Identity Security Architect - Senior Engineer
Cyber security engineer job at FICO
FICO (NYSE: FICO) is a leading global analytics software company, helping businesses in 100+ countries make better decisions. Join our world-class team today and fulfill your career potential!
The Opportunity
"
As an Identity Security Architect on the Identity & Access Management (IAM) Architecture team you will help define strategy and technical implementation of IAM. You will collaborate closely with development teams, business units, and the Cybersecurity Trust organization to grow and develop IAM strategy and governance.
" - Cyber Security-Senior Director
What You'll Contribute
Partner with the IAM architecture team to develop and grow the organization's IAM strategy and identity governance, aligning with enterprise security and business goals.
Partner with IT, HR, compliance, product developers and business units to ensure and enhance seamless onboarding, access provisioning, and role-based access controls (RBAC).
Partner with engineering and operations teams within the broader IAM function to ensure smooth execution of architecture solutions.
Identity opportunities for automation and reporting across IDP estate to enhance and mature identity governance, identity hygiene, increase self-service options, and decrease friction for our stakeholders.
Work with the team to define IAM Architecture roadmap, and goals.
Define IAM policies, standards, and controls to ensure compliance with internal security policies and external regulatory requirements (e.g., PCI-DSS, ISO 27001, NIST).
Develop architecture diagrams and presentations for audiences ranging from internal team to product developers to management.
Stay current with emerging trends and technologies in identity governance and identity threat protection and evaluate their potential impact on the organization (e.g., emerging threats, cloud-native PAM, JIT access, SSF (Shared Signals Framework), CAEP (Continuous Access Evaluation Protocol), Zero Trust).
Participate and collaborate with IAM and security tools vendors to understand new features, new products, and shape future identity security and governance tools selections.
What We're Seeking
Hands-on experience with cloud IAM and IDPs (Entra ID, AWS IAM, GCP IAM, Okta, Ping, Active Directory, RHIM).
In-depth experience with SailPoint - Identity Security Cloud preferred.
Strong knowledge of IAM processes: provisioning, de-provisioning, certifications, RBAC, ABAC, MFA, SSO, PAM.
Experience with Federated Identity Management (SAML, OAuth, OpenID Connect).
Experience designing solutions to effectively manage privileged access (shared credentials and personal) using PAM solutions like CyberArk or Thycotic.
Strong understanding of modern authentication and authorization standards (SAML, OIDC) including when to apply them and how to perform high-level troubleshooting.
Familiarity with software development practices and experience working with Rest APIs.
Knowledge of Private Key Infrastructure (PKI), mTLS machine authentication, and FIDO2/WebAuthn.
Knowledge of Non-Human Identity (NHI) concepts and threat detections.
Knowledge of Zero Trust architecture and NIST cybersecurity frameworks.
Knowledge of AI and LLMs and use cases for identity governance is a plus.
Comfortable working with cross-functional teams.
Excellent communication and leadership skills.
Strong problem-solving and analytical skills.
Ability to prioritize and manage multiple tasks and projects simultaneously.
Relevant certifications are a plus (e.g., CISSP, CIDPRO, CCSP, GIAC, AWS Certified Security, Microsoft SC-100, SC-300)
Our Offer to You
An inclusive culture strongly reflecting our core values: Act Like an Owner, Delight Our Customers and Earn the Respect of Others.
The opportunity to make an impact and develop professionally by leveraging your unique strengths and participating in valuable learning experiences.
Highly competitive compensation, benefits and rewards programs that encourage you to bring your best every day and be recognized for doing so.
An engaging, people-first work environment offering work/life balance, employee resource groups, and social events to promote interaction and camaraderie.
The targeted base pay range for this role is: $133,000 to $209,000 with this range reflecting differences in candidate knowledge, skills and experience.
#LI-RR1
#LI-remote
Why Make a Move to FICO?
At FICO, you can develop your career with a leading organization in one of the fastest-growing fields in technology today - Big Data analytics. You'll play a part in our commitment to help businesses use data to improve every choice they make, using advances in artificial intelligence, machine learning, optimization, and much more.
FICO makes a real difference in the way businesses operate worldwide:
• Credit Scoring - FICO Scores are used by 90 of the top 100 US lenders.
• Fraud Detection and Security - 4 billion payment cards globally are protected by FICO fraud systems.
• Lending - 3/4 of US mortgages are approved using the FICO Score.
Global trends toward digital transformation have created tremendous demand for FICO's solutions, placing us among the world's top 100 software companies by revenue. We help many of the world's largest banks, insurers, retailers, telecommunications providers and other firms reach a new level of success. Our success is dependent on really talented people - just like you - who thrive on the collaboration and innovation that's nurtured by a diverse and inclusive environment. We'll provide the support you need, while ensuring you have the freedom to develop your skills and grow your career. Join FICO and help change the way business thinks!
Learn more about how you can fulfil your potential at ********************
FICO promotes a culture of inclusion and seeks to attract a diverse set of candidates for each job opportunity. We are an equal employment opportunity employer and we're proud to offer employment and advancement opportunities to all candidates without regard to race, color, ancestry, religion, sex, national origin, pregnancy, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. Research has shown that women and candidates from underrepresented communities may not apply for an opportunity if they don't meet all stated qualifications. While our qualifications are clearly related to role success, each candidate's profile is unique and strengths in certain skill and/or experience areas can be equally effective. If you believe you have many, but not necessarily all, of the stated qualifications we encourage you to apply.
Information submitted with your application is subject to the FICO Privacy policy at **************************************
Auto-ApplyAcquisition Security Analyst
Los Angeles, CA jobs
MANTECH seeks a motivated, career and customer-oriented Acquisition Security Analyst II to join our team in El Segundo, CA.
The Acquisition Security Analyst II will assist the Government Program Manager with the development and implementation of comprehensive program protection methodologies to protect advanced technology programs throughout the system's lifecycle.
Responsibilities include but are not limited to:
In-depth lifecycle program analysis to identify critical program information (CPI), Critical System Resources (CSR), and their associated vulnerabilities. Assist with the identification and implementation of countermeasures. Develop and implement a risk management-based program protection plan and strategy.
Provide security recommendations to the PM, GSSO, and cognizant security authorities as to the Air Force acquisition and sustainment process.
Maintain a working relationship with the PM, Contracting Officer and contractor security officers to ensure a standardized and correct format/process is utilized for all DD Form 254 efforts throughout the acquisition and sustainment lifecycle, in coordination with Program Security Officers.
Conduct analysis of foreign intelligence threats against programs involving customer's critical research, sensitive technologies or CPI.
Prepare and produce analytical products from numerous resources, to include various databases, to ensure a real-time, tailored product is provided.
Write, review, and/or edit Security Classification Guides (SCG), Exposure Contingency Plans (ECP), Managed Access Plans (MAP), Security Operating Procedures (SOPs), System Test Plans (STP)
Provide technical analysis and OPSEC support to SMC or AFSPC Special programs and other associated operations, missions, and organizational elements involved in developing system requirements to associated systems RDT&E.
Minimum Qualifications:
Bachelor's degree in a related area; an additional 4 years of related experience might be considered for a degree.
10+ years of related experience with acquisition programs
6+ years of experience with SCI programs.
Must be familiar with security policy/manuals and the appropriate ICDs/JAFANs/DOD Manuals and other guiding policy documents.
Must have extensive knowledge of the DD Form 254 and how it is incorporated in the Air Force acquisition process.
Willingness to travel within the scope of the Program's Area of Responsibility (AOR) (note- could be extensive, and will include both air and ground transportation)
Preferred Qualifications:
4+ years of experience with SAR program acquisitions desired.
Working knowledge of Microsoft Office (Word, PowerPoint, and Excel)
Possess a high degree of originality, creativity, initiative requiring minimal supervision.
Have the ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners.
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a polygraph.
Physical Requirements:
Must be able to remain in a stationary position 50%.
Needs to occasionally move about inside the office to access file cabinets, office machinery, etc.
Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer.
Frequently communicates with co-workers, management and customers, which may involve delivering presentations. Must be able to exchange accurate information in these situations.
Cyber Security Analyst
New York, NY jobs
Job Title: Cyber Security Risk Analyst.
Job Type: Contract.
IS NOT OPEN TO AGENCIES.
The Cyber Security Risk Analyst supports enterprise governance, risk, and compliance (GRC) initiatives by strengthening cyber risk management practices, enhancing third-party risk oversight, and contributing to cybersecurity governance across a complex organizational environment. This role works closely with cybersecurity leadership, internal stakeholders, and partner teams to mature risk assessment processes and ensure consistent, well-documented risk management activities.
Key Responsibilities
Design, develop, and enhance cybersecurity risk management processes and supporting frameworks
Support enterprise cyber risk governance, including risk identification, evaluation, and remediation tracking
Perform cybersecurity risk assessments in collaboration with business and IT stakeholders
Evaluate and manage third-party and vendor cybersecurity risk throughout the vendor lifecycle
Contribute to the development and maintenance of a third-party risk register
Review and analyze cybersecurity risk cases, exceptions, and justifications
Document risks, mitigations, and remediation actions within a centralized risk register
Assist in developing risk assessment procedures, methodologies, and testing approaches aligned with industry frameworks
Collaborate with cross-functional teams and subject matter experts to gather risk intelligence
Support remediation efforts by helping initiate corrective actions where vulnerabilities or weaknesses are identified
Participate in special cybersecurity initiatives and projects as assigned
Required Qualifications
Minimum of 4 years of experience in one or more of the following areas:
Cybersecurity risk management
Cybersecurity risk assessment
Third-party or vendor risk management within a cybersecurity function
Strong understanding of GRC concepts and the cyber risk lifecycle
Experience working in large, complex, multi-stakeholder environments
Strong analytical, investigative, and documentation skills
Excellent written and verbal communication skills
Preferred Qualifications
Bachelor's degree in Cybersecurity, Risk Management, Information Systems, Computer Science, or a related field
Familiarity with one or more cybersecurity frameworks or standards, including:
NIST
ISO/IEC 27001 / 27002
CIS
SANS
PCI
Relevant certifications are a plus, including but not limited to:
CISSP, CISM, CRISC, CISA
CompTIA Security+, CySA+, Network+
GIAC certifications
Knowledge of cybersecurity laws, regulations, and data privacy principles
Ability to work independently in a self-directed and organized manner
About Buchanan Technologies
Since Buchanan's inception over 30 years ago, we have operated on 5 core values - People Matter, Customers Matter, Principles Matter, Community Matters, and Every Interaction Matters. These values are represented across each facet of the company, from employee relations to client service delivery to corporate social responsibility initiatives and beyond.
Why Work at Buchanan?
At Buchanan Technologies, we offer a great employment experience with a fun but professional work environment, competitive salary, and various employee career advancement programs that add value to your skills and daily life. If you are excited about being part of an energetic team where your contributions are appreciated and hard work is recognized, Buchanan is the place for you.
Things We Are Passionate About
We are passionate about providing top-tier technology services to our customers and clients and fostering a culture of continuous learning for our employees. We are a people- centric company, focused on growth and diversity for our workforce. Come join us and let's build something amazing together.
Follow Us:
LinkedIn: *******************************************************
Website: ****************
Buchanan Technologies provides equal employment opportunities (EEO) to all employees and applicants for employment without regard to race, color, religion, sex, national origin, age, disability, protected veteran status, or genetics. In addition to federal law requirements, Buchanan Technologies complies with applicable state and local laws governing nondiscrimination in employment in every location in which the company has facilities. This policy applies to all terms and conditions of employment, including recruiting, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation, and training.
Senior Security Architect
Orange, CA jobs
Security, Compliance and Audit Readiness:
Enforce network security controls aligned with Criminal Justice Information Services (“CJIS”), National Institute of Standards and Technology (“NIST”), and department policy.
Implement and maintain firewall rulesets, Network Access Control (“NAC”) solutions (e.g., Cisco Identity Service Engine (“ISE”)), and endpoint access policies.
Support the cybersecurity team in incident detection, forensic analysis, and mitigation strategies.
Provide documentation and evidence for security audits and compliance reviews.
Implementation, Operations and Support:
Serve as the hands-on engineer for network deployment, upgrades, and incident response.
Configure and manage Cisco switches, routers, firewalls, WLCs, and wireless endpoints.
Design and manage VPNs, QoS, ACLs, network monitoring, and logging systems (SolarWinds, NetFlow, SNMP).
SME Leadership and Staff Development:
Serve as the department's SME on enterprise security, guiding decisions across IT, public safety systems, and operations.
Train, coach, and mentor internal IT staff, including junior and mid-level network technicians.
Lead structured knowledge transfer sessions, hands-on training, and real-time coaching during support and implementation activities.
Create SOPs, how-to guides, and step-by-step documentation tailored for ongoing use by internal staff.
Support staff in preparation for certification paths (e.g., CCNA/CCNP) if desired.
Any other activities reasonably related to the foregoing, as assigned by the Client
Staff Blockchain Security Engineer
Irvine, CA jobs
About the Company:
Blizzard Entertainment, a global leader in interactive entertainment, has been shaping the world of video games since its founding. Renowned for iconic franchises like
World of Warcraft
,
Overwatch
, and
Diablo
, Blizzard is dedicated to creating immersive, innovative, and high-quality gaming experiences that captivate millions of players worldwide. Our mission is to inspire and connect players through engaging gameplay, compelling storytelling, and vibrant online communities. As we continue to expand our reach in the gaming industry, we remain committed to pushing the boundaries of creativity, technology, and entertainment.
The Role: Staff Blockchain Security Engineer
Blizzard's Application Security (AppSec) team is entrusted with safeguarding the company and its players from software vulnerabilities and security threats. As a Staff Blockchain Security Engineer within AppSec, you will specialize in securing blockchain-based game features, in-game economies, and Web3 integrations. You'll collaborate closely with game development and engineering teams to provide guidance, perform security assessments, and implement best practices throughout the blockchain software lifecycle.
This role requires in-person collaboration two days per week at our Irvine, California headquarters.
Key Responsibilities:
Conduct comprehensive security reviews of blockchain integrations, smart contracts, in-game economy systems, and Web3 features for vulnerabilities and architectural flaws
Advise game development teams on secure blockchain practices and remediation strategies
Establish and maintain secure development processes within the blockchain software lifecycle
Develop, maintain, and improve blockchain-specific security tooling (e.g., fuzzers, static analysis frameworks)
Collaborate with legal, compliance, and risk teams to evaluate security, operational, and regulatory risks of blockchain implementations
Minimum Qualifications:
8+ years in application security, Web3 security, or related disciplines
Proven experience auditing smart contracts, blockchain protocols, or Web3 applications
Expertise in design reviews, threat modeling, secure code review, or penetration testing with a hacker mindset
Strong knowledge of application security principles and common vulnerabilities (e.g., SSRF, race conditions, privilege escalation)
Experience with secure key management, wallet systems, or cryptography
Familiarity with blockchain security tools such as Slither, Echidna, or similar
Scripting or programming experience in Python, C++, JavaScript, or other relevant languages
Ability to balance business goals with security priorities and communicate risks clearly to cross-functional teams
Preferred Qualifications:
Experience in formal verification of smart contracts
Background in blockchain-enabled gaming, DeFi platforms, or NFT ecosystems
Contributions to blockchain security communities, bug bounty programs, or published research
Experience defining and executing long-term blockchain security strategies alongside engineering leadership
Why Blizzard?
Competitive base salary and discretionary annual bonus
Equity opportunities and long-term incentives
Comprehensive health, dental, and vision plans
401(k) with company match
Paid parental leave and flexible time off
A hybrid work model that balances collaboration with flexibility
Salary Range: $170,000 - $250,000. This excludes discretionary bonuses or equity grants, which are determined based on experience, skills, and market standards.
Blizzard Entertainment is committed to building diverse teams that reflect the communities we serve. We are an equal opportunity employer and do not discriminate based on race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or veteran status. If you require accommodation, please reach out to our People Team.
Senior Backend Engineer - Cloud Security
Sunnyvale, CA jobs
About Company,
Droisys is an innovation technology company focused on helping companies accelerate their digital initiatives from strategy and planning through execution. We leverage deep technical expertise, Agile methodologies, and data-driven intelligence to modernize systems of engagement and simplify human/tech interaction.
Amazing things happen when we work in environments where everyone feels a true sense of belonging and when candidates have the requisite skills and opportunities to succeed. At Droisys, we invest in our talent and support career growth, and we are always on the lookout for amazing talent who can contribute to our growth by delivering top results for our clients. Join us to challenge yourself and accomplish work that matters.
We're hiring Senior Backend Engineer - Cloud Security in Sunnyvale, CA
What You Will Do
Build containerized microservices and related components for a multi-tenant, distributed system that ingests and processes real-time cloud events, system telemetry, and network data across major cloud platforms. Your work will enable customers to detect risks and strengthen their cloud security posture.
Mentor junior engineers, interns, and new graduates, helping them develop strong technical skills and become effective contributors.
Write production-quality software primarily in Java using Spring Boot, and work extensively with Kafka, SQL, and other data interfaces.
Work within a Kubernetes-based service infrastructure, while learning new technologies as needed.
Take ownership of major features and subsystems through the entire development lifecycle-requirements, design, implementation, deployment, and customer adoption.
Participate in operational responsibilities, gaining firsthand experience with real-world performance, reliability, and support scenarios-informing how you design and build better systems.
Prioritize quality at every stage, performing thorough developer testing, functional validation, integration checks, and performance testing to ensure highly resilient systems.
Collaborate closely with Product Management to review, refine, and finalize requirements.
Develop a deep understanding of customer needs by engaging with peers, stakeholders, and real-world use cases.
What You Bring
Bachelor's degree in computer science or similar (Master's preferred).
5+ years of experience building scalable, distributed systems.
Passion for software engineering, continuous learning, and working in a collaborative environment.
Hands-on experience with AWS, Azure, or GCP, with strong familiarity at the API/programming level.
Experience with networking and/or security concepts is a plus.
Experience developing containerized services on Kubernetes is strongly desired.
Strong programming experience in Java/Spring Boot or Golang.
Experience building or using REST APIs.
Knowledge of infrastructure-as-code tools such as CloudFormation, Terraform, or Ansible is a plus.
Understanding of TCP/IP networking fundamentals.
Experience developing in Unix/Linux environments.
Droisys is an equal opportunity employer. We do not discriminate based on race, religion, color, national origin, gender, gender expression, sexual orientation, age, marital status, veteran status, disability status or any other characteristic protected by law. Droisys believes in diversity, inclusion, and belonging, and we are committed to fostering a diverse work environment
Security Architect
Santa Ana, CA jobs
1. Security, Compliance and Audit Readiness
a. Enforce network security controls aligned with Criminal Justice Information Services (“CJIS”), National Institute of Standards and Technology (“NIST”), and department policy.
b. Implement and maintain firewall rulesets, Network Access Control (“NAC”) solutions (e.g., Cisco Identity Service Engine (“ISE”)), and endpoint access policies.
c. Support the cybersecurity team in incident detection, forensic analysis, and mitigation strategies.
d. Provide documentation and evidence for security audits and compliance reviews.
2. Implementation, Operations and Support
a. Serve as the hands-on engineer for network deployment, upgrades, and incident response.
b. Configure and manage Cisco switches, routers, firewalls, WLCs, and wireless endpoints.
c. Design and manage VPNs, QoS, ACLs, network monitoring, and logging systems (SolarWinds, NetFlow, SNMP).
3. SME Leadership and Staff Development
a. Serve as the department's SME on enterprise security, guiding decisions across IT, public safety systems, and operations.
b. Train, coach, and mentor internal IT staff, including junior and mid-level network technicians.
c. Lead structured knowledge transfer sessions, hands-on training, and real-time coaching during support and implementation activities.
d. Create SOPs, how-to guides, and step-by-step documentation tailored for ongoing use by internal staff.
e. Support staff in preparation for certification paths (e.g., CCNA/CCNP) if desired.
4. Any other activities reasonably related to the foregoing, as assigned by OCSD.
Infrastructure & Information Security Architect
Industry, CA jobs
We don't just offer jobs; we cultivate careers. Become part of our dynamic team of professionals and experience what it means to truly be valued. We're passionate about empowering our associates to reach their full potential, fostering growth, and celebrating success together.
When you join Sigma, you're stepping into a fast-growing, innovative global food organization that's redefining excellence in the industry.
Are you ready to elevate your career? Come join our table!
Position Summary
Responsible for designing, implementing, supporting and administering the IT infrastructure and information security applications. Analyzes system requirements and defines system architecture that will meet business needs, including server infrastructure, capacity planning, storage requirements and networking protocols.
Essential Job Functions
Responsible for designing and implementing information systems that will adequately support the infrastructure of the organization.
Examines system requirements and system architecture and provides new processes/standards that will meet business needs, including server infrastructure, capacity planning, storage requirements, and networking protocols.
Ensures that architecture project roll-outs meet security standards and are effectively integrated with current applications.
Completes tasks designed to ensure security of the organization's systems and information assets.
Protects against unauthorized access, modification, or destruction and develops IT security policies and standards.
Authorize user access and familiar with domain structures and digital signatures.
Oversees and guides the work of lower-level IT personnel or other IT teams.
Develops, implements and maintains policies, procedures, and programs for ensuring the security and integrity of company data, databases, information systems, and technology.
Conducts risk management analysis and creates business continuity, contingency, and disaster recovery plans.
Leads the development, update, and execution of Business Continuity Plans for systems and data within Enterprise Data.
Develops and executes the testing processes utilized to validate the disaster recovery plans and to identify weaknesses and failure points in the plans.
Works on advanced, complex technical projects or business issues.
Other duties as assigned.
Minimum Qualifications
Associate degree in Computer Science, Computer Engineering, Technology, Information Systems or equivalent work experience.
Eight years of infrastructure or security architecture.
Experience in enterprise and security architecture.
Experience on day to day IT operation management.
Experience on Data Center environments.
License/Certifications: N/A
Preferred Qualifications
Formal training ITIL, COBIT, or Microsoft certification.
Project Management certification.
Knowledge, Skills & Abilities (KSA's)
Knowledge on consolidation of Active Directory environments on a medium to large company.
Strong technical knowledge across infrastructure and security services support.
Working understanding of Active Directory structure (e.g. GPOs).
Working understanding of Agile and RACU Frameworks.
Understand industry threats and the methods to apply appropriate controls.
Knowledge of PowerShell and other automation methods.
Understanding of server hardening.
Proficient with Microsoft Office, including skills with Outlook, Word and Excel.
Ability to lead and effectively communicate with technical and non-technical staff across multiple disciplines and levels of the organization.
Ability to identify complex problems, review information to develop and evaluate options then implement solutions.
Environmental/Working Conditions
N/A
Physical Requirements
Usual office environment with frequent sitting, walking, and standing, and occasional climbing, stooping, kneeling, crouching, crawling, and balancing. Frequent use of eye, hand, and finger coordination enabling the use of office machinery. Oral and auditory capacity enabling interpersonal communication as well as communication through automated devices such as the telephone.
Security Architect GCP
Sunnyvale, CA jobs
Security Architect / Implementation Engineer
Duration: 6 Months contract with possibility of extension
We are seeking a highly skilled Security Architect / Security Implementation Engineer with expertise in designing, implementing, and integrating Google Cloud Security Command Center (SCC), Chronicle SIEM, and Cybereason XDR. The candidate will be responsible for architecting the end-to-end solution, implementing GCP native security controls, integrating third-party security tools, and producing detailed design and operational documentation.
Key Responsibilities:
Design and architect cloud-native security controls in GCP aligned with security and compliance frameworks (CIS, ISO 27001, NIST, etc.).
Implement Google Security Command Center (SCC) for threat detection, vulnerability management, and risk insights.
Architect and configure Chronicle SIEM for log ingestion, correlation, and advanced threat analytics.
Integrate Cybereason XDR with SCC, Chronicle, and other security tools to establish end-to-end threat detection and response workflows.
Define use cases, rules, policies, and security playbooks to automate detection and response.
Document the solution architecture, design decisions, configuration standards, and integration workflows.
Conduct knowledge transfer sessions with security operations and support teams.
Collaborate with GCP Cloud Platform teams, SOC teams, and compliance teams to align solutions with enterprise policies.
Required Skills & Experience:
8-12 years of overall IT security experience with at least 4-5 years in Google Cloud Security.
Proven experience with Google Security Command Center (SCC), Chronicle SIEM, and XDR platforms (Cybereason preferred).
Strong knowledge of GCP IAM, VPC Service Controls, Cloud Armor, DLP, Cloud Logging, Cloud Monitoring.
Hands-on experience in integrating SIEM, XDR, and native GCP security tools.
Experience with Terraform, Deployment Manager, or automation frameworks for security deployment.
Strong documentation and presentation skills.
Security certifications preferred: Google Professional Cloud Security Engineer, GCP Professional Architect, CISSP, CISM, CCSP.
Cyber Security Analyst II (Remote)
Remote
is remote and can be performed from anywhere in the United States.
Cyber security analysts are responsible for managing, monitoring, troubleshooting and protecting both the security of our internal environment and that of our customers. They will perform any steps necessary to that end. They will design, implement, monitor, and evaluate the security systems that protect an organization's computer systems and data. As a Cyber Security Analyst, you will monitor the computer networks under management for security issues, install security software, and document any security issues you identify. This role also acts as the first point of contact for customer related security incidents and questions.
KEY RESPONSIBILITIES:
Act as the primary point of escalation for Cyber Security Analyst I technicians
Provides coaching to Cyber Security Analyst I employees on how to perform their duties
Create complex detection/correlation rules utilizing our SIEM and other security infrastructure to enhance detection ratios and monitor for emerging threats
Create, distribute and perform training for the Cyber Security Analyst I technicians on techniques and capabilities to improve the team's responsiveness and effectiveness as a whole
Performs all of the following functions of a Cyber Security Analyst I, with proficiency
Monitor computer networks for security issues and respond accordingly, including:
Creating/Managing firewall rules
Managing anti-virus endpoint tools
Performing event correlation analysis on potential threats identified through our SIEM
Configuring/Managing log management
Configuring/Managing file integrity monitoring
Performing vulnerability scans and remediation of identified risks
The methodology & analysis of identifying compromised servers
Performing rule tuning in our SIEM for improved detection capabilities
Interact with customers by phone, chat, or trouble ticket on any customer facing security issues
Investigate, document and assess security breaches and other cyber security incidents
Install security measures and operate software to protect systems and information infrastructure, including firewalls and data encryption programs
Prepare security reports for customer business insights reviews to support our guidance level agreements initiatives
Identify and fix detected vulnerabilities to maintain a high-security standard
Work with other technology teams and customers to perform tests and uncover network or other vulnerabilities
May be relied upon as a technical point of contact during Escalated Events relating to security
Review, investigate and respond to any external “abuse” complaints coming from our IP space
Develop best practices for IT security
Research security enhancements and make recommendations to management
Handle escalated internal or customer security issues from support or another operations team
Takes part in any security-oriented projects or critical initiatives
Stay up to date on information technology & security news, trends and standards
Deliver an exceptional customer experience every day
Other duties as identified or assigned
DESIRED ROLE OUTCOMES:
Keep us and our customers free from security incidents but respond capably when one occurs
Our detection of security threats is continually improving
Provide valuable insights and visibility around security incidents to our customers
Have a staff of customer focused, energetic and security savvy team members
REQUIRED SKILLS:
A minimum of 2 years' experience in a security analyst role
Bachelor's degree in Computer Science or related field or equivalent experience. Additional certifications in security related disciplines (e.g.: Security+, CEH, CISSP, etc.) are preferred
Must have experience in a Security Operations Center (SOC)
Must have technical troubleshooting and problem-solving skills
Understanding of network management principles
Experience in systems administration of Windows and Linux based operating systems
Working knowledge of Palo Alto or Fortinet firewalls, Microsoft Azure, Microsoft Sentinel SIEM solution or similar technologies
Understanding of firewalls, proxies, SIEM, antivirus, penetration testing, vulnerability scans and IDS/IPS concepts
Ability to identify and mitigate network vulnerabilities and explain how to avoid them
Understanding of patch management with the ability to deploy patches in a timely manner while understanding business impact
Ability to learn and communicate technical information to non-technical people
Must have excellent written & oral communication skills, and strong interpersonal skills
Must emulate the Ntirety Values in all that they do
Ntirety is an Equal Employment Opportunity / Affirmative Action Employer (EEO/AA).
Ntirety offers a competitive salary and benefits including unlimited Paid Time Off, FREE Medical to Employees, Dental, retirement plan with 401(k) match, and much more. If you are interested in joining a profitable, growing, and dynamic company, we want to hear from you! Ntirety is an Equal Opportunity Employer and does not discriminate on the basis of race, color, religion, sex, age, national origin, disability, veteran status, sexual orientation, or any other classification protected by Federal, State or local law.
Ntirety thanks all candidates for their interest; however, only shortlisted candidates will be contacted.
Auto-ApplyCyber Security Analyst (locals only)
Syracuse, NY jobs
Infojini Consulting is a full service IT consulting, services, and staffing firm with offices in Secaucus, NJ.
Infojini Consulting is recognized as one of the fastest growing IT services and software development Companies. With a partnership of all major technology vendors, Infojini Consulting has built a strong Government and commercial customer base including fortune 100 companies and most state and federal agencies such as State of North Carolina, State of South Carolina, State of Maryland, State of California, State of Pennsylvania, State of Virginia, State of Washington and many others.
Infojini Consulting is an equal opportunity employer and considers all qualified individuals for employment irrespective of their race, gender, age, color, sexual orientation. We offer an excellent compensation package
Job Description
We are looking for Cyber Security Analyst in Syracuse, NY for Fulltime position.
Please refer someone else if you are not available at this time or you are not right match for this job opportunity. We have great Referral Bonus up to $2500!!! Please don't miss to refer someone who are looking for projects.
Job details mentioned below-
Title: Cyber Security Analyst
Location: Syracuse, NY 13210
Duration: Fulltime
Client: Direct Client
Required Skills:
• Plan, implement and upgrade security solution and controls
• Establish Protocol and solutions to protect systems against unauthorized access and/or destruction
• Establish security requirements for networks and devices
• Perform network vulnerability testing, risk analysis and security assessments
• Manage select security solutions including instruction prevention, Penetration Testing and other tools as necessary.
• Monitor network traffic for unusual activity.
• Analyse security events and breaches to determine root causes. Work with outside vendors to identify and resolve security events
• Bachelor's Degree and minimum of 2 yrs. of experience in cyber security role or equivalent combination of education and experience required.
Desired Skills:
Certified Information Systems Security professional (CISSP) and/or experience with Information security in hardware and software technologies such as IPS/IDS, network scanner, Firewalls, SSL, TCP/IP, DNS and web security architecture preferred.
Additional Information
All your information will be kept confidential according to EEO guidelines.
Cyber Security Analyst (SOC)
San Diego, CA jobs
Job DescriptionThe Cyber Analyst team member is responsible for the analysis of all technology devices which may include Operational Technology (OT) and Industrial Control Systems (ICS) as well as on-premises and cloud enterprise networks. This includes analysis of device communication, forensic analysis of Windows
or Linux systems and servers, timeline analysis of activity on these endpoints, user permission and
authentication audits, log analysis, and malware identification/triage.
An ideal candidate for this position will be a proactive self-starter who has experience with system
administration, Windows and Linux operating systems (OS) mechanics including filesystem structures,
disk and memory forensics, cyber aware Operational Technology or Control Systems operators,
commonly used mechanisms for maintaining security persistence, privilege escalation, and lateral data
movement, operating system log analysis, and triaging suspicious file artifacts for unusual behavior. This
role requires a familiarity with what routine OS activities and common software/user behavior looks like
in the context of forensic artifacts or timelines. Analysts should also be familiar with common categories
and formats of host-based indicators of compromise (IOCs) and how/where they can be leveraged to
identify known-bad files/activity on an endpoint. Candidate will utilize the Cyber Kill Chain and
synthesize the entire attack life cycle along with creating detailed reports on how impacts may or have
occurred.
Responsibilities
Support SOC team in operating and performing duties in a Security Operations Center (SOC) to
provide a secure environment that facilitates monitoring, incident response, malware analysis,
and threat hunting activities.
Develop and utilize analytics on the security information and event management (SIEM)
platform to monitor for security alerts and coordinate vulnerability assessments and artifact
collection across servers and network devices.
Asses Security Technical Implementation Guides (STIGs) compliance and completion.
Utilize asset mapping tools to verify connected inventory.
Handle Information Assurance Vulnerability Management (IVAM) notifications.
Evaluate network structures and device configurations for security risks, offering
recommendations based on best practices, and gather data to identify and respond to network
intrusions.
Analyze network traffic and system logs to identify malicious activities, vulnerabilities exploited,
and methods used, and develop processes to enhance SOC response and efficiency.
Conduct comprehensive technical analyses of computer evidence, research and integrate new
security tools into the SOC, and synthesize findings into reports for both technical and non-
technical audiences.
Qualifications
(Journeyman level) At least 3 years, (Junior level) applicable 1 to 2 years of experience in
security operations, demonstrating analytical duties and preforming host or network security
analysis.
Proficient in analyzing cyber-attacks, with a deep understanding of attack classifications, stages,
system/application vulnerabilities, and compliance with Department of Defense (DoD) policies
and procedures.
Applied knowledge of network topologies, protocols (e.g., TCP/IP, ICMP, HTTP/S, DNS, SSH,
SMTP, SMB), and experience with tools like Palo Alto, Elastic SIEM, Cribl, Splunk, VMware,
Security Center.
Capable of attack reconstruction based on network traffic, integrating Threat Intelligence, and
familiar with MITRE ATT&CK framework, with the ability to collaborate effectively across
multiple locations.
Desired Skill sets
Knowledge of Operational Technology (OT) or Industrial Control Systems (ICS)
Strong analytical and troubleshooting skills
Able to provide expert content development in Splunk Enterprise Security using tstats and data
models
Understands how to utilize knowledge of latest threats and attack vectors to develop correlation
rules for continuous monitoring on various security appliances
Experience in other tools and protocols as applicable such as Nessus, Endgame, CrowdStrike,
Gray Noise, Shodan, Bacnet, MODBus, SCADA systems, and PCAP
Review logs to determine if relevant data is present to accelerate against data models to work
with existing use cases
Familiar with the operations and functions of Nessus or security center management
Can assist and provide technical input to research, discover, implement hardware and software
Understands importance and fundamentals of logistics and evidence handling
Certified Ethical Hacker (CEH), GIAC Certified Incident Handler (GCIH), or relevant IT technology
certification
Examples of other certifications include:
o Offensive Security Certified Professional (OSCP)
o GIAC Response and Industrial Defense (GRID)
o CERT Certified Computer Security Incident Handler
o ECC CEH (Electronic Commerce Council Certified Ethical Hacker)
o GCIH (GIAC Certified Incident Handler)
o GISF (GIAC Information Security Fundamentals)
o CISSP (Certified Information System Security Professional)
Additional certifications at an equivalent may also be considered.
Powered by JazzHR
qPd0DTcQVL
Cyber Security Analyst (SOC)
San Diego, CA jobs
The Cyber Analyst team member is responsible for the analysis of all technology devices which may include Operational Technology (OT) and Industrial Control Systems (ICS) as well as on-premises and cloud enterprise networks. This includes analysis of device communication, forensic analysis of Windows
or Linux systems and servers, timeline analysis of activity on these endpoints, user permission and
authentication audits, log analysis, and malware identification/triage.
An ideal candidate for this position will be a proactive self-starter who has experience with system
administration, Windows and Linux operating systems (OS) mechanics including filesystem structures,
disk and memory forensics, cyber aware Operational Technology or Control Systems operators,
commonly used mechanisms for maintaining security persistence, privilege escalation, and lateral data
movement, operating system log analysis, and triaging suspicious file artifacts for unusual behavior. This
role requires a familiarity with what routine OS activities and common software/user behavior looks like
in the context of forensic artifacts or timelines. Analysts should also be familiar with common categories
and formats of host-based indicators of compromise (IOCs) and how/where they can be leveraged to
identify known-bad files/activity on an endpoint. Candidate will utilize the Cyber Kill Chain and
synthesize the entire attack life cycle along with creating detailed reports on how impacts may or have
occurred.
Responsibilities
Support SOC team in operating and performing duties in a Security Operations Center (SOC) to
provide a secure environment that facilitates monitoring, incident response, malware analysis,
and threat hunting activities.
Develop and utilize analytics on the security information and event management (SIEM)
platform to monitor for security alerts and coordinate vulnerability assessments and artifact
collection across servers and network devices.
Asses Security Technical Implementation Guides (STIGs) compliance and completion.
Utilize asset mapping tools to verify connected inventory.
Handle Information Assurance Vulnerability Management (IVAM) notifications.
Evaluate network structures and device configurations for security risks, offering
recommendations based on best practices, and gather data to identify and respond to network
intrusions.
Analyze network traffic and system logs to identify malicious activities, vulnerabilities exploited,
and methods used, and develop processes to enhance SOC response and efficiency.
Conduct comprehensive technical analyses of computer evidence, research and integrate new
security tools into the SOC, and synthesize findings into reports for both technical and non-
technical audiences.
Qualifications
(Journeyman level) At least 3 years, (Junior level) applicable 1 to 2 years of experience in
security operations, demonstrating analytical duties and preforming host or network security
analysis.
Proficient in analyzing cyber-attacks, with a deep understanding of attack classifications, stages,
system/application vulnerabilities, and compliance with Department of Defense (DoD) policies
and procedures.
Applied knowledge of network topologies, protocols (e.g., TCP/IP, ICMP, HTTP/S, DNS, SSH,
SMTP, SMB), and experience with tools like Palo Alto, Elastic SIEM, Cribl, Splunk, VMware,
Security Center.
Capable of attack reconstruction based on network traffic, integrating Threat Intelligence, and
familiar with MITRE ATT&CK framework, with the ability to collaborate effectively across
multiple locations.
Desired Skill sets
Knowledge of Operational Technology (OT) or Industrial Control Systems (ICS)
Strong analytical and troubleshooting skills
Able to provide expert content development in Splunk Enterprise Security using tstats and data
models
Understands how to utilize knowledge of latest threats and attack vectors to develop correlation
rules for continuous monitoring on various security appliances
Experience in other tools and protocols as applicable such as Nessus, Endgame, CrowdStrike,
Gray Noise, Shodan, Bacnet, MODBus, SCADA systems, and PCAP
Review logs to determine if relevant data is present to accelerate against data models to work
with existing use cases
Familiar with the operations and functions of Nessus or security center management
Can assist and provide technical input to research, discover, implement hardware and software
Understands importance and fundamentals of logistics and evidence handling
Certified Ethical Hacker (CEH), GIAC Certified Incident Handler (GCIH), or relevant IT technology
certification
Examples of other certifications include:
o Offensive Security Certified Professional (OSCP)
o GIAC Response and Industrial Defense (GRID)
o CERT Certified Computer Security Incident Handler
o ECC CEH (Electronic Commerce Council Certified Ethical Hacker)
o GCIH (GIAC Certified Incident Handler)
o GISF (GIAC Information Security Fundamentals)
o CISSP (Certified Information System Security Professional)
Additional certifications at an equivalent may also be considered.
Auto-ApplyCyber Security Engineer
El Segundo, CA jobs
Millennium Space Systems, A Boeing Company delivers affordable, high-performance space systems for exacting customers. At Millennium, you will be part of a close-knit team working on exciting technological problems. We work in an open environment where ideas are shared across all disciplines, and there are ample opportunities for advancement based on excellence. Superstars are welcome.
At Millennium, we innovate and collaborate to make the world a better place. From the seabed to outer space, you can contribute to work that matters with a company committed to fostering an environment for every teammate that's welcoming, respectful and innovative, with great opportunities for professional growth. Find your future with us.
Job Summary
As a Cyber Security Engineer, you'll collaborate with IT, Information Security, Software Engineers, and our DevOps department to ensure our hardware, software, and overall information systems are secured in the most efficient manner. You'll work to develop new systems, strategies, and procedures to counteract threat vectors that arise within our corporate environment. The ideal candidate will be a meticulous problem solver who has the ability to work under pressure when required and will remain current on latest attack trends and technologies.
This position's internal job code is Security Design Specialist. Our team is currently hiring for levels 2-3.
Responsibilities
Serve as cybersecurity subject matter expert within our corporate environment
Deliver complex technical solutions for planning and development, as well as implementation and support tasks that include failover techniques and recovery
Design, implement, and troubleshoot security information and event management (SIEM) architecture
Create, modify, and upgrade SIEM alerts, dashboards, macros, tags, and field alias
Develop log ingestion and aggregation strategies
Implement Disaster Recovery Plans, Standard Operating Procedures, etc.
Familiarity with Public Key Infrastructure (PKI) and other authentication / encryption frameworks
Create, modify, and upgrade vulnerability scanner scans/reports/dashboards
Provide technical expertise in executing risk management activities such as disaster recovery, continuity of operations, and incident response
Provide administrative support for security policy development and maintenance in a hybrid cloud environment
Collaborate with IT TO develop innovative cloud security concepts and implementations to ensure proper protection of the organization's assets
Minimum Qualifications
Must have an active DoD 8570/8140 IAM security certification such as Security+, CAP, CASP, CISM, CISSP, etc.
Demonstrated experience with Windows, Linux, and Mac operating systems
Knowledge of operations with SIEM and log aggregation concepts, vulnerability scanning, antivirus and DLP notions, IDS/IPS, Nmap, Wireshark and other similar applications
Experience configuring and using vulnerability scanners
Understanding of core networking concepts and how to secure networking devices
Minimum of 3 years of IT or Information Security experience
Strong understanding of at least one of the following programming languages (Bash, PowerShell, Python)
Demonstrated working knowledge of the Risk Management Framework as provided by NIST Special Publication (SP) 800-171, and familiarity with CMMC framework
Ability to communicate complex technological solutions to peers and leadership teams.
Knowledge of cloud security concepts
This position requires an active U.S. Security Clearance (U.S. Citizenship Required). (A U.S. Security Clearance that has been active in the past 24 months is considered active)
Preferred Qualifications
Bachelors or Associates degree in IT, Information Security, Cyber security, Computer Science, Computer Engineering, or a related field
Certifications in networking, Linux, Windows, and/or other prevalent certifications
Familiarity with Computer Incident Response Team (CIRT) activities, including computer forensic analysis
Summary Pay-Range
Please note that the salary information shown below is a general guideline only of what is reasonably expected to be paid for the position. Salaries are based upon candidate experience and qualifications, as well as market and business considerations.
Level 2: $42.09 - $61.89
Level 3: $105,400 - $155,000
Before applying, please note:
Millennium is DDTC-registered, ITAR-compliant Company. This position is located at a facility that requires special access. Applicants MUST be U.S. citizens and eligible for a security clearance. Additionally, applicants must be willing to apply for and maintain a security clearance. We encourage all interested candidates to apply for any open position for which they feel they are qualified.
Applicant Privacy Policy
Mandatory Security Clearance and Access Process Disqualifying Criteria
Auto-ApplySenior Security Operations Engineer (Azure)
Remote
At Jamf, we believe in an open, flexible culture based on respect and trust. Our track record and thriving work environment all stem from the freedom we grant ourselves to get the job done right. We take pride in helping tens of thousands of customers around the globe succeed with Apple.
The secret to our success lies in our connectivity, while operating with a high degree of flexibility. Work-life balance remains our priority while feeling connected is important to maintain our strong culture, achieve our goals, and thrive as #OneJamf.
What you'll do at Jamf:
The Senior Security Operations Engineer will work with the Cloud and Delivery team to continue to build, automate and maintain cloud security services in Azure. They will be responsible for leading the Security Design and Architecture, Log Collection, Security Incident Management, Identity and Access Management, Vulnerability and Patch management. They will be responsible for maintaining operation of the environment in accordance with our service level agreements and providing support to both our staff and customers.
What you can expect to do in this role:
Mentors and advises others in related components and broad fundamental expertise areas
Manages identity and access control in Azure
Responsible for the tools, configuration, administration and related processes around our log file collection and monitoring
Provides the framework, processes and execution to ensure support of Jamfs data leakage prevention
Responsible for Web application firewall and related prevention, detection and mitigation of DDoS attack
Vulnerability Management: Accountable for the prevention, detection and mitigation of vulnerabilities through industry standard tools, configuration, administration and internal procedures
Performs regular firewall audits in line with our procedures. Provides the appropriate documentation, supporting evidence and follow up on identified issues requiring remediation
Responsible for tooling, processes and follow up actions related to our external port scanning needs and practices
Handles the identification, planning and implementation of any server hardening needs. Works collaboratively with Operations and other internal teams to communicate, document and implement
Performs security incident analysis, response and remediation
Participates in design and implementation of security automation workflows
Helps manage security data reporting and visualization platform
#LIRemote
What we are looking for:
Minimum of 4 years IT security principles, security operations, techniques, and technologies. (Required)
Minimum of 4 years experience working with Linux/Unix command line interfaces, including Shell or Python scripting (Required)
Minimum of 4 years experience with industry standard configuration management and deployment tools (e.g. Ansible, Azure Resource Manager or other) (Required)
Minimum of 2 years experience administering some or all of the following Azure Services: (Virtual Machines, SQL Database, Load Balancer, Storage) (Preferred)
Minimum of 2 years experience working with monitoring (Logic Monitor, AppDynamics, Zabbix, etc) and logging tools (Splunk, Sumologic, or ELK (ElasticSearch/Logstash/Kibana)) (Preferred)
Advanced knowledge of containerization concepts and Kubernetes (Preferred)
Basic knowledge of MySQL or Postgres (Preferred)
4 year / Bachelor's Degree (Preferred)
A combination of relevant experience and education may be considered
The following certification is preferred: Microsoft Certified: Azure Security Engineer Associate
OTHER REQUIREMENTS:
This position will perform work that the U.S. government has specified can only be performed by a U.S. citizen located physically in the U.S., and therefore any employment offer will be contingent upon verification of both of these requirements. Applicants who are not U.S. citizens or who are located outside of the U.S. are strongly encouraged to apply for other positions at Jamf, which is an equal-opportunity employer.
SECURITY AND PRIVACY REQUIREMENTS:
Participation in ongoing security training is mandatory
Established security protocols will be adhered to, sensitive data will be handled responsibly, and data protection practices are followed, including understanding relevant privacy regulations and reporting breaches
Acknowledging the Jamf Code of Conduct, where applicable security and privacy policies can be found, is a requirement of all roles at Jamf
How we help you reach your best potential:
Named a 2025 Best Companies to Work For by U.S. News
Named a 2024 Best Technology Company to Work For by U.S. News
Named one of Forbes Most Trusted Companies in 2024
Named a 2024 Best Companies to Work For by U.S. News
Our developers work in agile delivery teams to produce new features, improve software components, and are the subject matter experts for our Jamf product offerings.
You will have the opportunity to make a real and meaningful impact for more than 75,000 global customers with the best Apple device management solution in the world.
We constantly push the boundaries of technology, our developers support new innovations and OS releases the moment they are made available by Apple.
Several Jamf engineers are named in patents and with team names like CatDog, ThunderSnow and Dalek you can expect to have some fun while building cutting-edge software.
You will have the opportunity to work with a small and empowered team where the culture is based on trust, ownership, and respect.
We offer a clear career path that enables you to grow under supportive leadership and management
Visit our Jamf Engineering blog to learn more about the innovative projects our team is working on and what we learn from each challenge we solve. A blog written by engineers, for engineers at medium.com/jamf-engineering
22 of 25 world's most valuable brands rely on Jamf to do their best work (as ranked by Forbes).
Over 100,000 Jamf Nation users, the largest online IT community in the world.
The below annual salary range is a general guideline. Multiple factors are taken into consideration to arrive at the final hourly rate/annual salary to be offered to the selected candidate. Factors include, but are not limited to the scope and responsibilities of the role, the selected candidate's work experience, education and training, the work location as well as market and business considerations.
Pay Transparency Range$103,100-$219,700 USD
What it means to be a Jamf?
We are a team of free-thinkers, can-doers, and problem-crushers. We value humility and the relentless pursuit of knowledge. Our culture flows from a spirit of selflessness and relentless self-improvement - driving both personal growth and collective progress throughout our company. We unite around common goals while respecting personal approaches, believing that fulfilled individuals create a thriving, vibrant workplace.
Our aim is simple: hire exceptionally good people who are incredibly good at what they do and let them do it. We provide the support and resources to let everyone be their authentic, best selves at work, at rest, and at play. We are committed to supporting the continual improvement of Apple in the workplace, the organizations that rely on them and the people who keep it all running smoothly.
Above it all, waves our banner of #OneJamf - and the knowledge that when we stand together, we accomplish so much more than we could alone. We seek individuals who share this unwavering journey toward growth to join us in our quest for constant improvement.
What does Jamf do?
Jamf extends the legendary Apple experience people enjoy in their personal lives to the workplace. We believe the experience of using a device at work or school should feel the same, and be as secure as, using a personal device. With Jamf, customers are able to confidently automate Mac, iPad, iPhone and Apple TV deployment, management, and security - anytime, anywhere - to protect the data and applications used by employees in the workplace, students learning in the classroom, and streamline communications in healthcare between patients and providers. More than 2,500 Jamf strong worldwide, we are free-thinkers, can-doers, and problems crushers who are encouraged to bring their whole selves to work each and every day.
Get social with us and follow the conversation at #OneJamf
Jamf is committed to creating an inclusive & supportive work environment for all candidates and employees. Candidates with disabilities or religious beliefs are encouraged to reach out if they need additional support or alternative options to our recruiting processes to accommodate their disability or religious belief. If you need an accommodation, please contact your Recruiter or Recruiting Coordinator directly. Requests for accommodation will be handled confidentially by Recruiting and will not be shared with the hiring manager. Jamf is an equal opportunity employer and does not discriminate against individuals who request reasonable accommodation for disability or religious beliefs. To request accommodations please email us at *******************
Auto-ApplyCyber Threat Analyst, GTIG Intelligence Delivery, Mandiant
Virginia, MN jobs
Apply share * link Copy link * email Email a friend info_outline XThis position requires onsite client-facing work 3 days a week in Arlington, VA.Note: Google's hybrid workplace includes remote roles. By applying to this position you will have an opportunity to share your preferred working location from the following:
Remote locations: Virginia, USA; District of Columbia, USA.
Minimum qualifications:
* Bachelor's degree in Computer Science, Information Systems, Cybersecurity, a related technical field, or equivalent practical experience.
* 3 years of experience assessing and developing cybersecurity solutions and programs across security domains.
* 3 years of experience in an intelligence practitioner role.
* Ability to travel up to 30% of the time.
* Must possess an active Top Secret/SCI security clearance.
Preferred qualifications:
* Certifications related to specific cloud platforms.
* Experience implementing industry-leading practices around cyber risks and cloud security for clients' cloud security frameworks using industry standards.
* Experience in identifying and mitigating cyber threats from Chinese state-sponsored actors.
* Experience with cloud governance, with the ability to convey governance principles to cloud computing in terms of policies.
* Excellent time and project management skills.
About the job
As a Cyber Threat Analyst for Mandiant Intelligence Delivery, you will be supporting a government customer with the goal of developing and leveraging the Mandiant Threat Intelligence portfolio to help the customer deliver on their mission. You will be an expert at balancing priorities and demonstrating your efficient communication skills as well as familiarity with government mission space. You will work directly with clients to understand their threat concerns and to set expectations for deliverables.
Mandiant is a recognized leader in dynamic cyber defense, threat intelligence, and incident response services. By scaling decades of frontline experience, Mandiant helps organizations be confident in their readiness to defend against and respond to cyber threats. Mandiant is now part of Google Cloud.Part of Google Cloud, Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. Mandiant's cybersecurity expertise has earned the trust of security professionals and company executives around the world. Our unique combination of renowned frontline experience responding to some of the most complex breaches, nation-state grade threat intelligence, machine intelligence, and the industry's best security validation ensures that Mandiant knows more about today's advanced threats than anyone.
The US base salary range for this full-time position is $108,000-$155,000 + bonus + equity + benefits. Our salary ranges are determined by role, level, and location. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific salary range for your preferred location during the hiring process.
Please note that the compensation details listed in US role postings reflect the base salary only, and do not include bonus, equity, or benefits. Learn more about benefits at Google.
Responsibilities
* Evaluate current and emerging tools and best-practices for tracking advanced persistent threats, tools, techniques, and procedures (TTPs) of attacker's motivations, industry and attacker trends.
* Perform tactical, and operational research and analysis of adversarial cyber threats.
* Present tactical intelligence about threat groups, the methodologies they use, and the motivations behind their activity.
* Work with customers to determine their intelligence needs and requirements.
* Prepare and deliver briefings and reports to the client's executives, security team, or fellow analysts.
Cyber Security Engineer Co-op - Summer 2026
New York, NY jobs
IEX (IEX Group, Inc.) is an exchange operator and technology company dedicated to innovating for performance in capital markets. Founded in 2012, IEX launched a new kind of securities exchange in 2016 that combines a transparent business model and unique architecture designed to protect investors. Today, IEX applies its proprietary technology and experience to drive performance across asset classes, serve all investors, and advocate for transparent and competitive markets.
IEX is looking for a Cyber Security Engineer Co-Op to work with the IEX Information Security team. The opportunity will include learning the different aspects of an information security program while contributing to tasks and initiatives in support of security operations, compliance, and program improvements. This position is an opportunity to help maintain and improve IEX's security posture while gaining the experience of working for a national securities exchange and true fintech organization.
IEX Information Security is responsible for protecting IEX from cyber security threats, so that our employees can focus on providing our clients performance, fairness, and transparency in the market.
About You:
Ability to work 40 hours/week for a full semester (4-6 months) Co-Op rotation, starting June 2026
Pursuing a Bachelor's degree in Information Security, Computer Engineering, Computer Science, or a related field
Self-starter who is proactive and entrepreneurial
Organized and detail-oriented
Excellent analytical, critical thinking, and problem-solving skills
Knowledge of technology and security topics including operating systems, computer security, network security, and/or application security
You are passionate about information security
You are not afraid to ask questions and independently research solutions to find the answers and apply them to your work
What You'll Do:
Help IEX Information Security perform compliance and operational tasks contributing to environment oversight and end user training and awareness.
Provide meaningful impact to IEX Information Security. Your work will not sit on a shelf, collecting dust. Leave a legacy!
Gain skills applicable to your future career.
Work alongside a strong team of InfoSec practitioners.
Learn more about how security works in a Financial Services enterprise so you can home in on your areas of interest to create a forward-looking plan.
Desired Skills:
Experience scripting or coding (e.g., Python, PowerShell, using API's, etc.)
Experience with endpoint/network hardening or logging
Experience with SIEM, SOAR, EDR, and/or DLP technologies
Our job titles may span more than one career level. The starting base pay is $30.00/hour for this NY-based position. The actual base pay is dependent upon many factors, such as: training, transferable skills, work experience, business needs and market demands. The base pay range is subject to change and may be modified in the future.
Here at IEX, we are dedicated to an inclusive workplace and culture. We are an Equal Opportunity Employer that does not discriminate on the basis of actual or perceived race, color, creed, religion, alienage or national origin, ancestry, citizenship status, age, disability or handicap, sex, marital status, veteran status, sexual orientation, genetic information or any other characteristic protected by applicable federal, state or local laws. This policy not only complies with all applicable laws and protects workers' rights but is vital to IEX's overall mission and values.
Auto-ApplyCyber Security
Rosemead, CA jobs
H i , This is Sujith from KRG Technologies ; We are looking Cyber Security at Rose Mead, CA for the below mentioned . Kindly forward me your resume, rate and contact details for further process. I also request you to forward this opportunity to your friends or colleagues; so that we can help someone who may be in search of a job or looking for a change.
Job Title: Cyber Security
Location:
Rose Mead, CA
Duration: CONTRACT(6-12months)
Job Description:
Must have 5-7 yrs of Cyber security experience.
Have some experience around Vulnerability assessment & Pen test remediation. Able to explain vulnerabilities and remediation.
Have some exposure to OWASP Top 10.
Have some exposure to SDLC, development.
Any experience in NERC-CIP would be great.
Experience around Code review would be added advantage.
Thanks & Regards
Qualifications
Cyber security experience with vulnerability and risk assessment
Additional Information
All your information will be kept confidential according to EEO guidelines.
Principal Cyber Security Engineer
San Jose, CA jobs
A Principal Cyber Security Engineer is a seasoned, hands-on role responsible for monitoring an organization's networks, systems, applications, external industrial events, and trends for security threats. This role involves analyzing and developing tools in python for security data, identifying Vulnerabilities, and responding to security incidents. Cyber Security Analysts work closely with other security professionals to maintain the organization's security posture.
Principal Cyber Security Engineer has the following responsibilities:
* Monitor networks, systems, and applications for security threats
* Develop security tools programming in python to protect applications against security threats
* Perform Threat Hunting using industry and A10 specific datasets to
* identify threats to the company and our customers
* Incident Response for threats against the company and our customers
* Monitor industry trends in various areas of cybersecurity
* Provide cybersecurity direction through insightful writeups and presentations
* Conduct periodic penetration tests and vulnerability assessments
Principal Cyber Security Engineer requires the following skills:
* Master's degree in Computer Science or Information Technology, or a related field with 5+ years in Cyber Security with 10+ years overall experience
* 1+ years python programming experience
* Knowledge of security principles and best practices
* Understanding of Threat Hunting methods
* Basic ELK stack expertise
* Operational familiarity with an array of host, application, cloud and network cybersecurity technologies
* Threat Intelligence and other Open source intelligence
* Basic binary reverse engineering using tools like Ghidra or IDA
* IP networking troubleshooting and design
* Knowledge of programming languages such as Python and Go
* Operational understanding of penetration testing tools
* Proven track record of identifying and remediating cybersecurity threats
* Analytical and problem-solving skills
* Excellent communication and interpersonal skills
Principal Cyber Security Analyst may use the following tools and software:
* Security information and event management (SIEM) systems
* Intrusion detection/prevention systems (IDS/IPS)
* Firewalls and other Network security appliances
* Vulnerability scanners and penetration testing tools
* Malware analysis tools
* Forensic tools
* Programming languages, such as Python and Go
Preferred Certifications:
CompTIA Security+, CEH, or GIAC
A10 Networks is an equal opportunity employer and a VEVRAA federal subcontractor. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability status, protected veteran status, or any other characteristic protected by law. A10 also complies with all applicable state and local laws governing nondiscrimination in employment.
#LI-AN1
Compensation: up to $220K USD
Auto-ApplySenior Security Operations Engineer (Azure)
Minneapolis, MN jobs
At Jamf, we believe in an open, flexible culture based on respect and trust. Our track record and thriving work environment all stem from the freedom we grant ourselves to get the job done right. We take pride in helping tens of thousands of customers around the globe succeed with Apple.
The secret to our success lies in our connectivity, while operating with a high degree of flexibility. Work-life balance remains our priority while feeling connected is important to maintain our strong culture, achieve our goals, and thrive as #OneJamf.
What you'll do at Jamf:
The Senior Security Operations Engineer will work with the Cloud and Delivery team to continue to build, automate and maintain cloud security services in Azure. They will be responsible for leading the Security Design and Architecture, Log Collection, Security Incident Management, Identity and Access Management, Vulnerability and Patch management. They will be responsible for maintaining operation of the environment in accordance with our service level agreements and providing support to both our staff and customers.
What you can expect to do in this role:
Mentors and advises others in related components and broad fundamental expertise areas
Manages identity and access control in Azure
Responsible for the tools, configuration, administration and related processes around our log file collection and monitoring
Provides the framework, processes and execution to ensure support of Jamfs data leakage prevention
Responsible for Web application firewall and related prevention, detection and mitigation of DDoS attack
Vulnerability Management: Accountable for the prevention, detection and mitigation of vulnerabilities through industry standard tools, configuration, administration and internal procedures
Performs regular firewall audits in line with our procedures. Provides the appropriate documentation, supporting evidence and follow up on identified issues requiring remediation
Responsible for tooling, processes and follow up actions related to our external port scanning needs and practices
Handles the identification, planning and implementation of any server hardening needs. Works collaboratively with Operations and other internal teams to communicate, document and implement
Performs security incident analysis, response and remediation
Participates in design and implementation of security automation workflows
Helps manage security data reporting and visualization platform
#LIRemote
What we are looking for:
Minimum of 4 years IT security principles, security operations, techniques, and technologies. (Required)
Minimum of 4 years experience working with Linux/Unix command line interfaces, including Shell or Python scripting (Required)
Minimum of 4 years experience with industry standard configuration management and deployment tools (e.g. Ansible, Azure Resource Manager or other) (Required)
Minimum of 2 years experience administering some or all of the following Azure Services: (Virtual Machines, SQL Database, Load Balancer, Storage) (Preferred)
Minimum of 2 years experience working with monitoring (Logic Monitor, AppDynamics, Zabbix, etc) and logging tools (Splunk, Sumologic, or ELK (ElasticSearch/Logstash/Kibana)) (Preferred)
Advanced knowledge of containerization concepts and Kubernetes (Preferred)
Basic knowledge of MySQL or Postgres (Preferred)
4 year / Bachelor's Degree (Preferred)
A combination of relevant experience and education may be considered
The following certification is preferred: Microsoft Certified: Azure Security Engineer Associate
OTHER REQUIREMENTS:
This position will perform work that the U.S. government has specified can only be performed by a U.S. citizen located physically in the U.S., and therefore any employment offer will be contingent upon verification of both of these requirements. Applicants who are not U.S. citizens or who are located outside of the U.S. are strongly encouraged to apply for other positions at Jamf, which is an equal-opportunity employer.
SECURITY AND PRIVACY REQUIREMENTS:
Participation in ongoing security training is mandatory
Established security protocols will be adhered to, sensitive data will be handled responsibly, and data protection practices are followed, including understanding relevant privacy regulations and reporting breaches
Acknowledging the Jamf Code of Conduct, where applicable security and privacy policies can be found, is a requirement of all roles at Jamf
How we help you reach your best potential:
Named a 2025 Best Companies to Work For by U.S. News
Named a 2024 Best Technology Company to Work For by U.S. News
Named one of Forbes Most Trusted Companies in 2024
Named a 2024 Best Companies to Work For by U.S. News
Our developers work in agile delivery teams to produce new features, improve software components, and are the subject matter experts for our Jamf product offerings.
You will have the opportunity to make a real and meaningful impact for more than 75,000 global customers with the best Apple device management solution in the world.
We constantly push the boundaries of technology, our developers support new innovations and OS releases the moment they are made available by Apple.
Several Jamf engineers are named in patents and with team names like CatDog, ThunderSnow and Dalek you can expect to have some fun while building cutting-edge software.
You will have the opportunity to work with a small and empowered team where the culture is based on trust, ownership, and respect.
We offer a clear career path that enables you to grow under supportive leadership and management
Visit our Jamf Engineering blog to learn more about the innovative projects our team is working on and what we learn from each challenge we solve. A blog written by engineers, for engineers at medium.com/jamf-engineering
22 of 25 world's most valuable brands rely on Jamf to do their best work (as ranked by Forbes).
Over 100,000 Jamf Nation users, the largest online IT community in the world.
The below annual salary range is a general guideline. Multiple factors are taken into consideration to arrive at the final hourly rate/annual salary to be offered to the selected candidate. Factors include, but are not limited to the scope and responsibilities of the role, the selected candidate's work experience, education and training, the work location as well as market and business considerations.
Pay Transparency Range$103,100-$219,700 USD
What it means to be a Jamf?
We are a team of free-thinkers, can-doers, and problem-crushers. We value humility and the relentless pursuit of knowledge. Our culture flows from a spirit of selflessness and relentless self-improvement - driving both personal growth and collective progress throughout our company. We unite around common goals while respecting personal approaches, believing that fulfilled individuals create a thriving, vibrant workplace.
Our aim is simple: hire exceptionally good people who are incredibly good at what they do and let them do it. We provide the support and resources to let everyone be their authentic, best selves at work, at rest, and at play. We are committed to supporting the continual improvement of Apple in the workplace, the organizations that rely on them and the people who keep it all running smoothly.
Above it all, waves our banner of #OneJamf - and the knowledge that when we stand together, we accomplish so much more than we could alone. We seek individuals who share this unwavering journey toward growth to join us in our quest for constant improvement.
What does Jamf do?
Jamf extends the legendary Apple experience people enjoy in their personal lives to the workplace. We believe the experience of using a device at work or school should feel the same, and be as secure as, using a personal device. With Jamf, customers are able to confidently automate Mac, iPad, iPhone and Apple TV deployment, management, and security - anytime, anywhere - to protect the data and applications used by employees in the workplace, students learning in the classroom, and streamline communications in healthcare between patients and providers. More than 2,500 Jamf strong worldwide, we are free-thinkers, can-doers, and problems crushers who are encouraged to bring their whole selves to work each and every day.
Get social with us and follow the conversation at #OneJamf
Jamf is committed to creating an inclusive & supportive work environment for all candidates and employees. Candidates with disabilities or religious beliefs are encouraged to reach out if they need additional support or alternative options to our recruiting processes to accommodate their disability or religious belief. If you need an accommodation, please contact your Recruiter or Recruiting Coordinator directly. Requests for accommodation will be handled confidentially by Recruiting and will not be shared with the hiring manager. Jamf is an equal opportunity employer and does not discriminate against individuals who request reasonable accommodation for disability or religious beliefs. To request accommodations please email us at *******************
Auto-Apply