Senior Security Engineer jobs at Marriott International - 94 jobs
Senior Security AI Engineer
Innova Solutions 4.3
Irvine, CA jobs
A client of Innova Solutions is immediately hiring a SeniorSecurity AI Engineer
Contract
Duration: Long Term Contract
As a SeniorSecurity AI Engineer , you will need:
Required Skills & Qualifications:
Bachelor's degree in computer science, Engineering, Cybersecurity, or a related field
8+ years of experience in securityengineering, systems engineering, or security automation
Strong experience building and deploying production security systems or automations
Solid understanding of:
Security operations concepts
Cloud and infrastructure environments
Identity and access management
Experience using AI or LLM-based capabilities as part of real systems
Proficiency in programming or scripting (Python or similar)
Experience working with APIs and distributed systems
Preferred Qualifications
Master's degree or PhD in a related technical field
Experience designing AI-assisted workflows or agent-like systems
Background across multiple security domains (SOC, cloud, IAM, AppSec)
Experience integrating with enterprise security platforms and internal services
Qualified candidates should APPLY NOW for immediate consideration!
This position is only open to applicants who can be engaged on a W-2 basis.
Please hit APPLY to provide the required information, and we will be back in touch as soon as possible.
We are currently interviewing to fill this and other similar positions. If this role is not a fit for you, we do offer a referral bonus program for referrals that we successfully place with our clients, subject to program guidelines.ASK ME HOW.
Thank you!
Shikhar Goel
************
********************************
PAY RANGE AND BENEFITS:
Pay Range*: $70 - $75 Per Hour
*Pay range offered to a successful candidate will be based on several factors, including the candidate's education, work experience, work location, specific job duties, certifications, etc.
Benefits: Innova Solutions offers benefits( based on eligibility) that include the following: Medical & pharmacy coverage, Dental/vision insurance, 401(k), Health saving account (HSA) and Flexible spending account (FSA), Life Insurance, Pet Insurance, Short term and Long term Disability, Accident & Critical illness coverage, Pre-paid legal & ID theft protection, Sick time, and other types of paid leaves (as required by law), Employee Assistance Program (EAP).
ABOUT INNOVA SOLUTIONS: Founded in 1998 and headquartered in Atlanta, Georgia, Innova Solutions employs approximately 50,000 professionals worldwide and reports an annual revenue approaching $3 Billion. Through our global delivery centers across North America, Asia, and Europe, we deliver strategic technology and business transformation solutions to our clients, enabling them to operate as leaders within their fields.
Recent Recognitions:
Named One of America's Best Employers for New Grads by Forbes (2024
Named One of the Best Companies to Work for by U.S. News & World Report (Private Companies List, 2024-2025)
One of the Largest IT Staffing Firms in the US - Ranked #3 by Staffing Industry Analysts (SIA, 2024)
One of the Largest Staffing Firms in the US - Ranked #13 by Staffing Industry Analysts (SIA, 2024; includes Innova Solutions, Volt, & HireGenics)
Named One of the Top Ten Private Companies in Atlanta by the Atlanta Business Chronicle (2023)
One of the Largest Certified Minority Business Enterprises (MBEs) in the United States (NMSDC, 2024)
AWS Advanced Tier Services Partner with 100+ certifications
Website: ********************************
Innova Solutions offers a referral bonus for qualified Ambassadors who refer eligible referrals. Submit referrals at ************************************************************** and earn $250-$1,000 per referral.
Innova Solutions is an Equal Opportunity Employer and prohibits any kind of unlawful discrimination and harassment. Innova Solutions is committed to the principle of equal employment opportunity for all employees and to providing employees with a work environment free of discrimination and harassment on the basis of race, color, religion or belief, national origin, citizenship, social or ethnic origin, sex, age, physical or mental disability, veteran status, marital status, domestic partner status, sexual orientation, or any other status protected by the statutes, rules, and regulations in the locations where it operates. If you are an individual with a disability and need a reasonable accommodation to assist with your job search or application for employment, please contact us at ********************** or **************. Please indicate the specifics of the assistance needed. Innova Solutions encourages all interested and qualified candidates to apply for employment opportunities. Innova Solutions (HireGenics/Volt) does not discriminate against applicants based on citizenship status, immigration status, or national origin, in accordance with 8 U.S.C. § 1324b.
The company will consider for employment qualified applicants with arrest and conviction records in a manner that complies with the San Francisco Fair Chance Ordinance, the Los Angeles Fair Chance Initiative for Hiring Ordinance, and other applicable laws.
By applying for this job, you agree to receive calls, AI-generated calls, text messages, or emails from Innova Solutions and its affiliates, and contracted partners. Frequency varies for text messages. Message and data rates may apply. Carriers are not liable for delayed or undelivered messages. You can reply STOP to cancel and HELP for help. You can access our privacy policy at Privacy Policy - innovasolutions.
$70-75 hourly 2d ago
Looking for a job?
Let Zippia find it for you.
Sr Cyber Defense Security Specialist
Boyd Gaming 3.9
Las Vegas, NV jobs
Boyd Gaming Corporation has been successful in gaming jurisdiction in which we operate in the United States and is one of the premier casino entertainment companies in the United States. Never content to rest upon our successes, we will continue to evolve and retain a position of leadership in our industry. Our past success, our current business philosophies and our sound business planning, combine to position Boyd Gaming Corporation to maximize value for our shareholders, our team members and our communities.
Job Description
Subject matter expert and technical leader who is passionate about complex information security technology, topics and issues. Responsible for technical and operational duties in the areas of computer network defense analysis, vulnerability assessment and management, incident response and management, threat intelligence, data loss prevention, digital forensics, and threat hunting. Provides customer service and technical support with the goal of improving the overall security posture of the organization.
Responsible for documenting, monitoring and reporting on various security related systems and processes to ensure system and data integrity, security and availability.
Creation of policy, day to day management, administration and maintenance of Information Security tool set.
Identification of any tool or visibility gap in the existing tool set.
Identification of team requirements for any given technology, documentation of the current or proposed architecture, lead any proof of concept and document results, quantify any recommendations for the use of any new security tool, process or procedure.
Cross training the team on day to day use, standard operating procedures and tuning of the security tool set.
Analyze threat intelligence and risks. Identify and document impact to Boyd and any mitigation or remediation actions required.
Lead initiatives and own the outcomes related to remediation or mitigation against identified day zero attacks. Liaise with cross functional teams to facilitate and ensure implementation of any necessary tasks to defend against the risk.
Escalation point and technical subject matter expert for Security Analysts and any third-party security providers.
Responsible for tracking all security incidents to resolution.
Leading defensive protocols and programs when attacks occur.
Simulating attacks to identify potential areas of weakness in defenses and alerting.
Writing detailed reports and providing accurate metrics.
Perform the role and duties of an internal expert on matters relating to threat detection and incident response.
Lead investigations into attacks and indicators of compromise. Provide a coordinated response to applicable complex cyber-attacks.
Contribute to the ongoing development and improvement of security monitoring and incident response processes and solutions as required to support Boyd's Information Security program and exceed team objectives.
Tracking cybersecurity news and trends for applicable systems, and reporting concerns to appropriate resources.
Documenting and updating security related policies, including participation in the periodic review process and managing policy exceptions and risk acceptances in coordination with the Boyd Risk and Compliance teams.
Manage, update, modify alerts, adjust/tune event correlation rules to increase accuracy/relevance/effectiveness and create new rules based on threat changes and evolving risks.
Use creativity and innovation to automate and streamline team processes and procedures.
Perform event correlation, analysis of malicious activity indicators and appropriate response based on review and access to multiple security tools.
Qualifications
Bachelor's Degree in Information Technology or Cyber Security, and/or equivalent experience, Masters ' Degree in Computer Science or Information Security (Preferred)
7-10 years of professional Information Security Incident Response/ Forensics/ SOC experience
Proven experience with Information Security industry best practices
Proven experience with System/ Application vulnerabilities, threats and exploitation
Proven experience with malware analysis (dynamic and static) or forensic examination
Advanced knowledge and understanding of Windows, Linux, Unix and networking
Understanding of ISO 27001 / 2700 2, NIST Cybersecurity Framework, COBIT, SOX, PCI, CCPA and ITIL.
Expert level computer and IT skills.
Advanced analytical and problem-solving skills.
High levels of creativity, patience and ability to remain calm and focused in a crisis.
Highly motivated, self-starter, competitive, and attracted to challenging opportunities
Demonstrated strong decision-making skills. Having a logical and analytical approach to problem-solving, being able to assess situations and decide on the best course of action; understanding test results and developing solutions.
Demonstrated advanced organizational and time management skills. Completing tasks in a timely manner; being detail-oriented, able to perform repetitive tests in a thorough and consistent manner; being able to work on several tasks at the same time while still accomplishing goals and deadlines.
Advanced communication skills. Being able to articulate technical issues and requirements in a clear and non-technical manner.
Excellent teamwork skills. Ability to partner with the business and cross functional IT teams, working as a cohesive and effective unit.
Highest levels of honesty, integrity and objectivity. Ability to remain objective when analyzing weaknesses and proposed new solutions; being responsible and understanding the level of trust required to handle private and highly sensitive information and situations.
Additional Information
Boyd Gaming is proud to be an Equal Opportunity Employer and does not discriminate against any employee or applicant for employment because of race, color, sex, age, national origin, religion, sexual orientation, gender identity, status as a veteran, and basis of disability or any other federal, state, or local protected class.
Boyd Gaming is proud to be an Equal Opportunity Employer and does not discriminate against any employee or applicant for employment because of race, color, sex, age, national origin, religion, sexual orientation, gender identity, status as a veteran, and basis of disability or any other federal, state, or local protected class.
$51k-74k yearly est. 3d ago
Senior Cyber Defense Analyst
Abnormal Security 4.5
Remote
About the Role
We at Abnormal AI are looking for a hands-on Security Operations/ Cyber Defense Analyst who thrives in a fast-paced, engineering-driven environment. You'll be responsible for monitoring, investigating, and responding to security alerts across cloud, endpoint, identity, and application layers. You'll work closely with detection engineers, cloud security, and IT teams to protect our hybrid environment from threats in real time.
This is not a “click-through-the-console” SOC role - we're looking for someone who can think critically, automate relentlessly, and own incidents end-to-end.
Key Responsibilities
Detection & Triage:
Monitor alerts from tools like SIEM, EDR, IAM, CSPM, CDR etc.
Perform initial triage, enrichment, and correlation across multiple data sources.
Identify false positives and fine-tune rules with detection engineering.
Incident Response:
Lead containment, eradication, and recovery for endpoint, cloud, and identity incidents.
Document and communicate incidents through SOAR/Jira/ServiceNow workflows.
Perform root cause analysis and propose permanent preventive controls.
Threat Hunting & Analysis:
Proactively hunt using hypotheses mapped to MITRE ATT&CK.
Investigate anomalies across CloudTrail, Okta, GitHub, and other telemetry sources.
Collaborate with threat intelligence to identify emerging TTPs.
Automation & Process Improvement:
Build or enhance playbooks in SOAR (Torq or equivalent).
Create custom enrichment scripts and automations (Python, Bash, etc.).
Suggest new detection logic and operational improvements.
Reporting & Metrics:
Track and report operational metrics (MTTD, MTTR, incident categories).
Maintain documentation and lessons learned.
Required Skills & Qualifications
5-7 years of hands-on SOC or Incident Response experience in a cloud-first or hybrid environment.
Strong understanding of attacker lifecycle, MITRE ATT&CK, and threat actor TTPs.
Experience with EDR (CrowdStrike preferred), SIEM (Splunk preferred), and SOAR (Torq, XSOAR, or Phantom).
Familiarity with AWS, Okta, and SaaS platforms.
Proficiency in writing queries and automations using Python, SPL, or equivalent.
Excellent analytical and investigative skills - capable of operating independently with minimal hand-holding.
Strong documentation and communication skills for technical and executive audiences.
Nice to Have
Experience with CSPM/CDR/VM tools.
Knowledge of Containers and Kubernetes security.
Relevant certifications like CEH, Security+, GCIH, GCIA, or AWS Security Specialty.
What Success Looks Like
You consistently deliver high-quality triage with minimal false positives.
You automate repetitive tasks instead of manually doing them twice.
You can take a vague alert and turn it into a well-documented case with actionable findings.
#LI-EM5
You make measurable improvements to detection coverage, response time, or tooling maturity.
At Abnormal AI, certain roles are eligible for a bonus, restricted stock units (RSUs), and benefits. Individual compensation packages are based on factors unique to each candidate, including their skills, experience, qualifications and other job-related reasons.
Base salary range:$144,500-$170,000 USD
Abnormal AI is an equal opportunity employer. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, protected veteran status or other characteristics protected by law. For our EEO policy statement please
click here
. If you would like more information on your EEO rights under the law, please
click here
.
$144.5k-170k yearly Auto-Apply 1d ago
Senior Security Analyst
Blackcloak 3.5
Remote
BlackCloak's mission is to protect corporate executives and high-profile individuals in their personal lives, mitigating risks to their families, companies, reputation, and finances. We defend our clients' digital lives from hackers, privacy leaks, and identity theft. If you are passionate about helping to protect others, then keep reading - this may be your next great opportunity.
Ready to be on the front lines of cybersecurity? BlackCloak is looking for a sharp and proactive Security Analyst to join our team. In this role, you'll be the first responder, monitoring and triaging security alerts from a variety of sources and leading the charge on security incidents. You'll play a critical part in our continuous compliance program, help develop our threat detection capabilities, and analyze emerging threats. If you're passionate about protecting against cyber threats and thrive in a fast-paced environment, we want to hear from you.What You Will Do
Monitor and triage security alerts from a variety of sources including SIEM (SecOps, Sentinel), EDR (SentinelOne, CrowdStrike) and cloud security platforms like Wiz, Orca.
Serve as a primary responder for security incidents, executing the incident response lifecycle from initial detection and containment to eradication and recovery.
Support development of threat detection library, including incorporating threat intelligence, tuning within security tools, and SOAR response actions.
Maintain and draft SOP's and supporting documents for the Incident Response Plan and strategy
Analyze phishing attempts, malware, and other cyber threats; partner with SecurityEngineering to devise additional security controls, administer email security, EDR, ZTNA, and other security tooling configurations to block emerging threats.
Participate in a 24/7 on-call rotation to respond to critical security incidents.
Support triage and response for compliance alerts and requests, enabling the continuous compliance program at BlackCloak using tools such as Vanta, Drata.
Prepare and present detailed incident reports and security metrics to technical and leadership audiences.
What You Need To Be Successful
4-6 years of direct experience in a Security Operations Center, incident response, threat intelligence, or similar cybersecurity role.
Ability to navigate complex problems, stay cool under pressure, and be highly inquisitive.
Hands-on experience with SIEM, SOAR, and other security platforms for log analysis, correlation, automated response, and maturation of detections/runbooks.
Deep understanding and practical experience with Endpoint Detection and Response (EDR) tools and their investigative capabilities.
Good knowledge of cloud security principles and services in AWS, Azure, or GCP, including experience with security tools like Wiz or Prisma Cloud.
Solid understanding of network protocols, operating systems (Windows, Linux, mac OS), and common attack vectors (OWASP, MITRE)
Familiarity with identity and access management concepts, including SAML, OAuth, and role-based access control (RBAC)
Relevant industry certifications are highly desirable, such as GIAC (GCIH, GCFA), CISSP, or CompTIA Security+.
Excellent problem-solving skills and the ability to communicate complex technical concepts to both technical and non-technical audiences.
$100,000 - $130,000 a year About BlackCloakBlackCloak is an extremely fast-growing company in an entirely new product category. We have amazing product fit validated by industry awards and an impressive client base of Fortune 500 companies across all industries.
BlackCloak offers a competitive salary, exceptional benefits, and a dynamic work environment. Below is a quick summary of BlackCloak's generous benefits package for full-time employees includes:
- 100% Remote Company, within the USA - Comprehensive Medical, Dental, and Vision plans with a 100% employer-paid monthly premium option for employees & 50% employer-paid monthly premiums for dependents. - Health Savings Account with company contribution for eligible medical plans. - Flexible Vacation Plan - 10 Paid Company Holidays - 100% employer-paid Life, AD&D and Short- and Long-Term Disability Insurance - 401k with Traditional and Roth options, including employer match. - Company Equity - Paid Parental and Pregnancy Recovery Leave - Company and team off-sites and virtual events throughout the year - Home office stipend
We are an equal opportunity employer. We do not discriminate on the basis of race, color, religion, sex, sexual orientation, gender identity, marital status, age, disability, national or ethnic origin, military service status, citizenship, or other protected characteristic.
Learn More about UsWebsite: ********************* LinkedIn: /blackcloak Twitter: @BlackCloakCyberWhite Paper: *******************************************************************************************************
#liremote
$100k-130k yearly Auto-Apply 60d+ ago
Security Engineer (Product/Cloud Security)
Blackcloak 3.5
Remote
BlackCloak's mission is to protect corporate executives and high-profile individuals in their personal lives, mitigating risks to their families, companies, reputation, and finances. We defend our clients' digital lives from hackers, privacy leaks, and identity theft. If you are passionate about helping to protect others, then keep reading - this may be your next great opportunity.
As a SecurityEngineer, you will be part of BlackCloak's internal technology team supporting corporate security, information technology operations, and compliance. This is a critical role that is both hands-on and strategic, influencing and driving success for BlackCloak and its clients by designing, deploying, and supporting technology solutions for all areas of the business.
What you will do
Application Security (Primary)
Champion application security program strategy and implementation, including but not limited to various controls towards a “shift-left” security model, Security Champions program, adoption and implementation of SAST, DAST, other application security tools.
Assist in maturation of the Secure SDLC, including threat modeling, security architecture and requirements guidance, as well as secure code development training.
Work directly with developers to triage findings, provide remediation guidance, and foster a security-first culture.
Manual testing support for light red teaming such as POC'ing vulnerabilities, leading penetration tests via vendor engagements and/or internally led testing, and validating security findings.
Cloud & Infrastructure Security (Secondary)
Partner with Engineering, DevOps, to secure GCP, AWS environments
Leverage Cloud Security tools such as CNAAP, to remediate discovered misconfigurations, vulnerabilities, and triage of Cloud Security alerts.
Develop and implement secure infrastructure baselines, vulnerability management processes, secrets managements, IAM, and hardening standards within the cloud environment.
Incorporation of shift-left security tests and controls, into CI/CD pipelines
Help expand monitoring capabilities within tools such as SIEM, CNAAP, including implementation of required cloud architecture/logging, onboarding of log sources to security tools, and detection rules for cloud-based threats
Zero Trust & Network Security (Support)
Strengthen Zero Trust posture by expanding usage of Cloudflare WARP, WAF, other Zero Trust tooling and principles
Collaborate with the IT team to enhance endpoint security policies within EDR tools such as SentinelOne, Crowdstrike, as well as secure hardening standards into MDM
Support design and implementation of IAM best practices/principles for workforce and client identity, leveraging tools such as; Google IDP, Okta, Auth0, Zitadel
Security Operations & Incident Response (Support)
Review, design, and implementation of new Security Tools - support administration across tools such as SIEM, EDR, CNAAP, Email Security, and others.
Support security and risk assessments for new tools, vendors, and relationships with broader Security and IT team.
Assist in development of new threat detections, playbooks, and automated response/remediation
Support triage and response of security alerts, as an escalation point from the broader team.
Participate in supporting security on-call rotation
What You Need to be Successful
3-5 years of hands-on experience in a securityengineering role, preferably within a cloud-native, startup environment
Experience building or contributing to a Secure SDLC program, leveraging application security tools, supporting security architecture reviews
Demonstrated experience securing public cloud environments, with a strong preference for Google Cloud Platform (GCP).
Experience building or contributing to a Secure SDLC program.
Hands-on experience with modern security tooling, including
SAST/SCA: Snyk, Checkmarx, Veracode, or similar.
CNAPP: Wiz, Prisma Cloud, or similar.
EDR: SentinelOne, CrowdStrike, or similar.
SIEM: Google SecOps, Splunk, or other modern platforms.
A solid understanding of Zero Trust, IAM principles and practical experience implementing solutions with tools like Cloudflare.
Proficiency in at least one scripting language (e.g., Python, Bash) to automate security tasks and processes.
Excellent problem-solving skills and the ability to work collaboratively with both technical (Engineering) and non-technical (GTM) teams.
A proactive, "builder" mindset with a passion for improving processes, reducing risk.
Preferred Candidate will have:
Familiarity with Infrastructure as Code (IaC) and its security implications (e.g., Terraform).
Knowledge of compliance frameworks such as SOC 2, GDPR, NIST CSF
Familiarity with common application development languages such as Java or JavaScript
Understanding of system and architecture design principles, from code to cloud
Relevant industry certifications (e.g., GCLD, GCP Cloud SecurityEngineer, GCSA).
$100,000 - $140,000 a year
Final offer amounts are determined by multiple factors, including but not limited to geographic location as well as candidate experience and expertise, and may vary from the amounts listed above.
About BlackCloakBlackCloak is an extremely fast-growing company in an entirely new product category. We have amazing product fit validated by industry awards and an impressive client base of Fortune 500 companies across all industries.
BlackCloak offers a competitive salary, exceptional benefits, and a dynamic work environment. Below is a quick summary of BlackCloak's generous benefits package for full-time employees includes:
- 100% Remote Company, within the USA - Comprehensive Medical, Dental, and Vision plans with a 100% employer-paid monthly premium option for employees & 50% employer-paid monthly premiums for dependents. - Health Savings Account with company contribution for eligible medical plans. - Flexible Vacation Plan - 10 Paid Company Holidays - 100% employer-paid Life, AD&D and Short- and Long-Term Disability Insurance - 401k with Traditional and Roth options, including employer match. - Company Equity - Paid Parental and Pregnancy Recovery Leave - Company and team off-sites and virtual events throughout the year - Home office stipend
We are an equal opportunity employer. We do not discriminate on the basis of race, color, religion, sex, sexual orientation, gender identity, marital status, age, disability, national or ethnic origin, military service status, citizenship, or other protected characteristic.
Learn More about UsWebsite: ********************* LinkedIn: /blackcloak Twitter: @BlackCloakCyberWhite Paper: *******************************************************************************************************
#liremote
$100k-140k yearly Auto-Apply 60d+ ago
Security Engineer (Security Operations, Zero Trust)
Blackcloak 3.5
Remote
BlackCloak's mission is to protect corporate executives and high-profile individuals in their personal lives, mitigating risks to their families, companies, reputation, and finances. We defend our clients' digital lives from hackers, privacy leaks, and identity theft. If you are passionate about helping to protect others, then keep reading - this may be your next great opportunity.
As a SecurityEngineer, you will be part of BlackCloak's internal technology team supporting corporate security, information technology operations, and compliance. This is a critical role that is both hands-on and strategic, influencing and driving success for BlackCloak and its clients by designing, deploying, and supporting technology solutions for all areas of the business.What you will do
Security Operations & Incident Response (Primary)
Review, design, and implementation of new Security Tools - support administration across tools such as SIEM, EDR, CNAAP, Email Security, and others.
Support security and risk assessments for new tools, vendors, and relationships with broader Security and IT team.
Assist in development of new threat detections, playbooks, and automated response/remediation
Support triage and response of security alerts, as an escalation point from the broader team.
Participate in supporting security on-call rotation
Zero Trust & Network Security (Secondary)
Strengthen Zero Trust posture by expanding usage of Cloudflare WARP, WAF, other Zero Trust tooling and principles
Collaborate with the IT team to enhance endpoint security policies within EDR tools such as SentinelOne, Crowdstrike, as well as secure hardening standards into MDM
Support design and implementation of IAM best practices/principles for workforce and client identity, leveraging tools such as; Google IDP, Okta, Auth0, Zitadel
Mature Zero Trust alerts and controls across risk-based alerting, posture checks
Incorporation of Zero Trust principles into new programs and architecture designs
Application Security (Support)
Support application security program strategy and implementation, including but not limited to various controls towards a “shift-left” security model, Security Champions program, adoption and implementation of SAST, DAST, other application security tools.
Assist in maturation of the Secure SDLC, including threat modeling, security architecture and requirements guidance, as well as secure code development training.
Work directly with developers to triage findings, provide remediation guidance, and foster a security-first culture.
Manual testing support for light red teaming such as POC'ing vulnerabilities, leading penetration tests via vendor engagements and/or internally led testing, and validating security findings.
Cloud & Infrastructure Security (Support)
Partner with Engineering, DevOps, to secure GCP, AWS environments
Leverage Cloud Security tools such as CNAAP, to remediate discovered misconfigurations, vulnerabilities, and triage of Cloud Security alerts.
Support development and implement secure infrastructure baselines, vulnerability management processes, secrets managements, IAM, and hardening standards within the cloud environment.
Incorporation of shift-left security tests and controls, into CI/CD pipelines
Help expand monitoring capabilities within tools such as SIEM, CNAAP, including implementation of required cloud architecture/logging, onboarding of log sources to security tools, and detection rules for cloud-based threats.
What You Need to be Successful
3-5 years of hands-on experience in a securityengineering role, preferably within a cloud-native, startup environment
Deep experience building or contributing to a Security Operations program, leveraging/administering SIEM, EDR, CNAAP, Email Security, and SOAR tools.
Hands-on experience building and tuning threat detections, partnering with Security Analysts to improve/automate runbooks and response actions.
Demonstrated experience implementing tools and controls to support Zero Trust, with tools such as Cloudflare, IAM architecture and protocols, risk and posture based alerting, and workforce/customer identity solutions.
Proficiency in at least one scripting language (e.g., Python, Bash) to automate security tasks and processes, ability to implement and support detection-as-code and infrastructure-as-code where applicable.
Excellent problem-solving skills and the ability to work collaboratively with both technical (Engineering) and non-technical (GTM) teams.
Ability to drive new projects, self-starter, with minimal supervision
A proactive, "builder" mindset with a passion for improving processes, reducing risk.
Nice to have
Familiarity with Infrastructure as Code (IaC) and its security implications (e.g., Terraform).
Knowledge of compliance frameworks such as SOC 2, GDPR, NIST CSF
Familiarity with common application development languages such as Java or JavaScript
Understanding of system and architecture design principles, from code to cloud
Relevant industry certifications (e.g., GCLD, GCP Cloud SecurityEngineer, GCSA).
$100,000 - $140,000 a year
Final offer amounts are determined by multiple factors, including but not limited to geographic location as well as candidate experience and expertise, and may vary from the amounts listed above.
About BlackCloakBlackCloak is an extremely fast-growing company in an entirely new product category. We have amazing product fit validated by industry awards and an impressive client base of Fortune 500 companies across all industries.
BlackCloak offers a competitive salary, exceptional benefits, and a dynamic work environment. Below is a quick summary of BlackCloak's generous benefits package for full-time employees includes:
- 100% Remote Company, within the USA - Comprehensive Medical, Dental, and Vision plans with a 100% employer-paid monthly premium option for employees & 50% employer-paid monthly premiums for dependents. - Health Savings Account with company contribution for eligible medical plans. - Flexible Vacation Plan - 10 Paid Company Holidays - 100% employer-paid Life, AD&D and Short- and Long-Term Disability Insurance - 401k with Traditional and Roth options, including employer match. - Company Equity - Paid Parental and Pregnancy Recovery Leave - Company and team off-sites and virtual events throughout the year - Home office stipend
We are an equal opportunity employer. We do not discriminate on the basis of race, color, religion, sex, sexual orientation, gender identity, marital status, age, disability, national or ethnic origin, military service status, citizenship, or other protected characteristic.
Learn More about UsWebsite: ********************* LinkedIn: /blackcloak Twitter: @BlackCloakCyberWhite Paper: *******************************************************************************************************
#liremote
$100k-140k yearly Auto-Apply 60d+ ago
Security Engineer (Security Operations, Zero Trust)
Blackcloak LLC 3.5
Remote
BlackCloak's mission is to protect corporate executives and high-profile individuals in their personal lives, mitigating risks to their families, companies, reputation, and finances. We defend our clients' digital lives from hackers, privacy leaks, and identity theft. If you are passionate about helping to protect others, then keep reading - this may be your next great opportunity.
As a SecurityEngineer, you will be part of BlackCloak's internal technology team supporting corporate security, information technology operations, and compliance. This is a critical role that is both hands-on and strategic, influencing and driving success for BlackCloak and its clients by designing, deploying, and supporting technology solutions for all areas of the business.
What you will do
*
Security Operations & Incident Response (Primary)
Review, design, and implementation of new Security Tools - support administration across tools such as SIEM, EDR, CNAAP, Email Security, and others.Support security and risk assessments for new tools, vendors, and relationships with broader Security and IT team.Assist in development of new threat detections, playbooks, and automated response/remediation Support triage and response of security alerts, as an escalation point from the broader team.Participate in supporting security on-call rotation
Zero Trust & Network Security (Secondary)
Strengthen Zero Trust posture by expanding usage of Cloudflare WARP, WAF, other Zero Trust tooling and principles Collaborate with the IT team to enhance endpoint security policies within EDR tools such as SentinelOne, Crowdstrike, as well as secure hardening standards into MDMSupport design and implementation of IAM best practices/principles for workforce and client identity, leveraging tools such as; Google IDP, Okta, Auth0, ZitadelMature Zero Trust alerts and controls across risk-based alerting, posture checks Incorporation of Zero Trust principles into new programs and architecture designs
Application Security (Support)
Support application security program strategy and implementation, including but not limited to various controls towards a "shift-left" security model, Security Champions program, adoption and implementation of SAST, DAST, other application security tools.Assist in maturation of the Secure SDLC, including threat modeling, security architecture and requirements guidance, as well as secure code development training.Work directly with developers to triage findings, provide remediation guidance, and foster a security-first culture.Manual testing support for light red teaming such as POC'ing vulnerabilities, leading penetration tests via vendor engagements and/or internally led testing, and validating security findings.
Cloud & Infrastructure Security (Support)
Partner with Engineering, DevOps, to secure GCP, AWS environments Leverage Cloud Security tools such as CNAAP, to remediate discovered misconfigurations, vulnerabilities, and triage of Cloud Security alerts.Support development and implement secure infrastructure baselines, vulnerability management processes, secrets managements, IAM, and hardening standards within the cloud environment.Incorporation of shift-left security tests and controls, into CI/CD pipelines Help expand monitoring capabilities within tools such as SIEM, CNAAP, including implementation of required cloud architecture/logging, onboarding of log sources to security tools, and detection rules for cloud-based threats.
What You Need to be Successful
*
* 3-5 years of hands-on experience in a securityengineering role, preferably within a cloud-native, startup environment
* Deep experience building or contributing to a Security Operations program, leveraging/administering SIEM, EDR, CNAAP, Email Security, and SOAR tools.
* Hands-on experience building and tuning threat detections, partnering with Security Analysts to improve/automate runbooks and response actions.
* Demonstrated experience implementing tools and controls to support Zero Trust, with tools such as Cloudflare, IAM architecture and protocols, risk and posture based alerting, and workforce/customer identity solutions.
* Proficiency in at least one scripting language (e.g., Python, Bash) to automate security tasks and processes, ability to implement and support detection-as-code and infrastructure-as-code where applicable.
* Excellent problem-solving skills and the ability to work collaboratively with both technical (Engineering) and non-technical (GTM) teams.
* Ability to drive new projects, self-starter, with minimal supervision
* A proactive, "builder" mindset with a passion for improving processes, reducing risk.
Nice to have
Familiarity with Infrastructure as Code (IaC) and its security implications (e.g., Terraform).Knowledge of compliance frameworks such as SOC 2, GDPR, NIST CSFFamiliarity with common application development languages such as Java or JavaScriptUnderstanding of system and architecture design principles, from code to cloud Relevant industry certifications (e.g., GCLD, GCP Cloud SecurityEngineer, GCSA).
$100,000 - $140,000 a year
Final offer amounts are determined by multiple factors, including but not limited to geographic location as well as candidate experience and expertise, and may vary from the amounts listed above.
About BlackCloak
BlackCloak is an extremely fast-growing company in an entirely new product category. We have amazing product fit validated by industry awards and an impressive client base of Fortune 500 companies across all industries.
BlackCloak offers a competitive salary, exceptional benefits, and a dynamic work environment. Below is a quick summary of BlackCloak's generous benefits package for full-time employees includes:
* 100% Remote Company, within the USA
* Comprehensive Medical, Dental, and Vision plans with a 100% employer-paid monthly premium option for employees & 50% employer-paid monthly premiums for dependents.
* Health Savings Account with company contribution for eligible medical plans.
* Flexible Vacation Plan
* 10 Paid Company Holidays
* 100% employer-paid Life, AD&D and Short- and Long-Term Disability Insurance
* 401k with Traditional and Roth options, including employer match.
* Company Equity
* Paid Parental and Pregnancy Recovery Leave
* Company and team off-sites and virtual events throughout the year
* Home office stipend
We are an equal opportunity employer. We do not discriminate on the basis of race, color, religion, sex, sexual orientation, gender identity, marital status, age, disability, national or ethnic origin, military service status, citizenship, or other protected characteristic.
Learn More about Us
Website: *********************
LinkedIn: /blackcloak
Twitter: @BlackCloakCyber
White Paper: *******************************************************************************************************
#liremote
$100k-140k yearly 60d+ ago
Security Engineer (Product/Cloud Security)
Blackcloak LLC 3.5
Remote
BlackCloak's mission is to protect corporate executives and high-profile individuals in their personal lives, mitigating risks to their families, companies, reputation, and finances. We defend our clients' digital lives from hackers, privacy leaks, and identity theft. If you are passionate about helping to protect others, then keep reading - this may be your next great opportunity.
As a SecurityEngineer, you will be part of BlackCloak's internal technology team supporting corporate security, information technology operations, and compliance. This is a critical role that is both hands-on and strategic, influencing and driving success for BlackCloak and its clients by designing, deploying, and supporting technology solutions for all areas of the business.
What you will do
*
Application Security (Primary)
Champion application security program strategy and implementation, including but not limited to various controls towards a "shift-left" security model, Security Champions program, adoption and implementation of SAST, DAST, other application security tools.Assist in maturation of the Secure SDLC, including threat modeling, security architecture and requirements guidance, as well as secure code development training.Work directly with developers to triage findings, provide remediation guidance, and foster a security-first culture.Manual testing support for light red teaming such as POC'ing vulnerabilities, leading penetration tests via vendor engagements and/or internally led testing, and validating security findings.
Cloud & Infrastructure Security (Secondary) Partner with Engineering, DevOps, to secure GCP, AWS environments Leverage Cloud Security tools such as CNAAP, to remediate discovered misconfigurations, vulnerabilities, and triage of Cloud Security alerts.Develop and implement secure infrastructure baselines, vulnerability management processes, secrets managements, IAM, and hardening standards within the cloud environment.Incorporation of shift-left security tests and controls, into CI/CD pipelines Help expand monitoring capabilities within tools such as SIEM, CNAAP, including implementation of required cloud architecture/logging, onboarding of log sources to security tools, and detection rules for cloud-based threats
Zero Trust & Network Security (Support)
Strengthen Zero Trust posture by expanding usage of Cloudflare WARP, WAF, other Zero Trust tooling and principles Collaborate with the IT team to enhance endpoint security policies within EDR tools such as SentinelOne, Crowdstrike, as well as secure hardening standards into MDMSupport design and implementation of IAM best practices/principles for workforce and client identity, leveraging tools such as; Google IDP, Okta, Auth0, Zitadel
Security Operations & Incident Response (Support)
Review, design, and implementation of new Security Tools - support administration across tools such as SIEM, EDR, CNAAP, Email Security, and others.Support security and risk assessments for new tools, vendors, and relationships with broader Security and IT team.Assist in development of new threat detections, playbooks, and automated response/remediation Support triage and response of security alerts, as an escalation point from the broader team.Participate in supporting security on-call rotation
What You Need to be Successful
* 3-5 years of hands-on experience in a securityengineering role, preferably within a cloud-native, startup environment
* Experience building or contributing to a Secure SDLC program, leveraging application security tools, supporting security architecture reviews
* Demonstrated experience securing public cloud environments, with a strong preference for Google Cloud Platform (GCP).
* Experience building or contributing to a Secure SDLC program.
* Hands-on experience with modern security tooling, including
* SAST/SCA: Snyk, Checkmarx, Veracode, or similar.
* CNAPP: Wiz, Prisma Cloud, or similar.
* EDR: SentinelOne, CrowdStrike, or similar.
* SIEM: Google SecOps, Splunk, or other modern platforms.
* A solid understanding of Zero Trust, IAM principles and practical experience implementing solutions with tools like Cloudflare.
* Proficiency in at least one scripting language (e.g., Python, Bash) to automate security tasks and processes.
* Excellent problem-solving skills and the ability to work collaboratively with both technical (Engineering) and non-technical (GTM) teams.
* A proactive, "builder" mindset with a passion for improving processes, reducing risk.
Preferred Candidate will have:
Familiarity with Infrastructure as Code (IaC) and its security implications (e.g., Terraform).Knowledge of compliance frameworks such as SOC 2, GDPR, NIST CSFFamiliarity with common application development languages such as Java or JavaScriptUnderstanding of system and architecture design principles, from code to cloud Relevant industry certifications (e.g., GCLD, GCP Cloud SecurityEngineer, GCSA).
$100,000 - $140,000 a year
Final offer amounts are determined by multiple factors, including but not limited to geographic location as well as candidate experience and expertise, and may vary from the amounts listed above.
About BlackCloak
BlackCloak is an extremely fast-growing company in an entirely new product category. We have amazing product fit validated by industry awards and an impressive client base of Fortune 500 companies across all industries.
BlackCloak offers a competitive salary, exceptional benefits, and a dynamic work environment. Below is a quick summary of BlackCloak's generous benefits package for full-time employees includes:
* 100% Remote Company, within the USA
* Comprehensive Medical, Dental, and Vision plans with a 100% employer-paid monthly premium option for employees & 50% employer-paid monthly premiums for dependents.
* Health Savings Account with company contribution for eligible medical plans.
* Flexible Vacation Plan
* 10 Paid Company Holidays
* 100% employer-paid Life, AD&D and Short- and Long-Term Disability Insurance
* 401k with Traditional and Roth options, including employer match.
* Company Equity
* Paid Parental and Pregnancy Recovery Leave
* Company and team off-sites and virtual events throughout the year
* Home office stipend
We are an equal opportunity employer. We do not discriminate on the basis of race, color, religion, sex, sexual orientation, gender identity, marital status, age, disability, national or ethnic origin, military service status, citizenship, or other protected characteristic.
Learn More about Us
Website: *********************
LinkedIn: /blackcloak
Twitter: @BlackCloakCyber
White Paper: *******************************************************************************************************
#liremote
$100k-140k yearly 60d+ ago
Principal Security Engineer, Emerging Technology
Draftkings 4.0
Remote
At DraftKings, AI is becoming an integral part of both our present and future, powering how work gets done today, guiding smarter decisions, and sparking bold ideas. It's transforming how we enhance customer experiences, streamline operations, and unlock new possibilities. Our teams are energized by innovation and readily embrace emerging technology. We're not waiting for the future to arrive. We're shaping it, one bold step at a time. To those who see AI as a driver of progress, come build the future together.
The Crown Is Yours
As a Principal SecurityEngineer, you'll shape how DraftKings uses emerging technology securely and responsibly. You'll work at the highest strategic level, partnering with engineering, product, and research teams to build secure, scalable systems that power our platforms. You'll apply deep technical expertise to evaluate and influence the security of new tools, workflows, and architectures. With a cross-disciplinary team at your side, you'll lead by example designing smarter automation, scaling secure infrastructure, and mentoring peers through complex challenges.
What you'll do as a Principal SecurityEngineer
Lead large-scale security reviews of new capabilities at DraftKings with your deep experience building and deploying code and systems leading the way
Design, build and implement tools to support the safe use of new technology, such as proxies that help implement security functionality or modify existing systems to make them safer.
Spearhead the automation of security processes, reducing the time to deploy across the entire engineering organization.
Drive remediation efforts of complex, cross-functional security issues.
Apply subject matter expertise to identify potential security issues, tools, mitigations and processes, staying current with the evolving security landscape and sharing expertise with others through coaching.
Collaborate across a range of technical and non-technical contributors, providing insights on security designs that balance usability and safety.
Share knowledge and provide guidance to team members, fostering a culture of continuous learning and collaboration.
What you'll bring
8+ years experience in engineering, building and operating systems in production.
5+ years experience contributing and advising on security design.
Experience writing high quality code in a typed and untyped programming language.
A constructive attitude to help others raise the bar.
Varied knowledge across system fundamentals, how multiple operating systems and file systems work, networking and common protocols, public cloud security, and automation.
An understanding of how organizations use AI foundation models and how to reason about safely using AI in business contexts.
Empathy, strong communication skills and a deep respect for the power of collaboration.
Ability to manage competing priorities and thrive in a fast-paced, dynamic environment.
Join Our Team
We're a publicly traded (NASDAQ: DKNG) technology company headquartered in Boston. As a regulated gaming company, you may be required to obtain a gaming license issued by the appropriate state agency as a condition of employment. Don't worry, we'll guide you through the process if this is relevant to your role.
The US base salary range for this full-time position is 183,200.00 USD - 229,000.00 USD, plus bonus, equity, and benefits as applicable. Our ranges are determined by role, level, and location. The compensation information displayed on each job posting reflects the range for new hire pay rates for the position across all US locations. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific pay range and how that was determined during the hiring process. It is unlawful in Massachusetts to require or administer a lie detector test as a condition of employment or continued employment. An employer who violates this law shall be subject to criminal penalties and civil liability.
$93k-132k yearly est. Auto-Apply 51d ago
Computer Network Defense Analyst
Markon 3.7
Fort Meade, MD jobs
Eager to join a team where your skills are valued, your growth is nurtured, and your impact is profound? Look no further than Markon, a premier consulting firm deeply dedicated to advancing our nation's most critical missions.
At Markon, we don't just offer jobs - we offer opportunities for personal and professional transformation. Empowering our employees to lead, innovate, and excel, we foster an environment where new ideas are not just welcomed but celebrated. As a perennial Washington Post Top Workplace, we prioritize the well-being and success of our team members, ensuring they can bring their best selves to work.
Headquartered in Falls Church, Virginia, Markon has garnered national recognition for our unwavering dedication to excellence in serving the intelligence community, as well as federal civilian and defense agencies. Our growing reach extends across 17 states, 116 countries, and 5 continents, where our team of dynamic professionals collaborates to deliver unparalleled program and project management services.
Markon values people and the tremendous impact each individual can make - which is why we're consistently recognized as one of the best places to work in federal government consulting. Here, you can help solve the nation's most important challenges, surrounded by colleagues who help you grow, advance, and succeed. We are deeply dedicated to what matters - bringing out the best in each other to advance our clients' missions.
Join us and make a meaningful impact.
Markon is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, national origin, age, protected veteran status, or disability status. This job posting will remain open until the position is filled.
Benefits Offered: Medical, Dental, Vision, Life Insurance, Short-Term Disability, Long-Term Disability, 401(k) match, Flexible Spending Accounts, EAP, Training and Tuition Assistance, Paid Time Off, and Holidays
Description
Markon's partner company is looking for multiple Computer Network Defense Analysts to support our Fort Meade Customer.
Responsibilities
The Computer Network Defense Analyst will:
Thoroughly understand all aspects of computer and network security, including firewall administration, encryption technologies and network protocols
Protect, monitor, detect, analyze, and respond to unauthorized activity within assigned information systems and computer networks
Have the ability to identify and convert data; analyze system alerts; and report on computer probe and network infiltration attempts on network infrastructure
Keep abreast of industry security trends and developments, as well as applicable Government regulations
Qualifications
Required Qualifications:
A Bachelor's degree plus 5 years of relevant experience, or a Master's degree plus 3 years of relevant experience, or a Doctoral degree and 2 years of relevant experience. The following may also be considered for individuals with in-depth experience that is clearly related to the position: an Associate's degree plus 7 years of relevant experience; or at least 18 semester hours of military coursework/training in networking, computer science, or cyber topics plus 7 years of relevant experience.
Degree must be in Network Engineering, Systems Engineering, Information Technology or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security).
Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance and/or systems engineering. Additionally, must have experience in network or system administration. If not credited toward education requirement, completion of military training in a relevant area such as JCAC (Joint Cyber Analysis course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), cyber Defense Operations will be considered towards the relevant experience requirement (i.e., 20-24 weeks course will count as 6 months of experience, 10-14 weeks will count as 3 months of experience).
TS/SCI with Active Polygraph
Required experience may include, but is not limited to, the following:
Experience identifying and analyzing anomalies at the packet level
Demonstrate experience performing intrusion incident response
Experience identifying malicious cyber activity
Ability to respond to unknown, suspicious, or exploitation activity
Ability to provide formal briefings on intrusion activity
Expertise in documenting information, analysis, and processes
Experience with tools like WIRESHARK, SNORT, and audit/event logs
Desired Qualifications:
CEH Certified Ethical Hacker
CFR CyberSec First Responder
CySA+ CompTIA Cybersecurity Analyst
GCFA GIAC Certified Forensics Analyst
GCIH GIAC Certified Incident Handler
SCYBER Cisco Cybersecurity Specialty Certification
CNDSP Computer Network Defense Service Provider
CSSP-IR DoD Cyber Security Service Provider for Incident Responder
Salary Range USD $90,000.00 - USD $150,000.00 /Yr.
The Markon pay range for this position is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
$90k-150k yearly Auto-Apply 60d+ ago
Senior Cyber Defense Analyst
Abnormal 4.5
San Francisco, CA jobs
About the Role
We at Abnormal AI are looking for a hands-on Security Operations/ Cyber Defense Analyst who thrives in a fast-paced, engineering-driven environment. You'll be responsible for monitoring, investigating, and responding to security alerts across cloud, endpoint, identity, and application layers. You'll work closely with detection engineers, cloud security, and IT teams to protect our hybrid environment from threats in real time.
This is not a "click-through-the-console" SOC role - we're looking for someone who can think critically, automate relentlessly, and own incidents end-to-end.
Key Responsibilities
Detection & Triage:
Monitor alerts from tools like SIEM, EDR, IAM, CSPM, CDR etc.
Perform initial triage, enrichment, and correlation across multiple data sources.
Identify false positives and fine-tune rules with detection engineering.
Incident Response:
Lead containment, eradication, and recovery for endpoint, cloud, and identity incidents.
Document and communicate incidents through SOAR/Jira/ServiceNow workflows.
Perform root cause analysis and propose permanent preventive controls.
Threat Hunting & Analysis:
Proactively hunt using hypotheses mapped to MITRE ATT&CK.
Investigate anomalies across CloudTrail, Okta, GitHub, and other telemetry sources.
Collaborate with threat intelligence to identify emerging TTPs.
Automation & Process Improvement:
Build or enhance playbooks in SOAR (Torq or equivalent).
Create custom enrichment scripts and automations (Python, Bash, etc.).
Suggest new detection logic and operational improvements.
Reporting & Metrics:
Track and report operational metrics (MTTD, MTTR, incident categories).
Maintain documentation and lessons learned.
Required Skills & Qualifications
5-7 years of hands-on SOC or Incident Response experience in a cloud-first or hybrid environment.
Strong understanding of attacker lifecycle, MITRE ATT&CK, and threat actor TTPs.
Experience with EDR (CrowdStrike preferred), SIEM (Splunk preferred), and SOAR (Torq, XSOAR, or Phantom).
Familiarity with AWS, Okta, and SaaS platforms.
Proficiency in writing queries and automations using Python, SPL, or equivalent.
Excellent analytical and investigative skills - capable of operating independently with minimal hand-holding.
Strong documentation and communication skills for technical and executive audiences.
Nice to Have
Experience with CSPM/CDR/VM tools.
Knowledge of Containers and Kubernetes security.
Relevant certifications like CEH, Security+, GCIH, GCIA, or AWS Security Specialty.
What Success Looks Like
You consistently deliver high-quality triage with minimal false positives.
You automate repetitive tasks instead of manually doing them twice.
You can take a vague alert and turn it into a well-documented case with actionable findings.
#LI-EM5
You make measurable improvements to detection coverage, response time, or tooling maturity.
$89k-122k yearly est. Auto-Apply 60d+ ago
Analyst Sr., Cloud Security
Carnival Cruise Line 4.3
Miami, FL jobs
The Senior Cloud Security Analyst is responsible for daily management of security posture pertaining to our digital environment operations as well as support of identity access management (IAM) for the Holland America, Seabourn, and Holland America Princess (Brands). This role requires assisting the GCS IAM team with bringing the Brands into and maintaining compliance in accordance with GCS policies and directives. All responsibilities transverse shoreside and shipboard across the fleets. This role requires experience in evaluation of cloud environment security posture, security directives and project creation, as well as risk mitigation to achieve and maintain desired business outcomes. This position requires working with brand stakeholders in pursuit of security and compliance solutions across the Brands.
**Essential Functions:**
+ Management, evaluation, maintenance, and enhancement of the cloud security posture.
+ Continuous improvement of the brand vulnerability management people, process, and technology analyzing cloud environment reporting, prioritizing, and working with brand IT to make Cloud Security Management data actionable and understandable.
+ Operation of identity and access processes and controls for SailPoint, Active Directory, Email, and Collaboration Platforms and cloud-based solutions.
+ Evaluation and providing directives and guidance regarding our SIEM integrations, identifying potential blind spots, and assisting with configuration validations. Augment and assist GISCS Security Operations, monitoring and triaging brand security events (Security Operations).
+ Creates visual information in the form of dashboard(s) and reports for executives and business stakeholders on a regular basis that communicates Cybersecurity risks and KRIs. Provides regular information briefs to Senior Leadership.
+ Helping to continuously improve the brands cybersecurity Key Risk Indicators (KRI) and reporting.
+ Assisting with security architecture reviews for new and proposed integrated solutions.
+ Evaluating and assisting with managing shoreside and shipboard access management and cloud processes and solutions.
+ Providing consultation and training to brand IT team members on new configurations and solutions.
+ Assisting the Cybersecurity PMO to build and prioritize backlog.
**Qualifications:**
+ High School Diploma or GED in Computer Science or other technical degree or equivalent experience.
+ Bachelor's Degree preferred.
+ Minimum 5+ years of relevant industry experience with access management and cloud security.
**Knowledge, Skills, and Abilities:**
+ Hands-on experience with Azure administration
+ Hands-on experience with Orca Security
+ Hands-on experience with AWS security administration
+ Hands-on experience with PowerShell scripting
+ Hands-on experience with SailPoint IAM solution
+ Hands-on experience with Active Directory
+ Hands-on experience with Windows workstations and server operating systems
+ Hands-on experience with managing security for AWS cloud environment tenants
+ Proven track record of taking ownership of strategic initiatives and driving results in complex environments
+ Proven success in contributing to a team-oriented environment
+ Proven ability to work creatively and analytically in a problem-solving environment
Physical Demands: Must be able to remain in a stationary position at a desk and/or computer for extended periods of time.
Travel: Less than 25% with shipboard travel likely
Work Conditions: Work primarily in a climate-controlled environment with minimal safety/health hazard potential.
This position is classified as "in-office." As an in-office role, it requires employees to work from a designated Carnival office in South Florida Tuesday through Thursday each week. Employees may work from their homes on Mondays and Fridays. Candidates must be located in (or willing to relocate to) the Miami/Ft. Lauderdale area.
Offers to selected candidates will be made on a fair and equitable basis, taking into account specific job-related skills and experience.
At Carnival, your total rewards package is much more than your base salary. All non-sales roles participate in an annual cash bonus program, while sales roles have an incentive plan. Director and above roles may also be eligible to participate in Carnival's discretionary equity incentive plan. Plus, Carnival provides comprehensive and innovative benefits to meet your needs, including:
+ Health Benefits:
+ Cost-effective medical, dental and vision plans
+ Employee Assistance Program and other mental health resources
+ Additional programs include company paid term life insurance and disability coverage
+ Financial Benefits:
+ 401(k) plan that includes a company match
+ Employee Stock Purchase plan
+ Paid Time Off
+ Holidays - All full-time and part-time with benefits employees receive days off for 8 company-wide holidays, plus 2 additional floating holidays to be taken at the employee's discretion.
+ Vacation Time - All full-time employees at the manager and below level start with 14 days/year; director and above level start with 19 days/year. Part-time with benefits employees receive time off based on the number of hours they work, with a minimum of 84 hours/year. All employees gain additional vacation time with further tenure.
+ Sick Time - All full-time employees receive 80 hours of sick time each year. Part-time with benefits employees receive time off based on the number of hours they work, with a minimum of 60 hours each year.
+ Other Benefits
+ Complementary stand-by cruises, employee discounts on confirmed cruises, plus special rates for family and friends
+ Personal and professional learning and development resources including tuition reimbursement
+ On-site Fitness center at our Miami campus
\#LI-Hybrid
\#Corp
\#LI-SH1
About Us
Carnival Corporation & plc is the world's largest leisure travel company, our mission to deliver unforgettable happiness to our guest through our diverse portfolio of leading cruise brands and island destinations, including Carnival Cruise Line, Holland America Line, Princess Cruises, and Seabourn in North America and Australia; P&O Cruises and Cunard Line in the United Kingdom; AIDA in Germany; Costa Cruises in Southern Europe.
Join us and embark on a career that offers not only the chance to grow professionally but also the opportunity to be part of a global community that makes a difference.
In addition to other duties/functions, this position requires full commitment and support for promoting ethical and compliant culture. More specifically, this position requires integrity, honesty, and respectful treatment of others, as well as a willingness to speak up when they see misconduct or have concerns.
Carnival Corporation & plc and Carnival Cruise Line is an equal employment opportunity/affirmative action employer. In this regard, it does not discriminate against any qualified individual on the basis of sex, race, color, national origin, religion, sexual orientation, age, marital status, mental, physical or sensory disability, or any other classification protected by applicable local, state, federal, and/or international law.
*****************************************************************
******************************************************************
$86k-104k yearly est. 57d ago
Analyst Sr., Cloud Security
Carnival Corporation 4.3
Miami, FL jobs
The Senior Cloud Security Analyst is responsible for daily management of security posture pertaining to our digital environment operations as well as support of identity access management (IAM) for the Holland America, Seabourn, and Holland America Princess (Brands). This role requires assisting the GCS IAM team with bringing the Brands into and maintaining compliance in accordance with GCS policies and directives. All responsibilities transverse shoreside and shipboard across the fleets. This role requires experience in evaluation of cloud environment security posture, security directives and project creation, as well as risk mitigation to achieve and maintain desired business outcomes. This position requires working with brand stakeholders in pursuit of security and compliance solutions across the Brands.
Essential Functions:
* Management, evaluation, maintenance, and enhancement of the cloud security posture.
* Continuous improvement of the brand vulnerability management people, process, and technology analyzing cloud environment reporting, prioritizing, and working with brand IT to make Cloud Security Management data actionable and understandable.
* Operation of identity and access processes and controls for SailPoint, Active Directory, Email, and Collaboration Platforms and cloud-based solutions.
* Evaluation and providing directives and guidance regarding our SIEM integrations, identifying potential blind spots, and assisting with configuration validations. Augment and assist GISCS Security Operations, monitoring and triaging brand security events (Security Operations).
* Creates visual information in the form of dashboard(s) and reports for executives and business stakeholders on a regular basis that communicates Cybersecurity risks and KRIs. Provides regular information briefs to Senior Leadership.
* Helping to continuously improve the brands cybersecurity Key Risk Indicators (KRI) and reporting.
* Assisting with security architecture reviews for new and proposed integrated solutions.
* Evaluating and assisting with managing shoreside and shipboard access management and cloud processes and solutions.
* Providing consultation and training to brand IT team members on new configurations and solutions.
* Assisting the Cybersecurity PMO to build and prioritize backlog.
Qualifications:
* High School Diploma or GED in Computer Science or other technical degree or equivalent experience.
* Bachelor's Degree preferred.
* Minimum 5+ years of relevant industry experience with access management and cloud security.
Knowledge, Skills, and Abilities:
* Hands-on experience with Azure administration
* Hands-on experience with Orca Security
* Hands-on experience with AWS security administration
* Hands-on experience with PowerShell scripting
* Hands-on experience with SailPoint IAM solution
* Hands-on experience with Active Directory
* Hands-on experience with Windows workstations and server operating systems
* Hands-on experience with managing security for AWS cloud environment tenants
* Proven track record of taking ownership of strategic initiatives and driving results in complex environments
* Proven success in contributing to a team-oriented environment
* Proven ability to work creatively and analytically in a problem-solving environment
Physical Demands: Must be able to remain in a stationary position at a desk and/or computer for extended periods of time.
Travel: Less than 25% with shipboard travel likely
Work Conditions: Work primarily in a climate-controlled environment with minimal safety/health hazard potential.
This position is classified as "in-office." As an in-office role, it requires employees to work from a designated Carnival office in South Florida Tuesday through Thursday each week. Employees may work from their homes on Mondays and Fridays. Candidates must be located in (or willing to relocate to) the Miami/Ft. Lauderdale area.
Offers to selected candidates will be made on a fair and equitable basis, taking into account specific job-related skills and experience.
At Carnival, your total rewards package is much more than your base salary. All non-sales roles participate in an annual cash bonus program, while sales roles have an incentive plan. Director and above roles may also be eligible to participate in Carnival's discretionary equity incentive plan. Plus, Carnival provides comprehensive and innovative benefits to meet your needs, including:
* Health Benefits:
* Cost-effective medical, dental and vision plans
* Employee Assistance Program and other mental health resources
* Additional programs include company paid term life insurance and disability coverage
* Financial Benefits:
* 401(k) plan that includes a company match
* Employee Stock Purchase plan
* Paid Time Off
* Holidays - All full-time and part-time with benefits employees receive days off for 8 company-wide holidays, plus 2 additional floating holidays to be taken at the employee's discretion.
* Vacation Time - All full-time employees at the manager and below level start with 14 days/year; director and above level start with 19 days/year. Part-time with benefits employees receive time off based on the number of hours they work, with a minimum of 84 hours/year. All employees gain additional vacation time with further tenure.
* Sick Time - All full-time employees receive 80 hours of sick time each year. Part-time with benefits employees receive time off based on the number of hours they work, with a minimum of 60 hours each year.
* Other Benefits
* Complementary stand-by cruises, employee discounts on confirmed cruises, plus special rates for family and friends
* Personal and professional learning and development resources including tuition reimbursement
* On-site Fitness center at our Miami campus
#LI-Hybrid
#Corp
#LI-SH1
About Us
Carnival Corporation & plc is the world's largest leisure travel company, our mission to deliver unforgettable happiness to our guest through our diverse portfolio of leading cruise brands and island destinations, including Carnival Cruise Line, Holland America Line, Princess Cruises, and Seabourn in North America and Australia; P&O Cruises and Cunard Line in the United Kingdom; AIDA in Germany; Costa Cruises in Southern Europe.
Join us and embark on a career that offers not only the chance to grow professionally but also the opportunity to be part of a global community that makes a difference.
In addition to other duties/functions, this position requires full commitment and support for promoting ethical and compliant culture. More specifically, this position requires integrity, honesty, and respectful treatment of others, as well as a willingness to speak up when they see misconduct or have concerns.
Carnival Corporation & plc and Carnival Cruise Line is an equal employment opportunity/affirmative action employer. In this regard, it does not discriminate against any qualified individual on the basis of sex, race, color, national origin, religion, sexual orientation, age, marital status, mental, physical or sensory disability, or any other classification protected by applicable local, state, federal, and/or international law.
*****************************************************************
******************************************************************
$86k-104k yearly est. 58d ago
Analyst Sr., Cloud Security
Carnival Corporation 4.3
Miami, FL jobs
The Senior Cloud Security Analyst is responsible for daily management of security posture pertaining to our digital environment operations as well as support of identity access management (IAM) for the Holland America, Seabourn, and Holland America Princess (Brands). This role requires assisting the GCS IAM team with bringing the Brands into and maintaining compliance in accordance with GCS policies and directives. All responsibilities transverse shoreside and shipboard across the fleets. This role requires experience in evaluation of cloud environment security posture, security directives and project creation, as well as risk mitigation to achieve and maintain desired business outcomes. This position requires working with brand stakeholders in pursuit of security and compliance solutions across the Brands.
Essential Functions:
Management, evaluation, maintenance, and enhancement of the cloud security posture.
Continuous improvement of the brand vulnerability management people, process, and technology analyzing cloud environment reporting, prioritizing, and working with brand IT to make Cloud Security Management data actionable and understandable.
Operation of identity and access processes and controls for SailPoint, Active Directory, Email, and Collaboration Platforms and cloud-based solutions.
Evaluation and providing directives and guidance regarding our SIEM integrations, identifying potential blind spots, and assisting with configuration validations. Augment and assist GISCS Security Operations, monitoring and triaging brand security events (Security Operations).
Creates visual information in the form of dashboard(s) and reports for executives and business stakeholders on a regular basis that communicates Cybersecurity risks and KRIs. Provides regular information briefs to Senior Leadership.
Helping to continuously improve the brands cybersecurity Key Risk Indicators (KRI) and reporting.
Assisting with security architecture reviews for new and proposed integrated solutions.
Evaluating and assisting with managing shoreside and shipboard access management and cloud processes and solutions.
Providing consultation and training to brand IT team members on new configurations and solutions.
Assisting the Cybersecurity PMO to build and prioritize backlog.
Qualifications:
High School Diploma or GED in Computer Science or other technical degree or equivalent experience.
Bachelor's Degree preferred.
Minimum 5+ years of relevant industry experience with access management and cloud security.
Knowledge, Skills, and Abilities:
Hands-on experience with Azure administration
Hands-on experience with Orca Security
Hands-on experience with AWS security administration
Hands-on experience with PowerShell scripting
Hands-on experience with SailPoint IAM solution
Hands-on experience with Active Directory
Hands-on experience with Windows workstations and server operating systems
Hands-on experience with managing security for AWS cloud environment tenants
Proven track record of taking ownership of strategic initiatives and driving results in complex environments
Proven success in contributing to a team-oriented environment
Proven ability to work creatively and analytically in a problem-solving environment
Physical Demands: Must be able to remain in a stationary position at a desk and/or computer for extended periods of time.
Travel: Less than 25% with shipboard travel likely
Work Conditions: Work primarily in a climate-controlled environment with minimal safety/health hazard potential.
This position is classified as “in-office.” As an in-office role, it requires employees to work from a designated Carnival office in South Florida Tuesday through Thursday each week. Employees may work from their homes on Mondays and Fridays. Candidates must be located in (or willing to relocate to) the Miami/Ft. Lauderdale area.
Offers to selected candidates will be made on a fair and equitable basis, taking into account specific job-related skills and experience.
At Carnival, your total rewards package is much more than your base salary. All non-sales roles participate in an annual cash bonus program, while sales roles have an incentive plan. Director and above roles may also be eligible to participate in Carnival's discretionary equity incentive plan. Plus, Carnival provides comprehensive and innovative benefits to meet your needs, including:
Health Benefits:
Cost-effective medical, dental and vision plans
Employee Assistance Program and other mental health resources
Additional programs include company paid term life insurance and disability coverage
Financial Benefits:
401(k) plan that includes a company match
Employee Stock Purchase plan
Paid Time Off
Holidays - All full-time and part-time with benefits employees receive days off for 8 company-wide holidays, plus 2 additional floating holidays to be taken at the employee's discretion.
Vacation Time - All full-time employees at the manager and below level start with 14 days/year; director and above level start with 19 days/year. Part-time with benefits employees receive time off based on the number of hours they work, with a minimum of 84 hours/year. All employees gain additional vacation time with further tenure.
Sick Time - All full-time employees receive 80 hours of sick time each year. Part-time with benefits employees receive time off based on the number of hours they work, with a minimum of 60 hours each year.
Other Benefits
Complementary stand-by cruises, employee discounts on confirmed cruises, plus special rates for family and friends
Personal and professional learning and development resources including tuition reimbursement
On-site Fitness center at our Miami campus
#LI-Hybrid
#Corp
#LI-SH1
$86k-104k yearly est. Auto-Apply 58d ago
Temporary- Cyber Security Analyst
The College System of Tennessee 3.9
Nashville, TN jobs
Title: Temporary - Cyber Security Analyst Under the directive of the Information Security Officer, the cyber security analyst will implement security strategies and best practices in accordance with regulatory standards. ESSENTIAL JOB FUNCTIONS/JOB DUTIES AND RESPONSIBILITIES
Conduct or coordinate vulnerability scans and document findings and risk mitigation strategies. Implement, monitor and maintain preventive and detective controls. Operate, administer and monitor network and host-based intrusion detection/prevention systems. Operate, administer and monitor Microsoft Defender SIEM. Analyze network traffic, intrusion attempts, activity logs and system alerts for trends, anomalies and potential security breaches. Analyze compromised computing resources to improve security design and policy compliance. Research, analyze, test and implement new security software solutions. Enforce security policies and procedures by administering and monitoring security profiles. Perform other duties as assigned.
REQUIRED QUALIFICATIONS
High School Diploma or GED
One year of experience in information security and compliance regulations.
Proficiency with Microsoft applications.
PREFERRED QUALIFICATIONS
Certificate in information security, i.e., Security+, Pen+, Ethical Hacker.
Experience with SIEM (Microsoft Defender).
Experience in phishing campaign/training.
KNOWLEDGE, SKILLS AND ABILITIES
Basic knowledge of incident response procedures. Knowledge of OSI Model and concepts. Knowledge of Information Security Concepts. Strong analytical, organizational and writing skills. Knowledge of NIST, CIS and FERPA controls. Interpersonal skills to effectively collaborate with both technical and non-technical personnel across different organizational levels.
Experience utilizing IT security systems and tools, including analyzing logs for security breaches. Ability to adhere to department processes and procedures. Demonstrated skills applying security controls to computer software and hardware. Basic proficiency in reading and interpreting security logs. Fundamental knowledge of vulnerability scanning and Basic knowledge of risk assessments procedures.
Open Until Filled: Yes
Rate of Pay: $20.00 per hour
Work Hours: Up to 28 hours per week
Special Instructions to Applicants: Unofficial transcripts are acceptable for the application process. Official transcripts are required upon hire. Applicants may be subject to a background check.
Nashville State offers flexible work arrangements for positions that qualify.
$20 hourly 24d ago
Director of Information Security and Compliance (Onsite) (33669)
Agua Caliente Spa Resort & Casino 3.9
Rancho Mirage, CA jobs
Responsible for the management and operation of all aspects of Agua Caliente's information security and compliance functions. Ensures all technology platforms and systems are protected against threats and vulnerabilities while maintaining their overall integrity and security. Certifies all systems operate in accordance with Tribal regulatory controls and federal standards.
Essential Duties and Responsibilities (other duties may be assigned)
* Oversees the creation, execution and maintenance of information security and compliance related operations, plans, standards, policies and procedures throughout the organization.
* Primary responsibility for determining the vision and strategy for all information security and compliance related services.
* Overall responsibility for ensuring all technology platforms and systems are protected against threats and vulnerabilities while maintaining their overall integrity and security.
* Oversees all vulnerability detection and remediation efforts.
* Certifies all systems operate in accordance with all applicable Tribal regulatory controls, federal standards (PCI, GDPR, CPPA, etc.) and that potential weaknesses cannot be exploited for fraud, misuse, or theft.
* Develops and maintains an information privacy and security-conscious culture throughout the organization.
* Drives a company-wide technology related security architecture and engineering strategy.
* Manages the development of education and training programs on information security and privacy matters for team members and other authorized users.
* Develops, implements and maintains risk assessment, incident reporting and response systems, to address security breaches, policy violations and grievances from external parties.
* Manages investigations of situations in which security may have been compromised and notifies the Chief Information Officer and other senior management of any unusual transactions impacting system security.
* Serves as the official contact for information security and data privacy issues, including reporting to regulatory authorities and law enforcement.
* Works closely with other IT leadership team members on ensuring system enhancements do not compromise compliance requirements or security standards.
* Develops and maintains collaborative, strategic partnerships with all relevant internal departments as well as external vendors, regarding IT security and compliance related information technology solutions.
* Keeps abreast of the latest IT security and privacy legislation, regulations, advisories, alerts and vulnerabilities and develops implementation strategies to ensure the company's security program and software remain current and secure.
* Maintains appropriate information security and compliance related staffing levels by interviewing, selecting, training, scheduling, evaluating, promoting, disciplining and terminating team members, as needed.
* Ensures work performance standards, and team member development programs maximize the individual growth and development of staff.
* Provides outstanding customer service in a timely manner to both guests and fellow team members.
* Performs other duties as assigned.
Supervisory Responsibilities
IT SecurityEngineer
IT Security Analyst
Access to Sensitive Areas and Information
* As per ACGC Access Matrix
* ACBCI Tribal Authorized IT Areas
Signatory Ability
* IT Department Forms
* Purchasing forms
* HR Forms
* Complimentary vouchers per approved Complimentary Matrix
$140k-175k yearly est. 4d ago
Director of Information Security and Compliance (Onsite) (33669)
Agua Caliente Casinos 3.9
Rancho Mirage, CA jobs
Responsible for the management and operation of all aspects of Agua Caliente's information security and compliance functions. Ensures all technology platforms and systems are protected against threats and vulnerabilities while maintaining their overall integrity and security. Certifies all systems operate in accordance with Tribal regulatory controls and federal standards.
Essential Duties and Responsibilities (other duties may be assigned)
Oversees the creation, execution and maintenance of information security and compliance related operations, plans, standards, policies and procedures throughout the organization.
Primary responsibility for determining the vision and strategy for all information security and compliance related services.
Overall responsibility for ensuring all technology platforms and systems are protected against threats and vulnerabilities while maintaining their overall integrity and security.
Oversees all vulnerability detection and remediation efforts.
Certifies all systems operate in accordance with all applicable Tribal regulatory controls, federal standards (PCI, GDPR, CPPA, etc.) and that potential weaknesses cannot be exploited for fraud, misuse, or theft.
Develops and maintains an information privacy and security-conscious culture throughout the organization.
Drives a company-wide technology related security architecture and engineering strategy.
Manages the development of education and training programs on information security and privacy matters for team members and other authorized users.
Develops, implements and maintains risk assessment, incident reporting and response systems, to address security breaches, policy violations and grievances from external parties.
Manages investigations of situations in which security may have been compromised and notifies the Chief Information Officer and other senior management of any unusual transactions impacting system security.
Serves as the official contact for information security and data privacy issues, including reporting to regulatory authorities and law enforcement.
Works closely with other IT leadership team members on ensuring system enhancements do not compromise compliance requirements or security standards.
Develops and maintains collaborative, strategic partnerships with all relevant internal departments as well as external vendors, regarding IT security and compliance related information technology solutions.
Keeps abreast of the latest IT security and privacy legislation, regulations, advisories, alerts and vulnerabilities and develops implementation strategies to ensure the company's security program and software remain current and secure.
Maintains appropriate information security and compliance related staffing levels by interviewing, selecting, training, scheduling, evaluating, promoting, disciplining and terminating team members, as needed.
Ensures work performance standards, and team member development programs maximize the individual growth and development of staff.
Provides outstanding customer service in a timely manner to both guests and fellow team members.
Performs other duties as assigned.
Supervisory Responsibilities
IT SecurityEngineer
IT Security Analyst
Access to Sensitive Areas and Information
As per ACGC Access Matrix
ACBCI Tribal Authorized IT Areas
Signatory Ability
IT Department Forms
Purchasing forms
HR Forms
Complimentary vouchers per approved Complimentary Matrix
Qualifications
Education and/or Experience
Bachelor's degree in computer science or related field, an equivalent combination of education and experience will be considered.
Eight years of IT security and compliance experience with at least 5 years in a leadership role
Leadership experience in a casino/hotel resort environment strongly preferred
CISSP certification strongly preferred
Strong financial acumen
Direct management of cross-functional teams, including managing third party service providers
Must be familiar with Microsoft products
Must possess excellent written and verbal communication skills. Must be able to communicate in English.
Working Conditions/Physical Demands
To perform this job successfully, the individual must be able to stand, move and work throughout the office area and properties, including walking up to 1 ½ mile, climbing stairs, and sitting at a desk/work station for the duration of the shift. Must be able to work in a smoke-filled environment.
Typically, the individual will be housed in an office environment. The noise level in the work environment is usually moderate but will escalate when located in the casino environment. Must be able to grasp, bend, lift and/or carry or otherwise move goods weighing a minimum of 25 lbs. on an intermittent basis, and sufficient dexterity of hand to use office equipment including, but not limited to: a computer keyboard, calculator, general office equipment and multi-line telephone.
$140k-175k yearly est. 2d ago
Cisco Network Security Consultant
Sv Tech Systems 3.9
Fort Worth, TX jobs
SV Tech Systems prides itself in being the leading provider of recruitment and staffing services for a wide range of industries. We provide staffing services to firms throughout the United States and Canada. We attract the best pool of talent with the aim of nurturing sound work ethics and solid values amongst a highly motivated and diverse workforce.
Title : Cisco Network Security Consultant
Duration : 12 Months Contract
Location : Ft. Worth, TX 76102
Require CCNA Security, Cisco Firewall Security Specialist, or Cisco VPN Security Specialist certifications. CCNP Security / CCSP Preferred.
Job Description:
Assists with the design, development and maintenance of the computer and network infrastructure. Typically has at least 3 years experience and professional degree. Expert in supporting Checkpoint/Solaris firewalls in a high-availability enterprise environment. Excellent customer service experience highly desired to fit culture. Strong Checkpoint, Solaris and Cisco network skills.
In-depth experience in Network Security technology architecture design, evaluation, deployment or support that addresses one or more of the following security areas:
• Firewalls
• VPN
• Authentication
• Encryption
• Vulnerability Assessment
• Penetration Analysis
• Intrusion Detection
Qualifications
Provide operational support and maintenance of Cisco Security Technologies. The successful candidate will have experience configuring, supporting, and maintaining with Cisco ASAs configured to provide Firewall services, VPN Services, and IPS services.
• Require excellent communication skills as this position will interface with both the customer and other IT and Non-IT organizations with the business.
• Customer first attitude.
• Ability to work in inter-departmental and intra-departmental collaborative team environments.
• Ability to deploy new Firewalls with and without the use of configuration templates.
• Ability to add, change and delet e firewall access lists .
• Understand the order of NAT operations and be able to implement the various type of NAT (PAT, Static NAT, NAT exemption, etc.).
• Troubleshoot Firewall access issues though the use of Enterprise Log Management Tool.
• Perform Intrusion Prevention System signature updates and signature filtering
• Configure SSL VPN groups and authentication methods.
• Candidate should have a firm understanding of the Multiple Context technology and its limitations; Hands-on experience preferred.
• Experience with Cisco Security Manager is desired.
• Experience with Firemon is desired.
• Generation of technology documentation and diagramming with tools such as Visio.
• Additional security-related tasks as required.
• Work hours are approx. 8:30AM - 5:30PM CST.
• Work to be onsite in downtown Fort Worth. Working remote or from home is not available.
• Part of on-call rotation approximately 1 Week Every Month; light duty.
• No travel is anticipated but should be available for light travel if required (10% or less).
• Availability to perform after hours and weekend work as required.
• Position Length: 6 - 12 Months minimum. Position is not currently expected to be converted to Full Time.
Require CCNA Security, Cisco Firewall Security Specialist, or Cisco VPN Security Specialist certifications. CCNP Security / CCSP Preferred.
• Candidate will be required to take a hands-on skill assessment.
• Start date will be 2 weeks after successful candidate accepts contract position.
Additional Information
Regards,
Praveen,
Technical Recruiter,
Office: **************
*****************************************
**********************************
$86k-114k yearly est. 2d ago
Cisco Network Security Consultant
SV Tech Systems 3.9
Fort Worth, TX jobs
SV Tech Systems prides itself in being the leading provider of recruitment and staffing services for a wide range of industries. We provide staffing services to firms throughout the United States and Canada. We attract the best pool of talent with the aim of nurturing sound work ethics and solid values amongst a highly motivated and diverse workforce.
Title : Cisco Network Security Consultant
Duration : 12 Months Contract
Location : Ft. Worth, TX 76102
Require CCNA Security, Cisco Firewall Security Specialist, or Cisco VPN Security Specialist certifications. CCNP Security / CCSP Preferred.
Job Description:
Assists with the design, development and maintenance of the computer and network infrastructure. Typically has at least 3 years experience and professional degree. Expert in supporting Checkpoint/Solaris firewalls in a high-availability enterprise environment. Excellent customer service experience highly desired to fit culture. Strong Checkpoint, Solaris and Cisco network skills.
In-depth experience in Network Security technology architecture design, evaluation, deployment or support that addresses one or more of the following security areas:
• Firewalls
• VPN
• Authentication
• Encryption
• Vulnerability Assessment
• Penetration Analysis
• Intrusion Detection
Qualifications
Provide operational support and maintenance of Cisco Security Technologies. The successful candidate will have experience configuring, supporting, and maintaining with Cisco ASAs configured to provide Firewall services, VPN Services, and IPS services.
• Require excellent communication skills as this position will interface with both the customer and other IT and Non-IT organizations with the business.
• Customer first attitude.
• Ability to work in inter-departmental and intra-departmental collaborative team environments.
• Ability to deploy new Firewalls with and without the use of configuration templates.
• Ability to add, change and delet e firewall access lists .
• Understand the order of NAT operations and be able to implement the various type of NAT (PAT, Static NAT, NAT exemption, etc.).
• Troubleshoot Firewall access issues though the use of Enterprise Log Management Tool.
• Perform Intrusion Prevention System signature updates and signature filtering
• Configure SSL VPN groups and authentication methods.
• Candidate should have a firm understanding of the Multiple Context technology and its limitations; Hands-on experience preferred.
• Experience with Cisco Security Manager is desired.
• Experience with Firemon is desired.
• Generation of technology documentation and diagramming with tools such as Visio.
• Additional security-related tasks as required.
• Work hours are approx. 8:30AM - 5:30PM CST.
• Work to be onsite in downtown Fort Worth. Working remote or from home is not available.
• Part of on-call rotation approximately 1 Week Every Month; light duty.
• No travel is anticipated but should be available for light travel if required (10% or less).
• Availability to perform after hours and weekend work as required.
• Position Length: 6 - 12 Months minimum. Position is not currently expected to be converted to Full Time.
Require CCNA Security, Cisco Firewall Security Specialist, or Cisco VPN Security Specialist certifications. CCNP Security / CCSP Preferred.
• Candidate will be required to take a hands-on skill assessment.
• Start date will be 2 weeks after successful candidate accepts contract position.
Additional Information
Regards,
Praveen,
Technical Recruiter,
Office: **************
*****************************************
**********************************
$86k-114k yearly est. 60d+ ago
Senior Systems Security Engineer
Muckleshoot Indian Tribe 4.3
Auburn, WA jobs
Responsible for ensuring the CIA triad (Confidentiality, Integrity, and Availability) of the Muckleshoot Indian Tribe computer systems and information to safeguard personnel and tribal members, while also maintaining compliance with NIST, cybersecurity industry best practices, frameworks, and standards. Specifically charged with securing internal and cloud information systems and protecting against identity-based attacks. Collaboration with IT staff and community members is essential to maintaining robust security practices. Staying current on cybersecurity trends, technologies, and threats is crucial for this position, which is vital for safeguarding sensitive information and maintaining the integrity of the Tribe's digital assets.
MAJOR TASKS AND RESPONSIBILITIES
Design, engineer, and architect all aspects of systems security, business continuity and disaster recovery. Monitor all security solutions, investigate all alerts, and respond appropriately to all identified security threats, incidents, and/or compromise. Research, develop and implement a secure AI strategy from the perspective of systems security. Maintain the accuracy and success rate of all vulnerability and patch management solutions. Manage, configure, and operate the SIEM/SOAR security solution. Conduct security scans and penetration testing to validate and remediate the security posture of information systems. Conduct threat hunting within our internal systems environment. Develop a training apprenticeship program to develop in-house cybersecurity skillsets for junior personnel. Provide On-The-Job mentorship, create training material and virtual labs. Because of the Tribe's commitment to community service and the well-being of its members, each employee may be expected to perform a wide range of office and field duties from time to time. Such duties may or may not be related to their regular responsibilities.
EDUCATION - EXPERIENCE AND TRAINING FOR POSITION
Required:
* Master's degree in Computer Science or a closely related field and four (4) years of related industry experience; or Bachelor's degree in Computer Science or a closely related field and six (6) years of related industry experience; or Associate's degree in Computer Science or a closely related field and eight (8) years of related industry experience; or
* Ten or more (10+) years of directly related industry experience in lieu of a degree.
Strongly desired::
* ISC2 - Certified Information Systems Security Professional (CISSP)
* Microsoft - Cybersecurity Architect Expert (SC-100)
* ISACA - Certified Information Security Manager (CISM)
* CompTIA - CompTIA Advanced Security Practitioner (CASP+)
SPECIFIC SKILLS/KNOWLEDGE/ABILITIES REQUIRED FOR POSITION
Skills:
* Research and recommend patching for known threats and zero-day vulnerabilities.
* Conduct internal information system risk assessments to recommend and implement changes to procedures, systems, or infrastructure to enhance security and/or address non-compliance with information security standards.
* Research new technology requests and recommend appropriate security guidance.
* Recommend new technology and tools to advance the overall security posture and adapt to the emerging threat landscape of our environment.
* Provide security training and awareness campaigns to help educate staff.
* Manage the risk registry and provide appropriate recommendations and accountability.
* Assist and provide guidance to lower-level team members with assigned duties and responsibilities.
* Assist and take instruction from direct leadership with duties and responsibilities as assigned.
Ability:
* Requires ability to appropriately manage and handle highly confidential information.
* Requires ability to remain focused, self-motivated, and initiative-taking while working independently or on a team, regardless of working onsite or remotely with little to no instruction.
* Requires planning, organizing, and working on multiple tasks at one time with tight time constraints.
* Requires ability to identify the most important tasks and prioritize accordingly.
* Requires ability to implement a logical and structured approach to time management.
* Requires ability to demonstrate a high level of professionalism and show respect to all co-workers, patients, business partners, and members of the public.
* Requires ability to demonstrate a strong collaborative mindset, share knowledge, and function as a contributing member of the team.
* Requires ability to work effectively with all levels of the organization and broad technical understanding, while providing excellent customer service.
* Requires ability to demonstrate a high level of communication skills, both verbal (meeting organizer, training, etc.) and written (E-mail, IT policy, documentation, etc.) to C-level executives, auditors, end users, and engineers.
* Requires ability to quickly learn, conduct own research as necessary, and retain information.
* Requires ability to quickly understand information systems to identify and validate security requirements.
* Requires ability to stay up to date on all current cybersecurity events and zero-day exploitations.
* Requires ability to demonstrate strong critical-thinking and problem-solving skills.
* Requires ability to demonstrate acute attention to detail.
Knowledge:
* Professional experience penetration testing and Kali Linux.
* Professional experience with various AV/EDR, SIEM/SOAR and SOC management.
* Professional experience with vulnerability management and patch management.
* Professional experience with hardening ADUC, GPM, and OS environments such as Windows, Linux, MacOS, VMware, etc.
* Professional experience with ADFS, SAML, API, SSO, and MFA.
* Professional experience with scripting languages and automation such as Python, PowerShell, etc.
* Professional experience with Azure, M365, Defender for Identity, Purview, Intune, and Entra ID.
* Professional experience with ADCS, PKI/certificate authority, and OpenSSL.
* Professional experience with HA and BCDR.
* Professional experience with security frameworks such as NIST and CIS Controls, as well as regulations such as PCI-DSS, HIPAA, and FERPA from the perspective of systems security.
PHYSICAL REQUIREMENTS
Primarily involves working in an office environment, requiring prolonged periods of sitting and using a computer. The role may occasionally require lifting of equipment up to 50 pounds. The Systems SecurityEngineer, Sr. should be able to move around the office to collaborate with team members and attend meetings. Visual acuity is necessary to review detailed security reports and monitor system alerts. The position may involve occasional travel to attend training sessions or conferences. The Systems SecurityEngineer, Sr. must be able to handle stress effectively and work under pressure during security incidents.
Licenses or Certifications Required
OffSec - Offensive Security Certified Professional (OSCP)