Personnel Security Specialist
Los Angeles, CA jobs
MANTECH seeks a motivated, career and customer-oriented Personnel Security Specialist II to join our team in El Segundo, CA.
The Personnel Security Specialist's primary function is to handle personnel security functions in support of the customer's facility and organization. The position will provide “day-today” PERSEC services for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Responsibilities include but are not limited to:
Build and Maintain tracking spreadsheets/databases for customer PERSEC activities.
Provide support for the security awareness and education programs.
Perform miscellaneous administrative support functions as directed by the contractor site lead and/or the Government Security Representative.
Review, track, and monitor security clearance processing activities with appropriate government personnel to achieve appropriate clearance actions.
Conduct Defense Central Index of Investigations (DCII), Joint Personnel Access System (JPAS), and SAPNP reviews of candidates being submitted for SAP access.
Perform data entry and record checks in the Joint Access Database (JADE) and maintain all customer sponsored personnel access information.
Receive and/or transmit classified visit requests as necessary to meet customer needs.
Minimum Qualifications:
Bachelor's degree; an additional 4 years of experience may be considered in lieu of degree.
6 + years of related experience.
4 + years of relevant SCI experience.
Must be familiar with security policy/manuals and the appropriate ICDs/JAFANs/DOD Manuals and other guiding policy documents.
Preferred Qualifications:
2+ years of SAP-related experience.
Clearance Requirements:
Current Top Secret Clearance with SCI Eligibility.
Eligibility for access to Special Access Program Information.
Willingness to submit to a polygraph.
Physical Requirements:
Must be able to remain in a stationary position 50%.
Needs to occasionally move about inside the office to access file cabinets, office machinery, etc.
Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer.
Frequently communicates with co-workers, management and customers, which may involve delivering presentations. Must be able to exchange accurate information in these situations.
Senior Backend Engineer - Cloud Security
Sunnyvale, CA jobs
About Company,
Droisys is an innovation technology company focused on helping companies accelerate their digital initiatives from strategy and planning through execution. We leverage deep technical expertise, Agile methodologies, and data-driven intelligence to modernize systems of engagement and simplify human/tech interaction.
Amazing things happen when we work in environments where everyone feels a true sense of belonging and when candidates have the requisite skills and opportunities to succeed. At Droisys, we invest in our talent and support career growth, and we are always on the lookout for amazing talent who can contribute to our growth by delivering top results for our clients. Join us to challenge yourself and accomplish work that matters.
We're hiring Senior Backend Engineer - Cloud Security in Sunnyvale, CA
What You Will Do
Build containerized microservices and related components for a multi-tenant, distributed system that ingests and processes real-time cloud events, system telemetry, and network data across major cloud platforms. Your work will enable customers to detect risks and strengthen their cloud security posture.
Mentor junior engineers, interns, and new graduates, helping them develop strong technical skills and become effective contributors.
Write production-quality software primarily in Java using Spring Boot, and work extensively with Kafka, SQL, and other data interfaces.
Work within a Kubernetes-based service infrastructure, while learning new technologies as needed.
Take ownership of major features and subsystems through the entire development lifecycle-requirements, design, implementation, deployment, and customer adoption.
Participate in operational responsibilities, gaining firsthand experience with real-world performance, reliability, and support scenarios-informing how you design and build better systems.
Prioritize quality at every stage, performing thorough developer testing, functional validation, integration checks, and performance testing to ensure highly resilient systems.
Collaborate closely with Product Management to review, refine, and finalize requirements.
Develop a deep understanding of customer needs by engaging with peers, stakeholders, and real-world use cases.
What You Bring
Bachelor's degree in computer science or similar (Master's preferred).
5+ years of experience building scalable, distributed systems.
Passion for software engineering, continuous learning, and working in a collaborative environment.
Hands-on experience with AWS, Azure, or GCP, with strong familiarity at the API/programming level.
Experience with networking and/or security concepts is a plus.
Experience developing containerized services on Kubernetes is strongly desired.
Strong programming experience in Java/Spring Boot or Golang.
Experience building or using REST APIs.
Knowledge of infrastructure-as-code tools such as CloudFormation, Terraform, or Ansible is a plus.
Understanding of TCP/IP networking fundamentals.
Experience developing in Unix/Linux environments.
Droisys is an equal opportunity employer. We do not discriminate based on race, religion, color, national origin, gender, gender expression, sexual orientation, age, marital status, veteran status, disability status or any other characteristic protected by law. Droisys believes in diversity, inclusion, and belonging, and we are committed to fostering a diverse work environment
Senior Security Architect
Orange, CA jobs
Security, Compliance and Audit Readiness:
Enforce network security controls aligned with Criminal Justice Information Services (“CJIS”), National Institute of Standards and Technology (“NIST”), and department policy.
Implement and maintain firewall rulesets, Network Access Control (“NAC”) solutions (e.g., Cisco Identity Service Engine (“ISE”)), and endpoint access policies.
Support the cybersecurity team in incident detection, forensic analysis, and mitigation strategies.
Provide documentation and evidence for security audits and compliance reviews.
Implementation, Operations and Support:
Serve as the hands-on engineer for network deployment, upgrades, and incident response.
Configure and manage Cisco switches, routers, firewalls, WLCs, and wireless endpoints.
Design and manage VPNs, QoS, ACLs, network monitoring, and logging systems (SolarWinds, NetFlow, SNMP).
SME Leadership and Staff Development:
Serve as the department's SME on enterprise security, guiding decisions across IT, public safety systems, and operations.
Train, coach, and mentor internal IT staff, including junior and mid-level network technicians.
Lead structured knowledge transfer sessions, hands-on training, and real-time coaching during support and implementation activities.
Create SOPs, how-to guides, and step-by-step documentation tailored for ongoing use by internal staff.
Support staff in preparation for certification paths (e.g., CCNA/CCNP) if desired.
Any other activities reasonably related to the foregoing, as assigned by the Client
Artificial intelligence Security Engineer
Dallas, TX jobs
World Wide Technology is looking for a Associate AI/Cybersecurity Engineer. This role is part of WWT's Strategic Resourcing services and is a contract role. The candidate will be supporting a WWT customer and will be employed by one of WWT's preferred partners. The partner will provide full compensation and benefit information prior to employment with the partner.
Why WWT?
At World Wide Technology, we work together to make a new world happen. Our important work benefits our clients and partners as much as it does our people and communities across the globe. WWT is dedicated to achieving its mission of creating a profitable growth company that is also a Great Place to Work for All. We achieve this through our world-class culture, generous benefits, and by delivering cutting-edge technology solutions for our clients.
WWT was founded in 1990 in St. Louis, Missouri. We employ more than 10,000 people globally and close nearly $20 billion in revenue in 2023. We have an inclusive culture and believe our core values are the key to company and employee success. WWT is proud to have been included on the FORTUNE "100 Best Places to Work For " list 12 years in a row!
Job Title: Associate AI/Cybersecurity Engineer
Job Location: Dallas, Texas OR Plano, TX OR Middletown, NJ
Job Mode: Hybrid
Employment Type: Contract
Duration: 12 months
Rate/Salary: A reasonable estimate of the current pay range for this position is $100.00 to $105.00 hourly on W2 . Actual pay will be based on a variety of factors, including shift, location, experience, skill set, performance, licensure and certification, and business needs, and will be set by your employer. The range for this position in other geographic locations may differ. Certain positions may also be eligible for variable incentive compensation, such as bonuses or commissions, that is not included in base pay.
:
World Wide Technology (WWT) is seeking a Associate AI/Cybersecurity Engineer for a 12 months contract position based in USA , as part of our Strategic Resourcing Services and staff augmentation efforts.
In this role, the selected consultant will work directly with a WWT client, supporting their internal team and business objectives. While WWT facilitates the position, the consultant will be employed by one of WWT's preferred partner organizations, which will provide complete details regarding compensation and benefits before employment.
Job Description
Key Responsibilities
The Associate AI/Cyber Engineer will assist in the development, implementation, and optimization of advanced AI and machine learning algorithms to detect and mitigate cyber threats.
This role is focused on hands-on technical engineering, involving deep research into AI security models and working closely with other teams to integrate AI solutions into cybersecurity architectures.
Key Responsibilities:
Design, develop, and optimize AI-driven security solutions to identify, predict, and prevent cyber threats.
Implement machine learning models, neural networks, and other AI techniques to enhance threat detection capabilities.
Collaborate with data scientists, security engineers, and other stakeholders to integrate AI technologies into the existing cybersecurity infrastructure.
Analyze data from security incidents to continuously improve AI models and methodologies.
Stay current on industry trends and advancements in both AI and cybersecurity.
Requirements:
Strong knowledge and experience with AI Agents, multi-agent workflows, tool-using agents, and orchestrations frameworks.
Strong understanding of MCP authentication, sandboxing, plugin lifecycle, and secure tool invocation patterns.
Experience implementing guardrails, red-team testing, and automated security scanning for AI pipelines.
Ability to detect, prevent, and remediate AI threats/vulnerabilities such as prompt injection, data poisoning, output manipulations, and other AI specific threats.
Bachelors in Computer Science or equivalent experience.
Specific knowledge and passion for AI and Cybersecurity. AI specific training and certifications are highly preferred.
If you have any questions or concerns about this posting, please email ****************** within five days of the posting's publication.
Equal Opportunity Employer Minorities/Women/Veterans/Differently Abled
Security Architect
Santa Ana, CA jobs
1. Security, Compliance and Audit Readiness
a. Enforce network security controls aligned with Criminal Justice Information Services (“CJIS”), National Institute of Standards and Technology (“NIST”), and department policy.
b. Implement and maintain firewall rulesets, Network Access Control (“NAC”) solutions (e.g., Cisco Identity Service Engine (“ISE”)), and endpoint access policies.
c. Support the cybersecurity team in incident detection, forensic analysis, and mitigation strategies.
d. Provide documentation and evidence for security audits and compliance reviews.
2. Implementation, Operations and Support
a. Serve as the hands-on engineer for network deployment, upgrades, and incident response.
b. Configure and manage Cisco switches, routers, firewalls, WLCs, and wireless endpoints.
c. Design and manage VPNs, QoS, ACLs, network monitoring, and logging systems (SolarWinds, NetFlow, SNMP).
3. SME Leadership and Staff Development
a. Serve as the department's SME on enterprise security, guiding decisions across IT, public safety systems, and operations.
b. Train, coach, and mentor internal IT staff, including junior and mid-level network technicians.
c. Lead structured knowledge transfer sessions, hands-on training, and real-time coaching during support and implementation activities.
d. Create SOPs, how-to guides, and step-by-step documentation tailored for ongoing use by internal staff.
e. Support staff in preparation for certification paths (e.g., CCNA/CCNP) if desired.
4. Any other activities reasonably related to the foregoing, as assigned by OCSD.
Information Security Manager
Santa Clara, CA jobs
Role: Cybersecurity Manager
Duration: 6+ months
Summary: The Cybersecurity Manager leads global cybersecurity operations, incident response, cloud security, and vulnerability management across IT, OT, and cloud environments. This role drives security maturity, manages SOC functions, and ensures compliance with frameworks like ISO 27001, NIST, and ITAR.
Key Responsibilities:Lead cybersecurity operations, including SOC oversight, threat detection, and endpoint security.
Manage incident response for ransomware, APT, insider threats, and major security events.
Oversee vulnerability and patch management programs (Tenable, Automox, CrowdStrike).
Strengthen cloud and identity security across Azure, Entra ID, and Microsoft 365.
Implement Zero Trust architecture and secure configuration standards.
Support compliance efforts (ISO 27001, NIST CSF/800-53/171, ITAR, GDPR, HIPAA, PCI).
Lead global cybersecurity teams, contractors, and MSSP partners.
Provide executive-level reporting on risk posture, incidents, and security metrics.
Requirements:10+ years of cybersecurity experience with leadership responsibilities.
Strong background in SOC operations, IR, EDR, SIEM/SOAR, and cloud security.
Hands-on experience with Sentinel, XSOAR, CrowdStrike, Defender, Tenable.
Knowledge of ISO 27001, NIST, ITAR, and broader regulatory frameworks.
Strong communication, team leadership, and cross-functional collaboration skills.
Director Information Security
Richardson, TX jobs
We are seeking an experienced and strategic Director of Data Security and Governance to lead our comprehensive data protection program. This critical role involves establishing and enforcing data security policies to meet stringent regulatory requirements, including the International Traffic in Arms Regulations (ITAR), and fulfilling complex data security obligations within commercial contracts. You will be responsible for building our data governance framework from the ground up, including implementing a robust data classification program and deploying modern security solutions like Data Security Posture Management (DSPM) and Data Rights Management (DRM)., in addition to managing the DLP program.
Detailed Description
Performs tasks such as, but not limited to, the following:
Strategy & Policy Development: Design, implement, and oversee the enterprise-wide data security and governance strategy, policies, and standards.
Compliance & Regulatory Oversight: Serve as the primary expert on data security requirements for ITAR and other government regulations. Ensure all data handling processes and systems are compliant with contractual and legal obligations.
Data Classification Program: Develop and manage a corporate data classification policy and program. Work with business units to identify, classify, and protect sensitive and regulated data throughout its lifecycle.
Technology Implementation: Lead the selection, implementation, and operationalization of a Data Security Posture Management (DSPM) solution to provide visibility and control over our data landscape.
Data Rights Management (DRM): Implement and manage a DRM solution to control access to and usage of sensitive data, ensuring that only authorized individuals can access and interact with protected information according to defined policies.
Risk Management: Conduct regular data security risk assessments, identify vulnerabilities, and oversee remediation efforts to mitigate risks.
Incident Response: Develop and lead the data-focused components of the incident response plan, including containment, investigation, and reporting of data breaches.
Collaboration & Training: Partner closely with Legal, IT, Engineering, and business stakeholders to embed data security principles into their operations. Develop and deliver training programs to raise awareness about data governance and security best practices.
Typical Experience
Minimum of 10 years of experience in cybersecurity and data governance, with at least 4 years in a leadership role.
Proven track record of successfully implementing a data classification program across an enterprise.
Direct experience with the procurement and deployment of DSPM and DRM technologies.
Skills & Knowledge:
Deep understanding of data protection principles, including encryption, access control, data loss prevention (DLP), and data discovery.
Expert knowledge of security frameworks such as NIST Cybersecurity Framework, NIST 800-171, and ISO 27001.
Excellent project management skills and the ability to lead cross-functional teams.
Strong communication skills, with the ability to articulate complex security concepts to technical and non-technical audiences.
Certifications (Preferred):
Certified Information Systems Security Professional (CISSP)
Certified Information Security Manager (CISM)
Certified Information Privacy Professional (CIPP)
Typical Education
Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or related field, or equivalent experience.
A Master's degree is a plus.
Educational requirements may vary by geography.
Physical Demands
Duties of this position are performed in a normal office environment.
Duties may require extended periods of sitting and sustained visual concentration on a computer monitor or on numbers and other detailed data. Repetitive manual movements (e.g., data entry, using a computer mouse, using a calculator, etc.) are frequently required.
Notes
This job description is not intended to be an exhaustive list of all duties and responsibilities of the position. Employees are held accountable for all duties of the job. Job duties and the % of time identified for any function are subject to change at any time.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Celestica's policy on equal employment opportunity prohibits discrimination based on race, color, creed, religion, national origin, gender, sexual orientation, gender identity, age, marital status, veteran or disability status, or other characteristics protected by law.
This policy applies to hiring, promotion, discharge, pay, fringe benefits, job training, classification, referral and other aspects of employment and also states that retaliation against a person who files a charge of discrimination, participates in a discrimination proceeding, or otherwise opposes an unlawful employment practice will not be tolerated. All information will be kept confidential according to EEO guidelines.
COMPANY OVERVIEW:
Celestica (NYSE, TSX: CLS) enables the world's best brands. Through our recognized customer-centric approach, we partner with leading companies in Aerospace and Defense, Communications, Enterprise, HealthTech, Industrial, Capital Equipment and Energy to deliver solutions for their most complex challenges. As a leader in design, manufacturing, hardware platform and supply chain solutions, Celestica brings global expertise and insight at every stage of product development - from drawing board to full-scale production and after-market services for products from advanced medical devices, to highly engineered aviation systems, to next-generation hardware platform solutions for the Cloud. Headquartered in Toronto, with talented teams spanning 40+ locations in 13 countries across the Americas, Europe and Asia, we imagine, develop and deliver a better future with our customers.
Celestica would like to thank all applicants, however, only qualified applicants will be contacted.
Celestica does not accept unsolicited resumes from recruitment agencies or fee based recruitment services.
This location is a US ITAR facility and these positions will involve the release of export controlled goods either directly to employees or through the employee's movement within the facility. As such, Celestica will require necessary information from all applicants upon an applicant's acceptance of employment to determine if any export control exemptions or licenses must be filed.
Deputy, Global Information Security Officer
Richardson, TX jobs
The Deputy, Global Information Security Officer is responsible for leading the security strategy roadmap, consulting with security solution partners and defining company security policies and standards. Will have oversight of global security operations, incident response and both US and international Aerospace and Defence (A&D) security and compliance. The right candidate will have the required presence, confidence, and knowhow to quickly gain trust, credibility, and respect. They will have a proven record of taking a fact-based approach to the assessment of the current state of operations and the implementation of pragmatic solutions to address business needs. They will extract maximum value from existing technology investments while leveraging industry trends to introduce new and relevant technologies to deliver the necessary protection to the enterprise.
Detailed Description:
Performs tasks such as, but not limited to, the following:
Drive the overall security strategy for Celestica, aligning security initiatives with business objectives, influencing stakeholders, and securing buy-in for security investments.
Act as a champion for security across the organization, fostering a security-conscious culture and promoting best practices.
Provide leadership to the information security organization.
Take ownership of the incident response program, including developing and testing incident response plans, coordinating response activities, and conducting post-incident reviews to improve future response capabilities.
Leverage data analytics to inform security strategy, identify threats, and measure the effectiveness of security controls. This includes promoting a data-driven security culture within the team.
Drive improvements and efficiencies within the security operating model including identifying areas for optimization, streamlining processes, and championing change.
Drive the development and implementation of security standards and policies. This includes ensuring compliance with relevant regulations and industry frameworks, and staying abreast of emerging security threats and best practices.
Actively scans laws, guidelines, and regulations in all the countries that we operate to ensure that any major exposure on data privacy is addressed or mitigated.
Establish, implement and monitor strategic processes to maintain and improve IT solutions, infrastructure and support services.
Coordinate with external authorities to assure monitoring posture is at a high level of attentiveness.
Accountable for monitoring suspicious network and endpoint activities, and taking corrective actions, as required.
Responsible for managing security partners and other third-party security relationships.
Appraise CIO/CISO of cybersecurity trends and threats.
Responsible for developing and testing threat identification, containment, and recovery plans.
Accountability for cybersecurity awareness, training, and internal phishing campaigns.
Key liaison and collaboration with physical security.
Collaborate on pre-acquisition requirements with stakeholders assuring that security standards are met prior to acquisition.
Facilitate the necessary efforts and resources to ensure that duration of exposure to cyber events is addressed rapidly
Participate on company world-wide teams to share information, help implement global initiatives, leverage IT resources and investments, and develop future state of company architecture.
Build, manage, and mentor a high-performing security team. This includes setting clear goals, providing development opportunities, and fostering a collaborative and innovative work environment.
Responsible for maturing the Information Security function and driving discipline on execution of all security initiatives to ensure they are delivered on-time, on-budget, and with quality.
Knowledge/Skills/Competencies:
Advanced knowledge of project management and Full Project Scope Experience
Experience in partnering with the business in promoting cybersecurity initiatives
Demonstrated experience implementing Security strategies and solution designs
Advanced understanding of virtualized cloud computing environments
Performing full security compliance and risk assessments
Advanced knowledge of Information Security Penetration Testing, IT Vulnerability Assessments
Mastery level of understanding in IT Risk Management and IT Governance/Audit Procedures
Advanced understanding of Cybersecurity incident Response Management and advanced experience in incident response activities
Advanced understanding of IT Security Architecture
Advanced knowledge of Security Standards, Regulations, and Best Practices
Extensive knowledge of IT design and deployment, and operations process
Knowledge and understanding of the business unit and how decisions impact customer satisfaction, product quality, on-time delivery and the profitability of the unit
Information security forensics
Knowledge of common information security frameworks and IT controls frameworks, such as NIST 800-171, ISO/IEC 27001, and ITIL
Knowledge and understanding of relevant legal and regulatory requirements, such as Sarbanes-Oxley Act (SOX), Health Insurance Portability and Accountability Act (HIPAA) and Payment Card Industry/Data Security Standard. Knowledge of global requirements
Effectively manage relationships with security vendors, negotiating contracts and ensuring the organization is getting the best value for its security investments.
Experience working with customers on security assessments and audits
Proven ability to influence and promote safe technology usage, practices and behaviours across all levels of the entire organization by leveraging direct and indirect resources, delivering effective global communication, and enforcing policy attestation and mandatory employee training.
Demonstrated understanding of how security decisions impact the business, including customer trust, brand reputation, and revenue generation.
Ability to articulate the value of security investments in business terms.
Ability to communicate complex security concepts clearly and concisely to a variety of audiences, including senior management, board members, and external stakeholders. This includes building consensus, influencing decision-making, and securing support for security initiatives.
Required knowledge of the U.S. GOVERNMENT COMPLIANCE but not limited to, DFAR ************/NIST 800-171, DFARS ************, ************, and ************, CMMC Model Version 2.0 and associated testing requirements, and 48 CFR 52.204-21
Physical Demands:
Duties of this position are performed in a normal office environment.
Duties may require extended periods of sitting and sustained visual concentration on a computer monitor or on numbers and other detailed data. Repetitive manual movements (e.g., data entry, using a computer mouse, using a calculator, etc.) are frequently required.
Typical Experience:
15+ years of IT experience with a proven track record of delivering global capabilities around risk management, information security and progressive IT roles.
5+ years of Senior-level IT Security leadership experience within an organization of comparable scale and complexity, experience in the manufacturing industry is preferred.
Knowledge of all aspects of IT business.
Typical Education: Bachelor's Degree.
Notes:
This job description is not intended to be an exhaustive list of all duties and responsibilities of the position. Employees are held accountable for all duties of the job. Job duties and the % of time identified for any function are subject to change at any time.
Network Security DevOps Engineer
Spring, TX jobs
As a Network Security DevOps Engineer, you will play a critical role in designing, engineering, and managing the enterprise network security posture. You will ensure that the network infrastructure aligns with corporate security policies and standards, protecting against evolving cyber threats. This role involves operating and maintaining key security technologies-such as firewalls, IDS/IPS, and other advanced controls-while applying DevOps principles to drive automation, scalability, and resilience. You will collaborate closely with network, infrastructure, application, and cybersecurity teams to support and enhance global IT services.
Key Responsibilities
• Design, implement, and manage network security technologies and services across regions and different infrastructure environments (data centers, offices, edge).
• Research and recommend industry best practices and emerging technologies in network security.
• Operate and maintain network security appliances (Fortinet, Cisco, Juniper), including upgrades and patching.
• Build and manage network security infrastructure using DevOps practices and automation tools.
• Contribute to the Zero-Ops infrastructure management vision by developing solutions that reduce manual intervention and improve operational efficiency.
• Support security operations: monitoring, analysis, incident response, and vulnerability management.
• Evaluate security advisories and vulnerabilities, providing timely recommendations and mitigations.
• Participate in ad-hoc vulnerability assessments and incident response.
• Coordinate with stakeholders across Cybersecurity, Projects, and internal customers.
• Develop and maintain operational processes and documentation for ongoing support.
Qualifications
• Minimum 3 years of hands-on experience in network security.
• Experience with network security platforms: Cisco ASA (CSM), FTD (FMC), FortiGate (FortiManager), Juniper SRX (Junos Space).
• Strong understanding of networking fundamentals: TCP/IP, OSI model, routing/switching, ACLs.
• Familiarity with security technologies: firewalls, VPNs, IDS/IPS, encryption, authentication, vulnerability management, and incident response.
Technical Skills
• Deep knowledge of TCP/IP, Internet technologies, IPS/IDS, firewall virtualization, VPNs, NAT, DNS, etc.
• Relevant certifications (preferred but not required): Cisco (CCNA/CCNP Security), Fortinet (FCA/FCSS/NSE), CISSP, GIAC.
• Automation & DevOps
• Strong advantage: experience with GitHub, Terraform, Ansible, Python, REST API, Jenkins, Jinja2, YAML.
• Familiarity with CI/CD concepts and tools is a plus.
• Cloud
• Experience with AWS and Azure network security services.
• Soft Skills
• Excellent verbal and written communication in English.
• Mindset to grow and learn.
• Self-motivated, proactive, and able to work independently in a global virtual team.
• Strong multitasking and prioritization abilities.
• Analytical mindset and a collaborative team player.
• On-Call Rotation
• Participates in a global 'follow-the-sun' on-call support rotation.
Top 3 skill sets/technologies:
1) Network security firewall
2) Automation
3) Cloud (AWS & Azure connectivity)
Information Security Architect -- MAHDC5660809
San Francisco, CA jobs
Information Security
Need Local to San Francisco, CA
Onsite role
Looking for independent folks.
Top Skills: KQL - kusto query language - used by different Microsoft security tools like sentinel or defender
SPL that Splunk uses
General incident response
actual incident tickets - resolve actual security incident tickets
Requirements
• Self-starter, able to readily explore and learn new areas and concepts.
• Knowledge and experience normally acquired through, or equivalent to, the completion of a Computer Science or Computer Engineering Bachelor's degree with a minimum of 5 years of job-related experience.
• Degrees in Computer Science or Engineering and/or relevant technically focused certifications in Cloud and/or enterprise security architecture such as GCAD or GDSA are advantageous
Experience with
• AWS commercial or government cloud
• Experience securing critical workloads in a cloud environment.
• Knowledge and experience with Databricks, Starburst, Collibra and Immuta is advantageous.
Job Role Summary
Lead and produce system threat models for integration of commercial components into a data lake platform. Help design secure cloud architectures. Propose effective security controls within the environment and identify and mitigate security vulnerabilities. Simplify complex security topics, lead discussion in technical and business teams, communicate risk accurately.
Skills
• Able to create AWS secure cloud architecture designs
• Understand current security threats, techniques, and landscape
• System threat modeling of applications and platforms
• Able to identify and provide mitigation for security vulnerabilities within applications and application environments based on threat models.
• Able to simplify complex security topics for consumption and critical decision making.
• Clear and accurate communication
• Able to lead/direct discussions with technical and business teams to achieve common goals.
• Able to work well within a team and support team goals
• Understand cyber security frameworks such as NIST 800-53
• Ability to work on a geographically distributed team across multiple time zones
• Familiarity with SAFe a plus
Responsibilities
• Evolve and mature our models, templates, standards and procedures related to secure application development and secure application and cloud architecture. Ensure these artifacts are in alignment with FRS policy and standards.
• Consult with our development teams to help them align with FRS policy and standards and meet the risk appetite of the customer.
• Work with members of application development teams to review and create secure application and infrastructure designs and patterns.
• Assist development teams by reviewing threat models related to applications and related systems. Analyze potential business impact and exposure leading to risk, based on emerging security threats, vulnerabilities, configurations, threat actor TTPs, etc.
• Evaluate CICD pipeline design, and related development team processes and help to mature and secure creation, management and utilization of pipelines.
• Assist in identification and integration of security focused tooling into development and operations processes.
• Support secure application architecture within the Federal Reserve System by fostering constructive dialogue and seeking resolution when confronted with discordant views.
• Solicit feedback and continuously improve your knowledge, skills and capabilities related to the position.
• Assist with recruiting activities and administrative work.
Network Security Engineer -W2 Only
San Jose, CA jobs
Job Title: Security Engineer (Mergers & Acquisitions Team)
⏳ Duration: 6 Months
MUST HAVE SKILL :
5+ years of proven hands-on Network Security & Administration experience, including firewall management, security controls, and infrastructure protection.
Strong hands-on expertise with enterprise-grade firewalls and security appliances from Cisco, Checkpoint, and Palo Alto.
Solid Cloud Security experience, including securing hybrid environments, cloud networking, and cloud-based security controls.
Deep understanding of encryption and secure connectivity, including TLS/SSL for web traffic, IPsec, and VPN technologies.
Certifications : CCNA (Network), CCNP (Security)
Job Overview
We are seeking an experienced Security Engineer to support Mergers & Acquisitions (M&A) security integration efforts. This role focuses on designing, deploying, and troubleshooting security appliances and controls to securely integrate acquired companies into the existing enterprise network.
The ideal candidate will have hands-on expertise with firewalls, security tools, cloud security, and enterprise infrastructure. You will collaborate closely with network, security, and IT teams to ensure seamless integration, maintain business continuity, and uplift the overall security posture.
Key Responsibilities
• Design & Implementation
Deploy new security appliances and complete all configuration, logging, and auditing requirements.
Conduct site-by-site assessments and prepare Bill of Materials (BOM) for new firewalls and related equipment.
Implement standard controls and approved security exceptions to meet business needs.
• Configuration & Maintenance
Update, patch, and register firewalls; integrate them into the global management console.
Deploy security rule sets, filtering, logging, and audit capabilities in alignment with SOC requirements.
Understand custom security needs for each acquired entity and build required policy sets.
• Assessment, Monitoring & Troubleshooting
Assess current security posture and review reports from internal/external scanning tools.
Manage vulnerability scanning, data scanning, and remediation.
Troubleshoot firewall issues and analyze security events while coordinating with network teams.
• Documentation & Compliance
Maintain accurate documentation, network diagrams, configuration logs, and ensure compliance with security standards and best practices.
• Collaboration & Support
Work closely with networking, systems, and application teams.
Liaise with vendors, service providers, and internal teams to support integration and operational requirements.
• Capacity Planning
Conduct capacity analysis to ensure scalability of security infrastructure as growth continues.
• Security Integration Strategy & Roadmapping
Build 30/60/90-day security integration plans for newly acquired companies.
Create phased upgrade plans, firewall migration paths, and endpoint remediation strategies.
Align integration work with long-term enterprise architecture and identify key security priorities.
• Automation
Automate recurring tasks including vulnerability log analysis, data scanning, reporting, and other routine activities.
Required Qualifications
Bachelor's degree in Computer Science, Information Technology, Network Engineering, or related field.
5+ years of hands-on security engineering or network security administration experience.
Certifications (Preferred)
Cisco: CCNA, CCNP Security
Checkpoint: CCSA
Palo Alto: PCNSA, PCNSE, PCCET
General: CompTIA Security+
Technical Skills
Strong understanding of network concepts and administration.
Deep knowledge of security appliances, software tools, discovery/assessment tools, and threat landscapes.
Hands-on experience with enterprise-grade equipment from Cisco, Checkpoint, and Palo Alto.
Experience with security monitoring and diagnostic tools.
Knowledge of cloud networking, cloud security, and virtualization technologies.
Ability to follow precise standards for designing and implementing enterprise security infrastructure.
Soft Skills
Strong analytical and complex problem-solving skills.
Excellent written and verbal communication skills for both technical and non-technical audiences.
Strong time-management and prioritization abilities.
Ability to work independently and collaboratively within global, cross-cultural teams.
Security Architect GCP
Sunnyvale, CA jobs
Security Architect / Implementation Engineer
Duration: 6 Months contract with possibility of extension
We are seeking a highly skilled Security Architect / Security Implementation Engineer with expertise in designing, implementing, and integrating Google Cloud Security Command Center (SCC), Chronicle SIEM, and Cybereason XDR. The candidate will be responsible for architecting the end-to-end solution, implementing GCP native security controls, integrating third-party security tools, and producing detailed design and operational documentation.
Key Responsibilities:
Design and architect cloud-native security controls in GCP aligned with security and compliance frameworks (CIS, ISO 27001, NIST, etc.).
Implement Google Security Command Center (SCC) for threat detection, vulnerability management, and risk insights.
Architect and configure Chronicle SIEM for log ingestion, correlation, and advanced threat analytics.
Integrate Cybereason XDR with SCC, Chronicle, and other security tools to establish end-to-end threat detection and response workflows.
Define use cases, rules, policies, and security playbooks to automate detection and response.
Document the solution architecture, design decisions, configuration standards, and integration workflows.
Conduct knowledge transfer sessions with security operations and support teams.
Collaborate with GCP Cloud Platform teams, SOC teams, and compliance teams to align solutions with enterprise policies.
Required Skills & Experience:
8-12 years of overall IT security experience with at least 4-5 years in Google Cloud Security.
Proven experience with Google Security Command Center (SCC), Chronicle SIEM, and XDR platforms (Cybereason preferred).
Strong knowledge of GCP IAM, VPC Service Controls, Cloud Armor, DLP, Cloud Logging, Cloud Monitoring.
Hands-on experience in integrating SIEM, XDR, and native GCP security tools.
Experience with Terraform, Deployment Manager, or automation frameworks for security deployment.
Strong documentation and presentation skills.
Security certifications preferred: Google Professional Cloud Security Engineer, GCP Professional Architect, CISSP, CISM, CCSP.
Sr. Network Security Engineer
Mountain View, CA jobs
About Persistent
We are an AI-led, platform-driven Digital Engineering and Enterprise Modernization partner, combining deep technical expertise and industry experience to help our clients anticipate what's next. Our offerings and proven solutions create a unique competitive advantage for our clients by giving them the power to see beyond and rise above. We work with many industry-leading organizations across the world, including 12 of the 30 most innovative global companies, 60% of the largest banks in the US and India, and numerous innovators across the healthcare ecosystem.
Our disruptor's mindset, commitment to client success, and agility to thrive in the dynamic environment have enabled us to sustain our growth momentum by reporting $360.2M revenue in Q3 FY25, delivering 4.3% Q-o-Q and 19.9% Y-o-Y growth. Our 23,900+ global team members, located in 19 countries, have been instrumental in helping the market leaders transform their industries. We are also pleased to share that Persistent won in four categories at the prestigious 2024 ISG Star of Excellence™ Awards, including the Overall Award based on the voice of the customer. We were included in the Dow Jones Sustainability World Index, setting high standards in sustainability and corporate responsibility. We were awarded for our state-of-the-art learning and development initiatives at the 16
th
TISS LeapVault CLO Awards. In addition, we were cited as the fastest-growing IT services brand in the 2024 Brand Finance India 100 Report. Throughout our market-leading growth, we've maintained a strong employee satisfaction score of 8.2/10.
About Position
Role:Senior Network Security Engineer
Location: Mountain View CA
Experience: 10+ years
Job Type: Full Time & Contract
Mandatory Skills: Zscaler, Palo Alto, Network Security Engineering, AWS
We are seeking a highly motivated and experienced Senior Network Security Engineer to join our growing team. This critical role will be responsible for the design, implementation, and maintenance of complex network infrastructure, with a strong emphasis on cloud integration, security, and automation. The ideal candidate will possess a deep understanding of networking principles, hands-on experience with AWS, a scripting proficiency in Python, and expertise in cybersecurity best practices, particularly with AWS, Palo Alto Networks and Zscaler security solutions.
Expertise You'll Bring
Palo Alto Networks certifications (e.g., PCNSE).
Zscaler certifications.
AWS certifications (e.g., AWS Certified Advanced Networking - Specialty).
Experience with Infrastructure as Code (IaC) tools like Terraform or CloudFormation.
Experience with container networking (e.g., Kubernetes).
Knowledge of other cloud platforms (Azure, GCP).
Certified Information Systems Security Professional (CISSP)
Bachelor's degree in Computer Science, Information Technology, or a related field.
7+ years of experience in network engineering.
Deep understanding of networking protocols (TCP/IP)
Hands-on experience with Palo Alto Networks firewalls and security appliances.
Expertise in Zscaler (ZIA/ZPA/ZDX) administration and configuration.
Solid understanding of cybersecurity principles and best practices.
Experience with network monitoring and troubleshooting tools.
Excellent communication and collaboration skills.
Ability to work independently and as part of a team.
Extensive experience with AWS networking services (VPC, Transit Gateway, Direct Connect, etc.).
Strong scripting skills in Python for network automation.
Good to have AWS development and microservices automation experience.
What You'll Do
Design, implement, and manage our hybrid cloud and on-premises network infrastructure.
Implement and manage network security solutions, including firewalls (Palo Alto Networks), secure web gateways (Zscaler), and intrusion detection/prevention systems.
Monitor network performance and troubleshoot network issues.
Proactively identify and mitigate security vulnerabilities.
Collaborate with other teams to ensure network connectivity and performance.
Create and maintain network documentation.
Participate in on-call rotation for network support.
Mentor and guide junior network engineers.
Stay current with the latest networking technologies and security threats.
Lead the migration and integration of network services into AWS.
Develop and maintain network automation scripts using Python.
Benefits
Competitive salary and benefits package
Culture focused on talent development with quarterly promotion cycles and company-sponsored higher education and certifications
Opportunity to work with cutting-edge technologies
Employee engagement initiatives such as project parties, flexible work hours, and Long Service awards
Annual health check-ups
Insurance coverage: group term life, personal accident, and Mediclaim hospitalization for self, spouse, two children, and parents
Our company fosters a values-driven and people-centric work environment that enables our employees to:
Accelerate growth, both professionally and personally
Impact the world in powerful, positive ways, using the latest technologies
Enjoy collaborative innovation, with diversity and work-life wellbeing at the core
Unlock global opportunities to work and learn with the industry's best
Let's unleash your full potential at Persistent - persistent.com/careers
For more details, please contact Bharath Veluru (bharath_*********************)
“Persistent is an Equal Opportunity Employer and prohibits discrimination and harassment of any kind.”
Information Systems Security Officer (ISSO)
Port Hueneme, CA jobs
JT4 Point Mugu is seeking an Information Systems Security Specialist. This role is responsible for assessing, developing and implementing programs and controls set in place to help increase cybersecurity within our company. The Information Systems Security Specialist will be detail-oriented, have great problem-solving and analytical skills, and a passion for cybersecurity.
JT4, LLC provides engineering and technical support to multiple western test ranges for the U.S. Air Force, Space Force, and Navy under the Joint Range Technical Services Contract, better known as J-Tech II. JT4 develops and maintains realistic, integrated test and training environments and prepares our nation's war-fighting aircraft, weapons systems, and aircrews for today's missions and tomorrow's global challenges.
**An ideal candidate will have an active DoD secret clearance**
**This position is located at Point Mugu and is not eligible for telework**
Job Summary -- Essential Functions/Duties
This position is the on-site technical specialist for monitoring information systems and maintaining the environment of operation to include developing and updating System Security Plans, managing and controlling changes to the systems, conducting audits, providing incident response, perpetration for vulnerability assessments, and assessing the security impact of security and non-security-relevant changes.
Employee will be responsible to perform the following functions/duties:
Provides incident handling in conjunction with the Facility Security Office (FSO) and Information Security Officer / Information Systems Security Manager (ISSO/ISSM)
Assists in writing and maintaining computer security processes to meet Navy requirements of Risk Management Framework
Monitors computer system use and audits logs
Makes recommendations for future hardware / software implementations and related process improvements
This position requires skills in team building and customer service
Provides operational status as required
Uses established policies and procedures and subject matter knowledge to complete complex assignments requiring originality and ingenuity performed under minimum supervision with considerable latitude for independent contribution
Provides security training and awareness briefings
Other duties as assigned.
Requirements -- Education, Technical, and Work Experience
Associates or higher degree in Computer/Information Technology, or equivalent academic/technical training/certification. Possess two to three years of experience in computer system security and/or related areas of expertise. Must be compliant to DoD 8570.01-M levels and possess or working toward Security+ certification with a CISSP desired. Should have experience with JSIG, NIST 800 and NISPOM, Chapter 8.
In addition, an Information Systems Security Specialist must possess the following qualifications:
Must possess and apply a broad knowledge of principles, practices and procedures in computer security and information systems and working experience with Microsoft Office, Access, and Visio
Must possess experience supporting various system configurations such as Stand Alone, Local Area Networks, and Wide Area Networks
Must possess excellent skills in verbal and written communications, planning, and organizing
Ability to work under deadlines. Employee is expected to routinely cross fields in the completion of somewhat difficult and varied assignments. Government vehicle is used on an as-needed basis
Ability to work in a field environment at remote locations with occasional overnight assignments
Must qualify for and maintain a government security clearance
Must possess a valid, state-issued driver's license.
Applied Statistics Researcher - Active Security Clearance Required
Livermore, CA jobs
Join us and make YOUR mark on the World! Are you interested in joining some of the brightest talent in the world to strengthen the United States' security? Come join Lawrence Livermore National Laboratory (LLNL) where our employees apply their expertise to create solutions for BIG ideas that make our world a better place.
We are dedicated to fostering a culture that values individuals, talents, partnerships, ideas, experiences, and different perspectives, recognizing their importance to the continued success of the Laboratory's mission.
Pay Range
$140,700 - $214,032
$140,700 - $178,392 Annually for the SES.2 level
$168,780 - $214,032 Annually for the SES.3 level
This is the lowest to highest salary we in good faith believe we would pay for this role at the time of this posting; pay will not be below any applicable local minimum wage. An employee's position within the salary range will be based on several factors including, but not limited to, specific competencies, relevant education, qualifications, certifications, experience, skills, seniority, geographic location, performance, and business or organizational needs.
Job Description
We have an opening for an Applied Statistics Researcher. You will engage in cutting edge research, design, and deployment of statistical methods to solve important decision and detection problems stemming from the Laboratory's core mission spaces. We invite you to join us if you have expertise in one of the following desired areas: Bayesian modeling, uncertainty quantification, analysis and design of computer experiments, statistical learning, statistical methods for "Big Data", or general statistical consulting. This position is in the Computational Engineering Division (CED), within the Engineering Directorate.
This position will be filled at either level based on knowledge and related experience as assessed by the hiring team. Additional responsibilities (outlined below) will be assigned if hired at the higher level.
You will
* Contribute to and actively participate in research, development, and execution within one or more of the following areas: information retrieval and representation, cyber security, image and video analysis, design of computer experiments, climate modeling, energy analysis, computational biology, lasers, and optics.
* Design, implement, and analyze techniques in one or more of the above areas.
* Contribute to and actively participate with project scientists and engineers in the scope, planning, and formulating modeling/simulation efforts for physical, engineering, and computational systems in the areas of cyber security, biological and environmental threat detection, uncertainty quantification, and others.
* Develop, implement, validate, and document specialized analysis software tools and models as required.
* Collaborate and communicate with others in a multidisciplinary team environment, including industrial and academic partners, project managers, and external sponsors, to deliver results and accomplish research goals.
* Organize, analyze and publish research results in peer-reviewed scientific or technical journals and present results at external conferences seminars and/or technical meetings.
* Perform other duties as assigned.
Additional job responsibilities, at the SES.3 level
* Provide technical leadership and guidance to project teams developing state of the art methods and applying research results to meet programmatic goals, while balancing priorities of customers and partners to ensure deadlines are met.
* Serve as the primary technical point of contact for program managers internally and at sponsor and partner organizations.
* Utilize advanced knowledge to provide recommendations on methodologies and to influence deliverables to best meet sponsor needs.
* Mentor and advise LLNL scientists and engineers in applied statistics best practices.
Qualifications
* This position requires an active Department of Energy (DOE) Q-level clearance or active Top Secret clearance issued by another U.S. government agency at the time of hire.
* Master's degree in Statistics or other related technical field, or the equivalent combination of education and related experience.
* Comprehensive knowledge and experience using programming skills in at least one prototyping language R/Matlab/Python, as well as one of C/C++/Java to enable high performance statistical computation.
* Experience developing and applying advanced statistical/machine learning models and algorithms for one or more of the following settings: classification, clustering, anomaly detection, density estimation, pattern recognition, knowledge discovery.
* Experience developing independent research projects, either through previous work experience or as demonstrated through publication of peer-reviewed literature.
* Proficient verbal and written communication skills to collaborate effectively in a team environment and present and explain technical information.
* Demonstrated initiative, effective interpersonal skills, and ability to work in a collaborative, multidisciplinary team environment.
* Ability and desire to obtain substantial domain knowledge in fields of application and ability to communicate effectively with subject matter experts.
Additional qualifications at the SES.3 level
* Advanced knowledge and significant experience in developing and applying advanced statistical/machine learning models and algorithms for one or more of the following settings: classification, clustering, anomaly detection, density estimation, pattern recognition, knowledge discovery.
* Significant experience executing independent research projects, including experience leading interdisciplinary teams, setting clear expectations, delegating responsibilities, and ensuring successful, timely completion of objectives.
* Ability to adjust and dynamically reprioritize tasks in response to stakeholder input.
Qualifications We Desire
* PhD in Statistics or other related technical field, or the equivalent combination of education and related experience.
* Familiarity with algebraic statistics and statistical models for combinatorial/algebraic structures.
* Experience with human language technology, data mining, and self-supervised learning.
Additional Information
#LI-Hybrid
Position Information
This is a Career Indefinite position, open to Lab employees and external candidates.
Why Lawrence Livermore National Laboratory?
* Included in 2025 Best Places to Work by Glassdoor!
* Flexible Benefits Package
* 401(k)
* Relocation Assistance
* Education Reimbursement Program
* Flexible schedules (*depending on project needs)
* Our values - visit *****************************************
Security Clearance
This position requires an active Department of Energy (DOE) Q-level clearance or active Top Secret clearance issued by another U.S. government agency at time of hire.
Pre-Employment Drug Test
External applicant(s) selected for this position must pass a post-offer, pre-employment drug test. This includes testing for use of marijuana as Federal Law applies to us as a Federal Contractor.
Wireless and Medical Devices
Per the Department of Energy (DOE), Lawrence Livermore National Laboratory must meet certain restrictions with the use and/or possession of mobile devices in Limited Areas. Depending on your job duties, you may be required to work in a Limited Area where you are not permitted to have a personal and/or laboratory mobile device in your possession. This includes, but not limited to cell phones, tablets, fitness devices, wireless headphones, and other Bluetooth/wireless enabled devices.
If you use a medical device, which pairs with a mobile device, you must still follow the rules concerning the mobile device in individual sections within Limited Areas. Sensitive Compartmented Information Facilities require separate approval. Hearing aids without wireless capabilities or wireless that has been disabled are allowed in Limited Areas, Secure Space and Transit/Buffer Space within buildings.
How to identify fake job advertisements
Please be aware of recruitment scams where people or entities are misusing the name of Lawrence Livermore National Laboratory (LLNL) to post fake job advertisements. LLNL never extends an offer without a personal interview and will never charge a fee for joining our company. All current job openings are displayed on the Career Page under "Find Your Job" of our website. If you have encountered a job posting or have been approached with a job offer that you suspect may be fraudulent, we strongly recommend you do not respond.
To learn more about recruitment scams: *****************************************************************************************
Equal Employment Opportunity
We are an equal opportunity employer that is committed to providing all with a work environment free of discrimination and harassment. All qualified applicants will receive consideration for employment without regard to race, color, religion, marital status, national origin, ancestry, sex, sexual orientation, gender identity, disability, medical condition, pregnancy, protected veteran status, age, citizenship, or any other characteristic protected by applicable laws.
Reasonable Accommodation
Our goal is to create an accessible and inclusive experience for all candidates applying and interviewing at the Laboratory. If you need a reasonable accommodation during the application or the recruiting process, please use our online form to submit a request.
California Privacy Notice
The California Consumer Privacy Act (CCPA) grants privacy rights to all California residents. The law also entitles job applicants, employees, and non-employee workers to be notified of what personal information LLNL collects and for what purpose. The Employee Privacy Notice can be accessed here.
Videos To Watch
Senior Security Operations Engineer (Azure)
Austin, TX jobs
At Jamf, we believe in an open, flexible culture based on respect and trust. Our track record and thriving work environment all stem from the freedom we grant ourselves to get the job done right. We take pride in helping tens of thousands of customers around the globe succeed with Apple.
The secret to our success lies in our connectivity, while operating with a high degree of flexibility. Work-life balance remains our priority while feeling connected is important to maintain our strong culture, achieve our goals, and thrive as #OneJamf.
What you'll do at Jamf:
The Senior Security Operations Engineer will work with the Cloud and Delivery team to continue to build, automate and maintain cloud security services in Azure. They will be responsible for leading the Security Design and Architecture, Log Collection, Security Incident Management, Identity and Access Management, Vulnerability and Patch management. They will be responsible for maintaining operation of the environment in accordance with our service level agreements and providing support to both our staff and customers.
This role if offered as remote in Minneapolis, MN; Eau Claire, WI; or Austin, TX. You may be required to work periodically at a Jamf office or collaborative work location with other Jamf employees in your area for certain events or moments that matter. We are only able to accept applications for those based in one of these locations.
What you can expect to do in this role:
Mentors and advises others in related components and broad fundamental expertise areas
Manages identity and access control in Azure
Responsible for the tools, configuration, administration and related processes around our log file collection and monitoring
Provides the framework, processes and execution to ensure support of Jamfs data leakage prevention
Responsible for Web application firewall and related prevention, detection and mitigation of DDoS attack
Vulnerability Management: Accountable for the prevention, detection and mitigation of vulnerabilities through industry standard tools, configuration, administration and internal procedures
Performs regular firewall audits in line with our procedures. Provides the appropriate documentation, supporting evidence and follow up on identified issues requiring remediation
Responsible for tooling, processes and follow up actions related to our external port scanning needs and practices
Handles the identification, planning and implementation of any server hardening needs. Works collaboratively with Operations and other internal teams to communicate, document and implement
Performs security incident analysis, response and remediation
Participates in design and implementation of security automation workflows
Helps manage security data reporting and visualization platform
#LIRemote
What we are looking for:
Minimum of 4 years IT security principles, security operations, techniques, and technologies. (Required)
Minimum of 4 years experience working with Linux/Unix command line interfaces, including Shell or Python scripting (Required)
Minimum of 4 years experience with industry standard configuration management and deployment tools (e.g. Ansible, Azure Resource Manager or other) (Required)
Minimum of 2 years experience administering some or all of the following Azure Services: (Virtual Machines, SQL Database, Load Balancer, Storage) (Preferred)
Minimum of 2 years experience working with monitoring (Logic Monitor, AppDynamics, Zabbix, etc) and logging tools (Splunk, Sumologic, or ELK (ElasticSearch/Logstash/Kibana)) (Preferred)
Advanced knowledge of containerization concepts and Kubernetes (Preferred)
Basic knowledge of MySQL or Postgres (Preferred)
4 year / Bachelor's Degree (Preferred)
A combination of relevant experience and education may be considered
The following certification is preferred: Microsoft Certified: Azure Security Engineer Associate
OTHER REQUIREMENTS:
This position will perform work that the U.S. government has specified can only be performed by a U.S. citizen located physically in the U.S., and therefore any employment offer will be contingent upon verification of both of these requirements. Applicants who are not U.S. citizens or who are located outside of the U.S. are strongly encouraged to apply for other positions at Jamf, which is an equal-opportunity employer.
SECURITY AND PRIVACY REQUIREMENTS:
Participation in ongoing security training is mandatory
Established security protocols will be adhered to, sensitive data will be handled responsibly, and data protection practices are followed, including understanding relevant privacy regulations and reporting breaches
Acknowledging the Jamf Code of Conduct, where applicable security and privacy policies can be found, is a requirement of all roles at Jamf
How we help you reach your best potential:
Named a 2025 Best Companies to Work For by U.S. News
Named a 2024 Best Technology Company to Work For by U.S. News
Named one of Forbes Most Trusted Companies in 2024
Named a 2024 Best Companies to Work For by U.S. News
Our developers work in agile delivery teams to produce new features, improve software components, and are the subject matter experts for our Jamf product offerings.
You will have the opportunity to make a real and meaningful impact for more than 75,000 global customers with the best Apple device management solution in the world.
We constantly push the boundaries of technology, our developers support new innovations and OS releases the moment they are made available by Apple.
Several Jamf engineers are named in patents and with team names like CatDog, ThunderSnow and Dalek you can expect to have some fun while building cutting-edge software.
You will have the opportunity to work with a small and empowered team where the culture is based on trust, ownership, and respect.
We offer a clear career path that enables you to grow under supportive leadership and management
Visit our Jamf Engineering blog to learn more about the innovative projects our team is working on and what we learn from each challenge we solve. A blog written by engineers, for engineers at medium.com/jamf-engineering
22 of 25 world's most valuable brands rely on Jamf to do their best work (as ranked by Forbes).
Over 100,000 Jamf Nation users, the largest online IT community in the world.
The below annual salary range is a general guideline. Multiple factors are taken into consideration to arrive at the final hourly rate/annual salary to be offered to the selected candidate. Factors include, but are not limited to the scope and responsibilities of the role, the selected candidate's work experience, education and training, the work location as well as market and business considerations.
Pay Transparency Range$103,100-$219,700 USD
What it means to be a Jamf?
We are a team of free-thinkers, can-doers, and problem-crushers. We value humility and the relentless pursuit of knowledge. Our culture flows from a spirit of selflessness and relentless self-improvement - driving both personal growth and collective progress throughout our company. We unite around common goals while respecting personal approaches, believing that fulfilled individuals create a thriving, vibrant workplace.
Our aim is simple: hire exceptionally good people who are incredibly good at what they do and let them do it. We provide the support and resources to let everyone be their authentic, best selves at work, at rest, and at play. We are committed to supporting the continual improvement of Apple in the workplace, the organizations that rely on them and the people who keep it all running smoothly.
Above it all, waves our banner of #OneJamf - and the knowledge that when we stand together, we accomplish so much more than we could alone. We seek individuals who share this unwavering journey toward growth to join us in our quest for constant improvement.
What does Jamf do?
Jamf extends the legendary Apple experience people enjoy in their personal lives to the workplace. We believe the experience of using a device at work or school should feel the same, and be as secure as, using a personal device. With Jamf, customers are able to confidently automate Mac, iPad, iPhone and Apple TV deployment, management, and security - anytime, anywhere - to protect the data and applications used by employees in the workplace, students learning in the classroom, and streamline communications in healthcare between patients and providers. More than 2,500 Jamf strong worldwide, we are free-thinkers, can-doers, and problems crushers who are encouraged to bring their whole selves to work each and every day.
Get social with us and follow the conversation at #OneJamf
Jamf is committed to creating an inclusive & supportive work environment for all candidates and employees. Candidates with disabilities or religious beliefs are encouraged to reach out if they need additional support or alternative options to our recruiting processes to accommodate their disability or religious belief. If you need an accommodation, please contact your Recruiter or Recruiting Coordinator directly. Requests for accommodation will be handled confidentially by Recruiting and will not be shared with the hiring manager. Jamf is an equal opportunity employer and does not discriminate against individuals who request reasonable accommodation for disability or religious beliefs. To request accommodations please email us at *******************
Auto-ApplyDefense Spending Analyst
Washington jobs
Knight Federal Solutions is a trusted provider to industry leading prime contractors, the Department of Defense and the Intelligence Community. We have established a company culture that supports our employees, their families and the communities in which they live and work. When you join our team you belong to a group of people that work hard, strive for greatness and care about people.
Our hard work is evident in everything we do. Whether it be supporting large government programs in the areas of Simulation and Training, Information Technology, Intelligence or Engineering we always strive to be the best. It is for this reason that we have been recognized as a World Class Team Supplier by Northrop Grumman and were also named one of Florida's fastest growing companies by Inc. Magazine.
As Knight Federal Solutions continues to grow, we look forward to hiring the best and the brightest to join us in our success!
Responsibilities
Conducts analysis using intelligence and information from multiple sources to assess, interpret, forecast, and explain a range of national security issues and developments that are regional or functional in nature.
Provides all-source analytic support to collections, operations, investigations, and other defense intelligence analytic requirements.
Support the Economics team
Requirements
3+ years of experience producing all-source intelligence analysis reports and briefings and input to IC databases
Experience with Microsoft Office and IC Databases
Knowledge of IC and Combatant Command environments
Ability to develop high-quality deliverables tailored to senior policymakers or defense stakeholders, including complex written products and formal or informal briefings
TS/SCI clearance, willingness to take a polygraph
Bachelor's degree, or 7+ years of experience in all-source analysis in lieu of a degree
Preferred Requirements
3+ years of experience with economic analysis support in the IC macroeconomics
Knowledge of data science principles and databases, including SQL
Knowledge of ICD 203/206 analytic tradecraft standards
Knight Federal Solutions provides equal employment opportunities to all qualified individuals without regard to race, color, religion, sex, gender identity, sexual orientation, pregnancy, age, national origin, physical or mental disability, military or veteran status, genetic information or any other protected classification.
Network Security Analyst with CCIE and Juniper (L2 Support)
Spring, TX jobs
Work authorisation Needed : US Citizens and Greencard
Contract duration (in months)* 6+ Months
Implementation Partner: Infosys
Provide highly available network based security services to match business needs. In-depth operational experience providing authentication, authorization, and accounting (AAA) services and automated mac authentication bypass functionality are the key components for this role. The candidate will utilize strong communication skills as well as enterprise level understanding of network and security technologies to deliver solutions that are both technically sound and supportable.
Responsibilities
- Provide Level 2 support consistent with Network data and voice support models
- Provide network based authentication, authorization, and accounting services
- Implement and support an 802.1x capable network infrastructure
- Understanding of PKI / certificate based authentication
- Allow Mac Authentication Bypass (MAB) functionality through the use of the Great Bay Beacon appliance
- Generation of custom rule sets for accurate profiling and network placement of client systems
- Enterprise level experience designing, implementing, and operating the Cisco ACS 5.x platform
- Experience with Cisco Firewall, VPN, and IPS/ IDS systems
- Recommendations of system changes in support of operational needs and system efficiencies
- Generation of technology documentation and diagramming with tools such as MS Word and Visio
- Ensure network access control systems meet compliance and auditing requirements
- Plan network changes
- Resolve network problems
- Participate in review meetings as required to support network implementation activities
- Provide recovery and restoration of the network in event of a disaster or major incident
Security and Controls - Comply and contribute to completing Security and Controls process regarding Network data and voice technologies
Technologies: TACACS / Radius, AAA, Firewalls, VPN, Intrusion Prevention Systems, MAC Authentication Bypass, PKI, Dynamic routing, L2 / L3 Switching
Equipment: Cisco Access Control Server 5.x, Great Bay Beacon, Cisco ASA Firewall, Cisco IPS Module, NNM, BMC suits, Loglogic, Netscout, RSA EnVision / Splunk Syslog servers, Orion monitoring tools
Additional Information
All your information will be kept confidential according to EEO guidelines.
Network Security Analyst with CCIE and Juniper (L2 Support)
Spring, TX jobs
Work authorisation Needed : US Citizens and Greencard Contract duration (in months)* 6+ Months Implementation Partner: Infosys Provide highly available network based security services to match business needs. In-depth operational experience providing authentication, authorization, and accounting (AAA) services and automated mac authentication bypass functionality are the key components for this role. The candidate will utilize strong communication skills as well as enterprise level understanding of network and security technologies to deliver solutions that are both technically sound and supportable.
Responsibilities
- Provide Level 2 support consistent with Network data and voice support models
- Provide network based authentication, authorization, and accounting services
- Implement and support an 802.1x capable network infrastructure
- Understanding of PKI / certificate based authentication
- Allow Mac Authentication Bypass (MAB) functionality through the use of the Great Bay Beacon appliance
- Generation of custom rule sets for accurate profiling and network placement of client systems
- Enterprise level experience designing, implementing, and operating the Cisco ACS 5.x platform
- Experience with Cisco Firewall, VPN, and IPS/ IDS systems
- Recommendations of system changes in support of operational needs and system efficiencies
- Generation of technology documentation and diagramming with tools such as MS Word and Visio
- Ensure network access control systems meet compliance and auditing requirements
- Plan network changes
- Resolve network problems
- Participate in review meetings as required to support network implementation activities
- Provide recovery and restoration of the network in event of a disaster or major incident
Security and Controls - Comply and contribute to completing Security and Controls process regarding Network data and voice technologies
Technologies: TACACS / Radius, AAA, Firewalls, VPN, Intrusion Prevention Systems, MAC Authentication Bypass, PKI, Dynamic routing, L2 / L3 Switching
Equipment: Cisco Access Control Server 5.x, Great Bay Beacon, Cisco ASA Firewall, Cisco IPS Module, NNM, BMC suits, Loglogic, Netscout, RSA EnVision / Splunk Syslog servers, Orion monitoring tools
Additional Information
All your information will be kept confidential according to EEO guidelines.
Information Security Analyst II
San Diego, CA jobs
Why PlayStation?
PlayStation isn't just the Best Place to Play - it's also the Best Place to Work. Today, we're recognized as a global leader in entertainment producing The PlayStation family of products and services including PlayStation 5, PlayStation 4, PlayStation VR, PlayStation Plus, acclaimed PlayStation software titles from PlayStation Studios, and more.
PlayStation also strives to create an inclusive environment that empowers employees and embraces diversity. We welcome and encourage everyone who has a passion and curiosity for innovation, technology, and play to explore our open positions and join our growing global team.
The PlayStation brand falls under Sony Interactive Entertainment, a wholly-owned subsidiary of Sony Group Corporation.
PlayStation is looking for an Information Security Analyst to join our team and operate the day-to-day Information Security, Risk and Compliance management processes. This is a mixture of processing requests from the business and driving internal security projects such as security audit and assessment. This role requires a sound understanding of technical and engineering terminology, outstanding ability to articulate risk across any security domains (technical and governance) with the demonstrable ability to work independently and process high volumes of security requests on a weekly basis. This role also provides ample opportunity to work across technical and game-related projects with studio and PlayStation engineering teams and therefore requires risk advisory and influencing experience.
Based in San Diego, the candidate will be the key business relationship partner on behalf of Information Security and work on Information Security processes as well as strategic projects across PlayStation and the Studios group. This role will collaborate closely directly with business, technical and third party collaborators, as well as work multi-functionally with our other Information Security specialist teams across the globe to protect PlayStation's intellectual property, data and infrastructure whilst delivering new and evolving games, services and hardware to the market. This is an opportunity to provide security directly to the global PlayStation business, our PlayStation Network and global Studios and their game development.
What you will be doing:
Serve as a primary partner to PlayStation Studios, supporting security risk management across global game development and studio environments.
Triage and manage technical and strategic security risks across studios, ensuring alignment to security strategy and policy compliance.
Engage directly with technical teams and studio leadership to strengthen risk posture, manage vulnerabilities, and drive mitigation strategies.
Act as a trusted advisor to studio teams, driving a culture of embedding “security by design” principles.
Support the creation of risk insights, reporting, and executive briefings that inform leadership on studio security health and emerging trends.
Maintain broad knowledge of emerging security trends, risks, adn technologies that are applicable to the studio business and Sony at large.
Advance the Information Security program through collaborative and cross-team partnerships.
Required Experience:
3+ years of experience in information security, with demonstrated expertise in risk identification and mitigation.
2+ years conducting risk assessments and providing actionable recommendations to technical and business stakeholders.
2+ years working in vulnerability management, including detection, analysis, reporting, or remediation tracking.
2+ years of hands-on experience managing or evaluating cloud environments, networks, and security infrastructure.
2+ years of experience communicating risk and security insights to leadership and cross-functional partners.
Preferred Experience & Attributes:
Background in the gaming or entertainment industry.
Experience leading projects or programs in a security or risk management capacity.
Technical and Security focused certifications a strong preference
Confident communicator able to translate complex security risk concepts for both technical and non-technical audiences.
Comfortable working in a dynamic, fast-paced environment balancing innovation and security priorities.
Proven success working independently to establish relationships, deliver requirements, and communicate effectively.
#LI-GM1
Please refer to our Candidate Privacy Notice for more information about how we process your personal information, and your data protection rights.
At SIE, we consider several factors when setting each role's base pay range, including the competitive benchmarking data for the market and geographic location.
Please note that the base pay range may vary in line with our hybrid working policy and individual base pay will be determined based on job-related factors which may include knowledge, skills, experience, and location.
In addition, this role is eligible for SIE's top-tier benefits package that includes medical, dental, vision, matching 401(k), paid time off, wellness program and coveted employee discounts for Sony products. This role also may be eligible for a bonus package. Click here to learn more.
The estimated base pay range for this role is listed below.$140,000-$210,000 USD
Equal Opportunity Statement:
Sony is an Equal Opportunity Employer. All persons will receive consideration for employment without regard to gender (including gender identity, gender expression and gender reassignment), race (including colour, nationality, ethnic or national origin), religion or belief, marital or civil partnership status, disability, age, sexual orientation, pregnancy, maternity or parental status, trade union membership or membership in any other legally protected category.
We strive to create an inclusive environment, empower employees and embrace diversity. We encourage everyone to respond.
PlayStation is a Fair Chance employer and qualified applicants with arrest and conviction records will be considered for employment.
Auto-Apply