Apply
Must be a US Citizen to meet customer and compliance requirements, including potential access to classified information. This position requires onsite client-facing work 5 days a week in Honolulu, Hawaii.
Bachelor's degree in Computer Science, IT, or related field or equivalent practical experience.
5 years of experience with security assessments, security design reviews, or threat modeling.
5 years of experience with security engineering, computer and network security, and security protocols.
Experience delivering comprehensive security solutioning through design, coding, configuration, and deployment.
Must possess an active Top Secret/SCI Security Clearance.
Must currently have or be able to obtain advanced DoD 8140 DCWF certification.
Preferred qualifications
Certifications in CISSP, CISM, GCIH, GCIA, or OSCP.
Experience in a regulated industry (e.g., finance, healthcare, government).
Experience securing cloud environments (Cloud Computing Platform, Google Cloud Platform).
Understanding of cloud security principles and best practices.
About the job
Security is at the core of Google's design and development process: it is built into the DNA of our products. The same is true of our offices. You're an expert who shares our seriousness about security and our commitment to confidentiality. You'll collaborate with our Facilities Management team to create innovative security strategies, investigate breaches and create risk assessment plans for the future. You believe that providing effective security doesn't come at the expense of customer service - you will be our bodyguard (and our long lost pal).
The GPS Cyber Defense and Security Operations Group leads our Security Operations (SECOPs) function for a range of GPS platforms and services. Combining Mandiant's deep security experience with Google technologies, our team sets the standard in Security Engineering, Assessment, and Operations across Government Cloud programs.
Google Public Sector brings the magic of Google to the mission of government and education with solutions purpose-built for enterprises. We focus on helping United States public sector institutions accelerate their digital transformations, and we continue to make significant investments and grow our team to meet the complex needs of local, state and federal government and educational institutions.
The US base salary range for this full-time position is $166,000-$244,000 + bonus + equity + benefits. Our salary ranges are determined by role, level, and location. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific salary range for your preferred location during the hiring process.
Please note that the compensation details listed in US role postings reflect the base salary only, and do not include bonus, equity, or benefits. Learn more about benefits at Google.
Responsibilities
Implement security monitoring strategies, incident response plans, and security awareness programs.
Oversee the deployment and operation of security information and event management (SIEM) systems, intrusion detection/prevention systems (IDS/IPS) and other security tools.
Leverage cyber threat intelligence to conduct ongoing network hunt activities and identify active and dormant threats within the environment.
Develop and implement custom-built AI-driven security detections and workflows.
Google is proud to be an equal opportunity and affirmative action employer. We are committed to building a workforce that is representative of the users we serve, creating a culture of belonging, and providing an equal employment opportunity regardless of race, creed, color, religion, gender, sexual orientation, gender identity/expression, national origin, disability, age, genetic information, veteran status, marital status, pregnancy or related condition (including breastfeeding), expecting or parents-to-be, criminal histories consistent with legal requirements, or any other basis protected by law. See also Google's EEO Policy, Know your rights: workplace discrimination is illegal, Belonging at Google, and How we hire.
Google is a global company and, in order to facilitate efficient collaboration and communication globally, English proficiency is a requirement for all roles unless stated otherwise in the job posting.
To all recruitment agencies: Google does not accept agency resumes. Please do not forward resumes to our jobs alias, Google employees, or any other organization location. Google is not responsible for any fees related to unsolicited resumes.
#J-18808-Ljbffr
$123k-155k yearly est. 3d ago
Looking for a job?
Let Zippia find it for you.
Acquisition Security Analyst
Mantech 4.5
Los Angeles, CA jobs
MANTECH seeks a motivated, career and customer-oriented Acquisition SecurityAnalyst II to join our team in El Segundo, CA.
The Acquisition SecurityAnalyst II will assist the Government Program Manager with the development and implementation of comprehensive program protection methodologies to protect advanced technology programs throughout the system's lifecycle.
Responsibilities include but are not limited to:
In-depth lifecycle program analysis to identify critical program information (CPI), Critical System Resources (CSR), and their associated vulnerabilities. Assist with the identification and implementation of countermeasures. Develop and implement a risk management-based program protection plan and strategy.
Provide security recommendations to the PM, GSSO, and cognizant security authorities as to the Air Force acquisition and sustainment process.
Maintain a working relationship with the PM, Contracting Officer and contractor security officers to ensure a standardized and correct format/process is utilized for all DD Form 254 efforts throughout the acquisition and sustainment lifecycle, in coordination with Program Security Officers.
Conduct analysis of foreign intelligence threats against programs involving customer's critical research, sensitive technologies or CPI.
Prepare and produce analytical products from numerous resources, to include various databases, to ensure a real-time, tailored product is provided.
Write, review, and/or edit Security Classification Guides (SCG), Exposure Contingency Plans (ECP), Managed Access Plans (MAP), Security Operating Procedures (SOPs), System Test Plans (STP)
Provide technical analysis and OPSEC support to SMC or AFSPC Special programs and other associated operations, missions, and organizational elements involved in developing system requirements to associated systems RDT&E.
Minimum Qualifications:
Bachelor's degree in a related area; an additional 4 years of related experience might be considered for a degree.
10+ years of related experience with acquisition programs
6+ years of experience with SCI programs.
Must be familiar with security policy/manuals and the appropriate ICDs/JAFANs/DOD Manuals and other guiding policy documents.
Must have extensive knowledge of the DD Form 254 and how it is incorporated in the Air Force acquisition process.
Willingness to travel within the scope of the Program's Area of Responsibility (AOR) (note- could be extensive, and will include both air and ground transportation)
Preferred Qualifications:
4+ years of experience with SAR program acquisitions desired.
Working knowledge of Microsoft Office (Word, PowerPoint, and Excel)
Possess a high degree of originality, creativity, initiative requiring minimal supervision.
Have the ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners.
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a polygraph.
Physical Requirements:
Must be able to remain in a stationary position 50%.
Needs to occasionally move about inside the office to access file cabinets, office machinery, etc.
Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer.
Frequently communicates with co-workers, management and customers, which may involve delivering presentations. Must be able to exchange accurate information in these situations.
$67k-89k yearly est. 1d ago
Lead Cyber Threat Analyst
Directviz Solutions, LLC 3.6
Washington, DC jobs
DirectViz Solutions, (DVS) is a rapidly growing government contractor that provides strategic services that meet mission IT needs for government customers. DVS offers competitive compensation, comprehensive medical plans, 401k match, PTO accrual, professional development reimbursement, corporate-funded technology certifications, and employee recognition programs. At DVS, we recognize that our employees are our number one resource. If you are a problem-solving people-person, apply today!
Location
Washington, DC
Position
Lead Cyber Threat Analyst
Location: Washington, DC
Position Summary
The Lead Cyber Threat Analyst serves as the technical and operational lead for enterprise cybersecurity operations, overseeing approximately 63 systems and ensuring compliance with all federal security standards. This role drives the organization\'s threat detection, analysis, and response strategy, leads the Computer Security Incident Response Center (CSIRC), and manages enterprise security monitoring tools within the Enterprise Security Operations Center (ESOC).
The position requires deep expertise in cybersecurity frameworks, threat intelligence, and vulnerability management, combined with strong leadership, analytical, and communication skills to guide analysts, coordinate incident response, and safeguard sensitive financial and operational systems.
Key Responsibilities
Lead enterprise-wide cybersecurity operations across ~63 systems, ensuring continuous protection and compliance with federal security standards.
Oversee daily security monitoring, analysis, and response activities within the ESOC.
Direct 24/7 CSIRC operations, including incident triage, containment, and recovery.
Develop and maintain comprehensive security documentation, including System Security Plans (SSPs), Privacy Impact Assessments (PIAs), and RMF artifacts.
Conduct annual Security Control Assessments (SCAs) and evaluate new systems and applications.
Identify, track, and remediate vulnerabilities and risks across enterprise environments.
Develop and maintain a real-time Cyber Threat Dashboard for senior leadership reporting and situational awareness.
Lead the Vulnerability Management Program, including prioritization, patching, and remediation oversight.
Monitor and analyze network traffic for potential intrusions, unauthorized activity, and anomalous behavior.
Manage security tools, threat intelligence feeds, and automation solutions supporting the ESOC mission.
Provide training, mentoring, and technical guidance to cybersecurityanalysts and SOC staff.
Oversee incident handling involving Personally Identifiable Information (PII) and ensure proper documentation and escalation.
Collaborate with cross-functional and government stakeholders to align operations with NIST, FISMA, and organizational security policies.
Support the protection and compliance of financial systems under the OCFO through proactive risk management.
Maintain system and application security posture, ensuring ongoing compliance and operational integrity.
Qualifications
Bachelor\'s degree in Computer Science, Information Technology, Engineering, or a related field.
Minimum of 10 years of progressive IT or technology experience, including at least 5 years within the past decade supporting large-scale federal technical contracts.
At least 7 years of cybersecurity experience, with 5 years focused on threat analysis in SOC or CSIRC environments supporting government systems.
Required Certification: Certified Information Systems Security Professional (CISSP).
Preferred Certifications: GIAC Certified Intrusion Analyst (GCIA), Certified Ethical Hacker (CEH), CompTIA CybersecurityAnalyst (CySA+).
Required: Information Technology Infrastructure Library (ITIL) 4 Foundation certification.
Strong understanding of cybersecurity frameworks and principles (NIST 800-53, FISMA, RMF, ISO 27001).
Proven experience with enterprise risk management, incident response, and vulnerability remediation.
Excellent analytical and problem-solving skills, with strong attention to detail.
Effective communication and interpersonal skills to collaborate across technical, executive, and federal teams.
Ability to lead multiple projects simultaneously and deliver results under tight deadlines.
Physical and Mental Qualifications
Be able to maintain awareness during scheduled working hours.
Prolonged periods sitting or standing at desk and working on a computer (mouse and keyboard).
Able to lift up to 15 pounds.
Excellent verbal and written communication; good command of the English language.
Execute tasks independently and work as a team.
Learns and memories routine tasks.
Strong organizational, grammar, business correspondence, and self-management skills.
Candidates must be able to perform the essential functions of the position satisfactorily. If requested, reasonable accommodation will be provided for employees with disabilities.
DVS retains the right to change or assign other duties to this position.
Equal Opportunity
DirectViz Solutions, LLC (DVS) is an equal opportunity employer and prohibits discrimination and harassment against any employee or applicant for employment because of race, color, sex (including pregnancy), age, gender identity, creed, religion, national origin, sexual orientation, marital status, genetic information, disability, political affiliation, protected veteran status, or any other status protected by federal, state or local law.
DVS has a zero-tolerance policy for harassment, threats, coercion, discrimination, and intimidation. Employees may file a complaint or exercise any right protected by Executive Order 11246, Section 503 of the Rehabilitation Act of 1973, as amended, Section 4212 of the Vietnam Era Veterans Readjustment Assistance Act of 1974, or the Veterans Employment Opportunities Act of 1998.
#J-18808-Ljbffr
$87k-115k yearly est. 5d ago
Cyber Security Engineer
Lawrence Berkeley National Laboratory 4.4
Berkeley, CA jobs
The National Energy Research Scientific Computing Center (NERSC) at Lawrence Berkeley National Laboratory (LBNL) is inviting applications for the position of CyberSecurity Engineer. NERSC's mission is to accelerate scientific discovery through high performance computing and data analysis for the DOE Office of Science programs. NERSC provides critical HPC and data systems and support for NERSC's 10,000 users researching alternative energy sources, climate science, energy efficiency, environmental science and other DOE mission areas.
In this exciting role, you will be involved in all aspects of cybersecurity at NERSC, working both independently and collaboratively with the rest of the security team to monitor for malicious and unauthorized activity, perform vulnerability scanning and application security testing, participate or lead responses to security incidents, work with other NERSC staff and end-users to provide security guidance, perform security assessments and reviews, assist in the remediation or mitigation of cybersecurity issues, and contribute to the NERSC strategy as we move to exascale and beyond. At NERSC, you will work in a collaborative, interdisciplinary environment with opportunities to explore emerging technologies, become involved in cross-team projects, and attend NERSC seminars on a wide range of scientific and technical subjects.
Responsibilities
Perform security duties including monitoring for potential threats, proactively examining network traffic and log data, investigating anomalous activity, forensic analysis, and resolution of security incidents.
Support and/or lead cyber incident response activities, participating in the full incident response lifecycle, from initial detection through resolution and post-incident documentation.
Maintain up-to-date awareness of cybersecurity threats and trends by monitoring a variety of information sources. Assess emerging security issues to determine risk and impact to the center, advise on appropriate response strategies, and coordinate mitigation efforts across teams.
Assist with vulnerability assessment activities, including configuration of scanning tools, assessment of vulnerabilities reported from a variety of sources, prioritization and triage of discovered vulnerabilities, and working closely with NERSC staff and end users to guide remediation efforts.
Participate in 24/7 on-call rotation, occasionally working outside of scheduled hours as needed.
Contribute to the design and development of NERSC's security architecture, identify and address operational gaps in monitoring and detection capabilities, and help evaluate and develop new cybersecurity tools and technologies.
Participate or lead efforts to upgrade existing systems to meet evolving needs, including the specification, purchase, installation, configuration, and deployment of new hardware and security services.
Perform system administration tasks, troubleshooting, and hardware maintenance and support as needed. Help maintain and manage existing cybersecurity systems using automation tools.
Develop comprehensive documentation of the team's technical systems, processes, and procedures.
Develop and add new signatures to IDS and monitoring infrastructure based on emerging threats and data from past incidents, ensuring detection capabilities align with the latest attack vectors and vulnerabilities. Regularly review and refine existing rules and signatures to enhance accuracy, reducing false positives and negatives.
Lead or support the design and implementation of security initiatives, including a Zero Trust strategy, that reduce and mitigate risk while continuing to enable NERSC's open science mission.
Promote a strong security culture through outreach, technical consulting, and security awareness activities.
Provide guidance on security best practices, assist with the implementation of security controls, and effectively communicate security policies and requirements to NERSC staff and users.
Collaborate closely with NERSC system engineers and software developers to integrate cybersecurity tools and processes throughout the center.
Conduct in-depth security reviews and risk assessments, analyzing both technical and non-technical factors to identify weaknesses in existing and proposed deployments. Document review findings in detailed reports, providing actionable recommendations for addressing identified security issues and mitigating risk.
Serve as a security subject matter expert on cross-functional projects and initiatives, offering guidance based on security best practices, identifying and communicating security issues, and collaborating with others to ensure security is a key consideration across all phases of the project.
Contribute to the development of cybersecurity requirements, translating high-level policy into actionable security controls and guidelines. Assist with maintaining and updating documentation in a central repository.
Create technical guides, best practices, and other resources to assist NERSC staff and users in understanding.
May lead technical initiatives or projects focused on advancing security in areas such as containerized environments, secure software practices, Zero Trust Architecture, and secure data movement in HPC and scientific workflows.
Qualifications
Typical requires a minimum of 8 years of related experience with a Bachelor's degree; or 6 years and a Master's degree; or equivalent experience.
Experience administering Linux/Unix systems or configuring network security devices.
Experience using cybersecurity tools and technologies, such as intrusion detection/prevention systems, firewalls, SIEM platforms, or vulnerability scanners, with demonstrated proficiency in at least one.
Experience designing, implementing, and maintaining network traffic capture and monitoring solutions for complex, high-speed network environments.
Experience performing or supporting incident response activities, including investigation, analysis, containment, and resolution of incidents.
Experience collecting, parsing, and analyzing log and telemetry data from a variety of systems (e.g., servers, network devices, user sessions) to detect and respond to incidents.
Experience leading the implementation or administration of IT infrastructure, leading projects or teams, or providing technical direction for operations or security initiatives.
Experience developing scripts or programs in Python, Shell, C, C++, or similar languages.
Knowledge of common security vulnerabilities and mitigations, attacker TTPs and associated detection methods, and an understanding of core cybersecurity principles.
Demonstrated ability to work in a Linux or UNIX environment, primarily at a Command Line Interface (CLI).
Ability to troubleshoot and resolve complex issues where analysis of situations or data requires an in-depth evaluation of variable factors.
In-depth knowledge of network security and upper-layer protocols.
Ability to network and collaborate with key contacts beyond one's area of expertise, and to work effectively both independently and within interdisciplinary teams.
Ability to manage multiple tasks and respond to rapidly changing priorities.
Excellent oral and written communication skills.
Desired skills/knowledge: Experience working in High Performance Computing, higher education, or research environments.
Experience implementing Zero Trust architectures, securing container platforms and workloads, or integrating security into development and deployment processes.
Experience conducting policy compliance activities, such as auditing against cybersecurity frameworks (e.g., NIST, ISO 27001, CIS Controls), and performing vulnerability or risk assessments.
Experience securing large-scale computing or open network environments with broadly accessible infrastructure.
Familiarity with configuration automation tools such as puppet or ansible.
Knowledge of dual-stack (IPv4/IPv6) and IPv6-only network environments, including common security challenges and strategies.
Knowledge of API security, including secure API design principles and familiarity with OAuth 2.0, JWT, and API key management.
Understanding of secure coding practices, with the ability to review source code for vulnerabilities and collaborate with development teams on secure solutions.
Knowledge of data analytics, machine learning, or statistical models and their application to security analysis.
We're here for the same mission, to bring science solutions to the world. Join our team and YOU will play a supporting role in our goal to address global challenges! Have a high level of impact and work for an organization associated with 17 Nobel Prizes!
We invest in our employees by offering a total rewards package you can count on:
Exceptional health and retirement benefits, including pension or 401K-style plans
A culture where you'll belong - we are invested in our teams!
In addition to accruing vacation and sick time, we also have a Winter Holiday Shutdown every year.
Parental bonding leave (for both mothers and fathers)
Additional information
Appointment type: This is a full-time, career appointment, exempt (monthly paid) from overtime pay.
Salary range: The expected salary for this position is $156,864 - $191,724, which fits into the full salary of $139,440 - $235,308 depending upon the candidate's skills, knowledge, and abilities. This includes education, certifications, and years of experience.
Background check: This position is subject to a background check. Any convictions will be evaluated to determine if they directly relate to the responsibilities and requirements of the position. Having a conviction history will not automatically disqualify an applicant from being considered for employment.
Work modality: This position requires substantial on-site presence, but is eligible for a flexible work mode, and hybrid schedules may be considered. Hybrid work is a combination of performing work on-site at Lawrence Berkeley National Lab, 1 Cyclotron Road, Berkeley, CA and some telework. Individuals working a hybrid schedule must reside within 150 miles of Berkeley Lab. Work schedules are dependent on business needs.
Want to learn more about working at Berkeley Lab? Please visit: careers.lbl.gov
Equal Employment Opportunity Employer: The foundation of Berkeley Lab is our Stewardship Values: Team Science, Service, Trust, Innovation, and Respect; and we strive to build community with these shared values and commitments. Berkeley Lab is an Equal Opportunity Employer. We heartily welcome applications from all who could contribute to the Lab's mission of leading scientific discovery, excellence, and professionalism. In support of our rich global community, all qualified applicants will be considered for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, age, protected veteran status, or other protected categories under State and Federal law.
Berkeley Lab is a University of California employer. It is the policy of the University of California to undertake affirmative action and anti-discrimination efforts, consistent with its obligations as a Federal and State contractor.
Misconduct Disclosure Requirement: As a condition of employment, the finalist will be required to disclose if they are subject to any final administrative or judicial decisions within the last seven years determining that they committed any misconduct, are currently being investigated for misconduct, left a position during an investigation for alleged misconduct, or have filed an appeal with a previous employer.
#J-18808-Ljbffr
A leading research laboratory is seeking a CyberSecurity Engineer to join their team in Berkeley, CA. The position involves monitoring for security threats, responding to incidents, and contributing to the laboratory's security architecture. Ideal candidates will have extensive experience with cybersecurity tools, incident response, and network security, along with strong communication skills. This full-time role offers a competitive salary and exceptional benefits, promoting a culture of innovation and teamwork.
#J-18808-Ljbffr
$109k-148k yearly est. 5d ago
Cyber Security Engineer SME - Associate Director
Dovel Technologies, Inc. 4.2
Palo Alto, CA jobs
CyberSecurity Engineer SME - Associate Director page is loaded## CyberSecurity Engineer SME - Associate Directorlocations: US - Remote (Any location)time type: Full timeposted on: Posted Todayjob requisition id: 34211**Job Family:**Cyber Consulting**Travel Required:**None**Clearance Required:**Active SecretOur Cybersecurity Consultants are a team of business integrators with extensive consulting and industry experience who help our clients solve their complex business issues from strategy through execution. A career in an integrated team of developers and consultants provides the opportunity to grow and contribute to our clients' business issues every day, applying a collection of security spectrum capabilities, including security strategy and governance, IT risk, security technologies, and cybercrime and breach response.We are seeking an experienced **CyberSecurity Engineer SME - Associate Director** with a strong background in designing, implementing, and managing enterprise-level security solutions, particularly within federal government environments. The ideal candidate will possess deep technical expertise across cybersecurity domains, including threat detection, incident response, vulnerability management, and security architecture. This role requires a strategic thinker and hands-on practitioner who can lead security initiatives, mentor junior engineers, and ensure compliance with federal cybersecurity standards.**What You Will Do:*** Provide technical leadership on major cybersecurity engineering tasks across all networks and environments.* Propose, develop, deploy, configure, operate, integrate, maintain, and support enhancements of cybersecurity capabilities including threat detection tools, traffic segmentation controls, and security infrastructure.* Establish goals for cybersecurity tool implementation that meet project objectives.* Direct cybersecurity engineering activities with domain expertise in multiple capability categories.* Make critical decisions regarding cybersecurity tool selection, design, and deployment.* Ensure cyber capabilities meet or exceed minimum standards to operate on the Department of Defense Information Network (DoDIN.)* Focus areas may include: Secure Design, Tool Engineering/Lead, Cyber Incident Response Team Lead, Comply-to-Connect (C2C) Network Access Control (NAC), Data Security, Defensive Cyberspace Operations Infrastructure, Endpoint Security, Scanner Ops, Zero Trust Architecture (ZTA) Implementation, Vulnerability Management Lead, DevSecOps, and various specialized tool/process engineering roles.**What You Will Need:*** Bachelor's Degree is required* Minimum of TEN (10) years of relevant cybersecurity or IT security experience.* An ACTIVE and CURRENT SECRET federal security clearance.* Demonstrated expertise in enterprise security architecture, threat intelligence, and incident response.* Mastery of of security frameworks and compliance standards (e.g., NIST, RMF SP 800-53 Rev 5, DoD 8570).* Experience with cybersecurity platforms such as Splunk, Tenable, Palo Alto, CrowdStrike, and AWS/Azure security services.* Experience in incident response, threat hunting, and forensic analysis.* Experience with cloud security practices and technologies (AWS, Azure, GCP).* Demonstrated ability to be effective as a Subject Matter Expert delivering cyber theories, concepts and principles in cross-functional teams and manage complex technical projects.* Strong analytical and problem-solving skills.* Excellent communication skills with the ability to convey technical concepts to non-technical stakeholders.**What Would Be Nice To Have:*** Master's Degree in relevant cybersecurity or IT field* One or more of the following certifications:* ISC2 Zero Trust Strategy Certificate* Certified Information Security Manager (CISM)* Certified Authorization Professional (CAP) / Certified in Governance, Risk and Compliance (CGRC)* IAT Level II (Information Assurance Technical)* IAM Level II (Information Assurance Management)* Cloud Security Certification (AWZ, Azure, or Google)* Familiarity with emerging technologies such as AI/ML in cybersecurity, quantum-resistant cryptography, and secure software supply chain practices.* Experience with Zero Trust Architecture and implementation based on CISA, DOD and/or IC maturity models.The annual salary range for this position is $149,000.00-$248,000.00. Compensation decisions depend on a wide range of factors, including but not limited to skill sets, experience and training, security clearances, licensure and certifications, and other business and organizational needs.**What We Offer:**Guidehouse offers a comprehensive, total rewards package that includes competitive compensation and a flexible benefits package that reflects our commitment to creating a diverse and supportive workplace.Benefits include:* Medical, Rx, Dental & Vision Insurance* Personal and Family Sick Time & Company Paid Holidays* Position may be eligible for a discretionary variable incentive bonus* Parental Leave and Adoption Assistance* 401(k) Retirement Plan* Basic Life & Supplemental Life* Health Savings Account, Dental/Vision & Dependent Care Flexible Spending Accounts* Short-Term & Long-Term Disability* Student Loan PayDown* Tuition Reimbursement, Personal Development & Learning Opportunities* Skills Development & Certifications* Employee Referral Program* Corporate Sponsored Events & Community Outreach* Emergency Back-Up Childcare Program* Mobility Stipend**About Guidehouse**Guidehouse is an Equal Opportunity Employer-Protected Veterans, Individuals with Disabilities or any other basis protected by law, ordinance, or regulation.Guidehouse will consider for employment qualified applicants with criminal histories in a manner consistent with the requirements of applicable law or ordinance including the Fair Chance Ordinance of Los Angeles and San Francisco.If you have visited our website for information about employment opportunities, or to apply for a position, and you require an accommodation, please contact Guidehouse Recruiting at ************** or via email at RecruitingAccommodation@guidehouse.com. All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodation.All communication regarding recruitment for a Guidehouse position will be sent from Guidehouse email domains including @guidehouse.com or ************************. Correspondence received by an applicant from any other domain should be considered unauthorized and will not be honored by Guidehouse. Note that Guidehouse will never charge a fee or require a money transfer at any stage of the recruitment process and does not collect fees from educational institutions for participation in a recruitment event. Never provide your banking information to a third party purporting to need that information to proceed in the hiring process.If any person or organization demands money related to a job opportunity with Guidehouse, please report the matter to Guidehouse's Ethics Hotline. If you want to check the validity of correspondence you have received, please contact *************************. Guidehouse is not responsible for losses incurred (monetary or otherwise) from an applicant's dealings with unauthorized third parties.*Guidehouse does not accept unsolicited resumes through or from search firms or staffing agencies. All unsolicited resumes will be considered the property of Guidehouse and Guidehouse will not be obligated to pay a placement fee.*
#J-18808-Ljbffr
$149k-248k yearly 5d ago
Senior Security Engineer, Spam & Abuse Lead
Snap Inc. 4.7
Palo Alto, CA jobs
A leading technology company in California is seeking a Security Engineer for the Spam & Abuse team. This role involves architecting solutions against spam threats, collaborating across departments, and leading incident response efforts. The ideal candidate has a strong background in software engineering, experience with big data technologies, and excels in a collaborative setting. Compensation in the range of $209,000-$313,000 annually, along with additional employee benefits.
#J-18808-Ljbffr
$209k-313k yearly 4d ago
Senior Platform Security Engineer
Asana 4.6
San Francisco, CA jobs
A leading software company in San Francisco seeks a Senior Software Engineer to join its Security Development team. This role involves designing secure frameworks and improving core services. Candidates should have over 4 years of experience in software development and an interest in security engineering. The position offers a competitive salary range of $202,000-$258,000 and a hybrid work schedule.
#J-18808-Ljbffr
$202k-258k yearly 2d ago
Senior Security Analyst
Capgemini 4.5
New York, NY jobs
Choosing Capgemini means choosing a company where you will be empowered to shape your career in the way you'd like, where you'll be supported and inspired bya collaborative community of colleagues around the world, and where you'll be able to reimagine what's possible. Join us and help the world's leading organizationsunlock the value of technology and build a more sustainable, more inclusive world.
The Senior SecurityAnalyst supports the governance of service provider activities in the enterprise security program, monitoring and escalating problems and providing information on security issues. Undertakes security assurance and audit activities to ensure compliance and to identify risks and opportunities. Provides information to senior managers and executives to ensure that they are aware of any security-related risks or opportunities. Provides subject matter expertise, consultancy and training in security-related matters. Must be able to function in a fast-paced, multi-vendor outsourced environment, facilitating conference calls among other subject matter experts and the client.
Responsibilities
Handles monthly reporting duties for the Information Risk Management team.
Facilitates audit planning and audit remediation activities of the service providers, leading calls and documenting and reporting progress.
Has familiarity with security technologies and controls; expertise not required, but the ability to escalate to more senior subject matter experts is important.
Develops work plans to structure solutions and communications.
Involves client and vendor staff appropriately in resolving security problems.
Participates effectively within the business' security governance framework.
Tracks the corrective and preventive actions being taken to improve security to closure.
Possesses strong communication skills to communicate technical and security risk information to management.
Experience
Ability to self-manage with little interaction from other management staff.
Flexible and able to adapt to manage a fast‑changing environment.
Ability to solve complex issues and provide recommendations and advice regarding remediations.
Experience with security architecture, security software, or security policy.
Ability to organize agendas, lead conference calls, and track action items to completion.
Security and Audit certifications such as SSCP, CISSP, CISA, CISM, CGEIT, CRISC, Security+ are preferred.
Job Description - Grade Specific
The base compensation range for this role in the posted location is: $65,586-121,980.
Capgemini provides compensation range information in accordance with applicable national, state, provincial, and local pay transparency laws. The base compensation range listed for this position reflects the minimum and maximum target compensation Capgemini, in good faith, believes it may pay for the role at the time of this posting. This range may be subject to change as permitted by law.
The actual compensation offered to any candidate may fall outside of the posted range and will be determined based on multiple factors legally permitted in the applicable jurisdiction.
These may include, but are not limited to: Geographic location, Education and qualifications, Certifications and licenses, Relevant experience and skills, Seniority and performance, Market and business consideration, Internal pay equity.
It is not typical for candidates to be hired at or near the top of the posted compensation range.
In addition to base salary, this role may be eligible for additional compensation such as variable incentives, bonuses, or commissions, depending on the position and applicable laws.
Capgemini offers a comprehensive, non‑negotiable benefits package to all regular, full‑time employees. In the U.S. and Canada, available benefits are determined by local policy and eligibility and may include:
Paid time off based on employee grade (A-F), defined by policy: Vacation: 12‑25 days, depending on grade, Company paid holidays, Personal Days, Sick Leave
Medical, dental, and vision coverage (or provincial healthcare coordination in Canada)
Retirement savings plans (e.g., 401(k) in the U.S., RRSP in Canada)
Life and disability insurance
Employee assistance programs
Other benefits as provided by local policy and eligibility
Important Notice: Compensation (including bonuses, commissions, or other forms of incentive pay) is not considered earned, vested, or payable until it becomes due under the terms of applicable plans or agreements and is subject to Capgemini's discretion, consistent with applicable laws. The Company reserves the right to amend or withdraw compensation programs at any time, within the limits of applicable legislation.
Disclaimers
Capgemini is an Equal Opportunity Employer encouraging inclusion in the workplace. Capgemini also participates in the Partnership Accreditation in Indigenous Relations (PAIR) program which supports meaningful engagement with Indigenous communities across Canada by promoting fairness, accessibility, inclusion and respect. We value the rich cultural heritage and contributions of Indigenous Peoples and actively work to create a welcoming and respectful environment. All qualified applicants will receive consideration for employment without regard to race, national origin, gender identity/expression, age, religion, disability, sexual orientation, genetics, veteran status, marital status or any other characteristic protected by law.
Physical, mental, sensory or environmental demands may be referenced in an attempt to communicate the manner in which this position traditionally is performed. Whenever necessary to provide individuals with disabilities an equal employment opportunity, Capgemini will consider reasonable accommodations that might involve varying job requirements and/or changing the way this job is performed, provided that such accommodation does not pose an undue hardship. Capgemini is committed to providing reasonable accommodation during our recruitment process. If you need assistance or accommodation, please reach out to your recruiting contact.
Ref. code 385096-en_US
Posted on 05 Jan 2026
Contract type Permanent
Location Atlanta, Austin, Bellevue, Berwyn, Bridgewater, Brooklyn, Burlington, Chicago, Columbia, Dallas, Dayton - Sogeti US, Guaynabo, Houston, Irving, Mclean, Nashville, New York, San Francisco, Santa Clara, Seattle, Southfield, Tampa, Westerville
#J-18808-Ljbffr
A global technology consulting firm is seeking a Senior SecurityAnalyst to support governance in the enterprise security program. The role involves monitoring service provider activities, facilitating audits, and providing expertise on security issues. Ideal candidates should have strong self-management skills, familiarity with security technologies, and security certifications are preferred. This position comes with a comprehensive benefits package and competitive compensation in New York, with a compensation range between $65,586 and $121,980.
#J-18808-Ljbffr
$65.6k-122k yearly 2d ago
M365 Systems Engineer - GCC High Security & Automation
Amazon 4.7
San Francisco, CA jobs
A leading technology firm is seeking an M365 - IT Application Engineer to design, implement, and manage M365 productivity services, focusing on maintaining security and reliability. Ideal candidates will have 3+ years of systems engineering experience along with knowledge of M365 services such as Teams and SharePoint. This position demands strong problem-solving skills and the ability to work in fast-paced environments. Competitive compensation based on geographic market, ranging from $104,300 to $185,000 per year.
#J-18808-Ljbffr
Duration: 11+ Months Contract
Contract
Interview Type: In-person
Scheduled Work Hours: Normal business hours Monday-Friday 35 hours/week (not including mandatory unpaid meal break after 6 hours of work).
Requirement ID: NYC_OT735_SS
contact Sandeep @ **********************
Job Description
Justification:
This request is for an NG911 Subject Matter Expert (SME) needed to continue the project work for the Class 1/2/3 and Call Handling upgrades of the Next Generation 9-1-1 emergency call system and provide expertise and technical knowledge during the configuration and test phases.
NG911 - CyberSecurity Tools Implementation Engineer
Implement solutions for DNS, Email, remote access configuration, integration, performance monitoring, and security management.
Test Next Generation firewall platforms, host operating systems, and applications such as LDAP, SMTP.
Support for application development and database administration.
Provide support for Email, DNS, AND Remote access solutions.
Deploy appropriate network security solutions.
Note:
Normal Business Hours, Monday through Friday (not including a mandatory unpaid meal break after 6 hours of work), 35 work hours per week. If the consultant works more than 35 hours per week, the consultant must request overtime in the Agency's timekeeping system, and the project manager must approve those hours worked above the weekly maximum.
SCOPE OF SERVICES:
NG911 - CyberSecurity Tools Implementation Engineer
Implement solutions for DNS, Email, remote access configuration, integration, performance monitoring, and security management.
Test Next Generation firewall platforms, host operating systems, and applications such as LDAP, SMTP.
Support for application development and database administration.
Provide support for Email, DNS, AND Remote access solutions.
Deploy appropriate network security solutions.
MANDATORY SKILLS/EXPERIENCE
Note: Candidates who do not have the mandatory skills will not be considered
At least 12 years of experience in an enterprise data center environment to plan, design, and install network & security infrastructure systems for public safety.
3+ years working experience with IBM QRadar SEIM solution integration with Cascade, Firemon, and Citrix & other critical security service technologies
CISSP or other industry CyberSecurity Certification
Experience migrating DNS to a new platform.
Experience participating in the design and implementation of a DMZ and all associated requirements for monitoring external threats.
Experience with security infrastructure and implementation of perimeter network security components such as Next Generation firewalls.
DESIRABLE SKILLS/EXPERIENCE:
3+ years working experience with IBM QRadar SEIM solution integration with Cascade, Firemon, and Citrix & other critical security service technologies
CISSP or other industry CyberSecurity Certification
Experience migrating DNS to a new platform.
--------------------------------------------------------------------------------------------------------------------------------------------------------------------
V Group Inc. is an IT Services company which supplies IT staffing, project management, and delivery services in software, network, help desk and all IT areas. Our primary focus is the public sector including state and federal contracts. We have multiple awards/ contracts with the following states: CA, FL, GA, MD, MI, NC, NY, OH, OR, PA, VA, VT, and WA. If you are considering applying for a position with V Group, or in partnering with us on a position, please feel free to contact me for any questions you may have regarding our services and the advantages we can offer you as a consultant.
Please share my contact information with others working in Information Technology.
A technology firm in San Francisco is seeking a Corporate Security Engineer to lead initiatives ensuring the safety of its corporate environment. The ideal candidate will have over 4 years of experience in Corporate Security, familiarity with Identity and Access Management, and a strong understanding of security concepts. This role offers hybrid working arrangements and a competitive compensation and benefits package, including mental health support and career coaching.
#J-18808-Ljbffr
A leading collaboration platform seeks a Corporate Security Engineer to lead security initiatives and protect the corporate environment. You will collaborate with IT and engineering teams, design security tools, and drive the implementation of Data Loss Prevention strategies. Ideal candidates have 4 years of experience in IT Security, knowledge of security frameworks, and familiarity with various security tools. This role is hybrid, based at the San Francisco office.
#J-18808-Ljbffr
$142k-185k yearly est. 2d ago
Senior Cloud Visibility & Security PM
Gigamon 4.8
Santa Clara, CA jobs
A leading technology firm is seeking a Senior Product Manager to drive strategy and execution for cloud visibility and security solutions. This role involves collaborating cross-functionally with engineering, sales, and marketing teams. The ideal candidate should have a master's degree with an MBA preferred, along with over 10 years of experience in product management within cloud technologies. The role offers a competitive salary ranging from $192,000 to $240,000 and various employee benefits including health insurance and 401(k) matching.
#J-18808-Ljbffr
$192k-240k yearly 5d ago
Firewall Security Engineer
Novacoast 3.9
Washington, DC jobs
Novacoast Staffing is currently assisting a financial government institution in its search for an experienced Firewall Security Engineer that is experienced in Palo Alto Firewalls for a contract role that is expected to go a minimum of 2 years with option to extend. This is a hybrid role with a few days onsite in Alexandria VA and a pay range of 60-68/ hour. To qualify for this role, you must be able to pass an extensive federal background check.
Qualifications
To qualify for this position, you must have at least 5 years of experience with Palo Alto Next Generation firewalls, Zero Trust, and strong knowledge of advanced firewall features such as Wildfire, App-ID, User-ID, Global Protect, Security, and NAT policies, within Cloud environments.
Responsibilities
In this role, you will be responsible for the design, administrations, and management of Palo Alto Firewalls using Centralized Panorama Management. You will also be responsible for configuration and troubleshooting IPSEC site-to-site VPNs and SSL decryption on Palo Alto Firewalls.
Requirements
5+ years experience with Palo Alto next-generation Firewalls and working in cloud and Zero Trust environments
Strong knowledge of advanced firewall features such as Wildfire, App-ID, User-ID, Global Protect, Security and NAT policies
Expert level knowledge in the design, administration of Palo Alto Firewalls using Centralized Panorama Management
Expert level knowledge in configuration and troubleshooting IPSEC Site-to-Site VPNs
US Citizenship is required due to the position being with a Federal Client
If this role is aligned with your next career move, submit your resume today for immediate consideration!
Job Type: Contract
Pay: $60.00 - $68.00 per hour
#J-18808-Ljbffr
$60-68 hourly 4d ago
AI Security Engineer: Automate Threat Defense in HealthTech
Simplepractice 4.5
Santa Monica, CA jobs
A health tech firm in California is seeking an Applied AI Security Engineer to enhance security for health and wellness professionals. The ideal candidate will have extensive experience in AI/ML security solutions and a strong background in information security. Responsibilities include designing secure AI solutions, collaborating with product teams, and leading incident response efforts. The position offers a competitive salary ranging from $115,000 to $145,000 annually, along with a comprehensive benefits package.
#J-18808-Ljbffr
$115k-145k yearly 3d ago
Applied AI Security Engineer
Simplepractice 4.5
Santa Monica, CA jobs
At SimplePractice, we are improving access to quality care by equipping health and wellness clinicians with all the tools they need to thrive in private practice.
More than 250,000 providers trust SimplePractice to build their business through our industry‑leading software with powerful tools that simplify every part of practice management. From admin work to clinical care, our suite of innovative solutions work together to reduce administrative burden-empowering solo and small group practitioners to thrive alongside their clients.
Recognized by MedTech Breakthrough as the Best Practice Management Solution Provider in 2024 and the Digital Health Awards in 2023, SimplePractice is proud to pave the future of health tech.
The Role
SimplePractice is a leading practice management platform for health & wellness professionals. We are dedicated to empowering practitioners to run their businesses more efficiently and securely. We are seeking an Applied AI Security Engineer who will play a pivotal role in safeguarding our platform. In this role, you will be a hands‑on builder and implementer, working closely with our innovative product and engineering teams to develop and deploy AI‑driven security solutions to protect our client data. You will actively contribute to enabling enhanced security capabilities, mitigating risks, ensuring compliance with healthcare regulations, and advancing our mission of securely empowering health & wellness professionals through reliable AI solutions.
You've been a hands‑on, early adopter of AI technologies and understand the promise and the pitfalls. You've applied your knowledge to traditional security functions like cloud security, application security, security operations and are eager to take an AI‑first approach. You bring full stack skills that can develop and productionalize AI agents to help us scale our security capabilities.
Responsibilities Applied AI Security Engineering
Design, build, and implement secure AI solutions to automate our security function, serving as a hands‑on expert in secure AI implementation patterns.
Enable our security team to move from AI as assistant to AI as automated enabler
Collaborate with product teams to evaluate security implications of new AI features
Actively develop and contribute code to AI security testing tools, including red team AI agents, to proactively identify and address vulnerabilities in new features and models.
Lead incident response for AI‑related security events
Integrate AI capabilities directly into security operations workflows to automate threat detection, incident response, and vulnerability management.
AI Security Architecture & Strategy
Design and implement security architecture for AI systems, including LLMs and ML platforms
Develop security standards and patterns for AI development and deployment
Threat modeling for AI features
Establish security controls for model training and monitoring
Translate AI security strategies into actionable development plans and prototypes.
Evaluate AI vendors and SaaS providers for security, compliance and data protection
Assess emerging AI security tools and technologies
Review cloud‑based AI services for healthcare compliance
Partner with legal and compliance teams ensure AI initiatives meet regulatory and contractual requirements
Implement controls for data privacy, model integrity, and access management
Develop metrics and reporting for AI security posture
Liaison with customers and auditors on SimplePractice's approach to AI security and compliance
Leverage AI and automation to operationalize security and compliance workflows, continuously monitoring and improving our security posture
Desired Skills & Experience
5+ years of experience in information security, with recent focus on AI/ML systems
Proven hands‑on experience in designing, developing, and deploying AI/ML security solutions, including expertise in model security, data poisoning prevention, prompt injection guardrails, and privacy‑preserving techniques.
Strong background in security architecture and threat modeling
Strong bias towards automating with AI as a partner
Demonstrated experience in implementing AI security controls within a regulated environment, with a strong emphasis on practical application and automation.
Degree in Computer Science, Cybersecurity, or a related field
Experience implementing Nvidia NeMo guardrails, ModelArmor or similar LLM protect frameworks
Demonstrated experience with serverless cloud technologies like Lambda, Cloud Run
Knowledgeable in Amazon Bedrock, OpenAI APIs, Langchain, ADK or similar AI model platforms
Strong software development background with proficiency in python, rust or similar languages, including experience with MLOps and DevSecOps practices and tools such as terraform.
Understanding of healthcare compliance (HIPAA, HITECH)
Excellent analytical, problem‑solving, and communication skills
Ability to work independently to learn new technologies, processes, frameworks, and systems.
Bonus Points
A ‘hands‑on' security certification (SANS, CEH, etc)
Experience in healthcare or medical device security
Familiarity with AI ethics and responsible AI development practices
Experience with containerization and orchestration technologies (e.g., Docker, Kubernetes)
Experience contributing to open‑source AI security projects or developing internal AI security tools/frameworks.
Familiarity with security automation and orchestration platforms (e.g., SOAR) and how AI can augment or replace these tools.
Base Compensation Range
$115,000 - $145,000 annually
Base salary is one component of total compensation. Employees may also be eligible for an annual bonus or commission. Some roles may also be eligible for overtime pay.
The above represents the expected base compensation range for this job requisition. Ultimately, in determining your pay, we'll consider many factors including, but not limited to, skills, experience, qualifications, geographic location, and other job‑related factors.
We offer a competitive benefits program including:
Medical, dental, vision, life & disability insurance
401(k) plan with company match
Flexible Time Off (FTO), wellbeing days, paid holidays, and summer Fridays
Mental health resources
Paid parental leave & Backup Care
Employee Resource Groups (ERGs)
California Job Applicant Privacy Notice
Thank you for your interest in opportunities at SimplePractice LLC (“SimplePractice” or “us” or “we” or “our”). Please note that when you submit your resume or application materials to us for employment purposes, you are subject to the SimplePractice California Job Applicant Privacy Notice.
Equal Opportunity Employer Statement
The legal stuff: All individuals that are seeking employment are considered without regards to race, color, religion, national origin, age, sex, marital status, ancestry, physical or mental disability, pregnancy, veteran status, gender identity, gender expression, or sexual orientation.
#J-18808-Ljbffr
$115k-145k yearly 3d ago
Principal Enterprise Security Engineer
F5 Networks, Inc. 4.6
Palo Alto, CA jobs
**Location:** Remote **About the Role** We are seeking a seasoned **Principal Enterprise Security Engineer** to design, implement, and manage enterprise-wide security solutions. You'll shape our security strategy across endpoint protection, network, SaaS, IAM, and observability, while aligning to NIST and CIS standards. This role reports to the Head of Enterprise Security, with close collaboration with the CISO, CISO staff, and cross-functional teams. **Key Responsibilities** Experience with Security Service Edge and Software-Defined Perimeter enables ZTNA solutions such as NetSCOPE, Zscaler, and PAN**Qualifications & Experience** **Education:** Bachelor's degree in cybersecurity, computer science, engineering-or equivalent years of corporate security/SOC experience. **Experience:** 7+ years in enterprise or cloud security with hands-on background in IAM, endpoint/network/SaaS security, incident management, vulnerability management, and log analytics. Experience with DoD IL‑4/IL‑5 programs-understand added encryption, personnel restrictions, and control overlays **Technical Skills:** Proficiency with tools like CrowdStrike, Palo Alto, F5, Splunk/ELK, and IAM platforms (Okta, Entra ID, etc.).**Soft Skills:** Strong verbal and written communication; ability to convey complex topics to executives; experience working with stakeholders across multiple time zones. Nice to have experience with F5 BigIP LTM**Personality Traits:** Strategic thinker, collaborative, proactive, with the ability to thrive in fast-moving environments. It is the policy of F5 to provide equal employment opportunities to all employees and employment applicants without regard to unlawful considerations of race, religion, color, national origin, sex, sexual orientation, gender identity or expression, age, sensory, physical, or mental disability, marital status, veteran or military status, genetic information, or any other classification protected by applicable local, state, or federal laws. This policy applies to all aspects of employment, including, but not limited to, hiring, job assignment, compensation, promotion, benefits, training, discipline, and termination. F5 offers a variety of reasonable accommodations for candidates. Requesting an accommodation is completely voluntary. F5 will assess the need for accommodations in the application process separately from those that may be needed to perform the job. Request by contacting accommodations@f5.com.**Remote**: Primarily work from designated home location but can come into an F5 office to work or travel to an offsite location as needed.
#J-18808-Ljbffr
$133k-172k yearly est. 4d ago
DevOps and Security Engineer
Comrise 4.3
Miami, FL jobs
Job Posting Title DevOps & Security Engineer
We are looking for a DevOps & Security Engineer to maintain and secure our Web3 stablecoin infrastructure. You will be responsible for overall server architecture, security hardening, node maintenance, and CI/CD deployments to ensure 24/7 system reliability for both our off-chain systems and on-chain nodes.
Location: Miami, Florida (temporarily remote, with future hybrid in-office requirements)
Key Responsibilities:
Manage day-to-day operations of company infrastructure including servers, cloud services, and container platforms.
Maintain critical node services including RPC services and oracle components.
Establish security protocols and implement host/network security hardening (WAF, security groups, firewalls)
Oversee service monitoring, log analysis, troubleshooting, and capacity planning.
Build and maintain CI/CD pipelines using GitHub Actions/GitLab CI
Manage Docker and Kubernetes clusters.
Administer certificates, TLS, VPN, and IAM permission systems.
Conduct regular vulnerability scans, coordinate penetration tests, and manage patch updates.
Undertake ad hoc projects as we continue to grow.
Qualifications:
3+ years of experience in DevOps, infrastructure, or security roles.
Strong Linux administration skills with substantial experience in troubleshooting and performance tuning.
Proficiency with Docker/Kubernetes, Nginx, load balancing, and logging systems (ELK/EFK).
Solid understanding of network security concepts: VPC, ACL, WAF, DDoS protection, firewalls, zero-trust.
Experience with at least one major cloud platform (AWS/GCP/Azure).
Scripting skills in Shell, Python, or Go.