This is an armed role/position demanding expertise in force protection, risk mitigation, and tactical coordination.. Monitor multi-layered security networks, including CCTV, radar-based intrusion detection, RF & photonic surveillance, and geospatial tracking.. Deploy electronic countermeasures (ECM) and perimeter defense systems to mitigate RF jamming, drone surveillance and cyber-intrusions.. Bachelor’s degree with a concentration in Criminal Justice, Police Science, or equivalent military/law enforcement experience. Certified firearms instructor or advanced tactical firearms proficiency required.
Proficient in scripting languages such as PowerShell, Python, and Bash for automation and task management.. Familiarity with cloud platforms like AWS, Azure, and Google Cloud for infrastructure management and deployment.. Experience with implementing and supporting virtual desktops / VDI.. In-depth knowledge of Intune and its advantages in managing the end user environment.. Knowledge of industry-standard IT best practices, including disaster recovery and high availability concepts, is a plus.
Provide written or oral reports of findings to the government SOC lead, and ISSM for further investigation or for action. Provide 5 days a week during normal operation hours between monitoring and analysis of all security feeds, including General Services Administration's (GSA) Managed Trusted Internet Protocol Services (MTIPS), Trusted Internet Connections (TIC), and Policy Enforcement Points (PEP). Bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field PLUS twelve (12) years of experience in incident detection and response, malware analysis, and or cyber forensics. Knowledgeable of the various Intel Frameworks (e.g. Cyber Kill Chain, Diamond Model, MITRE ATT&CK, etc) and able to utilize it in their analysis workflow.. Experience with Cloud (e.g. o365, Azure, AWS, etc) security monitoring and familiar with cloud threat landscape
Enterprise Infrastructure Architect I Apply locations South Chapman Building time type Full time posted on Posted Yesterday job requisition id JR103419. Under minimal supervision, the Enterprise Infrastructure Architect I is responsible for the design, implementation, and maintenance of GBMC's IT infrastructure.. Certification in one or more of the following platforms is preferred: Cisco (CCNA, CCNP, CCIE), VMware (VCAP), Palo Alto, Microsoft Azure, AWS.. Ensure IT infrastructure meets HIPAA, HITRUST, and other healthcare compliance standards.. All applicants must be fully vaccinated against Covid-19 or obtain a GBMC approved medical or religious exemption prior to starting employment at GBMC Healthcare, to include Gilchrist and GBMC Health Partners.
Infrastructure Engineer - Japanese Bilingual Job Num: 56311. Set up/Kitting hardware peripherals such as PC, server, printer, iPhone, and handy terminals.. Backup and restore data and databases (MySQL / Oracle). Dell or HP Intel x64 Server Hardware. Messaging, ETL Tool configuration (IBM MQ, HULFT, etc.)
Assessment scope may include identity and access management, access governance, key management, data security/privacy, service monitoring, release management, and service availability.. Enforce compliance with IAM principals including: least privilege access, password management, Audit logging, RBAC, certificate issuance and revocation, and AAA solutions.. Understand the Amazon identity management ecosystem holistically and identify existing services and capabilities that may solve existing problems.. Experience troubleshooting networks like TCP/IP, DNS, routing, switching, firewalls, LAN/WAN, traceroute, iperf, dig or curl. Experience in one or more of the following domains: access-control system and methodology, network security, application- and system-development security, security architecture and models, cryptography, and operations security
Cooley is seeking an IG Compliance & Security Analyst to join the Information Governance & Data Privacy team.. 3+ years' experience in governance, risk and compliance (GRC) processes, solutions, information security and auditing; Eligible for consideration of Senior designation with 5+ years' directly applicable work experience. Bachelor's degree in Information Technology or Computer Information Systems. Desired certifications: PCIP, ISA/QSA, CISSP, CISA, CISM, and related GIAC. We provide generous parental leave and fertility benefits.
network engineering, digital forensics, and the ability to support both network systems and. o Shepherd and perform engineering efforts in Windows, Linux servers, workstations, storage, and virtualization.. Hands-on experience installing, maintaining, and configuring Aspera Enterprise Server and Aspera P2P. 8.. Expertise in forensic software, such as Cellebrite, XRY, FTK, and Autopsy.. Experience with Software Defined Networking (SDN), such as Cisco ACI and VMware NSX-T. 3.
Background Diversity, Equity and Inclusion are core principles at UNDP: we value diversity as an expression of the multiplicity of nations and cultures where we operate, we foster inclusion as a way of ensuring all personnel are empowered to contribute to our mission, and we ensure equity and fairness in all our actions.. UNDP provides IT support for 13 UN entities with 40,000 United Nations and external users of the UNDP’s ERP system, as well as information and communication technology (ICT) and application solutions for the United Nations field presence.. Duties and Responsibilities Under the overall guidance of the Chief Information Officer (CIO) of the office of Information and Technology Management (ITM), and as part of the management team of the ITM, the Chief - Cyber security is responsible for managing UNDP`s information security risks, IT business continuity and IT disaster recovery plans.. Ensure security incidents and related ethical issues are referred to OAI for review and resolution without further disrupting operations, and are conducted in a fair, objective manner in alignment with UNDP values and code of business conduct and in full consultation with OAI and LSO as the situation might warrant.. Disclaimer Under US immigration law, acceptance of a staff position with UNDP, an international organization, may have significant implications for US Permanent Residents.
Job Description GENERAL DESCRIPTION: The Texas Division of Emergency Management (TDEM) is an emergency response entity, and this status can affect working hours, travel, and change in duties as needed.. Employees are subject to working extended hours during evenings and weekends for incident response.. KNOWLEDGE, SKILLS AND ABILITIES: Working knowledge of cloud-based infrastructure platforms like Azure or AWS. Advanced experience with email administration.. Working knowledge of current network security and related incident response processes.. REGISTRATION, CERTIFICATION OR LICENSURE: Complete and obtain certification in IS-, IS-, IS-, IS- FEMA courses within twelve months of employment and any other training as determined.
Location: Chicago, IL Job Description: Leads implementation and maintenance of NIST risk management framework and 800-53 controls to manage security and privacy risks for the Unit. Develops compliance strategy, and leads and executes various tasks based on those strategies, including development and maintenance of policies and procedures, system security plan, plans of actions and milestones.. Licenses and Certifications: Relevant security certifications such as CISSP, CISM, CISA, CRISC, or compliance certifications, and/or SANS GIAC certification for technical knowledge (e.g. GWAPT, GPCS, GWEB).. Some familiarity with Governance Risk and Compliance tools and suites (e.g. Navex, LogicGate).. Application Documents Resume/CV (required) The University of Chicago is an Affirmative Action/Equal Opportunity/Disabled/Veterans Employer and does not discriminate on the basis of race, color, religion, sex, sexual orientation, gender identity, national or ethnic origin, age, status as an individual with a disability, protected veteran status, genetic information, or other protected classes under the law.. Staff Job seekers in need of a reasonable accommodation to complete the application process should call 773-702-5800 or submit a request via the Applicant Inquiry Form. The University of Chicago's Annual Security & Fire Safety Report (Report) provides information about University offices and programs that provide safety support, crime and fire statistics, emergency response and communications plans, and other policies and information.
BAHRAIN ABOUT THE OPPORTUNITY: Comtech Systems, Inc (CSI) is looking for Help Desk Technical Tier III Support candidates who will be responsible for the maintenance of computer hardware and software that comprises a computer network.. is a leading provider of mission critical solutions to government and civilian agencies with a focus on C4ISR solutions using any type of network, whether mobile, fixed, static, terrestrial, marine, airborne or in space.. To help our customers combat a growing number of cyber-attacks on their systems, we provide training and certification and vulnerability compliance assessment.. Our market segments consist of: Tactical Communications, Space & Component Technology, Mobile Datacom, and Cyber Security Solutions.. Require a sound knowledge of IP networking, SIPRNet, NIPRNet, cross domain solutions, and security systems such as HBSS. The Systems administration function may require knowledge of collation networks, CENTRIXS, JWICS, and BICES, the Virtual Desktop Infrastructure (VDI), and server virtualizations, IT service management, and wireless LAN (WLAN) Ability to communicate effectively, both written and verbally with diverse audiences, internally and externally to foster strong teamwork.
What you will do Participate in C-Level, Senior Ranking Officer, or Senior Government Official discussions based on an end-to-end private network environment, including 5G architecture and specifications, Cyber-security, RAN, Open RAN, Packet Core, IMS Core, OSS, Network Slicing, Orchestration, Services, Managed Services domains.. Have a passion for supporting the US Department of Defense and tactical operations functions.. You will creatively apply 3GPP and Ericsson Technology to the US Department of Defense, Dual Use, and use-cases.. You will bring RAN, Core and Cloud Network security knowledge and experience, spanning 3G, 4G, and 5G infrastructure Demonstrated knowledge of Ericsson´s portfolio of products and services.. Experience with FISMA and DoD Security processes and requirements such as RMF, ATO, STIGS, SCAP and ACAS Scans, and FedRAMP. Experience in network architecture planning activities focusing on End-to-End (E2E) Security Solutions incorporating EPC, RAN, Transport, and UE requirements utilizing Ericsson technologies.
Provides surge support, technical guidance, and expertise in the areas of Cybersecurity to support Customer, Mission Partners, IMOs, ISSOs, IS Owners, Software Developers, Network System, and Database Administrators IAW all related cyber regulations and directives; provide results in reports, briefs, and deliverables as required to the appropriate Government representative.. Provide reviews, validation, and deliverable efforts in support of compliance or non-compliance IAW CCI, STIGs and SRGs for each finding or vulnerability IAW RMF. Provide embedded Cybersecurity support across Customer or other supported organizations as required.. Serves as alternate Non-classified Internet Protocol (IP) Router Network (NIPRnet) ISSO, processes all NIPRnet ISSO/IMO/ISSM order requests ensuring the vetted users meet the training requirements.. Maintains a list of ISSO/IMO/ISSM activities amongst the Command, Installation, Customer, and Mission Partners.. Completes an annual review updating the ISSO/IMO/ISSM orders.
To Apply for this Job Click Here Our client is seeking an experienced Identity & Access Management (IAM) Engineer to help define and maintain secure access protocols across a growing enterprise environment in Orange County, California.. Design and maintain enterprise IAM architecture, including user provisioning and deprovisioning.. Monitor IAM system performance and troubleshoot user access or integration issues.. Strong scripting skills (e.g., PowerShell, Python) for automation and tool integration.. Tiro Security is extremely active in the cybersecurity industry and regularly speaks as experts on staffing, careers, and retaining talent at major conferences including DEFCON, ISC2 Congress, ShellCon, BSides, and RSA
What You Bring to the Team: Bachelor's degree in Computer Science, Computer Engineering, Information Systems, or a related field (preferred), or equivalent experience.. Key Technical Skills (Familiarity with at least 2 required): Basic understanding of LAN switching and routing protocols (e.g., OSPF, BGP).. Experience with network security tools (e.g., Cisco ASA, FirePower).. Basic knowledge of virtualization technologies (e.g., VMware, Hyper-V).. Understanding of identity management (e.g., Active Directory).
Demonstrate intermediate knowledge in IT auditing, including logical security, network security, change management, disaster recovery, and more.. Stay updated on changes in IT audit practices, regulatory requirements, and IT risk frameworks.. Ability to travel alone with luggage (e.g., laptop, personal belongings).. We aspire to see people for what they bring to our corporate culture by supporting an inclusive work environment, including an emphasis on a healthy work-life balance, development opportunities, and a casual dress code.. With focus on our organization's values and cultural richness: Financial Strength, Integrity, Respect, Service and Teamwork (FIRST) and Agility, Collaboration, and Engagement (ACE) we continue to pursue our vision to be a leading provider of financial products and services for current and future generations.
This position would require being within or relocating within a commutable distance of Portland, OR. The Information Systems Engineer is responsible for ensuring continual operation and support of shipboard technology systems in our Western region.. You will report to the Information Systems Manager.. You will assist with all aspects of Information Technology as it relates both to vessel construction and the shipyard infrastructure.. Administer network and data security, including directory, group policy, firewalls, virus protection, and email security of CSC IT network.. Completes basic low voltage electrical wiring, networking, programming, and A/V equipment rack installation.
The AFINC II contract supporting the 26th Network Operations Squadron (26NOS) is searching for qualified candidates for a position of Senior Domain Name Services (DNS) Engineer.. As a dynamic systems integrator, SMS offers proven solutions in engineering, operations, cybersecurity, and digital transformation.. Maintains DNS MX records for all domains accepting email services within the Microsoft O365 Cloud.. Knowledge with modern LAN/WAN solutions including IP networking - MPLS, QOS, SONET/SDH optical solutions, and serial communications, TCP, UDP, DHCP, SSH, NTP, DNS, ARP, ICMP, SCP, and TFTP, and DMZ zone DNS secure administration.. Requires a Computing Environment/Operating System (CE/OS) Defense Cyberspace Workforce Certification (DCWF) requirement(s): Infoblox Core Network 2016 Advanced Services Expert Infoblox DDI Professional: DNS, DHCP, or IPAM
An MSP Systems Engineer (Managed Service Provider Systems Engineer) is a professional responsible for managing and supporting the IT infrastructure of client organizations within a Managed Service Provider (MSP) environment.. Monitor the health and performance of client networks and systems using monitoring tools (e.g., Nagios, SolarWinds, Datto).. Support and manage client cloud services (e.g., Microsoft 365, AWS, Azure, Google Cloud) and virtualized environments (e.g., VMware, Hyper-V).. Experience with cloud platforms (e.g., AWS, Azure, Google Cloud) and automation tools (e.g., Ansible, Terraform) is a plus.. Relevant certifications (e.g., CompTIA Server+, Microsoft Certified: Azure Administrator, AWS Certified Solutions Architect) are advantageous.