Information Security Analyst
Remote Job
Information Security Analyst/ConMon Analyst
Clearance: Must have an active Secret clearance
Certifications: DoD 8570 IAT Level II certification, Security + or higher
This is a hybrid position allowing 50% remote work after a brief ramp-up period (first 2-3 weeks will be 100% onsite during onboarding, then time will be split 50/50 onsite/remote).
Primary Responsibilities
Monitor IT systems (re-authorization and new systems) throughout their life cycle for changes that may impact the security posture of the system
Validate updates to the system security plans and the Plan of Actions and Milestones (POA&M) in the security assessment and management tool to reflect changes to the IT system
Validate that controls applicable to the automated ConMon reviews are properly implemented as part of the corresponding Risk Management Framework (RMF) package in Enterprise Mission Assurance Support Service (eMASS).
Utilizes business intelligent tools to develop ConMon capability and integration with RMF
Participate, contribute, and provide information as part of Step 0 and other steps of the RMF process and data call information and provide assistance in kickoff meetings if assessments are needed.
Design, develop, maintain, execute and improve a comprehensive ConMon program based on the organizational ConMon strategy.
Perform continuous assessments of all security controls for all Information Systems (IS) under the purview of the organization.
Perform automated/manual security control monitoring of the IS and provide IS and Security Control Status Reports. Develop and maintain standard ConMon plan templates for ISs.
Maintain the status for automated and manual security controls and identify any past due for assessment and validation.
Coordinate and facilitate coordination with system administrators, Assured Compliance Assessment Solution (ACAS) administrators, Host Based Security System (HBSS)administrators, etc. on issues receiving the acceptable credentialing percentages on scans, HBSS data, etc.
Support the system development lifecycle of a Governance, Risk, and Compliance (GRC) technical solution within the organization.
Basic Qualifications
Bachelor's degree in IT-related field and 4+ years of IT program/project management experience leading Continuous Monitoring and Vulnerability Management activities
2 or more years with tools such as ACAS, HBSS, Tanium, or Splunk.
Active DoD Secret or higher - program can support up to TS/SCI
Demonstrates experience with applying compliance standards to large and complex IT environments.
Demonstrates ability to evaluate the design and effectiveness of controls and standards to ensure compliancy in accordance with the applicable audits and inspections for an organization.
Demonstrates level understanding of vulnerabilities/weaknesses across complex IT environments and ability to understand applicability of security standards across technologies.
Demonstrates experience with communicating and coordinating at a functional and senior government.
Demonstrates experience with data analysis and developing work products to enable government risk based decisions.
Demonstrated experience with the development and execution of knowledge management best practices and the automation of knowledge management frameworks in order to enhance processes and procedures related to the management of the ConMon Program.
Demonstrates experience with the development and coordination of guidance and work products related to issues tracking management, plan of actions and milestones, and ensuring transparency of vulnerabilities within an organization.
DoD 8570 IAT Level II certification
Preferred Qualifications
ACAS, HBSS, and/or Tanium certifications or ability to obtain
EEO Employer
Apex Systems is an equal opportunity employer. We do not discriminate or allow discrimination on the basis of race, color, religion, creed, sex (including pregnancy, childbirth, breastfeeding, or related medical conditions), age, sexual orientation, gender identity, national origin, ancestry, citizenship, genetic information, registered domestic partner status, marital status, disability, status as a crime victim, protected veteran status, political affiliation, union membership, or any other characteristic protected by law. Apex will consider qualified applicants with criminal histories in a manner consistent with the requirements of applicable law. If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation in using our website for a search or application, please contact our Employee Services Department at ******************************** or ************.
Principal Platform Security Engineer
Remote Job
Security Platform building / hands-on builder, technical leadership abilities, Python expertise
This is a Full-Time/Direct Hire position with our client in financial services with offices in NYC and Seattle. 100% Remote. The Principal Platform Security Engineer must be a builder, position requires heavy Python coding, reviewing systems and determining what is needed to provide strongest security and building it with Pytho
n.
Must have 10 years of experience and 5+ years in security focused work and strong AWS. Software engineering background with Python, Go, C++, or Java. Strong containerization and orchestration experience is required- Kubernetes, EKS - Please apply if this sounds like you!
Overview:
The job is within the Platform Security team, which focuses on securing platform infrastructure. This role will specialize in non-cloud infrastructure, containerization, and container orchestration security (e.g., Kubernetes and EKS), while also covering areas such as PKI, cryptography, identity management, and network security.
Key Responsibilities:
Design, deploy, and maintain security services/platforms for engineering teams.
Enhance security controls across all layers of infrastructure.
Collaborate with engineering teams on security architecture and decisions.
Work with other security functions (e.g., application security, incident response) to identify and mitigate risks.
Minimum Qualifications:
10+ years of experience in security and related fields.
Expertise in container orchestration, SRE, systems engineering, or network engineering.
Experience with distributed systems, cloud computing (e.g., AWS), and high-availability services.
Strong software development skills (Python/Go).
Deep knowledge of computer security principles.
Preferred Qualifications:
Experience securing AWS, Linux environments, and cryptographic infrastructure.
Experience in identity and access management, secrets management, and infrastructure as code (e.g., Terraform).
WAF Security Engineer
Remote Job
Our top client in the travel/transportation industry is searching for a WAF Security Engineer to join their team! This is a great opportunity to design and develop security solutions that support their Web Application Firewall technologies. Ideal candidates have 3+ years of experience with security analysis, have a strong understanding of DNS, networking, system administration, and common application frameworks.
100% remote
1+ year contract to hire position with benefits available on contract
Only able to hire from the following states at this time: MO, IL, VA, CO, KS, TX, NC, GA, TN, FL, MI, OK, IN, SC
**Cannot work C2C**
Required:
Must be committed to incorporating security into all decisions and daily job responsibilities.
3 years of professional experience in information security or a related field.
Ability to model API requests using tools such as Postman.
Understanding of API and web application attack vectors
Ability to interpret the different components of web requests and responses.
Demonstrated experience writing and reviewing business, user, and non-functional/system level requirements.
Strong knowledge of system architecture and network applications.
Familiarity with OWASP & API OWASP Top 10.
Ability to investigate security breaches and other cybersecurity incident.
Monitor email and ticketing systems for security-related issues and follow through until resolution.
Monitor events and triage alerts across various security platforms.
1+ years of experience using a SIEM (preferably Splunk)
1+ years hands-on experience with administration of Web Application Firewall (WAF/WAAP) technologies.
1+ years working with SSL certificates.
In depth understanding of DNS
Preferred:
Bachelor's degree in computer science, Computer Information Systems, Cybersecurity, or related field preferred
Experience with Akamai or Imperva WAF/WAAP solutions.
Understanding of scripting and content creation. (e.g., Splunk dashboards, threat signature creation, Python scripts, Powershell scripts.)
Experience with automation tools such as Ansible and Terraform
Managing cloud security operations, including identity & access control, secure configuration management, network security, Infrastructure as Code, data security, and logging.
1+ year experience securing cloud applications (AWS/AZURE).
Understanding of Version control and ability to work in Git.
Ability to do Packet Captures (PCAPs) and interpret results.
Experience with CSP (client-side protection) platforms.
Staff Information Security Engineer, Infrastructure Security
Remote Job
LinkedIn is the world's largest professional network, built to create economic opportunity for every member of the global workforce. Our products help people make powerful connections, discover exciting opportunities, build necessary skills, and gain valuable insights every day. We're also committed to providing transformational opportunities for our own employees by investing in their growth. We aspire to create a culture that's built on trust, care, inclusion, and fun - where everyone can succeed. Join us to transform the way the world works.
This location is hybrid in our Mountain View office location.
At LinkedIn, we trust each other to do our best work where it works best for us and our teams. This role offers a hybrid work option, meaning you can both work from home and commute to a LinkedIn office, depending on what's best for you and when it is important for your team to be together.
About the team:
LinkedIn's members entrust us with their information every day and we take their security seriously. Our core value of putting our members first powers all the decisions we make, including how we manage and protect the data of our members and customers. We never stop working to ensure LinkedIn is secure. We follow industry standards and have developed our own best practices to stay ahead of the increasing number of threats facing all Internet services and infrastructure. LinkedIn is looking for an experienced Staff Engineer, Information Security to be an integral part of our Information Security organization.
LinkedIn's Platform Security team provides security architecture and design services throughout the organization as we scale our platform to support 700 million+ members across the globe. Our vision is to appropriately secure all infrastructure and data systems that power the LinkedIn experience and the tooling that empowers engineers. We are looking for an engineer who can help LinkedIn continue its journey of innovation and keep us at the forefront of the world as an organization worthy of the trust people place in us.
We are a multi-functional team, composed of self-driven individuals that take the hypothetical and wrap it in real-world tradeoffs in why, what, and how. We secure production workflows, harden existing design patterns, and are a voice for security on cutting edge engineering initiatives.
As a Security Partner, you will own and be responsible for the security risk posture of a partner engineering organization, while striving to shift the security engagement to the left. You will build and maintain deep relationships with the partner organization and contribute to building a frictionless engagement model with the Security Organization.
Responsibilities:
• You will partner with architects, engineers and site reliability engineers across the organization; build threat models, design secure systems, perform security design assessments, paint the overall risk picture, and help find solutions for the risks and vulnerabilities you identify.
• You will build necessary proof of concepts to ensure viability of security recommendations in the Li tech stack.
• You will articulate and communicate risk decisions effectively and drive security initiatives within the partner organization.
• You will influence technical architecture based on risk decisions derived from security assessments.
• You will identify and coach Security “Champions” within your partner organization.
• You will mentor team members to uplevel technical and interpersonal skills
Basic Qualifications
• BA/BS Degree in Computer Science or equivalent discipline
• 7+ years' experience in information security principles, such as threat modeling, security architecture, secure system design, system and network security, big data security, authentication and security protocols, cryptography
• 7+ years' experience and in-depth knowledge of container security, data security, network security, CI/CD security and control plane security.
• 3+ years' experience with security in cloud environments, Linux deployments, and scripting languages such as Python
Preferred Qualifications
• MS in Computer Science or equivalent
• Experience working in organizations securing massively scaled networks and systems
• Ability to work across teams and communicate concisely and clearly to partners
• You thrive in taking initiative and helping set direction when needed and adapt well to an ever-evolving environment
Suggested Skills:
-Threat Modeling
-Java/Golang/Rust/Python
-Technical Leadership
-Corporate, Cloud, Network & Offensive Security
-Containerization
You will Benefit from our Culture:
We strongly believe in the well-being of our employees and their families. That is why we offer generous health and wellness programs and time away for employees of all levels.
LinkedIn is committed to fair and equitable compensation practices.
The pay range for this role is $147,000 to $240,000. Actual compensation packages are based on several factors that are unique to each candidate, including but not limited to skill set, depth of experience, certifications, and specific work location. This may be different in other locations due to differences in the cost of labor.
The total compensation package for this position may also include annual performance bonus, stock, benefits and/or other applicable incentive compensation plans. For more information, visit **************************************
Equal Opportunity Statement
LinkedIn is committed to diversity in its workforce and is proud to be an equal opportunity employer. LinkedIn considers qualified applicants without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, marital status, pregnancy, sex, gender expression or identity, sexual orientation, citizenship, or any other legally protected class. LinkedIn is an Affirmative Action and Equal Opportunity Employer as described in our equal opportunity statement here: *********************************************************************************************************** Please reference ******************************************************************************************** and ************************************************************************************************ for more information.
LinkedIn is committed to offering an inclusive and accessible experience for all job seekers, including individuals with disabilities. Our goal is to foster an inclusive and accessible workplace where everyone has the opportunity to be successful.
If you need a reasonable accommodation to search for a job opening, apply for a position, or participate in the interview process, connect with us at accommodations@linkedin.com and describe the specific accommodation requested for a disability-related limitation.
Reasonable accommodations are modifications or adjustments to the application or hiring process that would enable you to fully participate in that process. Examples of reasonable accommodations include but are not limited to:
-Documents in alternate formats or read aloud to you
-Having interviews in an accessible location
-Being accompanied by a service dog
-Having a sign language interpreter present for the interview
A request for an accommodation will be responded to within three business days. However, non-disability related requests, such as following up on an application, will not receive a response.
LinkedIn will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by LinkedIn, or (c) consistent with LinkedIn's legal duty to furnish information.
Pay Transparency Policy Statement
As a federal contractor, LinkedIn follows the Pay Transparency and non-discrimination provisions described at this link: ********************************
Global Data Privacy Notice for Job Candidates
This document provides transparency around the way in which LinkedIn handles personal data of employees and job applicants: ***************************************
Analyst, IT Security Senior
Remote Job
Job Title: IT Security Analyst Senior
FLSA Status: Exempt
Department: Information Technology
Reports to: Manager of Information Technology
Flex qualifies for the Flexible Work Policy. Employees receive 75 work days annually to work remote! The initial amount of days is prorated for the first year based on start date.
JOB DESCRIPTION:
This position will work with the Director of IT to monitor the network for security breaches and conduct investigations of violations. The analyst takes part in designing and implementing security protocols, applications, and processes designed to secure the company, data, and applications Loram utilizes. The role installs and maintains security software and/or systems including Access Control, segmentation, firewalls, MFA, remote access, spam, and web filters. Monitors for security-related events and ensures data is protected from unauthorized users. Produces security reports for management, security committee, and board. Assists technology services with device hardening, vulnerability remediation, and security violations. Regular testing including a review of processes and penetration testing will be used to review company compliance with the security roadmap that has been laid out.
KEY DUTIES AND RESPONSIBILITIES:
Analyzes security logs to identify threat events; triage and respond accordingly to security incidents following internal security protocols
Configures security controls in all systems and IT infrastructure by policy, standards, and procedures
Tests network security controls; coordinating remediation efforts and closure of any identified issues
Acts as the first line of support for triage and remediation of support tickets related to security and tracks ongoing support issues
Stays current with IT security trends and standards through local special interest group involvement and monitoring online information sources
Stays current with released security features of internal IT systems and software
Maintains confidentiality and integrity in dealing with sensitive information systems and processes
Works with Infrastructure and Application teams to establish a Disaster Recovery solution and the testing of it
Works with facilities teams to ensure that physical security systems are operational and implemented correctly
ESSENTIAL JOB FUNCTIONS:
Problem Solving and Decision Making
Anticipate or recognize the existence of a problem
Commit to a solution promptly, and develop a realistic approach for implementing
Critical and Analytical Thinking
Possess sufficient logic, inductive, and deductive reasoning ability to perform the job successfully
Concludes from relevant and/or missing information
Planning and Organizing
Develop and execute security plans for all environments which include new functionality, migrations, and expansion
Ability to prioritize, approach work in a methodical manner; work concurrently on several tasks, plan, and schedule tasks so that work is completed on time
Communication
Express relevant information appropriately to individuals or groups considering the audience and the nature of the information
Create documentation of environment configuration and how each area should be supported
Compliance
Abide by a Code of Ethics for professional conduct. Follow governance, risk management, and compliance guidelines
BEHAVIORAL COMPETENCIES:
Values Based
Action Oriented
Creating a Service Reputation
Problem Solving
Technical Learning
REQUIRED QUALIFICATIONS:
Education: Bachelor's degree in information technology or related field
Experience:
5+ years of information security experience including defining security programs within companies
Experience with the translation of penetration testing and security assessments preferred
Understanding of firewalls, network switches, proxies, SIEM, antivirus, and IDPS concepts
Good verbal & written communication skills
Able to work with very little supervision in a fast-paced environment
Facilitates administrator and end-user IT security training
*Or 9+years equivalent combination of education and applicable experience
PREFERRED QUALIFICATIONS:
Knowledge, Skills, and Abilities:
Microsoft Security Certification
Computer Hardware, Windows 10 OS, and other software support.
Azure AD and broader Azure applications
PowerShell scripting, Power Platform applications (Power Apps, Power Automate), MS Intune, SCCM
WORKING CONDITIONS:
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of the role. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Office deskwork, requiring sitting, walking, using phone & computer
May lift up to 30 lbs. occasionally
Ability to travel up to 10% including international travel
Rev: January 2024
Loram is an Equal Opportunity Employer and will make all employment-related decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, national origin, age, disability, marital status, familial status, status with regard to public assistance, membership or activity in a local commission, protected veteran status, or any other status protected by applicable law
#LI-KK1
#LI-HYBRID
Product Security Architect
Remote Job
Bachelor's or master's degree in computer science, Information Security, or a related field. • Professional cer.fica.ons in informa.on security (e.g., CISSP, CISM) are highly desirable. • Extensive experience in product security, particularly in the design and implementation of security solutions for medical devices or related healthcare technology.
Deep understanding of healthcare regulations and standards affec.ng medical device security. • Proficiency in security architectures, encryption technologies, identity and access and network security etc.
Experience with risk management methodologies and security assessment tools. • Strong analy.cal and problem-solving skills.
Product security processes, tools and techniques especially implementation aspects • Excellent communication and interpersonal skills, with the ability to explain complex security concepts to non-technical stakeholders.
Preferred qualifications
Knowledge in reference architecture and design patterns as applicable to medical technologies and products.
Working knowledge in Software engineering and programming languages (Java, Python, C/C++/C# etc.).
Implementation and adoption of security frameworks such as SABSA /TOGAF frameworks.
Emerging medical technologies (AI, Blockchain, MIoT, RPA, etc.) and their security threats/risks.
Job Responsibilities
The Product Security Solutions Architect will be responsible for leading the design and implementation of security measures for medical device software, hardware, digital solutions and/or combination products. This role involves working closely with R&D, product management, regulatory, quality and compliance teams to ensure that all products meet the highest standards of security and privacy in line with regulatory and customer requirements.
This person possesses a blend of business and technical know-how to mature product security architecture, software and solutions engineering function; Able to handle ambiguity and complexity of customer products including intended use, interoperability, product architectures and industry best practices.
What We Offer
Exciting Projects:Come take your place at the forefront of digital transformation! With clients across all industries and sectors, we offer an opportunity to work on market-defining products using the latest technologies.
Collaborative Environment: You can expand your skills by collaborating with a diverse team of highly talented people in an open, laidback environment - or even abroad in one of our global centers or client facilities!
Work-Life Balance:GlobalLogic prioritizes work-life balance, which is why we offer flexible work schedules and opportunities to work from home.
Professional Development:We provide continuing education classes, professional certification and training (technical, soft skills, language, and communication skills) to help you realize your professional goals. Being part of a global organization, there are additional learning opportunities through international knowledge exchanges.
Excellent Benefits:We provide our employees with competitive salaries, health and life insurance, short-term and long-term disability insurance, a matched contribution 401K plan, flexible spending accounts, and PTO and holidays
GlobalLogic estimates the starting pay range for this role to be performed in Lake Forest CA is 180K-185K, and reflects base salary only. This pay range is provided as a good faith estimate and the amount offered may be higher or lower. GlobalLogic takes many factors into consideration in making an offer, including candidate qualifications, work experience, operational needs, travel and onsite requirements, internal peer equity, prevailing wage, responsibilities, and other market and business considerations.
About GlobalLogic GlobalLogic is a leader in digital engineering. We help brands across the globe design and build innovative products, platforms, and digital experiences for the modern world. By integrating experience design, complex engineering, and data expertise-we help our clients imagine what's possible, and accelerate their transition into tomorrow's digital businesses. Headquartered in Silicon Valley, GlobalLogic operates design studios and engineering centers around the world, extending our deep expertise to customers in the automotive, communications, financial services, healthcare and life sciences, manufacturing, media and entertainment, semiconductor, and technology industries. GlobalLogic is a Hitachi Group Company operating under Hitachi, Ltd. (TSE: 6501) which contributes to a sustainable society with a higher quality of life by driving innovation through data and technology as the Social Innovation Business.
SOC Cyber Detection & Response (CDR) Analyst
Remote Job
SOC Cyber Detection & Response (CDR) Analyst - (24000AOW) Description The Executive Office of Technology Services and Security (EOTSS) is the state's lead office for information technology. We provide enterprise level information technology services including network management and security; computer operations; application hosting; desktop provisioning and management; and modern and responsive digital services to 40,000 internal stakeholders plus the residents, business owners and visitors to the Commonwealth of Massachusetts.
EOTSS is seeking a SOC Cyber Detection & Response (CDR) Analyst who will be a member of the Security Operations Center's Cyber Detection and Response Team. The SOC CDR Analyst is primarily responsible for incident triage, detection, response, and remediation activities that occur within the TSS SOC. Analysts in the SOC work with Security Engineers, Managed Security Service Providers (NuHarbor) and SOC Managers to give situational awareness via detection, containment, and remediation of IT threats. SOC Analysts cooperate work with other team members to detect and respond to information security incidents, develop, and follow security events such as alerts, and engage in security investigations.
The primary work location for this role will be at 200 Arlington Street Chelsea, Massachusetts 02150. The work schedule for this position is Monday through Friday, 9AM to 5PM EST. This position would be expected to follow a hybrid model of reporting to work that combines in-office workdays and work from home days as needed.
Duties and Responsibilities:
Managing day-to-day security monitoring, and IR activities, including but not limited to SIEM monitoring, Endpoint Detection and Response using Palo Alto's Cortex XDR, notifying agencies of potential malicious activities, managing, and/or maintaining security incident response practices.
Assist in detection and incident response functions including, but not limited to, Security Incident Reporting tickets, customer and constituent notification, tracking, and reporting. Conduct and/or participate in agency, state, regional, and/or national cyber security incident simulation exercises.
Monitor, report, and respond to anomalous Internet, Extranet, and/or Intranet activity related information provided through internal operations and/or credible external third-party threat intelligence organizations. Work with EOTSS customer organizations and EDR vendor to test software revision, EDR client file updating, and/or EDR related status reporting.
Assist in the development and delivery of cybersecurity education and awareness initiatives on behalf of state government.
Review third party alerts to maintain overall situational awareness of security issues affecting Commonwealth agencies, EOTSS customer organizations, and/or MS-ISAC members.
Conduct research into new threats that may affect Commonwealth agencies, EOTSS customer organizations, and/or local entities.
Provide and promote security awareness by assisting in phishing campaigns for all users across the Commonwealth while furthering overall security awareness programs.
Support the preparations of security reports to management on security system activities and performance utilizing enterprise security tools (Tenable, DHS, Expanse, etc.)
Preferred Knowledge, Skills, and Abilities:
Knowledge of SIEM (Security Information and Event Management) Splunk
Knowledge and working familiarity of cloud computing (AWS/AZURE/GCP)
Knowledge of TCP/IP, VLANs, computer networking, routing, and switching
Familiarity with IDS/IPS, penetration and vulnerability testing
Familiarity with Windows and Linux operating systems
Understanding of network protocols and packet analysis tools
Understanding of Proofpoint and other email security tools.
Ability to think critically and problem-solving abilities.
Capability to communicate and listen to needs from organizational stakeholders.
Security certifications desired, but not required.
EDR Tools Palo Alto Cortex preferred, but not required.
Qualifications First consideration will be given to those applicants that apply within the first 14 days.
Minimum Entrance Requirements:
Applicants must have (A) at least one (1) year of full-time or equivalent part-time experience in the field of information technology security, or (B) any equivalent combination of the required experience and the substitutions below.
Substitutions:
I. An Associate's degree in a related field may substitute for the required experience.
Comprehensive Benefits
When you embark on a career with the Commonwealth, you are offered an outstanding suite of employee benefits that add to the overall value of your compensation package. We take pride in providing a work experience that supports you, your loved ones, and your future.
Want the specifics? Explore our Employee Benefits and Rewards!
An Equal Opportunity / Affirmative Action Employer. Females, minorities, veterans, and persons with disabilities are strongly encouraged to apply.
The Commonwealth is an Equal Opportunity Employer and does not discriminate on the basis of race, religion, color, sex, gender identity or expression, sexual orientation, age, disability, national origin, veteran status, or any other basis covered by appropriate law. Research suggests that qualified women, Black, Indigenous, and Persons of Color (BIPOC) may self-select out of opportunities if they don't meet 100% of the job requirements. We encourage individuals who believe they have the skills necessary to thrive to apply for this role. Official Title: Security Analyst IPrimary Location: United States-Massachusetts-Chelsea-200 Arlington StreetJob: Information Systems and TechnologyAgency: Exec Office of Technology Services and SecuritySchedule: Full-time Shift: DayJob Posting: Dec 16, 2024, 8:02:49 PMNumber of Openings: 1Salary: 69,372.16 - 103,344.80 YearlyIf you have Diversity, Affirmative Action or Equal Employment Opportunity questions or need a Reasonable Accommodation, please contact Diversity Officer / ADA Coordinator: Emily Hartmann - **********Bargaining Unit: 06-NAGE - Professional Admin.Confidential: NoPotentially Eligible for a Hybrid Work Schedule: YesGuidesApply for a Job
Apply for a Job for JAWS Users
Create a Profile
Create a Profile for JAWS Users
System Requirements
Cyber Defense, Adversary Emulation
Remote Job
Join the Mizuho team in Cyber Defense, Adversary Emulation! Major Duties & Responsibilities: In this role you will report to the Head of Adversary Emulation, in the organization of the CISO. This role will play a pivotal role in safeguarding the company's digital assets and ensuring business continuity. You will be a leading member of the Cyber Defense team for Mizuho Americas Services, LLC (MAS). You will be responsible for day-to-day oversight and management of the Threat and Vulnerability Management program. You will work closely with other members of the MAS Information Security Office to actively identify and mitigate threats and vulnerabilities through various activities. You must combine hands-on experience with an understanding of theory and practice. You will also be involved with monitoring and oversight of security consultants and other supporting third parties. Your responsibilities include operational aspects of monitoring and remediating security events including working with vendors and other IT departments to address the event and escalating to senior members of the team as necessary.
* Operational Responsibilities
* Oversee the Threat and Vulnerability Management program
* Prioritize work amongst full time staff and third-party resources
* Oversee tools, technologies, and processes related to threat management
* Ensure effective reporting of security activities, reporting status, risks, issues, and escalations to senior leadership (CISO, CIO, and other senior stakeholders).
* Manage relationship with other Security, Infrastructure, and Application teams to identify, mitigate, and remediate vulnerabilities and other threats in the environment
* Provide expertise on Security Incidents
* Map TTPs and CVEs to identified threats and prioritize appropriately
* Recommend and implement enhancements to existing processes, focusing on automation and integration between other security tools.
* Ensure comprehensive threat identification of the entire Mizuho enterprise
* Review daily, weekly, and monthly security reports for any anomalies or issues
* Maintain documentation on security architecture, procedures, configurations
* Project based work
* Provide feedback to MAS teams to implement well engineered solutions to improve security posture
* Identify workflow areas to proactively address potential vulnerabilities
* Work with colleagues and vendors to assess different technologies and determine their impact within the Mizuho environment
* Provide security requirements for the design, development, engineering, and implementation of hardware, networks, and applications
* Conduct lessons learned exercises and RCAs after security incidents, detection of major system vulnerabilities, and ongoing compliance violations
* Analyze threat intelligence, vulnerability and security assessments; produce vulnerability reports and work with IT teams to correct or mitigate found deficiencies
Qualifications & Requirements:
* At least 10+ years security domain related experience, preferably within a financial services firm
* 5+ years of experience in a similar position.
* Proven experience in a vulnerability management program within a large enterprise.
* Strong understanding of cybersecurity risk management and information security standards (SOX, NIST, FISMA, etc.)
* Ability to manage and use various scanning technologies across different layers of the tech stack, such as SAST, DAST, cloud infrastructure
* Strong understanding of OWASP and other common Application Security issues and frameworks.
* Fundamental understanding of vulnerability reporting and management processes or tools
* Solid grasp and understanding of vulnerability scoring and classification methodologies
* Excellent communication and leadership skills, with the ability to manage and prioritize multiple projects and initiatives.
* Strong knowledge of internet, web, application and network security platforms.
* Strong knowledge of Linux & Windows operating system and security functions
* Strong knowledge of Cloud Deployment and management
* Develop, document, and maintain policies, procedures, and training plans for system administration and appropriate use
* Strong written and verbal communication skills. Ability to clearly articulate ideas, solutions etc.
* Educational background with BS / MS in Information Technology, Computer Science, Engineering or related area.
Additional Qualifications:
* Possess security certifications (CISSP, CISM, CISA, GSEC, etc.)
* Experience with project management and industry best practices
* Experience working within the Financial Services industry
* Experience in support projects and able to handle issues against defined SLA / KPI
* Clear communication & presentation skills, and the ability to articulate complex issues concisely
* Leadership, relationship-building and influencing skills to drive agendas across a number of teams
* Proven track record of effectively interacting with senior management
* Ability to work strategically and collaboratively across departments
* Excellent organizational skills with the ability to multi-task, prioritize competing demands, be versatile and action-oriented
The expected base salary ranges from $105k-$170k. Salary offers are based on a wide range of factors including relevant skills, training, experience, education, and, where applicable, certifications and licenses obtained. Market and organizational factors are also considered. In addition to salary and a generous employee benefits package, successful candidates are eligible to receive a discretionary bonus.
#LI-Hybrid
Other requirements
Mizuho has in place a hybrid working program, with varying opportunities for remote work depending on the nature of the role, needs of your department, as well as local laws and regulatory obligations. Roles in some of our departments have greater in-office requirements that will be communicated to you as part of the recruitment process.
Company Overview
Mizuho Financial Group, Inc. is the 15th largest bank in the world as measured by total assets of ~$2 trillion. Mizuho's 60,000 employees worldwide offer comprehensive financial services to clients in 35 countries and 800 offices throughout the Americas, EMEA and Asia. Mizuho Americas is a leading provider of corporate and investment banking services to clients in the US, Canada, and Latin America. Through its acquisition of Greenhill, Mizuho provides M&A, restructuring and private capital advisory capabilities across Americas, Europe and Asia. Mizuho Americas employs approximately 3,500 professionals, and its capabilities span corporate and investment banking, capital markets, equity and fixed income sales & trading, derivatives, FX, custody and research. Visit ***********************
Mizuho Americas offers a competitive total rewards package.
We are an EEO/AA Employer - M/F/Disability/Veteran.
We participate in the E-Verify program.
We maintain a drug-free workplace and reserve the right to require pre- and post-hire drug testing as permitted by applicable law.
#LI-MIZUHO
Cyber Security Analyst
Remote Job
Share If you are unable to complete this application due to a disability, contact this employer to ask for an accommodation or an alternative application process. **Cyber Security Analyst** FullTime Professional 2 days ago Requisition ID: 1232 **Cyber Security Analyst - Cyber Security Certification Manager**
**Overview**
Tech(x) is an energized company with experienced, specialized and progressive thought leaders progressing talented professionals in areas of technology, security, logistics, project management, talent management and procurement. We are building our DoD and technology footprint by allowing hybrid and remote work locations, as well as flexible schedules. As a solution-based company, we foster a creative environment that welcomes new perspectives from all of our team members.
This is a pivotal position for our team; internal and external customers, who is focused on supporting the program and its growth.
**Responsibilities**
* This position supports a DEVCOM lab under NSA and requires cyber security SME level oversight in certifying lab policies, and procedures for cyber security industry level standards.
* Implement security measures and monitor networks. Identify, interpret, and evaluate major applications, infrastructure, enclaves, and Enterprise system environments based on proposed accreditation boundaries.
* Establish and publish upon approval Cybersecurity policies and Standard Operating Procedures (SOPs) as required to include Quality control process documentation.
* Coordinating with third party certification labs.
* Assist in the maintainability of a Continuous Monitoring Strategy and Program to maintain information system networks for operational testing
* Work with Engineers and COMSEC SME to assess security levels for projects.
* Performing certification audits, at internally and at assembly facilities.
* Sample coordination and submissions.
* Update of online certification website.
* Must be able to participate in testing, and contribute towards solutions when problems arise, at third party certification agencies.
* This position does not have direct reports or supervisory responsibilities.
* All other duties assigned.
****Qualifications****
* 4-9 years of cyber security experience.
* Experienced debriefer.
* Have excellent communications, teamwork, leadership and conflict management skills.
* Knowledge of computer applications software.
* Can identify and communicate risks and provide mitigation strategies.
* Ability to enter data accurately into databases.
* Ability to write routine reports and correspondence.
* Interpersonal skills are necessary to work effectively and cooperatively with all levels of management and staff.
* Must possess effective oral and technical written communication skills to clearly communicate information to others.
* Must be proficient in applying Defense Information Systems Agency (DISA) Security Technical Implementation Guide (STIG) and or Security Requirements Guide (SRG) checklist to various devices within an Information System
****Preferred Qualifications****
* ISSP certified.
* DoD contract experience.
* Experience with the Army's cryptographic programs.
* COMSEC training and or experience.
* Certified as a Certified Information System Security Professional (CISSP)
* Military trained and a Veteran.
* DoD TS/SCI w/ploy Clearance.
* Certified Information Systems Auditor (CISA)
**Clearance:**
* Active DoD TS/SCI clearance.
**Education & Experience:**
* Bachelor's degree in Cyber Security, Computer Science, Engineering or other closely related field.
* In lieu of a degree, 4 or more years of relevant experience may suffice.
**Location:**
* Aberdeen Proving Grounds, and Linthicum Heights, Maryland.
* This is a hybrid remote position based on the government customer's approval.
* Monday-Friday 8:00 am to 5:00 pm. Schedule flexing is available with the PM's approval.
**Travel:**
* Travel requirements will fluctuate but are not expected to be over 15%
**Join the Team:**
Tech(x) is a customer centric team, both external and internal customers. This team supports each other to be successful on the job and in meeting the mission. Tech(x) is an Equal Opportunity Employer that embraces diversity in its employee population. It is the policy of Tech(X) to provide equal opportunity to all qualified applicants and employees without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, protected veteran status, or genetic information.
**We value Veterans and encourage all to apply!**
Cyber Analyst, Digital Forensics Incident Response
Remote Job
Why you should join our At-Bay Security team:
At-Bay is a fast-growth InsurSec company (Insurance x Cybersecurity) on a mission to bring innovative products to the market that help protect small businesses from digital risks. As an InsurSec provider, we uniquely combine insurance with mission-critical security technologies, threat intelligence, and human expertise, to bridge the critical security capability gap that exists among SMBs in the community. We believe InsurSec is an $80B market opportunity and we are excited to expand our DFIR team in order to help expand our reach and influence in the business and security community, of which we serve 35,000 customers.
With At-Bay, our customers experience 5X fewer ransomware attacks. This is just the tip of the iceberg! Click here to learn more about what we're building.
The Role:
Cybersecurity Analysts focused on Digital Forensics and Incident Response (DFIR) deliver incident investigation and response services to At-Bay insureds via:
Forensically sound collection, transmission, and storage of digital evidence
Analysis of digital evidence to identify indicators of compromise and adversary activity
Development of incident timelines and theories of compromise
Identification of incident root causes
Participation in threat actor negotiations as necessary (e.g., ransom negotiations, etc.)
Participation in incident recovery (e.g., restoration of data from backups, reimaging workstations and servers, rebuilding network infrastructure, etc.) activities as necessary
Development and delivery of incident reports to document key incident details for engagement stakeholders including executive leaders for insureds, breach coach attorneys, and At-Bay claims management staff as necessary
Development and delivery of recommendations to mitigate the risk of future incidents for impacted insureds
Development and delivery of incident response training and simulations for targeted insureds
Key skills:
Previous digital forensics and incident response experience
Strong oral and written communication skills
Previous hands-on experience performing digital forensics and incident response, including several of the following:
Business Email Compromise
Ransomware
Digital evidence collection and analysis
Development and analysis of cyber threat intelligence
Leadership of or participation in investigations involving digital evidence
Intrusion detection / cyber threat hunting
Malware analysis
Incident recovery activities such as restoration of data from backups, operation of decryptor tools, etc.
Previous hands-on experience working in information technology operations (e.g., Network Operations Center, Security Operations Center, Incident Response Team, etc.)
Minimum requirements:
Bachelor's degree or equivalent
Minimum of 2 years of experience in cybersecurity operations, incident response, incident recovery, or another security discipline
Willingness to travel as needed to perform job functions
Preferred requirements:
Significant undergraduate or graduate coursework in computer science, computer engineering, information systems, or cybersecurity
Previous background in law enforcement or government/military with experience leading complex technical investigations
Knowledge of cloud environments, including knowledge of cloud security products and services offered by major cloud service providers (e.g., AWS, Azure, Google)
Experience in a top-10 cyber consulting firm or leading DFIR provider preferred
One or more industry cybersecurity certifications (e.g., GCIH, Security+, CISSP, etc.)
Work location:
USA, Nationwide
Our estimated base pay range for this role is $80,000-$130,000 per year. Base salary is determined by a variety of factors including but not limited to market data, location, internal equitability, domain knowledge, experiences and skills. In general, if the position sparks your interest we encourage you to apply - our team prioritizes talent.
#LI-CK1
Cyber Threat Analyst (Remote)
Remote Job
Tier One Technologies is looking for a Cyber Threat Analyst to work with our direct US Government client.
.
SELECTED CANDIDATES WITHOUT REQUIRED CLEARANCE WILL BE SUBJECT TO A FEDERAL GOVERNMENT BACKGROUND INVESTIGATION TO RECEIVE IT.
Responsibilities
Identify and assess the capabilities and activities of cyber criminals or foreign intelligence entities.
Produce finds to help initialize or support law enforcement and counterintelligence investigations or activities.
Work with analytic approaches to uncover cybersecurity threats and fraud schemes against the organization.
Operate across business units to identify, collect, aggregate, and analyze new data sources to advance the team's mission and reduce the time needed to deliver analytical insights.
Interface with Business Unit Information System Security Officers and Incident Response Teams and interpret, visualize, and report on complex data to stakeholders at all levels.
Highlight and analyze gaps in corporate systems and processes, as well as recommending remediation solutions to more effectively deter cybersecurity threats and fraudulent activity.
Develop visualizations, reports, and dashboards in Databricks, Splunk, and/or PowerBI to effectively convey data insights.
Develop and manage ETL pipelines in Databricks to improve efficiency in analyzing and query data.
Maintain threat indicators within the threat intelligence platform.
Implement and support standard procedures for incident response.
Qualifications
Bachelor's or Master's Degree in Computer Science, Information Systems, or other related field.
6+ years of analytic experience, to include 3+ years of working with cyber-analytics.
Strong knowledge of Cyber Security.
Must be familiar with Data Science and AI/ML concepts used for fraud detection.
Prior experience working with Databricks to develop analytic solutions using ETL, Python, SQL, and R.
CERTIFICATIONS (One or more required): CISSP or CISA or CISM or GIAC or RHCE.
Excellent oral and written communication skills.
Must be able to obtain a Position of Public Trust Clearance.
All candidates must be a US Citizen or have permanent residence status (Green Card).
Candidate must have lived in the United States for the past 5 years.
Cannot have more than 6 months travel outside the United States within the last 5 years. Military Service excluded.
SOC Cyber Detection & Response (CDR) Analyst
Remote Job
SOC Cyber Detection & Response (CDR) Analyst - (24000AOW) Description The Executive Office of Technology Services and Security (EOTSS) is the state's lead office for information technology. We provide enterprise level information technology services including network management and security; computer operations; application hosting; desktop provisioning and management; and modern and responsive digital services to 40,000 internal stakeholders plus the residents, business owners and visitors to the Commonwealth of Massachusetts.
EOTSS is seeking a SOC Cyber Detection & Response (CDR) Analyst who will be a member of the Security Operations Center's Cyber Detection and Response Team. The SOC CDR Analyst is primarily responsible for incident triage, detection, response, and remediation activities that occur within the TSS SOC. Analysts in the SOC work with Security Engineers, Managed Security Service Providers (NuHarbor) and SOC Managers to give situational awareness via detection, containment, and remediation of IT threats. SOC Analysts cooperate work with other team members to detect and respond to information security incidents, develop, and follow security events such as alerts, and engage in security investigations.
The primary work location for this role will be at 200 Arlington Street Chelsea, Massachusetts 02150. The work schedule for this position is Monday through Friday, 9AM to 5PM EST. This position would be expected to follow a hybrid model of reporting to work that combines in-office workdays and work from home days as needed.
Duties and Responsibilities:
Managing day-to-day security monitoring, and IR activities, including but not limited to SIEM monitoring, Endpoint Detection and Response using Palo Alto's Cortex XDR, notifying agencies of potential malicious activities, managing, and/or maintaining security incident response practices.
Assist in detection and incident response functions including, but not limited to, Security Incident Reporting tickets, customer and constituent notification, tracking, and reporting. Conduct and/or participate in agency, state, regional, and/or national cyber security incident simulation exercises.
Monitor, report, and respond to anomalous Internet, Extranet, and/or Intranet activity related information provided through internal operations and/or credible external third-party threat intelligence organizations. Work with EOTSS customer organizations and EDR vendor to test software revision, EDR client file updating, and/or EDR related status reporting.
Assist in the development and delivery of cybersecurity education and awareness initiatives on behalf of state government.
Review third party alerts to maintain overall situational awareness of security issues affecting Commonwealth agencies, EOTSS customer organizations, and/or MS-ISAC members.
Conduct research into new threats that may affect Commonwealth agencies, EOTSS customer organizations, and/or local entities.
Provide and promote security awareness by assisting in phishing campaigns for all users across the Commonwealth while furthering overall security awareness programs.
Support the preparations of security reports to management on security system activities and performance utilizing enterprise security tools (Tenable, DHS, Expanse, etc.)
Preferred Knowledge, Skills, and Abilities:
Knowledge of SIEM (Security Information and Event Management) Splunk
Knowledge and working familiarity of cloud computing (AWS/AZURE/GCP)
Knowledge of TCP/IP, VLANs, computer networking, routing, and switching
Familiarity with IDS/IPS, penetration and vulnerability testing
Familiarity with Windows and Linux operating systems
Understanding of network protocols and packet analysis tools
Understanding of Proofpoint and other email security tools.
Ability to think critically and problem-solving abilities.
Capability to communicate and listen to needs from organizational stakeholders.
Security certifications desired, but not required.
EDR Tools Palo Alto Cortex preferred, but not required.
Qualifications First consideration will be given to those applicants that apply within the first 14 days.
Minimum Entrance Requirements:
Applicants must have (A) at least one (1) year of full-time or equivalent part-time experience in the field of information technology security, or (B) any equivalent combination of the required experience and the substitutions below.
Substitutions:
I. An Associate's degree in a related field may substitute for the required experience.
Comprehensive Benefits
When you embark on a career with the Commonwealth, you are offered an outstanding suite of employee benefits that add to the overall value of your compensation package. We take pride in providing a work experience that supports you, your loved ones, and your future.
Want the specifics? Explore our Employee Benefits and Rewards!
An Equal Opportunity / Affirmative Action Employer. Females, minorities, veterans, and persons with disabilities are strongly encouraged to apply.
The Commonwealth is an Equal Opportunity Employer and does not discriminate on the basis of race, religion, color, sex, gender identity or expression, sexual orientation, age, disability, national origin, veteran status, or any other basis covered by appropriate law. Research suggests that qualified women, Black, Indigenous, and Persons of Color (BIPOC) may self-select out of opportunities if they don't meet 100% of the job requirements. We encourage individuals who believe they have the skills necessary to thrive to apply for this role. Official Title: Security Analyst IPrimary Location: United States-Massachusetts-Chelsea-200 Arlington StreetJob: Information Systems and TechnologyAgency: Exec Office of Technology Services and SecuritySchedule: Full-time Shift: DayJob Posting: Dec 16, 2024, 8:02:49 PMNumber of Openings: 1Salary: 69,372.16 - 103,344.80 YearlyIf you have Diversity, Affirmative Action or Equal Employment Opportunity questions or need a Reasonable Accommodation, please contact Diversity Officer / ADA Coordinator: Emily Hartmann - **********Bargaining Unit: 06-NAGE - Professional Admin.Confidential: NoPotentially Eligible for a Hybrid Work Schedule: YesGuidesApply for a Job
Apply for a Job for JAWS Users
Create a Profile
Create a Profile for JAWS Users
System Requirements
SOC Cyber Detection & Response (CDR) Analyst
Remote Job
The Executive Office of Technology Services and Security (EOTSS) is the state's lead office for information technology. We provide enterprise level information technology services including network management and security; computer operations; application hosting; desktop provisioning and management; and modern and responsive digital services to 40,000 internal stakeholders plus the residents, business owners and visitors to the Commonwealth of Massachusetts.
EOTSS is seeking a SOC Cyber Detection & Response (CDR) Analyst who will be a member of the Security Operations Center's Cyber Detection and Response Team. The SOC CDR Analyst is primarily responsible for incident triage, detection, response, and remediation activities that occur within the TSS SOC. Analysts in the SOC work with Security Engineers, Managed Security Service Providers (NuHarbor) and SOC Managers to give situational awareness via detection, containment, and remediation of IT threats. SOC Analysts cooperate work with other team members to detect and respond to information security incidents, develop, and follow security events such as alerts, and engage in security investigations.
The primary work location for this role will be at 200 Arlington Street Chelsea, Massachusetts 02150. The work schedule for this position is Monday through Friday, 9AM to 5PM EST. This position would be expected to follow a hybrid model of reporting to work that combines in-office workdays and work from home days as needed.
Duties and Responsibilities:
* Managing day-to-day security monitoring, and IR activities, including but not limited to SIEM monitoring, Endpoint Detection and Response using Palo Alto's Cortex XDR, notifying agencies of potential malicious activities, managing, and/or maintaining security incident response practices.
* Assist in detection and incident response functions including, but not limited to, Security Incident Reporting tickets, customer and constituent notification, tracking, and reporting. Conduct and/or participate in agency, state, regional, and/or national cyber security incident simulation exercises.
* Monitor, report, and respond to anomalous Internet, Extranet, and/or Intranet activity related information provided through internal operations and/or credible external third-party threat intelligence organizations. Work with EOTSS customer organizations and EDR vendor to test software revision, EDR client file updating, and/or EDR related status reporting.
* Assist in the development and delivery of cybersecurity education and awareness initiatives on behalf of state government.
* Review third party alerts to maintain overall situational awareness of security issues affecting Commonwealth agencies, EOTSS customer organizations, and/or MS-ISAC members.
* Conduct research into new threats that may affect Commonwealth agencies, EOTSS customer organizations, and/or local entities.
* Provide and promote security awareness by assisting in phishing campaigns for all users across the Commonwealth while furthering overall security awareness programs.
* Support the preparations of security reports to management on security system activities and performance utilizing enterprise security tools (Tenable, DHS, Expanse, etc.)
Preferred Knowledge, Skills, and Abilities:
* Knowledge of SIEM (Security Information and Event Management) Splunk
* Knowledge and working familiarity of cloud computing (AWS/AZURE/GCP)
* Knowledge of TCP/IP, VLANs, computer networking, routing, and switching
* Familiarity with IDS/IPS, penetration and vulnerability testing
* Familiarity with Windows and Linux operating systems
* Understanding of network protocols and packet analysis tools
* Understanding of Proofpoint and other email security tools.
* Ability to think critically and problem-solving abilities.
* Capability to communicate and listen to needs from organizational stakeholders.
* Security certifications desired, but not required.
* EDR Tools Palo Alto Cortex preferred, but not required.
First consideration will be given to those applicants that apply within the first 14 days.
Minimum Entrance Requirements:
Applicants must have (A) at least one (1) year of full-time or equivalent part-time experience in the field of information technology security, or (B) any equivalent combination of the required experience and the substitutions below.
Substitutions:
I. An Associate's degree in a related field may substitute for the required experience.
Comprehensive Benefits
When you embark on a career with the Commonwealth, you are offered an outstanding suite of employee benefits that add to the overall value of your compensation package. We take pride in providing a work experience that supports you, your loved ones, and your future.
Want the specifics? Explore our Employee Benefits and Rewards!
An Equal Opportunity / Affirmative Action Employer. Females, minorities, veterans, and persons with disabilities are strongly encouraged to apply.
The Commonwealth is an Equal Opportunity Employer and does not discriminate on the basis of race, religion, color, sex, gender identity or expression, sexual orientation, age, disability, national origin, veteran status, or any other basis covered by appropriate law. Research suggests that qualified women, Black, Indigenous, and Persons of Color (BIPOC) may self-select out of opportunities if they don't meet 100% of the job requirements. We encourage individuals who believe they have the skills necessary to thrive to apply for this role.
Cyber security Analyst
Remote Job
* Job ID: J37899 * Job Title: Cyber security Analyst * Duration: 12 Months + Extension * Hourly Rate: Depending on Experience (DOE) * Work Authorization: US Citizen, Green Card, OPT-EAD, CPT, H-1B, H4-EAD, L2-EAD, GC-EAD * Client: To Be Discussed Later
* Employment Type:
W-2, 1099, C2C
**Primary Responsibilities:**
- Travel daily to regionally designated municipal offices to work directly with election clerks and IT resources
- Provide technical support for numerous standalone and network systems
- Monitor networks and systems for security issues using various security tools
- Perform vulnerability assessments, analyze results, and assist with the remediation as necessary
- Conduct regular audits to ensure authorized systems are operating securely and are in compliance with security policies and procedures
- Monitor access to all information systems and report on compliance with established policies and procedures.
**- Technical Qualifications:**
Education and Experience
- Bachelor's degree or higher in Information Technology or technical discipline and at least 4 years IT experience with a minimum of 2 years Cyber Security Information experience completion or working on a professional certification is a plus:
- Certified Information Systems Security Professional (CISSP)
- CISA Certified Information Systems Auditor (CISA)
- CEH Certified Ethical Hacker (CEH)
- CISM Certified Information Security Manager (CISM)
- ISSAP Information Systems Security Architecture Professional (ISSAP)
- Experience with Windows OS Windows Server, Windows Domains, Active Directory, and GPO's
- Understanding of NIST SP 800-61
- Familiarity with routers, switches, firewalls, load balancers, proxies, accelerators, and wireless technologies
- Experience in threat management and assessment as it relates to physical security
- Experience with corporate security risk assessment, analysis, and mitigating controls
**Personal Attributes:**
- Must have valid Massachusetts driver's license, and reliable personal vehicle for regional transportation
- Ability to attend weekly meetings in Worcester or Boston
- Ability to work remotely as needed between municipal location visits
- Strong oral and written communication skills
- Highly self-motivated and self-directed, with keen attention to detail Excellent analytical and problem solving skills
- Uses problem solving techniques such as root cause analysis to resolve issues
- Ability to work independently and on multiple projects simultaneously
- Ability to explain network and security concepts to both fellow technical staff, and to non-technical staff
- Comfortable with presenting policies and training on security best practices Strong organizational skills
- Demonstrates an interest in working hard in a fast-paced environment, enjoys challenges, and has fun while doing it
- Collaborates and assumes a technical leadership role when required
**Equal Opportunity Employer**
DIGITAL TECHNOLOGIES LLC is an equal opportunity employer inclusive of female, minority, disability and veterans, (M/F/D/V). Hiring, promotion, transfer, compensation, benefits, discipline, termination and all other employment decisions are made without regard to race, color, religion, sex, sexual orientation, gender identity, age, disability, national origin, citizenship/immigration status, veteran status or any other protected status. DIGITAL TECHNOLOGIES LLC will not make any posting or employment decision that does not comply with applicable laws relating to labor and employment, equal opportunity, employment eligibility requirements or related matters. Nor will DIGITAL TECHNOLOGIES LLC require in a posting or otherwise U.S. citizenship or lawful permanent residency in the U.S. as a condition of employment except as necessary to comply with law, regulation, executive order, or federal, state, or local government contract
Cyber Security Analyst
Remote Job
Leading with our people, Digital Consultants' mission is to deliver the highest level of professional solutions while being a trusted partner and advisor to our customers. With a culture of practicality, opportunity, and creativity we remain dedicated to being honest, trustworthy, respectful, and ethical in everything we do. We are a certified SBA 8(a) small disadvantaged business that supports multiple IT customers within the Federal, civilian, and private sectors. Digital Consultants also offers our employees growth opportunities, competitive wages, and a full benefits package. Our founding principles, Fairness and Common Sense make working here more than a job, it's the Digital family.
Digital Consultants is seeking a Cyber Security Analyst to join the team supporting NCIS in Quantico, VA!
Duties to include:
Supports all authorization package ACAS related tasks assigned to ISSEs and NQVs. The goal is to provide the required artifacts IAW the Navy Testing Guidance and Risk Management Framework (RMF) Process Guide required for the submission of an RMF Authorization package.
Performs 90 Day Baseline Scans for each Authorization package in accordance with Navy requirements; provide Detailed Vulnerability List (DVL) Reports for use in the eMASS record; provide ACAS Summary Reports in accordance with the Navy Testing Guidance.
Conducts weekly and “As Needed” ACAS scans in support of RMF STEP 3/STEP 4 processes, vulnerability assessments and queries specifically targeting authorization package assets; support continuous monitoring for authorized packages and report vulnerability status of all active Enterprise Security packages; create asset lists using provided hardware lists.
Performs risk analyses of computer systems and applications during all phases of the system development life cycle using the Assured Compliance Assessment Solution (ACAS) tool.
Initiates Enterprise Mission Assurance Support Service (eMASS) registrations, prepares, processes, updates and monitors RMF Assessment and Authorization (A&A) packages; ensures A&A packages are evaluated and maintained in a compliant status; implements and validates A&A packages to ensure security controls and vulnerabilities meet DON RMF authorization compliance requirements.
Requirements
5+ years of experience in the systems security discipline with a specific emphasis on Navy Cybersecurity practices.
Must meet or exceed OPNAVINST 5239 requirements to be certified as a Navy Qualified Validator or must be certified within six months of the start date.
Experience in the development of RMF Assessment and Authorization (A&A) Security Plans (SP), System Level Continuous Monitoring (SLCM), Ports, Protocols and Services Management (PPSM), Host Based Security Systems (HBSS), Assured Compliance Assessment Solution (ACAS) vulnerability scanning.
Experience with Enterprise Mission Assurance Support Service (eMASS) tools.
Experience preparing, processing, assessing, validating, and maintaining RMF A&A packages using eMASS and XACTA tools.
Experience with using public key-based technologies for applications.
Certification: CompTIA Security+CE
Clearance: Top Secret clearance with SCI eligibility
Preferred Skills:
Completed Navy RMF training
Formal ACAS training
Formal eMASS training
Digital Consultants, an inclusive and welcoming company, is fully committed to hiring and retaining a diverse workforce without regard to race, color, religion, sex (including pregnancy, gender identity, and sexual orientation), genetic information, national origin, age (40 or older), disability, Veterans status or any other protected characteristic.
We provide reasonable accommodations to individuals who need assistance during any part of the employment process. If you need assistance navigating Digital Consultants job openings or applying for a position, please send an email to ********************************* or call ************. Please provide your contact information and let us know how we can assist you.
Salary Description $87,500.00
Cyber security Analyst
Remote Job
* Job ID: J37899 * Job Title: Cyber security Analyst * Duration: 12 Months + Extension * Hourly Rate: Depending on Experience (DOE) * Work Authorization: US Citizen, Green Card, OPT-EAD, CPT, H-1B, H4-EAD, L2-EAD, GC-EAD * Client: To Be Discussed Later
* Employment Type:
W-2, 1099, C2C
**Primary Responsibilities:**
- Travel daily to regionally designated municipal offices to work directly with election clerks and IT resources
- Provide technical support for numerous standalone and network systems
- Monitor networks and systems for security issues using various security tools
- Perform vulnerability assessments, analyze results, and assist with the remediation as necessary
- Conduct regular audits to ensure authorized systems are operating securely and are in compliance with security policies and procedures
- Monitor access to all information systems and report on compliance with established policies and procedures.
**- Technical Qualifications:**
Education and Experience
- Bachelor's degree or higher in Information Technology or technical discipline and at least 4 years IT experience with a minimum of 2 years Cyber Security Information experience completion or working on a professional certification is a plus:
- Certified Information Systems Security Professional (CISSP)
- CISA Certified Information Systems Auditor (CISA)
- CEH Certified Ethical Hacker (CEH)
- CISM Certified Information Security Manager (CISM)
- ISSAP Information Systems Security Architecture Professional (ISSAP)
- Experience with Windows OS Windows Server, Windows Domains, Active Directory, and GPO's
- Understanding of NIST SP 800-61
- Familiarity with routers, switches, firewalls, load balancers, proxies, accelerators, and wireless technologies
- Experience in threat management and assessment as it relates to physical security
- Experience with corporate security risk assessment, analysis, and mitigating controls
**Personal Attributes:**
- Must have valid Massachusetts driver's license, and reliable personal vehicle for regional transportation
- Ability to attend weekly meetings in Worcester or Boston
- Ability to work remotely as needed between municipal location visits
- Strong oral and written communication skills
- Highly self-motivated and self-directed, with keen attention to detail Excellent analytical and problem solving skills
- Uses problem solving techniques such as root cause analysis to resolve issues
- Ability to work independently and on multiple projects simultaneously
- Ability to explain network and security concepts to both fellow technical staff, and to non-technical staff
- Comfortable with presenting policies and training on security best practices Strong organizational skills
- Demonstrates an interest in working hard in a fast-paced environment, enjoys challenges, and has fun while doing it
- Collaborates and assumes a technical leadership role when required
**Equal Opportunity Employer**
CLOUD ANALYTICS TECHNOLOGIES LLC is an equal opportunity employer inclusive of female, minority, disability and veterans, (M/F/D/V). Hiring, promotion, transfer, compensation, benefits, discipline, termination and all other employment decisions are made without regard to race, color, religion, sex, sexual orientation, gender identity, age, disability, national origin, citizenship/immigration status, veteran status or any other protected status. CLOUD ANALYTICS TECHNOLOGIES LLC will not make any posting or employment decision that does not comply with applicable laws relating to labor and employment, equal opportunity, employment eligibility requirements or related matters. Nor will CLOUD ANALYTICS TECHNOLOGIES LLC require in a posting or otherwise U.S. citizenship or lawful permanent residency in the U.S. as a condition of employment except as necessary to comply with law, regulation, executive order, or federal, state, or local government contract
**Equal Opportunity Employer**
CLOUD ANALYTICS TECHNOLOGIES LLC is an equal opportunity employer inclusive of female, minority, disability and veterans, (M/F/D/V). Hiring, promotion, transfer, compensation, benefits, discipline, termination and all other employment decisions are made without regard to race, color, religion, sex, sexual orientation, gender identity, age, disability, national origin, citizenship/immigration status, veteran status or any other protected status. CLOUD ANALYTICS TECHNOLOGIES LLC will not make any posting or employment decision that does not comply with applicable laws relating to labor and employment, equal opportunity, employment eligibility requirements or related matters. Nor will CLOUD ANALYTICS TECHNOLOGIES LLC require in a posting or otherwise U.S. citizenship or lawful permanent residency in the U.S. as a condition of employment except as necessary to comply with law, regulation, executive order, or federal, state, or local government contract
**Some of our Business Ventures - Knowledge Analytics**
Cyber security Analyst
Remote Job
* Job ID: J37899 * Job Title: Cyber security Analyst * Duration: 12 Months + Extension * Hourly Rate: Depending on Experience (DOE) * Work Authorization: US Citizen, Green Card, OPT-EAD, CPT, H-1B, H4-EAD, L2-EAD, GC-EAD * Client: To Be Discussed Later
* Employment Type:
W-2, 1099, C2C
**Primary Responsibilities:**
- Travel daily to regionally designated municipal offices to work directly with election clerks and IT resources
- Provide technical support for numerous standalone and network systems
- Monitor networks and systems for security issues using various security tools
- Perform vulnerability assessments, analyze results, and assist with the remediation as necessary
- Conduct regular audits to ensure authorized systems are operating securely and are in compliance with security policies and procedures
- Monitor access to all information systems and report on compliance with established policies and procedures.
**- Technical Qualifications:**
Education and Experience
- Bachelor's degree or higher in Information Technology or technical discipline and at least 4 years IT experience with a minimum of 2 years Cyber Security Information experience completion or working on a professional certification is a plus:
- Certified Information Systems Security Professional (CISSP)
- CISA Certified Information Systems Auditor (CISA)
- CEH Certified Ethical Hacker (CEH)
- CISM Certified Information Security Manager (CISM)
- ISSAP Information Systems Security Architecture Professional (ISSAP)
- Experience with Windows OS Windows Server, Windows Domains, Active Directory, and GPO's
- Understanding of NIST SP 800-61
- Familiarity with routers, switches, firewalls, load balancers, proxies, accelerators, and wireless technologies
- Experience in threat management and assessment as it relates to physical security
- Experience with corporate security risk assessment, analysis, and mitigating controls
**Personal Attributes:**
- Must have valid Massachusetts driver's license, and reliable personal vehicle for regional transportation
- Ability to attend weekly meetings in Worcester or Boston
- Ability to work remotely as needed between municipal location visits
- Strong oral and written communication skills
- Highly self-motivated and self-directed, with keen attention to detail Excellent analytical and problem solving skills
- Uses problem solving techniques such as root cause analysis to resolve issues
- Ability to work independently and on multiple projects simultaneously
- Ability to explain network and security concepts to both fellow technical staff, and to non-technical staff
- Comfortable with presenting policies and training on security best practices Strong organizational skills
- Demonstrates an interest in working hard in a fast-paced environment, enjoys challenges, and has fun while doing it
- Collaborates and assumes a technical leadership role when required
**Equal Opportunity Employer**
DATA SCIENCE TECHNOLOGIES LLC is an equal opportunity employer inclusive of female, minority, disability and veterans, (M/F/D/V). Hiring, promotion, transfer, compensation, benefits, discipline, termination and all other employment decisions are made without regard to race, color, religion, sex, sexual orientation, gender identity, age, disability, national origin, citizenship/immigration status, veteran status or any other protected status. DATA SCIENCE TECHNOLOGIES LLC will not make any posting or employment decision that does not comply with applicable laws relating to labor and employment, equal opportunity, employment eligibility requirements or related matters. Nor will DATA SCIENCE TECHNOLOGIES LLC require in a posting or otherwise U.S. citizenship or lawful permanent residency in the U.S. as a condition of employment except as necessary to comply with law, regulation, executive order, or federal, state, or local government contract
Cyber Security Defense Analyst - (Entry Level)
Remote Job
Description:What We're Doing: Lockheed Martin invites you to step up to one of today's most daunting challenges: the use of advanced electronics to undermine our way of life. As a cybersecurity professional at Lockheed Martin, you'll protect the networks that our citizens and the world depend upon each minute: Financial assets. Healthcare information. Critical infrastructure. Hazardous materials. The uninterrupted flow of energy that keeps modern life moving. Here, you'll work with cybersecurity experts on the forefront of threat protection and proactive prevention. In this fast-paced, real-world environment, you'll draw on all of your education and experience as well as the resources of Lockheed Martin to keep the threats at bay.
The Work:
The candidate will be a member of Network Assurance supporting a US Government customer as part of our Scott AFB, IL, Hill AFB, UT or Columbus, OH team. The candidate will perform cyber threat intelligence analysis, correlate actionable security events, perform network traffic analysis using raw packet data, net flow, IDS, IPS and custom sensor output as it pertains to the cyber security of communications networks, and participate in the coordination of resources during incident response efforts.
Enter into the cyber terrain that most people know only from headlines and sci-fi. Become part of the Cybersecurity Team at Lockheed Martin. You are meant to make a difference.
Why Join Us:
Your Health, Your Wealth, Your Life
Our flexible schedules, competitive pay and comprehensive benefits enable you to live a healthy, fulfilling life at and outside of work.
Learn more about Lockheed Martin's competitive and comprehensive benefits package.
#RMSCYTJ
#RMSC6ISR
#OneLMHotJobs
Basic Qualifications:
* Hold at least one of the DoD-8570 baseline certification IAT Level 2 (Security+, CEH, CYSA+, CISSP)
* Current active US DoD Secret clearance.
* Practical experience with cyber specific analysis
tools.
* General understanding of intrusion detection
and incident response.
* Experience networking with TCP/IP, common
networking ports and protocols, network traffic
flow.
* Willing to perform shift work.
Desired Skills:
* Hold at least two of the DoD-8570 baseline IAT Level 2 certifications (Security+, CEH, CYSA+, CISSP)
* Program will ultimately need you to have a Top Secret / SCI clearance.
* Experience with countermeasure techniques, OSI model, defense-in-depth, Cyber Kill Chain or similar attack model.
Security Clearance Statement: This position requires a government security clearance, you must be a US Citizen for consideration.
Clearance Level: Top Secret
Other Important Information You Should Know
Expression of Interest: By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills and requirements have been identified as a match. Should this match be identified you may be contacted for this and future openings.
Ability to Work Remotely: Onsite Full-time: The work associated with this position will be performed onsite at a designated Lockheed Martin facility.
Work Schedules: Lockheed Martin supports a variety of alternate work schedules that provide additional flexibility to our employees. Schedules range from standard 40 hours over a five day work week while others may be condensed. These condensed schedules provide employees with additional time away from the office and are in addition to our Paid Time off benefits.
Schedule for this Position: Rotating 40 hour week as assigned by leader
Pay Rate:
The annual base salary range for this position in California and New York (excluding most major metropolitan areas), Colorado, Hawaii, Illinois, Maryland, Minnesota, Washington or Washington DC is $62,900 - $120,400. For states not referenced above, the salary range for this position will reflect the candidate's final work location. Please note that the salary information is a general guideline only. Lockheed Martin considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/ training, key skills as well as market and business considerations when extending an offer.
Benefits offered: Medical, Dental, Vision, Life Insurance, Short-Term Disability, Long-Term Disability, 401(k) match, Flexible Spending Accounts, EAP, Education Assistance, Parental Leave, Paid time off, and Holidays.
(Washington state applicants only) Non-represented full-time employees: accrue at least 10 hours per month of Paid Time Off (PTO) to be used for incidental absences and other reasons; receive at least 90 hours for holidays. Represented full time employees accrue 6.67 hours of Vacation per month; accrue up to 52 hours of sick leave annually; receive at least 96 hours for holidays. PTO, Vacation, sick leave, and holiday hours are prorated based on start date during the calendar year.
This position is incentive plan eligible.
Lockheed Martin is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status, or disability status.
The application window will close in 90 days; applicants are encouraged to apply within 5 - 30 days of the requisition posting date in order to receive optimal consideration.
Join us at Lockheed Martin, where your mission is ours. Our customers tackle the hardest missions. Those that demand extraordinary amounts of courage, resilience and precision. They're dangerous. Critical. Sometimes they even provide an opportunity to change the world and save lives. Those are the missions we care about.
As a leading technology innovation company, Lockheed Martin's vast team works with partners around the world to bring proven performance to our customers' toughest challenges. Lockheed Martin has employees based in many states throughout the U.S., and Internationally, with business locations in many nations and territories.
Experience Level: Experienced Professional
Business Unit: RMS
Relocation Available: Possible
Career Area: Information Security/Information Assurance
Type: Task Order/IDIQ
Shift: Multiple shifts available
Cyber Security Analyst
Remote Job
PenTeleData - Engineering - Palmerton, Pennsylvania Company: PenTeleData WFH 2 Day Flex Shift: Monday-Friday, 8AM-5PM *Pencor and its subsidiaries are Equal Opportunity Employers* *Although there is a work-from-home component to this position, employee MUST reside in Pennsylvania and be able to come into the office as scheduled or needed by manager.
**Applicants must provide a portfolio of previous work related to network/server programming tasks or security related projects
PenTeleData, the industry leader in data transport, Internet, Wi-Fi, security and consultative services throughout the Northeast, is seeking a Security Analyst to assist in cybersecurity monitoring, incident response, pro-active penetration testing, and security related automation tasks.
As Security Analyst, you will be responsible for daily and routine tasks such as security log monitoring, keeping up on common vulnerabilities and exposures for network, server, and mobile hardware and applications. You will be working with other departments and partners as an audit and consultative resource regarding cybersecurity best practices.
Applicants must have real-world knowledge of firewalls, service provider level networking hardware and operating systems, common desktop operating systems such as Windows, Linux and MacOS. Knowledge of scripting languages such as Python or PowerShell are essential for succeeding in this role. Current knowledge of penetration testing tools must be demonstrated.
Excellent benefits package!
Qualifications:
* Minimum Associates Degree in Cyber Security and/or Networking
* Established residency in Pennsylvania
* Demonstrated progressive advancement over the last 5-10 years in the Cyber Security space
* Previous experience as a Pen Tester a bonus
* Knowledge of PAN-OS, Cisco IOS-XR, Microsoft Windows Server and associated software is essential
* Working knowledge (preferably daily use) of Linux operating systems
* Current knowledge of the NIST Cybersecurity Framework
* Deep, protocol level understanding of remote access tools
* Strong Communication Skills - Oral and Written
* Ability to self-manage large and complex projects
* Ability to manage several ongoing tasks
* Ability to be a team player as well as work well independently
* Ability to present to groups of people and easily convey complex topics to others for training
* Ability to provide a portfolio of previous work related to network/server programming tasks or security related projects
* Must possess a strong drive to excel in this position
* Willing and able to handle other duties as assigned
INDHP
Location
Palmerton, Pennsylvania
Minimum Experience
Experienced
Compensation
$65-85,000 Annual, based on education and experience
Cyber security Analyst
Remote Job
* Job ID: J37899 * Job Title: Cyber security Analyst * Duration: 12 Months + Extension * Hourly Rate: Depending on Experience (DOE) * Work Authorization: US Citizen, Green Card, OPT-EAD, CPT, H-1B, H4-EAD, L2-EAD, GC-EAD * Client: To Be Discussed Later
* Employment Type:
W-2, 1099, C2C
**Primary Responsibilities:**
- Travel daily to regionally designated municipal offices to work directly with election clerks and IT resources
- Provide technical support for numerous standalone and network systems
- Monitor networks and systems for security issues using various security tools
- Perform vulnerability assessments, analyze results, and assist with the remediation as necessary
- Conduct regular audits to ensure authorized systems are operating securely and are in compliance with security policies and procedures
- Monitor access to all information systems and report on compliance with established policies and procedures.
**- Technical Qualifications:**
Education and Experience
- Bachelor's degree or higher in Information Technology or technical discipline and at least 4 years IT experience with a minimum of 2 years Cyber Security Information experience completion or working on a professional certification is a plus:
- Certified Information Systems Security Professional (CISSP)
- CISA Certified Information Systems Auditor (CISA)
- CEH Certified Ethical Hacker (CEH)
- CISM Certified Information Security Manager (CISM)
- ISSAP Information Systems Security Architecture Professional (ISSAP)
- Experience with Windows OS Windows Server, Windows Domains, Active Directory, and GPO's
- Understanding of NIST SP 800-61
- Familiarity with routers, switches, firewalls, load balancers, proxies, accelerators, and wireless technologies
- Experience in threat management and assessment as it relates to physical security
- Experience with corporate security risk assessment, analysis, and mitigating controls
**Personal Attributes:**
- Must have valid Massachusetts driver's license, and reliable personal vehicle for regional transportation
- Ability to attend weekly meetings in Worcester or Boston
- Ability to work remotely as needed between municipal location visits
- Strong oral and written communication skills
- Highly self-motivated and self-directed, with keen attention to detail Excellent analytical and problem solving skills
- Uses problem solving techniques such as root cause analysis to resolve issues
- Ability to work independently and on multiple projects simultaneously
- Ability to explain network and security concepts to both fellow technical staff, and to non-technical staff
- Comfortable with presenting policies and training on security best practices Strong organizational skills
- Demonstrates an interest in working hard in a fast-paced environment, enjoys challenges, and has fun while doing it
- Collaborates and assumes a technical leadership role when required
**Equal Opportunity Employer**
AI TECHNOLOGIES LLC is an equal opportunity employer inclusive of female, minority, disability and veterans, (M/F/D/V). Hiring, promotion, transfer, compensation, benefits, discipline, termination and all other employment decisions are made without regard to race, color, religion, sex, sexual orientation, gender identity, age, disability, national origin, citizenship/immigration status, veteran status or any other protected status. AI TECHNOLOGIES LLC will not make any posting or employment decision that does not comply with applicable laws relating to labor and employment, equal opportunity, employment eligibility requirements or related matters. Nor will AI TECHNOLOGIES LLC require in a posting or otherwise U.S. citizenship or lawful permanent residency in the U.S. as a condition of employment except as necessary to comply with law, regulation, executive order, or federal, state, or local government contract
**Equal Opportunity Employer**
AI TECHNOLOGIES LLC is an equal opportunity employer inclusive of female, minority, disability and veterans, (M/F/D/V). Hiring, promotion, transfer, compensation, benefits, discipline, termination and all other employment decisions are made without regard to race, color, religion, sex, sexual orientation, gender identity, age, disability, national origin, citizenship/immigration status, veteran status or any other protected status. AI TECHNOLOGIES LLC will not make any posting or employment decision that does not comply with applicable laws relating to labor and employment, equal opportunity, employment eligibility requirements or related matters. Nor will AI TECHNOLOGIES LLC require in a posting or otherwise U.S. citizenship or lawful permanent residency in the U.S. as a condition of employment except as necessary to comply with law, regulation, executive order, or federal, state, or local government contract