We specialize in Cyber Security, Customer Experience, Infrastructure, and advanced technologies such as Machine Learning and Artificial Intelligence.. Cybersecurity Design and Implementation: Cybersecurity design solutions and implementation for on-prem, cloud, and hybrid environments including but not limited to next-gen firewalls, zero trust, NAC solution (Cisco ISE), Segmentation and Software Defined Networks ( such as SD-Access,) SASE, cloud security, emerging AI-based security solutions, SIEM, and XDR. Hands-on experience with security technologies such as firewalls, IDS/IPS, Cisco ISE, segmentation technique SIEM, DLP, VPNs, and cloud security solutions.. Strong understanding of networking protocols (TCP/IP, OSI model, routing and switching). Experience with cloud security platforms (AWS, Azure, GCP)
Conduct all-source analysis, digital forensics, and targeted research to identify, monitor, assess, and counter the threat posed by criminal cyber actors.. , encryption, firewalls, authentication, honey pots, perimeter protection).. At least one certification from the CSSP Incident Responder Category (CEH, CFR, CCNA Cyber Ops, CCNSecurity, CHFI, CySA+. GCFA, GCIH, SCYBER, PenTest+). Convenience/Concierge - Virtual visits through health insurance, pet insurance, commuter benefits, discount tickets for movies, travel, and many other items to provide convenience.
Active Top Secret/ Sensitive Compartmented Information (TS/SCI) clearance with ability to pass a counter-intelligence scope (CI) Poly clearance.. Proficiency in cybersecurity technologies and practices, including network security, endpoint security, encryption, intrusion detection/prevention systems (IDS/IPS), and security incident response.. Other Certifications for security professionals: Certified Ethical Hacker (CEH), Cisco Certified CyberOps Associate, and/or GIAC Security Essentials (GSEC). Subject Matter Expert in cryptography such as Secure Sockets Layer (SSL) and/or Transport Layer Security (TLS).. Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy.
As the Chief Information Security Officer (CISO), you will be responsible for establishing and maintaining the enterprise vision, strategy, and programs to ensure that information assets and technologies are adequately protected for both SCAN Health Plan and associated portfolio companies. The CISO will be the strategic leader for all aspects of information security, including security architecture, risk management framework, incident response, security awareness training, and vulnerability management. CISSP (Certified Information Systems Security Professional) or Certified Information Security Manager (CISM).. Understanding and experience with adherence to information and network security standards (HIPAA, HITECH, HITRUST, PCI and PII compliance), data management, disaster recovery. Thorough understanding of Active Directory, Network/Remote Access Security, Systems Security (Windows, Unix, Mainframe), Application and Web Security, Firewalls and Intrusion Detection Systems, TCP/IP, Proxy, SPAM Filtering, SIEMs, Vulnerability Scanners, IDS/IPS, SQL.
LHH is working with a leading defense firm to hire a Senior Attorney for their Cyber Incident Response team in Boston, MA. Triaging incident response for cybersecurity and data privacy incidents.. Oversight of forensics investigations and 3rd party vendors.. Strong understanding of privacy laws including and not limited to HOPPA, GLBA, FERPA, CCPA, GDPR, etc. Flexible hybrid work arrangements
ManTech seeks a motivated, career and customer-oriented Information Systems Security Manager (ISSM) to join our team in McLean, Virginia.. As an ISSM on our team, you will support our Cyber Security Operations Center (CSOC) by identifying, coordinating, and mitigating risks that could impact our ability to execute our detection and response mission.. Understanding of Security Operations Center (SOC) environments, threat intelligence, and incident response processes. Certifications such as CISSP, CISM, CRISC, GCIH, or GCFR. Knowledge of cloud security risks (AWS, Azure, GCP) and hybrid security models
This role demands deep expertise in workload access controls, secrets management, and a solid grasp of frameworks such as SPIFFE and SPIRE. The ideal candidate will possess extensive experience with PAM tools, including CyberArk, Delinea, HashiCorp Vault, and Microsoft Entra ID, ensuring the security and compliance of the organization's IT infrastructure.. Leverage PAM tools such as CyberArk, Delinea Secret Server, HashiCorp Vault, and Microsoft Entra ID to enhance security measures and streamline access management processes.. Familiarity with regulatory requirements related to PAM, such as PCI DSS, HIPAA, or GDPR.. Working knowledge and experience with Cloud Architectures and the ability to address the security considerations of secure cloud computing including IAM with enterprise services, SSDLC, data protection, cryptography and key management.. Relevant certifications such as Certified Information Systems Security Professional (CISSP) or Certified Information Security Manager (CISM), Certified in Risk and Information Systems Control (CRISC) are highly desirable.
With a suite of more than a dozen products, including TikTok, Helo, and Resso, as well as platforms specific to the China market, including Toutiao, Douyin, and Xigua, ByteDance has made it easier and more fun for people to connect with, consume, and create content.. - Functional knowledge of MITRE ATT&CK framework and other cybersecurity methodologies- Proficiency in using SIEM tools (, Splunk, ELK Stack, ArcSight) for log management, event correlation, and threat detection.. Preferred Qualifications- Bachelor's degree in Computer Science, Cyber Security, or STEM field- Proven experience in security operations, incident response, vulnerability management or a related field.. - In-depth knowledge of cyber security technologies, including firewalls, IDS/IPS, EDR, BYOD, SIEM, endpoint protection.. - Relevant certifications (, Security+, CEH, CISSP, GCIA, SSCP) are a plus.
The ideal candidate will have a deep understanding of cybersecurity, risk management, and regulatory compliance, with the ability to collaborate across departments and lead strategic security initiatives.. Lead multi-functional teams to develop and implement strategic security initiatives aligned with business and regulatory requirements.. Industry certifications such as CISSP, CISM, CISA, or CCSP preferred.. Hands-on experience with security technologies, including SIEM, firewalls, IDS/IPS, endpoint protection, and vulnerability management tools.. Experience in conducting security assessments, penetration testing, and incident response activities.
Title: Senior Cloud Security Architect Type: Contract Location: Arlington, VA Clearance: An active Secret security clearance is required with the eligibility to obtain a TS/SCI. TS/SCI is preferred.. Description: Raytheon is supporting a U.S. Government customer on a large mission critical development and sustainment program to design, build, deliver, and operate a network operations environment including introducing new cyber capabilities to address emerging threats.. The Senior Cloud Security Architect must display superb understanding and be knowledgeable with a multitude of technologies to include; AWS, SIEM, firewalls, web application firewalls, VPNs, DNS, Data Loss Prevention, IDS/IPS, and proxies, to name a few.. The successful Senior Cloud Security Architect will be comfortable working with a variety of different tools and appliances, security problems, and troubleshooting various complex issues.. Working Knowledge of secure-cloud configuration, (e.g., CloudTrail, AWS Config), cloud-security technologies (e.g., VPC, Security Groups) and Access Control (IAM).
Relevant certifications (, CISSP, CISM, CISA) are a plus.. Proficiency in conducting risk assessments, vulnerability assessments, and penetration testing.. Hands-on experience with security technologies such as SIEM, IDS/IPS, firewall management, and endpoint protection.. Hussmann is a subsidiary of Panasonic USA. Finding a better way has always been the Hussmann way.. Hussmann is committed to creating a diverse environment and is proud to be an equal opportunity employer.
Cloud Security Analyst Harris Corporate IT - Remote Canada and United States Harris Corporate IT is seeking a Cloud Security Analyst to join our team!. As the Cloud Security Analyst, you will utilize your wide area of expertise in access control management, cybersecurity, vulnerability management, risk management, incident management, security frameworks and other areas to provide security support for the Harris group of companies.. Work with Information Security Officer to provide security incident escalation support and remediate security issues.. Familiarity with Infrastructure as Code tools (Terraform, AzureARM, Ansible, etc).. Experience with monitoring tools such as Azure Sentinel, AWS CloudWatch/Google Cloud Monitoring, Splunk etc.
Security Architecture & Tooling Design, deploy, and maintain SOC-related technologies, with a particular focus on SIEM and IDS Develop and refine security use cases, detection rules, correlation queries, and dashboards SIEM tools to improve threat detection and response capabilities.. SOC Operations & Threat Monitoring Optimize threat detection and incident response strategies using SIEM analytics and IDS findings.. Develop and implement tuning and filtering strategies to reduce false positives and improve the fidelity of alerts generated by SIEM and IDS tools 3.. Incident Response & Forensics Lead technical investigations of security incidents from identification through resolution, leveraging SIEM and IDS insights.. Vulnerability ManagementAssist in the identification, analysis, and remediation of vulnerabilities, working closely with vulnerability scanning and patch management tools.
Security Engineering and Monitoring (SEM) – Seeking a Cyber Security Engineer (SME).. The Cyber Security Engineer must display an excellent understanding of technology and utilization of Firewalls (Security Groups), VPNs, Data Loss Prevention (DPS), IDS/IPS, Web-Proxy, Security tools, and Security Audits.. Design, configure, implement, troubleshoot, and maintain all security platforms and their associated software, such as firewalls (Security Groups), intrusion detection/intrusion prevention, anti-virus/malware (HBSS), cryptography systems (Vormetric), SIEM (Splunk), and MDM. Expert with at least one of the following tools: Splunk, HBSS/McAfee, Rapid7. Expert with implementing and managing SIEM (e.g., Splunk), end-point security (IDS/IPS and HBSS)
Knowledge of cloud platforms and services is important; familiarity with cloud providers such as Amazon Web Services (AWS), Microsoft Azure, or Google Cloud Platform (GCP) is valuable.. Experience with Identity and Access Management (IAM) principles for authentication, authorization, and access control, including designing and implementing IAM solutions, technologies like single sign-on (SSO), multi-factor authentication (MFA), and privilege management is essential.. Desired Qualifications Experience with next generation firewall technology (Palo Alto, Check Point, Fortinet, Versa, etc. Certificates within network/security domain (CCNA, CCNP, CCIE, PCNSE, etc. Top Skills Details network engineering, network/security implementation, Zero Trust architecture/design, SASE
Zachary Piper Solutions is seeking a Incident Response Analyst to join a long-term, classified federal program in New Carrollton, MD. This is a hybrid position that requires 1 day per week onsite.. The Incident Response Analyst will be responsible for protecting the network and all the data/assets that sit on it, as well as handling proactive Threat Intelligence Analysis utilizing Open Source tools (OSINT).. ·Developing technical theories based on threat intelligence.. Demonstrate detailed knowledge of threat vectors and how they translate to cyber security risks for federal government.. Network stack design, implementation and function experience at all seven layers of OSI model.
As a Sr Network Security Engineer, you will be responsible for implementing and maintaining the security infrastructure of our network systems both on-prem and in the cloud.. The ideal candidate should possess in-depth knowledge of network security technologies including CloudFlare Magic Transit (a plus) and WAF, F5 ASM and AFM, DDOS, Palo Alto next gen firewalls, and AWS security groups and firewalls, strong network troubleshooting abilities, and a proactive approach to mitigating risks.. Contributes to enhancement of the Palo Alto Next Gen firewalls and migration off of Checkpoint firewalls. Strong knowledge of network security principles, protocols, and technologies, such as firewalls, IDS/IPS, VPNs, encryption, authentication, access control, WAF, DDOS. Experience with network monitoring and security tools, such as SIEM, packet analyzers, vulnerability scanners, and penetration testing tools.
Familiarity with identity and access management (IAM) concepts.. Professional certifications in network security, such as CISSP, CCSP, or CCNA Security.. We are seeking a highly skilled and experienced Network Security Architect with expertise in cloud security.. As a Network Security Architect, you will be responsible for designing and implementing robust security solutions to protect our network infrastructure and operational systems.. Design and implement network security solutions with a focus on network segmentation and protection of operational infrastructure.
We are seeking a SOC Analyst to join our Security Operations Center (SOC) team.. The SOC Analyst will be responsible for monitoring, detecting, analyzing, and responding to cybersecurity incidents to protect our organization’s infrastructure, networks, and data.. The ideal candidate will have experience in threat detection, incident response, and security tools like SIEM, IDS/IPS, and endpoint protection.. Due to Government Contract , all viable candidates must be U.S. citizens and either possess an active Secret clearance or higher or be able to obtain a U.S. security clearance.. Perform threat intelligence analysis to identify emerging threats and vulnerabilities.
Cybersecurity Consultant III / Information Systems Security Officer (ISSO) Experience Level: 7–9 years Job Description: As a Cybersecurity Consultant III serving as an Information Systems Security Officer (ISSO),. Stay updated with the latest cybersecurity threats, trends, and technologies to proactively safeguard information assets Qualifications: ● Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field. 7–9 years of experience in information security, with at least 3 years in a role equivalent to an ISSO. Proficiency in conducting risk assessments, vulnerability assessments, and security audits. Relevant certifications such as CISSP, CISM, or CISA are highly desirable