Within Information Security we blend risk strategy, digital identity, cyber defense, application security and technology solutions as we consider the entire security lifecycle.. A significant responsibility will be working with the Cyber Defense team to execute on the tabletop and red team testing and exercise program.. Expert Knowledge of the red teaming, tabletop exercises, cyber incident response, and threat intelligence processes. Experience in test documentation, red team report creation, threat intelligence report creation and analysis for red teaming. EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets.
Ensure compliance with regulatory requirements, including SOX, and manage audits related to IT security, risk management, and business continuity. Provide leadership, mentorship, and training to the security team, driving operational excellence in security incident response, threat analysis, and vulnerability management. Proven experience in developing, implementing, and managing information security programs, including incident response, threat intelligence, and vulnerability management. Expertise in disaster recovery (DR) and business continuity planning (BCP), ensuring critical business functions are resilient in the event of a cyber-attack or disaster. Certification(s) in cybersecurity such as CISSP, CISM, or CISA are highly preferred.
In-depth knowledge of DoD's RMF. Develop technical documentation and presentations that are cybersecurity-related and provide incident response support, including intrusion detection and classified spills. Expert knowledge of NIST, DoD, and Army applicable security regulations. Ensure the continuous auditing of Enterprise Mission Assurance Support System (eMASS). Risk Management Framework (RMF).
The ideal candidate will have expert-level knowledge in SIEM implementation and log ingestion, Incident Response, and Threat Intelligence, and will be data-driven. Ensure all detection processes and tools adhere to regulatory requirements and industry standards (e.g., GDPR, PCI-DSS, NIST). Strong hands-on experience with SIEM/SOAR/Data Lake solutions (Splunk, Snowflake, S3).. Working experience with industry standard security technologies and services such as Threat Intelligence, Firewalls, SASE, IPS, Endpoint Security, DLP, SIEM/SOAR, and Data Mgmt. GSEC, GCIA, GFE, GCFA, CISA, CISSP, CISM, or CIA certification(s)
We realized a new perimeter was needed, one that is built in the cloud and follows and protects data wherever it goes, so we started Netskope to redefine Cloud, Network and Data Security.. Since 2012, we have built the market-leading cloud security company and an award-winning culture powered by hundreds of employees spread across offices in Santa Clara, St. Louis, Bangalore, London, Paris, Melbourne, Taipei, and Tokyo.. The Netskope Regional Sales Manager - Fed DOD will come on board with the full support of the executive team.. This is an amazing opportunity for the sales professional who has a history of completely dominating their territory and who wants to make an impact on building the next iconic cloud security company.. 10+ years of a successful track record selling cybersecurity and networking technologies including network security technologies such as Proxies, Next Generation Firewalls (NGFW), SSL/IPSec, VPN’s, SSO, DLP and Encryption gateways and growing a territory.
This position is located in either downtown Denver, CO or Mountain View, CA. (no relocation assistance provided). The IT Manager will ensure smooth IT operations, resolve issues, and act as an escalation point for the Desktop Support and System Administrator teams.. Oversee the administration, security, and optimization of corporate IT systems (Google Workspace, Atlassian, Slack, Dropbox, etc.). Strong knowledge of Google Workspace, Atlassian, Slack, Dropbox, and similar corporate IT tools. Experience with JAMF and Intune is preferred
Entity- Corporate Services Department - IS Core Infrastructure Location- 3535 Market Street, Philadelphia, PA Hours- M-F, Hybrid Summary: The Senior Manager of Infrastructure Disaster Recovery is a leadership position responsible for leading the organization's disaster recovery (DR) planning, execution, and testing efforts, ensuring the resilience of IT infrastructure in the event of disruptions or disasters within Penn Medicine.. In collaboration with IS teams, assess and enhance system recoverability, implement or collaborate on backup schedules, system architecture and configuration, and monitor the organization's ability to meet expected recovery time objectives (RTOs) and recovery point objectives (RPOs) Team Leadership Lead and mentor a team of disaster recovery professionals, technology vendors and DR consultants fostering a culture of resilience and preparedness.. Stay current on regulatory requirements, best practices, and compliance standards (e.g., ISO, NIST) related to IT disaster recovery and business continuity.. Performs duties in accordance with Penn Medicine and entity values, policies, and procedures Other duties as assigned to support the unit, department, entity, and health system organization Credentials: Certified Business Continuity Professional (CBCP) or Certified Information Systems Security Professional (CISSP) are a plus.. Candidates are considered for employment without regard to race, ethnicity, color, sex, sexual orientation, gender identity, religion, national origin, ancestry, age, disability, marital status, familial status, genetic information, domestic or sexual violence victim status, citizenship status, military status, status as a protected veteran or any other status protected by applicable law.
Base Technology or Security Certifications (e.g., CISSP, CompTIA Security+, CCENT, CCNA, MCSA, etc. Skills and Competencies Excellent knowledge of Hybrid Cloud Infrastructure – Compute – Amazon Elastic Compute Cloud (EC2), Virtual Machines (VM’s), SQL – Amazon Relational Database Service (AWS RDS) or Azure SQL, Security Groups, Subnets, firewalls etc.. Knowledge of AWS Identity & Access Management (IAM) capabilities.. Knowledge of cloud native systems (e.g. Kubernetes, Docker, EKS, ECS).. This position must be within a reasonable driving distance to a Branch, Consumer Operations, or Professional Office Building in one of the following locations: Birmingham, AL Nashville, TN Atlanta, GA Charlotte, NC Dallas, TX Houston, TX Denver, CO Orlando, FL Tampa, FL Salt Lake City, UT Regions will not provide relocation assistance for this position and would be at your own expense.
Blue Yonder Cybersecurity team is seeking a Cloud Security Architect.. The Cloud Security Architect is responsible for leading the development and delivery of cloud security architecture that aligns with enterprise security architecture and ensuring risk optimized cloud workloads.. The primary areas of focus for the Cloud Security Architect are to partner closely with Cloud teams in developing Cloud risk management strategy, assess current posture, and drive remediation.. Ensure security solutions comply with relevant regulatory requirements (e.g., GDPR, HIPAA, PCI DSS) and industry standards (e.g., NIST, ISO/IEC).. Certifications such as Certified Information Systems Security Professional (CISSP), Certified Cloud Security Professional (CCSP), Microsoft Cybersecurity Architect or equivalent.
Join our Cybersecurity and Digital Risk (CDR) team to help us also lead the airline industry in cyber-safety. The Principal Architect – Cloud Cybersecurity leads efforts to mature cloud security capabilities for United Airlines. Working knowledge of compliance standards (, GDPR, HIPAA, PCI DSS, etc. AWS Solution Architect Pro., Networking, and Security Specializations.. CISM, CRISC, CEH, GIAC Family
This position is based in the Wright Patterson Air Force Base with 1-2 days onsite week.. Utilize defense-in-depth strategies and methods to harden systems and networks (e.g. blocking/filtering, IDS/IPS, A/V, logical separation of management traffic, content detonation and automated analysis, and DISA SRG/STIG compliance).. Penetration testing with red team and blue team.. Must be able to obtain and maintain an active Secret or Top Secret clearance.. Linux+, CASP, and CEH are highly preferred certifications
The Data Analyst shall utilize the GISA Governance Board determined Security Information and Event Management (SIEM) solution, which as of January 2025 is transitioning from Splunk to a new architecture based on Elastic, Logstash, and Kibana (ELK), leveraging Cribl as a data broker to streamline and optimize data ingestion and processing.. Active Top Secret (TS) security clearance with eligibility for SCI and NATO read-on before starting work.. Cybersecurity tools and technologies: IDS/IPS, firewalls, host based security, threat intelligence platforms, vulnerability management tools. Technical Expertise: Advanced knowledge of Security Incident and Event Management (SIEM) tools, vulnerability management, compliance, and cybersecurity principles.. Advanced certifications such as Offensive Security Certified Professional (OSCP), GIAC Certified Incident Handler (GCIH), and GIAC Vulnerability Assessment Professional (GVAP).
· Manage threat intelligence programs and lead efforts to proactively identify and mitigate emerging cyber threats.. · Manage tactical and strategic operations, maintenance, and engineering of security capabilities, tools, and systems, including Identity and Access Management solutions like directories and PAM, Security Incident and Event Management (SIEM), firewalls, endpoint protection, email security, vulnerability management, and various other information security and related controls. · 7+ years of related IT/IT Security technical and process experience, including previous lead/manager positions in a production operations environment.. · Comprehensive proficiency in core security principles and domains: Asset Security, Security Architecture, Risk Management, Communications and Network Security, Identity and Access Management, Assessment testing, and Software Development methodologies.. · Demonstrated deep technical proficiency in common security capabilities and tools such as Identity and Access Management, Security Incident and Event Management (SIEM), firewalls, endpoint protection, email security, vulnerability management, and various other information security and related controls
Acrisure is a global Fintech leader that combines the best of humans and high tech to offer multiple financial products and services to millions of businesses and individual clients. We connect clients to solutions that help them protect and grow what matters, including Insurance, Reinsurance, Cyber Services, Mortgage Origination and more. Strong knowledge of cybersecurity solutions, including threat intelligence, cloud security, endpoint protection, and compliance frameworks. CISSP, CISM, or other relevant cybersecurity certifications are a plus. Sales certifications from cybersecurity vendors (e.g., Palo Alto, CrowdStrike, Fortinet) are advantageous.
The ideal candidate will have a strong background in incident response and privacy laws, with at least 3 years of private practice experience.. This role requires exceptional analytical, research, and communication skills, as well as the ability to manage complex legal issues related to data breaches, cyber incidents, and privacy compliance.. Litigation Support: Provide support in litigation and regulatory enforcement actions related to data breaches and privacy violations, including drafting pleadings, motions, and other legal documents.. Education: Juris Doctor (JD) degree from an accredited law school.. Proficient in legal research tools and software (e.g., Westlaw, LexisNexis).
Creates cyber-intelligence tools / methods and performs research and analysis in order to mitigate and eliminate high level data and cyber security risks.. Oversees the investigation of complex computer and information security incidents to determine extent of compromise to national security information and automated information systems.. Administers the computer and information security incident, damage and threat assessment programs.. Establishes strict program control processes to ensure mitigation of risks and supports obtaining certification and. Expert knowledge of encryption, vulnerability assessment, penetration testing, cyber forensics, intrusion detection, and incident response and remediation.
OneSpan is seeking a Chief Information Security Officer (CISO) to lead our cybersecurity vision, ensuring the protection of our products, data, and customers.. As CISO, you’ll spearhead our security strategy, manage enterprise-wide risk, and oversee compliance while fostering a culture of proactive security.. Develop and maintain the organization's IT Risk management framework, policies, procedures, register, and standards.. Review, redline, comment, negotiate information security provisions in customer and/or contracts.. Professional Security certifications such as CISSP, CISM, or CISA.