Post job

Senior Security Engineer jobs at Grandbridge Real Estate Capital

- 34 jobs
  • Cybersecurity Senior Architect - Cloud / AI Security

    Truist 4.5company rating

    Senior security engineer job at Grandbridge Real Estate Capital

    **The position is described below. If you want to apply, click the Apply Now button at the top or bottom of this page. After you click Apply Now and complete your application, you'll be invited to create a profile, which will let you see your application status and any communications. If you already have a profile with us, you can log in to check status.** Need Help? (https://pp-cdn.phenompeople.com/CareerConnectResources/prod/TBJTBFUS/documents/Career\_site\_FAQ-17**********0.pdf) _If you have a disability and need assistance with the application, you can request a reasonable accommodation. Send an email to_ Accessibility (careers@truist.com?subject=Accommodation%20request) _(accommodation requests only; other inquiries won't receive a response)._ **Regular or Temporary:** Regular **Language Fluency:** English (Required) **Work Shift:** 1st shift (United States of America) **Please review the following job description:** Derive security specifications from business requirements, and design security solutions that support core organizational functions, and assure their confidentiality, integrity and high availability. Gain organizational commitment for security infrastructure systems and software plans, as well as assist to evaluate and select security technologies required to complete those plans. Provide integrated infrastructure-related technical expertise across the organization, from conceptualization and project planning to the post-implementation support level. Principally works, under limited supervision, with Corporate Information Security (CIS) personnel, Line of Business (LOB) personnel, external vendors, and internal IT Services personnel including Enterprise Architects, Application & Data Services personnel and other IT Operations Services teams. Security Solution Architects develop security specifications, requirements and architecture artifacts in compliance with corporate standards, laws and regulations for architecture adherence and performance guidelines. **Essential Duties and Responsibilities** Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time. + Architecting effective and efficient fit for purpose solutions that meet the Bank's needs and requirements - includes creation of Cybersecurity Blueprints that will present detailed views of application interaction/integrations between both on prem and cloud-based applications. + Applies in-depth and specialized expertise in Identity and Access Management and significant breadth of experience across cyber / information security. + May be called upon to contributed to scope and business cases + Participates in the gathering and development of requirements by coaching stakeholders and decomposing business requirements into technical and system requirements + Interpret requirements to determine the best solutions and approaches + Creates architectures and operational documentation with support of engineering and operations staff + Advise, consult, lead, guide and mentor project teams, engineers, analysts, and support staff in the delivery of solutions + Participate in the agile planning processes and delivery methodologies + Build relationships with internal clients + Conducts threat modeling and security gap assessment exercises in concert with other teams + Contributes to the creation of policy, standards, Minimum Security Baselines (MSBs), procedures and guidelines + Bring visibility to and escalates security risks, as well as, technical, execution, deployment, or other risks as applicable + Conducts post-mortem reviews of projects / products to measure design versus implementation differentials + Contribute to the Truist Cyber Architecture Practice by supporting Cyber Enterprise Architecture objectives **Qualifications** **Required Qualifications:** The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. + Bachelor's degree in a technical or business field, or equivalent education and related training + Eight years of demonstrated experience of systems engineering and/or architecture in at least one of the information security areas: network security, access management, end point protection, data loss prevention, vulnerability management, application security, forensics, web security, mainframe, incident response and/or cyber threat management in a medium to large corporation + Highly experienced in network security architecture, including design tools, methods, and techniques and the application of Defense-in-Depth principles; knowledge of network design processes, including understanding of security objectives + Specialized depth and thorough Knowledge of The Open Group Architecture Framework (TOGAF), including infrastructure, data, information security, applications, architectural concepts, and associated disciplines + Deep knowledge of: + Mainframe security, including access control, monitoring, integration with non-mainframe technologies, and virtualization; + Authentication and authorization technologies including remote access; + Application security and the security development lifecycle and ability to apply to client-server and web-based application development environments; + Enterprise databases and database security, including database activity monitoring and database access control technologies; + Encryption methods and technologies for data-in-transit and data-at-rest scenarios; + Incident response processes; + Denial of Service prevention mechanisms; + Firewall technologies and intrusion prevention methods; + Cloud technologies and hosting; + Operating system hardening; + Virtualization technologies; + Mobile technologies; + Encryption and key management technologies; + Endpoint Protection (includes malware); + Data Loss Protection technologies + Experience with peripheral component interconnect and other security audit processes, evidence gathering and development/management of remediation plans used in resolution of finding **Preferred Qualifications:** + Subject matter expert with deep specialization or comprehensive knowledge within a discipline which crosses multiple areas of specialization relative to Cloud architectures and security principles, Data Protection, IT Risk, Network Security, Application Security, Security Operations, and IAM. Deep knowledge/experience with securing complex AWS and Azure architectures. + Understanding of Security foundations and Standards such as hardening, least privilege, attack surface reduction, NIST SP800-series, NIST Cybersecurity Framework, FIPS 140-2, Common Criteria, FFIEC, FISMA/FedRAMP, ISO 27000, PCI-DSS, CIS Benchmarks, and similar. + Applies in-depth and specialized expertise and/or a significant breadth of expertise in own professional discipline and other related disciplines. + Interprets internal/external business challenges and recommends best practices to improve products, processes, or services. + Works independently, with guidance in only the most complex and unusual situations. + Solution expertise (in the following) preferred: + AWS / Azure Cloud - application migration, fit for purpose, etc. + Large data management architecture and integrations + Multifactor authentication, Risk Based Authentication + Application authentication models + Application Security - OWASP control and evaluation criteria + Cryptographic technology - Transit encryption, storage encryption, Hash, KMS, Digital Signature, etc. + Federated Identity Management / Identity Providers / Single Sign On (SSO) + Client authentication approaches for "anti-bot" technologies, signaling, and fraud prevention + Certification: CISSP-ISSAP, AWS, AZURE, SANS or TOGAF certifications + Generative AI / LLM + Consulting or professional services backgrounds are a plus. + Financial services industry experience is a major plus. + Master's degree in: Computer Science, Information Systems, Security, or other closely related field. + Ideal candidate will also have experience in the following areas - + Developing patterns, building blocks, target architectures, policies, standards, and guidance for all applicable platforms + Containerization, Micro-services, API, CI/CD + Content Delivery technologies **Other Job Requirements / Working Conditions** **Sitting** Constantly (More than 50% of the time) **Visual / Audio / Speaking** Able to access and interpret client information received from the computer and able to hear and speak with individuals in person and on the phone. **Manual Dexterity / Keyboarding** Able to work standard office equipment, including PC keyboard and mouse, copy/fax machines, and printers. **Availability** Able to work all hours scheduled, including overtime as directed by manager/supervisor and required by business need. **Travel** Minimal and up to 10% **General Description of Available Benefits for Eligible Employees of Truist Financial Corporation:** All regular teammates (not temporary or contingent workers) working 20 hours or more per week are eligible for benefits, though eligibility for specific benefits may be determined by the division of Truist offering the position. Truist offers medical, dental, vision, life insurance, disability, accidental death and dismemberment, tax-preferred savings accounts, and a 401k plan to teammates. Teammates also receive no less than 10 days of vacation (prorated based on date of hire and by full-time or part-time status) during their first year of employment, along with 10 sick days (also prorated), and paid holidays. For more details on Truist's generous benefit plans, please visit our Benefits site (***************************** . Depending on the position and division, this job may also be eligible for Truist's defined benefit pension plan, restricted stock units, and/or a deferred compensation plan. As you advance through the hiring process, you will also learn more about the specific benefits available for any non-temporary position for which you apply, based on full-time or part-time status, position, and division of work. **_Truist is an Equal Opportunity Employer that does not discriminate on the basis of race, gender, color, religion, citizenship or national origin, age, sexual orientation, gender identity, disability, veteran status, or other classification protected by law. Truist is a Drug Free Workplace._** EEO is the Law (************************************************************************************************** E-Verify (https://pp-cdn.phenompeople.com/CareerConnectResources/prod/TBJTBFUS/documents/E-Verify\_Participation\_Poster-17**********1.pdf) IER Right to Work (https://pp-cdn.phenompeople.com/CareerConnectResources/prod/TBJTBFUS/documents/IER\_RightToWorkPoster-17**********8.pdf)
    $121k-152k yearly est. 60d+ ago
  • Cybersecurity Senior Architect - Cloud / AI Security

    Truist Bank 4.5company rating

    Senior security engineer job at Grandbridge Real Estate Capital

    The position is described below. If you want to apply, click the Apply Now button at the top or bottom of this page. After you click Apply Now and complete your application, you'll be invited to create a profile, which will let you see your application status and any communications. If you already have a profile with us, you can log in to check status. Need Help? If you have a disability and need assistance with the application, you can request a reasonable accommodation. Send an email to Accessibility (accommodation requests only; other inquiries won't receive a response). Regular or Temporary: Regular Language Fluency: English (Required) Work Shift: 1st shift (United States of America) Please review the following job description:Derive security specifications from business requirements, and design security solutions that support core organizational functions, and assure their confidentiality, integrity and high availability. Gain organizational commitment for security infrastructure systems and software plans, as well as assist to evaluate and select security technologies required to complete those plans. Provide integrated infrastructure-related technical expertise across the organization, from conceptualization and project planning to the post-implementation support level. Principally works, under limited supervision, with Corporate Information Security (CIS) personnel, Line of Business (LOB) personnel, external vendors, and internal IT Services personnel including Enterprise Architects, Application & Data Services personnel and other IT Operations Services teams. Security Solution Architects develop security specifications, requirements and architecture artifacts in compliance with corporate standards, laws and regulations for architecture adherence and performance guidelines. Essential Duties and Responsibilities Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time. Architecting effective and efficient fit for purpose solutions that meet the Bank's needs and requirements - includes creation of Cybersecurity Blueprints that will present detailed views of application interaction/integrations between both on prem and cloud-based applications. Applies in-depth and specialized expertise in Identity and Access Management and significant breadth of experience across cyber / information security. May be called upon to contributed to scope and business cases Participates in the gathering and development of requirements by coaching stakeholders and decomposing business requirements into technical and system requirements Interpret requirements to determine the best solutions and approaches Creates architectures and operational documentation with support of engineering and operations staff Advise, consult, lead, guide and mentor project teams, engineers, analysts, and support staff in the delivery of solutions Participate in the agile planning processes and delivery methodologies Build relationships with internal clients Conducts threat modeling and security gap assessment exercises in concert with other teams Contributes to the creation of policy, standards, Minimum Security Baselines (MSBs), procedures and guidelines Bring visibility to and escalates security risks, as well as, technical, execution, deployment, or other risks as applicable Conducts post-mortem reviews of projects / products to measure design versus implementation differentials Contribute to the Truist Cyber Architecture Practice by supporting Cyber Enterprise Architecture objectives Qualifications Required Qualifications: The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. Bachelor's degree in a technical or business field, or equivalent education and related training Eight years of demonstrated experience of systems engineering and/or architecture in at least one of the information security areas: network security, access management, end point protection, data loss prevention, vulnerability management, application security, forensics, web security, mainframe, incident response and/or cyber threat management in a medium to large corporation Highly experienced in network security architecture, including design tools, methods, and techniques and the application of Defense-in-Depth principles; knowledge of network design processes, including understanding of security objectives Specialized depth and thorough Knowledge of The Open Group Architecture Framework (TOGAF), including infrastructure, data, information security, applications, architectural concepts, and associated disciplines Deep knowledge of: Mainframe security, including access control, monitoring, integration with non-mainframe technologies, and virtualization; Authentication and authorization technologies including remote access; Application security and the security development lifecycle and ability to apply to client-server and web-based application development environments; Enterprise databases and database security, including database activity monitoring and database access control technologies; Encryption methods and technologies for data-in-transit and data-at-rest scenarios; Incident response processes; Denial of Service prevention mechanisms; Firewall technologies and intrusion prevention methods; Cloud technologies and hosting; Operating system hardening; Virtualization technologies; Mobile technologies; Encryption and key management technologies; Endpoint Protection (includes malware); Data Loss Protection technologies Experience with peripheral component interconnect and other security audit processes, evidence gathering and development/management of remediation plans used in resolution of finding Preferred Qualifications: Subject matter expert with deep specialization or comprehensive knowledge within a discipline which crosses multiple areas of specialization relative to Cloud architectures and security principles, Data Protection, IT Risk, Network Security, Application Security, Security Operations, and IAM. Deep knowledge/experience with securing complex AWS and Azure architectures. Understanding of Security foundations and Standards such as hardening, least privilege, attack surface reduction, NIST SP800-series, NIST Cybersecurity Framework, FIPS 140-2, Common Criteria, FFIEC, FISMA/FedRAMP, ISO 27000, PCI-DSS, CIS Benchmarks, and similar. Applies in-depth and specialized expertise and/or a significant breadth of expertise in own professional discipline and other related disciplines. Interprets internal/external business challenges and recommends best practices to improve products, processes, or services. Works independently, with guidance in only the most complex and unusual situations. Solution expertise (in the following) preferred: AWS / Azure Cloud - application migration, fit for purpose, etc. Large data management architecture and integrations Multifactor authentication, Risk Based Authentication Application authentication models Application Security - OWASP control and evaluation criteria Cryptographic technology - Transit encryption, storage encryption, Hash, KMS, Digital Signature, etc. Federated Identity Management / Identity Providers / Single Sign On (SSO) Client authentication approaches for “anti-bot” technologies, signaling, and fraud prevention Certification: CISSP-ISSAP, AWS, AZURE, SANS or TOGAF certifications Generative AI / LLM Consulting or professional services backgrounds are a plus. Financial services industry experience is a major plus. Master's degree in: Computer Science, Information Systems, Security, or other closely related field. Ideal candidate will also have experience in the following areas - Developing patterns, building blocks, target architectures, policies, standards, and guidance for all applicable platforms Containerization, Micro-services, API, CI/CD Content Delivery technologies Other Job Requirements / Working Conditions Sitting Constantly (More than 50% of the time) Visual / Audio / Speaking Able to access and interpret client information received from the computer and able to hear and speak with individuals in person and on the phone. Manual Dexterity / Keyboarding Able to work standard office equipment, including PC keyboard and mouse, copy/fax machines, and printers. Availability Able to work all hours scheduled, including overtime as directed by manager/supervisor and required by business need. Travel Minimal and up to 10% General Description of Available Benefits for Eligible Employees of Truist Financial Corporation: All regular teammates (not temporary or contingent workers) working 20 hours or more per week are eligible for benefits, though eligibility for specific benefits may be determined by the division of Truist offering the position. Truist offers medical, dental, vision, life insurance, disability, accidental death and dismemberment, tax-preferred savings accounts, and a 401k plan to teammates. Teammates also receive no less than 10 days of vacation (prorated based on date of hire and by full-time or part-time status) during their first year of employment, along with 10 sick days (also prorated), and paid holidays. For more details on Truist's generous benefit plans, please visit our Benefits site. Depending on the position and division, this job may also be eligible for Truist's defined benefit pension plan, restricted stock units, and/or a deferred compensation plan. As you advance through the hiring process, you will also learn more about the specific benefits available for any non-temporary position for which you apply, based on full-time or part-time status, position, and division of work. Truist is an Equal Opportunity Employer that does not discriminate on the basis of race, gender, color, religion, citizenship or national origin, age, sexual orientation, gender identity, disability, veteran status, or other classification protected by law. Truist is a Drug Free Workplace. EEO is the Law Pay Transparency Nondiscrimination Provision E-Verify
    $122k-154k yearly est. Auto-Apply 60d+ ago
  • Azure Cloud Security Architect

    Prominent 4.2company rating

    Marietta, GA jobs

    Prominent is looking for an Azure Cloud Security Architect for a contract to hire in Marietta/Alpharetta, Georgia. The successful Candidate will have senior level experience around design, build and deployment of technology initiatives to secure key government client's cloud environment. The selected candidate will be accountable for assisting in strategic planning and architecture and securing enterprise information by identifying network and application security requirements, implementing and testing security controls and procedures. Additionally, this role collaborates with other teams to embed security into the entire lifecycle, integrating DevSecOps principles and automation into the pipeline. No visa sponsorship is available for this opportunity! C2C or 1099 not available for this opportunity! Experience Required: 5+ years firsthand working with multiple Azure security tools and platforms such as Entra ID, Sentinel, Defender, Monitor, Key-Vault, or similar in other platforms. 5+ years managing security policies and initiatives in Azure. Identity Access and Management (IDAM) concepts, multifactor authentication, SSO/Federation Privileged Access Management (PAM) and Privileged Identity Management (PIM) key concepts Demonstrated ability to Define, Design, and configure the Azure security platforms, and function as an overall lead managing end to end security on the Azure GovCloud regions. Experience automating security baselines and policy enforcement in enterprise Azure environments. Experience automating “Policy-As-Code” using Terraform and ARM templates, with a focus on reusable module design, policy enforcement, and secure CI/CD integration. Demonstratable understanding of Information Security and Risk Management capabilities related to cloud computing across Windows and Linux, with demonstrated direct experience with the following domains: o Identity, Credential and Access Management (ICAM) o Authentication and Authorization including SSO and Identify Federation o Zero-Trust Model o Defense-In-Depth o Governance and Compliance o Securing Data o Securing the Operating System o Protecting the Network Layer o Continuous Diagnostics and Mitigation, Alerting, Audit Trail, and Incident Response o Cloud Core Platform: Compute, Storage, Networking Prior experience supporting federal, defense, or highly regulated commercial clients helpful along with the following skills: Familiarity with compliance frameworks such as FedRAMP, CMMC, FISMA and NIST 800-53. Certifications: CISSP, CCSP, Azure/AWS/Google Training and Certification Crowdstrike Falcon EDR for Azure Experience with secure baseline configurations (CIS Benchmarks, DISA STIGs) for Azure environments. Managing/maintaining FISMA compliance for a government information system in accordance with requirements from NIST. Demonstrated experience collaborating directly with external clients, business leadership, and auditors. Direct technical background, to include familiarity with servers, network devices, and security systems.
    $104k-153k yearly est. 1d ago
  • Azure Cloud Security Architect

    Prominent 4.2company rating

    Omaha, NE jobs

    Prominent is looking for an Azure Cloud Security Architect for a contract to hire in Omaha, Nebraska. The successful Candidate will have senior level experience around design, build and deployment of technology initiatives to secure key government client's cloud environment. The selected candidate will be accountable for assisting in strategic planning and architecture and securing enterprise information by identifying network and application security requirements, implementing and testing security controls and procedures. Additionally, this role collaborates with other teams to embed security into the entire lifecycle, integrating DevSecOps principles and automation into the pipeline. No visa sponsorship is available for this opportunity! C2C or 1099 not available for this opportunity! Experience Required: 5+ years firsthand working with multiple Azure security tools and platforms such as Entra ID, Sentinel, Defender, Monitor, Key-Vault, or similar in other platforms. 5+ years managing security policies and initiatives in Azure. Identity Access and Management (IDAM) concepts, multifactor authentication, SSO/Federation Privileged Access Management (PAM) and Privileged Identity Management (PIM) key concepts Demonstrated ability to Define, Design, and configure the Azure security platforms, and function as an overall lead managing end to end security on the Azure GovCloud regions. Experience automating security baselines and policy enforcement in enterprise Azure environments. Experience automating “Policy-As-Code” using Terraform and ARM templates, with a focus on reusable module design, policy enforcement, and secure CI/CD integration. Demonstratable understanding of Information Security and Risk Management capabilities related to cloud computing across Windows and Linux, with demonstrated direct experience with the following domains: o Identity, Credential and Access Management (ICAM) o Authentication and Authorization including SSO and Identify Federation o Zero-Trust Model o Defense-In-Depth o Governance and Compliance o Securing Data o Securing the Operating System o Protecting the Network Layer o Continuous Diagnostics and Mitigation, Alerting, Audit Trail, and Incident Response o Cloud Core Platform: Compute, Storage, Networking Prior experience supporting federal, defense, or highly regulated commercial clients helpful along with the following skills: Familiarity with compliance frameworks such as FedRAMP, CMMC, FISMA and NIST 800-53. Certifications: CISSP, CCSP, Azure/AWS/Google Training and Certification Crowdstrike Falcon EDR for Azure Experience with secure baseline configurations (CIS Benchmarks, DISA STIGs) for Azure environments. Managing/maintaining FISMA compliance for a government information system in accordance with requirements from NIST. Demonstrated experience collaborating directly with external clients, business leadership, and auditors. Direct technical background, to include familiarity with servers, network devices, and security systems.
    $86k-125k yearly est. 23h ago
  • Cyber Security Engineer- Railway Industry

    DBSI Services 3.5company rating

    Rochester, NY jobs

    The candidate shall have experienced with conducting Risk Assessments using industry standard Risk frameworks like NIST CSF, IEC 62443 3-2, etc. with a responsibility as needed per the project context. Cybersecurity context, and Cybersecurity Risk Analysis Cybersecurity Architecture definition and requirement allocation Cascading of requirement to suppliers, identifying Third Parties Risks, Application of Cybersecurity Assurance Level Have a working knowledge of conducting Risk Assessment, using the tools like Fence or equivalent.Good understanding with methods of Cybersecurity risk analysis Experience in embedded or OT/ Industrial systems (railway / aeronautics ...) Knowledge of main Cybersecurity standards and regulations, such as: ISO 2700X, 62443, NIST, APTAKnowledge of some Cybersecurity solutions and areas Compensation: $70.00 - $75.00 per hour MAKING THE INDUSTRY'S BEST MATCHES DBSI Services is widely recognized as one of the industry's fastest growing staffing agencies. Thanks to our longstanding experience in various industries, we have the capacity to build meaningful, long-lasting relationships with all our clients. Our success is a result of our commitment to the best people, the best solutions and the best results. Our Story: Founded in 1995 Privately Owned Corporation Managing Partner Business Model Headquartered in New Jersey US Based Engineers Only Collaborative Team Approach Methodology and Process Driven GET HIRED Top performing engineers are the foundation of our business. Our priority is building strong relationships with each employment candidate we work with. You can trust our professional recruiters to invest the time required to fully understand your skills, explore your professional goals and help you find the right career opportunities.
    $70-75 hourly Auto-Apply 60d+ ago
  • Cyber Security Engineer

    CSA Global LLC 4.3company rating

    Fort Indiantown Gap, PA jobs

    Client Solution Architects (CSA) is currently seeking a Cyber Security Engineer to support our program at Fort Indiantown Gap, PA. For nearly 50 years, CSA has delivered integrated technology and operational support services to meet the defense and federal sector's most complex enterprise needs. Working from operations centers and shipyards to training sites and program offices, CSA deploys experienced teams, innovative tools and proven processes to advance federal missions. This position is contingent on contract award. How Role will make an impact: * Maintains the appropriate operational security posture and documentation for MCTSP information systems * Implementing DoD, Army, ARNG, and MCTSP information security policies * Creating and implementing POA&M in response to vulnerabilities identified during risk assessments, audits, and inspections * RMF document and artifact management * Managing and tracking the IAVM system * Physical and environmental protection, access control, incident handling, security training, vulnerability and compliance management, configuration management, and assistance in the development of security policies and procedures. Requirements What you'll need to have to join our award-winning team: * Clearance: Must possess and maintain an active Secret Clearance. * Bachelor's degree in Cyber Security or related field or associate degree and 5 years of specialized experience. * IAT II Certification * 3 years' experience in assessing and mitigating risk for networks and systems utilized in LVC and integrated training environments that include simulations that stimulate Army C2 Systems. * 3 years' experience planning architectures for LVC and integrated training environments and for stimulation of Army Mission Command Systems in support of Division and Above training events and distributed exercises; * 5 years' experience with military training and training support; experience designing and supporting distributed, simulation-supported exercises Why You'll Love this Job: * Purpose filled roles that contribute to impactful solutions to advance our federal clients' mission. * You may examine doctrine, plans, policies and procedures that will enhance and enrich the training environment, ensuring our warfighters are fully prepared for any challenge. * Daily opportunities to develop new skills * Team environment What We Can Offer You: * Compensation * Health & Wellbeing * We strive to provide our team members and their loved ones with a comprehensive suite of benefits that supports their physical, financial and emotional wellbeing. * Personal & Professional Development * We also invest in your career because the better you are, the better we all are. We have specific programs catered to helping you reach any career goals you have - whether you want to become a knowledge expert in your field or apply your skills to another division. * Diversity, Inclusion & Belonging * We are unconditionally inclusive in the way we work and celebrate individual uniqueness. We know diverse backgrounds are valued and succeed here. We have the flexibility to manage our work and personal needs. We make bold moves, together, and are a force for good. * Benefits * Healthcare (medical, dental, vision, prescription drugs) * Pet Insurance * 401(k) savings plan * Paid Time Off (PTO) * Holiday pay opportunities * Basic life insurance * AD&D insurance * Company-paid Short-Term and Long-Term Disability * Employee Assistance Program * Tuition Support Options * Identity Theft Program
    $92k-130k yearly est. 60d+ ago
  • Cyber Security Engineer

    CSA Global LLC 4.3company rating

    Fort Indiantown Gap, PA jobs

    Job DescriptionDescription: Client Solution Architects (CSA) is currently seeking a Cyber Security Engineer to support our program at Fort Indiantown Gap, PA. For nearly 50 years, CSA has delivered integrated technology and operational support services to meet the defense and federal sector's most complex enterprise needs. Working from operations centers and shipyards to training sites and program offices, CSA deploys experienced teams, innovative tools and proven processes to advance federal missions. This position is contingent on contract award. How Role will make an impact: Maintains the appropriate operational security posture and documentation for MCTSP information systems Implementing DoD, Army, ARNG, and MCTSP information security policies Creating and implementing POA&M in response to vulnerabilities identified during risk assessments, audits, and inspections RMF document and artifact management Managing and tracking the IAVM system Physical and environmental protection, access control, incident handling, security training, vulnerability and compliance management, configuration management, and assistance in the development of security policies and procedures. Requirements: What you'll need to have to join our award-winning team: Clearance: Must possess and maintain an active Secret Clearance. Bachelor's degree in Cyber Security or related field or associate degree and 5 years of specialized experience. IAT II Certification 3 years' experience in assessing and mitigating risk for networks and systems utilized in LVC and integrated training environments that include simulations that stimulate Army C2 Systems. 3 years' experience planning architectures for LVC and integrated training environments and for stimulation of Army Mission Command Systems in support of Division and Above training events and distributed exercises; 5 years' experience with military training and training support; experience designing and supporting distributed, simulation-supported exercises Why You'll Love this Job: Purpose filled roles that contribute to impactful solutions to advance our federal clients' mission. You may examine doctrine, plans, policies and procedures that will enhance and enrich the training environment, ensuring our warfighters are fully prepared for any challenge. Daily opportunities to develop new skills Team environment What We Can Offer You: Compensation Health & Wellbeing We strive to provide our team members and their loved ones with a comprehensive suite of benefits that supports their physical, financial and emotional wellbeing. Personal & Professional Development We also invest in your career because the better you are, the better we all are. We have specific programs catered to helping you reach any career goals you have - whether you want to become a knowledge expert in your field or apply your skills to another division. Diversity, Inclusion & Belonging We are unconditionally inclusive in the way we work and celebrate individual uniqueness. We know diverse backgrounds are valued and succeed here. We have the flexibility to manage our work and personal needs. We make bold moves, together, and are a force for good. Benefits Healthcare (medical, dental, vision, prescription drugs) Pet Insurance 401(k) savings plan Paid Time Off (PTO) Holiday pay opportunities Basic life insurance AD&D insurance Company-paid Short-Term and Long-Term Disability Employee Assistance Program Tuition Support Options Identity Theft Program
    $92k-130k yearly est. 30d ago
  • Cyber Security Engineer

    CSA Global LLC 4.3company rating

    Beverly, KS jobs

    Job DescriptionDescription: Client Solution Architects (CSA) is currently seeking a Cyber Security Engineer to support our program at Fort Leavenworth, KS. For nearly 50 years, CSA has delivered integrated technology and operational support services to meet the defense and federal sector's most complex enterprise needs. Working from operations centers and shipyards to training sites and program offices, CSA deploys experienced teams, innovative tools and proven processes to advance federal missions. How Role will make an impact: Maintains the appropriate operational security posture and documentation for MCTSP information systems Implementing DoD, Army, ARNG, and MCTSP information security policies Creating and implementing POA&M in response to vulnerabilities identified during risk assessments, audits, and inspections RMF document and artifact management Managing and tracking the IAVM system Physical and environmental protection, access control, incident handling, security training, vulnerability and compliance management, configuration management, and assistance in the development of security policies and procedures. Requirements: What you'll need to have to join our award-winning team: Clearance: Must possess and maintain an active Secret Clearance. Bachelor's degree in Cyber Security or related field or associate degree and 5 years of specialized experience. IAT II Certification 3 years' experience in assessing and mitigating risk for networks and systems utilized in LVC and integrated training environments that include simulations that stimulate Army C2 Systems. 3 years' experience planning architectures for LVC and integrated training environments and for stimulation of Army Mission Command Systems in support of Division and Above training events and distributed exercises; 5 years' experience with military training and training support; experience designing and supporting distributed, simulation-supported exercises Why You'll Love this Job: Purpose filled roles that contribute to impactful solutions to advance our federal clients' mission. You may examine doctrine, plans, policies and procedures that will enhance and enrich the training environment, ensuring our warfighters are fully prepared for any challenge. Daily opportunities to develop new skills Team environment What We Can Offer You: Compensation Health & Wellbeing We strive to provide our team members and their loved ones with a comprehensive suite of benefits that supports their physical, financial and emotional wellbeing. Personal & Professional Development We also invest in your career because the better you are, the better we all are. We have specific programs catered to helping you reach any career goals you have - whether you want to become a knowledge expert in your field or apply your skills to another division. Diversity, Inclusion & Belonging We are unconditionally inclusive in the way we work and celebrate individual uniqueness. We know diverse backgrounds are valued and succeed here. We have the flexibility to manage our work and personal needs. We make bold moves, together, and are a force for good. Benefits Healthcare (medical, dental, vision, prescription drugs) Pet Insurance 401(k) savings plan Paid Time Off (PTO) Holiday pay opportunities Basic life insurance AD&D insurance Company-paid Short-Term and Long-Term Disability Employee Assistance Program Tuition Support Options Identity Theft Program
    $77k-105k yearly est. 30d ago
  • Senior Security Engineer

    Primelending 4.4company rating

    Irving, TX jobs

    Hilltop Holdings is seeking a Senior Security Engineer with deep expertise in Identity and Access Management (IAM) to lead the design, implementation, and maintenance of secure IAM solutions. This role will focus on SailPoint, Microsoft IAM technologies (Azure AD, Active Directory), and PowerShell scripting, and will serve as a subject matter expert in IAM and broader security domains. Eight (8) or more years of progressive Information Technology or Information Security experience required. Bachelor's or Master's degree in relevant discipline(s), or equivalent education/experience in Information Technology or Information Security fields. CISSP (Certified Information Systems Security Professional), CISM (Certified Information Systems Manager), CCNA-Security, or comparable security certification desired. Strong experience with SailPoint, Azure AD, Active Directory, and PowerShell. Strong quantitative and analytical abilities with the ability to develop relevant projects to mitigate security risks to the enterprise. Strong orientation toward problem solving and decision-making in an open and collaborative environment. Excellent verbal, written, and interpersonal communication skills. Must be able to drive project deliverables. Must be self-motivated with strong initiative, high level of accountability, and attention to detail. Other functions as needed. The above statements are intended to describe the general nature and level of work being performed by individuals in, or assigned to, the above position and are not intended to be construed as an exhaustive list of all responsibilities, duties and skills required, and may be changed at the discretion of the Company. Design and implement enterprise IAM solutions using SailPoint and Microsoft technologies. Automate IAM processes with PowerShell scripting. Lead technical delivery, documentation, and integration of IAM systems. Supervise and mentor junior engineers; provide ownership of security initiatives. Collaborate across teams to align IAM with business and compliance goals. Contribute to security strategy, risk mitigation, and technology selection. Serves as Subject Matter Expert for assigned areas of expertise. Monitors technical controls and measures effectiveness. Collaborates across lines of business to ensure successful solution delivery. Develops and documents technology standards. Identifies and communicates risk areas and provides recommendations to address. Contributes to the security strategy in support of the business strategy. Other functions as needed.
    $97k-123k yearly est. Auto-Apply 15d ago
  • Security Engineer, Cloud

    Wolfe 3.6company rating

    Pittsburgh, PA jobs

    About Us Recognized among Pittsburgh's 2024 Top Workplaces and Fastest-Growing Companies, Wolfe has been a leader in the Gift Card and FinTech sectors for over 25 years. We power gift card programs for national merchants like KFC. Our flagship consumer brand, PerfectGift.com, enables customers to create customized gift cards. We are a fast-paced environment, like kayaking down a white-water river, not canoeing on a lake. Learn more about our company culture, core values, and industry recognition on our career page (****************************** Role Summary Wolfe is seeking a Senior Cloud Security Engineer to lead the protection of our cloud-based systems, data, and applications. This is a pivotal role focused on embedding security into every layer of our cloud infrastructure, particularly within AWS environments. You'll work closely with Developers, DevOps, and Infrastructure teams to manage vulnerabilities, mature security controls, and drive secure practices across our technology organization. In this hands-on role, you'll architect and implement cloud-native security solutions, enhance cloud protections, and build tools and procedures that safeguard sensitive data and workloads. You'll help shape how Wolfe builds and maintains secure cloud systems while balancing risk, performance, and delivery. If you are an experienced DevOps engineer looking to grow into a security-focused role, we encourage you to apply! This is a five-day onsite role based in Pittsburgh, PA. Wolfe does not provide visa sponsorship. Responsibilities Analyze cloud security models, protocols, and systems. Monitor and analyze cloud security tools and technologies for potential risks. Develop best practices and processes for cloud security. Implement security measures to protect the cloud infrastructure from external threats. Collaborate with other teams to ensure the security of the cloud environment. Continuously enhance cloud security technologies and services in designated security domains. Analyze, design, and create applications, tests, and infrastructure automation tools. Impact Statement Example expectations for this role include but are not limited to: Lead the initiative to strengthen cloud account security by eliminating user keys and deploying updated policy controls within three months. Deploy enhanced firewall solutions and expand application protection platforms to production environments, achieving cost savings and increased security over the next four months. Manage and mature privileged access management (PAM) solutions for databases, phasing out legacy access methods where possible, and extend PAM deployment to new environments within six months. Perform comprehensive assessments of new accounts and prepare for resource cleanup across multiple cloud projects. Enhance cloud security maturity by improving KPI tracking and maturing security metrics reporting within three months. Assist with developing penetration test scopes and support the execution of penetration tests within six months, while ensuring visibility of cloud vulnerabilities for developers. Qualification 3+ years security engineering or 3+ years cloud infrastructure engineering experience Strong communication skills Proficient with AWS; familiar with Azure and/or GCP Passionate about cloud security and driving secure infrastructure Deep experience in cloud security technologies, processes, and best practices Familiarity of non-cloud native security tools like CrowdStrike, SentinelOne Singularity, Wiz, or Prisma History of developing and implementing security policies and procedures Solid understanding of network security protocols and security architecture Excellent problem-solving abilities Effective team player focused on team goals Experience in a fast-paced environment with the ability to think quickly and creatively to solve problems. Familiar with frameworks: NIST CSF, OWASP DSOMM, CSA STAR, CCM Recommended certifications: CCSP, AWS Certified - Security, GCSA, CISSP Compensation & Benefits Wolfe is committed to providing a comprehensive benefits package to support your well-being, along with competitive compensation targeting the top 25% (75th percentile) in the local market. Our benefits and perks include but not limited to: Restricted Stock Units (RSUs) Profit Share Medical, Prescription, Vision, and Dental insurance for employees and dependents (Wolfe pays 80% of premium) Short-Term Disability Insurance (Wolfe pays 100% of premium) Voluntary Long-Term Disability Insurance, Life Insurance, Critical Illness Insurance, Accident Insurance, and Hospital Indemnity coverage PTO (vacation) Corporate Holidays 401(k) Employee recognition program Charitable Donation to a charity of your choice yearly Employee Referral Bonus Tuition Reimbursement Internal Training and Information sessions Family Picnic, Holiday Party, and other outings Internal Culture Club --- Wolfe is an Equal Opportunity Employer. Wolfe does not sponsor employment visas.
    $106k-150k yearly est. 60d+ ago
  • Senior Telecommunications & Security Systems Engineer : Life Sciences - Cincinnati, OH Req 32007

    Jacobs 4.3company rating

    Cincinnati, OH jobs

    At Jacobs, we're not just building structures, we're helping our clients innovate and grow by designing, engineering, and executing the construction of their state-of-the-art facilities that are changing our world. We push the limits of what's possible to make the world smarter, more connected and more sustainable. Become part of our team as a Senior Telecommunications & Security Systems Engineer in Cincinnati, Ohio who is excited about working on projects that enable the heart of our clients' business. Join us and you'll have the chance to work on projects including state-of-the-art industrial and commercial facilities. You'll be responsible for providing engineering support on a variety of projects in the pharmaceutical, electronics & data centers, & other industries. With your technical background you will work with multi-disciplinary teams of engineers to provide structured cabling, access control, and CCTV designs for a wide variety of projects. You will work in a team environment under the direction of other engineers and project managers to solve complex IT & Security solutions in a timely and satisfactory manner. Bring your curiosity, talent for multi-tasking and extreme organizational skills and we'll help you grow, pursue and fulfill what drives you - so we can make big impacts on the world, together. - At least 10 years of experience leading structured cabling and security systems designs - RCDD Certification - At least 10 years of Telecommunications and Security Systems design experience. - Bachelor's Degree in Electrical or other related Engineering degree preferred - Experience leading REVIT based projects. - Experience providing Structured Cabling designs for Pharma labs, Pharma manufacturing facilities, and data center designs. - Experience providing security systems designs, including Access Control, CCTV, and clean room door interlock controls. Ideally, you'll also have: - Master's Degree in Electrical or other related Engineering, but not required - BICSI OSP Certification - AutoCAD and REVIT experience #LifeSciences, #Bio/Pharma, #EPCMV, #globallifescience #LI-SH1 Jacobs is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, religion, creed, color, national origin, ancestry, sex (including pregnancy, childbirth, breastfeeding, or medical conditions related to pregnancy, childbirth, or breastfeeding), age, medical condition, marital or domestic partner status, sexual orientation, gender, gender identity, gender expression and transgender status, mental disability or physical disability, genetic information, military or veteran status, citizenship, low-income status or any other status or characteristic protected by applicable law. Learn more about your rights under Federal EEO laws and supplemental language.
    $83k-113k yearly est. 55d ago
  • Cyber Hunt Specialist

    CSA Global LLC 4.3company rating

    Dahlgren, VA jobs

    Client Solution Architects (CSA) is currently seeking a Cyber Hunt Specialist to support a program at Dahlgren Naval Base. For nearly 50 years, CSA has delivered integrated technology and operational support services to meet the defense and federal sector's most complex enterprise needs. Working from operations centers and shipyards to training sites and program offices, CSA deploys experienced teams, innovative tools and proven processes to advance federal missions. This position is contingent upon award. How Role will make an impact: * Participates in all phases of incident response or hunt methodology (kill chain, pyramid of pain, diamond model). * Provides expert level assistance to Digital Forensics and Incident Response and threat intelligence operations teams on advanced actor tactics, techniques and procedures (TTPs) related to Cyber. * Keeps current on industry direction, trends, and future capabilities with respect to cyber threat analytics. * Provides expertise for support of user requirements of complex to highly complex software/hardware applications, hunt methodologies, advanced actor campaigns and exploits and telemetry refinement related to Cyber. * Provides assistance to Digital Forensics and Incident Response and threat intelligence operations teams on advanced actor TTPs related to Cyber. * Keeps current on industry direction, trends, and future capabilities with respect to cyber threat analytics. Requirements What you'll need to have to join our award-winning team: * Clearance: Must possess and maintain an active Top Secret Clearance * Five (5) years of professional experience providing expertise for support of user requirements of complex to highly complex software/hardware applications, hunt methodologies, advanced actor campaigns and exploits and telemetry refinement related to Cyber. * This position is required to be designated as IAT II level
    $92k-129k yearly est. 39d ago
  • Cyber Hunt Specialist

    CSA Global LLC 4.3company rating

    Dahlgren, VA jobs

    Job DescriptionDescription: Client Solution Architects (CSA) is currently seeking a Cyber Hunt Specialist to support a program at Dahlgren Naval Base. For nearly 50 years, CSA has delivered integrated technology and operational support services to meet the defense and federal sector's most complex enterprise needs. Working from operations centers and shipyards to training sites and program offices, CSA deploys experienced teams, innovative tools and proven processes to advance federal missions. This position is contingent upon award. How Role will make an impact: Participates in all phases of incident response or hunt methodology (kill chain, pyramid of pain, diamond model). Provides expert level assistance to Digital Forensics and Incident Response and threat intelligence operations teams on advanced actor tactics, techniques and procedures (TTPs) related to Cyber. Keeps current on industry direction, trends, and future capabilities with respect to cyber threat analytics. Provides expertise for support of user requirements of complex to highly complex software/hardware applications, hunt methodologies, advanced actor campaigns and exploits and telemetry refinement related to Cyber. Provides assistance to Digital Forensics and Incident Response and threat intelligence operations teams on advanced actor TTPs related to Cyber. Keeps current on industry direction, trends, and future capabilities with respect to cyber threat analytics. Requirements: What you'll need to have to join our award-winning team: Clearance: Must possess and maintain an active Top Secret Clearance Five (5) years of professional experience providing expertise for support of user requirements of complex to highly complex software/hardware applications, hunt methodologies, advanced actor campaigns and exploits and telemetry refinement related to Cyber. This position is required to be designated as IAT II level
    $92k-129k yearly est. 8d ago
  • Senior Systems Security Engineer

    CSA Global LLC 4.3company rating

    Dahlgren, VA jobs

    Client Solution Architects (CSA) is currently seeking a Senior Systems Security Engineer to support a program at Dahlgren, VA. For nearly 50 years, CSA has delivered integrated technology and operational support services to meet the defense and federal sector's most complex enterprise needs. Working from operations centers and shipyards to training sites and program offices, CSA deploys experienced teams, innovative tools and proven processes to advance federal missions. This position is contingent on award. How Role will make an impact: * Conducts and leads TEMPEST testing using approved test plan, the production test procedures and the current National TEMPEST Standard * Vulnerability analysis * Risk analysis * SCAP scans * DISA Security Technical Implementation Guide (STIG) implementation * Scanning for viruses and other software that is detrimental * Accreditation of systems and audits Requirements What you'll need to have to join our award-winning team: * Clearance: Must possess and maintain an active Top Secret Clearance * Six (6) years of professional experience in relation to IT security with the DoD or Navy * Experience with vulnerability analysis, risk analysis, SCAP scans, DISA Security Technical Implementation Guide (STIG) implementation, scanning for viruses and other software that is detrimental. * Qualified experience in accreditation of systems and audits * Per DoD Directive 8570.01-M or successor, this position requires IAT Level 3 and requires this position to be designated as an IT Level 1
    $109k-152k yearly est. 35d ago
  • Senior Systems Security Engineer

    CSA Global LLC 4.3company rating

    Dahlgren, VA jobs

    Job DescriptionDescription: Client Solution Architects (CSA) is currently seeking a Senior Systems Security Engineer to support a program at Dahlgren, VA. For nearly 50 years, CSA has delivered integrated technology and operational support services to meet the defense and federal sector's most complex enterprise needs. Working from operations centers and shipyards to training sites and program offices, CSA deploys experienced teams, innovative tools and proven processes to advance federal missions. This position is contingent on award. How Role will make an impact: Conducts and leads TEMPEST testing using approved test plan, the production test procedures and the current National TEMPEST Standard Vulnerability analysis Risk analysis SCAP scans DISA Security Technical Implementation Guide (STIG) implementation Scanning for viruses and other software that is detrimental Accreditation of systems and audits Requirements: What you'll need to have to join our award-winning team: Clearance: Must possess and maintain an active Top Secret Clearance Six (6) years of professional experience in relation to IT security with the DoD or Navy Experience with vulnerability analysis, risk analysis, SCAP scans, DISA Security Technical Implementation Guide (STIG) implementation, scanning for viruses and other software that is detrimental. Qualified experience in accreditation of systems and audits Per DoD Directive 8570.01-M or successor, this position requires IAT Level 3 and requires this position to be designated as an IT Level 1
    $109k-152k yearly est. 4d ago
  • Systems Security Engineer

    CSA Global LLC 4.3company rating

    Dahlgren, VA jobs

    Job DescriptionDescription: Client Solution Architects (CSA) is currently seeking a Systems Security Engineer to support a program at Dahlgren Naval Base. For nearly 50 years, CSA has delivered integrated technology and operational support services to meet the defense and federal sector's most complex enterprise needs. Working from operations centers and shipyards to training sites and program offices, CSA deploys experienced teams, innovative tools and proven processes to advance federal missions. This position is contingent upon award. How Role will make an impact: Perform vulnerability analysis, risk analysis, scanning for viruses and other software that is detrimental Accreditation of systems and audits Requirements: What you'll need to have to join our award-winning team: Clearance: Must possess and maintain an active Secret Clearance Four (4) years of professional experience in relation to IT security with the DoD or Navy. Experience with vulnerability analysis, risk analysis, scanning for viruses and other software that is detrimental. Qualified experience in accreditation of systems and audits. This position is required to be designated as IAT II level
    $101k-145k yearly est. 8d ago
  • Information Systems Security Analyst

    CSA Global LLC 4.3company rating

    Dahlgren, VA jobs

    Job DescriptionDescription: Client Solution Architects (CSA) is currently seeking an Information Systems Security Analyst to support a program at Dahlgren, VA. This role is contingent on award. For nearly 50 years, CSA has delivered integrated technology and operational support services to meet the defense and federal sector's most complex enterprise needs. Working from operations centers and shipyards to training sites and program offices, CSA deploys experienced teams, innovative tools and proven processes to advance federal missions. How Role will make an impact: Computer networking concepts, protocols, and security methodologies System performance and availability monitoring System software and organizational design standards (e.g., International Organization of Standardization (ISO) guidelines) System life cycle management principles, including software security and usability System/server administration and systems engineering concepts and methods Server and client operating systems Network security architecture concepts (topology, protocols, defense-indepth) Network systems management principles and tools Basic system administration, network, and operating system hardening techniques Cloud computing service and deployment models (SaaS, IaaS, PaaS) Cloud security strategy and architecture Data security standards Personally Identifiable Information (PII), Payment Card Information (PCI), Protected Health Information (PHI)) Information security program management and project management principles Resource management principles and techniques Risk management processes (assessment and mitigation) Secure acquisitions (e.g., Contracting duties, secure procurement, supply chain risk management) Information technology (IT) supply chain security and risk management Applicable laws, statutes, Presidential Directives, and guidelines related to cybersecurity and privacy Organizational risk tolerance and risk management approach Critical IT procurement requirements Requirements: What you'll need to have to join our award-winning team: Clearance: Must possess and maintain an active Secret Clearance Four (4) years of experience in Cybersecurity. Cybersecurity principles, threats, vulnerabilities, and risk management processes Encryption algorithms (e.g., Internet Protocol Security (IPSEC), Advanced Encryption Standard (AES), General Routing Encapsulation (GRE), Internet Key Exchange (IKE), Message Digest 5 (MD5), Secure Hash Algorithm (SHA), Triple Data Encryption Algorithm (3DES)) Data backup and recovery concepts and tools Disaster recovery and continuity of operations planning Host/network access control mechanisms (e.g., Access Control Lists(ACLs)) Incident response and handling methodologies Intrusion detection methodologies and techniques Network traffic analysis methods Network protocols (Transmission Control Protocol /Internet Protocol (TCP/IP), and Open System Interconnection (OSI) model System and application security threats and vulnerabilities (e.g., buffer overflow, cross-site scripting, SQL injection) Security architecture concepts and enterprise architecture reference models National and international cybersecurity laws, regulations, policies, and ethics Current and emerging threats and threat vectors Enterprise incident response program, roles, and responsibilities Penetration testing principles, tools, and techniques
    $92k-135k yearly est. 2d ago
  • Information Systems Security Analyst

    CSA Global LLC 4.3company rating

    Dahlgren, VA jobs

    Client Solution Architects (CSA) is currently seeking an Information Systems Security Analyst to support a program at Dahlgren, VA. This role is contingent on award. For nearly 50 years, CSA has delivered integrated technology and operational support services to meet the defense and federal sector's most complex enterprise needs. Working from operations centers and shipyards to training sites and program offices, CSA deploys experienced teams, innovative tools and proven processes to advance federal missions. How Role will make an impact: * Computer networking concepts, protocols, and security methodologies * System performance and availability monitoring * System software and organizational design standards (e.g., International Organization of Standardization (ISO) guidelines) * System life cycle management principles, including software security and usability * System/server administration and systems engineering concepts and methods * Server and client operating systems * Network security architecture concepts (topology, protocols, defense-indepth) * Network systems management principles and tools * Basic system administration, network, and operating system hardening techniques * Cloud computing service and deployment models (SaaS, IaaS, PaaS) * Cloud security strategy and architecture * Data security standards Personally Identifiable Information (PII), Payment Card Information (PCI), Protected Health Information (PHI)) * Information security program management and project management principles * Resource management principles and techniques * Risk management processes (assessment and mitigation) * Secure acquisitions (e.g., Contracting duties, secure procurement, supply chain risk management) * Information technology (IT) supply chain security and risk management * Applicable laws, statutes, Presidential Directives, and guidelines related to cybersecurity and privacy * Organizational risk tolerance and risk management approach * Critical IT procurement requirements Requirements What you'll need to have to join our award-winning team: * Clearance: Must possess and maintain an active Secret Clearance * Four (4) years of experience in Cybersecurity. * Cybersecurity principles, threats, vulnerabilities, and risk management processes * Encryption algorithms (e.g., Internet Protocol Security (IPSEC), Advanced Encryption Standard (AES), General Routing Encapsulation (GRE), Internet Key Exchange (IKE), Message Digest 5 (MD5), Secure Hash Algorithm (SHA), Triple Data Encryption Algorithm (3DES)) * Data backup and recovery concepts and tools * Disaster recovery and continuity of operations planning * Host/network access control mechanisms (e.g., Access Control Lists(ACLs)) * Incident response and handling methodologies * Intrusion detection methodologies and techniques * Network traffic analysis methods * Network protocols (Transmission Control Protocol /Internet Protocol (TCP/IP), and Open System Interconnection (OSI) model * System and application security threats and vulnerabilities (e.g., buffer overflow, cross-site scripting, SQL injection) * Security architecture concepts and enterprise architecture reference models * National and international cybersecurity laws, regulations, policies, and ethics * Current and emerging threats and threat vectors * Enterprise incident response program, roles, and responsibilities * Penetration testing principles, tools, and techniques
    $92k-135k yearly est. 2d ago
  • Specialist - Security Systems

    Carrollton 4.1company rating

    Texas jobs

    School Safety & Security/Specialist - Security Systems Job Title: Specialist - Security Systems Wage/Hour Status: Non-Exempt Reports to: Senior Security Systems Engineer Pay Grade: Technology 4 - 226 Days Dept./School: Safety and Security Date Revised: September 12, 2025 Primary Purpose: To provide support and technical assistance to the District's physical security systems team. This position will support and maintain access control, video surveillance, burglar alarms, public address, and emergency management applications. QUALIFICATIONS: Education/Certification: High School Diploma or equivalent Ability to qualify for a background clearance through the State of Texas Genetec or similar certification preferred Special Knowledge/Skills: Working knowledge of access control or physical security systems Basic understanding of network topology Basic troubleshooting skills Basic understanding of circuitry and relay logic Excellent computer skills and proficiency in Excel, Word, Outlook, and OneNote Excellent communication skills both verbal and written Open to the direction and collaborative work style and commitment to getting the job done Experience with audio/video and public address systems Preferred Experience: Minimum of 3 years of experience installing, programming, and maintaining security systems, including surveillance cameras, intrusion alarms, fire, and other life safety systems Enterprise-level systems experience MAJOR RESPONSIBILITIES AND DUTIES: Specific Job Duties Technical Demonstrate strong work habits, including teamwork, initiative, dependability, and the ability to work independently Take direction and communicate effectively with security systems engineers Install and configure security systems equipment, including cameras, door access, public address, and intrusion systems Analyze, troubleshoot, and resolve technical issues related to security system components Perform additional duties and tasks as assigned Other Participate in staff development and training programs, as appropriate Attend internal department meetings to understand project scope and requirements Maintain and update Genetec certification Stay informed and comply with all state and district policies, regulations, and procedures related to the position Escalate project issues or concerns as necessary Complete other duties as required by management Mental Demands/Physical Demands/Environmental Factors: Tools/Equipment Used: Standard office equipment including personal computer and peripherals, basic hand and power tools, ladder, network troubleshooting tools Posture/Motion: Prolonged sitting; occasional bending/stooping, pushing/pulling, and twisting Lifting: Occasional light lifting and carrying (up to 50 lbs.) Environment: May work prolonged or irregular hours; Requires travel throughout district; Subject to temperature extremes Mental Demands: Work with frequent interruptions; maintain emotional control under stress; Ability to communicate effectively (verbal and written); Interpret and implement policy, procedures, and data; coordinate district functions; ability to work in a team atmosphere. The foregoing statements describe the general purpose and responsibilities assigned to this job and are not an exhaustive list of all responsibilities and duties that may be assigned or skills that may be required. This is not an employment agreement or contract. The Administration has the exclusive right to alter this job description at any time without notice. Approved by: Rachael Freeman Date: September 12, 2025 Reviewed by: Jerry Martinez Date: September 12, 2025
    $49k-80k yearly est. 60d+ ago
  • Network Security Engineer

    System Soft Technologies 4.2company rating

    Raleigh, NC jobs

    Raleigh, NC (on-site) - local candidates will only be considered US or Green Card will only be considered US based work experience required The Network Security Engineer to protect the integrity and confidentiality of our network systems and data. This role is responsible for monitoring traffic, identifying vulnerabilities, responding to incidents, and maintaining firewall and encryption protocols-all while staying ahead of emerging threats. Key Responsibilities: Monitor network activity and respond to vulnerabilities in a timely manner Design, implement, and maintain security frameworks, policies, and tools Conduct regular vulnerability assessments and penetration tests Manage firewalls, user access, and authentication permissions Document security policies and incident responses Support audits and compliance efforts Qualifications: Bachelor's degree in a technical area of study 5+ years of IT network/security experience in the United States Expertise in TCP/IP networking, MPLS, SD-WAN, and firewalls Proficiency with security tools and technologies; strong knowledge of protocols and best practices Familiarity with Windows networking, SQL/SQL Server, and SAML Cybersecurity certifications (CISSP, CISM, CISA) preferred
    $74k-106k yearly est. 60d+ ago

Learn more about Grandbridge Real Estate Capital jobs

View all jobs