Information Security Engineer
Securities analyst job at Palantir
A World-Changing Company Palantir builds the world's leading software for data-driven decisions and operations. By bringing the right data to the people who need it, our platforms empower our partners to develop lifesaving drugs, forecast supply chain disruptions, locate missing children, and more.
The Role
As an Information Security Engineer, you are responsible for the security of Palantir's people and infrastructure around the globe. Your technical expertise is second only to your integrity and real passion for security and technology in general. Our ideal candidate works well on a team, is highly motivated, and enjoys solving problems and taking on new challenges.
In this role, you'll be the first line of defense for protecting Palantir. Your team is responsible for the 24/7 prevention, detection, and investigation of security events and active attacks across our entire infrastructure. Your work will directly impact the success of Palantir's mission as you seek to make it challenging for our adversaries and protect our global network.Core Responsibilities
Build, run, and own infrastructure and automation to detect, contain, and eradicate security threats.
Develop alerting and detection strategies to identify malicious or anomalous behavior.
Develop new and novel defensive techniques to identify or counteract changes in adversary techniques and tactics.
Dissect network, host, memory, and other artifacts originating from multiple operating systems and applications.
Investigate enterprise-wide operations to uncover sophisticated and undetected threats.
Partner closely with other members of the Information Security team to lead changes in the company's network defense posture.
What We Value
Broad exposure to multiple security subject areas, including a strong background in forensics or threat intelligence.
Deep exposure in Incident Response or Detection Engineering.
Desire to further the information security community through substantive contributions (e.g. conference talks, blog posts, public tool development, etc.).
Strong working knowledge of TCP/IP networking and common protocols.
What We Require
Extensive security experience (3+ years) in at least one major platform (e.g. AWS, Azure, Windows, OS X, Linux, etc.).
Proficiency in Python (preferred), PowerShell, or similar.
Active TS/SCI security clearance or eligibility to obtain a security clearance.
Salary
The estimated salary range for this position is estimated to be $135,000 - $200,000/year. Total compensation for this position may also include Restricted Stock units, sign-on bonus and other potential future incentives. Further note that total compensation for this position will be determined by each individual's relevant qualifications, work experience, skills, and other factors. This estimate excludes the value of any potential sign-on bonus; the value of any benefits offered; and the potential future value of any long-term incentives.
Our benefits aim to promote health and wellbeing across all areas of Palantirians' lives. We work to continuously improve our offerings and listen to our community as we design and update them. The list below details our available benefits and some of the perks that can be enjoyed as an employee of Palantir Technologies.
Benefits
• Employees (and their eligible dependents) can enroll in medical, dental, and vision insurance as well as voluntary life insurance• Employees are automatically covered by Palantir's basic life, AD&D and disability insurance• Commuter benefits• Relocation assistance• Take what you need paid time off, not accrual based• 2 weeks paid time off built into the end of each year (subject to team and business needs)• 10 paid holidays throughout the calendar year• Supportive leave of absence program including time off for military service and medical events• Paid leave for new parents and subsidized back-up care for all parents• Fertility and family building benefits including but not limited to adoption, surrogacy, and preservation• Stipend to help with expenses that come with a new child• Employees can enroll in Palantir's 401k plan
Life at Palantir
We want every Palantirian to achieve their best outcomes, that's why we celebrate individuals' strengths, skills, and interests, from your first interview to your longterm growth, rather than rely on traditional career ladders. Paying attention to the needs of our community enables us to optimize our opportunities to grow and helps ensure many pathways to success at Palantir. Promoting health and well-being across all areas of Palantirians' lives is just one of the ways we're investing in our community. Learn more at Life at Palantir and note that our offerings may vary by region.
In keeping consistent with Palantir's values and culture, we believe employees are “better together” and in-person work affords the opportunity for more creative outcomes. Therefore, we encourage employees to work from our offices to foster connectivity and innovation. Many teams do offer hybrid options (WFH a day or two a week), allowing our employees to strike the right trade-off for their personal productivity. Based on business need, there are a few roles that allow for “Remote” work on an exceptional basis. If you are applying for one of these roles, you must work from the state in which you are employed. If the posting is specified as Onsite, you are required to work from an office.
If you want to empower the world's most important institutions, you belong here. Palantir values excellence regardless of background. We are proud to be an Equal Opportunity Employer for all, including but not limited to Veterans and those with disabilities. Palantir is committed to making the application and hiring process accessible to everyone and will provide a reasonable accommodation for those living with a disability. If you need an accommodation for the application or hiring process
,
please reach out and let us know how we can help.
Auto-ApplyPhysical Security Systems Analyst/Administrator
San Jose, CA jobs
Milestone Technologies is a global IT managed services firm that partners with organizations to scale their technology, infrastructure and services to drive specific business outcomes such as digital transformation, innovation, and operational agility. Milestone is focused on building an employee-first, performance-based culture and for over 25 years, we have a demonstrated history of supporting category-defining enterprise clients that are growing ahead of the market. The company specializes in providing solutions across Application Services and Consulting, Digital Product Engineering, Digital Workplace Services, Private Cloud Services, AI/Automation, and ServiceNow. Milestone culture is built to provide a collaborative, inclusive environment that supports employees and empowers them to reach their full potential.
Our seasoned professionals deliver services based on Milestone's best practices and service delivery framework. By leveraging our vast knowledge base to execute initiatives, we deliver both short-term and long-term value to our clients and apply continuous service improvement to deliver transformational benefits to IT. With Intelligent Automation, Milestone helps businesses further accelerate their IT transformation. The result is a sharper focus on business objectives and a dramatic improvement in employee productivity. Through our key technology partnerships and our people-first approach, Milestone continues to deliver industry-leading innovation to our clients. With more than 3,000 employees serving over 200 companies worldwide, we are following our mission of revolutionizing the way IT is deployed.
Job Overview
Position Summary: We are seeking an experienced Physical Security Systems Contractor to
provide break-fix support for our enterprise security infrastructure. This role will focus on
troubleshooting and resolving issues reported by our Global Security Operations Center
(GSOC) team through our Jira ticketing system. The contractor will work on-site in San
Francisco with cutting-edge security technologies and coordinate with field integrators to ensure
rapid resolution of critical security system issues.
Key Responsibilities:
Monitor and respond to break-fix tickets in Jira submitted by GSOC team during
business hours
Perform troubleshooting and diagnostics on physical security systems including:
Access Control Systems
Video Management Systems (VMS)
Visitor Management Systems
Network-connected security devices
Analyze device and network connectivity issues using system logs and diagnostic tools
Determine root cause of system failures and implement software-based solutions when
possible
Coordinate with field integrators when hardware replacement or on-site intervention is
required
Provide clear dispatch instructions and technical guidance to integrators
Ensure proper resolution validation before integrator departure from site
Maintain detailed documentation of troubleshooting steps and resolutions in Jira
Escalate complex issues to appropriate vendor support channels when necessary
Participate in post-incident reviews to identify preventive measures
Required Technology Experience:
Video Management: Axis cameras and video solutions, Genetec Security Center VMS,
Sureview immersive video management
Access Control: Wayvelinx cloud-based access control systems
AI/Analytics: Alcatraz.ai facial authentication, Ambient.ai computer vision analytics
Network troubleshooting for IP-based security devices
Enterprise security system architecture and integration
Required Qualifications:
Minimum 5 years of hands-on experience with enterprise physical security systems
Strong experience with IP networking, VLANs, and network troubleshooting
Proficiency with Jira or similar ticketing systems
Experience coordinating with field technicians and integrators
Strong analytical and problem-solving skills
Excellent written and verbal communication skills
Ability to work independently and manage multiple concurrent issues
Must be able to work on-site in San Francisco during standard business hours
Reliable transportation to San Francisco location
Preferred Qualifications:
Industry certifications (e.g., Genetec, Axis, networking certifications)
Experience with enterprise-scale deployments
Knowledge of cybersecurity best practices for physical security systems
Previous GSOC or NOC experience
Experience with vendor escalation processes
Bay Area experience preferred
Key Performance Metrics:
Average ticket resolution time
First-call resolution rate
Customer satisfaction scores from GSOC team
Successful integrator dispatch coordination rate
Working Conditions:
Full-time on-site presence required at San Francisco location
Standard business hours: 8:00 AM - 5:00 PM, Monday through Friday
Occasional flexibility may be required for critical system issues
Professional office environment
Compensation Estimated Pay Range: 75K-85K
Exact compensation and offers of employment are dependent on circumstances of each case and will be determined based on job-related knowledge, skills, experience, licenses or certifications, and location.
Our Commitment to Diversity & Inclusion
At Milestone we strive to create a workplace that reflects the communities we serve and work with, where we all feel empowered to bring our full, authentic selves to work. We know creating a diverse and inclusive culture that champions equity and belonging is not only the right thing to do for our employees but is also critical to our continued success.
Milestone Technologies provides equal employment opportunity for all applicants and employees. All qualified applicants will receive consideration for employment and will not be discriminated against on the basis of race, color, religion, gender, gender identity, marital status, age, disability, veteran status, sexual orientation, national origin, or any other category protected by applicable federal and state law, or local ordinance. Milestone also makes reasonable accommodations for disabled applicants and employees.
We welcome the unique background, culture, experiences, knowledge, innovation, self-expression and perspectives you can bring to our global community. Our recruitment team is looking forward to meeting you.
Physical Security Systems Analyst/Administrator
Santa Rosa, CA jobs
Milestone Technologies is a global IT managed services firm that partners with organizations to scale their technology, infrastructure and services to drive specific business outcomes such as digital transformation, innovation, and operational agility. Milestone is focused on building an employee-first, performance-based culture and for over 25 years, we have a demonstrated history of supporting category-defining enterprise clients that are growing ahead of the market. The company specializes in providing solutions across Application Services and Consulting, Digital Product Engineering, Digital Workplace Services, Private Cloud Services, AI/Automation, and ServiceNow. Milestone culture is built to provide a collaborative, inclusive environment that supports employees and empowers them to reach their full potential.
Our seasoned professionals deliver services based on Milestone's best practices and service delivery framework. By leveraging our vast knowledge base to execute initiatives, we deliver both short-term and long-term value to our clients and apply continuous service improvement to deliver transformational benefits to IT. With Intelligent Automation, Milestone helps businesses further accelerate their IT transformation. The result is a sharper focus on business objectives and a dramatic improvement in employee productivity. Through our key technology partnerships and our people-first approach, Milestone continues to deliver industry-leading innovation to our clients. With more than 3,000 employees serving over 200 companies worldwide, we are following our mission of revolutionizing the way IT is deployed.
Job Overview
Position Summary: We are seeking an experienced Physical Security Systems Contractor to
provide break-fix support for our enterprise security infrastructure. This role will focus on
troubleshooting and resolving issues reported by our Global Security Operations Center
(GSOC) team through our Jira ticketing system. The contractor will work on-site in San
Francisco with cutting-edge security technologies and coordinate with field integrators to ensure
rapid resolution of critical security system issues.
Key Responsibilities:
Monitor and respond to break-fix tickets in Jira submitted by GSOC team during
business hours
Perform troubleshooting and diagnostics on physical security systems including:
Access Control Systems
Video Management Systems (VMS)
Visitor Management Systems
Network-connected security devices
Analyze device and network connectivity issues using system logs and diagnostic tools
Determine root cause of system failures and implement software-based solutions when
possible
Coordinate with field integrators when hardware replacement or on-site intervention is
required
Provide clear dispatch instructions and technical guidance to integrators
Ensure proper resolution validation before integrator departure from site
Maintain detailed documentation of troubleshooting steps and resolutions in Jira
Escalate complex issues to appropriate vendor support channels when necessary
Participate in post-incident reviews to identify preventive measures
Required Technology Experience:
Video Management: Axis cameras and video solutions, Genetec Security Center VMS,
Sureview immersive video management
Access Control: Wayvelinx cloud-based access control systems
AI/Analytics: Alcatraz.ai facial authentication, Ambient.ai computer vision analytics
Network troubleshooting for IP-based security devices
Enterprise security system architecture and integration
Required Qualifications:
Minimum 5 years of hands-on experience with enterprise physical security systems
Strong experience with IP networking, VLANs, and network troubleshooting
Proficiency with Jira or similar ticketing systems
Experience coordinating with field technicians and integrators
Strong analytical and problem-solving skills
Excellent written and verbal communication skills
Ability to work independently and manage multiple concurrent issues
Must be able to work on-site in San Francisco during standard business hours
Reliable transportation to San Francisco location
Preferred Qualifications:
Industry certifications (e.g., Genetec, Axis, networking certifications)
Experience with enterprise-scale deployments
Knowledge of cybersecurity best practices for physical security systems
Previous GSOC or NOC experience
Experience with vendor escalation processes
Bay Area experience preferred
Key Performance Metrics:
Average ticket resolution time
First-call resolution rate
Customer satisfaction scores from GSOC team
Successful integrator dispatch coordination rate
Working Conditions:
Full-time on-site presence required at San Francisco location
Standard business hours: 8:00 AM - 5:00 PM, Monday through Friday
Occasional flexibility may be required for critical system issues
Professional office environment
Compensation Estimated Pay Range: 75K-85K
Exact compensation and offers of employment are dependent on circumstances of each case and will be determined based on job-related knowledge, skills, experience, licenses or certifications, and location.
Our Commitment to Diversity & Inclusion
At Milestone we strive to create a workplace that reflects the communities we serve and work with, where we all feel empowered to bring our full, authentic selves to work. We know creating a diverse and inclusive culture that champions equity and belonging is not only the right thing to do for our employees but is also critical to our continued success.
Milestone Technologies provides equal employment opportunity for all applicants and employees. All qualified applicants will receive consideration for employment and will not be discriminated against on the basis of race, color, religion, gender, gender identity, marital status, age, disability, veteran status, sexual orientation, national origin, or any other category protected by applicable federal and state law, or local ordinance. Milestone also makes reasonable accommodations for disabled applicants and employees.
We welcome the unique background, culture, experiences, knowledge, innovation, self-expression and perspectives you can bring to our global community. Our recruitment team is looking forward to meeting you.
Physical Security Systems Analyst/Administrator
San Francisco, CA jobs
Milestone Technologies is a global IT managed services firm that partners with organizations to scale their technology, infrastructure and services to drive specific business outcomes such as digital transformation, innovation, and operational agility. Milestone is focused on building an employee-first, performance-based culture and for over 25 years, we have a demonstrated history of supporting category-defining enterprise clients that are growing ahead of the market. The company specializes in providing solutions across Application Services and Consulting, Digital Product Engineering, Digital Workplace Services, Private Cloud Services, AI/Automation, and ServiceNow. Milestone culture is built to provide a collaborative, inclusive environment that supports employees and empowers them to reach their full potential.
Our seasoned professionals deliver services based on Milestone's best practices and service delivery framework. By leveraging our vast knowledge base to execute initiatives, we deliver both short-term and long-term value to our clients and apply continuous service improvement to deliver transformational benefits to IT. With Intelligent Automation, Milestone helps businesses further accelerate their IT transformation. The result is a sharper focus on business objectives and a dramatic improvement in employee productivity. Through our key technology partnerships and our people-first approach, Milestone continues to deliver industry-leading innovation to our clients. With more than 3,000 employees serving over 200 companies worldwide, we are following our mission of revolutionizing the way IT is deployed.
Job Overview
Position Summary: We are seeking an experienced Physical Security Systems Contractor to
provide break-fix support for our enterprise security infrastructure. This role will focus on
troubleshooting and resolving issues reported by our Global Security Operations Center
(GSOC) team through our Jira ticketing system. The contractor will work on-site in San
Francisco with cutting-edge security technologies and coordinate with field integrators to ensure
rapid resolution of critical security system issues.
Key Responsibilities:
Monitor and respond to break-fix tickets in Jira submitted by GSOC team during
business hours
Perform troubleshooting and diagnostics on physical security systems including:
Access Control Systems
Video Management Systems (VMS)
Visitor Management Systems
Network-connected security devices
Analyze device and network connectivity issues using system logs and diagnostic tools
Determine root cause of system failures and implement software-based solutions when
possible
Coordinate with field integrators when hardware replacement or on-site intervention is
required
Provide clear dispatch instructions and technical guidance to integrators
Ensure proper resolution validation before integrator departure from site
Maintain detailed documentation of troubleshooting steps and resolutions in Jira
Escalate complex issues to appropriate vendor support channels when necessary
Participate in post-incident reviews to identify preventive measures
Required Technology Experience:
Video Management: Axis cameras and video solutions, Genetec Security Center VMS,
Sureview immersive video management
Access Control: Wayvelinx cloud-based access control systems
AI/Analytics: Alcatraz.ai facial authentication, Ambient.ai computer vision analytics
Network troubleshooting for IP-based security devices
Enterprise security system architecture and integration
Required Qualifications:
Minimum 5 years of hands-on experience with enterprise physical security systems
Strong experience with IP networking, VLANs, and network troubleshooting
Proficiency with Jira or similar ticketing systems
Experience coordinating with field technicians and integrators
Strong analytical and problem-solving skills
Excellent written and verbal communication skills
Ability to work independently and manage multiple concurrent issues
Must be able to work on-site in San Francisco during standard business hours
Reliable transportation to San Francisco location
Preferred Qualifications:
Industry certifications (e.g., Genetec, Axis, networking certifications)
Experience with enterprise-scale deployments
Knowledge of cybersecurity best practices for physical security systems
Previous GSOC or NOC experience
Experience with vendor escalation processes
Bay Area experience preferred
Key Performance Metrics:
Average ticket resolution time
First-call resolution rate
Customer satisfaction scores from GSOC team
Successful integrator dispatch coordination rate
Working Conditions:
Full-time on-site presence required at San Francisco location
Standard business hours: 8:00 AM - 5:00 PM, Monday through Friday
Occasional flexibility may be required for critical system issues
Professional office environment
Compensation Estimated Pay Range: 75K-85K
Exact compensation and offers of employment are dependent on circumstances of each case and will be determined based on job-related knowledge, skills, experience, licenses or certifications, and location.
Our Commitment to Diversity & Inclusion
At Milestone we strive to create a workplace that reflects the communities we serve and work with, where we all feel empowered to bring our full, authentic selves to work. We know creating a diverse and inclusive culture that champions equity and belonging is not only the right thing to do for our employees but is also critical to our continued success.
Milestone Technologies provides equal employment opportunity for all applicants and employees. All qualified applicants will receive consideration for employment and will not be discriminated against on the basis of race, color, religion, gender, gender identity, marital status, age, disability, veteran status, sexual orientation, national origin, or any other category protected by applicable federal and state law, or local ordinance. Milestone also makes reasonable accommodations for disabled applicants and employees.
We welcome the unique background, culture, experiences, knowledge, innovation, self-expression and perspectives you can bring to our global community. Our recruitment team is looking forward to meeting you.
Physical Security Systems Analyst/Administrator
Fremont, CA jobs
Milestone Technologies is a global IT managed services firm that partners with organizations to scale their technology, infrastructure and services to drive specific business outcomes such as digital transformation, innovation, and operational agility. Milestone is focused on building an employee-first, performance-based culture and for over 25 years, we have a demonstrated history of supporting category-defining enterprise clients that are growing ahead of the market. The company specializes in providing solutions across Application Services and Consulting, Digital Product Engineering, Digital Workplace Services, Private Cloud Services, AI/Automation, and ServiceNow. Milestone culture is built to provide a collaborative, inclusive environment that supports employees and empowers them to reach their full potential.
Our seasoned professionals deliver services based on Milestone's best practices and service delivery framework. By leveraging our vast knowledge base to execute initiatives, we deliver both short-term and long-term value to our clients and apply continuous service improvement to deliver transformational benefits to IT. With Intelligent Automation, Milestone helps businesses further accelerate their IT transformation. The result is a sharper focus on business objectives and a dramatic improvement in employee productivity. Through our key technology partnerships and our people-first approach, Milestone continues to deliver industry-leading innovation to our clients. With more than 3,000 employees serving over 200 companies worldwide, we are following our mission of revolutionizing the way IT is deployed.
Job Overview
Position Summary: We are seeking an experienced Physical Security Systems Contractor to
provide break-fix support for our enterprise security infrastructure. This role will focus on
troubleshooting and resolving issues reported by our Global Security Operations Center
(GSOC) team through our Jira ticketing system. The contractor will work on-site in San
Francisco with cutting-edge security technologies and coordinate with field integrators to ensure
rapid resolution of critical security system issues.
Key Responsibilities:
Monitor and respond to break-fix tickets in Jira submitted by GSOC team during
business hours
Perform troubleshooting and diagnostics on physical security systems including:
Access Control Systems
Video Management Systems (VMS)
Visitor Management Systems
Network-connected security devices
Analyze device and network connectivity issues using system logs and diagnostic tools
Determine root cause of system failures and implement software-based solutions when
possible
Coordinate with field integrators when hardware replacement or on-site intervention is
required
Provide clear dispatch instructions and technical guidance to integrators
Ensure proper resolution validation before integrator departure from site
Maintain detailed documentation of troubleshooting steps and resolutions in Jira
Escalate complex issues to appropriate vendor support channels when necessary
Participate in post-incident reviews to identify preventive measures
Required Technology Experience:
Video Management: Axis cameras and video solutions, Genetec Security Center VMS,
Sureview immersive video management
Access Control: Wayvelinx cloud-based access control systems
AI/Analytics: Alcatraz.ai facial authentication, Ambient.ai computer vision analytics
Network troubleshooting for IP-based security devices
Enterprise security system architecture and integration
Required Qualifications:
Minimum 5 years of hands-on experience with enterprise physical security systems
Strong experience with IP networking, VLANs, and network troubleshooting
Proficiency with Jira or similar ticketing systems
Experience coordinating with field technicians and integrators
Strong analytical and problem-solving skills
Excellent written and verbal communication skills
Ability to work independently and manage multiple concurrent issues
Must be able to work on-site in San Francisco during standard business hours
Reliable transportation to San Francisco location
Preferred Qualifications:
Industry certifications (e.g., Genetec, Axis, networking certifications)
Experience with enterprise-scale deployments
Knowledge of cybersecurity best practices for physical security systems
Previous GSOC or NOC experience
Experience with vendor escalation processes
Bay Area experience preferred
Key Performance Metrics:
Average ticket resolution time
First-call resolution rate
Customer satisfaction scores from GSOC team
Successful integrator dispatch coordination rate
Working Conditions:
Full-time on-site presence required at San Francisco location
Standard business hours: 8:00 AM - 5:00 PM, Monday through Friday
Occasional flexibility may be required for critical system issues
Professional office environment
Compensation Estimated Pay Range: 75K-85K
Exact compensation and offers of employment are dependent on circumstances of each case and will be determined based on job-related knowledge, skills, experience, licenses or certifications, and location.
Our Commitment to Diversity & Inclusion
At Milestone we strive to create a workplace that reflects the communities we serve and work with, where we all feel empowered to bring our full, authentic selves to work. We know creating a diverse and inclusive culture that champions equity and belonging is not only the right thing to do for our employees but is also critical to our continued success.
Milestone Technologies provides equal employment opportunity for all applicants and employees. All qualified applicants will receive consideration for employment and will not be discriminated against on the basis of race, color, religion, gender, gender identity, marital status, age, disability, veteran status, sexual orientation, national origin, or any other category protected by applicable federal and state law, or local ordinance. Milestone also makes reasonable accommodations for disabled applicants and employees.
We welcome the unique background, culture, experiences, knowledge, innovation, self-expression and perspectives you can bring to our global community. Our recruitment team is looking forward to meeting you.
DevOps Security Engineer
Chicago, IL jobs
We are looking for a Developer Security professional with strong expertise in DevOps and Cloud Computing. In this role, you will design, develop, and implement secure, scalable software solutions across the full Secure Software Development Life Cycle (SDLC) - from conception to deployment. Familiarity with CI/CD pipelines is essential, and experience with Kubernetes is a plus.
Responsibilities
Design and develop Terraform scripts for infrastructure automation.
Automate cloud deployments and ensure secure configurations.
Install and configure products on Kubernetes clusters.
Develop and unit test software components following best practices.
Collaborate with business partners to translate requirements into technical solutions.
Work closely with architects and enterprise framework teams to deliver optimal solutions.
Ensure non-functional requirements (security, performance, scalability, maintainability, usability, reliability) are met.
Maintain code quality standards and perform appropriate testing.
Qualifications
8+ years of experience in software development and security.
Strong knowledge of cloud deployments and Terraform.
Familiarity with middleware technologies (WebLogic, Tomcat, JBoss).
Experience with Spring Boot and Agile development methodologies.
Proficiency in CI/CD pipelines and GIT-based source control.
Solid understanding of the secure software development lifecycle.
Experience with Kubernetes, React, and Docker.
Knowledge of web technologies and application servers.
Skills
Terraform
Kubernetes
Cloud Deployment
Middleware (WebLogic, Tomcat, JBoss)
Spring Boot
CI/CD pipelines
GIT-based source control
Rate: $75-95/HR
Security Engineer
Cary, NC jobs
We are seeking a skilled Security Engineer with strong Networking and Compliance experience to join our team in Millennia. This position is required to reside in the vicinity of our Durham, NC Data Center. In this role, you will be crucial in maintaining the integrity and security of our network systems, ensuring privacy and security controls within processes, assets, and data flow within our healthcare-focused environment
Responsibilities:
· Maintain and manage all processes systems supporting Millennia's security posture.
· Monitor, manage, and implement security infrastructure to support organizational needs
· Monitor logs and alerts to identify incidents. Perform and or document Root Cause Analysis and remediation on Security Incidents.
· Monitor network performance and troubleshoot issues and Security Incidents.
· Plan, manage, and execute system upgrades and weekly patches to all endpoints.
· Develop and enforce security policies to protect sensitive patient data.
· Conduct regular system audits and vulnerability assessments.
· Provide technical support for network-related issues to staff and clients.
· Maintain documentation of network configurations and procedures.
· Stay updated on industry trends and emerging technologies
· Collaborate with IT teams to integrate new technologies into existing systems.
· Provide hand-on support to our offices and data center.
Qualifications:
· Strong knowledge of network and security administration, controls, protocols, and best practices.
· Experience with SOC2 or HITRUST, and HIPAA Security and Privacy Rule.
· Proven experience as a Network Administrator or similar role.
· Proficiency in configuring firewalls, routers, and switches, encryption protocols, and certificates.
· Familiarity with cybersecurity principles and incident response strategies.
· Excellent problem-solving skills and attention to detail.
· Exceptional communication skills and ability to work independently and collaboratively in a team-oriented environment.
· Experience with cloud computing platforms (AWS, Azure) is a plus.
Relevant certifications (e.g., CCNA, CompTIA Security+) are preferred
Sr. Security Engineer - Red Team
Chicago, IL jobs
About the Company:
A Leading Financial Service Client is looking to hire a strong Security Engineer who can lead Red team exercises against a hybrid environment using threat intelligence and the MITRE Telecommunication&CK Framework.
Responsibilities:
Approx 8 years' experience with industry standard Red Team testing tools (Cobalt Strike, Mythic C2, Rubeus, Bloodhound, Covenant, etc.) or the ability to demonstrate equivalent knowledge.
Expert understanding of how an Advanced Persistent Threat could compromise a financial institution without using phishing.
Expert understanding of Red Team concepts, tools, and automation strategies.
Expert understanding of MITRE Telecommunication&CK framework tactics, techniques, and procedures.
Expert understanding of measuring and rating vulnerabilities based on principal characteristics of a vulnerability.
Expert understanding of Windows and Linux system hardening concepts and techniques.
Information Security Engineer
Denver, CO jobs
IAM Enginner
Proven experience improving the JML(Joiner, Mover, Leaver) processes to assist with an overhaul of the program utilizing ServiceNow, Sailpoint and Entra ID along with other applications.
Extensive understanding of SoD, Toxic Combinations standards.
Experience with User Access Reviews and automation of functions within the program.
Understanding of Microsoft Entra ID (Azure AD), including SSO (SAML/OIDC), MFA, Conditional Access, and Privileged Identity Management (PIM).
Provide support and guidance around implementation of Privileged Access Management (PAM) solutions to secure administrative and high-risk accounts, enforce just-in-time access, and monitor privileged sessions.
Lead IAM engineering work for major projects such as Aladdin onboarding, including defining access provisioning standards and integrating with identity governance processes.
Experience working with SailPoint, understanding of provisioning processes and automation.
Seek out automation opportunities to streamline identity lifecycle processes.
Redesign and automate Joiner-Mover-Leaver (JML) workflows to eliminate manual steps and reduce errors. Includes working with our people department to assist with data improvements.
Partner to build and maintain preventive controls to ensure compliance with SOX, ISO 27001, SOC 2, and internal policies.
Automate evidence collection and reporting for audits and access reviews.
Troubleshoot and resolve identity synchronization issues, federation problems, and access failures.
Partner with Security, IT, People Department and Compliance teams to ensure identity services meet security and regulatory requirements.
Participate in continuous improvement initiatives and recommend enhancements to identity processes and technology.
Supervisory responsibilities Technical Skills and Qualifications
Bachelor's Degree in Computer Science, Information Security, or equivalent work experience.
3-5+ years in Identity & Access Management or Identity Security engineering roles.
Strong hands-on experience with Microsoft Entra ID (Azure AD) and Azure identity services.
Experience implementing audit-ready controls and supporting compliance frameworks (SOX, ISO, SOC 2, ISAE, DORA).
Familiarity with Conditional Access, MFA, and PIM.
Knowledge of Identity Governance and lifecycle processes.
Familiarity with markup languages (JSON, XML)
·Understanding of API workings as integrating various software systems enabling seamless communication and data exchanges
Working knowledge of PowerShell / Python, SQL, Java, and Beanshell scripting languages.
Desired knowledge of Business Systems: Employee Central SuccessFactors, SAP, Salesforce, Aladdin
Experience with IGA tools (Microsoft Entra ID Governance, SailPoint).
Competencies Required
Ability to design and implement secure, automated identity solutions.
Strong problem-solving and troubleshooting skills.
Ability to work in high-volume, high-pressure environments while maintaining quality.
Excellent communication skills-able to document processes and present technical
concepts clearly.
· Highly motivated with attention to detail and integrity.
· Strong collaboration skills; able to work across teams and influence without authority.
· Desire and ability to coach and train peers of best practices and technical directions
· Ability to define and enforce standards for new platforms like Aladdin.
· Commitment to continuous improvement and following best practices.
MDR Analyst - Shift Position (Unit 42), US Citizen - CA HQ
Santa Clara, CA jobs
Our Mission At Palo Alto Networks everything starts and ends with our mission: Being the cybersecurity partner of choice, protecting our digital way of life. Our vision is a world where each day is safer and more secure than the one before. We are a company built on the foundation of challenging and disrupting the way things are done, and we're looking for innovators who are as committed to shaping the future of cybersecurity as we are.
Who We Are
This role is remote, but distance is no barrier to impact. Our hybrid teams collaborate across geographies to solve big problems, stay close to our customers, and grow together. You will be part of a culture that values trust, accountability, and shared success where your work truly matters.
Job Description
Your Career
We are seeking a driven problem solver to join our Unit 42 MDR team. Our team is responsible for customers internal security monitoring, threat hunting and incident response. As a MDR Analyst, we will rely on you to detect and respond to cyber incidents facing customers' internal business.
The ideal candidate is a quick learner and good communicator who will be able to follow established processes for analyzing threat alerts that fire from our Cortex XDR. The candidate should be a creative thinker who takes pride in solving tough problems.
Your Impact
Join a new emerging team who is going to be part of Palo Alto's Unit 42, Working closely with global customers providing the best security in the market
Own an incident lifecycle from outbreak to full remediation
Provide critical feedback to the different product, research and engineering and threat hunting teams to help improve the products for the entire Palo Alto Networks' customer base
Work closely with Security Research, Threat Intelligence and Threat Hunting teams to remediate and detect new emerging threats
This position is a Shift Position (Saturday / Sunday shifts are expected to be part of the role). Shift time consists of US time, EMEA time and APAC time.
Qualifications
Your Experience
1+ years of experience in a multi tiered SOC/IR is a must
Experienced with Technologies such as EDR, SIEM, SOAR, FW
A well established familiarity with attack trends and vectors
Excellent written and oral communication skills in English
Some degree of Malware Analysis - An advantage
CEH / CompTIA CYSA+ certifications - An advantage
Hands-on experience with Cortex XSOAR or Cortex XDR - An advantage
Additional Information
The Team
Unit 42 is the global threat intelligence team at Palo Alto Networks. We believe threat intelligence should be shared and available to all within the industry. We deliver high-quality, in-depth research on adversaries, malware families, and attack campaigns. Our analysts uncover and document adversary behaviors and then share playbooks that give insight into the various tools, techniques, and procedures threat actors execute to compromise organizations.
If you're looking for a career with access to the brightest minds in cybersecurity, you've found it. We have a hunger for researching, hunting out the world's newest threats and sharing them with our industry to make the digital world a safer place.
You will be part of a growing, passionate, and dynamic team with an opportunity to work on challenging and exciting projects - centered on what we believe is one of the most significant mission statements in the world. We also strive to be the most people-centric company ever! That means we're constantly working to make your experience amazing, and you are part of the team breaking boundaries of what the workplace can be!
Compensation Disclosure
The compensation offered for this position will depend on qualifications, experience, and work location. For candidates who receive an offer at the posted level, the starting base salary (for non-sales roles) or base salary + commission target (for sales/commissioned roles) is expected to be between $87000 - $139500/YR. The offered compensation may also include restricted stock units and a bonus. A description of our employee benefits may be found here.
Our Commitment
We're problem solvers that take risks and challenge cybersecurity's status quo. It's simple: we can't accomplish our mission without diverse teams innovating, together.
We are committed to providing reasonable accommodations for all qualified individuals with a disability. If you require assistance or accommodation due to a disability or special need, please contact us at accommodations@paloaltonetworks.com.
Palo Alto Networks is an equal opportunity employer. We celebrate diversity in our workplace, and all qualified applicants will receive consideration for employment without regard to age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, or other legally protected characteristics.
All your information will be kept confidential according to EEO guidelines.
Is role eligible for Immigration Sponsorship? No. Please note that we will not sponsor applicants for work visas for this position.
Senior Security Researcher - GenAI
New York, NY jobs
The Team:
Applied Security Research's (ASR) main objective is to research, discover and disseminate findings on emerging vulnerabilities, tradecraft and attack paths in cloud technologies and services. Their findings are a portfolio of outputs that bolster the knowledge and security posture of the community, customers and Datadog. They challenge the current state of security architecture amongst these technologies to reshape the lines on how these products and services should be secured. Our researchers consistently discover critical vulnerabilities, catch sophisticated threat actors in customer environments, and share groundbreaking research via our Security Labs research blog and at top-tier security conferences.
As a Generative AI Security Researcher, you'll dive deep into Generative AI technologies and find novel approaches to exploit their architecture and security assumptions. You'll take your findings and disseminate that knowledge through our detection, product and security engineering backlogs, open-source contributions, vulnerability disclosure and publicly facing content such as blogs and conference talks. By promoting your findings of you and your team, you'll help build customer trust, awareness of our brand and make our stakeholders safer as they implement AI technologies.
At Datadog, we place value in our office culture - the relationships and collaboration it builds and the creativity it brings to the table. We operate as a hybrid workplace to ensure our Datadogs can create a work-life harmony that best fits them.
What You'll Do:
Drive strategic research initiatives on Generative AI security by proposing, validating, and executing innovative projects.
Conduct hands-on research to discover and demonstrate vulnerabilities, attack vectors, adversarial methods, and misconfigurations in Generative AI and large language model (LLM) technologies.
Create proof-of-concept attacks, simulations, and demonstrations to illustrate vulnerabilities and defensive strategies clearly.
Serve as a subject matter expert in Generative AI and collaborate with product management, engineering, and detection engineering teams to translate research findings into actionable product improvements.
Leverage your research to improve Datadog's security posture against Generative AI threats and attacks.
Author and present impactful blog posts, webinars, and conference presentations to educate the broader security and AI community.
Engage closely with cloud providers, AI vendors, and open-source communities to responsibly disclose and remediate identified security issues.
Track, research and experiment with the latest tactics, techniques & procedures for attacking and defending Generative AI infrastructure.
Partner with our Threat Research and Detection Engineering teams to build detection content from industry-leading research.
Collaborate with highly technical customers about their security, listen to their needs, and work with the team to solve their problems
Build proof of concept attacks and demonstrate how Datadog's products can detect these attacks.
Who You Are:
You have deep knowledge of common Generative AI technologies, foundational models and frameworks (MCP, A2A, LangGraph, CrewAI, etc.)
You have a deep understanding of vulnerabilities specific to Generative AI, such as prompt injection, model poisoning, etc.
You are knowledgeable with the OWASP Top 10 for LLMs, and/or how common web security concepts (access controls, input handling, API security) apply to LLM models.
You have experience working in offensive security roles (penetration testing, red teaming) or vulnerability research with a focus on cloud or SaaS production environments/technologies.
You are comfortable with taking ambiguous requirements and creating a research plan, with measurable and tangible outcomes, as well as getting buy-in on the plan from stakeholders autonomously.
You are comfortable presenting and documenting your research findings with others: either internally at your current role, or publicly in conference talks and blog posts.
You are humble, precise, and thorough. You don't just discover security issues, you can explain and bring others with you.
You are passionate about collaborating with stakeholders like detection engineers, product managers, software engineers, customers and other researchers.
You can comfortably write software to solve problems with and without AI tooling, and build systems for research purposes (eg. Go, Python, Rust, etc.).
You are a strong communicator, both verbal and written.
Bonus Points:
Experience working in a Security Research organization.
A proven track record in discovering, disclosing, and documenting vulnerabilities.
Experience presenting your research at large conferences.
Experience working in an OKR driven environment.
Datadog values people from all walks of life. We understand not everyone will meet all the above qualifications on day one. That's okay. If you're passionate about technology and want to grow your skills, we encourage you to apply.
Benefits and Growth:
New hire stock equity (RSUs) and employee stock purchase plan (ESPP)
Continuous professional development, product training, and career pathing
Intradepartmental mentor and buddy program for in-house networking
An inclusive company culture, ability to join our Community Guilds (Datadog employee resource groups)
Access to Inclusion Talks, our internal panel discussions
Free, global mental health benefits for employees and dependents age 6+
Competitive global benefits
Benefits and Growth listed above may vary based on the country of your employment and the nature of your employment with Datadog.
Auto-ApplyInformation Security Engineer
Securities analyst job at Palantir
Job DescriptionA World-Changing Company Palantir builds the world's leading software for data-driven decisions and operations. By bringing the right data to the people who need it, our platforms empower our partners to develop lifesaving drugs, forecast supply chain disruptions, locate missing children, and more.
The Role
As an Information Security Engineer, you are responsible for the security of Palantir's people and infrastructure around the globe. Your technical expertise is second only to your integrity and real passion for security and technology in general. Our ideal candidate works well on a team, is highly motivated, and enjoys solving problems and taking on new challenges.
In this role, you'll be the first line of defense for protecting Palantir. Your team is responsible for the 24/7 prevention, detection, and investigation of security events and active attacks across our entire infrastructure. Your work will directly impact the success of Palantir's mission as you seek to make it challenging for our adversaries and protect our global network.Core Responsibilities
Build, run, and own infrastructure and automation to detect, contain, and eradicate security threats.
Develop alerting and detection strategies to identify malicious or anomalous behavior.
Develop new and novel defensive techniques to identify or counteract changes in adversary techniques and tactics.
Dissect network, host, memory, and other artifacts originating from multiple operating systems and applications.
Investigate enterprise-wide operations to uncover sophisticated and undetected threats.
Partner closely with other members of the Information Security team to lead changes in the company's network defense posture.
What We Value
Broad exposure to multiple security subject areas, including a strong background in forensics or threat intelligence.
Deep exposure in Incident Response or Detection Engineering.
Desire to further the information security community through substantive contributions (e.g. conference talks, blog posts, public tool development, etc.).
Strong working knowledge of TCP/IP networking and common protocols.
What We Require
Extensive security experience (3+ years) in at least one major platform (e.g. AWS, Azure, Windows, OS X, Linux, etc.).
Proficiency in Python (preferred), PowerShell, or similar.
Active TS/SCI security clearance or eligibility to obtain a security clearance.
Salary
The estimated salary range for this position is estimated to be $135,000 - $200,000/year. Total compensation for this position may also include Restricted Stock units, sign-on bonus and other potential future incentives. Further note that total compensation for this position will be determined by each individual's relevant qualifications, work experience, skills, and other factors. This estimate excludes the value of any potential sign-on bonus; the value of any benefits offered; and the potential future value of any long-term incentives.
Our benefits aim to promote health and wellbeing across all areas of Palantirians' lives. We work to continuously improve our offerings and listen to our community as we design and update them. The list below details our available benefits and some of the perks that can be enjoyed as an employee of Palantir Technologies.
Benefits
• Employees (and their eligible dependents) can enroll in medical, dental, and vision insurance as well as voluntary life insurance• Employees are automatically covered by Palantir's basic life, AD&D and disability insurance• Commuter benefits• Relocation assistance• Take what you need paid time off, not accrual based• 2 weeks paid time off built into the end of each year (subject to team and business needs)• 10 paid holidays throughout the calendar year• Supportive leave of absence program including time off for military service and medical events• Paid leave for new parents and subsidized back-up care for all parents• Fertility and family building benefits including but not limited to adoption, surrogacy, and preservation• Stipend to help with expenses that come with a new child• Employees can enroll in Palantir's 401k plan
Life at Palantir
We want every Palantirian to achieve their best outcomes, that's why we celebrate individuals' strengths, skills, and interests, from your first interview to your longterm growth, rather than rely on traditional career ladders. Paying attention to the needs of our community enables us to optimize our opportunities to grow and helps ensure many pathways to success at Palantir. Promoting health and well-being across all areas of Palantirians' lives is just one of the ways we're investing in our community. Learn more at Life at Palantir and note that our offerings may vary by region.
In keeping consistent with Palantir's values and culture, we believe employees are “better together” and in-person work affords the opportunity for more creative outcomes. Therefore, we encourage employees to work from our offices to foster connectivity and innovation. Many teams do offer hybrid options (WFH a day or two a week), allowing our employees to strike the right trade-off for their personal productivity. Based on business need, there are a few roles that allow for “Remote” work on an exceptional basis. If you are applying for one of these roles, you must work from the state in which you are employed. If the posting is specified as Onsite, you are required to work from an office.
If you want to empower the world's most important institutions, you belong here. Palantir values excellence regardless of background. We are proud to be an Equal Opportunity Employer for all, including but not limited to Veterans and those with disabilities. Palantir is committed to making the application and hiring process accessible to everyone and will provide a reasonable accommodation for those living with a disability. If you need an accommodation for the application or hiring process
,
please reach out and let us know how we can help.
Network Security Analyst / Network Engineer/ System Admin
Illinois jobs
Established in 1991, Collabera has been a leader in IT staffing for over 22 years and is one of the largest diversity IT staffing firms in the industry. As a half a billion dollar IT company, with more than 9,000 professionals across 30+ offices, Collabera offers comprehensive, cost-effective IT staffing & IT Services. We provide services to Fortune 500 and mid-size companies to meet their talent needs with high quality IT resources through Staff Augmentation, Global Talent Management, Value Added Services through CLASS (Competency Leveraged Advanced Staffing & Solutions) Permanent Placement Services and Vendor Management Programs.
Collabera recognizes true potential of human capital and provides people the right opportunities for growth and professional excellence.
Job Description
Location: 100 Abbott Park Road, Lake County, Abbott Park, IL 60064
Duration: 6+ months (could go beyond)
Roles:
• Network Directory and Infrastructure Services Administration.
• Knowledge of domain administration and troubleshooting, Active Directory, MS FIM, Exchange, MS Office365 and supporting technologies, MS Azure, NPS, Federation and SQL Server administration required.
Responsibilities:
• Provide technical Level III problem isolation and resolution for a Global Active Directory Network.
• Configures and performs advanced diagnostics on infrastructure components and cloud based applications.
• Understands and repairs Domain infrastructure including DNS, DHCP, ADLDS, ADFS and FIM Sync.
• Understands and can configure/install Win Server 2008r2/2012r2 technologies for domain controllers and Radius Authentication servers.
• Repair and recover from hardware or software failures.
• Rotate on-call and must be available to work a varied shift schedule in a 7x24 hour operations center environment.
• Initiate major outage communication technical bridges as requested.
• Apply fix procedures as instructed for repetitive events as instructed and coordinate with impacted constituencies.
Competencies:
• Superior knowledge of Active Directory overall and its administrative components.
• Perform domain administration for 61,000+ workstations including domain controllers, NPS, Win 2003/2008R2/2012 server hardware, dynamic host configuration protocol (DHCP), domain name servers (DNS) configuration integrated with active directory, desktop configuration and end user support.
• Candidate will have worked in an AD environment that has done acquisition and divestiture work, Candidate will have worked with products such as ADMT, and ADLDS and the roles they play in M&A activities such as management of active directory structure in creation, administration of organizational units (OU), containers and sub containers throughout the domain from geographic to organizational standards, while setting policies and permissions.
• Candidate should have expert knowledge of Federation protocols including OAuth, SAML, WSFed, and a deep understanding of the IDP and SP roles associated with Federation environments.
• Candidate will have worked with Office 365 from an Identity standpoint and have an understanding of Azure Active Directory Sync and Identity Federation for Cloud services.
• Expertise should include attribute mapping and troubleshooting as well as rule sets associated with AADSync.
• Candidate must be able to correctly configure servers and clients for all services.
• Can isolate and repair most DNS and IP service problems.
• Understands and uses the appropriate tools in all instances during problem isolation and repair.
• Possesses an in depth understanding of communications technologies and can isolate and resolve most infrastructure issues.
Qualifications
• Associates Degree Minimum, prefer Computer Science or technology area or telecommunications science business minor
• Three (3) to six (6) months of specialized technical courses in Win and Active Directory technology's typically provided by vendors, technical societies, or equivalent experience.
Additional Information
To know more about this position, please contact:
Himanshu Prajapat
************
**********************************
Easy ApplyNetwork Security Analyst / Network Engineer/ System Admin
Illinois jobs
Established in 1991, Collabera has been a leader in IT staffing for over 22 years and is one of the largest diversity IT staffing firms in the industry. As a half a billion dollar IT company, with more than 9,000 professionals across 30+ offices, Collabera offers comprehensive, cost-effective IT staffing & IT Services. We provide services to Fortune 500 and mid-size companies to meet their talent needs with high quality IT resources through Staff Augmentation, Global Talent Management, Value Added Services through CLASS (Competency Leveraged Advanced Staffing & Solutions) Permanent Placement Services and Vendor Management Programs.
Collabera recognizes true potential of human capital and provides people the right opportunities for growth and professional excellence.
Job Description
Location: 100 Abbott Park Road, Lake County, Abbott Park, IL 60064
Duration: 6+ months (could go beyond)
Roles:
• Network Directory and Infrastructure Services Administration.
• Knowledge of domain administration and troubleshooting, Active Directory, MS FIM, Exchange, MS Office365 and supporting technologies, MS Azure, NPS, Federation and SQL Server administration required.
Responsibilities:
• Provide technical Level III problem isolation and resolution for a Global Active Directory Network.
• Configures and performs advanced diagnostics on infrastructure components and cloud based applications.
• Understands and repairs Domain infrastructure including DNS, DHCP, ADLDS, ADFS and FIM Sync.
• Understands and can configure/install Win Server 2008r2/2012r2 technologies for domain controllers and Radius Authentication servers.
• Repair and recover from hardware or software failures.
• Rotate on-call and must be available to work a varied shift schedule in a 7x24 hour operations center environment.
• Initiate major outage communication technical bridges as requested.
• Apply fix procedures as instructed for repetitive events as instructed and coordinate with impacted constituencies.
Competencies:
• Superior knowledge of Active Directory overall and its administrative components.
• Perform domain administration for 61,000+ workstations including domain controllers, NPS, Win 2003/2008R2/2012 server hardware, dynamic host configuration protocol (DHCP), domain name servers (DNS) configuration integrated with active directory, desktop configuration and end user support.
• Candidate will have worked in an AD environment that has done acquisition and divestiture work, Candidate will have worked with products such as ADMT, and ADLDS and the roles they play in M&A activities such as management of active directory structure in creation, administration of organizational units (OU), containers and sub containers throughout the domain from geographic to organizational standards, while setting policies and permissions.
• Candidate should have expert knowledge of Federation protocols including OAuth, SAML, WSFed, and a deep understanding of the IDP and SP roles associated with Federation environments.
• Candidate will have worked with Office 365 from an Identity standpoint and have an understanding of Azure Active Directory Sync and Identity Federation for Cloud services.
• Expertise should include attribute mapping and troubleshooting as well as rule sets associated with AADSync.
• Candidate must be able to correctly configure servers and clients for all services.
• Can isolate and repair most DNS and IP service problems.
• Understands and uses the appropriate tools in all instances during problem isolation and repair.
• Possesses an in depth understanding of communications technologies and can isolate and resolve most infrastructure issues.
Qualifications
• Associates Degree Minimum, prefer Computer Science or technology area or telecommunications science business minor
• Three (3) to six (6) months of specialized technical courses in Win and Active Directory technology's typically provided by vendors, technical societies, or equivalent experience.
Additional Information
To know more about this position, please contact:
Himanshu Prajapat
************
**********************************
Easy ApplyCyber Defense Analyst (Mid-Level)
Washington, DC jobs
Full-time Description
NetCentrics is seeking a highly motivated and technically skilled Mid-Level Cyber Defense Analyst to join our cybersecurity operations team. This role is responsible for supporting enterprise-wide cyber incident response and defense initiatives. The ideal candidate will have a strong background in threat analysis, intrusion detection, and real-time incident handling, and will be capable of correlating data from multiple sources to identify vulnerabilities and recommend effective remediation strategies.
About Us:
At NetCentrics, we proudly hold a distinguished position as a leader in cybersecurity, cloud, digital transformation, and mission support. With an esteemed clientele that includes the DoD, DHS, Federal Civilian Agencies, and the Intelligence Community, our impact on national security is undeniable. We are a diverse group of intellectually curious people, solving hard problems, and living by our core values while bonded by the shared vision to secure our nation - join us!
Key Responsibilities:
Coordinate and execute incident response functions across enterprise systems.
Provide expert technical support to cyber defense technicians to analyze, resolve, and document incidents.
Perform log analysis from a wide range of sources including host, firewall, IDS, and network traffic logs to detect potential threats.
Conduct cyber incident triage, determine scope and urgency, identify vulnerabilities, and recommend immediate remediation.
Execute real-time incident handling activities such as forensic collection, intrusion correlation and tracking, and threat analysis.
Support deployable Incident Response Teams (IRTs) with technical tasks during active investigations.
Perform initial forensic image collection and inspection to support mitigation and remediation efforts.
Conduct cyber defense trend analysis and reporting to identify recurring patterns and emerging threats.
Receive, review, and analyze network alerts from internal monitoring tools and threat intelligence sources.
Track and document incidents from initial detection through final resolution, ensuring completeness and accuracy of case records.
Apply defense-in-depth principles and best practices, including layered security and redundancy.
Collect and analyze intrusion artifacts (e.g., malware, trojans, source code) to enhance incident mitigation strategies.
Collaborate with intelligence analysts to correlate cyber threat data and improve situational awareness.
Monitor external threat intelligence feeds (e.g., vendor advisories, CERT alerts, vulnerability databases) to stay informed of current threats and assess enterprise impact.
Desired Qualifications:
Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or related field (or equivalent work experience).
3-5 years of experience in cybersecurity operations, with a focus on incident detection, response, or analysis.
Experience with log analysis tools (e.g., Splunk, ELK, QRadar), SIEM platforms, and forensic tools.
Familiarity with IDS/IPS, firewall technologies, and network protocols.
Solid understanding of cybersecurity frameworks (e.g., NIST 800-61, MITRE ATT&CK).
Strong analytical and troubleshooting skills.
Excellent verbal and written communication skills.
Preferred Qualifications:
Experience supporting federal government cybersecurity programs.
Familiarity with threat hunting, endpoint detection and response (EDR) tools, and malware analysis.
Experience documenting and reporting to internal leadership or external regulatory bodies.
Relevant industry certifications such as:
GIAC Certified Incident Handler (GCIH)
Certified Ethical Hacker (CEH)
Certified Information Systems Security Professional (CISSP)
CompTIA Cybersecurity Analyst (CySA+)
Where You Belong
At the heart of our organization lies a set of five core values that guide every facet of our work. "Mission First" epitomizes our unwavering commitment to our goals. "People Always" underscores the significance we place on our team's well-being and development. We continually strive to "Be Eminent" by consistently pushing the boundaries of excellence. "Embrace the Team" reflects our unwavering belief in the power of collaboration, recognizing that together, we attain greatness. With every action, we "Act with a Purpose," ensuring that our efforts contribute meaningfully to a larger mission. These values serve as the bedrock of our company culture, propelling us forward as a united and purpose-driven team.
Why Join NetCentrics
Join us not just to be a part of safeguarding our nation, but to be at the forefront of innovation, where your ideas and expertise play a pivotal role in shaping the future of cybersecurity and IT. Together, we're not just protecting systems; we're pioneering them. Come be a part of our team and redefine the possibilities in our industry!
Commitment to Diversity
This employer participates in E-Verify and will provide the federal government with your Form I-9 information to confirm that you are authorized to work in the U.S. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, veteran status or on the basis of disability.
Equal Opportunity Employer/Veterans/Disabled
Network Security Analyst
Durham, NC jobs
Established in 1991, Collabera is one of the fastest growing end-to-end information technology services and solutions companies globally. As a half a billion dollar IT company, Collabera's client-centric business model, commitment to service excellence and Global Delivery Model enables its global 2000 and leading mid-market clients to deliver successfully in an increasingly competitive marketplace.
With over 8200 IT professionals globally, Collabera provides value-added onsite, offsite and offshore technology services and solutions to premier corporations. Over the past few years, Collabera has been awarded numerous accolades and Industry recognitions including.
Collabera awarded Best Staffing Company to work for in 2012 by SIA. (hyperlink here)
Collabera listed in GS 100 - recognized for excellence and maturity
Collabera named among the Top 500 Diversity Owned Businesses
Collabera listed in GS 100 & ranked among top 10 service providers
Collabera was ranked:
32 in the Top 100 Large Businesses in the U.S
18 in Top 500 Diversity Owned Businesses in the U.S
3 in the Top 100 Diversity Owned Businesses in New Jersey
3 in the Top 100 Privately-held Businesses in New Jersey
66th on FinTech 100
35th among top private companies in New Jersey
***********************************************
Collabera recognizes true potential of human capital and provides people the right opportunities for growth and professional excellence. Collabera offers a full range of benefits to its employees including paid vacations, holidays, personal days, Medical, Dental and Vision insurance, 401K retirement savings plan, Life Insurance, Disability Insurance.
Job Description
Work Location: Durham NC 27703
Job Title: Network Security Analyst
Duration: 24 Months
Roles & Responsibilities:
• Primary job responsibility will be to perform Intrusion Detection Sensor Threat Analysis.
• Support for any one of McAfee IDS, Sourcefire IDS, Cisco IDS, Tipping Point IDS, Enterasys IDS, Juniper IDP and Fortinet IDS strongly desired.
• The Operations team supports 24x7 and an off shift work schedule may be required.
Qualifications
IDS/IPS
"Network analyst jobs" ; "Network security" ; "firewall analyst"; "network security position"; "network engineer"; "security engineer"
Additional Information
Should you have any questions, please feel free to call:
************
Aditika Sithta
Network Security Analyst
Durham, NC jobs
Established in 1991, Collabera is one of the fastest growing end-to-end information technology services and solutions companies globally. As a half a billion dollar IT company, Collabera's client-centric business model, commitment to service excellence and Global Delivery Model enables its global 2000 and leading mid-market clients to deliver successfully in an increasingly competitive marketplace.
With over 8200 IT professionals globally, Collabera provides value-added onsite, offsite and offshore technology services and solutions to premier corporations. Over the past few years, Collabera has been awarded numerous accolades and Industry recognitions including.
Collabera awarded Best Staffing Company to work for in 2012 by SIA. (hyperlink here)
Collabera listed in GS 100 - recognized for excellence and maturity
Collabera named among the Top 500 Diversity Owned Businesses
Collabera listed in GS 100 & ranked among top 10 service providers
Collabera was ranked:
32 in the Top 100 Large Businesses in the U.S
18 in Top 500 Diversity Owned Businesses in the U.S
3 in the Top 100 Diversity Owned Businesses in New Jersey
3 in the Top 100 Privately-held Businesses in New Jersey
66th on FinTech 100
35th among top private companies in New Jersey
***********************************************
Collabera recognizes true potential of human capital and provides people the right opportunities for growth and professional excellence. Collabera offers a full range of benefits to its employees including paid vacations, holidays, personal days, Medical, Dental and Vision insurance, 401K retirement savings plan, Life Insurance, Disability Insurance.
Job Description
Work Location: Durham NC 27703
Job Title: Network Security Analyst
Duration: 24 Months
Roles & Responsibilities:
• Primary job responsibility will be to perform Intrusion Detection Sensor Threat Analysis.
• Support for any one of McAfee IDS, Sourcefire IDS, Cisco IDS, Tipping Point IDS, Enterasys IDS, Juniper IDP and Fortinet IDS strongly desired.
• The Operations team supports 24x7 and an off shift work schedule may be required.
Qualifications
IDS/IPS
"Network analyst jobs" ; "Network security" ; "firewall analyst"; "network security position"; "network engineer"; "security engineer"
Additional Information
Should you have any questions, please feel free to call:
************
Aditika Sithta
Denver CO_Data Security Analyst_Cisco Certified_Linux exp
Denver, CO jobs
360 IT Professionals is a Software Development Company based in Fremont, California that offers complete technology services in Mobile development, Web development, Cloud computing and IT staffing. Merging Information Technology skills in all its services and operations, the company caters to its globally positioned clients by providing dynamic feasible IT solutions. 360 IT Professionals work along with its clients to deliver high-performance results, based exclusively on the one of a kind requirement.
Job Description
We are looking to fill a position for Data Security in Denver CO.
Qualifications
Short Description:
Selected person will be responsible to maintain systems to protect data from unauthorized users. Identifies, reports, and resolves security violations.
May require a bachelor's degree in area of specialty and at least 1 year or equivalent experience in the field or in a related area.
CCNA
CCNP+ (security)
CCSA (security)
Linux
Additional Information
Webcam interview is acceptable.
Information Security Analyst II
Renton, WA jobs
We have a fantastic new job opportunity for an IT Security Analyst II at Bloodworks Northwest. As a member of the Information Technology department, the IT Security Analyst II position supports Bloodworks' cybersecurity by monitoring, analyzing, and responding to security events and incidents; assisting with the daily operations of security tools and technologies; maintaining documentation; and ensuring compliance with established security policies and procedures. Works closely with senior security staff and consultants to identify potential threats, escalate incidents, and contribute to the continuous improvement of Bloodworks' security operations.
Principal responsibilities include, but are not limited to as a member of the Information Technology department:
Professional Conduct: Exhibit respect and a problem-solving mindset in all interactions to foster a positive work environment.
Effective Communication: Ensure clear and concise communication, both orally and in writing, striving for mutual understanding with colleagues and users.
Professionalism: Maintain a professional appearance and demeanor at all times, demonstrating the Information Technology department's values.
Quality Service: Commit to delivering the highest level of service, continuously seeking to improve and enhance client satisfaction with IT support.
Team Support: Collaborate effectively with team members, contributing to a supportive and successful work environment through mutual assistance and shared goals.
Principal responsibilities include, but are not limited to as an IT Security Analyst II:
Monitor Security Alerts and Events: Identify and resolve problems, often anticipating issues before their occurrence; use existing endpoints and network monitoring tools to detect suspicious activity across networks, systems, and applications.
Provide Incident Response: Identify, investigate, and escalate security incidents in accordance with established processes and procedures.
Perform Log Analysis: Review system and application logs to identify anomalies or indicators of compromise.
Support Vulnerability Management: Lead efforts in vulnerability detection and remediation with a primary focus on endpoint systems.
Security Policy Management: Provide subject matter expertise in systems security policies, standards/practices, protocols, and technologies.
Maintain Security Tools: Configure, deploy, maintain, and support security tools.
Document Security Incidents and Procedures: Keep accurate records of incidents, resolutions, and operational procedures.
Perform Account Reviews: Support periodic audits of user accounts and permissions to ensure least privilege principles.
Support Security Awareness Training: Lead the organization's security awareness training program.
Patch Management Support: Assist operations teams with systems patch management efforts.
Email Protection: Assist with email protection efforts.
Collaborate with IT teams: Work with other IT teams to ensure security policies are followed and assist in troubleshooting.
Ticket Management: Efficiently create, evaluate, prioritize, and maintain the appropriate status for all incidents and service requests documented in the IT ticketing system. Utilize the Knowledgebase to guide troubleshooting efforts and resolution processes.
Knowledgebase and Documentation: Contribute to the creation and maintenance of Knowledgebase articles and self-service guides to enhance user independence and reduce future support requests
Professional Development and Compliance: Stay up to Date with current industry best practices and emerging technologies to continuously improve service quality. Adhere to all applicable Standard Operating Procedures (SOPs) and regulatory requirements.
Fully participate as a member of the Information Technology and Bloodworks teams by ensuring interactions with colleagues promote collaboration and effective communication.
Additional Duties and Project Work: Perform assigned duties, demonstrating flexibility and a willingness to support the team and the organization's changing needs.
Policy and Procedure Compliance: Comply with all applicable Policies and Standard Operating Procedures (SOPs) as written.
REQUIREMENTS:
EDUCATION & EXPERIENCE:
A high school diploma or equivalent is required. An Associate's degree (consider a Bachelor's degree) or equivalent combination of education or work experience in information technology is preferred.
3+ years of cybersecurity experience in an enterprise network required.
Experience working in an enterprise network supporting such systems or platforms as endpoint detection and response (EDR), email protection (spam filtering, encryption configuration, etc.), network scanning, data loss protection (DLP), identity and access control, as well as web application firewalls (WAF).
A strong understanding of Microsoft Windows in an enterprise environment is required. Linux experience is considered a plus. Familiarity with IBM iSeries platforms is also considered a plus. Scripting experience is not required but is considered a plus.
Familiarity with security policy frameworks (e.g., NIST, CMMC, GDPR)
CompTIA A+, Network+, and Security+ certifications are preferred. Certified Ethical Hacker (CEH) or similar certifications are considered a plus.
Specific job skills include, but are not limited to:
Customer Service Excellence: Demonstrated Ability to deliver outstanding customer service. Capable of maintaining a professional demeanor in stressful situations and managing multiple customer requests simultaneously.
Interpersonal and Communication Skills: Exceptional interpersonal skills with proficiency in both oral and written communication. Ability to effectively translate between business needs and technical requirements, ensuring a clear understanding across all levels of the organization.
Technical Proficiency: Strong foundational knowledge in IT security principles, with a preference for candidates holding CompTIA A+, Network+, and Security+ certifications. Strong experience with Windows environments, both servers and workstations, required; familiarity with Linux and IBM iSeries is a plus.
Analytical and Problem-Solving Skills: Excellent analytical and problem-solving abilities. Must be adept at analyzing situations, identifying issues, and proposing practical solutions.
Teamwork and Collaboration: Demonstrated Ability to work well both independently and as part of a team. Emphasizes mutual support, cooperation, and shared goal achievement.
Adaptability and Learning: Openness to learning new technologies and staying updated with current industry best practices. Ability to adapt to changing priorities and work conditions.
Required mental activities involve continuous use of teamwork and problem analysis. Required mental activities used less frequently include interpersonal skills, and the Ability to read, write, speak and comprehend English (all used frequently); decision making, creativity, customer service, independent judgment and/or independent action, the performance of basic mathematics, and the performance of accurate proofreading and correct spelling (all used occasionally); and the use of discretion, presentations/teaching, problem analysis, negotiation, mentoring, the performance of basic mathematics and programming, and the performance of advanced programming (all used rarely).
Required physical activities include frequent standing, walking, talking, reaching, feeling, hearing, handling, and repetitive hand and wrist motions. Required physical activities used less frequently include stooping, sitting, bending, and repetitive foot motions (all used occasionally); and kneeling, crawling, and climbing (all used rarely).
The ability to push, pull, and lift an average of 15 pounds throughout the day is required, as is the ability to carry an average of 10 pounds
WORKING CONDITIONS:
Telecommuting is not offered in this role initially; it is an occasional, not permanent, condition.
Primarily based in an office setting, with occasional travel required to other locations for support or project activities.
Occasional overtime may be required to support critical projects or operational demands.
Job conditions to be expected include extensive close work with computer use and viewing of monitor screens (frequent), travel (occasional), some overtime, on-call emergency status, sleep deprivation, and evening meetings (rare) Ability to work scheduled holidays and weekends as assigned.
As this is an essential position to Bloodwork's operations, incumbents should be prepared to work extended and/or consecutive shifts, and possibly at a different location, during periods of inclement weather or other emergencies.
Bloodwork is a community-supported non-profit organization. As such, the incumbent can expect to work with volunteers from time to time.
When working at a Bloodworks location, this position has indirect exposure to bloodborne pathogens.
Benefits and Perks:
Employees regularly scheduled for 24+ hours per week are covered by medical, dental, vision, and life insurance, with family coverage also available. Also able to participate in retirement plans (401a & 403b), consolidated paid leave program (4.8 - 6.8 weeks of time off accrued per year, based on length of service), subsidized transit program, and educational reimbursement Candidates hired from outside of our service area may be eligible for a relocation assistance bonus*
* Conditions apply
PPE2500
Information Security Analyst II
San Diego, CA jobs
Why PlayStation?
PlayStation isn't just the Best Place to Play - it's also the Best Place to Work. Today, we're recognized as a global leader in entertainment producing The PlayStation family of products and services including PlayStation 5, PlayStation 4, PlayStation VR, PlayStation Plus, acclaimed PlayStation software titles from PlayStation Studios, and more.
PlayStation also strives to create an inclusive environment that empowers employees and embraces diversity. We welcome and encourage everyone who has a passion and curiosity for innovation, technology, and play to explore our open positions and join our growing global team.
The PlayStation brand falls under Sony Interactive Entertainment, a wholly-owned subsidiary of Sony Group Corporation.
PlayStation is looking for an Information Security Analyst to join our team and operate the day-to-day Information Security, Risk and Compliance management processes. This is a mixture of processing requests from the business and driving internal security projects such as security audit and assessment. This role requires a sound understanding of technical and engineering terminology, outstanding ability to articulate risk across any security domains (technical and governance) with the demonstrable ability to work independently and process high volumes of security requests on a weekly basis. This role also provides ample opportunity to work across technical and game-related projects with studio and PlayStation engineering teams and therefore requires risk advisory and influencing experience.
Based in San Diego, the candidate will be the key business relationship partner on behalf of Information Security and work on Information Security processes as well as strategic projects across PlayStation and the Studios group. This role will collaborate closely directly with business, technical and third party collaborators, as well as work multi-functionally with our other Information Security specialist teams across the globe to protect PlayStation's intellectual property, data and infrastructure whilst delivering new and evolving games, services and hardware to the market. This is an opportunity to provide security directly to the global PlayStation business, our PlayStation Network and global Studios and their game development.
What you will be doing:
Serve as a primary partner to PlayStation Studios, supporting security risk management across global game development and studio environments.
Triage and manage technical and strategic security risks across studios, ensuring alignment to security strategy and policy compliance.
Engage directly with technical teams and studio leadership to strengthen risk posture, manage vulnerabilities, and drive mitigation strategies.
Act as a trusted advisor to studio teams, driving a culture of embedding “security by design” principles.
Support the creation of risk insights, reporting, and executive briefings that inform leadership on studio security health and emerging trends.
Maintain broad knowledge of emerging security trends, risks, adn technologies that are applicable to the studio business and Sony at large.
Advance the Information Security program through collaborative and cross-team partnerships.
Required Experience:
3+ years of experience in information security, with demonstrated expertise in risk identification and mitigation.
2+ years conducting risk assessments and providing actionable recommendations to technical and business stakeholders.
2+ years working in vulnerability management, including detection, analysis, reporting, or remediation tracking.
2+ years of hands-on experience managing or evaluating cloud environments, networks, and security infrastructure.
2+ years of experience communicating risk and security insights to leadership and cross-functional partners.
Preferred Experience & Attributes:
Background in the gaming or entertainment industry.
Experience leading projects or programs in a security or risk management capacity.
Technical and Security focused certifications a strong preference
Confident communicator able to translate complex security risk concepts for both technical and non-technical audiences.
Comfortable working in a dynamic, fast-paced environment balancing innovation and security priorities.
Proven success working independently to establish relationships, deliver requirements, and communicate effectively.
#LI-GM1
Please refer to our Candidate Privacy Notice for more information about how we process your personal information, and your data protection rights.
At SIE, we consider several factors when setting each role's base pay range, including the competitive benchmarking data for the market and geographic location.
Please note that the base pay range may vary in line with our hybrid working policy and individual base pay will be determined based on job-related factors which may include knowledge, skills, experience, and location.
In addition, this role is eligible for SIE's top-tier benefits package that includes medical, dental, vision, matching 401(k), paid time off, wellness program and coveted employee discounts for Sony products. This role also may be eligible for a bonus package. Click here to learn more.
The estimated base pay range for this role is listed below.$140,000-$210,000 USD
Equal Opportunity Statement:
Sony is an Equal Opportunity Employer. All persons will receive consideration for employment without regard to gender (including gender identity, gender expression and gender reassignment), race (including colour, nationality, ethnic or national origin), religion or belief, marital or civil partnership status, disability, age, sexual orientation, pregnancy, maternity or parental status, trade union membership or membership in any other legally protected category.
We strive to create an inclusive environment, empower employees and embrace diversity. We encourage everyone to respond.
PlayStation is a Fair Chance employer and qualified applicants with arrest and conviction records will be considered for employment.
Auto-Apply