Job Title: IT Security Analyst. Threat Analysis: Perform threat intelligence analysis to identify emerging threats and vulnerabilities.. Experience: Minimum of 3-5 years of experience in a Security Analyst role, with a strong background in SOC operations and penetration testing. Technical Skills: Proficiency in security monitoring tools, incident response, and threat analysis.. Certifications: Relevant security certifications such as CompTIA Security+, CEH (Certified Ethical Hacker), CISSP (Certified Information Systems Security Professional), or similar are highly desirable.
We realized a new perimeter was needed, one that is built in the cloud and follows and protects data wherever it goes, so we started Netskope to redefine Cloud, Network and Data Security.. Since 2012, we have built the market-leading cloud security company and an award-winning culture powered by hundreds of employees spread across offices in Santa Clara, St. Louis, Bangalore, London, Paris, Melbourne, Taipei, and Tokyo.. The Vice President, Sales (Public Sector) will be a key leadership role, responsible for developing and executing the sales strategy to penetrate and expand our presence within the public sector ( US Federal, State, Local Government, and Education).. Customer Relationship Management: Foster strong relationships with public sector (federal, state, local government, and education) customers, understanding their needs and tailoring solutions to meet those needs.. Successful track record selling security and networking technologies including network security technologies such as Proxies, Next Gen Firewalls, SSL/IPSec, VPN’s, SSO, DLP and Encryption gateway to the public sector market.
cybersecurity operations including but not limited to, threat detection, incident management, threat intelligence, vulnerability and threat management and data protection teams. Manages the team handling SOC operations, Incident Detection and Response enriched by Threat Intelligence, and Vulnerability Management at all layers of the stack. Understanding and technical knowledge of threat detection/security monitoring, security incident and crisis management, threat intelligence, vulnerability and threat management and data protection. Hands on experience with SIEM and SOAR solution such as Splunk. Experience in the management and/or implementation of security monitoring, anti-malware, data loss prevention and vulnerability management technologies.
Wolf & Company, P.C. is a trusted national leader in cybersecurity and risk management consulting, serving industries like banking, healthcare, Fintech, and professional services.. Perform technical tasks, such as network security reviews, cloud configuration audits, SIEM tuning, or threat hunting. Proven hands-on expertise in areas like incident response, penetration testing, cloud security, or SIEM management. Preferred: CRISC, CEH, PMP, or MBA. Proficiency with tools like Splunk, Nessus, CrowdStrike, or similar platforms
Director, Senior Cloud Security Architect. KPMG is currently seeking a Director, Senior Cloud Security Architect to join our Global Information Solution Group which is part of KPMG International.. + Minimum ten years of recent experience such as security architecture, threat modelling experience, identity management and authentication, software development, cryptography, penetration testing, cloud security, mobile security, and network security. + Certifications such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Azure Cybersecurity Expert, or equivalent are highly desirable. + In-depth understanding of cloud security principles, best practices, and industry frameworks such as Cloud Security Alliance (CSA), Center for Internet Security (CIS), National Institute of Standards and Technology (NIST), and International Organization for Standardization (ISO)
Our collaborative ties to our forensic and incident response team, detection engineering team, and threat intelligence team, alongside the recent implementation of the Intelligence-Led Cyber Resilience Testing framework in North America and DORA regulations in the EU has resulted in a growing demand for red team engagements, assume-breach red team engagements, threat intelligence led penetration testing, and purple team engagements. As a Senior Consultant, Red Team Operator, you will report to our Global Red Team practice leader. Execute internal red team strategic initiatives to help our practice grow, adapt, and evolve.. Serve as a subject matter expert in at least one of the following areas: red team infrastructure, payload development, initial access, Windows/Linux/Mac tradecraft, cloud tradecraft, or another red team relevant specialization.. A deep understanding of red team operations, with demonstrated thought leadership in at least one area of red teaming
We are involved in complex, global and high-profile litigation, arbitration and investigations combining end-to-end risk advisory, investigative and disputes expertise to deliver holistic solutions for our clients.. More specifically, we are looking for technical cybersecurity experts with experience in all or some of the following: intelligence collection, incident response, insider threat analysis, network operations, emerging cyber policy, security operations (malware analysis, specialized cloud expertise, forensic experts, penetration testing, and application testing).. Performa wide range of cybersecurity engagements in a fast-paced, deadline-sensitive environment; summarizing the results accurately and concisely in written reports for a sophisticated client base consisting of top-tier law firms, financial institutions and corporations; managing consultants on engagements which involve teams of investigative researchers; and providing oral reports to clients, when appropriate.. Family care benefits, including back-up child/elder care. Make an impact in our communities through company sponsored pro bono work
Division Manager @ Daley And Associates | IT Staffing, Permanent Placement and Executive Search. No relocation assistance provided.. Monitor security incidents, investigate threats, and lead incident response.. Expertise in network security, cloud security, identity management, and encryption.. Proficiency in security tools (SIEM, vulnerability management, incident response).
Fortinet is seeking a skilled and innovative Staff Machine Learning Engineer to join our FortiCNAPP cloud cybersecurity team.. As a Staff Machine Learning Engineer, you will work closely with data scientists, cybersecurity analysts, and software developers to design, develop, and deploy machine learning models that assess and mitigate risk across complex cloud environments.. Knowledge of cloud computing platforms (AWS, Azure, GCP) and familiarity with securing and monitoring cloud infrastructure.. Experience with big data processing platforms and frameworks (Snowflake, Spark) is a plus.. Domain Knowledge: Solid understanding of cybersecurity principles, including network security, malware analysis, incident response, and risk assessment in cloud environments.
Partner Solutions Engineers work closely with our partners to educate, empower, and ensure their success delivering Cloudflare security, reliability and performance solutions. Networking technologies including TCP, UDP, DNS, IPv4 + IPv6, BGP routing, GRE, SD-WAN, MPLS, Global Traffic Management.. Internet security technologies including DDoS and DDoS mitigation, Firewalls, TLS, VPN, DLP. Detailed understanding of workflow from user to application including hybrid architectures with Azure, AWS, GCP. In 2017, we created the Athenian Project to ensure that state and local governments have the highest level of protection and reliability for free, so that their constituents have access to election information and voter registration.
Since 2012, we have built the market-leading cloud security company and an award-winning culture powered by hundreds of employees spread across offices in Santa Clara, St. Louis, Bangalore, London, Paris, Melbourne, Taipei, and Tokyo. As a Customer Success Manager, you will partner across the Netskope organization to advocate for your customer - working with Sales teams, Product Management, Support and Engineering to ensure we are providing a joined-up experience across all aspects of the customer relationship. Partner with customers to implement and operationalize their Cloud Security change management, governance, and skills programs; as they pertain to implementation of the Netskope platform (for example, SOC integration, building in-house capability etc). Domain knowledge in the areas of data protection, security operations, threat, risk or identity management; technical pre/post sales experience is ideal. Strong appreciation of technology in the cloud operations and cybersecurity space; preferred skills includesecurity and networking technologies including Proxies, Next Gen Firewalls, CASB, SSL/IPSec, SSO, DLP and Encryption gateways; particularly in hybrid or cloud environments.
Cyber Incident Response Engagement Lead (Threat Actor Communications).. You will work closely with legal counsel, insurance teams, and our internal specialists to guide negotiation strategies with threat actors, ensuring clarity, professionalism, and empathy from start to finish. This fully remote, non-technical, and non-managerial role is well-suited for professionals who thrive in high-stakes, fast-paced environments and are motivated to make a meaningful impact in cyber incident response. Relevant professional background in consulting, crisis communication, cyber insurance, legal, or similarly high-pressure, client-facing fields. Prior experience with cyber incident response, negotiations, or threat intelligence is a plus, but not required.
Minimum ten years of recent experience such as security architecture, threat modelling experience, identity management and authentication, software development, cryptography, penetration testing, cloud security, mobile security, and network security. Certifications such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Azure Cybersecurity Expert, or equivalent are highly desirable. In-depth understanding of cloud security principles, best practices, and industry frameworks such as Cloud Security Alliance (CSA), Center for Internet Security (CIS), National Institute of Standards and Technology (NIST), and International Organization for Standardization (ISO). Principal Security Engineer - GCP Cloud Security Architect(Remote Or Hybrid). Associate Director, Cloud Security Architect
I have a full time Director level opportunity for a Cyber Threat Intelligence & VM candidate to join an enterprise organization to build and manage their Cyber TVM team. Build and manage the Cyber Threat Intelligence team to drive key priorities within the Cyber Fusion Center. A minimum of 8 years of experience within the security operations, cyber threat intelligence, incident response, or other technical cybersecurity teams. A minimum of 3 years of building and managing Cyber Threat Intelligence teams. A Bachelor’s Degree in Information Security, Business, Risk Management, Finance, Statistics or other related field
The Senior Cloud Cybersecurity SME will serve as the lead technical expert for cloud security, guiding the implementation of advanced controls, automation practices, and DevSecOps integration to ensure a secure and scalable environment for globally distributed systems.. DevSecOps Strategy and Integration: Support integration of cybersecurity into DevSecOps pipelines to enforce secure code deployments and configuration baselines.. Security Monitoring and Incident Response: Integrate cloud telemetry into enterprise SIEM platforms (e.g., Splunk, Sentinel) and implement monitoring dashboards for real-time threat detection and compliance.. Deep familiarity with NIST RMF, FISMA, and Zero Trust architecture.. Familiarity with ServiceNow, CyberArk, ArchAngel, and iApp platforms.
Senior Software Developer This position is located at Ft Belvoir VA at the Defense Threat Reduction Agency as part of Advanced Red Cyber Team Operations.. Special requirements: - Must pass the Defense Threat Reduction Agency (DTRA) Cyber Assessment Red Team (DCART) senior developer aptitude test before joining DCART as an Operator.. In addition, desired skills/certifications are: - Experience with C2 frameworks, especially Cobalt Strike.. - Experience with host-based computer forensics, network-based forensics, cyber incident response, cyber-criminal investigation, intrusion detection/analysis, designing countermeasures and mitigations against potential exploitations of programming language weaknesses and vulnerabilities, cyber red teaming, network penetration testing, security operations center analysis, defensive cyber operations, or offensive cyber operations.. - Malware development, analysis, binary disassembly, binary decomplication, network/communication protocol analysis, software vulnerability research, or software exploit development.
Participate in deployable Incident Response Team (IRT) support tasks.. GIAC Certified Incident Handler (GCIH). GIAC Certified Forensic Analyst (GCFA). GIAC Network Forensic Analyst (GNFA) Education: Bachelor's Degree (B.S. or B.A.) in Cybersecurity, Information Technology, Computer Science, or a related field.. ABOUT CINTEL, INC: Cintel Inc. is a Small Business providing strategies and services to support an array of Government clients in Software Development, Operational/Tactical and Installation/Facilities Energy, Cyber Security, Modeling and Simulation, Data Science, and Programmatic support.
Job Title: Network Security Engineer Location: MUST be local to the DMV area - Onsite 5x per week Clearance Level: Active DOD - Public Trust Candidate must successfully receive a Public Trust clearance.. CompTIA Security+ or CISSP. Demonstrated experience with at least three of the following technologies and acting as the primary technical subject matter expert (SME) •CrowdStrike •Microsoft Defender for Endpoint. Preferred Skills •Experience with the following technologies: Cisco Routing & Switching (LAN/WAN), Cisco Firepower IPS/Firewall and Web Security Appliance (WSA) •Familiarity with SIEM tools, data lakes and the design, development of security analytics.. Relevant Security Certifications: Security +, CISSP, SANS Certifications, Network +, Cisco CCNA , Microsoft AZ-900.
Deploy and maintain company LANs, WANs, Telecommunications, VOIP, Security and wireless networks, which include servers, routers, hubs, switches, firewalls, PBX equipment, IPS/IPD and other hardware.. Define and provide direction to our managed service providers (e.g. CenterBeam, Telecom Carriers, Cabling, Build outs &MAC vendors) consistent with best practices.. Cisco or network certifications highly desirable Detailed knowledge of cabling standards, TCP/IP, VLANS and routing protocols along with troubleshooting techniques with network management software.. Demonstrated experience with successful LAN, WAN, WLAN and WWAN design and implementation as well as experience with network capacity planning, network security principles, and general network management best practices.. Specific experience and strong technical knowledge working with Cisco Catalyst 6509/5500/4510/4000, Cisco routers, Juniper products (Netscreen, Load Balancers & SSL remote access) and Packeteer preferred Knowledge of Definity PBX and VOIP systems is a plus.
Overview ISSO/SYSTEMS SECURITY ENGINEER Bowhead is seeking a skilled full-time ISSO/Systems Security Engineer to join our team in Dahlgren, VA. The ideal candidate will have a strong background in computer networking concepts and protocols, as well as network security methodologies.. Using DoD network analysis tools to identify vulnerabilities (e.g., ACAS, HBSS, etc. Tenable Assured Compliance Assessment Solution (ACAS) Trellix Endpoint Security System (ESS), previously known as McAfee Host Based Security System (HBSS) Skill in applying host/network access controls (e.g., access control list).. Knowledge of transmission records (e.g., Bluetooth, Radio Frequency Identification (RFID), Infrared Networking (IR), Wireless Fidelity (Wi-Fi).. Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language (PL/SQL) and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).