Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Security Engineering, Vulnerability Testing, Penetration Testing, Risk Management and Assessment, Insider Threat Analysis, and IT Policies and Procedures by improving, protecting, and defending our Nation's Security.. Design, develop, implement and/or integrate Cybersecurity and security systems and system components including those for networking, computing, and enclave environments to include those with multiple enclaves and with differing data protection/classification requirements.. Support security authorization activities in compliance with NISCAP and DoD RMF, the NIST RMF process, and prescribed DoD business processes for security engineering.. Participate as the primary security engineering representative on engineering teams for the design, development, implementation, evaluation, and/or integration of secure networking, computing, and enclave environments. Apply knowledge of Cybersecurity policy, procedures, and workforce structure to design, develop, and implement secure networking, computing, and enclave environments
Automation / DevOps - Terraform, Ansible, Docker, Kubernetes, CloudFormation, CI/CD, GIT, Blue / Green Deployments, Github. AWS - EC2, IAM, RDS or Aurora, VPC, Route53, CloudWatch, S3, WAF, ECS, Fargate, Billing. Bash, Shell, Ruby, Python, Linux (Amazon), Apache, Nginx. Not to mention our top notch company events (like our Summer Beach Party with open bar, chili cook-off, annual holiday yacht party, fun office potlucks and more) that will keep you asking when the next event is.. Like swag themed after a pink pig wearing glasses?
Dexcom began as a small company with a big dream: To forever change how diabetes is managed.. Our future ambition is to become a leading consumer health technology company while continuing to develop solutions for serious health conditions.. Proficiency in network-related programming languages and scripting (e.g., Python, PowerShell, Bash).. Strong experience in managing complete infrastructure including the following technologies: Routing/Switching/Wireless (Cisco, Extreme, Arista) Firewalls (Palo Alto) VPN (Palo Alto, Cisco) NAC (ForeScout) Load Balancing (Citrix NetScaler) SD-WAN (Palo Alto, Masergy). Relevant certifications (e.g., CCNP, CCIE) are highly desirable.
Developer empathy and engineering excellence such as ability to design the constraints creatively to mitigate risks, strong technology understanding of different software and cloud platforms, programming languages, network security, databases, containers, Kubernetes, OAuth, encryption, web technologies, software architectural patterns are essential for success in this role.. You have a bachelor’s degree in computer science or related field and/or at least 12+ years’ experience in information security, application security, penetration testing, DevSecOps, network security and other security disciplines.. You have an understanding of containers (e.g., Docker) and container orchestration (e.g., Docker Swarm, Kubernetes).. You have a strong understanding of Cloud-native architectures including API Gateways, ELB, ECS, Lambda/Azure Functions, Terraform, Ansible, Threat modeling tools (Microsoft threat modeler, OWASP Threat Dragon), SAST, DAST, ASPM, SCA, and CI/CD Pipelines.. You are proficient in securing Windows and *nix operating systems and internals, endpoint detection and response tooling, networking protocols and devices.
Why Ciena: We are big proponents of life-work integration and provide the flexibility and tools to make it a reality with remote work and potentially, part-time work.. We are committed to employee development , offering tuition reimbursement and a variety of in-house learning and mentorship opportunities.. How You Will Contribute: Reporting to Senior Director, Network Architecture as the Application Security Manager, you will be responsible for leading a team of application security engineers and ensuring the overall security of our applications (both internal and customer facing).. Regulatory Compliance : Develop and implement application security strategies, policies, and procedures to protect Ciena's applications and sensitive data.. Application Security Consulting: Act as a subject matter expert on application security matters, providing technical expertise and guidance to the broader organization.
You will report directly to our Building Automation (BA) CPSO and team, while working on a hybrid schedule.. As a representative for BA and Honeywell Global Security (HGS), you will play a crucial role in shaping Honeywell's external reputation as a trusted and secure business partner, contributing to the organization's resilience and success in the dynamic landscape of cybersecurity.. under asylum or refugee status.. Understanding of DevSecOps Experience conducting secure product reviews leveraging both automated (.. THE BUSINESS UNIT With deep integration experience and an intimate understanding of our customer needs, Honeywell video surveillance and access control products are designed to scale as your needs grow and work together seamlessly.
Use GIT and automation tools like GitHub Actions, Azure DevOps, Terraform, etc.. Deploy and configure Azure Data Lake Storage, Data Factory and Databricks services Deploy, configure and maintain multiple Azure services like Azure API Management, App Services, Service Bus, Key Vault, Storage include Blob and File Shares, Communication services, etc.. Deploy, configure and maintain Docker and Azure Kubernetes Service environments.. Author and update technical documentation, runbooks, ops guides, and presentations when needed.. Maintain a broad knowledge of state-of-the-art computer technology, equipment, and systems; participates in professional development activities as appropriate.
Independently administers, and maintains networking and network security equipment, management software, and resources in a complex network environment; coordinates the design, documentation, configuration, troubleshooting, operation, modification, and repair of networking hardware and software.. Qualifications Minimum Qualification Education: Bachelor’s degree in Computer Science or a related field Experience: 3 years of experience with large, complex, and multifaceted layer 2 and layer 3 network systems, computer operating systems, network hardware and security devices, monitoring tools and network management and network security hardware and software.. Preferred Experience: NAC systems such as Fortinet FortiNAC and Aruba ClearPass Policy Manager, HP/Aruba switches, Aruba Networks wireless controllers and access points, Juniper routers and switches Palo-Alto firewall and VPN, Monitoring systems such as PRTG, Airwave, IMC. Experience with Azure and AWS cloud computing.. Working knowledge of current networking hardware, knowledge of wiring and fiber systems.. Ability to use test equipment including, network management systems, Network access control systems, protocol analyzers, SNMP management devices.
As ADP's Global Security Organization (GSO), we know that our clients rely on us for human capital management solutions, and beyond that, they entrust us with one of their most valuable assets. From the cloud to the data center and across every emerging device, you'll join a team of experts in the GSO who are always staying one step ahead in this ever-changing world of data by continually evolving our strategies and technologies to protect ADP and our clients.. We provide subject matter expertise in cybersecurity incident response, security operations, investigations, forensic analysis, and fraud operations.. The CIRC conducts activities for ADP worldwide across a broad set of security disciplines including cyber operations, fraud prevention, physical security, and operational risk management.. Hyper-collaboration with Security colleagues, Legal, Privacy, Communications, Public Relations, IT, Development, and Business teams in response to incidents related to ADPs products and associates.
Enterprise Architecture ( Manufacturing COTS application integration ) and must have Extensive Manufacturing background Extensive Integration Experience within manufacturing ecosystems (Middleware/Mulesoft) Cloud (preferably Azure) Certification Frameworks like TOGAF, Zachman, and EA governance.. Proven expertise with manufacturing applications : ERP, MES, SCADA, WMS, PLM and their integration within complex manufacturin g ecosystems.. Strong experience in Enterprise Architecture frameworks like TOGAF, Zachman, and EA governance.. Hands-on experience with Mulesoft or similar middleware tools for system integration and data flow optimization.. Advanced networking knowledge for manufacturing: CPwE, SCADA architectures, IoT frameworks, and industrial protocols such as Modbus, OPC UA, Ethernet/IP.
Enterprise Architecture ( Manufacturing COTS application integration ) and must have Extensive Manufacturing background Extensive Integration Experience within manufacturing ecosystems (Middleware/Mulesoft) Cloud (preferably Azure) Certification Frameworks like TOGAF, Zachman, and EA governance.. Proven expertise with manufacturing applications : ERP, MES, SCADA, WMS, PLM and their integration within complex manufacturin g ecosystems.. Strong experience in Enterprise Architecture frameworks like TOGAF, Zachman, and EA governance.. Hands-on experience with Mulesoft or similar middleware tools for system integration and data flow optimization.. Advanced networking knowledge for manufacturing: CPwE, SCADA architectures, IoT frameworks, and industrial protocols such as Modbus, OPC UA, Ethernet/IP.
Asterisk/Twilio phone systems. Strong knowledge of Linux (Ubuntu/Debian/RHEL a plus), MacOS, Windows, iOS, and Android administration. TCP/IP networking/routing, SSH/SFTP, SMTP, IMAP, HTTP, DNS, BGP Network security (e.g., firewalls (Fortigate), NATs, VLANs, IPSec VPNs, TLS/encryption, etc.). User access control (ActiveDirectory/LDAP) The AWS ecosystem and VMWare virtualization Backup and restore systems. HAProxy, nginx, load balancing HP switches/APs/RADIUS Asterisk/Twilio phone systems LinOTP MFA
Join our team as we together build technologies to create safe and efficient next generation electrical circuit protection, intelligent energy source selection, intuitive power distribution, control, and monitoring for the smart residential market.. We are seeking a highly skilled IoT Cloud Engineer to join our team in the Atlanta GA area.. Cloud Architecture & Data Pipelines Design and implement robust cloud architectures (Azure, AWS, GCP) with data pipelines for IoT data processing and analysis.. Experience with cloud computing platforms such as Microsoft Azure, Amazon Web Services (AWS) and/or Google cloud platform.. From more resource-efficient factories, resilient supply chains, and smarter buildings and grids, to sustainable transportation as well as advanced healthcare, we create technology with purpose adding real value for customers.
Must be customer and detail oriented and possess good decision-making ability Knowledge and understanding of customer service techniques.. Experience working with a customer service-oriented environment Experience providing service desk/call center support Knowledge of Microsoft Office suite Experience in using the Remedy ticketing suite Exceptional communication skills GCIA, GCIH, GMON, GDAT, Splunk Core Power User, and a minimum of 7 years related experience.. We offer a generous benefits package including health insurance, paid vacation, disability, and life insurance, and more.. OUR COMMITMENT TO DIVERSITY, EQUITY, AND INCLUSION The leadership of our Company is committed to a work culture of zealous advocacy, respect, diversity and inclusion, client-oriented defense, access to justice and excellent representation.. We are dedicated to building a strong professional relationship with each of our clients, to understanding their diverse circumstances, and to meeting their needs.
The Network Engineer’s is responsible for ensuring the stability and integrity of in-house voice, data, video, and wireless network services.. In addition, the Network Engineer will participate with the installation, monitoring, maintenance, support, and optimization of all network hardware, software, and communication links.. Design, implement, and maintain VOIP phone system to include phone servers, phones, and faxes.. Work with Server and Desktop teams to ensure network connectivity of all servers, workstations, telephony equipment, fax machines, and other network appliances.. Develop, implement and maintain policies, procedures, and associated training plans for network administration, usage, and disaster recovery.
General Statement of Job: The Critical Incident Response Team (CIRT) provides a safe and secure environment for the client.. SIS personally designs a comprehensive plan to ensure that the client has the freedom to work and conduct their business without distractions.. Initiate emergency-response actions in the event of crises, emergencies, or threats to employees. Honorably retired law enforcement. Tactical Operations or Executive Protection experience
We are seeking an Information Security Tech Lead to join the Endpoint Security team within the Platform Security Technology department of the Information Technology Division.. Must have experience with CrowdStrike. Familiar with industry security regulations and frameworks (MITRE Attack Framework, NIST, CIS CSC, etc.). A good understanding of Endpoint Protection, Malware Protection, HIPS, Host-based firewalls, File Integrity Monitoring, Data Loss Prevention, Security Configuration Management, Database Activity Monitoring, SaaS, and Cloud Security.. Working knowledge of cloud security for AWS, GCP, Azure
Emerging Tech (ET) is seeking a Navy Qualified Validator (NQV) Level II to support a Risk Management Framework (RMF) project for the U.S. Naval Forces Southern Command (USNAVSO)/US FOURTH Fleet (FOURTHFLT) Command Control (C2) Information System (IS) located in Naval Station Mayport, FL. The person should be willing to work onsite at Mayport base and locally in Jacksonville, Florida, with SIPR access.. We seek a person with great aptitude, a professional attitude, fantastic work ethics, and in-depth technical knowledge to maintain an ATO and stay compliant with RMF, including provisions to conduct periodic reviews, draft checklists for audit, device and software additions, and future network expansion.. The person must have a strong Navy RMF cybersecurity background to validate new equipment, Security Technical Implementation Guides (STIGS), Artifacts, update Plan of Action and Milestones (POAMs) and submit Moderate Software Assurance Requirement (SAR) for approval for Full ATO for three years.. Perform all RMF process steps, in the role of Navy Validator, in accordance with (IAW) Secretary of the Navy Instruction (SECNAVINST) 3052.2 - Cyberspace Policy, IAW Commander, Navy Cyber Force Instruction (COMNAVCYBERFORINST) 5239.2A - Cyber Security and Information Assurance, and IAW Department of Defense Instruction (DoDI) 8510.01.. Perform required vulnerability analysis to support mitigation and residual risk determination.
+ The candidate should understand and work with technologies like REST, Oracle/MySQL, MongoDB, PostgreSQL, JSON, XML, Docker, AWS, Nifi, Single Sign-On (OAuth and SAML).. + Other duties include researching and analyzing cloud security environments, assisting with Risk Management Framework and DoD accreditation packages and documentation, identifying capability gaps and enhancements for current ICAM services, defining implementation processes, and outlining hardware and software considerations.. + Experience with Confluence and JIRA. + Knowledge of EDH1/2, ISM, CAPCO and CUI Standards. Athenix Solutions Group, LLC and its companies Athenix Cyber and SIGINT, and Athenix Special Missions is an EEO/Affirmative action employer and is committed to hiring and retaining a diverse workforce.
Uses mitigation, preparedness, and response and recovery approaches, as needed, to maximize survival of life, preservation of property, and information security.. Experience with Splunk, Sentinel One, Armis, SNA preferred.. Correlate, map, and fuse any and all incident information for the development and distribution of cyber alerts and notices, or other products as Required. 8+ years of experience in computer forensics or vulnerability analysis. Must possess a minimum of a Bachelor's Degree or Master's Degree, PhD or JD in a technical specialty such as cyber security, computer science, management information systems or related IT field (Master's Degree Preferred)