This is a strategic leadership role that spans all aspects of product marketing, including positioning, messaging, demand generation, analyst and public relations, digital marketing, and sales enablement. We are looking for a dynamic and experienced leader with deep domain expertise in Identity Protection (ITDR, ISPM, PAM, Zero Trust, Non-Human Identities) and SaaS Security, along with strong knowledge of endpoint security, data protection, threat intelligence, and security operations. Content Strategy - Oversee the development of high-impact content, including sales collateral, thought leadership, website content, videos, blogs, and more. Sales Enablement - Equip the sales and alliances teams with compelling messaging, training, and tools to drive revenue and competitive differentiation. Deep expertise in two or more additional areas of cybersecurity beyond Identity Protection and SaaS Security, such as endpoint protection, threat intelligence, data protection, or SIEM
Position Overview: The Network Security Engineer will architect, design, implement, optimize, secure, and troubleshoot the comprehensive networking environment for all 1X networks.. Professional certifications such as CISSP, CCNP Security, CCIE, or equivalent certifications are highly preferred.. Experience with SD-WAN, Zero Trust architecture, and modern cloud security practices.. Hands-on experience with public cloud networking (AWS, Azure, Google Cloud).. Ability to automate and script network tasks using Python, Ansible, or other automation tools.
Join to apply for the Principal Product Manager, AI Security role at HackerOne. The platform offers bug bounty, vulnerability disclosure, pentesting, AI red teaming, and code security.. We are trusted by industry leaders like Amazon, Anthropic, Crypto.com, General Motors, GitHub, Goldman Sachs, Uber, and the U.S. Department of Defense.. Deep understanding of cybersecurity technologies with direct product management experience in related cybersecurity fields, such as vulnerability management, penetration testing, application security, and related fields.. Domain experience with security research / hacking as part of red teaming, penetration testing and/or bug bounty programs, including methods, tools, and types of testing.
We are seeking a Senior Security Engineer to join our team, focusing on defining security workflows and incident response (IR) strategies.. Define and refine security workflows and incident response strategies.. Experience with Security Orchestration, Automation, and Response (SOAR) platforms.. Ideal but not required: Cloud security experience.. You'll have the opportunity to work on the bleeding edge of technology and drive true innovations, all while collaborating closely with industry veterans who are dedicated to defending the market from the new wave of AI-driven attacks.
Associate Principal/Digital Forensics, Incident Response & Cybersecurity (Forensic Services practice). Principal/Digital Forensics, Incident Response & Cybersecurity (Forensic Services practice). Leading security and privacy investigations for CRA clients, in preparation of, and in response to, data security matters, which may include ongoing theft of trade secret investigations, cyber breach detection, threat analysis, incident response and malware analysis;. Experience in a hands-on technical role functioning as a testifying expert, digital forensic examiner, incident responder, network forensic analyst or malware analyst;. Glaucoma Ophthalmologist - New England Eye Center at Tufts Medical Center, Boston, Massachusetts
We are seeking a highly skilled Network Security Engineer to join our growing IT security team in London.. Proficiency in configuring and managing security technologies such as Cisco ASA, Palo Alto, Fortinet, or Check Point firewalls.. Hands-on experience in incident response, threat hunting, and forensic analysis.. Professional certifications such as CISSP, CISM, CEH, CCNP Security, or equivalent.. Experience with cloud security in AWS, Azure, or Google Cloud.
Background in malware analysis, digital forensics, intrusion detection, and/or threat intelligence. Broad knowledge across the Security domain, as well as demonstrated experience in one (or more) areas such as Logs and events processing, Incident Management, Digital Forensics, Detection and/or response tool development. Security (SOC) Analyst, Secret Clearance Required. Security Engineer (SIEM/SOAR/SOC Optimization) - Mid-Atlantic region (Remote in NC, VA, WV, MD, DC, DE, NJ, or PA). Cloud Security - Information Security Engineer- Remote
Our client, Korn Ferry, is seeking the following.. Ensure operational alignment across Identity & Access Management (IAM), Governance, Compliance, and Security Operations.. Korn Ferry unleashes potential in people, teams, and organizations.. Director of Cyber Risk Management, Business Resilience, and Security Culture. Director, Senior Cloud Security Architect
Research, design, implement, maintain, monitor, consult, and report on WAN, LAN, wireless networking, remote access, firewall maintenance, network applications, network services security, and networked systems monitoring, auditing, and reporting.. Participate in a follow-the-sun 24x7 on-call IT Infrastructure engineer rotation with other members of the IT Infrastructure group.. Expert knowledge of Palo Alto Networks (PAN) firewall platforms and VPN solutions.. Experience with Cisco Meraki gateways, switches, and WiFi.. Experience with Arista switching platforms.
The platform offers bug bounty, vulnerability disclosure, pentesting, AI red teaming, and code security.. We are trusted by industry leaders like Amazon, Anthropic,Crypto.com, General Motors, GitHub, Goldman Sachs, Uber, and the U.S. Department of Defense.. Deep understanding of cybersecurity technologies with direct product management experience in related cybersecurity fields, such as vulnerability management, penetration testing, application security, and related fields.. Domain experience with security research / hacking as part of red teaming, penetration testing and/or bug bounty programs, including methods, tools, and types of testing.. Leaves of absence (including caregiver leave and leave under CO's Healthy Families and Workplaces Act)
You will support a team effort to execute an industry-leading Digital Forensics and Incident Response program.. Leverage state-of-the-art Endpoint Detection and Response triage and artifact acquisition using~ Crowdstrike, Carbon Black Response, Azure Sentinel, and Microsoft Defender for Endpoint. Get notified about new Cyber Security Analyst jobs in Jacksonville, FL.. CISO- Network Security Engineer SME. Identity & Access Management (IAM) Governance & Controls Analyst
Position Overview: The Network Security Engineer will architect, design, implement, optimize, secure, and troubleshoot the comprehensive networking environment for all 1X networks.. Professional certifications such as CISSP, CCNP Security, CCIE, or equivalent certifications are highly preferred.. Experience with SD-WAN, Zero Trust architecture, and modern cloud security practices.. Hands-on experience with public cloud networking (AWS, Azure, Google Cloud).. Ability to automate and script network tasks using Python, Ansible, or other automation tools.
Overseeing cyber threat intelligence, and incident management, digital forensics, and investigations, alongside championing innovation in cybersecurity practices to achieve operational excellence and deliver value promptly. The Information Technology Department (ITD)’s Information Security and Governance (ISG) division of the International Monetary Fund (IMF) is seeking to fill an IAM Governance Lead position. Under the general supervision of the Chief Information Security Officer, this role is responsible for overseeing and leading the IAM strategy and the implementation and management of identity and access management governance within the IMF, as a second line function. Designs and operationalizes a tailored IAM governance framework in collaboration with IT and business departments, and in alignment with the IMF’s Business Technology Strategy, ensuring clear delineation of IAM roles and responsibilities. Experience with one or more IAM platforms like Microsoft Azure Active Directory, Entra ID, Okta, SailPoint, Saviynt, and CyberArk.
CrowdStrike is seeking a Principal Product Marketing Manager (IC) to drive the go-to-market strategy for Identity Protection.. As a key member of the Identity Protection product marketing team, you will be responsible for positioning, messaging, product launches, competitive research, sales enablement, and market awareness.. The ideal candidate has deep expertise in Identity Protection and a strong understanding of Identity Threat Detection and Response (ITDR), Identity Security Posture Management (ISPM), Privileged Access Management (PAM), Zero Trust, human and non-human identities, SaaS security, and data protection.. Strategic GTM Execution – Work closely with product management, demand generation, and field marketing to drive go-to-market initiatives that generate demand and expand market share.. Deep expertise in Identity Protection (ITDR, ISPM, PAM, Zero Trust, Non-Human Identities) along with a strong understanding of endpoint security, threat intelligence, data protection or cloud security.
Acrisure is a global Fintech leader that combines the best of humans and high tech to offer multiple financial products and services to millions of businesses and individual clients.. We connect clients to solutions that help them protect and grow what matters, including Insurance, Reinsurance, Cyber Services, Mortgage Origination and more.. Strong knowledge of cybersecurity solutions, including threat intelligence, cloud security, endpoint protection, and compliance frameworks.. CISSP, CISM, or other relevant cybersecurity certifications are a plus.. Sales certifications from cybersecurity vendors (e.g., Palo Alto, CrowdStrike, Fortinet) are advantageous.
Department Overview Motorola's Access Control Division's (previously OpenPath, now Avigilon Alta) mission is to improve your workday with smart office technology at your front door.. Interface with legal, data governance, and engineering teams on policy enforcement and control mapping.. Strong understanding of technical concepts: SAST, DAST, SCM, IdP, Kernel, Firmware, WAF, firewalls, IDS/IPS, SIEM, cloud security, etc.. Certifications such as CISM, CISSP, CISA, CRISC, or CIPM are strongly preferred.. High emotional intelligence and team leadership experience across cultures/time zones.
Oversee the integration of advanced threat detection technologies, including SIEM, SOAR, EDR, and threat intelligence platforms.. Familiarity with MITRE ATT&CK, threat intelligence integration, and behavioral analytics.. Experience with SIEM / SOAR platforms (e.g., Splunk, Microsoft Sentinel, Palo Alto XSOAR, etc. CISSP, CISM, GCIA, GCIH, or similar certifications.. Familiarity with cloud security monitoring (e.g., O365, Azure, AWS).
Perform security engineering, develops security architecture artifacts, oversee penetration testing and security exercises, supports hybrid cloud and network security, and automates security compliance for LAN/WAN solutions deployed in a hybrid cloud environment. Engineer security into LAN and WAN system design, performing internal cyber hunt activities, and tailoring Zeek-based security sensors to feed SIEM and SOAR Splunk components. Engineer security into WAN/LAN monitoring fabric tools such as Arista, Cisco, and Extreme Networks. Use software-defined tooling such as Terraform and Ansible to implement DevSecOps pipelines to deliver security tooling. Secure network systems and participates in vulnerability scans using Tenable Nessus
Optimization, Management and Troubleshooting LAN (Cisco and Cisco Meraki), VLAN, STP/RSTP, DNS, DHCP, IPAM and L1/L2 issues. Wireless LAN (Cisco and Cisco Meraki) Firewalls (Fortinet) Data connections (SD-WAN, MPLS, VPN).. 5+ years of experience with Meraki/Cisco technologies and services such as switching and routing, firewall management, TCP/IP networking, VLAN Management, LAN/Wireless LAN, Spanning Tree issue resolution. Strong experience with CISCO Meraki Switching: STP, RSTP, MST, LAN tuning/protection, VTP, VLANs and 802.1Q trunk, strong understanding of MAC /CAM/ ARP tables is a must. Deep product knowledge and understanding of Meraki/Cisco product features including Disaster Recovery, Internet of Things, Monitoring, and remote Management.
Acrisure is a global Fintech leader that combines the best of humans and high tech to offer multiple financial products and services to millions of businesses and individual clients.. We connect clients to solutions that help them protect and grow what matters, including Insurance, Reinsurance, Cyber Services, Mortgage Origination and more.. Strong knowledge of cybersecurity solutions, including threat intelligence, cloud security, endpoint protection, and compliance frameworks.. Sales certifications from cybersecurity vendors (e.g., Palo Alto, CrowdStrike, Fortinet) are advantageous.. In 2021, the Company co-founded Evolution Advisors, a joint venture whose Founding Partners include Acrisure, Russell Wilson and Ciara, and Russell Westbrook.