DoD Public Key Infrastructure (PKI) Service.. Network Security Incident Response and Reporting.. Certified Information Security System Professional (CISSP) or Certified Information Security Manager or Cyber Security Leadership Certification (GSLC).. Must have experience overseeing and managing unified communications. Must be posses an active Secret security clearance and have the ability to obtain a Top Secret.
This is a strategic leadership role that spans all aspects of product marketing, including positioning, messaging, demand generation, analyst and public relations, digital marketing, and sales enablement. We are looking for a dynamic and experienced leader with deep domain expertise in Identity Protection (ITDR, ISPM, PAM, Zero Trust, Non-Human Identities) and SaaS Security, along with strong knowledge of endpoint security, data protection, threat intelligence, and security operations. Content Strategy - Oversee the development of high-impact content, including sales collateral, thought leadership, website content, videos, blogs, and more. Sales Enablement - Equip the sales and alliances teams with compelling messaging, training, and tools to drive revenue and competitive differentiation. Deep expertise in two or more additional areas of cybersecurity beyond Identity Protection and SaaS Security, such as endpoint protection, threat intelligence, data protection, or SIEM
Division Manager @ Daley And Associates | IT Staffing, Permanent Placement and Executive Search. No relocation assistance provided.. Monitor security incidents, investigate threats, and lead incident response.. Expertise in network security, cloud security, identity management, and encryption.. Proficiency in security tools (SIEM, vulnerability management, incident response).
Architect & document secure mobile solutions (iOS/Android, EMM/UEM, 5G) that align with Zero Trust and FedRAMP baselines.. Stay current with emerging threats (e.g., post-quantum impacts to mobile/IoT) and recommend adaptive strategies.. Proficiency with mobile/UEM platforms, IoT security gateways, SD-WAN/SASE, and cloud security controls (AWS & Azure).. Relevant certifications (CISSP, CISM, CCSP, PMP, or CompTIA Security+) are highly desirable.. Principal Infrastructure Architect - Direct-Hire/FTE - Remote (Washington DC Metro)
Research, design, implement, maintain, monitor, consult, and report on WAN, LAN, wireless networking, remote access, firewall maintenance, network applications, network services security, and networked systems monitoring, auditing, and reporting.. Participate in a follow-the-sun 24x7 on-call IT Infrastructure engineer rotation with other members of the IT Infrastructure group.. Expert knowledge of Palo Alto Networks (PAN) firewall platforms and VPN solutions.. Experience with Cisco Meraki gateways, switches, and WiFi.. Experience with Arista switching platforms.
Location: SFO; Virginia & DC Area; NYC; Boston; open to other strategic areas. Our comprehensive range of security offerings encompasses SCA, Threat Intelligence, Threat Intelligence Integrations, Threat Detection & Engineering, Content Packs & Log Ingestions, Zero-day Discovery, Supply chain Discovery, and more.. Cybersecurity Leadership and Roadmap Development: Lead and leverage expertise in threat intelligence, vulnerability management, cloud security, threat hunting, and threat detection.. Client Engagement and Relationship Management: Serve as a key point of contact for new clients / customers, collaborating with the CRO and CTO to deliver compelling presentations, lead negotiations, and align revenue goals with client expectations.. Additional expertise in Cloud Security, Threat Hunting and Detection, Software Supply Chain, Threat Intelligence, and Vulnerability Management.
CrowdStrike is seeking a Principal Product Marketing Manager (IC) to drive the go-to-market strategy for Identity Protection.. As a key member of the Identity Protection product marketing team, you will be responsible for positioning, messaging, product launches, competitive research, sales enablement, and market awareness.. The ideal candidate has deep expertise in Identity Protection and a strong understanding of Identity Threat Detection and Response (ITDR), Identity Security Posture Management (ISPM), Privileged Access Management (PAM), Zero Trust, human and non-human identities, SaaS security, and data protection.. Strategic GTM Execution – Work closely with product management, demand generation, and field marketing to drive go-to-market initiatives that generate demand and expand market share.. Deep expertise in Identity Protection (ITDR, ISPM, PAM, Zero Trust, Non-Human Identities) along with a strong understanding of endpoint security, threat intelligence, data protection or cloud security.
Overseeing cyber threat intelligence, and incident management, digital forensics, and investigations, alongside championing innovation in cybersecurity practices to achieve operational excellence and deliver value promptly. The Information Technology Department (ITD)’s Information Security and Governance (ISG) division of the International Monetary Fund (IMF) is seeking to fill an IAM Governance Lead position. Under the general supervision of the Chief Information Security Officer, this role is responsible for overseeing and leading the IAM strategy and the implementation and management of identity and access management governance within the IMF, as a second line function. Designs and operationalizes a tailored IAM governance framework in collaboration with IT and business departments, and in alignment with the IMF’s Business Technology Strategy, ensuring clear delineation of IAM roles and responsibilities. Experience with one or more IAM platforms like Microsoft Azure Active Directory, Entra ID, Okta, SailPoint, Saviynt, and CyberArk.
Department Overview Motorola's Access Control Division's (previously OpenPath, now Avigilon Alta) mission is to improve your workday with smart office technology at your front door.. Interface with legal, data governance, and engineering teams on policy enforcement and control mapping.. Strong understanding of technical concepts: SAST, DAST, SCM, IdP, Kernel, Firmware, WAF, firewalls, IDS/IPS, SIEM, cloud security, etc.. Certifications such as CISM, CISSP, CISA, CRISC, or CIPM are strongly preferred.. High emotional intelligence and team leadership experience across cultures/time zones.
The mission of the penetration testing team is to protect Fidelity's assets and our customers' livelihoods from the threat of exploitation by malicious adversaries. Preferred: OSCP, GWAPT, GXPN, GPEN, LPT, CEH, CISSP or other industry security certifications. Demonstrated experience with common penetration testing and vulnerability assessment tools such as nmap, Wireshark, Nessus, NeXpose, BackTrack, Metasploit, AppScan, WebInspect, Burp Suite Professional, Acunetix, Arachni, w3af, NTOSpider.. The Penetration Testing team forms part of Security Assessment group within Enterprise Cybersecurity (ECS). Please be advised that Fidelity's business is governed by the provisions of the Securities Exchange Act of 1934, the Investment Advisers Act of 1940, the Investment Company Act of 1940, ERISA, numerous state laws governing securities, investment and retirement–related financial activities and the rules and regulations of numerous self–regulatory organizations, including FINRA, among others.
You will collaborate with the CISO (Chief Information Security Officer), CTO, product, devops, and legal/compliance teams. At least 8 years of work experience in software or data engineering, ideally in financial services and/or fintech industry.. Experience implementing zero-trust architecture, secrets management (e.g., HashiCorp Vault), and DevSecOps practices.. Experience conducting or leading threat modeling, penetration testing, or incident response.. Ability to implement and maintain identity and access management policies (SSO, MFA, RBAC)
Join to apply for the Principal Product Manager, AI Security role at HackerOne. The platform offers bug bounty, vulnerability disclosure, pentesting, AI red teaming, and code security.. We are trusted by industry leaders like Amazon, Anthropic, Crypto.com, General Motors, GitHub, Goldman Sachs, Uber, and the U.S. Department of Defense.. Deep understanding of cybersecurity technologies with direct product management experience in related cybersecurity fields, such as vulnerability management, penetration testing, application security, and related fields.. Domain experience with security research / hacking as part of red teaming, penetration testing and/or bug bounty programs, including methods, tools, and types of testing.
Bret was also one of Google's earliest product managers and co-creator of Google Maps. Before founding Sierra, Clay spent 18 years at Google, where he most recently led Google Labs. Earlier, he started and led Google’s AR/VR effort, Project Starline, and Google Lens. Before that, Clay led the product and design teams for Google Workspace.. Recommend strategic security initiatives and lead efforts to establish best practices as the company scales.. Strong foundation in web application security, cloud security (AWS, Azure, or GCP), and networking principles.. Familiarity with secure coding practices, threat modeling, vulnerability scanning, and incident response processes.. Experience securing AI systems, with understanding of LLM and Agentic AI risks.
Conduct offensive security activities including red teaming, penetration testing, and vulnerability research.. Perform penetration testing on SaaS applications and cloud infrastructure.. Familiar with programming languages like Golang, Rust, Typescript, Python.. Strong background in security architecture, CI/CD, cryptography, network, and application security.. Good understanding of cloud security in AWS, Azure, or GCP.
The platform offers bug bounty, vulnerability disclosure, pentesting, AI red teaming, and code security. We are trusted by industry leaders like Amazon, Anthropic,Crypto.com, General Motors, GitHub, Goldman Sachs, Uber, and the U.S. Department of Defense. Deep understanding of cybersecurity technologies with direct product management experience in related cybersecurity fields, such as vulnerability management, penetration testing, application security, and related fields. Domain experience with security research / hacking as part of red teaming, penetration testing and/or bug bounty programs, including methods, tools, and types of testing. Leaves of absence (including caregiver leave and leave under CO's Healthy Families and Workplaces Act)
Collaborate with DevOps teams to integrate automation of security controls into CI/CD pipelines (DevSecOps).. Strong knowledge of IAM, network security, encryption, data protection, and logging and monitoring best practices in AWS and Azure.. Experience with container security (Kubernetes, Docker, EKS).. Employee Resource Groups (Black Inclusion Group, Women in Leadership, PRIDE, Adelante). Linux Cryptography and Security Engineer Linux Cryptography and Security Engineer Staff Security Operations Engineer, Incident Response Lead Staff Security Operations Engineer (Observability & Automation) Sr Software Engineer, Privileged Access Management - Security Team We’re unlocking community knowledge in a new way.
The North Carolina Administrative Office of the Courts (NCAOC) seeks a highly qualified Network Security Specialist I to support its mission to protect and preserve the rights and liberties of all the people by providing a fair, independent and accessible forum for the just, timely and economical resolution of their legal affairs.. Participate in triaging, updating and seeing to closure of NCAOC SOC Help Desk tickets.. Under the guidance of a senior engineer, participate in the engineering and maintenance of Intrusion Prevention System (IPS), Vulnerability Management (VM), Network Access Control, IPsec, VPN, Security Incident and Event Manager (SIEM), and all other network and cloud security tools.. The Network Security Specialist I position reports to the Network Services Operations & Administration Manager.. In this position, you will have an opportunity to work remotely (up to 75% remote).
Responsibilities include but are not limited to: Design and implement strategies for detecting and responding to cyber incidents in Oracle Cloud Infrastructure (OCI) or Google Cloud Platform (GCP).. 3+ years’ experience with architecting, engineering, implementing, or securing solutions within GCP or OCI.. Knowledge of cloud security principles, including IAM, network security, and data protection within GCP or OCI.. Relevant certifications such as CISSP, CCSP, CCSK, GCFA, GCIH, or cloud-specific security certs.. Experience with security services and best practices within GCP or OCI.
Optimization, Management and Troubleshooting LAN (Cisco and Cisco Meraki), VLAN, STP/RSTP, DNS, DHCP, IPAM and L1/L2 issues.. Wireless LAN (Cisco and Cisco Meraki) Firewalls (Fortinet) Data connections (SD-WAN, MPLS, VPN). 5+ years of experience with Meraki/Cisco technologies and services such as switching and routing, firewall management, TCP/IP networking, VLAN Management, LAN/Wireless LAN, Spanning Tree issue resolution.. Strong experience with CISCO Meraki Switching: STP, RSTP, MST, LAN tuning/protection, VTP, VLANs and 802.1Q trunk, strong understanding of MAC /CAM/ ARP tables is a must.. Deep product knowledge and understanding of Meraki/Cisco product features including Disaster Recovery, Internet of Things, Monitoring, and remote Management.
Acrisure is a global Fintech leader that combines the best of humans and high tech to offer multiple financial products and services to millions of businesses and individual clients. We connect clients to solutions that help them protect and grow what matters, including Insurance, Reinsurance, Cyber Services, Mortgage Origination and more. Strong knowledge of cybersecurity solutions, including threat intelligence, cloud security, endpoint protection, and compliance frameworks. CISSP, CISM, or other relevant cybersecurity certifications are a plus. Sales certifications from cybersecurity vendors (e.g., Palo Alto, CrowdStrike, Fortinet) are advantageous.