have a minimum of 8+ years of experience in DevSecOps or related fields and a strong understanding of cloud platforms, security automation, and secure coding practices.. Manage infrastructure as code (IaC) using tools like Terraform, OpenTofu, or CloudFormation to ensure secure and scalable deployments.. Qualifications: Minimum of 8+ years of experience in DevSecOps, DevOps, or a related field, with a strong focus on security.. Proficiency with infrastructure as code (IaC) tools such as Terraform, OpenTofu, or CloudFormation.
8 years’ experience in collecting and aggregating threat intelligence from various sources, such as open-source intelligence (OSINT), dark web forums, and commercial threat intelligence feeds.. 5 years of experience using cybersecurity tools and technologies for threat intelligence analysis, such as threat intelligence platforms (TIPs), security information and event management (SIEM) systems, and malware analysis tools.. Aggregate and evaluate threat intelligence from diverse sources such as open-source intelligence (OSINT), dark web forums, and commercial feeds to identify relevant and actionable insights for the organization.. Utilize cybersecurity tools and platforms—including Threat Intelligence Platforms (TIPs), Security Information and Event Management (SIEM) systems, and malware analysis tools—to conduct threat research and enrich investigative findings.. Map TTPs to the MITRE ATT&CK framework to aid in correlation to attack vendors with specific threat actors.
Must pass the DTRA Cyber Assessment Red Team (DCART) developer aptitude test before joining DCART as a developer.. Developers with Cobalt Strike experience highly desired.. Host-based computer forensics, network-based forensics, cyber incident response, cyber-criminal investigation, intrusion detection/analysis, designing countermeasures and mitigations against potential exploitations of programming language weaknesses and vulnerabilities, cyber red teaming, network penetration testing, security operations center analysis, defensive cyber operations, or offensive cyber operations.. Exploit Researcher and Advanced Penetration Tester (GXPN). An active Top Secret SCI security clearance is required for this position.
Design a full life-cycle data management solutions encompassing data classification,access control, encryption, and data masking.. Own security of the cloud infrastructure by implementing scalable security controls around IAM, Security groups, IAC, KMS, logging, secrets management etc.. Lead security investigations and incident response, build automation playbooks, developqueries and analytics, and improve threat detection capabilities.. In depth experience covering a wide range of security disciplines such as, endpoint,cloud, networking, identity and access management, devops, incident response, threatintelligence, and more.. Experience with securing hybrid on-premise and public cloud infrastructure (specificallyAWS)Strong understanding of NIST, ISO, and CIS controls compliance and experience with deploying and managing PAM, DLP, SIEM and other commonsecurity tools.
This role operates at the intersection of Cybersecurity Governance, Risk, and Compliance (GRC) and Cloud Security - specifically performing structured risk assessments, external audit response, supporting compliance objectives, and identifying control gaps across a dynamic and globally scaled cloud-native environment.. At least one of the following professional certifications: Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Certified Cloud Security Professional (CCSP), and / or Certified Information Systems Security Professional (CISSP).. Foundational certificates from AWS such as AWS Solution Architect and AWS Certified Cloud PractitionerDemonstrated initiative and strong customer orientation, with an ability to work effectively across cultures.. Join us on our journey of building a new kind of health tech business to reset expectations of what a bio-pharmaceutical company can be.. We want people to feel they belong at AstraZeneca and Alexion, starting with our recruitment process.
Symmetrio is actively seeking multiple Identity and Access Management (IAM) Engineers on behalf of our client, a large enterprise organization based in Philadelphia, PA. In this role, you will lead the design, deployment, and management of identity platforms including Okta, Microsoft Entra ID (Azure AD), and related IAM tools.. Design, deploy, and maintain IAM solutions, including SSO, MFA, identity lifecycle management, and privileged access management.. Administer and optimize Okta and Entra ID environments, including user provisioning, authentication policies, and integration with SaaS and on-premise applications.. Okta Identity Cloud (SSO, Universal Directory, Lifecycle Management). Knowledge of Zero Trust Architecture, Identity Governance & Administration (IGA), and least privilege principles.
Job Description:At Regions, the Cyber Security Analyst is responsible for analyzing, identifying, and documenting cybersecurity risks.. RequirementsHigh School Diploma or GED and (8) years of related post-secondary education and/or experience in Information Security or Information TechnologyMinimum of two (2) relevant certification in Information Security or the ability to obtain relevant certification within twelve months of start date in this position, such as CompTIA Network+/Security+/CySA+, EC-Council Certified Ethical Hacker (CEH), Cisco CCNA/CCNSecurity, GIAC GSEC, etc.. This position must be within a reasonable driving distance to a Branch, Consumer Operations, or Professional Office Building with the primary location being for Birmingham, AL, Nashville, TN, Atlanta, GA or Charlotte, NC. The manager will set the work schedule for this position, including in-office expectations.. Regions will not provide relocation assistance for this position, and relocation would be at your expense.. The target information listed below is based on the Metropolitan Statistical Area Market Range for where the position is located and level of the position.
The position requires the ability to provide guidance on how to architect/design, leverage, and operate, various operational platforms, including Identity, Credential, Access Management (ICAM), Security Information and Event Management, and Security Orchestration, Automation & Response (SIEM/SOAR), and Privileged Access Management solutions as well as be a catalyst to accelerate capabilities for an integrated Zero Trust future.. Bring crafting/authoring policy and directive experience to integrate federal government requirements and directives into agency policies and directives.. Bachelors’ degree in Computer Science, Engineering, Software Development, Information Technology, Cyber Security, or related field and 6 years of related experience.. Additional experience in cyber risk management and assessments will be considered.. Bachelors’ degree in Computer Science, Engineering, Information Technology, Cyber Security, or related field and 6 years of related experience.
This role will encompass the use of a broad range of security domains (Endpoint Security, Data Security, Cloud Security, Corporate IT Security, VAPT, Automation, Identity and Access Management).. Proficiency in Black box pen test along with Gray & White box Pentest. Data Center audit includes exposure to risk assessment, vulnerability assessment & pen test.. CEH, OSCP, OSCE, Security+ and other likewise security certifications are desirable.. Familiar with Amazon AWS/Microsoft Azure services as an IaaS/PaaS containers (Dockers/Kubernetes)
Governance, Risk & ComplianceMaintain and evolve PACS Services' cybersecurity governance framework to support HIPAA, SOX, and other applicable. Security Operations & Incident ResponseManage daily security operations, including event monitoring, threat detection, alert triage, and response , test, and refine incident response and disaster recovery procedures and ensure documentation is up to. Security Architecture & Technology ManagementEvaluate, implement, and manage security tools and technologies such as SIEM, EDR, identity management, and encryption systems.. Collaborate with IT infrastructure, cloud, and application teams to integrate security into architecture and DevOps practices.. Collaboration & Strategic IntegrationServe as the primary point of contact for external cybersecurity partners, threat intelligence feeds, and managed service providers.
Symmetrio is actively seeking multiple Identity and Access Management (IAM) Engineers on behalf of our client, a large enterprise organization based in Philadelphia, PA. In this role, you will lead the design, deployment, and management of identity platforms including Okta, Microsoft Entra ID (Azure AD), and related IAM tools.. Design, deploy, and maintain IAM solutions, including SSO, MFA, identity lifecycle management, and privileged access management.. Administer and optimize Okta and Entra ID environments, including user provisioning, authentication policies, and integration with SaaS and on-premise applications.. Okta Identity Cloud (SSO, Universal Directory, Lifecycle Management). Knowledge of Zero Trust Architecture, Identity Governance & Administration (IGA), and least privilege principles.
Join a world-class academic healthcare system, UChicago Medicine , as a Senior Cybersecurity Penetration Tester in our Information Security department.. This is a remote, work from home opportunity and you may be based outside of the greater Chicagoland area.. Research, plan, and execute complete penetration testing and red team operations to identify software/network/cloud potential exploits, vulnerabilities, and other weaknesses in security controls.. 5 years plus of significant, recent relevant experience in IT security penetration testing or red teaming with deep knowledge of scanning tools and vulnerability enumeration. Certifications relevant to adversarial security testing such as CEH, Pentest+, GPEN, and OSCP
Englewood Health, a leading healthcare system comprising Englewood Hospital and the Englewood Health Physician Network, is committed to delivering exceptional patient care across northern New Jersey.. Minimum of 4-5years of past experience in information security, especially in an analyst role on a Computer Incident Response Team (CIRT), Computer Emergency Response Team (CERT), Computer Security Incident Response Center (CSIRC) or a Security Operations Center (SOC).. In-depth knowledge of cloud computing environments, system and network security, authentication and security protocols, and cryptography.. Technical expertise in system security, malware operation and indicators, network and web-related protocols (e.g. TCP/IP, IPSEC, HTTP, TLS, DNS etc. Experience with any of the following systems/products also a plus: basic scripting for automation, EDR/MDR solution, data loss prevention, malware detection, intrusion detection/prevention, penetration testing/vulnerability scanning and remediation drive, web application firewall.
Our employees are our greatest asset as we work to achieve our bold ambitions, and we’re looking for the next wave of passionate and ambitious people ready to make a direct impact.. Security professional with a strong technical background in Cyber Security, Windows / Linux, Network Security, Security Operations Center (SOC), Cloud Security (AWS, Azure), MITRE ATT&CK or similar frameworks, Threat Analysis, IT Operations and Incident response. Proficiency in digital forensics, malware analysis, and threat hunting.. Information Security Certification (CISSP, GSEC, GPEN, CEH, etc.). For jobs in the United States: Gilead Sciences Inc. is committed to providing equal employment opportunities to all employees and applicants for employment, and is dedicated to fostering an inclusive work environment comprised of diverse perspectives, backgrounds, and experiences.