Post job

Cyber Security Engineer jobs at FICO

- 529 jobs
  • Identity Security Architect - Senior Engineer

    Fico 4.9company rating

    Cyber security engineer job at FICO

    FICO (NYSE: FICO) is a leading global analytics software company, helping businesses in 100+ countries make better decisions. Join our world-class team today and fulfill your career potential! The Opportunity " As an Identity Security Architect on the Identity & Access Management (IAM) Architecture team you will help define strategy and technical implementation of IAM. You will collaborate closely with development teams, business units, and the Cybersecurity Trust organization to grow and develop IAM strategy and governance. " - Cyber Security-Senior Director What You'll Contribute Partner with the IAM architecture team to develop and grow the organization's IAM strategy and identity governance, aligning with enterprise security and business goals. Partner with IT, HR, compliance, product developers and business units to ensure and enhance seamless onboarding, access provisioning, and role-based access controls (RBAC). Partner with engineering and operations teams within the broader IAM function to ensure smooth execution of architecture solutions. Identity opportunities for automation and reporting across IDP estate to enhance and mature identity governance, identity hygiene, increase self-service options, and decrease friction for our stakeholders. Work with the team to define IAM Architecture roadmap, and goals. Define IAM policies, standards, and controls to ensure compliance with internal security policies and external regulatory requirements (e.g., PCI-DSS, ISO 27001, NIST). Develop architecture diagrams and presentations for audiences ranging from internal team to product developers to management. Stay current with emerging trends and technologies in identity governance and identity threat protection and evaluate their potential impact on the organization (e.g., emerging threats, cloud-native PAM, JIT access, SSF (Shared Signals Framework), CAEP (Continuous Access Evaluation Protocol), Zero Trust). Participate and collaborate with IAM and security tools vendors to understand new features, new products, and shape future identity security and governance tools selections. What We're Seeking Hands-on experience with cloud IAM and IDPs (Entra ID, AWS IAM, GCP IAM, Okta, Ping, Active Directory, RHIM). In-depth experience with SailPoint - Identity Security Cloud preferred. Strong knowledge of IAM processes: provisioning, de-provisioning, certifications, RBAC, ABAC, MFA, SSO, PAM. Experience with Federated Identity Management (SAML, OAuth, OpenID Connect). Experience designing solutions to effectively manage privileged access (shared credentials and personal) using PAM solutions like CyberArk or Thycotic. Strong understanding of modern authentication and authorization standards (SAML, OIDC) including when to apply them and how to perform high-level troubleshooting. Familiarity with software development practices and experience working with Rest APIs. Knowledge of Private Key Infrastructure (PKI), mTLS machine authentication, and FIDO2/WebAuthn. Knowledge of Non-Human Identity (NHI) concepts and threat detections. Knowledge of Zero Trust architecture and NIST cybersecurity frameworks. Knowledge of AI and LLMs and use cases for identity governance is a plus. Comfortable working with cross-functional teams. Excellent communication and leadership skills. Strong problem-solving and analytical skills. Ability to prioritize and manage multiple tasks and projects simultaneously. Relevant certifications are a plus (e.g., CISSP, CIDPRO, CCSP, GIAC, AWS Certified Security, Microsoft SC-100, SC-300) Our Offer to You An inclusive culture strongly reflecting our core values: Act Like an Owner, Delight Our Customers and Earn the Respect of Others. The opportunity to make an impact and develop professionally by leveraging your unique strengths and participating in valuable learning experiences. Highly competitive compensation, benefits and rewards programs that encourage you to bring your best every day and be recognized for doing so. An engaging, people-first work environment offering work/life balance, employee resource groups, and social events to promote interaction and camaraderie. The targeted base pay range for this role is: $133,000 to $209,000 with this range reflecting differences in candidate knowledge, skills and experience. #LI-RR1 #LI-remote Why Make a Move to FICO? At FICO, you can develop your career with a leading organization in one of the fastest-growing fields in technology today - Big Data analytics. You'll play a part in our commitment to help businesses use data to improve every choice they make, using advances in artificial intelligence, machine learning, optimization, and much more. FICO makes a real difference in the way businesses operate worldwide: • Credit Scoring - FICO Scores are used by 90 of the top 100 US lenders. • Fraud Detection and Security - 4 billion payment cards globally are protected by FICO fraud systems. • Lending - 3/4 of US mortgages are approved using the FICO Score. Global trends toward digital transformation have created tremendous demand for FICO's solutions, placing us among the world's top 100 software companies by revenue. We help many of the world's largest banks, insurers, retailers, telecommunications providers and other firms reach a new level of success. Our success is dependent on really talented people - just like you - who thrive on the collaboration and innovation that's nurtured by a diverse and inclusive environment. We'll provide the support you need, while ensuring you have the freedom to develop your skills and grow your career. Join FICO and help change the way business thinks! Learn more about how you can fulfil your potential at ******************** FICO promotes a culture of inclusion and seeks to attract a diverse set of candidates for each job opportunity. We are an equal employment opportunity employer and we're proud to offer employment and advancement opportunities to all candidates without regard to race, color, ancestry, religion, sex, national origin, pregnancy, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. Research has shown that women and candidates from underrepresented communities may not apply for an opportunity if they don't meet all stated qualifications. While our qualifications are clearly related to role success, each candidate's profile is unique and strengths in certain skill and/or experience areas can be equally effective. If you believe you have many, but not necessarily all, of the stated qualifications we encourage you to apply. Information submitted with your application is subject to the FICO Privacy policy at **************************************
    $133k-209k yearly Auto-Apply 24d ago
  • Acquisition Security Analyst

    Mantech 4.5company rating

    Los Angeles, CA jobs

    MANTECH seeks a motivated, career and customer-oriented Acquisition Security Analyst II to join our team in El Segundo, CA. The Acquisition Security Analyst II will assist the Government Program Manager with the development and implementation of comprehensive program protection methodologies to protect advanced technology programs throughout the system's lifecycle. Responsibilities include but are not limited to: In-depth lifecycle program analysis to identify critical program information (CPI), Critical System Resources (CSR), and their associated vulnerabilities. Assist with the identification and implementation of countermeasures. Develop and implement a risk management-based program protection plan and strategy. Provide security recommendations to the PM, GSSO, and cognizant security authorities as to the Air Force acquisition and sustainment process. Maintain a working relationship with the PM, Contracting Officer and contractor security officers to ensure a standardized and correct format/process is utilized for all DD Form 254 efforts throughout the acquisition and sustainment lifecycle, in coordination with Program Security Officers. Conduct analysis of foreign intelligence threats against programs involving customer's critical research, sensitive technologies or CPI. Prepare and produce analytical products from numerous resources, to include various databases, to ensure a real-time, tailored product is provided. Write, review, and/or edit Security Classification Guides (SCG), Exposure Contingency Plans (ECP), Managed Access Plans (MAP), Security Operating Procedures (SOPs), System Test Plans (STP) Provide technical analysis and OPSEC support to SMC or AFSPC Special programs and other associated operations, missions, and organizational elements involved in developing system requirements to associated systems RDT&E. Minimum Qualifications: Bachelor's degree in a related area; an additional 4 years of related experience might be considered for a degree. 10+ years of related experience with acquisition programs 6+ years of experience with SCI programs. Must be familiar with security policy/manuals and the appropriate ICDs/JAFANs/DOD Manuals and other guiding policy documents. Must have extensive knowledge of the DD Form 254 and how it is incorporated in the Air Force acquisition process. Willingness to travel within the scope of the Program's Area of Responsibility (AOR) (note- could be extensive, and will include both air and ground transportation) Preferred Qualifications: 4+ years of experience with SAR program acquisitions desired. Working knowledge of Microsoft Office (Word, PowerPoint, and Excel) Possess a high degree of originality, creativity, initiative requiring minimal supervision. Have the ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners. Security Clearance: Current Top Secret Clearance with SCI Eligibility Eligibility for access to Special Access Program Information Willingness to submit to a polygraph. Physical Requirements: Must be able to remain in a stationary position 50%. Needs to occasionally move about inside the office to access file cabinets, office machinery, etc. Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer. Frequently communicates with co-workers, management and customers, which may involve delivering presentations. Must be able to exchange accurate information in these situations.
    $67k-89k yearly est. 1d ago
  • Cyber Security Analyst

    Buchanan Technologies 3.8company rating

    New York, NY jobs

    Job Title: Cyber Security Risk Analyst. Job Type: Contract. IS NOT OPEN TO AGENCIES. The Cyber Security Risk Analyst supports enterprise governance, risk, and compliance (GRC) initiatives by strengthening cyber risk management practices, enhancing third-party risk oversight, and contributing to cybersecurity governance across a complex organizational environment. This role works closely with cybersecurity leadership, internal stakeholders, and partner teams to mature risk assessment processes and ensure consistent, well-documented risk management activities. Key Responsibilities Design, develop, and enhance cybersecurity risk management processes and supporting frameworks Support enterprise cyber risk governance, including risk identification, evaluation, and remediation tracking Perform cybersecurity risk assessments in collaboration with business and IT stakeholders Evaluate and manage third-party and vendor cybersecurity risk throughout the vendor lifecycle Contribute to the development and maintenance of a third-party risk register Review and analyze cybersecurity risk cases, exceptions, and justifications Document risks, mitigations, and remediation actions within a centralized risk register Assist in developing risk assessment procedures, methodologies, and testing approaches aligned with industry frameworks Collaborate with cross-functional teams and subject matter experts to gather risk intelligence Support remediation efforts by helping initiate corrective actions where vulnerabilities or weaknesses are identified Participate in special cybersecurity initiatives and projects as assigned Required Qualifications Minimum of 4 years of experience in one or more of the following areas: Cybersecurity risk management Cybersecurity risk assessment Third-party or vendor risk management within a cybersecurity function Strong understanding of GRC concepts and the cyber risk lifecycle Experience working in large, complex, multi-stakeholder environments Strong analytical, investigative, and documentation skills Excellent written and verbal communication skills Preferred Qualifications Bachelor's degree in Cybersecurity, Risk Management, Information Systems, Computer Science, or a related field Familiarity with one or more cybersecurity frameworks or standards, including: NIST ISO/IEC 27001 / 27002 CIS SANS PCI Relevant certifications are a plus, including but not limited to: CISSP, CISM, CRISC, CISA CompTIA Security+, CySA+, Network+ GIAC certifications Knowledge of cybersecurity laws, regulations, and data privacy principles Ability to work independently in a self-directed and organized manner About Buchanan Technologies Since Buchanan's inception over 30 years ago, we have operated on 5 core values - People Matter, Customers Matter, Principles Matter, Community Matters, and Every Interaction Matters. These values are represented across each facet of the company, from employee relations to client service delivery to corporate social responsibility initiatives and beyond. Why Work at Buchanan? At Buchanan Technologies, we offer a great employment experience with a fun but professional work environment, competitive salary, and various employee career advancement programs that add value to your skills and daily life. If you are excited about being part of an energetic team where your contributions are appreciated and hard work is recognized, Buchanan is the place for you. Things We Are Passionate About We are passionate about providing top-tier technology services to our customers and clients and fostering a culture of continuous learning for our employees. We are a people- centric company, focused on growth and diversity for our workforce. Come join us and let's build something amazing together. Follow Us: LinkedIn: ******************************************************* Website: **************** Buchanan Technologies provides equal employment opportunities (EEO) to all employees and applicants for employment without regard to race, color, religion, sex, national origin, age, disability, protected veteran status, or genetics. In addition to federal law requirements, Buchanan Technologies complies with applicable state and local laws governing nondiscrimination in employment in every location in which the company has facilities. This policy applies to all terms and conditions of employment, including recruiting, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation, and training.
    $91k-123k yearly est. 1d ago
  • Senior Security Architect

    Technogen, Inc. 4.3company rating

    Orange, CA jobs

    Security, Compliance and Audit Readiness: Enforce network security controls aligned with Criminal Justice Information Services (“CJIS”), National Institute of Standards and Technology (“NIST”), and department policy. Implement and maintain firewall rulesets, Network Access Control (“NAC”) solutions (e.g., Cisco Identity Service Engine (“ISE”)), and endpoint access policies. Support the cybersecurity team in incident detection, forensic analysis, and mitigation strategies. Provide documentation and evidence for security audits and compliance reviews. Implementation, Operations and Support: Serve as the hands-on engineer for network deployment, upgrades, and incident response. Configure and manage Cisco switches, routers, firewalls, WLCs, and wireless endpoints. Design and manage VPNs, QoS, ACLs, network monitoring, and logging systems (SolarWinds, NetFlow, SNMP). SME Leadership and Staff Development: Serve as the department's SME on enterprise security, guiding decisions across IT, public safety systems, and operations. Train, coach, and mentor internal IT staff, including junior and mid-level network technicians. Lead structured knowledge transfer sessions, hands-on training, and real-time coaching during support and implementation activities. Create SOPs, how-to guides, and step-by-step documentation tailored for ongoing use by internal staff. Support staff in preparation for certification paths (e.g., CCNA/CCNP) if desired. Any other activities reasonably related to the foregoing, as assigned by the Client
    $127k-167k yearly est. 1d ago
  • Staff Blockchain Security Engineer

    Blizzard Entertainment 4.6company rating

    Irvine, CA jobs

    About the Company: Blizzard Entertainment, a global leader in interactive entertainment, has been shaping the world of video games since its founding. Renowned for iconic franchises like World of Warcraft , Overwatch , and Diablo , Blizzard is dedicated to creating immersive, innovative, and high-quality gaming experiences that captivate millions of players worldwide. Our mission is to inspire and connect players through engaging gameplay, compelling storytelling, and vibrant online communities. As we continue to expand our reach in the gaming industry, we remain committed to pushing the boundaries of creativity, technology, and entertainment. The Role: Staff Blockchain Security Engineer Blizzard's Application Security (AppSec) team is entrusted with safeguarding the company and its players from software vulnerabilities and security threats. As a Staff Blockchain Security Engineer within AppSec, you will specialize in securing blockchain-based game features, in-game economies, and Web3 integrations. You'll collaborate closely with game development and engineering teams to provide guidance, perform security assessments, and implement best practices throughout the blockchain software lifecycle. This role requires in-person collaboration two days per week at our Irvine, California headquarters. Key Responsibilities: Conduct comprehensive security reviews of blockchain integrations, smart contracts, in-game economy systems, and Web3 features for vulnerabilities and architectural flaws Advise game development teams on secure blockchain practices and remediation strategies Establish and maintain secure development processes within the blockchain software lifecycle Develop, maintain, and improve blockchain-specific security tooling (e.g., fuzzers, static analysis frameworks) Collaborate with legal, compliance, and risk teams to evaluate security, operational, and regulatory risks of blockchain implementations Minimum Qualifications: 8+ years in application security, Web3 security, or related disciplines Proven experience auditing smart contracts, blockchain protocols, or Web3 applications Expertise in design reviews, threat modeling, secure code review, or penetration testing with a hacker mindset Strong knowledge of application security principles and common vulnerabilities (e.g., SSRF, race conditions, privilege escalation) Experience with secure key management, wallet systems, or cryptography Familiarity with blockchain security tools such as Slither, Echidna, or similar Scripting or programming experience in Python, C++, JavaScript, or other relevant languages Ability to balance business goals with security priorities and communicate risks clearly to cross-functional teams Preferred Qualifications: Experience in formal verification of smart contracts Background in blockchain-enabled gaming, DeFi platforms, or NFT ecosystems Contributions to blockchain security communities, bug bounty programs, or published research Experience defining and executing long-term blockchain security strategies alongside engineering leadership Why Blizzard? Competitive base salary and discretionary annual bonus Equity opportunities and long-term incentives Comprehensive health, dental, and vision plans 401(k) with company match Paid parental leave and flexible time off A hybrid work model that balances collaboration with flexibility Salary Range: $170,000 - $250,000. This excludes discretionary bonuses or equity grants, which are determined based on experience, skills, and market standards. Blizzard Entertainment is committed to building diverse teams that reflect the communities we serve. We are an equal opportunity employer and do not discriminate based on race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or veteran status. If you require accommodation, please reach out to our People Team.
    $170k-250k yearly 5d ago
  • Senior Backend Engineer - Cloud Security

    Droisys 4.3company rating

    Sunnyvale, CA jobs

    About Company, Droisys is an innovation technology company focused on helping companies accelerate their digital initiatives from strategy and planning through execution. We leverage deep technical expertise, Agile methodologies, and data-driven intelligence to modernize systems of engagement and simplify human/tech interaction. Amazing things happen when we work in environments where everyone feels a true sense of belonging and when candidates have the requisite skills and opportunities to succeed. At Droisys, we invest in our talent and support career growth, and we are always on the lookout for amazing talent who can contribute to our growth by delivering top results for our clients. Join us to challenge yourself and accomplish work that matters. We're hiring Senior Backend Engineer - Cloud Security in Sunnyvale, CA What You Will Do Build containerized microservices and related components for a multi-tenant, distributed system that ingests and processes real-time cloud events, system telemetry, and network data across major cloud platforms. Your work will enable customers to detect risks and strengthen their cloud security posture. Mentor junior engineers, interns, and new graduates, helping them develop strong technical skills and become effective contributors. Write production-quality software primarily in Java using Spring Boot, and work extensively with Kafka, SQL, and other data interfaces. Work within a Kubernetes-based service infrastructure, while learning new technologies as needed. Take ownership of major features and subsystems through the entire development lifecycle-requirements, design, implementation, deployment, and customer adoption. Participate in operational responsibilities, gaining firsthand experience with real-world performance, reliability, and support scenarios-informing how you design and build better systems. Prioritize quality at every stage, performing thorough developer testing, functional validation, integration checks, and performance testing to ensure highly resilient systems. Collaborate closely with Product Management to review, refine, and finalize requirements. Develop a deep understanding of customer needs by engaging with peers, stakeholders, and real-world use cases. What You Bring Bachelor's degree in computer science or similar (Master's preferred). 5+ years of experience building scalable, distributed systems. Passion for software engineering, continuous learning, and working in a collaborative environment. Hands-on experience with AWS, Azure, or GCP, with strong familiarity at the API/programming level. Experience with networking and/or security concepts is a plus. Experience developing containerized services on Kubernetes is strongly desired. Strong programming experience in Java/Spring Boot or Golang. Experience building or using REST APIs. Knowledge of infrastructure-as-code tools such as CloudFormation, Terraform, or Ansible is a plus. Understanding of TCP/IP networking fundamentals. Experience developing in Unix/Linux environments. Droisys is an equal opportunity employer. We do not discriminate based on race, religion, color, national origin, gender, gender expression, sexual orientation, age, marital status, veteran status, disability status or any other characteristic protected by law. Droisys believes in diversity, inclusion, and belonging, and we are committed to fostering a diverse work environment
    $119k-160k yearly est. 5d ago
  • Security Architect

    Technogen, Inc. 4.3company rating

    Santa Ana, CA jobs

    1. Security, Compliance and Audit Readiness a. Enforce network security controls aligned with Criminal Justice Information Services (“CJIS”), National Institute of Standards and Technology (“NIST”), and department policy. b. Implement and maintain firewall rulesets, Network Access Control (“NAC”) solutions (e.g., Cisco Identity Service Engine (“ISE”)), and endpoint access policies. c. Support the cybersecurity team in incident detection, forensic analysis, and mitigation strategies. d. Provide documentation and evidence for security audits and compliance reviews. 2. Implementation, Operations and Support a. Serve as the hands-on engineer for network deployment, upgrades, and incident response. b. Configure and manage Cisco switches, routers, firewalls, WLCs, and wireless endpoints. c. Design and manage VPNs, QoS, ACLs, network monitoring, and logging systems (SolarWinds, NetFlow, SNMP). 3. SME Leadership and Staff Development a. Serve as the department's SME on enterprise security, guiding decisions across IT, public safety systems, and operations. b. Train, coach, and mentor internal IT staff, including junior and mid-level network technicians. c. Lead structured knowledge transfer sessions, hands-on training, and real-time coaching during support and implementation activities. d. Create SOPs, how-to guides, and step-by-step documentation tailored for ongoing use by internal staff. e. Support staff in preparation for certification paths (e.g., CCNA/CCNP) if desired. 4. Any other activities reasonably related to the foregoing, as assigned by OCSD.
    $120k-170k yearly est. 2d ago
  • Infrastructure & Information Security Architect

    Sigma 4.1company rating

    Industry, CA jobs

    We don't just offer jobs; we cultivate careers. Become part of our dynamic team of professionals and experience what it means to truly be valued. We're passionate about empowering our associates to reach their full potential, fostering growth, and celebrating success together. When you join Sigma, you're stepping into a fast-growing, innovative global food organization that's redefining excellence in the industry. Are you ready to elevate your career? Come join our table! Position Summary Responsible for designing, implementing, supporting and administering the IT infrastructure and information security applications. Analyzes system requirements and defines system architecture that will meet business needs, including server infrastructure, capacity planning, storage requirements and networking protocols. Essential Job Functions Responsible for designing and implementing information systems that will adequately support the infrastructure of the organization. Examines system requirements and system architecture and provides new processes/standards that will meet business needs, including server infrastructure, capacity planning, storage requirements, and networking protocols. Ensures that architecture project roll-outs meet security standards and are effectively integrated with current applications. Completes tasks designed to ensure security of the organization's systems and information assets. Protects against unauthorized access, modification, or destruction and develops IT security policies and standards. Authorize user access and familiar with domain structures and digital signatures. Oversees and guides the work of lower-level IT personnel or other IT teams. Develops, implements and maintains policies, procedures, and programs for ensuring the security and integrity of company data, databases, information systems, and technology. Conducts risk management analysis and creates business continuity, contingency, and disaster recovery plans. Leads the development, update, and execution of Business Continuity Plans for systems and data within Enterprise Data. Develops and executes the testing processes utilized to validate the disaster recovery plans and to identify weaknesses and failure points in the plans. Works on advanced, complex technical projects or business issues. Other duties as assigned. Minimum Qualifications Associate degree in Computer Science, Computer Engineering, Technology, Information Systems or equivalent work experience. Eight years of infrastructure or security architecture. Experience in enterprise and security architecture. Experience on day to day IT operation management. Experience on Data Center environments. License/Certifications: N/A Preferred Qualifications Formal training ITIL, COBIT, or Microsoft certification. Project Management certification. Knowledge, Skills & Abilities (KSA's) Knowledge on consolidation of Active Directory environments on a medium to large company. Strong technical knowledge across infrastructure and security services support. Working understanding of Active Directory structure (e.g. GPOs). Working understanding of Agile and RACU Frameworks. Understand industry threats and the methods to apply appropriate controls. Knowledge of PowerShell and other automation methods. Understanding of server hardening. Proficient with Microsoft Office, including skills with Outlook, Word and Excel. Ability to lead and effectively communicate with technical and non-technical staff across multiple disciplines and levels of the organization. Ability to identify complex problems, review information to develop and evaluate options then implement solutions. Environmental/Working Conditions N/A Physical Requirements Usual office environment with frequent sitting, walking, and standing, and occasional climbing, stooping, kneeling, crouching, crawling, and balancing. Frequent use of eye, hand, and finger coordination enabling the use of office machinery. Oral and auditory capacity enabling interpersonal communication as well as communication through automated devices such as the telephone.
    $122k-167k yearly est. 3d ago
  • Security Architect GCP

    Xoriant 4.4company rating

    Sunnyvale, CA jobs

    Security Architect / Implementation Engineer Duration: 6 Months contract with possibility of extension We are seeking a highly skilled Security Architect / Security Implementation Engineer with expertise in designing, implementing, and integrating Google Cloud Security Command Center (SCC), Chronicle SIEM, and Cybereason XDR. The candidate will be responsible for architecting the end-to-end solution, implementing GCP native security controls, integrating third-party security tools, and producing detailed design and operational documentation. Key Responsibilities: Design and architect cloud-native security controls in GCP aligned with security and compliance frameworks (CIS, ISO 27001, NIST, etc.). Implement Google Security Command Center (SCC) for threat detection, vulnerability management, and risk insights. Architect and configure Chronicle SIEM for log ingestion, correlation, and advanced threat analytics. Integrate Cybereason XDR with SCC, Chronicle, and other security tools to establish end-to-end threat detection and response workflows. Define use cases, rules, policies, and security playbooks to automate detection and response. Document the solution architecture, design decisions, configuration standards, and integration workflows. Conduct knowledge transfer sessions with security operations and support teams. Collaborate with GCP Cloud Platform teams, SOC teams, and compliance teams to align solutions with enterprise policies. Required Skills & Experience: 8-12 years of overall IT security experience with at least 4-5 years in Google Cloud Security. Proven experience with Google Security Command Center (SCC), Chronicle SIEM, and XDR platforms (Cybereason preferred). Strong knowledge of GCP IAM, VPC Service Controls, Cloud Armor, DLP, Cloud Logging, Cloud Monitoring. Hands-on experience in integrating SIEM, XDR, and native GCP security tools. Experience with Terraform, Deployment Manager, or automation frameworks for security deployment. Strong documentation and presentation skills. Security certifications preferred: Google Professional Cloud Security Engineer, GCP Professional Architect, CISSP, CISM, CCSP.
    $115k-157k yearly est. 1d ago
  • Cyber Security Analyst II (Remote)

    Hostway 4.6company rating

    Remote

    is remote and can be performed from anywhere in the United States. Cyber security analysts are responsible for managing, monitoring, troubleshooting and protecting both the security of our internal environment and that of our customers. They will perform any steps necessary to that end. They will design, implement, monitor, and evaluate the security systems that protect an organization's computer systems and data. As a Cyber Security Analyst, you will monitor the computer networks under management for security issues, install security software, and document any security issues you identify. This role also acts as the first point of contact for customer related security incidents and questions. KEY RESPONSIBILITIES: Act as the primary point of escalation for Cyber Security Analyst I technicians Provides coaching to Cyber Security Analyst I employees on how to perform their duties Create complex detection/correlation rules utilizing our SIEM and other security infrastructure to enhance detection ratios and monitor for emerging threats Create, distribute and perform training for the Cyber Security Analyst I technicians on techniques and capabilities to improve the team's responsiveness and effectiveness as a whole Performs all of the following functions of a Cyber Security Analyst I, with proficiency Monitor computer networks for security issues and respond accordingly, including: Creating/Managing firewall rules Managing anti-virus endpoint tools Performing event correlation analysis on potential threats identified through our SIEM Configuring/Managing log management Configuring/Managing file integrity monitoring Performing vulnerability scans and remediation of identified risks The methodology & analysis of identifying compromised servers Performing rule tuning in our SIEM for improved detection capabilities Interact with customers by phone, chat, or trouble ticket on any customer facing security issues Investigate, document and assess security breaches and other cyber security incidents Install security measures and operate software to protect systems and information infrastructure, including firewalls and data encryption programs Prepare security reports for customer business insights reviews to support our guidance level agreements initiatives Identify and fix detected vulnerabilities to maintain a high-security standard Work with other technology teams and customers to perform tests and uncover network or other vulnerabilities May be relied upon as a technical point of contact during Escalated Events relating to security Review, investigate and respond to any external “abuse” complaints coming from our IP space Develop best practices for IT security Research security enhancements and make recommendations to management Handle escalated internal or customer security issues from support or another operations team Takes part in any security-oriented projects or critical initiatives Stay up to date on information technology & security news, trends and standards Deliver an exceptional customer experience every day Other duties as identified or assigned DESIRED ROLE OUTCOMES: Keep us and our customers free from security incidents but respond capably when one occurs Our detection of security threats is continually improving Provide valuable insights and visibility around security incidents to our customers Have a staff of customer focused, energetic and security savvy team members REQUIRED SKILLS: A minimum of 2 years' experience in a security analyst role Bachelor's degree in Computer Science or related field or equivalent experience. Additional certifications in security related disciplines (e.g.: Security+, CEH, CISSP, etc.) are preferred Must have experience in a Security Operations Center (SOC) Must have technical troubleshooting and problem-solving skills Understanding of network management principles Experience in systems administration of Windows and Linux based operating systems Working knowledge of Palo Alto or Fortinet firewalls, Microsoft Azure, Microsoft Sentinel SIEM solution or similar technologies Understanding of firewalls, proxies, SIEM, antivirus, penetration testing, vulnerability scans and IDS/IPS concepts Ability to identify and mitigate network vulnerabilities and explain how to avoid them Understanding of patch management with the ability to deploy patches in a timely manner while understanding business impact Ability to learn and communicate technical information to non-technical people Must have excellent written & oral communication skills, and strong interpersonal skills Must emulate the Ntirety Values in all that they do Ntirety is an Equal Employment Opportunity / Affirmative Action Employer (EEO/AA). Ntirety offers a competitive salary and benefits including unlimited Paid Time Off, FREE Medical to Employees, Dental, retirement plan with 401(k) match, and much more. If you are interested in joining a profitable, growing, and dynamic company, we want to hear from you! Ntirety is an Equal Opportunity Employer and does not discriminate on the basis of race, color, religion, sex, age, national origin, disability, veteran status, sexual orientation, or any other classification protected by Federal, State or local law. Ntirety thanks all candidates for their interest; however, only shortlisted candidates will be contacted.
    $79k-102k yearly est. Auto-Apply 60d+ ago
  • Cyber Security Analyst (locals only)

    Infojini 3.7company rating

    Syracuse, NY jobs

    Infojini Consulting is a full service IT consulting, services, and staffing firm with offices in Secaucus, NJ. Infojini Consulting is recognized as one of the fastest growing IT services and software development Companies. With a partnership of all major technology vendors, Infojini Consulting has built a strong Government and commercial customer base including fortune 100 companies and most state and federal agencies such as State of North Carolina, State of South Carolina, State of Maryland, State of California, State of Pennsylvania, State of Virginia, State of Washington and many others. Infojini Consulting is an equal opportunity employer and considers all qualified individuals for employment irrespective of their race, gender, age, color, sexual orientation. We offer an excellent compensation package Job Description We are looking for Cyber Security Analyst in Syracuse, NY for Fulltime position. Please refer someone else if you are not available at this time or you are not right match for this job opportunity. We have great Referral Bonus up to $2500!!! Please don't miss to refer someone who are looking for projects. Job details mentioned below- Title: Cyber Security Analyst Location: Syracuse, NY 13210 Duration: Fulltime Client: Direct Client Required Skills: • Plan, implement and upgrade security solution and controls • Establish Protocol and solutions to protect systems against unauthorized access and/or destruction • Establish security requirements for networks and devices • Perform network vulnerability testing, risk analysis and security assessments • Manage select security solutions including instruction prevention, Penetration Testing and other tools as necessary. • Monitor network traffic for unusual activity. • Analyse security events and breaches to determine root causes. Work with outside vendors to identify and resolve security events • Bachelor's Degree and minimum of 2 yrs. of experience in cyber security role or equivalent combination of education and experience required. Desired Skills: Certified Information Systems Security professional (CISSP) and/or experience with Information security in hardware and software technologies such as IPS/IDS, network scanner, Firewalls, SSL, TCP/IP, DNS and web security architecture preferred. Additional Information All your information will be kept confidential according to EEO guidelines.
    $77k-99k yearly est. 60d+ ago
  • Cyber Security Analyst (SOC)

    Clark Creative Solutions 4.1company rating

    San Diego, CA jobs

    Job DescriptionThe Cyber Analyst team member is responsible for the analysis of all technology devices which may include Operational Technology (OT) and Industrial Control Systems (ICS) as well as on-premises and cloud enterprise networks. This includes analysis of device communication, forensic analysis of Windows or Linux systems and servers, timeline analysis of activity on these endpoints, user permission and authentication audits, log analysis, and malware identification/triage. An ideal candidate for this position will be a proactive self-starter who has experience with system administration, Windows and Linux operating systems (OS) mechanics including filesystem structures, disk and memory forensics, cyber aware Operational Technology or Control Systems operators, commonly used mechanisms for maintaining security persistence, privilege escalation, and lateral data movement, operating system log analysis, and triaging suspicious file artifacts for unusual behavior. This role requires a familiarity with what routine OS activities and common software/user behavior looks like in the context of forensic artifacts or timelines. Analysts should also be familiar with common categories and formats of host-based indicators of compromise (IOCs) and how/where they can be leveraged to identify known-bad files/activity on an endpoint. Candidate will utilize the Cyber Kill Chain and synthesize the entire attack life cycle along with creating detailed reports on how impacts may or have occurred. Responsibilities Support SOC team in operating and performing duties in a Security Operations Center (SOC) to provide a secure environment that facilitates monitoring, incident response, malware analysis, and threat hunting activities. Develop and utilize analytics on the security information and event management (SIEM) platform to monitor for security alerts and coordinate vulnerability assessments and artifact collection across servers and network devices. Asses Security Technical Implementation Guides (STIGs) compliance and completion. Utilize asset mapping tools to verify connected inventory. Handle Information Assurance Vulnerability Management (IVAM) notifications. Evaluate network structures and device configurations for security risks, offering recommendations based on best practices, and gather data to identify and respond to network intrusions. Analyze network traffic and system logs to identify malicious activities, vulnerabilities exploited, and methods used, and develop processes to enhance SOC response and efficiency. Conduct comprehensive technical analyses of computer evidence, research and integrate new security tools into the SOC, and synthesize findings into reports for both technical and non- technical audiences. Qualifications (Journeyman level) At least 3 years, (Junior level) applicable 1 to 2 years of experience in security operations, demonstrating analytical duties and preforming host or network security analysis. Proficient in analyzing cyber-attacks, with a deep understanding of attack classifications, stages, system/application vulnerabilities, and compliance with Department of Defense (DoD) policies and procedures. Applied knowledge of network topologies, protocols (e.g., TCP/IP, ICMP, HTTP/S, DNS, SSH, SMTP, SMB), and experience with tools like Palo Alto, Elastic SIEM, Cribl, Splunk, VMware, Security Center. Capable of attack reconstruction based on network traffic, integrating Threat Intelligence, and familiar with MITRE ATT&CK framework, with the ability to collaborate effectively across multiple locations. Desired Skill sets Knowledge of Operational Technology (OT) or Industrial Control Systems (ICS) Strong analytical and troubleshooting skills Able to provide expert content development in Splunk Enterprise Security using tstats and data models Understands how to utilize knowledge of latest threats and attack vectors to develop correlation rules for continuous monitoring on various security appliances Experience in other tools and protocols as applicable such as Nessus, Endgame, CrowdStrike, Gray Noise, Shodan, Bacnet, MODBus, SCADA systems, and PCAP Review logs to determine if relevant data is present to accelerate against data models to work with existing use cases Familiar with the operations and functions of Nessus or security center management Can assist and provide technical input to research, discover, implement hardware and software Understands importance and fundamentals of logistics and evidence handling Certified Ethical Hacker (CEH), GIAC Certified Incident Handler (GCIH), or relevant IT technology certification Examples of other certifications include: o Offensive Security Certified Professional (OSCP) o GIAC Response and Industrial Defense (GRID) o CERT Certified Computer Security Incident Handler o ECC CEH (Electronic Commerce Council Certified Ethical Hacker) o GCIH (GIAC Certified Incident Handler) o GISF (GIAC Information Security Fundamentals) o CISSP (Certified Information System Security Professional) Additional certifications at an equivalent may also be considered. Powered by JazzHR qPd0DTcQVL
    $81k-113k yearly est. 20d ago
  • Cyber Security Analyst (SOC)

    Clark Creative Solutions 4.1company rating

    San Diego, CA jobs

    The Cyber Analyst team member is responsible for the analysis of all technology devices which may include Operational Technology (OT) and Industrial Control Systems (ICS) as well as on-premises and cloud enterprise networks. This includes analysis of device communication, forensic analysis of Windows or Linux systems and servers, timeline analysis of activity on these endpoints, user permission and authentication audits, log analysis, and malware identification/triage. An ideal candidate for this position will be a proactive self-starter who has experience with system administration, Windows and Linux operating systems (OS) mechanics including filesystem structures, disk and memory forensics, cyber aware Operational Technology or Control Systems operators, commonly used mechanisms for maintaining security persistence, privilege escalation, and lateral data movement, operating system log analysis, and triaging suspicious file artifacts for unusual behavior. This role requires a familiarity with what routine OS activities and common software/user behavior looks like in the context of forensic artifacts or timelines. Analysts should also be familiar with common categories and formats of host-based indicators of compromise (IOCs) and how/where they can be leveraged to identify known-bad files/activity on an endpoint. Candidate will utilize the Cyber Kill Chain and synthesize the entire attack life cycle along with creating detailed reports on how impacts may or have occurred. Responsibilities Support SOC team in operating and performing duties in a Security Operations Center (SOC) to provide a secure environment that facilitates monitoring, incident response, malware analysis, and threat hunting activities. Develop and utilize analytics on the security information and event management (SIEM) platform to monitor for security alerts and coordinate vulnerability assessments and artifact collection across servers and network devices. Asses Security Technical Implementation Guides (STIGs) compliance and completion. Utilize asset mapping tools to verify connected inventory. Handle Information Assurance Vulnerability Management (IVAM) notifications. Evaluate network structures and device configurations for security risks, offering recommendations based on best practices, and gather data to identify and respond to network intrusions. Analyze network traffic and system logs to identify malicious activities, vulnerabilities exploited, and methods used, and develop processes to enhance SOC response and efficiency. Conduct comprehensive technical analyses of computer evidence, research and integrate new security tools into the SOC, and synthesize findings into reports for both technical and non- technical audiences. Qualifications (Journeyman level) At least 3 years, (Junior level) applicable 1 to 2 years of experience in security operations, demonstrating analytical duties and preforming host or network security analysis. Proficient in analyzing cyber-attacks, with a deep understanding of attack classifications, stages, system/application vulnerabilities, and compliance with Department of Defense (DoD) policies and procedures. Applied knowledge of network topologies, protocols (e.g., TCP/IP, ICMP, HTTP/S, DNS, SSH, SMTP, SMB), and experience with tools like Palo Alto, Elastic SIEM, Cribl, Splunk, VMware, Security Center. Capable of attack reconstruction based on network traffic, integrating Threat Intelligence, and familiar with MITRE ATT&CK framework, with the ability to collaborate effectively across multiple locations. Desired Skill sets Knowledge of Operational Technology (OT) or Industrial Control Systems (ICS) Strong analytical and troubleshooting skills Able to provide expert content development in Splunk Enterprise Security using tstats and data models Understands how to utilize knowledge of latest threats and attack vectors to develop correlation rules for continuous monitoring on various security appliances Experience in other tools and protocols as applicable such as Nessus, Endgame, CrowdStrike, Gray Noise, Shodan, Bacnet, MODBus, SCADA systems, and PCAP Review logs to determine if relevant data is present to accelerate against data models to work with existing use cases Familiar with the operations and functions of Nessus or security center management Can assist and provide technical input to research, discover, implement hardware and software Understands importance and fundamentals of logistics and evidence handling Certified Ethical Hacker (CEH), GIAC Certified Incident Handler (GCIH), or relevant IT technology certification Examples of other certifications include: o Offensive Security Certified Professional (OSCP) o GIAC Response and Industrial Defense (GRID) o CERT Certified Computer Security Incident Handler o ECC CEH (Electronic Commerce Council Certified Ethical Hacker) o GCIH (GIAC Certified Incident Handler) o GISF (GIAC Information Security Fundamentals) o CISSP (Certified Information System Security Professional) Additional certifications at an equivalent may also be considered.
    $81k-113k yearly est. Auto-Apply 60d+ ago
  • Cyber Security Engineer

    Millennium Space Systems 3.6company rating

    El Segundo, CA jobs

    Millennium Space Systems, A Boeing Company delivers affordable, high-performance space systems for exacting customers. At Millennium, you will be part of a close-knit team working on exciting technological problems. We work in an open environment where ideas are shared across all disciplines, and there are ample opportunities for advancement based on excellence. Superstars are welcome. At Millennium, we innovate and collaborate to make the world a better place. From the seabed to outer space, you can contribute to work that matters with a company committed to fostering an environment for every teammate that's welcoming, respectful and innovative, with great opportunities for professional growth. Find your future with us. Job Summary As a Cyber Security Engineer, you'll collaborate with IT, Information Security, Software Engineers, and our DevOps department to ensure our hardware, software, and overall information systems are secured in the most efficient manner. You'll work to develop new systems, strategies, and procedures to counteract threat vectors that arise within our corporate environment. The ideal candidate will be a meticulous problem solver who has the ability to work under pressure when required and will remain current on latest attack trends and technologies. This position's internal job code is Security Design Specialist. Our team is currently hiring for levels 2-3. Responsibilities Serve as cybersecurity subject matter expert within our corporate environment Deliver complex technical solutions for planning and development, as well as implementation and support tasks that include failover techniques and recovery Design, implement, and troubleshoot security information and event management (SIEM) architecture Create, modify, and upgrade SIEM alerts, dashboards, macros, tags, and field alias Develop log ingestion and aggregation strategies Implement Disaster Recovery Plans, Standard Operating Procedures, etc. Familiarity with Public Key Infrastructure (PKI) and other authentication / encryption frameworks Create, modify, and upgrade vulnerability scanner scans/reports/dashboards Provide technical expertise in executing risk management activities such as disaster recovery, continuity of operations, and incident response Provide administrative support for security policy development and maintenance in a hybrid cloud environment Collaborate with IT TO develop innovative cloud security concepts and implementations to ensure proper protection of the organization's assets Minimum Qualifications Must have an active DoD 8570/8140 IAM security certification such as Security+, CAP, CASP, CISM, CISSP, etc. Demonstrated experience with Windows, Linux, and Mac operating systems Knowledge of operations with SIEM and log aggregation concepts, vulnerability scanning, antivirus and DLP notions, IDS/IPS, Nmap, Wireshark and other similar applications Experience configuring and using vulnerability scanners Understanding of core networking concepts and how to secure networking devices Minimum of 3 years of IT or Information Security experience Strong understanding of at least one of the following programming languages (Bash, PowerShell, Python) Demonstrated working knowledge of the Risk Management Framework as provided by NIST Special Publication (SP) 800-171, and familiarity with CMMC framework Ability to communicate complex technological solutions to peers and leadership teams. Knowledge of cloud security concepts This position requires an active U.S. Security Clearance (U.S. Citizenship Required). (A U.S. Security Clearance that has been active in the past 24 months is considered active) Preferred Qualifications Bachelors or Associates degree in IT, Information Security, Cyber security, Computer Science, Computer Engineering, or a related field Certifications in networking, Linux, Windows, and/or other prevalent certifications Familiarity with Computer Incident Response Team (CIRT) activities, including computer forensic analysis Summary Pay-Range Please note that the salary information shown below is a general guideline only of what is reasonably expected to be paid for the position. Salaries are based upon candidate experience and qualifications, as well as market and business considerations. Level 2: $42.09 - $61.89 Level 3: $105,400 - $155,000 Before applying, please note: Millennium is DDTC-registered, ITAR-compliant Company. This position is located at a facility that requires special access. Applicants MUST be U.S. citizens and eligible for a security clearance. Additionally, applicants must be willing to apply for and maintain a security clearance. We encourage all interested candidates to apply for any open position for which they feel they are qualified. Applicant Privacy Policy Mandatory Security Clearance and Access Process Disqualifying Criteria
    $105.4k-155k yearly Auto-Apply 9d ago
  • Senior Security Operations Engineer (Azure)

    Jamf 3.8company rating

    Remote

    At Jamf, we believe in an open, flexible culture based on respect and trust. Our track record and thriving work environment all stem from the freedom we grant ourselves to get the job done right. We take pride in helping tens of thousands of customers around the globe succeed with Apple. The secret to our success lies in our connectivity, while operating with a high degree of flexibility. Work-life balance remains our priority while feeling connected is important to maintain our strong culture, achieve our goals, and thrive as #OneJamf. What you'll do at Jamf: The Senior Security Operations Engineer will work with the Cloud and Delivery team to continue to build, automate and maintain cloud security services in Azure. They will be responsible for leading the Security Design and Architecture, Log Collection, Security Incident Management, Identity and Access Management, Vulnerability and Patch management. They will be responsible for maintaining operation of the environment in accordance with our service level agreements and providing support to both our staff and customers. What you can expect to do in this role: Mentors and advises others in related components and broad fundamental expertise areas Manages identity and access control in Azure Responsible for the tools, configuration, administration and related processes around our log file collection and monitoring Provides the framework, processes and execution to ensure support of Jamfs data leakage prevention Responsible for Web application firewall and related prevention, detection and mitigation of DDoS attack Vulnerability Management: Accountable for the prevention, detection and mitigation of vulnerabilities through industry standard tools, configuration, administration and internal procedures Performs regular firewall audits in line with our procedures. Provides the appropriate documentation, supporting evidence and follow up on identified issues requiring remediation Responsible for tooling, processes and follow up actions related to our external port scanning needs and practices Handles the identification, planning and implementation of any server hardening needs. Works collaboratively with Operations and other internal teams to communicate, document and implement Performs security incident analysis, response and remediation Participates in design and implementation of security automation workflows Helps manage security data reporting and visualization platform #LIRemote What we are looking for: Minimum of 4 years IT security principles, security operations, techniques, and technologies. (Required) Minimum of 4 years experience working with Linux/Unix command line interfaces, including Shell or Python scripting (Required) Minimum of 4 years experience with industry standard configuration management and deployment tools (e.g. Ansible, Azure Resource Manager or other) (Required) Minimum of 2 years experience administering some or all of the following Azure Services: (Virtual Machines, SQL Database, Load Balancer, Storage) (Preferred) Minimum of 2 years experience working with monitoring (Logic Monitor, AppDynamics, Zabbix, etc) and logging tools (Splunk, Sumologic, or ELK (ElasticSearch/Logstash/Kibana)) (Preferred) Advanced knowledge of containerization concepts and Kubernetes (Preferred) Basic knowledge of MySQL or Postgres (Preferred) 4 year / Bachelor's Degree (Preferred) A combination of relevant experience and education may be considered The following certification is preferred: Microsoft Certified: Azure Security Engineer Associate OTHER REQUIREMENTS: This position will perform work that the U.S. government has specified can only be performed by a U.S. citizen located physically in the U.S., and therefore any employment offer will be contingent upon verification of both of these requirements. Applicants who are not U.S. citizens or who are located outside of the U.S. are strongly encouraged to apply for other positions at Jamf, which is an equal-opportunity employer. SECURITY AND PRIVACY REQUIREMENTS: Participation in ongoing security training is mandatory Established security protocols will be adhered to, sensitive data will be handled responsibly, and data protection practices are followed, including understanding relevant privacy regulations and reporting breaches Acknowledging the Jamf Code of Conduct, where applicable security and privacy policies can be found, is a requirement of all roles at Jamf How we help you reach your best potential: Named a 2025 Best Companies to Work For by U.S. News Named a 2024 Best Technology Company to Work For by U.S. News Named one of Forbes Most Trusted Companies in 2024 Named a 2024 Best Companies to Work For by U.S. News Our developers work in agile delivery teams to produce new features, improve software components, and are the subject matter experts for our Jamf product offerings. You will have the opportunity to make a real and meaningful impact for more than 75,000 global customers with the best Apple device management solution in the world. We constantly push the boundaries of technology, our developers support new innovations and OS releases the moment they are made available by Apple. Several Jamf engineers are named in patents and with team names like CatDog, ThunderSnow and Dalek you can expect to have some fun while building cutting-edge software. You will have the opportunity to work with a small and empowered team where the culture is based on trust, ownership, and respect. We offer a clear career path that enables you to grow under supportive leadership and management Visit our Jamf Engineering blog to learn more about the innovative projects our team is working on and what we learn from each challenge we solve. A blog written by engineers, for engineers at medium.com/jamf-engineering 22 of 25 world's most valuable brands rely on Jamf to do their best work (as ranked by Forbes). Over 100,000 Jamf Nation users, the largest online IT community in the world. The below annual salary range is a general guideline. Multiple factors are taken into consideration to arrive at the final hourly rate/annual salary to be offered to the selected candidate. Factors include, but are not limited to the scope and responsibilities of the role, the selected candidate's work experience, education and training, the work location as well as market and business considerations. Pay Transparency Range$103,100-$219,700 USD What it means to be a Jamf? We are a team of free-thinkers, can-doers, and problem-crushers. We value humility and the relentless pursuit of knowledge. Our culture flows from a spirit of selflessness and relentless self-improvement - driving both personal growth and collective progress throughout our company. We unite around common goals while respecting personal approaches, believing that fulfilled individuals create a thriving, vibrant workplace. Our aim is simple: hire exceptionally good people who are incredibly good at what they do and let them do it. We provide the support and resources to let everyone be their authentic, best selves at work, at rest, and at play. We are committed to supporting the continual improvement of Apple in the workplace, the organizations that rely on them and the people who keep it all running smoothly. Above it all, waves our banner of #OneJamf - and the knowledge that when we stand together, we accomplish so much more than we could alone. We seek individuals who share this unwavering journey toward growth to join us in our quest for constant improvement. What does Jamf do? Jamf extends the legendary Apple experience people enjoy in their personal lives to the workplace. We believe the experience of using a device at work or school should feel the same, and be as secure as, using a personal device. With Jamf, customers are able to confidently automate Mac, iPad, iPhone and Apple TV deployment, management, and security - anytime, anywhere - to protect the data and applications used by employees in the workplace, students learning in the classroom, and streamline communications in healthcare between patients and providers. More than 2,500 Jamf strong worldwide, we are free-thinkers, can-doers, and problems crushers who are encouraged to bring their whole selves to work each and every day. Get social with us and follow the conversation at #OneJamf Jamf is committed to creating an inclusive & supportive work environment for all candidates and employees. Candidates with disabilities or religious beliefs are encouraged to reach out if they need additional support or alternative options to our recruiting processes to accommodate their disability or religious belief. If you need an accommodation, please contact your Recruiter or Recruiting Coordinator directly. Requests for accommodation will be handled confidentially by Recruiting and will not be shared with the hiring manager. Jamf is an equal opportunity employer and does not discriminate against individuals who request reasonable accommodation for disability or religious beliefs. To request accommodations please email us at *******************
    $103.1k-219.7k yearly Auto-Apply 40d ago
  • Cyber Threat Analyst, GTIG Intelligence Delivery, Mandiant

    Google LLC 4.8company rating

    Virginia, MN jobs

    Apply share * link Copy link * email Email a friend info_outline XThis position requires onsite client-facing work 3 days a week in Arlington, VA.Note: Google's hybrid workplace includes remote roles. By applying to this position you will have an opportunity to share your preferred working location from the following: Remote locations: Virginia, USA; District of Columbia, USA. Minimum qualifications: * Bachelor's degree in Computer Science, Information Systems, Cybersecurity, a related technical field, or equivalent practical experience. * 3 years of experience assessing and developing cybersecurity solutions and programs across security domains. * 3 years of experience in an intelligence practitioner role. * Ability to travel up to 30% of the time. * Must possess an active Top Secret/SCI security clearance. Preferred qualifications: * Certifications related to specific cloud platforms. * Experience implementing industry-leading practices around cyber risks and cloud security for clients' cloud security frameworks using industry standards. * Experience in identifying and mitigating cyber threats from Chinese state-sponsored actors. * Experience with cloud governance, with the ability to convey governance principles to cloud computing in terms of policies. * Excellent time and project management skills. About the job As a Cyber Threat Analyst for Mandiant Intelligence Delivery, you will be supporting a government customer with the goal of developing and leveraging the Mandiant Threat Intelligence portfolio to help the customer deliver on their mission. You will be an expert at balancing priorities and demonstrating your efficient communication skills as well as familiarity with government mission space. You will work directly with clients to understand their threat concerns and to set expectations for deliverables. Mandiant is a recognized leader in dynamic cyber defense, threat intelligence, and incident response services. By scaling decades of frontline experience, Mandiant helps organizations be confident in their readiness to defend against and respond to cyber threats. Mandiant is now part of Google Cloud.Part of Google Cloud, Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. Mandiant's cybersecurity expertise has earned the trust of security professionals and company executives around the world. Our unique combination of renowned frontline experience responding to some of the most complex breaches, nation-state grade threat intelligence, machine intelligence, and the industry's best security validation ensures that Mandiant knows more about today's advanced threats than anyone. The US base salary range for this full-time position is $108,000-$155,000 + bonus + equity + benefits. Our salary ranges are determined by role, level, and location. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific salary range for your preferred location during the hiring process. Please note that the compensation details listed in US role postings reflect the base salary only, and do not include bonus, equity, or benefits. Learn more about benefits at Google. Responsibilities * Evaluate current and emerging tools and best-practices for tracking advanced persistent threats, tools, techniques, and procedures (TTPs) of attacker's motivations, industry and attacker trends. * Perform tactical, and operational research and analysis of adversarial cyber threats. * Present tactical intelligence about threat groups, the methodologies they use, and the motivations behind their activity. * Work with customers to determine their intelligence needs and requirements. * Prepare and deliver briefings and reports to the client's executives, security team, or fellow analysts.
    $92k-127k yearly est. 4d ago
  • Cyber Security Engineer Co-op - Summer 2026

    Iex 3.6company rating

    New York, NY jobs

    IEX (IEX Group, Inc.) is an exchange operator and technology company dedicated to innovating for performance in capital markets. Founded in 2012, IEX launched a new kind of securities exchange in 2016 that combines a transparent business model and unique architecture designed to protect investors. Today, IEX applies its proprietary technology and experience to drive performance across asset classes, serve all investors, and advocate for transparent and competitive markets. IEX is looking for a Cyber Security Engineer Co-Op to work with the IEX Information Security team. The opportunity will include learning the different aspects of an information security program while contributing to tasks and initiatives in support of security operations, compliance, and program improvements. This position is an opportunity to help maintain and improve IEX's security posture while gaining the experience of working for a national securities exchange and true fintech organization. IEX Information Security is responsible for protecting IEX from cyber security threats, so that our employees can focus on providing our clients performance, fairness, and transparency in the market. About You: Ability to work 40 hours/week for a full semester (4-6 months) Co-Op rotation, starting June 2026 Pursuing a Bachelor's degree in Information Security, Computer Engineering, Computer Science, or a related field Self-starter who is proactive and entrepreneurial Organized and detail-oriented Excellent analytical, critical thinking, and problem-solving skills Knowledge of technology and security topics including operating systems, computer security, network security, and/or application security You are passionate about information security You are not afraid to ask questions and independently research solutions to find the answers and apply them to your work What You'll Do: Help IEX Information Security perform compliance and operational tasks contributing to environment oversight and end user training and awareness. Provide meaningful impact to IEX Information Security. Your work will not sit on a shelf, collecting dust. Leave a legacy! Gain skills applicable to your future career. Work alongside a strong team of InfoSec practitioners. Learn more about how security works in a Financial Services enterprise so you can home in on your areas of interest to create a forward-looking plan. Desired Skills: Experience scripting or coding (e.g., Python, PowerShell, using API's, etc.) Experience with endpoint/network hardening or logging Experience with SIEM, SOAR, EDR, and/or DLP technologies Our job titles may span more than one career level. The starting base pay is $30.00/hour for this NY-based position. The actual base pay is dependent upon many factors, such as: training, transferable skills, work experience, business needs and market demands. The base pay range is subject to change and may be modified in the future. Here at IEX, we are dedicated to an inclusive workplace and culture. We are an Equal Opportunity Employer that does not discriminate on the basis of actual or perceived race, color, creed, religion, alienage or national origin, ancestry, citizenship status, age, disability or handicap, sex, marital status, veteran status, sexual orientation, genetic information or any other characteristic protected by applicable federal, state or local laws. This policy not only complies with all applicable laws and protects workers' rights but is vital to IEX's overall mission and values.
    $30 hourly Auto-Apply 60d+ ago
  • Cyber Security

    Krg Technology 4.0company rating

    Rosemead, CA jobs

    H i , This is Sujith from KRG Technologies ; We are looking Cyber Security at Rose Mead, CA for the below mentioned . Kindly forward me your resume, rate and contact details for further process. I also request you to forward this opportunity to your friends or colleagues; so that we can help someone who may be in search of a job or looking for a change. Job Title: Cyber Security Location: Rose Mead, CA Duration: CONTRACT(6-12months) Job Description: Must have 5-7 yrs of Cyber security experience. Have some experience around Vulnerability assessment & Pen test remediation. Able to explain vulnerabilities and remediation. Have some exposure to OWASP Top 10. Have some exposure to SDLC, development. Any experience in NERC-CIP would be great. Experience around Code review would be added advantage. Thanks & Regards Qualifications Cyber security experience with vulnerability and risk assessment Additional Information All your information will be kept confidential according to EEO guidelines.
    $84k-113k yearly est. 2h ago
  • Principal Cyber Security Engineer

    A10 Networks 4.8company rating

    San Jose, CA jobs

    A Principal Cyber Security Engineer is a seasoned, hands-on role responsible for monitoring an organization's networks, systems, applications, external industrial events, and trends for security threats. This role involves analyzing and developing tools in python for security data, identifying Vulnerabilities, and responding to security incidents. Cyber Security Analysts work closely with other security professionals to maintain the organization's security posture. Principal Cyber Security Engineer has the following responsibilities: * Monitor networks, systems, and applications for security threats * Develop security tools programming in python to protect applications against security threats * Perform Threat Hunting using industry and A10 specific datasets to * identify threats to the company and our customers * Incident Response for threats against the company and our customers * Monitor industry trends in various areas of cybersecurity * Provide cybersecurity direction through insightful writeups and presentations * Conduct periodic penetration tests and vulnerability assessments Principal Cyber Security Engineer requires the following skills: * Master's degree in Computer Science or Information Technology, or a related field with 5+ years in Cyber Security with 10+ years overall experience * 1+ years python programming experience * Knowledge of security principles and best practices * Understanding of Threat Hunting methods * Basic ELK stack expertise * Operational familiarity with an array of host, application, cloud and network cybersecurity technologies * Threat Intelligence and other Open source intelligence * Basic binary reverse engineering using tools like Ghidra or IDA * IP networking troubleshooting and design * Knowledge of programming languages such as Python and Go * Operational understanding of penetration testing tools * Proven track record of identifying and remediating cybersecurity threats * Analytical and problem-solving skills * Excellent communication and interpersonal skills Principal Cyber Security Analyst may use the following tools and software: * Security information and event management (SIEM) systems * Intrusion detection/prevention systems (IDS/IPS) * Firewalls and other Network security appliances * Vulnerability scanners and penetration testing tools * Malware analysis tools * Forensic tools * Programming languages, such as Python and Go Preferred Certifications: CompTIA Security+, CEH, or GIAC A10 Networks is an equal opportunity employer and a VEVRAA federal subcontractor. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability status, protected veteran status, or any other characteristic protected by law. A10 also complies with all applicable state and local laws governing nondiscrimination in employment. #LI-AN1 Compensation: up to $220K USD
    $220k yearly Auto-Apply 55d ago
  • Senior Security Operations Engineer (Azure)

    Jamf 3.8company rating

    Minneapolis, MN jobs

    At Jamf, we believe in an open, flexible culture based on respect and trust. Our track record and thriving work environment all stem from the freedom we grant ourselves to get the job done right. We take pride in helping tens of thousands of customers around the globe succeed with Apple. The secret to our success lies in our connectivity, while operating with a high degree of flexibility. Work-life balance remains our priority while feeling connected is important to maintain our strong culture, achieve our goals, and thrive as #OneJamf. What you'll do at Jamf: The Senior Security Operations Engineer will work with the Cloud and Delivery team to continue to build, automate and maintain cloud security services in Azure. They will be responsible for leading the Security Design and Architecture, Log Collection, Security Incident Management, Identity and Access Management, Vulnerability and Patch management. They will be responsible for maintaining operation of the environment in accordance with our service level agreements and providing support to both our staff and customers. What you can expect to do in this role: Mentors and advises others in related components and broad fundamental expertise areas Manages identity and access control in Azure Responsible for the tools, configuration, administration and related processes around our log file collection and monitoring Provides the framework, processes and execution to ensure support of Jamfs data leakage prevention Responsible for Web application firewall and related prevention, detection and mitigation of DDoS attack Vulnerability Management: Accountable for the prevention, detection and mitigation of vulnerabilities through industry standard tools, configuration, administration and internal procedures Performs regular firewall audits in line with our procedures. Provides the appropriate documentation, supporting evidence and follow up on identified issues requiring remediation Responsible for tooling, processes and follow up actions related to our external port scanning needs and practices Handles the identification, planning and implementation of any server hardening needs. Works collaboratively with Operations and other internal teams to communicate, document and implement Performs security incident analysis, response and remediation Participates in design and implementation of security automation workflows Helps manage security data reporting and visualization platform #LIRemote What we are looking for: Minimum of 4 years IT security principles, security operations, techniques, and technologies. (Required) Minimum of 4 years experience working with Linux/Unix command line interfaces, including Shell or Python scripting (Required) Minimum of 4 years experience with industry standard configuration management and deployment tools (e.g. Ansible, Azure Resource Manager or other) (Required) Minimum of 2 years experience administering some or all of the following Azure Services: (Virtual Machines, SQL Database, Load Balancer, Storage) (Preferred) Minimum of 2 years experience working with monitoring (Logic Monitor, AppDynamics, Zabbix, etc) and logging tools (Splunk, Sumologic, or ELK (ElasticSearch/Logstash/Kibana)) (Preferred) Advanced knowledge of containerization concepts and Kubernetes (Preferred) Basic knowledge of MySQL or Postgres (Preferred) 4 year / Bachelor's Degree (Preferred) A combination of relevant experience and education may be considered The following certification is preferred: Microsoft Certified: Azure Security Engineer Associate OTHER REQUIREMENTS: This position will perform work that the U.S. government has specified can only be performed by a U.S. citizen located physically in the U.S., and therefore any employment offer will be contingent upon verification of both of these requirements. Applicants who are not U.S. citizens or who are located outside of the U.S. are strongly encouraged to apply for other positions at Jamf, which is an equal-opportunity employer. SECURITY AND PRIVACY REQUIREMENTS: Participation in ongoing security training is mandatory Established security protocols will be adhered to, sensitive data will be handled responsibly, and data protection practices are followed, including understanding relevant privacy regulations and reporting breaches Acknowledging the Jamf Code of Conduct, where applicable security and privacy policies can be found, is a requirement of all roles at Jamf How we help you reach your best potential: Named a 2025 Best Companies to Work For by U.S. News Named a 2024 Best Technology Company to Work For by U.S. News Named one of Forbes Most Trusted Companies in 2024 Named a 2024 Best Companies to Work For by U.S. News Our developers work in agile delivery teams to produce new features, improve software components, and are the subject matter experts for our Jamf product offerings. You will have the opportunity to make a real and meaningful impact for more than 75,000 global customers with the best Apple device management solution in the world. We constantly push the boundaries of technology, our developers support new innovations and OS releases the moment they are made available by Apple. Several Jamf engineers are named in patents and with team names like CatDog, ThunderSnow and Dalek you can expect to have some fun while building cutting-edge software. You will have the opportunity to work with a small and empowered team where the culture is based on trust, ownership, and respect. We offer a clear career path that enables you to grow under supportive leadership and management Visit our Jamf Engineering blog to learn more about the innovative projects our team is working on and what we learn from each challenge we solve. A blog written by engineers, for engineers at medium.com/jamf-engineering 22 of 25 world's most valuable brands rely on Jamf to do their best work (as ranked by Forbes). Over 100,000 Jamf Nation users, the largest online IT community in the world. The below annual salary range is a general guideline. Multiple factors are taken into consideration to arrive at the final hourly rate/annual salary to be offered to the selected candidate. Factors include, but are not limited to the scope and responsibilities of the role, the selected candidate's work experience, education and training, the work location as well as market and business considerations. Pay Transparency Range$103,100-$219,700 USD What it means to be a Jamf? We are a team of free-thinkers, can-doers, and problem-crushers. We value humility and the relentless pursuit of knowledge. Our culture flows from a spirit of selflessness and relentless self-improvement - driving both personal growth and collective progress throughout our company. We unite around common goals while respecting personal approaches, believing that fulfilled individuals create a thriving, vibrant workplace. Our aim is simple: hire exceptionally good people who are incredibly good at what they do and let them do it. We provide the support and resources to let everyone be their authentic, best selves at work, at rest, and at play. We are committed to supporting the continual improvement of Apple in the workplace, the organizations that rely on them and the people who keep it all running smoothly. Above it all, waves our banner of #OneJamf - and the knowledge that when we stand together, we accomplish so much more than we could alone. We seek individuals who share this unwavering journey toward growth to join us in our quest for constant improvement. What does Jamf do? Jamf extends the legendary Apple experience people enjoy in their personal lives to the workplace. We believe the experience of using a device at work or school should feel the same, and be as secure as, using a personal device. With Jamf, customers are able to confidently automate Mac, iPad, iPhone and Apple TV deployment, management, and security - anytime, anywhere - to protect the data and applications used by employees in the workplace, students learning in the classroom, and streamline communications in healthcare between patients and providers. More than 2,500 Jamf strong worldwide, we are free-thinkers, can-doers, and problems crushers who are encouraged to bring their whole selves to work each and every day. Get social with us and follow the conversation at #OneJamf Jamf is committed to creating an inclusive & supportive work environment for all candidates and employees. Candidates with disabilities or religious beliefs are encouraged to reach out if they need additional support or alternative options to our recruiting processes to accommodate their disability or religious belief. If you need an accommodation, please contact your Recruiter or Recruiting Coordinator directly. Requests for accommodation will be handled confidentially by Recruiting and will not be shared with the hiring manager. Jamf is an equal opportunity employer and does not discriminate against individuals who request reasonable accommodation for disability or religious beliefs. To request accommodations please email us at *******************
    $103.1k-219.7k yearly Auto-Apply 60d+ ago

Learn more about FICO jobs