Information Security Specialist
Horsham, PA jobs
Delta Information Systems, Inc. is seeking a highly skilled Information Security Specialist to protect and secure critical systems, data, and intellectual property in a fast-paced Aerospace & Defense environment.
This role is responsible for implementing and managing security controls, ensuring compliance with strict regulatory requirements, and defending against advanced cyber threats. The ideal candidate will bring deep technical knowledge, strong problem-solving skills, and the ability to work across teams to maintain the confidentiality, integrity, and availability of sensitive information that supports our national security mission.
This is a fully onsite position located in Horsham, PA.
Key Responsibilities
Implement, monitor, and maintain security tools, including firewalls, intrusion detection/prevention systems, endpoint protection, and SIEM platforms.
Perform continuous monitoring, vulnerability assessments, penetration testing, and risk analysis of systems and networks.
Ensure compliance with DoD, NIST 800-171, CMMC, ITAR, DFARS, and other regulatory frameworks.
Champion the company's certification to CMMC Level 2.
Develop, document, and enforce cybersecurity policies, procedures, and incident response plans.
Support Government and customer security audits, preparing evidence and remediation plans as required.
Investigate and respond to cybersecurity incidents, performing root-cause analysis and recommending corrective actions.
Collaborate with IT, Engineering, Program Management, and Security teams to embed cybersecurity best practices into operations and product development.
Provide cybersecurity awareness training to employees with a focus on handling sensitive defense-related data.
Stay current on emerging cyber threats, nation-state tactics, and evolving compliance regulations impacting aerospace and defense.
Qualifications
Required:
Bachelor's degree in Information Security, Computer Science, or related field (or equivalent experience).
5+ years of experience in information security, IT security operations, or cybersecurity.
Strong knowledge of NIST 800-171, CMMC, and DFARS cybersecurity requirements.
Experience developing, implementing and achieving CMMC compliance.
Experience supporting DoD or government contracts with cybersecurity compliance needs.
Hands-on experience with security infrastructure: SIEM, IDS/IPS, endpoint security, and network monitoring tools.
Strong understanding of Windows, Linux, and cloud environments (Microsoft Office 365, Deltek Costpoint).
Excellent analytical, documentation, and communication skills.
U.S. Citizenship (required due to defense industry regulations).
Preferred:
Active security clearance (Secret or higher), or ability to obtain one.
Relevant certifications: CISSP, CISM, Security+, CEH, or GIAC.
Experience with RMF (Risk Management Framework) and STIG compliance.
Familiarity with secure software development, DevSecOps practices, or classified system security.
Compensation
Competitive salary
Outstanding benefits package
100% Paid Coverage for Medical, Dental, and Vision
401(k) Employer Match
Employee Stock Ownership Program (company funded)
Life Insurance (company funded)
Short-Term Disability (company funded)
Long-Term Disability (company funded)
Vacation & Sick
Holidays: 11 days
HealthCare FSA
Dependent Care FSA
What We Offer
Opportunities for training, certifications, and career growth.
A mission-driven culture where your work contributes to national security.
Exposure to advanced technologies and programs critical to the aerospace and defense sector.
About Delta Information Systems, Inc.
Delta Information Systems (DIS) is an industry-leading supplier of high-quality aerospace telemetry products for Flight Test, Missile Test, Range Safety, Launch Support and Satellite Command and Control applications. Their products address the complete telemetry chain from Data Acquisition, Storage, Transport and Distribution to Telemetry Processing and Display. DIS customers include all DoD entities, all Major Primes, Integrators, Gov Labs, Aircraft & Missile Manufacturers, & Launch Facilities.
In addition, Delta Information Systems (DIS) designs and develops sophisticated electronic equipment that is specifically designed to reliably operate in harsh environments. They deliver critical video communications capability for manned and unmanned Intelligence, Surveillance and Reconnaissance (ISR) programs.
Technology - Security Analyst Senior
Jacksonville, FL jobs
Job Title: Technology - Security Analyst Senior
Duration: Long term contract
Experienced professional responsible for implementing, maintaining, monitoring, and troubleshooting enterprise-wide security systems. Supports 24/7 availability, mentors junior staff, and ensures compliance with security frameworks and policies.
✅ Core Responsibilities:
Implement and manage enterprise security systems, including cloud-based (AWS/Azure).
Perform security audits, risk analysis, and vulnerability assessments.
Conduct log analysis via SIEM tools; respond to security incidents.
Lead incident response, threat hunting, and forensic analysis.
Maintain firewalls, encryption systems, and endpoint protections.
Develop and enforce security policies, SOPs, and compliance protocols.
Manage user access, logical security, and secure configurations.
Collaborate cross-functionally on infrastructure and software security.
Support regulatory compliance with standards (e.g., NIST, COBIT).
Train and mentor team members; provide escalated issue resolution.
Evaluate and onboard new security technologies.
✅ Technical Skills Required:
Operating Systems: Windows (5+ years), Linux is a plus
Cloud Platforms: AWS (EC2, IAM, Security), Azure (AD, Sentinel, Security Center)
Security Tools: SIEM (e.g., Splunk), Firewalls, IDS/IPS, Endpoint Protection
Scripting: PowerShell, Python, VBScript, Regex
Frameworks & Compliance: NIST, COBIT, ISO 27001, ITIL
Forensics & IR: Evidence gathering, threat profiling, penetration testing
Documentation: RFPs, RFIs, policy writing, technical reporting
Protocols: TCP/IP, DNS, HTTP/S, LDAP, SNMP, VPN, SSH
✅ Soft Skills & Abilities:
Critical thinking and creative problem-solving
Leadership in projects and incident response
Effective communication (written and verbal)
Mentoring and knowledge-sharing
Ability to prioritize and work independently under pressure
Collaboration across departments and vendors
✅ Educational Requirements:
Preferred: Bachelor's degree in CS, InfoSec, or related
Alternate: 8 years equivalent experience in system/security administration
✅ Experience Requirements:
Minimum: 4 years in security/system admin in enterprise IT
Mandatory: 5 years in Windows environment
✅ Required Certifications (any 2 or equivalent):
Security & Compliance: GIAC GMON, GPCS, DoD 8570 certs
Cloud & Microsoft:
AWS: Cloud Practitioner, Solutions Architect, Security Specialty
Azure: Fundamentals, Security Ops/Engineer, Solutions Architect
MCSE
Aviatrix Certified Engineer (ACE)
Chief Information Security Officer
New York, NY jobs
A financial firm is looking for a Chief Information Security Officer (CISO) to join their team in New York, NY.
Compensation: $150-200K
Responsibilities:
Define and maintain the enterprise information security strategy, roadmap, and governance framework, aligned with business objectives and regulatory requirements
Draft, maintain, and periodically review security-related policies and procedures
Establish and chair/co-chair an Information Security / Cyber Risk Committee and contribute to Board-level reporting on cyber risk
Develop and maintain the firm's information security governance framework
Lead the firm's SOC 1 (Type 1/Type 2) and SOC 2 (Type 1/Type 2) readiness and ongoing attestation efforts
Own the control catalog, control testing coordination, evidence collection, and remediation tracking across technology, operations, and third parties
Act as primary security point of contact for external auditors, assessment firms, and key institutional partners
Ensure security program alignment with SEC Regulation S-P, Reg S-ID, Reg SCI, SEC / Client cybersecurity expectations, and NYDFS 23 NYCRR 500
Partner with Compliance and Legal to interpret new regulations, assess impact, and implement necessary control and policy changes
Maintain and periodically test the Incident Response Plan, Business Continuity and Disaster Recovery (BC/DR) from a security perspective
Provide security oversight for cloud (AWS) and on-prem infrastructure, including network security, endpoint security, identity and access management (IAM), and data protection
Work with Infrastructure/DevOps and application teams to embed secure SDLC practices, including code review, security testing, and secure deployment pipelines
Oversee vulnerability management, including patch management processes, penetration testing, and remediation programs
Define and oversee Security Operations Center (SOC) / XDR usage, log management, SIEM, threat detection, and incident handling
Design and enforce data classification, data loss prevention (DLP), encryption, and key management controls
Partner with business and product teams to ensure client data privacy and secure data flows, including with third-party vendors and partners
Own the vendor security risk management program, including security due diligence, contract security clauses, and ongoing monitoring
Evaluate and manage key security vendors
Build and lead a small but high-impact security team, scaling capabilities over time
Promote a security-first culture through training, awareness programs, and regular communication with staff at all levels
Qualifications:
Required
Bachelor's degree in Computer Science, Information Security, Engineering, or related field; or equivalent experience
7+ years of progressive experience in information security, including at least 3 years in a leadership role (Head of Security, Deputy CISO, CISO, or equivalent)
Hands-on experience leading SOC 1 and/or SOC 2 attestation projects at a financial institution, fintech, or SaaS provider
Strong background in financial services or capital markets (broker-dealer, clearing firm, trading platform, or similar)
Understanding of Information security frameworks (e.g., NIST CSF, NIST 800-53, ISO 27001)
Understanding of Regulatory landscape for U.S. financial firms (e.g., SEC, Client, possibly NYDFS 500)
Experience with Identity & access management, network security, endpoint security, and cloud security (preferably AWS)
Experience building and maintaining incident response, BC/DR, and vulnerability/patch management programs
Strong track record of cross-functional leadership, communicating complex security and risk topics to non-technical executives and boards
Preferred
Experience as CISO, Deputy CISO, or security leader at a broker-dealer, clearing firm, exchange/ATS, or large fintech
Professional certifications such as CISSP, CISM, CISA, CRISC, CCSP or similar
Experience with AWS security services
Familiarity with DevSecOps practices and secure CI/CD pipelines
Experience managing data localization and cross-border data separation initiatives
Deputy, Global Information Security Officer
Richardson, TX jobs
The Deputy, Global Information Security Officer is responsible for leading the security strategy roadmap, consulting with security solution partners and defining company security policies and standards. Will have oversight of global security operations, incident response and both US and international Aerospace and Defence (A&D) security and compliance. The right candidate will have the required presence, confidence, and knowhow to quickly gain trust, credibility, and respect. They will have a proven record of taking a fact-based approach to the assessment of the current state of operations and the implementation of pragmatic solutions to address business needs. They will extract maximum value from existing technology investments while leveraging industry trends to introduce new and relevant technologies to deliver the necessary protection to the enterprise.
Detailed Description:
Performs tasks such as, but not limited to, the following:
Drive the overall security strategy for Celestica, aligning security initiatives with business objectives, influencing stakeholders, and securing buy-in for security investments.
Act as a champion for security across the organization, fostering a security-conscious culture and promoting best practices.
Provide leadership to the information security organization.
Take ownership of the incident response program, including developing and testing incident response plans, coordinating response activities, and conducting post-incident reviews to improve future response capabilities.
Leverage data analytics to inform security strategy, identify threats, and measure the effectiveness of security controls. This includes promoting a data-driven security culture within the team.
Drive improvements and efficiencies within the security operating model including identifying areas for optimization, streamlining processes, and championing change.
Drive the development and implementation of security standards and policies. This includes ensuring compliance with relevant regulations and industry frameworks, and staying abreast of emerging security threats and best practices.
Actively scans laws, guidelines, and regulations in all the countries that we operate to ensure that any major exposure on data privacy is addressed or mitigated.
Establish, implement and monitor strategic processes to maintain and improve IT solutions, infrastructure and support services.
Coordinate with external authorities to assure monitoring posture is at a high level of attentiveness.
Accountable for monitoring suspicious network and endpoint activities, and taking corrective actions, as required.
Responsible for managing security partners and other third-party security relationships.
Appraise CIO/CISO of cybersecurity trends and threats.
Responsible for developing and testing threat identification, containment, and recovery plans.
Accountability for cybersecurity awareness, training, and internal phishing campaigns.
Key liaison and collaboration with physical security.
Collaborate on pre-acquisition requirements with stakeholders assuring that security standards are met prior to acquisition.
Facilitate the necessary efforts and resources to ensure that duration of exposure to cyber events is addressed rapidly
Participate on company world-wide teams to share information, help implement global initiatives, leverage IT resources and investments, and develop future state of company architecture.
Build, manage, and mentor a high-performing security team. This includes setting clear goals, providing development opportunities, and fostering a collaborative and innovative work environment.
Responsible for maturing the Information Security function and driving discipline on execution of all security initiatives to ensure they are delivered on-time, on-budget, and with quality.
Knowledge/Skills/Competencies:
Advanced knowledge of project management and Full Project Scope Experience
Experience in partnering with the business in promoting cybersecurity initiatives
Demonstrated experience implementing Security strategies and solution designs
Advanced understanding of virtualized cloud computing environments
Performing full security compliance and risk assessments
Advanced knowledge of Information Security Penetration Testing, IT Vulnerability Assessments
Mastery level of understanding in IT Risk Management and IT Governance/Audit Procedures
Advanced understanding of Cybersecurity incident Response Management and advanced experience in incident response activities
Advanced understanding of IT Security Architecture
Advanced knowledge of Security Standards, Regulations, and Best Practices
Extensive knowledge of IT design and deployment, and operations process
Knowledge and understanding of the business unit and how decisions impact customer satisfaction, product quality, on-time delivery and the profitability of the unit
Information security forensics
Knowledge of common information security frameworks and IT controls frameworks, such as NIST 800-171, ISO/IEC 27001, and ITIL
Knowledge and understanding of relevant legal and regulatory requirements, such as Sarbanes-Oxley Act (SOX), Health Insurance Portability and Accountability Act (HIPAA) and Payment Card Industry/Data Security Standard. Knowledge of global requirements
Effectively manage relationships with security vendors, negotiating contracts and ensuring the organization is getting the best value for its security investments.
Experience working with customers on security assessments and audits
Proven ability to influence and promote safe technology usage, practices and behaviours across all levels of the entire organization by leveraging direct and indirect resources, delivering effective global communication, and enforcing policy attestation and mandatory employee training.
Demonstrated understanding of how security decisions impact the business, including customer trust, brand reputation, and revenue generation.
Ability to articulate the value of security investments in business terms.
Ability to communicate complex security concepts clearly and concisely to a variety of audiences, including senior management, board members, and external stakeholders. This includes building consensus, influencing decision-making, and securing support for security initiatives.
Required knowledge of the U.S. GOVERNMENT COMPLIANCE but not limited to, DFAR ************/NIST 800-171, DFARS ************, ************, and ************, CMMC Model Version 2.0 and associated testing requirements, and 48 CFR 52.204-21
Physical Demands:
Duties of this position are performed in a normal office environment.
Duties may require extended periods of sitting and sustained visual concentration on a computer monitor or on numbers and other detailed data. Repetitive manual movements (e.g., data entry, using a computer mouse, using a calculator, etc.) are frequently required.
Typical Experience:
15+ years of IT experience with a proven track record of delivering global capabilities around risk management, information security and progressive IT roles.
5+ years of Senior-level IT Security leadership experience within an organization of comparable scale and complexity, experience in the manufacturing industry is preferred.
Knowledge of all aspects of IT business.
Typical Education: Bachelor's Degree.
Notes:
This job description is not intended to be an exhaustive list of all duties and responsibilities of the position. Employees are held accountable for all duties of the job. Job duties and the % of time identified for any function are subject to change at any time.
Director Information Security
Richardson, TX jobs
We are seeking an experienced and strategic Director of Data Security and Governance to lead our comprehensive data protection program. This critical role involves establishing and enforcing data security policies to meet stringent regulatory requirements, including the International Traffic in Arms Regulations (ITAR), and fulfilling complex data security obligations within commercial contracts. You will be responsible for building our data governance framework from the ground up, including implementing a robust data classification program and deploying modern security solutions like Data Security Posture Management (DSPM) and Data Rights Management (DRM)., in addition to managing the DLP program.
Detailed Description
Performs tasks such as, but not limited to, the following:
Strategy & Policy Development: Design, implement, and oversee the enterprise-wide data security and governance strategy, policies, and standards.
Compliance & Regulatory Oversight: Serve as the primary expert on data security requirements for ITAR and other government regulations. Ensure all data handling processes and systems are compliant with contractual and legal obligations.
Data Classification Program: Develop and manage a corporate data classification policy and program. Work with business units to identify, classify, and protect sensitive and regulated data throughout its lifecycle.
Technology Implementation: Lead the selection, implementation, and operationalization of a Data Security Posture Management (DSPM) solution to provide visibility and control over our data landscape.
Data Rights Management (DRM): Implement and manage a DRM solution to control access to and usage of sensitive data, ensuring that only authorized individuals can access and interact with protected information according to defined policies.
Risk Management: Conduct regular data security risk assessments, identify vulnerabilities, and oversee remediation efforts to mitigate risks.
Incident Response: Develop and lead the data-focused components of the incident response plan, including containment, investigation, and reporting of data breaches.
Collaboration & Training: Partner closely with Legal, IT, Engineering, and business stakeholders to embed data security principles into their operations. Develop and deliver training programs to raise awareness about data governance and security best practices.
Typical Experience
Minimum of 10 years of experience in cybersecurity and data governance, with at least 4 years in a leadership role.
Proven track record of successfully implementing a data classification program across an enterprise.
Direct experience with the procurement and deployment of DSPM and DRM technologies.
Skills & Knowledge:
Deep understanding of data protection principles, including encryption, access control, data loss prevention (DLP), and data discovery.
Expert knowledge of security frameworks such as NIST Cybersecurity Framework, NIST 800-171, and ISO 27001.
Excellent project management skills and the ability to lead cross-functional teams.
Strong communication skills, with the ability to articulate complex security concepts to technical and non-technical audiences.
Certifications (Preferred):
Certified Information Systems Security Professional (CISSP)
Certified Information Security Manager (CISM)
Certified Information Privacy Professional (CIPP)
Typical Education
Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or related field, or equivalent experience.
A Master's degree is a plus.
Educational requirements may vary by geography.
Physical Demands
Duties of this position are performed in a normal office environment.
Duties may require extended periods of sitting and sustained visual concentration on a computer monitor or on numbers and other detailed data. Repetitive manual movements (e.g., data entry, using a computer mouse, using a calculator, etc.) are frequently required.
Notes
This job description is not intended to be an exhaustive list of all duties and responsibilities of the position. Employees are held accountable for all duties of the job. Job duties and the % of time identified for any function are subject to change at any time.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Celestica's policy on equal employment opportunity prohibits discrimination based on race, color, creed, religion, national origin, gender, sexual orientation, gender identity, age, marital status, veteran or disability status, or other characteristics protected by law.
This policy applies to hiring, promotion, discharge, pay, fringe benefits, job training, classification, referral and other aspects of employment and also states that retaliation against a person who files a charge of discrimination, participates in a discrimination proceeding, or otherwise opposes an unlawful employment practice will not be tolerated. All information will be kept confidential according to EEO guidelines.
COMPANY OVERVIEW:
Celestica (NYSE, TSX: CLS) enables the world's best brands. Through our recognized customer-centric approach, we partner with leading companies in Aerospace and Defense, Communications, Enterprise, HealthTech, Industrial, Capital Equipment and Energy to deliver solutions for their most complex challenges. As a leader in design, manufacturing, hardware platform and supply chain solutions, Celestica brings global expertise and insight at every stage of product development - from drawing board to full-scale production and after-market services for products from advanced medical devices, to highly engineered aviation systems, to next-generation hardware platform solutions for the Cloud. Headquartered in Toronto, with talented teams spanning 40+ locations in 13 countries across the Americas, Europe and Asia, we imagine, develop and deliver a better future with our customers.
Celestica would like to thank all applicants, however, only qualified applicants will be contacted.
Celestica does not accept unsolicited resumes from recruitment agencies or fee based recruitment services.
This location is a US ITAR facility and these positions will involve the release of export controlled goods either directly to employees or through the employee's movement within the facility. As such, Celestica will require necessary information from all applicants upon an applicant's acceptance of employment to determine if any export control exemptions or licenses must be filed.
Security Engineer
Cary, NC jobs
We are seeking a skilled Security Engineer with strong Networking and Compliance experience to join our team in Millennia. This position is required to reside in the vicinity of our Durham, NC Data Center. In this role, you will be crucial in maintaining the integrity and security of our network systems, ensuring privacy and security controls within processes, assets, and data flow within our healthcare-focused environment
Responsibilities:
· Maintain and manage all processes systems supporting Millennia's security posture.
· Monitor, manage, and implement security infrastructure to support organizational needs
· Monitor logs and alerts to identify incidents. Perform and or document Root Cause Analysis and remediation on Security Incidents.
· Monitor network performance and troubleshoot issues and Security Incidents.
· Plan, manage, and execute system upgrades and weekly patches to all endpoints.
· Develop and enforce security policies to protect sensitive patient data.
· Conduct regular system audits and vulnerability assessments.
· Provide technical support for network-related issues to staff and clients.
· Maintain documentation of network configurations and procedures.
· Stay updated on industry trends and emerging technologies
· Collaborate with IT teams to integrate new technologies into existing systems.
· Provide hand-on support to our offices and data center.
Qualifications:
· Strong knowledge of network and security administration, controls, protocols, and best practices.
· Experience with SOC2 or HITRUST, and HIPAA Security and Privacy Rule.
· Proven experience as a Network Administrator or similar role.
· Proficiency in configuring firewalls, routers, and switches, encryption protocols, and certificates.
· Familiarity with cybersecurity principles and incident response strategies.
· Excellent problem-solving skills and attention to detail.
· Exceptional communication skills and ability to work independently and collaboratively in a team-oriented environment.
· Experience with cloud computing platforms (AWS, Azure) is a plus.
Relevant certifications (e.g., CCNA, CompTIA Security+) are preferred
Application Security Engineer
Orlando, FL jobs
We are seeking a Senior Software Engineer with strong expertise in application security to join a forward-thinking technology team focused on enhancing secure software development practices. This role combines deep technical knowledge with the ability to collaborate across engineering and security teams to ensure robust, secure applications.
Role Overview
The ideal candidate will have a software development background (Java and JavaScript preferred) and hands-on experience in application security, including vulnerability analysis, remediation strategies, and secure coding principles. This position requires strong communication skills to act as a bridge between development and security teams, driving best practices and influencing architecture decisions.
Key Responsibilities
Implement and manage software security testing techniques aligned with enterprise standards.
Analyze and assess open-source vulnerabilities, including zero-day threats, and determine impact on applications.
Develop and execute remediation plans for identified risks, including code refactoring and dependency updates.
Champion secure coding practices and lead security reviews across engineering teams.
Provide technical designs and recommendations to reduce vulnerabilities and improve security posture.
Collaborate with development, architecture, and security teams to integrate security into the software delivery lifecycle.
Stay current on emerging threats, tools, and best practices in application and cloud security.
Desired Skills & Competencies
Strong experience in application security testing and software composition analysis.
Knowledge of web application security, cloud security, and container security.
Familiarity with OWASP, CWE, CVE standards and vulnerability mitigation techniques.
Hands-on experience with tools such as Sonatype, Qualys, SonarQube, and AWS Inspector.
Proficiency in Java, JavaScript, and Python.
Working knowledge of AWS services, Docker, Terraform, and DevSecOps practices.
Excellent communication skills and ability to influence technical and non-technical stakeholders.
Preferred Qualifications
Bachelor's degree in Computer Science or related field (AWS and security certifications a plus).
Experience collaborating with cross-functional teams and driving secure development initiatives.
Familiarity with industry-standard tools for code quality, repository management, and CI/CD pipelines.
Azure Cloud Security Engineer-- SHUDC5697491
Dallas, TX jobs
Job Title: Azure Cloud Security Engineer - W2 only - we can provide sponsorship as well
Duration: Long Term
Top Skills:
Azure Policy Exp Azure Security Services - Security Center, Key Vault, Log Analytics Identity and Access Management Exp
Prior Software Engineering background, any language is fine but someone coming from a Sys Admin/Devops background won't be the right fit here.
The Expertise and Skills You Bring
8+ years of experience in IT infrastructure, security, compliance
A strong understanding of Azure services and security capabilities
Solid hands-on experience with at least two of the following:
Engineering/operational support of cloud account configuration in AWS or Azure
Software Development, Linux Systems Administration, Data Networking
Hands-on configuration of CI/CD pipelines for cloud-native deployments
Very strong with scripting languages, including integration with CSP APIs; python preferred
Azure Networking
Identity and Access Management - RBAC
Azure Policies
Azure Security Services - Security Center, Key Vault, Log Analytics
Azure ARM/PowerShell
Ability to work with application and security teams to promote a secure posture in the cloud
You can mentor and train other team members to work effectively in the cloud
You are a self-starter who can independently by reading technical documentation
Bonus skills
Advanced Azure Certifications
Information Security Analyst
Eagan, MN jobs
Established in 1991, Collabera is one of the fastest growing end-to-end information technology services and solutions companies globally. As a half a billion dollar IT company, Collabera's client-centric business model, commitment to service excellence and Global Delivery Model enables its global 2000 and leading mid-market clients to deliver successfully in an increasingly competitive marketplace.
With over 8200 IT professionals globally, Collabera provides value-added onsite, offsite and offshore technology services and solutions to premier corporations. Over the past few years, Collabera has been awarded numerous accolades and Industry recognitions including.
Collabera awarded Best Staffing Company to work for in 2012 by SIA. (hyperlink here)
Collabera listed in GS 100 - recognized for excellence and maturity
Collabera named among the Top 500 Diversity Owned Businesses
Collabera listed in GS 100 & ranked among top 10 service providers
Collabera was ranked:
32 in the Top 100 Large Businesses in the U.S
18 in Top 500 Diversity Owned Businesses in the U.S
3 in the Top 100 Diversity Owned Businesses in New Jersey
3 in the Top 100 Privately-held Businesses in New Jersey
66th on FinTech 100
35th among top private companies in New Jersey
***********************************************
Collabera recognizes true potential of human capital and provides people the right opportunities for growth and professional excellence. Collabera offers a full range of benefits to its employees including paid vacations, holidays, personal days, Medical, Dental and Vision insurance, 401K retirement savings plan, Life Insurance, Disability Insurance.
Job Description
Position Details: Job Title - Information Security Analyst Duration - 3 Months (with a possibility of an extension) Location - Eagan , MN - 55123
Qualifications
Primary Objective Perform in the delivery and development of processes and services which support best practices in information security and risk management for Client enterprise. Knowledge, Skills & Behaviors • 2+ years related information security risk management experience • 3+ years related information technology experience • Preferred industry-related certifications: GSEC, CISSP, CISA, CISM, ITIL • Preferred exposure in SOC2, ISO 27000, risk assessment methodologies, Shared Assessments, ITIL practices, and GRC • Demonstrate results in planning and delivering complex projects on time • Maintain focus and manage multiple efforts concurrently • Perform independently to expectations while being collaborative and maintaining alignment with the team • Work effectively with all levels of the organization including subject matter experts, stakeholders, and leadership • Strong written and verbal communication skills to include executive audiences • Apply tactical and strategic methods appropriately • Effective negotiation and influence • Focused on supporting the customer, the team, and the business • Strong collaboration and problem-solving skills Major Areas of Accountability • Operate as a key contributor to the Vendor Risk Management processes. • Interface with subject matter experts, peers and stakeholders; and business or technology leaders across the Client enterprise. • Demonstrate subject matter expertise on information security best practices and Client security posture focused on performing due diligence for vendor assurance inquiries and attestations. • Assist in initiatives to evaluate and provide input on the effectiveness of processes and solutions, and to determine or support a course of action. Track and report on mitigation progress. • Contribute to the strategic and tactical development of information security, risk management and compliance initiatives, to include policy and standards development, solution development, security awareness and training, and other information security initiatives as assigned. • Track, verify and collect data points for reporting and metrics on identified services to identify gaps and inform leadership. • Serve as a subject matter expert in information technology operations, information security and risk management practices, global legal and regulatory requirements, and other applicable security and privacy trends and practices. • Participate as a member of a team for Vendor Risk Management • Contribute to and achieve business and departmental goals and objectives • Deliver processes and services consistently and accurately • Accept feedback and flex to address tactical needs • Report on status of initiatives to all levels in the organization • Work across the organization to contribute to departmental initiatives and programs Education • Prefer 4 year (Bachelor's) Degree in a technology related field
Additional Information
To know more about this opportunity or to schedule an interview, Please Contact:
Neha Kalia
***************************
************
Easy ApplyInformation Security Analyst
Eagan, MN jobs
Established in 1991, Collabera has been a leader in IT staffing for over 22 years and is one of the largest diversity IT staffing firms in the industry. As a half a billion dollar IT company, with more than 9,000 professionals across 30+ offices, Collabera offers comprehensive, cost-effective IT staffing & IT Services. We provide services to Fortune 500 and mid-size companies to meet their talent needs with high quality IT resources through Staff Augmentation, Global Talent Management, Value Added Services through CLASS (Competency Leveraged Advanced Staffing & Solutions) Permanent Placement Services and Vendor Management Programs.
Job Description
Position Details: Job Title - Information Security Analyst Duration - 3 Months (with a possibility of an extension) Location - Eagan , MN - 55123
Qualifications
Primary Objective Perform in the delivery and development of processes and services which support best practices in information security and risk management for Client enterprise. Knowledge, Skills & Behaviors • 2+ years related information security risk management experience • 3+ years related information technology experience • Preferred industry-related certifications: GSEC, CISSP, CISA, CISM, ITIL • Preferred exposure in SOC2, ISO 27000, risk assessment methodologies, Shared Assessments, ITIL practices, and GRC • Demonstrate results in planning and delivering complex projects on time • Maintain focus and manage multiple efforts concurrently • Perform independently to expectations while being collaborative and maintaining alignment with the team • Work effectively with all levels of the organization including subject matter experts, stakeholders, and leadership • Strong written and verbal communication skills to include executive audiences • Apply tactical and strategic methods appropriately • Effective negotiation and influence • Focused on supporting the customer, the team, and the business • Strong collaboration and problem-solving skills Major Areas of Accountability • Operate as a key contributor to the Vendor Risk Management processes. • Interface with subject matter experts, peers and stakeholders; and business or technology leaders across the Client enterprise. • Demonstrate subject matter expertise on information security best practices and Client security posture focused on performing due diligence for vendor assurance inquiries and attestations. • Assist in initiatives to evaluate and provide input on the effectiveness of processes and solutions, and to determine or support a course of action. Track and report on mitigation progress. • Contribute to the strategic and tactical development of information security, risk management and compliance initiatives, to include policy and standards development, solution development, security awareness and training, and other information security initiatives as assigned. • Track, verify and collect data points for reporting and metrics on identified services to identify gaps and inform leadership. • Serve as a subject matter expert in information technology operations, information security and risk management practices, global legal and regulatory requirements, and other applicable security and privacy trends and practices. • Participate as a member of a team for Vendor Risk Management • Contribute to and achieve business and departmental goals and objectives • Deliver processes and services consistently and accurately • Accept feedback and flex to address tactical needs • Report on status of initiatives to all levels in the organization • Work across the organization to contribute to departmental initiatives and programs Education • Prefer 4 year (Bachelor's) Degree in a technology related field
If you are interested please contact NEHA KALIA (Technical Recruiter) at ************ and email an updated copy of your resume (preferably WORD format) to ***************************
Additional InformationIf you are interested please contact NEHA KALIA (Technical Recruiter) at ************ and email an updated copy of your resume (preferably WORD format) to ***************************
Easy ApplyInformation Security Analyst
New York, NY jobs
The Information Security Analyst is responsible for monitoring the organization's networks and systems to detect security breaches and suspicious activities. They conduct regular assessments and respond to incidents by investigating and mitigating threats. Their duties include maintaining and updating security tools and software to protect data. They document security incidents and prepare reports to inform management about potential risks. Additionally, the security analyst will evaluate and improve existing security related processes and procedures.
Essential Responsibilities:
Monitors log and event output from multiple information security tools including but not limited to security information and event management (SIEM) technology, firewalls, networks, secure web/e-mail proxy, threat intel platforms, and end user security platforms.
Investigates anomalies and responds according to established standard operating procedures.
Performs routine but critical information security technology tasks including but not limited to SIEM tuning, secure web proxy configuration changes, e-mail security investigations, firewall change request reviews and software approval assessments.
Participates and leads security incident response procedures.
Processes any information security policy changes needed as determined by information security team leadership.
Researches trending threats and provides regular reports with accompanying security tools impact analyses.
Acts as a technical resource during internal and external audit engagements and is responsible for gathering security related technical evidence as required.
Educates employees in information security best practices.
Stays abreast of developments in the information security industry.
Takes initiative on leading security related projects as determined by information security team leadership.
Represents the information security team on cross team co-operative projects with other shared service organizations as required.
Qualifications:
Required
Bachelors, Information Technology or High School Diploma/GED and appropriate on the job experience in information technology and/or information security.
Minimum of one year experience as an information security analyst or two years of experience in a technical focused IT role (including but not limited to service desk, server administration, network administration, IT compliance or other systems support role).
Ability to deal with changing priorities and multi-task several projects.
Ability to identify compromised systems and lead remediation efforts.
Excellent presentation and communication skills.
Demonstrable verbal and written communication experience.
Detail-oriented individuals that work well in a team environment and have a hunger to learn.
Analytical and problem-solving skills
Successful completion of the Nlets fingerprinting background assessment.
Must be located in New York or Indianapolis and willing to commute 3 days into office.
Preferred
Experience with using and/or managing a commercial SIEM.
Candidates should have a working knowledge of basic information security concepts and beginning to intermediate familiarity with common security technologies such as anti-virus, firewalls, DLP, web content filters, proxy servers, intrusion prevention systems, Windows event logging and syslog.
Candidates should be familiar with networking fundamentals and have a basic to intermediate understanding of common network and application layer protocols such as TCP/IP, HTTP, DNS, SMTP and FTP.
Information Security certifications, such as: CISSP, GSEC, GCED, Security+, etc. are a plus.
Other entry level IT certifications, such as: Network+, Linux+, etc. are a plus.
This position is not open to relocation and does not provide sponsorship now or in the future.
Verra Mobility Values
An ideal candidate for this role naturally works in alignment with the Verra Mobility Core Values:
Own It. We focus on high performance and drive toward breakthrough outcomes. Our employees ensure accountability, optimize and align work, focus on the customer, and cultivate innovation.
Do What's Right. We champion integrity and good character. Our team members model ethical behavior, demonstrate good judgment and are courageous.
Lead with Grace. We express humility and compassion, and we are authentic and candid. Our employees demonstrate self-awareness, care for others, instill trust, and communicate effectively.
Win Together. We believe in growing and inspiring people together. We seek people who collaborate, value differences, think and act globally, foster an engaging work environment, and recognize and develop others.
With your explicit consent which you provided as part of the application process, we will retain candidate personal data solely for the business purpose for which it was collected. In no event will we retain such data more than two (2) years following the closure of the recruitment process relating to the role for which you applied or in the event other related job opportunities arise within the company. Verra Mobility Applicant Privacy Notice
Verra Mobility is an Equal Opportunity Employer. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status.
.
Auto-ApplyInformation Security Analyst
Jersey City, NJ jobs
Why us? You will be part of a team that believes that believes in employees success! They are a dynamic, fast growing company with great opportunities and an employee focused company culture. Join this fantastic team today and make a difference in your life and the lives of those around you!
They are an equal opportunity employer and value diversity at our company.
Job Description
Strong knowledge of Information Security concepts such as:
•Encryption, Cloud and Mobile Device Security
•Data Loss and Prevention tools and solutions
•Risk-Threat Analysis and Vulnerability Assessments
•Enterprise Security Monitoring, Role-Based Access Control (RBAC)
•Identity and Access Management, Computer Forensic
•IT Audit and Compliance, Regulatory Requirements (HIPAA, CMS, FISMA, et. al.)
•Knowledge of common vulnerability tools, and the ability to identify basic categories of vulnerability.
Sounds like you? then ping us with your most updated resume. We'd love to talk to you!
We are excited about the companies growth and the role you will play with them.
Qualifications
Desired Skills & Experience:
You hold a Bachelor's degree in any domain.
You are certified in CISSP, or CISA, or CEH, required.
You have more than 1 year experience working in the IT security function.
You have good experience with Operating System, Database, Network and
Application Security
.
Additional Information
All your information will be kept confidential according to EEO guidelines. Ping me at
**********************
Easy ApplyInformation Security Analyst 2
San Antonio, TX jobs
Are you ready to apply cutting-edge technologies to solve real world problems? Do you thrive in an environment where people leverage technology and processes to build innovative and sustainable solutions? You might just be a perfect fit for the CDO team. Since 1995, CDO Technologies has delivered the best solutions for unique business problems in the commercial and federal sectors ranging from Asset Management to IT Services. CDO employees demonstrate integrity, embrace teamwork, and embody a Can Do attitude in the delivery of superior customer service.
Position Summary:
This position will be responsible for all aspects of informational security, at times focused on accreditation. Responsibilities include, but are not limited to participating in engineering and building enterprise solutions, architectural reviews, and assisting with the evaluation of proposed technical solutions for our customers.
This is a temporary, 6 month position, from January 1st, 2026, to June 30, 2026, with possibility of extension.
Job Responsibilities:
Develop and sustain RMF A&A packages to maintain Authorization to Operate (ATO)
Develop, complete, and process System Categorization Document and System Security Plans
Validate and upload RMF documentation into the Enterprise Mission Assurance Support Service (eMASS)
Assemble and coordinate system Plans and Procedures from the iAssure templates for all RMF families
Process and submit Plans of Action and Milestones (POA&Ms)
Ensure DISA STIGs/SRGs are implemented and enforced
Perform Risk Analysis and Vulnerability Assessments
Perform annual security reviews in accordance with FISMA reporting
Review PPS, HW/SW listings, NSS checklists (all A&A artifacts)
Minimum Requirements:
An active Secret Security Clearance is required
Must hold a DoD 8570.01 IAT Level 2 certification, such as Security+ CE
2+ years of experience in support of cybersecurity for the purposes of RMF
Experience developing and sustaining RMF A&A packages
Preferred Qualifications & Experience:
Hands-on experience with associated DoD CyberSecurity tools (i.e., ACAS/NESSUS, STIGs, Cloud SRGs)
Working knowledge of Cloud-based technologies and accreditations of various IaaS, PaaS, SaaS, etc.
Experience in DevSecOps and conducting end-to-end security testing of Applications (Web, Mobile, other APIs)
Experience with industry standard tools such as Fortify, Checkmarx, and practices for code reviews, static/dynamic code analysis, and vulnerability assessments
Knowledge of OWASP Top 10, SANS 25, NVD, CVE, etc.
Experience with code languages and frameworks (Java, C+, Apex, etc.)
End-to-end experience with attaining system ATOs
What can a CDO employee expect?
At CDO Technologies, we believe in taking care of our employees with a comprehensive benefits package. Our health and welfare benefits include two medical plan options along with a LiveHealth program to see a doctor online anytime day or night. CDO offers dental, vision, and a Flexible Spending Account for medical or childcare. Employees may also enroll in a 401(k) plan with their first paycheck. Full-time employees also receive company paid short- and long-term disability and life insurance. We also provide tuition reimbursement, professional development, and certification reimbursements. Finally, CDO also offers employees a generous leave program including paid holidays, vacation, and sick leave.
CDO is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender identity, sexual orientation, national origin, disability, or veteran status.
Auto-ApplyInformation Security Analyst 2
Universal City, TX jobs
Job Description
Are you ready to apply cutting-edge technologies to solve real world problems? Do you thrive in an environment where people leverage technology and processes to build innovative and sustainable solutions? You might just be a perfect fit for the CDO team. Since 1995, CDO Technologies has delivered the best solutions for unique business problems in the commercial and federal sectors ranging from Asset Management to IT Services. CDO employees demonstrate integrity, embrace teamwork, and embody a Can Do attitude in the delivery of superior customer service.
Position Summary:
This position will be responsible for all aspects of informational security, at times focused on accreditation. Responsibilities include, but are not limited to participating in engineering and building enterprise solutions, architectural reviews, and assisting with the evaluation of proposed technical solutions for our customers.
This is a temporary, 6 month position, from January 1st, 2026, to June 30, 2026, with possibility of extension.
Job Responsibilities:
Develop and sustain RMF A&A packages to maintain Authorization to Operate (ATO)
Develop, complete, and process System Categorization Document and System Security Plans
Validate and upload RMF documentation into the Enterprise Mission Assurance Support Service (eMASS)
Assemble and coordinate system Plans and Procedures from the iAssure templates for all RMF families
Process and submit Plans of Action and Milestones (POA&Ms)
Ensure DISA STIGs/SRGs are implemented and enforced
Perform Risk Analysis and Vulnerability Assessments
Perform annual security reviews in accordance with FISMA reporting
Review PPS, HW/SW listings, NSS checklists (all A&A artifacts)
Minimum Requirements:
An active Secret Security Clearance is required
Must hold a DoD 8570.01 IAT Level 2 certification, such as Security+ CE
2+ years of experience in support of cybersecurity for the purposes of RMF
Experience developing and sustaining RMF A&A packages
Preferred Qualifications & Experience:
Hands-on experience with associated DoD CyberSecurity tools (i.e., ACAS/NESSUS, STIGs, Cloud SRGs)
Working knowledge of Cloud-based technologies and accreditations of various IaaS, PaaS, SaaS, etc.
Experience in DevSecOps and conducting end-to-end security testing of Applications (Web, Mobile, other APIs)
Experience with industry standard tools such as Fortify, Checkmarx, and practices for code reviews, static/dynamic code analysis, and vulnerability assessments
Knowledge of OWASP Top 10, SANS 25, NVD, CVE, etc.
Experience with code languages and frameworks (Java, C+, Apex, etc.)
End-to-end experience with attaining system ATOs
What can a CDO employee expect?
At CDO Technologies, we believe in taking care of our employees with a comprehensive benefits package. Our health and welfare benefits include two medical plan options along with a LiveHealth program to see a doctor online anytime day or night. CDO offers dental, vision, and a Flexible Spending Account for medical or childcare. Employees may also enroll in a 401(k) plan with their first paycheck. Full-time employees also receive company paid short- and long-term disability and life insurance. We also provide tuition reimbursement, professional development, and certification reimbursements. Finally, CDO also offers employees a generous leave program including paid holidays, vacation, and sick leave.
CDO is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender identity, sexual orientation, national origin, disability, or veteran status.
Information Security Analyst I
Palm Harbor, FL jobs
Job DescriptionDescription:
Job Summary: The Information Security Analyst will be responsible for directly supporting one or more of the following programs: Vulnerability Management (VM), Digital Forensics and Incident Response (DFIR), Tool Administration.
Viable candidates must be willing to work onsite at GSI's headquarters in Palm Harbor, Florida daily.
Key Responsibilities:
Understanding general network infrastructure concepts
Assisting with the configurations and deployments of new tools and features to existing toolsets
Monitor and/or administer one or more Information Security tools
Participates in the enforcement of Information Security policies, procedures and standard practices
Conducting routine log analysis
Analyzing and responding to findings appropriately, potentially during after-hours, based on the criticality
Documenting findings in documents and/or a ticketing system
Assisting in technical document creation, such as Standard Operating Procedures (SOPs)
Participating in regular meetings with internal stakeholders
Occasionally creating and presenting presentations relevant to Information Security
Work with auditors, both internal and external, to provide evidence of compliance
Know or be willing to learn Information Security frameworks
Participating in training events, seminars, and obtaining certifications
Supporting other internal stakeholders, such as the Security Operations Center (SOC) and Network Operations Center (NOC) as needed
Requirements:
Work Experience / Knowledge:
1 - 2 years of relevant experience
Knowledge of various security methodologies and processes, and technical security solutions (SIEM, IDS/IPS, Firewall Solutions, etc.)
Knowledge of TCP/IP Protocols, network analysis, and network/security applications
Basic proficiencies in Forensics and Malware Analysis (file signatures, tool sets, recovering data, analyzing memory, analyzing binaries)
Familiarity with different Operating Systems
Knowledge of common Internet protocols and applications
General familiarity of industry compliance frameworks (NIST, ISO, HITRUST)
Qualifications / Certifications:
Bachelor's degree in Computer Science, Information Technology, or Cyber Security, or a related field OR High School diploma and relevant industry training and certifications
Relevant industry certifications are a plus, such as:
EC-Council Certified Ethical Hacker (CEH), CompTIA PenTest+, CompTIA Security+, CompTIA Network+, (ISC)² Systems Security Certified Practitioner (SSCP), or GIAC Security Essentials (GSEC)
Special Requirements:
Must be proficient in the English language, both written and verbal
May also be assigned various projects and tasks as needed
Sitting for long periods of time
Ability to lift 50 pounds
Equal Opportunity Employer. M/F/D/V
Information Security Analyst II
Palm Harbor, FL jobs
Job DescriptionDescription:
Job Summary: The Information Security Analyst will be responsible for directly supporting one or more of the following programs: Vulnerability Management (VM), Digital Forensics and Incident Response (DFIR), Tool Administration, Tool Documentation and/or Procedural Documentation drafting. GSI is a highly dynamic environment and as such the successful employee will adequately manage competing priorities in a growing department. Information Security analysts ensure that the organization is adequately aligning with the information security frameworks that GSI has established.
Viable candidates must be willing to work onsite at GSI's headquarters in Palm Harbor, Florida daily.
Key Responsibilities:
Understanding of network infrastructure concepts
Assisting with the configurations, engineering and deployments of new tools and features to existing toolsets
Monitor and/or administer two or more Information Security tools
Participates in the enforcement of Information Security policies, procedures and standard practices
Conducting routine log analysis
Analyzing and responding to findings appropriately, potentially during after-hours, based on the criticality
Documenting findings in documents and/or a ticketing system
Assisting in technical document creation, such as Standard Operating Procedures (SOPs) and Tool Documentation
Participating in regular meetings with internal stakeholders including team leads and managers
Creating and presenting presentations relevant to Information Security
Work with auditors, both internal and external, to provide evidence of compliance
Know or be willing to learn Information Security frameworks
Participating in training events, seminars, and obtaining certifications
Supporting other internal stakeholders, such as the Security Operations Center (SOC) and Network Operations Center (NOC) as needed
Leading Security Incident calls and response teams
Requirements:
Work Experience / Knowledge:
1 - 3 years of relevant experience
Knowledge of various security methodologies and processes, and technical security solutions (SIEM, IDS/IPS, Firewall Solutions, etc.)
Knowledge of TCP/IP Protocols, network analysis, and network/security applications
Basic proficiencies in Forensics and Malware Analysis (file signatures, tool sets, recovering data, analyzing memory, analyzing binaries)
Knowledge of different Operating Systems
Knowledge of common Internet protocols and applications
General familiarity of industry compliance frameworks (NIST, ISO, HITRUST)
Qualifications / Certifications:
Bachelor's degree in Computer Science, Information Technology, or Cyber Security, or a related field OR High School diploma and relevant industry training and certifications
Ability to excel in a fast paced and rapidly changing environment
Strong work ethic with attention to detail
Detail-oriented with a commitment to maintaining the highest standards of integrity and ethics
Excellent communication and interpersonal skills to work effectively with cross-functional teams and external stakeholders
Relevant industry certifications are a plus, such as:
EC-Council Certified Ethical Hacker (CEH), CompTIA PenTest+, CompTIA Security+, CompTIA Network+, (ISC)² Systems Security Certified Practitioner (SSCP), or GIAC Security Essentials (GSEC), CISA, CISM
Special Requirements:
Must be proficient in the English language, both written and verbal
May also be assigned various projects and tasks as needed
Sitting for long periods of time
Ability to lift 50 pounds
Equal Opportunity Employer. M/F/D/V
Network Security Analyst
Durham, NC jobs
Established in 1991, Collabera is one of the fastest growing end-to-end information technology services and solutions companies globally. As a half a billion dollar IT company, Collabera's client-centric business model, commitment to service excellence and Global Delivery Model enables its global 2000 and leading mid-market clients to deliver successfully in an increasingly competitive marketplace.
With over 8200 IT professionals globally, Collabera provides value-added onsite, offsite and offshore technology services and solutions to premier corporations. Over the past few years, Collabera has been awarded numerous accolades and Industry recognitions including.
Collabera awarded Best Staffing Company to work for in 2012 by SIA. (hyperlink here)
Collabera listed in GS 100 - recognized for excellence and maturity
Collabera named among the Top 500 Diversity Owned Businesses
Collabera listed in GS 100 & ranked among top 10 service providers
Collabera was ranked:
32 in the Top 100 Large Businesses in the U.S
18 in Top 500 Diversity Owned Businesses in the U.S
3 in the Top 100 Diversity Owned Businesses in New Jersey
3 in the Top 100 Privately-held Businesses in New Jersey
66th on FinTech 100
35th among top private companies in New Jersey
***********************************************
Collabera recognizes true potential of human capital and provides people the right opportunities for growth and professional excellence. Collabera offers a full range of benefits to its employees including paid vacations, holidays, personal days, Medical, Dental and Vision insurance, 401K retirement savings plan, Life Insurance, Disability Insurance.
Job Description
Work Location: Durham NC 27703
Job Title: Network Security Analyst
Duration: 24 Months
Roles & Responsibilities:
• Primary job responsibility will be to perform Intrusion Detection Sensor Threat Analysis.
• Support for any one of McAfee IDS, Sourcefire IDS, Cisco IDS, Tipping Point IDS, Enterasys IDS, Juniper IDP and Fortinet IDS strongly desired.
• The Operations team supports 24x7 and an off shift work schedule may be required.
Qualifications
IDS/IPS
"Network analyst jobs" ; "Network security" ; "firewall analyst"; "network security position"; "network engineer"; "security engineer"
Additional Information
Should you have any questions, please feel free to call:
************
Aditika Sithta
Network Security Analyst
Durham, NC jobs
Established in 1991, Collabera is one of the fastest growing end-to-end information technology services and solutions companies globally. As a half a billion dollar IT company, Collabera's client-centric business model, commitment to service excellence and Global Delivery Model enables its global 2000 and leading mid-market clients to deliver successfully in an increasingly competitive marketplace.
With over 8200 IT professionals globally, Collabera provides value-added onsite, offsite and offshore technology services and solutions to premier corporations. Over the past few years, Collabera has been awarded numerous accolades and Industry recognitions including.
Collabera awarded Best Staffing Company to work for in 2012 by SIA. (hyperlink here)
Collabera listed in GS 100 - recognized for excellence and maturity
Collabera named among the Top 500 Diversity Owned Businesses
Collabera listed in GS 100 & ranked among top 10 service providers
Collabera was ranked:
32 in the Top 100 Large Businesses in the U.S
18 in Top 500 Diversity Owned Businesses in the U.S
3 in the Top 100 Diversity Owned Businesses in New Jersey
3 in the Top 100 Privately-held Businesses in New Jersey
66th on FinTech 100
35th among top private companies in New Jersey
***********************************************
Collabera recognizes true potential of human capital and provides people the right opportunities for growth and professional excellence. Collabera offers a full range of benefits to its employees including paid vacations, holidays, personal days, Medical, Dental and Vision insurance, 401K retirement savings plan, Life Insurance, Disability Insurance.
Job Description
Work Location: Durham NC 27703
Job Title: Network Security Analyst
Duration: 24 Months
Roles & Responsibilities:
• Primary job responsibility will be to perform Intrusion Detection Sensor Threat Analysis.
• Support for any one of McAfee IDS, Sourcefire IDS, Cisco IDS, Tipping Point IDS, Enterasys IDS, Juniper IDP and Fortinet IDS strongly desired.
• The Operations team supports 24x7 and an off shift work schedule may be required.
Qualifications
IDS/IPS
"Network analyst jobs" ; "Network security" ; "firewall analyst"; "network security position"; "network engineer"; "security engineer"
Additional Information
Should you have any questions, please feel free to call:
************
Aditika Sithta
Network Security Analyst with CCIE and Juniper (L2 Support)
Spring, TX jobs
Work authorisation Needed : US Citizens and Greencard
Contract duration (in months)* 6+ Months
Implementation Partner: Infosys
Provide highly available network based security services to match business needs. In-depth operational experience providing authentication, authorization, and accounting (AAA) services and automated mac authentication bypass functionality are the key components for this role. The candidate will utilize strong communication skills as well as enterprise level understanding of network and security technologies to deliver solutions that are both technically sound and supportable.
Responsibilities
- Provide Level 2 support consistent with Network data and voice support models
- Provide network based authentication, authorization, and accounting services
- Implement and support an 802.1x capable network infrastructure
- Understanding of PKI / certificate based authentication
- Allow Mac Authentication Bypass (MAB) functionality through the use of the Great Bay Beacon appliance
- Generation of custom rule sets for accurate profiling and network placement of client systems
- Enterprise level experience designing, implementing, and operating the Cisco ACS 5.x platform
- Experience with Cisco Firewall, VPN, and IPS/ IDS systems
- Recommendations of system changes in support of operational needs and system efficiencies
- Generation of technology documentation and diagramming with tools such as MS Word and Visio
- Ensure network access control systems meet compliance and auditing requirements
- Plan network changes
- Resolve network problems
- Participate in review meetings as required to support network implementation activities
- Provide recovery and restoration of the network in event of a disaster or major incident
Security and Controls - Comply and contribute to completing Security and Controls process regarding Network data and voice technologies
Technologies: TACACS / Radius, AAA, Firewalls, VPN, Intrusion Prevention Systems, MAC Authentication Bypass, PKI, Dynamic routing, L2 / L3 Switching
Equipment: Cisco Access Control Server 5.x, Great Bay Beacon, Cisco ASA Firewall, Cisco IPS Module, NNM, BMC suits, Loglogic, Netscout, RSA EnVision / Splunk Syslog servers, Orion monitoring tools
Additional Information
All your information will be kept confidential according to EEO guidelines.
Network Security Analyst with CCIE and Juniper (L2 Support)
Spring, TX jobs
Work authorisation Needed : US Citizens and Greencard Contract duration (in months)* 6+ Months Implementation Partner: Infosys Provide highly available network based security services to match business needs. In-depth operational experience providing authentication, authorization, and accounting (AAA) services and automated mac authentication bypass functionality are the key components for this role. The candidate will utilize strong communication skills as well as enterprise level understanding of network and security technologies to deliver solutions that are both technically sound and supportable.
Responsibilities
- Provide Level 2 support consistent with Network data and voice support models
- Provide network based authentication, authorization, and accounting services
- Implement and support an 802.1x capable network infrastructure
- Understanding of PKI / certificate based authentication
- Allow Mac Authentication Bypass (MAB) functionality through the use of the Great Bay Beacon appliance
- Generation of custom rule sets for accurate profiling and network placement of client systems
- Enterprise level experience designing, implementing, and operating the Cisco ACS 5.x platform
- Experience with Cisco Firewall, VPN, and IPS/ IDS systems
- Recommendations of system changes in support of operational needs and system efficiencies
- Generation of technology documentation and diagramming with tools such as MS Word and Visio
- Ensure network access control systems meet compliance and auditing requirements
- Plan network changes
- Resolve network problems
- Participate in review meetings as required to support network implementation activities
- Provide recovery and restoration of the network in event of a disaster or major incident
Security and Controls - Comply and contribute to completing Security and Controls process regarding Network data and voice technologies
Technologies: TACACS / Radius, AAA, Firewalls, VPN, Intrusion Prevention Systems, MAC Authentication Bypass, PKI, Dynamic routing, L2 / L3 Switching
Equipment: Cisco Access Control Server 5.x, Great Bay Beacon, Cisco ASA Firewall, Cisco IPS Module, NNM, BMC suits, Loglogic, Netscout, RSA EnVision / Splunk Syslog servers, Orion monitoring tools
Additional Information
All your information will be kept confidential according to EEO guidelines.