Senior Information Assurance Engineer
Security engineer job in San Antonio, TX
GovCIO is currently hiring a Senior Information Assurance Engineer in support of the Air Force AFSCI network. This position will be located in San Antonio TX and will be an on-site only position.
Responsibilities:
Designs, tests, and implements state-of-the-art secure operating systems, networks, and database products. Conducts risk assessments and provides recommendations for application design. Involved in a wide range of computer security issues including architectures, firewalls, electronic data traffic, and network access. Uses encryption technology, penetration and vulnerability analysis of various security technologies, and information technology security research. Prepares security reports for government agencies.
Performs a wide range of computer security duties, including architectures, firewalls, electronic data traffic, and network access.
Participates in the certification and accreditation processes; performs technical vulnerability assessments of computer security.
Provides business continuity and disaster recovery support.
Engages in intrusion detection and prevention; provides incident reporting and response support.
Conducts ongoing monitoring of computer security requirements and compliance, maintains system security plans and risk mitigation plans.
Trains clients in proper computer security measures and prevention
Specifically, this position will:
Provide support for all vulnerability and compliance scan tool applications and modules (pre-built and customized).
Develop workflows and customize, implement, and maintain the aforementioned applications.
Develop and update standard operating procedures (SOPs) and provide training on existing and new technologies to Government personnel. This is informal office training.
Provide process and operations guides.
Provide technical support in the daily operations and evaluation of existing security tools, products, and future capabilities. Tools shall include, but are not limited to: Security Log Management, Account Management, Asset Management, Vulnerability Management, End Point Security, and any related network security tools. Current tool sets are: ArcSight, Directory Resource Administration (DRA), Automated Compliance Assessment Solution (ACAS), System Center Configuration Manager (SCCM), Tanium, Host Base Security System (HBSS) and Service Now.
Maintain operational oversight and manage Command-level and privileged user accounts for the Enterprise using provided Enterprise tools.
Prepare for and conduct customer briefings, attend, and provide minutes on Technical Exchange Meetings (TEMs), and provide status reports on cybersecurity activities.
Add so,ething about leadership briefs
Develop information systems security studies and reports that address areas of information system security concerns. Ensure cybersecurity requirements are incorporated in system development and sustainment activities. Provide consultant services in all areas of information system security, including: physical, administrative, personnel, computer, operations, and industrial security. Provide security documentation and reports within specified timeframes.
Monitor and report, IAW IC Directives and AFSCI policy, the status of security measures established by the Director of National Intelligence (DNI) and related authorizing officials that protect and defend information and information systems, web-based services, remote hosted applications, discovery, storage, operating systems, public key infrastructure (PKI), and other information technology components and applications for the Enterprise.
Maintain cybersecurity, system security, and sustainment programs. The contractor shall follow all applicable ICD and National Institute of Standards and Technology (NIST) guidance in performing day-to-day duties.
Create, edit, and review security accreditation and authorization packages for the AFSCI Enterprise. Adhere to the RMF process. Input data into appropriate A&A tool. The current toolset used is XACTA. Review logical network drawings, configurations, and control parameters to ensure they are current. Review documentation required to certify new hardware and software systems for deployment.
Monitor and administer the vulnerability and compliance scan tool.
Review AFSCI change proposals for security, interoperability, accreditation and authorization issues or vulnerabilities.
Perform vulnerability and compliance assessments. Conduct security tests and evaluations. Monitor and review Information Assurance Vulnerability Alerts (IAVA) and Information Assurance Vulnerability Bulletins (IAVB).
Track and provide results to appropriate Government entity for review IAW standard operating procedures.
Monitor and report mandated Federal Information Security Management Act (FISMA) statistics for the AFSCI Enterprise.
Provide quarterly report to appropriate Government entity in accordance with IC Directives and AFSCI policy.
Qualifications:
High School with 9+ years (or commensurate experience)
Clearance Required: Current TS/SCI
Required Skills and Experience
MUST have current one of these certifications: CISSP, CISSP-ISSMP, CISM, FITSP-M, GCIA, GCIG, GICSP, GSLC
Strong understanding of RMF workflow tools like eMASS or Xacta
Strong working knowledge of programs working within AFSCI network rules and guides
Experience with network management tools, network engineering principles, network analysis
Expert understanding of A&A process
Possess an expert understanding of current computer security requirement and compliance
Expert ability to maintain System Security and Risk Mitigation plans
Excellent written/verbal communications skills
#NSS #TMK #DSG
Company Overview:
GovCIO is a team of transformers--people who are passionate about transforming government IT. Every day, we make a positive impact by delivering innovative IT services and solutions that improve how government agencies operate and serve our citizens.
But we can't do it alone. We need great people to help us do great things - for our customers, our culture, and our ability to attract other great people. We are changing the face of government IT and building a workforce that fuels this mission. Are you ready to be a transformer?
What You Can Expect
Interview & Hiring Process
If you are selected to move forward through the process, here's what you can expect:
During the Interview Process
Virtual video interview conducted via video with the hiring manager and/or team
Camera must be on
A valid photo ID must be presented during each interview
During the Hiring Process
Enhanced Biometrics ID verification screening
Background check, to include:
Criminal history (past 7 years)
Verification of your highest level of education
Verification of your employment history (past 7 years), based on information provided in your application
Employee Perks
At GovCIO, we consistently hear that meaningful work and a collaborative team environment are two of the top reasons our employees enjoy working here. In addition, our employees have access to a range of perks and benefits to support their personal and professional well-being, beyond the standard company offered health benefits, including:
Employee Assistance Program (EAP)
Corporate Discounts
Learning & Development platform, to include certification preparation content
Training, Education and Certification Assistance*
Referral Bonus Program
Internal Mobility Program
Pet Insurance
Flexible Work Environment
*Available to full-time employees
Our employees' unique talents and contributions are the driving force behind our success in supporting our customers, which ultimately fuels the success of our company. Join us and be a part of a culture that invests in its people and prioritizes continuous enhancement of the employee experience.
We are an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender, gender identity or expression, sexual orientation, national origin, disability, or status as a protected veteran. EOE, including disability/vets.
Posted Pay Range
The posted pay range, if referenced, reflects the range expected for this position at the commencement of employment, however, base pay offered may vary depending on multiple individualized factors, including market location, job-related knowledge, skills, education, experience, and internal equity. The total compensation package for this position may also include other compensation elements, to be discussed during the hiring process. If hired, employee will be in an “at-will position” and the GovCIO reserves the right to modify base salary (as well as any other discretionary payment or compensation program) at any time, including for reasons related to individual performance, GovCIO or individual department/team performance, and market factors.
Posted Salary Range: USD $135,000.00 - USD $140,000.00 /Yr.
Cyber Security Analyst
Security engineer job in Houston, TX
SUMMARY: The Cybersecurity Analyst is responsible for monitoring, documenting, and supporting the cybersecurity posture of the organizations's information technology systems. This role involves reviewing alerts, assisting in the maintenance of cybersecurity configurations, assessing weaknesses, vulnerabilities and escalating potential vulnerabilities or incidents to senior team members. The Cybersecurity Analyst also contributes to the documentation of cybersecurity events and helps ensure compliance with established cybersecurity policies and procedures. This role uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purpose of mitigating threats.
ESSENTIAL DUTIES AND RESPONSIBILITIES:
Provide timely detection, identification, and alerting on potential attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities
Aid in the protection of the company's network and sensitive information using cyber defense tools for continual monitoring and analysis of systems to identify malicious activity including:
Identifying cyber threat tactics and methods
Identifying and correcting gaps in the company's cybersecurity posture
Testing information systems for vulnerabilities
Documenting and escalating incidents
Analyzing network alerts from various sources within the enterprise and determining possible causes of such alerts
Identifying and analyzing anomalies in network traffic or log data
Monitoring risks and implementing cybersecurity systems to prevent attacks or breaches
Responding to urgent cybersecurity events and incidents
Reviewing events and incidents to understand root causes
Monitoring reputation for hostile content directed towards organizational or partner interests
Recommend procedures and/or changes to procedures necessary for good cyber hygiene
Improve the overall cybersecurity posture of the organization's systems
Determine the operational and safety impacts of cybersecurity lapses
Prepare threat and target briefings and situational updates
Monitor threat activities and prepare threat activity reports
Manage and report on adversarial activities
EDUCATION AND REQUIRED EXPERIENCE:
A degree in business or technology is preferred (associate's or bachelors)
3-5 years of experience in IT security
Experience with SIEM, intrusion detection (IDS) and intrusion prevention (IPS) systems preferred
Basic scripting (Python, PowerShell, Bash)
Experience with vulnerability management
Experience with network packet analysis
Experience with log analysis and log management
Experience with Cloud Security Management interfaces
Experience with enterprise authentication systems, such as directory services or identity management platforms
Experience with Incident handling and response preferred
Working knowledge or core cybersecurity concepts such as the CIA triad, encryption algorithms, and risk management processes
Working knowledge of computer networking protocols including how traffic flows within a network
Working knowledge of cybersecurity laws and regulations
Working knowledge of cybersecurity threats, threat characteristics, and vulnerabilities, and threat hunting
Ability to prioritize security requests according to urgency and established criteria
Ability to organize information and alerts from multiple sources to create a holistic picture of cybersecurity threats
General understanding of security frameworks (NIST, MITRE Attack) preferred
Familiarity with the variations, similarities, and differences between IT and OT network environments
Experience working on project teams and project management is preferred
Intermediate understanding of Threat Intelligence research and methodologies
Familiarity with adversarial TTPs
SKILLS, QUALIFICATIONS, AND OTHER REQUIREMENTS:
Demonstrate excellent communication (written, verbal and listening) and interpersonal skills
Superior organizational skills and attention to detail
Must possess a proven ability to deliver high-quality customer service
Ability to triage and prioritize security related data quickly
Ability to respond to work after hours and weekends as needed
PHYSICAL DEMANDS:
Requires sufficient personal mobility and physical reflexes, to permit the employee to function in a general office environment and accomplish tasks and duties as outlined above.
WORK ENVIRONMENT:
The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodation may be made to enable individuals with disabilities to perform the essential functions. The noise level in the work environment is usually quiet.
information security systems engineers
Security engineer job in Rockwall, TX
L3Harris is dedicated to recruiting and developing high-performing talent who are passionate about what they do. Our employees are unified in a shared dedication to our customers' mission and quest for professional growth. L3Harris provides an inclusive, engaging environment designed to empower employees and promote work-life success. Fundamental to our culture is an unwavering focus on values, dedication to our communities, and commitment to excellence in everything we do.
L3Harris Technologies is the Trusted Disruptor in the defense industry. With customers' mission-critical needs always in mind, our employees deliver end-to-end technology solutions connecting the space, air, land, sea and cyber domains in the interest of national security.
L3Harris Engineering & Security Hiring Event - Richardson, Texas
Must have a minimum of 3 years relevant experience and be eligible to obtain a DOD Secret Security Clearance, which requires US Citizenship.
Date: Tuesday, December 9th
Time: 2:00 - 5:30pm
Location: DoubleTree Hotel - 1981 N Central Expy, Richardson, TX 75080
We will be interviewing and hiring for the following positions in the Greenville, Plano, and Rockwall areas:
Systems Engineers
Software Engineers
Structural Engineers
Aerospace Engineers
Electrical Engineers
Mechanical Engineers
Project Engineers
Integration & Test Engineers
Information Security Systems Engineers
Specialty Engineering (Technical Writers, Product Trainers, System Safety Engineers, and Configuration/Data Management)
Security (Cyber Intelligence, Security Systems, Security Officers, Personnel Security Specialist (PERSEC), CSSO, Industrial Security)
Click 'APPLY NOW' to register for this event.
L3Harris Technologies is proud to be an Equal Opportunity Employer. L3Harris is committed to treating all employees and applicants for employment with respect and dignity and maintaining a workplace that is free from unlawful discrimination. All applicants will be considered for employment without regard to race, color, religion, age, national origin, ancestry, ethnicity, gender (including pregnancy, childbirth, breastfeeding or other related medical conditions), gender identity, gender expression, sexual orientation, marital status, veteran status, disability, genetic information, citizenship status, characteristic or membership in any other group protected by federal, state or local laws. L3Harris maintains a drug-free workplace and performs pre-employment substance abuse testing and background checks, where permitted by law.
Please be aware many of our positions require the ability to obtain a security clearance. Security clearances may only be granted to U.S. citizens. In addition, applicants who accept a conditional offer of employment may be subject to government security investigation(s) and must meet eligibility requirements for access to classified information.
By submitting your resume for this position, you understand and agree that L3Harris Technologies may share your resume, as well as any other related personal information or documentation you provide, with its subsidiaries and affiliated companies for the purpose of considering you for other available positions.
L3Harris Technologies is an E-Verify Employer. Please click here for the E-Verify Poster in English or Spanish. For information regarding your Right To Work, please click here for English or Spanish.
Bank Information Security Governance Senior
Security engineer job in San Antonio, TX
Why USAA?
At USAA, our mission is to empower our members to achieve financial security through highly competitive products, exceptional service and trusted advice. We seek to be the #1 choice for the military community and their families.
Embrace a fulfilling career at USAA, where our core values - honesty, integrity, loyalty and service - define how we treat each other and our members. Be part of what truly makes us special and impactful.
The Opportunity
We are seeking a dedicated Bank Information Security Governance Senior.
We offer a flexible work environment that requires an individual to be in the office 4 days per week. This position can be based in our Phoenix, AZ; San Antonio, TX; Plano, TX; Colorado Springs, CO; Chesapeake, VA; Charlotte, NC or Tampa, FL offices. Relocation assistance is not available for this position.
What you'll do:
Supports the first line of defense in ensuring the effectiveness of Information Security (IS) governance, IS risk management, and compliance programs within the Bank Technology Office. Collaborates with Information Technology (IT) and IS teams, business stakeholders, Compliance, Risk Management, Audit Services, and external parties to support IS governance and IS risk and compliance-based initiatives. Acts as a key liaison between the Association's IS function and various Bank business units, ensuring alignment with enterprise security policies and standards.
Continuously monitors IS environments to identify emerging risks related to cybersecurity, infrastructure, applications, and third-party services. Provides consultative services across Bank.
Provides expert insights on the development, implementation, and continuous improvement of IT governance frameworks (e.g., COBIT, ITIL) tailored to the Bank organization's specific needs and strategic objectives.
Analyzes incident trends and control gaps to anticipate potential risk scenarios and recommend preventive measures.
Conducts forward-looking risk assessments for new technology initiatives, system changes, and digital transformation projects.
Analyzes incident trends and control gaps to anticipate potential risk scenarios and recommend preventive measures.
Partners with and leads IT/IS teams to embed IS risk considerations early in the project lifecycle and ensure timely mitigation strategies.
Leads the development, implementation, and continuous improvement of IT governance frameworks (e.g., COBIT, ITIL) tailored to the organization's specific needs and strategic objectives.
Defines, maintains, and enforces IS policies, standards, and procedures to ensure compliance with relevant laws, regulations, and industry best practices.
Ensures IS risk compliance with legal, regulatory, and contractual requirements, coordinating audits and assessments.
Provides governance oversight for IS related initiatives, ensuring they adhere to established standards, policies, and risk management practices.
Mentors junior members of the IS governance team, providing guidance and support in their professional development.
Enhances, and maintains awareness of the risk governance framework and its elements (RCSA).
Performs root cause analysis to determine likelihood, impact, and mitigation approaches of identified risks.
Prepares metrics reporting and participates in the metrics refresh process.
Maintains awareness of cloud computing principles and AI and understands potential IS risks inherent within this discipline.
Ensures risks associated with business activities are effectively identified, measured, monitored, and controlled in accordance with risk and compliance policies and procedures.
What you have:
Bachelor's degree in Information Technology, Computer Science, Business Administration, or a related field; OR 4 years of related experience (in addition to the minimum years of experience required) may be substituted in lieu of degree.
6 years experience supporting IS governance, IS risk management, compliance, or IT audit activities
In-depth knowledge and application of IT governance frameworks such as COBIT, ITIL, ISO 27001, and NIST, CIS Controls and CMMC
Experience working on and implementing IT and/or IS policies, standards, and procedures.
Experience leading and coordinating IS audits and assessments and ensuring compliance with regulatory requirements.
A strong understanding of regulatory and compliance requirements applicable to the organization.
Ability to interpret complex IT/IS environments and detect early warning signals.
Experience in identifying potential failure points and simulating risk scenarios.
Proficiency in using data to identify trends, anomalies, and emerging risks.
Understanding of cloud, cybersecurity, and digital transformation risks.
Ability to articulate risk insights and influence stakeholders to take preventive actions.
Familiarity with GRC platforms, vulnerability management tools, and risk dashboards.
What sets you apart:
Information Technology or Security certifications (e.g., CISA, CRISC, CISM, CISSP, CGEIT, CIA, NIST, COBIT, etc.).
Familiarity with financial institutions regulations (GLBA, FFIEC Handbooks, PCI DSS)
Work experience in highly regulated work environments including other large financial institutions
Experience with data-driven analysis using AI tools and collaborating to drive process innovation
Highly self-motivated individual capable of working independently and proactively handling their workload with minimal direct supervision.
Strong analytical skills and demonstrated experience collaborating effectively with leadership at all levels within an organization.
Compensation range: The salary range for this position is: $114,080-$218,030.
USAA does not provide visa sponsorship for this role. Please do not apply for this role if at any time (now or in the future) you will need immigration support (i.e., H-1B, TN, STEM OPT Training Plans, etc.).
Compensation: USAA has an effective process for assessing market data and establishing ranges to ensure we remain competitive. You are paid within the salary range based on your experience and market data of the position. The actual salary for this role may vary by location.
Employees may be eligible for pay incentives based on overall corporate and individual performance and at the discretion of the USAA Board of Directors.
The above description reflects the details considered necessary to describe the principal functions of the job and should not be construed as a detailed description of all the work requirements that may be performed in the job.
Benefits: At USAA our employees enjoy best-in-class benefits to support their physical, financial, and emotional wellness. These benefits include comprehensive medical, dental and vision plans, 401(k), pension, life insurance, parental benefits, adoption assistance, paid time off program with paid holidays plus 16 paid volunteer hours, and various wellness programs. Additionally, our career path planning and continuing education assists employees with their professional goals.
For more details on our outstanding benefits, visit our benefits page on USAAjobs.com.
Applications for this position are accepted on an ongoing basis, this posting will remain open until the position is filled. Thus, interested candidates are encouraged to apply the same day they view this posting.
USAA is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Auto-ApplyCyber Security Architect
Security engineer job in Dallas, TX
Privileged Access Management (PAM) Architect
Westlake, TX
Responsibilities:
10+ years of experience in defining and delivering cybersecurity architecture, strategies and solutions with demonstrated experience in the financial services industry or other highly regulated sectors.
Bachelor's degree in Information Security, Computer Science, or a related field; a Master's degree is preferred.
Strong industry experience in architecting and designing PAM solutions and deployment across the enterprise.
Deep technical understanding of PAM capabilities, controls and security technologies in areas related to identity and access management to address privilege-based risk.
Familiarity with regulatory requirements related to PAM, such as PCI DSS, HIPAA, or GDPR.
Expertise with build vs. buy solution options.
Working knowledge and experience with Cloud Architectures and the ability to address the security considerations of secure cloud computing including IAM with enterprise services, SSDLC, data protection, cryptography and key management.
Demonstrate leadership and consensus building skills with which you influence decisions and engage across Fidelity and at all levels of the organization
Exceptional communication and interpersonal skills, with the ability to effectively communicate complex technical concepts to non-technical stakeholders.
Relevant certifications such as Certified Information Systems Security Professional (CISSP) or Certified Information Security Manager (CISM), Certified in Risk and Information Systems Control (CRISC) are highly desirable.
They need a minimum of 10 years of Architecture experience, and someone who has recent experience working with Secrets Management (Hashi Vault)
Looking for a true Architect, someone who can look at problem, how they can address the problem, and map it out. Someone is an Agent of Change and Patience.
They'll be dealing with some high level info within Fidelity, so someone who is open minded, and non emotional when debating thoughts and opinions is key.
Director Information Security
Security engineer job in Richardson, TX
We are seeking an experienced and strategic Director of Data Security and Governance to lead our comprehensive data protection program. This critical role involves establishing and enforcing data security policies to meet stringent regulatory requirements, including the International Traffic in Arms Regulations (ITAR), and fulfilling complex data security obligations within commercial contracts. You will be responsible for building our data governance framework from the ground up, including implementing a robust data classification program and deploying modern security solutions like Data Security Posture Management (DSPM) and Data Rights Management (DRM)., in addition to managing the DLP program.
Detailed Description
Performs tasks such as, but not limited to, the following:
Strategy & Policy Development: Design, implement, and oversee the enterprise-wide data security and governance strategy, policies, and standards.
Compliance & Regulatory Oversight: Serve as the primary expert on data security requirements for ITAR and other government regulations. Ensure all data handling processes and systems are compliant with contractual and legal obligations.
Data Classification Program: Develop and manage a corporate data classification policy and program. Work with business units to identify, classify, and protect sensitive and regulated data throughout its lifecycle.
Technology Implementation: Lead the selection, implementation, and operationalization of a Data Security Posture Management (DSPM) solution to provide visibility and control over our data landscape.
Data Rights Management (DRM): Implement and manage a DRM solution to control access to and usage of sensitive data, ensuring that only authorized individuals can access and interact with protected information according to defined policies.
Risk Management: Conduct regular data security risk assessments, identify vulnerabilities, and oversee remediation efforts to mitigate risks.
Incident Response: Develop and lead the data-focused components of the incident response plan, including containment, investigation, and reporting of data breaches.
Collaboration & Training: Partner closely with Legal, IT, Engineering, and business stakeholders to embed data security principles into their operations. Develop and deliver training programs to raise awareness about data governance and security best practices.
Typical Experience
Minimum of 10 years of experience in cybersecurity and data governance, with at least 4 years in a leadership role.
Proven track record of successfully implementing a data classification program across an enterprise.
Direct experience with the procurement and deployment of DSPM and DRM technologies.
Skills & Knowledge:
Deep understanding of data protection principles, including encryption, access control, data loss prevention (DLP), and data discovery.
Expert knowledge of security frameworks such as NIST Cybersecurity Framework, NIST 800-171, and ISO 27001.
Excellent project management skills and the ability to lead cross-functional teams.
Strong communication skills, with the ability to articulate complex security concepts to technical and non-technical audiences.
Certifications (Preferred):
Certified Information Systems Security Professional (CISSP)
Certified Information Security Manager (CISM)
Certified Information Privacy Professional (CIPP)
Typical Education
Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or related field, or equivalent experience.
A Master's degree is a plus.
Educational requirements may vary by geography.
Physical Demands
Duties of this position are performed in a normal office environment.
Duties may require extended periods of sitting and sustained visual concentration on a computer monitor or on numbers and other detailed data. Repetitive manual movements (e.g., data entry, using a computer mouse, using a calculator, etc.) are frequently required.
Notes
This job description is not intended to be an exhaustive list of all duties and responsibilities of the position. Employees are held accountable for all duties of the job. Job duties and the % of time identified for any function are subject to change at any time.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Celestica's policy on equal employment opportunity prohibits discrimination based on race, color, creed, religion, national origin, gender, sexual orientation, gender identity, age, marital status, veteran or disability status, or other characteristics protected by law.
This policy applies to hiring, promotion, discharge, pay, fringe benefits, job training, classification, referral and other aspects of employment and also states that retaliation against a person who files a charge of discrimination, participates in a discrimination proceeding, or otherwise opposes an unlawful employment practice will not be tolerated. All information will be kept confidential according to EEO guidelines.
COMPANY OVERVIEW:
Celestica (NYSE, TSX: CLS) enables the world's best brands. Through our recognized customer-centric approach, we partner with leading companies in Aerospace and Defense, Communications, Enterprise, HealthTech, Industrial, Capital Equipment and Energy to deliver solutions for their most complex challenges. As a leader in design, manufacturing, hardware platform and supply chain solutions, Celestica brings global expertise and insight at every stage of product development - from drawing board to full-scale production and after-market services for products from advanced medical devices, to highly engineered aviation systems, to next-generation hardware platform solutions for the Cloud. Headquartered in Toronto, with talented teams spanning 40+ locations in 13 countries across the Americas, Europe and Asia, we imagine, develop and deliver a better future with our customers.
Celestica would like to thank all applicants, however, only qualified applicants will be contacted.
Celestica does not accept unsolicited resumes from recruitment agencies or fee based recruitment services.
This location is a US ITAR facility and these positions will involve the release of export controlled goods either directly to employees or through the employee's movement within the facility. As such, Celestica will require necessary information from all applicants upon an applicant's acceptance of employment to determine if any export control exemptions or licenses must be filed.
Systems Engineer II/III--ARV
Security engineer job in Slidell, LA
Client is seeking engineers of all disciplines to support the United States Marine Corps Advanced Reconnaissance Vehicle (ARV) program.
For this program, Client has developed the Cottonmouth ARV, a recon vehicle to be feared and a force-multiplier armed to the fangs with advanced full-spectrum reconnaissance and surveillance sensors. It's expertly designed to defeat threats beyond line of sight and comes complete with cutting-edge technologies that will keep adversaries up at night.
Cottonmouth was developed using a Modular Open Systems Approach (MOSA) that is Ground Vehicle Operating System (GVOS) based employing the Tactical Assault Kit Extended (TAK-X) framework for easy capability integration.
This modern vehicle platform has superior mobility capabilities to tackle treacherous off-road terrain and waterways while keeping Marines safe thanks to its advanced survivability suite and Human System Interface (HSI) focus.
Amphibious mobility, unrivaled versatility, and electronic warfare capabilities define a vehicle that is adaptable, stealthy and thrives wherever enemies hide.
Our teams are engaged in multiple cutting-edge development programs for defense applications.
Responsibilities:
Supporting full-lifecycle engineering design and development activities on established UxS and disruptive new products.
Using technical acumen and problem-solving skills toward the execution of systems engineering tasks - including (but not limited to) requirements analysis, impact assessments, systems modeling (SysML), trade studies, requirements derivation, design review support, integration planning, test, verification, risk management, and engineering analysis.
Preparing and presenting systems engineering work products to internal review teams and external customers at program milestone reviews.
Interacting daily with technical leads, program managers, planners, technicians, and other engineers.
Driving tasks to completion independently - aided by appropriate supervision and mentoring.
Collaborating with others within the workgroup, with other departments, and the customer.
Qualifications:
Bachelor's and/or master's degree in systems engineering, test engineering, or a related engineering field.
Experience with hardware and/or software integration, managing requirements derivation and allocation, or architecture design.
Experience with DOORS, JIRA, and Cameo/MagicDraw is strongly preferred.
Experience in a Department of Defense (DoD) environment is preferred.
Experience or certifications in Model-Based System Engineering (MBSE) is a plus.
Experience with Windows and/or Unix operating systems is a plus.
Effective and efficient writing and presentation skills.
**3rd party and subcontract staffing agencies are not eligible for partnership on this position. 3rd party subcontractors need not apply.
This position requires candidates to be eligible to work in the United States, directly for an employer, without sponsorship now or anytime in the future.
This client is a US Federal Government contractor and is legally required to hire US Citizens. US Citizens will only be considered for this role**
Application Security Engineer
Security engineer job in DeRidder, LA
AMERISAFE is seeking a detail-oriented, productivity driven professional to add to our “Excellence Team." The Application Security Engineer will have responsibility within the IS and IT department for securely analyzing, planning, coding and documenting software systems and technology solutions in support of business objectives. This position will work under the leadership of the Vice President of Information Security and will be remote.
Upon an offer and acceptance of employment with AMERISAFE, you will be required to complete our pre-employment screening, which includes a criminal background check, a 10-panel drug test and, if applicable, a review of your motor vehicle report. A 10-panel drug test includes amphetamine/methamphetamine, barbiturates, benzodiazepines, cocaine metabolite (BZE), marijuana metabolite (THCA), methadone, methaqualone, codeine/morphine, phencyclidine, propoxyphene.
Qualifications:
Relevant BS/BA degree and/or equivalent education/work experience in software system analysis and development
Proven ability to work collaboratively and constructively with IT teams, including development, quality, support, and infrastructure, to produce high-quality software products
Experience in understanding, capturing, and documenting technical and functional system requirements to meet business needs and expectations
Experience with multiple application and database development toolsets and methodologies, especially Microsoft technologies
Experience with software development life cycle concepts, practices, techniques, and procedures
Excellent written and verbal communication skills and demonstrated ability to effectively communicate with staff, co-workers, management, and external personnel
Excellent analytical, interpretive, problem-solving, and evaluative skills for decision making
Excellent organizational, reporting, and time management skills
Demonstrated customer-service orientation and attitude
Demonstrated ability in creative thinking, self-direction, and initiative
Demonstrated ability to thrive in a dynamic and high-pressure environment
Willing to work extended hours and weekends and travel occasionally
Foster the AMERISAFE culture by embracing the pillars of consistency, focus, frugality, ownership and service
Duties and Responsibilities:
Participate in and support a highly collaborative development environment
Collaborate with cross-functional teams to design, develop, and implement application security and delivery solutions that ensure the confidentiality, integrity, and availability of critical applications and services
Develop automation to streamline network and application deployment, configuration, and maintenance tasks
Implement and manage Web Application API Protection and Web Application Firewall solutions to safeguard web applications and APIs from threats and vulnerabilities
Conduct requirements gathering and documentation through investigation of existing software systems, observation of current business processes, and interviews with company staff
Analyze, plan, design, develop, code, and debug new software systems as well as enhancements to legacy systems according to specified requirements
Evolve and standardize cybersecurity reference architectures for new systems and applications covering on-prem, SaaS, IaaS, and PaaS
Create performance metrics to measure the effectiveness of new and existing cybersecurity capabilities, tools, and services
Identify and report risks and evaluate opportunities associated with software systems and other technology solutions
Support and adhere to established IT and Company policies, procedures, standards, and controls
The position may require additional duties to be assigned.
Auto-ApplyManual Ethical Hacker
Security engineer job in Addison, TX
Denver, Colorado;Seattle, Washington; Addison, Texas; Jersey City, New Jersey; Boston, Massachusetts; Charlotte, North Carolina; Washington, District of Columbia; Jacksonville, Florida; Chicago, Illinois **To proceed with your application, you must be at least 18 years of age.**
Acknowledge
Refer a friend
**To proceed with your application, you must be at least 18 years of age.**
Acknowledge (******************************************************************************************
**:**
At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. Responsible Growth is how we run our company and how we deliver for our clients, teammates, communities and shareholders every day.
One of the keys to driving Responsible Growth is being a great place to work for our teammates around the world. We're devoted to being a diverse and inclusive workplace for everyone. We hire individuals with a broad range of backgrounds and experiences and invest heavily in our teammates and their families by offering competitive benefits to support their physical, emotional, and financial well-being.
Bank of America believes both in the importance of working together and offering flexibility to our employees. We use a multi-faceted approach for flexibility, depending on the various roles in our organization.
Working at Bank of America will give you a great career with opportunities to learn, grow and make an impact, along with the power to make a difference. Join us!
**Job Description:**
Manual Ethical Hacking is part of the Application Development Security Framework Program within Bank of America's Cyber Security Assurance Offensive Security group. The program provides services to assess the vulnerability of the bank's applications to malicious hacking activity.
This intermediate technical role is responsible for performing application security assessments of the bank's technologies, applications, and cyber security controls while adapting testing methods to evolving and emerging threats. Key responsibilities include performing research, understanding the bank's security policies, working with the appropriate partners to complete assessments and simulations, identifying misconfigurations and vulnerabilities, and reporting on associated risk. These individuals partner closely with security partners, CIO clients and multiples lines of business.
Key Responsibilities in order of importance:
+ Perform assigned analysis of internal and external threats on information systems and predict future threat behavior
+ Incorporate threat actors' tactics, techniques, and procedures into offensive security testing
+ Perform assessments of the security, effectiveness, and practicality of multiple technology systems
+ Leverage innovative thinking to help solve problems or introduce new ideas to processes or products applicable to offensive security.
+ Prepare and present detailed technical information for various media including documents, reports, and notifications
+ Provide clear and practical advice regarding managed risks
+ Learn and develop advanced technical and leadership skills, Mentor Junior assessors in technical tradecraft and soft skills
Required Skills:
+ Minimum of 4 years of professional pentesting, application security or ethical hacking experience, preferably in a large, complex, enterprise environment
+ Detailed technical knowledge in at least 3 of the following areas: security engineering; application architecture; authentication and security protocols; application session management; applied cryptography; common communication protocols; mobile frameworks; single sign-on technologies; exploit automation platforms; RESTful web services
+ SQL injection/XSS attack without the use of tools
+ Experience performing manual code reviews for security relevant issues
+ Experience working with SAST tools to identify vulnerabilities
+ Able to manually identify and reproduce findings, discuss remediation concepts, develop PoCs for vulnerabilities, use scripting/coding techniques, proficiently execute common penetration testing tools, triage, and support incidents, and produce high value findings
+ Experience performing manual web application assessments i.e., must be able to simulate a
+ Knowledge of network and Web related protocols/technologies (e.g., UNIX/LINUX, TCP/IP, Cookies)
+ Experience with vulnerability assessment tools and penetration testing techniques
+ Solid programming/debugging skills
+ Experience of using a variety of tools, included, but not limited to, IBM AppScan, Burp and SQL Map
+ Threat Analysis
+ Innovative Thinking
+ Technology Systems Assessment
+ Technical Documentation
+ Advisory
Desired:
+ CISSP, CEH, OSCP, OSWE, GPEN, PenTest+ or similar
+ Strong programming/scripting skills
This job will be open and accepting applications for a minimum of seven days from the date it was posted.
**Shift:**
1st shift (United States of America)
**Hours Per Week:**
40
Bank of America and its affiliates consider for employment and hire qualified candidates without regard to race, religious creed, religion, color, sex, sexual orientation, genetic information, gender, gender identity, gender expression, age, national origin, ancestry, citizenship, protected veteran or disability status or any factor prohibited by law, and as such affirms in policy and practice to support and promote the concept of equal employment opportunity, in accordance with all applicable federal, state, provincial and municipal laws. The company also prohibits discrimination on other bases such as medical condition, marital status or any other factor that is irrelevant to the performance of our teammates.
View your **"Know your Rights (************************************************************************************** "** poster.
**View the LA County Fair Chance Ordinance (************************************************************************************************** .**
Bank of America aims to create a workplace free from the dangers and resulting consequences of illegal and illicit drug use and alcohol abuse. Our Drug-Free Workplace and Alcohol Policy ("Policy") establishes requirements to prevent the presence or use of illegal or illicit drugs or unauthorized alcohol on Bank of America premises and to provide a safe work environment.
Bank of America is committed to an in-office culture with specific requirements for office-based attendance and which allows for an appropriate level of flexibility for our teammates and businesses based on role-specific considerations. Should you be offered a role with Bank of America, your hiring manager will provide you with information on the in-office expectations associated with your role. These expectations are subject to change at any time and at the sole discretion of the Company. To the extent you have a disability or sincerely held religious belief for which you believe you need a reasonable accommodation from this requirement, you must seek an accommodation through the Bank's required accommodation request process before your first day of work.
This communication provides information about certain Bank of America benefits. Receipt of this document does not automatically entitle you to benefits offered by Bank of America. Every effort has been made to ensure the accuracy of this communication. However, if there are discrepancies between this communication and the official plan documents, the plan documents will always govern. Bank of America retains the discretion to interpret the terms or language used in any of its communications according to the provisions contained in the plan documents. Bank of America also reserves the right to amend or terminate any benefit plan in its sole discretion at any time for any reason.
Network Security Analyst
Security engineer job in Austin, TX
Support senior cybersecurity staff in evaluating cybersecurity risks across commercial real estate (CRE) environments. Responsibilities include assisting with network security assessments, reviewing access controls, identifying common misconfigurations, running vulnerability scans, documenting networks/systems, and preparing clear reports. Scope spans both IT and OT (building systems such as BMS/BAS, HVAC, access control, CCTV).
Key Responsibilities
Perform asset discovery and initial scans to identify hosts, services, and firmware versions (e.g., Nmap).
Review firewalls, VPNs, and endpoint security to identify misconfigurations and vulnerabilities
Evaluate switch/router configurations for proper segmentation
Document current-state diagrams and asset inventories
Assess BMS/BAS, IoT, and physical security systems for cyber risk with minimal disruption to operations.
Identify common gaps (weak/default credentials, unpatched systems, outdated TLS, flat networks, exposed management interfaces, insecure vendor remote access).
Support remediation by coordinating with IT teams, vendors, and property managers; verify fixes and retest critical findings.
Prepare and maintain assessment artifacts: asset lists, risk-rated findings, evidence, compliance checklists, and client-ready reports.
Track emerging threats and advisories relevant to smart buildings/IoT and CRE environments; summarize impact for the team.
Qualifications
Associate's or Bachelor's in Cybersecurity/IT (or 2+ years equivalent hands-on experience).
Familiarity with core security technologies: Firewalls (e.g., Fortinet, Palo Alto), IAM/MFA (e.g., Entra ID/Azure AD), and EDR (e.g., SentinelOne).
Intermediate networking: TCP/UDP, routing basics, Layer-3 switches, VPNs (IPsec/SSL), VLANs, ACLs, NAT, DHCP/DNS, Wi-Fi/WPA3.
Working knowledge of Windows client/server; basic Linux familiarity.
Strong documentation and communication skills; ability to translate technical findings into clear business impact.
Nice to Have
Exposure to vulnerability management tooling and concepts.
OT/IoT awareness: BACnet/Modbus basics, safety-first testing on live control networks, maintenance-window/change-control etiquette.
Firewalls and platforms: Palo Alto, Fortinet, Check Point; switch stacks (Cisco Catalyst/Meraki, UniFi).
Identity, privileged access, and remote access hygiene
Endpoint and device management
Scripting/automation
Ticketing and knowledge tools (ServiceNow/Jira/Confluence); diagramming (Visio/draw.io).
Familiarity with frameworks and benchmarks: NIST CSF 2.0, CIS Controls
Travel: Regular on-site visits to local properties (50%) with occasional out-of-area travel (5-10%)
Benefits
Medical, dental, and vision insurance
Life insurance
Long-term disability
Paid vacation
Paid holidays
Simple IRA (401K equivalent) for eligible employees
Stocked snack bar
Company-sponsored outings
Fitness center onsite
Network Security Analyst
Security engineer job in San Antonio, TX
Network Security AnalystLOCATIONSan Antonio, TX 78208CLEARANCETS/SCI Full Poly (Please note this position requires full U.S. Citizenship) KEY SUMMARYWe are looking for a detail-oriented and proactive Network Security Analyst to join our cybersecurity team. In this role, you will monitor, analyze, and protect the organization's network infrastructure against potential threats and vulnerabilities. You will be responsible for identifying security risks, responding to incidents, and implementing measures to safeguard sensitive information. Collaborating with cross-functional teams, you will play a key role in enhancing the organization's overall network security posture. The ideal candidate is passionate about cybersecurity, thrives in a dynamic environment, and is committed to staying ahead of emerging threats and technologies.
*** Please note that our job openings are dynamic and can open or close quickly (much faster than we can publish). If you do not see an opening you are looking for, know that we see almost all types of positons. We strive to keep our listings up to date, but please consider submitting your current resume. Our team will work with you to identify the most recent opportunities that align with your skillset and career goals. We look forward to you joining our family. ***
SIMILAR CAREER TITLESCybersecurity Analyst, Information Security Analyst, Security Operations Center (SOC) Analyst, Network Defense Analyst, Threat Intelligence Analyst, IT Security Specialist, Vulnerability Analyst, Incident Response Analyst, Security Monitoring Analyst, Cyber Defense Analyst, Infrastructure Security Analyst, etc.DEGREE (Level Desired) Bachelor's DegreeALTERNATE EXPERIENCEGeneral comment on degrees: Most contracts allow additional experience (4-5 years) in lieu of a Bachelor's Degree. Some contracts give 4-5 years experience credit for a Bachelor's Degree. Some contracts give 2 years experience credit for a Master's Degree. We will work with you to find the right fit.POSITION RESPONSIBILITIES
Monitor network traffic for anomalies
Investigate and resolve security incidents
Maintain and update security systems
Generate and analyze security reports
Assist in developing incident response plans
Ensure adherence to security policies
REQUIRED SKILLS
Proficiency in monitoring tools like IDS/IPS
Strong analytical and problem-solving skills
Understanding of network protocols (TCP/IP, DNS)
Knowledge of malware analysis tools
Ability to interpret security logs
Familiarity with vulnerability scanning tools
DESIRED SKILLS
Experience with advanced threat detection
Knowledge of forensics methodologies
Understanding of regulatory frameworks (e.g., GDPR, HIPAA)
Experience with SOC workflows
Familiarity with automation and scripting
Knowledge of threat intelligence platforms
PLUG IN to CYMERTEK - And design your future... YOUR FOREVER CAREER STARTS HERE
Are you looking for more than just a job? Join a company where employees are treated like family, and your career is built to last. We are a growing small business and a trusted federal contractor offering full scope consulting services in information technology, cybersecurity, and analyst workforce development.
At our company, you come first. We're committed to creating an environment where you'll thrive professionally and personally. We provide meaningful, challenging work using cutting-edge technologies while investing in your growth and success. With direct access to company leadership, a laid-back and inclusive atmosphere, and exceptional work-life balance, you'll feel valued every day.
We also believe in taking care of our family - both yours and ours. Our benefits are phenomenal, family-friendly, and designed with your well-being in mind. From employee and family events to career-long support, we create a community you'll never want to leave.
Ready to make your next move the best one? Join us and experience the difference.
BENEFITS
Excellent Salaries
Flexible Work Schedule
Cafeteria Style Benefits
10% - 401k Matching (Vested Immediately)
Additional 401k Profit Sharing
30 days Paid Leave/Holiday (No Use or Lose!)
The day off for your birthday
Medical/Dental/Vision - 100% employee coverage. ($1200 allowance - or a bonus)
HSA/FSA
AFLAC
Long Term/Short Term Disability - 100% employee coverage. No cost to you.
Life Insurance - 100% employee coverage. No cost to you.
Additional Discretionary Life Insurance
Paid Training
No long, wordy reviews with tons of paperwork!!!
Referral bonus program with recurring annual payments
HOW TO APPLY
Email us at ***************** or apply today: ****************
Want to see what our employees think? Click here .
EQUAL OPPORTUNITY EMPLOYER STATEMENT
Cymertek is proud to be an Equal Opportunity Employer committed to fostering an inclusive and diverse workplace. We embrace and celebrate differences in our employees, recognizing that a diverse workforce enhances our creativity, innovation, and overall success. At Cymertek, employment decisions are made based on merit, qualifications, and business needs without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, veteran status, or any other characteristic protected by applicable laws. We believe in creating an environment where all individuals are treated with respect and dignity, and where opportunities for professional growth and advancement are accessible to everyone, regardless of background or identity.
Easy ApplyNetwork Security Analyst with CCIE and Juniper (L2 Support)
Security engineer job in Spring, TX
Work authorisation Needed : US Citizens and Greencard
Contract duration (in months)* 6+ Months
Implementation Partner: Infosys
Provide highly available network based security services to match business needs. In-depth operational experience providing authentication, authorization, and accounting (AAA) services and automated mac authentication bypass functionality are the key components for this role. The candidate will utilize strong communication skills as well as enterprise level understanding of network and security technologies to deliver solutions that are both technically sound and supportable.
Responsibilities
- Provide Level 2 support consistent with Network data and voice support models
- Provide network based authentication, authorization, and accounting services
- Implement and support an 802.1x capable network infrastructure
- Understanding of PKI / certificate based authentication
- Allow Mac Authentication Bypass (MAB) functionality through the use of the Great Bay Beacon appliance
- Generation of custom rule sets for accurate profiling and network placement of client systems
- Enterprise level experience designing, implementing, and operating the Cisco ACS 5.x platform
- Experience with Cisco Firewall, VPN, and IPS/ IDS systems
- Recommendations of system changes in support of operational needs and system efficiencies
- Generation of technology documentation and diagramming with tools such as MS Word and Visio
- Ensure network access control systems meet compliance and auditing requirements
- Plan network changes
- Resolve network problems
- Participate in review meetings as required to support network implementation activities
- Provide recovery and restoration of the network in event of a disaster or major incident
Security and Controls - Comply and contribute to completing Security and Controls process regarding Network data and voice technologies
Technologies: TACACS / Radius, AAA, Firewalls, VPN, Intrusion Prevention Systems, MAC Authentication Bypass, PKI, Dynamic routing, L2 / L3 Switching
Equipment: Cisco Access Control Server 5.x, Great Bay Beacon, Cisco ASA Firewall, Cisco IPS Module, NNM, BMC suits, Loglogic, Netscout, RSA EnVision / Splunk Syslog servers, Orion monitoring tools
Additional Information
All your information will be kept confidential according to EEO guidelines.
Cyber Defense Analyst III
Security engineer job in San Antonio, TX
Essential Job Functions
Use information collected from a variety of sources to monitor network activity and analyze it for evidence of anomalous behavior.
Identify, triage and report events that occur in order to protect data and information systems.
Recommend proactive security measures.
Notify stakeholders of suspected incidents, articulating technical information surrounding the suspected incident.
Implement mitigations in accordance with cyber incident response plan.
Conduct PCAP analysis.
Perform advanced manual analysis to hunt previously unidentified threats.
Demonstrated ability to analyze and identify network and host-based security threats.
Understanding of snort filters and their use in IDS alerts.
Understanding of network hardening methodologies.
Working knowledge of enterprise-level IDS/IPS and firewall topologies.
Provide subject matter expert (SME)-level analysis of advanced adversarial Tactics, Techniques and Procedures (TTPs).
Develop and deploy effective threat identifying signatures and countermeasures to various sensors and intrusion prevention systems.
Lead and mentor team members as a technical expert.
Minimum Required Qualifications
Due to the nature of this position and the information that employees will be required to access, U.S. Citizenship is required.
Required Security Clearance: TS/SCI with FS Poly.
Required High School Diploma.
8 years of demonstrated experience as a Cyber Defense Analyst. 2 years of experience can be substituted by a technical Bachelor's Degree.
Two years of experience with TCP/IP.
Two years of experience with tcpdump or Wireshark/tshark.
Requires GIAC Global Certified Incident Handler (GCIH) certification.
Physical Security Systems Engineer #2982
Security engineer job in Dallas, TX
Physical Security Systems Engineer Contract Length: 6+ Month Contract The Consultant must physically reside in Texas and be available for onsite interviews and daily onsite work.
We are seeking a Physical Security Systems Engineer to support and maintain critical applications that power our client's Physical Security Operations Center (PSOC). This position will focus on the configuration, administration, and ongoing management of Lenel OnGuard and Genetec platforms. The ideal consultant will be a detail-oriented professional with a strong foundation in Windows/Linux server administration, automation scripting, and real-time application support.
Qualifications/Requirements:
Bachelor's degree in Computer Science, Engineering, or related field.
Must have 5+ years in systems engineering, application support, or IT infrastructure administration.
Strong background and hands-on experience configuring and supporting Lenel OnGuard and/or Genetec security systems.
Proficiency with Windows and Linux server environments including patching, upgrades, and troubleshooting.
Experience writing or running scripts using PowerShell, Bash, or Python to automate maintenance and monitoring tasks.
Familiarity with JIRA or similar ticketing tools for issue management and workflow tracking.
Strong attention to detail, documentation habits, and ability to create runbooks or SOPs.
Excellent collaboration and communication skills; ability to work with internal teams and external vendors.
Must be available for 100% onsite work in Dallas, TX, and occasional weekend coverage as required.
Duties/Responsibilities:
Configure, install, and maintain Lenel OnGuard and Genetec applications across Windows and Linux servers.
Serve as the primary point of contact for physical security applications, ensuring uptime, stability, and compliance with client standards.
Manage JIRA tickets, prioritize workload, and provide timely resolution for application and server issues.
Collaborate with the Client's Physical Security Team and software vendors to coordinate patches, upgrades, and system enhancements.
Perform system performance checks, backups, and monitoring to ensure reliability and security.
Develop and maintain runbooks, configuration documents, and detailed technical procedures.
Support the PSOC environment with after-hours or weekend coverage as needed.
Genius Road, LLC is proud to be a Certified Women's Business Enterprise, an Equal Opportunity Employer and values diversity. All employment is decided on the basis of qualifications, merit and business need.
Sr First Line Defense Analyst (On-site)
Security engineer job in Coppell, TX
Exceed the expectations of our residential mortgage borrowers & business partners through superior service, simple processes, and effective communications. We deliver on this mission by empowering our employees by encouraging and recognizing superior performance and innovative solutions, by promoting teamwork and divisional cooperation.
Primary Function
The Sr First Line Defense Analyst is responsible for utilizing their GSE servicing guide knowledge to prepare Business Performance testing, communicating those results to the manager and assist with remediation efforts identified through testing. In addition, compilation of audit materials requested as well as policy and procedure review will be expected. Issues identified through testing and audit feedback will be researched and resolved by the individual.
Principal Duties
Department point of contact for internal and external audit requests; compiles internal and external audit documentation.
Prepare Business Performance testing, which includes (but is not limited to) Fannie Mae, Freddie Mac, Ginnie Mae or Private investor remittances, cutoff reporting, and reconciliations.
Manage remediations, through to completion, in response to audit and/or business performance testing findings with respective departments.
Test policies and procedures to ensure the process performs as expected and suggest potential automation or improvements.
Maintains and follows procedures and controls within the monthly process.
Heavy use of Microsoft Excel for data analysis and reporting.
Handle ad-hoc reporting or research as directed by management.
Demonstrate flexibility to ever-changing business needs and requirements.
Possess an understanding of GSE servicing guides and a willingness to interpret pooling and servicing agreements.
Researches and resolves data issues, proposes solutions for future process enhancements.
Performs related duties as assigned by management.
Education and Experience Requirements
High School Diploma or equivalent required, Bachelor's Degree in Accounting or Finance preferred.
5+ years of Mortgage Servicing experience required; 2+years prior Investor Reporting experience required.
Knowledge, Skill, and Ability Requirements
Advanced MS Excel experience required.
SQL or other database reporting experience preferred.
Servicing Director knowledge a plus.
Knowledge of basic accounting principles and practices.
Solid analytical skills, particularly regarding assessing the probability and impact of an internal control weakness.
Proven ability to build strong relationships with stakeholders, learn quickly, be flexible and think strategically.
Strong communication skills to interact with Senior Management and other business units.
Working understanding of operational risks and related controls.
Strong organizational and time management skills necessary.
Ability to manage multiple tasks and shift priorities as appropriate to meet reporting deadlines and maintain reporting accuracy and analysis abilities with strong attention to detail.
Self-motivated with strong attention to detail and excellent organization skills.
While this description is intended to be an accurate reflection of the position's requirements, it in no way implies/states that these are the only job responsibilities. Management reserves the right to modify, add or remove duties and request other duties, as necessary.
Additional Information:
While this description is intended to be an accurate reflection of the position's requirements, it in no way implies/states that these are the only job responsibilities. Management reserves the right to modify, add or remove duties and request other duties, as necessary.
All employees are required to have smart phones that meet Company security standards with the ability to install apps such as Okta Verify and Microsoft Authenticator. Employment will be contingent on this requirement.
Company Benefits:
Newrez is a great place to work but we are only as strong as our greatest asset, our employees, so we believe in rewarding them!
Medical, dental, and vision insurance
Health Savings Account with employer contribution
401(k) Retirement plan with employer match
Paid Maternity Leave/Parental Bonding Leave
Pet insurance
Adoption Assistance
Tuition reimbursement
Employee Loan Program
The Newrez Employee Emergency and Disaster Fund is a new program to support our team members
Newrez NOW:
Our Corporate Social Responsibility program, Newrez NOW, empowers employees to become leaders in their communities through a robust program that includes volunteering, philanthropy, nonprofit grants, and more
1 Volunteer Time Off (VTO) day, company-paid volunteer day where all eligible employees may participate in a volunteer event with a nonprofit of their choice
Employee Matching Gifts Program: We will match monetary employee donations to eligible non-profit organizations, dollar-for-dollar, up to $1,000 per employee
Newrez Grants Program: Newrez hosts a giving portal where we provide employees an abundance of resources to search for an opportunity to donate their time or monetary contributions
Equal Employment Opportunity
We're proud to be an equal opportunity employer- and celebrate our employees' differences, including race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, and Veteran status. Different makes us better.
CA Privacy Policy
CA Notice at Collection
Auto-ApplyNetwork Security - Cisco ASA Checkpoint
Security engineer job in Plano, TX
Job DescriptionJob Title: Network Security - Cisco ASA / Checkpoint
Type: Contract
We are seeking a highly skilled Network Security Engineer with deep expertise in Security Service Edge (SSE) and Secure Access Service Edge (SASE) to lead the design, deployment, and lifecycle management of cloud-delivered security services. This role is critical in implementing Zero Trust Network Access (ZTNA), securing hybrid BFSI infrastructure, and integrating identity-aware, policy-driven controls across distributed environments.
Primary Technical Skills
SSE/SASE Platforms: Advanced configuration and policy orchestration on Palo Alto Prisma Access, Fortinet Universal ZTNA, Zscaler ZIA/ZPA, Broadcom, and Bluecoat.
Cloud-Delivered Security Functions: Deep understanding of SWG, CASB, ZTNA, DNS security, FWaaS, and SSL/TLS inspection.
Identity-Aware Access Control: Integration with SAML/OAuth2/OpenID Connect, device posture enforcement, and risk-based access policies.
Policy Lifecycle Management: Design and tuning of access control policies, URL filtering, application control, and data protection rules.
Post-Deployment Optimization: Continuous tuning using telemetry, policy hit/miss analysis, latency metrics, and user experience feedback.
Advanced Threat Protection: Integration with sandboxing engines, cloud-delivered threat intelligence, and real-time traffic analysis.
High Availability Resilience: Design of redundant tunnels, failover strategies, and multi-tenant segmentation in SSE environments.
Traffic Steering Breakout Policies: Implementation of local internet breakout (LIB), selective tunneling, and QoS-aware routing.
Certificate Management: Handling PKI integration, certificate pinning, and SSL decryption policies across user and app flows.
User Experience Assurance: Use of digital experience monitoring (DEM) tools to baseline and optimize end-user performance.
Secondary Technical Skills
SD-WAN VPN Integration: Deep familiarity with overlay routing, dynamic path selection, IKEv2/IPSec/GRE tunnels, and BGP/OSPF redistribution.
Cloud Security Architecture: Design of hub-and-spoke, transit VPC, and cloud-native firewalling across AWS, Azure, and GCP.
Automation APIs: Development of Python/Ansible/Terraform scripts for policy automation, bulk onboarding, and compliance checks.
SIEM SOAR Integration: Event forwarding, custom log parsing, UEBA correlation, and automated response playbooks in Splunk, QRadar, or Sentinel.
Endpoint EDR Integration: Policy coordination with CrowdStrike, Microsoft Defender, or SentinelOne for device trust enforcement.
DNS DLP Integration: Enforcement of DNS-layer security and data exfiltration controls using inline DLP and cloud-native inspection.
Multi-Factor Conditional Access: Integration with Azure Conditional Access, Okta Adaptive MFA, and device compliance policies.
Network Segmentation: Implementation of microsegmentation using identity-based policies and application-aware zoning.
Cloud Logging Audit Trails: Centralized logging via CloudWatch, Azure Monitor, or GCP Logging, mapped to compliance controls.
Security Baseline Enforcement: Use of CIS Benchmarks, NIST 800-53, and custom hardening scripts for posture validation.
Required Experience
8-12 years in enterprise network and security engineering, with 3+ years in SSE/SASE design and operations.
Proven experience in Zero Trust architecture, identity-aware segmentation, and cloud-delivered security enforcement.
Strong exposure to regulated verticals (preferably BFSI), with emphasis on data protection, audit readiness, and risk mitigation.
Hands-on with multi-vendor SSE ecosystems, including policy migration, interoperability testing, and performance benchmarking.
Experience in incident response, forensics, and policy rollback in production SSE environments.
Preferred Qualifications
Experience with hybrid cloud security models and multi-cloud segmentation strategies.
Familiarity with EDR/XDR, sandboxing, and threat intelligence platforms (TIPs).
Understanding of compliance frameworks: ISO 27001, NIST 800-53, RBI, GDPR, and PCI-DSS.
Exposure to DevSecOps pipelines, CI/CD security gates, and IaC security scanning.
Knowledge of SASE convergence models, including WAN edge, cloud edge, and identity edge integration.
Nice to Have
Zscaler Certified Cloud Professional (ZCCP-IA / ZCCP-PA)
AWS/Azure Security Specialty
CISSP or CCSP
Network Security Audit
Security engineer job in Irving, TX
Founded in 2009 and headquartered in Ann Arbor, MI, TEKWISSEN™ provides a unique portfolio of innovative capabilities that seamlessly combines clients insights, strategy, design, software engineering and systems integration. Our tightly integrated offerings are tailored to each client's requirements and span the services spectrum from Application Development/Maintenance, testing, Technology Consulting & staffing. The company is primarily focused on information technology, engineering, healthcare, financial technology and contingent workforce solutions. It operates in seven business segments including Commercial, Professional & Technical, EMEA Commercial, and EMEA Professional & Technical. The company provides professional and technical expertise in the fields of Telecom, Education, Banking, Retail, e-commerce, Automotive, Life Science, Insurance, legal, healthcare, among others. It also offers outsourcing, consulting, recruitment, career transition, and vendor management services.
We strongly believe:
" If something cannot be measured, it cannot be managed. "
TEKWISSEN™ measures all of these processes and applies corrective interventions to manage the quality process at its core.
We are an Equal Employment Opportunity Employer M/F/V/D
Recognitions:
2015 -America's Fastest Growing Company by Inc.com
2015- SPARK FastTrack Award from Ann Arbor SPARK
2015 -Honoree of Diversity Focused Company by Corp! Magazine
2014- America's Fastest Growing Company by Inc.com
2014- Michigan 50 Companies to Watch
2014 - DiSciTech Award in Technology by Corp! Magazine
2014- DiSciTech TECHNOLOGY Company of the year by Corp! Magazine
2014- SPARK FastTrack Award from Ann Arbor SPARK
Specialties:
Enterprise Solutions, Web Development, Data Warehousing, Systems Integration, IT Security, Storage Technologies, Development and Delivery, Business Intelligence, Telecommunications, Consulting and Planning, Network design, Implementation &Administration
Position details:
Senior Systems Engineer - Network Security Audit
Location: Irving TX
Duration: 6+ months
Job Description:
Current CCNP, CCNA, CISSP or equivalent
- Experience in auditing network security compliance
- 8+ years' experience with IIS
- 8 + years' experience in Windows System Administration and Active Directory
- Experience in network design, operational support, hands-on implementation and configuration of network infrastructure
- Strong knowledge and experience in VPN, Firewall, load-balancing, network security, and network management platforms
- Experience in configuring and installing technologies such as switched Ethernet/Fast Ethernet/Gigabit Ethernet and various routing
Additional Information
Regards,
Swati
swati(dot)**********************
************
Easy ApplyIT Network / Security Analyst
Security engineer job in Fort Worth, TX
The IT Network/Security Analyst is responsible for safeguarding and supporting the organization's IT infrastructure by blending network operations expertise with cybersecurity best practices. This hybrid role ensures both the reliability of network services and the protection of data across enterprise systems and cloud services. The analyst will monitor, analyze, and respond to incidents while maintaining the performance, availability, and security of network systems in a dynamic threat landscape.
Duties and Responsibilities:
Network Operations & Monitoring
Monitor and support daily network operations, ensuring uptime, availability, and performance across routers, switches, firewalls, VPN's, and other network components.
Continuously monitor network traffic and performance metrics, using NMS (Network Management Systems), IDS/IPS, and SIEM tools to identify anomalies, outages, or threats.
Collaborate with customers to optimize configurations and resolve connectivity issues impacting business operations.
Travel as required (up to 25%) to support field locations.
Incident Response & Troubleshooting
Investigate, contain, and remediate cybersecurity incidents involving network components (e.g., DDoS attacks, unauthorized access, malware propagation).
Perform root cause analysis on network-related issues and security events to reduce recurrence and improve resilience.
Participate in on-call rotations for critical incident response.
Network Security Administration
Configure and maintain network devices i.e. firewalls, routers, switches, access points with an emphasis on security hardening and policy enforcement.
Implement and support network segmentation, access controls, and VPN technologies to protect sensitive data.
Oversee security patching and firmware upgrades across network infrastructure.
Vulnerability & Compliance Management
Conduct vulnerability assessments and penetration testing on network systems, tracking and remediating identified weaknesses.
Support compliance with frameworks such as NIST or CIS as they apply to both network and security operations.
Assist with periodic audits, reporting findings, and driving corrective actions.
Threat Intelligence & Reporting
Stay up to date on evolving attack vectors, especially those targeting enterprise networks.
Leverage threat intelligence to proactively adjust network defenses.
Produce operational dashboards and executive-level reports detailing network health, incidents, and security posture.
Collaboration & Training
Work closely with IT infrastructure, Security Architect, and Application teams to integrate security into network design and operations.
Provide guidance and training to IT staff and end-users on secure network practices, phishing awareness, and incident reporting.
Knowledge, skills, and abilities:
Technical Knowledge
Strong foundation in networking protocols (TCP/IP, BGP, OSPF, VLANs, DNS, DHCP) and enterprise network architectures.
Hands-on experience with network monitoring and analysis tools (e.g., Wireshark, SolarWinds, Nmap, Nessus).
Familiarity with security technologies such as SIEM (Splunk, ELK) a plus.
Hands-on experience with enterprise network firewalls and network equipment.
Experience with enterprise endpoint protection.
Understanding of threat detection, DDoS mitigation, VPNs, and secure remote access.
Familiarity of compliance requirements Sarbanes-Oxley Act of 2002 (SOX) as they apply to both network and security operations.
Skills
Proficiency in troubleshooting complex network and security issues in enterprise environments.
Strong analytical mindset with the ability to distinguish between performance-related issues and security threats.
Clear communication skills for cross-team collaboration and reporting to both technical and non-technical audiences.
Effective multitasking and prioritization in 24/7 operations environments.
Abilities
Ability to balance proactive network performance management with rapid cyber threat response.
Commitment to continuous learning in both network operations and cybersecurity trends.
Adaptability to shifting operational demands and evolving attack landscapes.
Strong teamwork skills with the discretion to handle sensitive information responsibly.
Education and Experience
Bachelor's degree in Information Technology, Computer Science, Cybersecurity, or related field (or equivalent practical experience) preferred.
3-5 years of combined experience in network operations and cybersecurity, with at least 2 years in a security-focused network role preferred.
Relevant certifications highly desirable, such as:
Network-focused: CCNA, CCNP, CompTIA Network+
Security-focused: CISSP, CompTIA Security+, CEH, GIAC (GCIA, GCIH)
Equal Opportunity Employer
Prospective employees will receive consideration without discrimination because of race, color, religion, marital status, sex (including pregnancy, gender identity, and sexual orientation), national origin, age, veteran status, disability, or genetic information.
Edit job description
Auto-ApplySecurity Systems Field Engineer
Security engineer job in Dallas, TX
Digi Security Systems is an industry leader in the design, installation and support of custom video surveillance, electronic access control, and intrusion detection solutions for public and private partners. We've built our reputation on innovation and reliable service, and we're known as the industry's experts.
Position Overview
We are seeking an experienced Field and Service Engineer to join our operations in the Dallas, TX area. This person will be responsible for performing the most skilled security technician work in the service, troubleshooting, alternation and programming of all security related systems. Field Engineers, also known as Elite Resource Technicians at Digi, are service providers who support Digi's internal and external operations by providing custom programming, training, and technical advisement. This individual must have a expert background in installing and servicing Access Control, CCTV, and Burglar/Intrusion Alarm Systems and at least seven (7) years of experience working in the commercial security systems field.
Please note, this role will require regular travel to the Houston, TX area. Rate of pay is dependent on experience, but is typically $35+/hour.
Main Responsibilities:
Service: Responsible for the professional service of access control, CCTV, and burglar/intrusion alarm systems.
Programming: Ensures project systems are programmed to the highest standard and organized to work well for the client. Often includes customized programming to meet specific Partner needs.
Networking: Complete high level integration and programming of systems, using both networks and servers.
Quality Control: Complete internal audits of Digi's projects, and ensures that highest standard of installation is upheld. Write course content and provide technical expertise for Digi's internal learning and development initiatives.
Leadership: Provide on-the-job training and mentoring on-site to technicians on their team. Collaborate with other Elite Resources to create standard operating procedures, work exemplars, and training sessions.
Communication: Respectfully communicates with all local Partner and internal staff on daily progress and all necessary information on any service call or project.
Documentation: Completes project close out documentation, including as-built drawings, head end and installation quality pictures. Documents installation quality and completes all required close out documents.
Benefits:
2 weeks vacation accrual rate and PTO rate
3 weeks vacation accrual rate after first year of employment
7 company-wide paid holidays throughout the year
On-call bonuses
401k plan w/corporate matching structure
Full health benefits offered - medical, dental and vision
Included life insurance, additional available for purchase
Accident/critical illness insurance available for purchase
Full set of Hilti tools
All hand tools and consumables paid for by company
Required training/licensing paid for by company
Voluntary professional development opportunities
Company laptop, company phone, uniforms and gear
Company vehicle or personal vehicle allowance
Yearly stipend for steel-toed boots and work pants
Great opportunities for bonus pay
Physical Requirements:
Ability to lift/move equipment and tools weighing up to 50 lbs.
Ability to work from ladders or man lifts at extended heights.
Must be able to differentiate colors.
Must be comfortable standing for long periods of time and complete overhead work for long periods of time.
Must have a current, valid driver's license in the state of which you are applying and have the ability to meet our company driving standards.
Disclaimer: This job description is not all encompassing of job responsibilities and is not in any way a binding document. It does not affect the at will nature of employment at Digi Security Systems.
#LI-TW1
Auto-ApplySecurity Professional- TWIC Turnaround
Security engineer job in Chalmette, LA
Allied Universal , North America's leading security and facility services company, offers rewarding careers that provide you a sense of purpose. While working in a dynamic, welcoming, and collaborative workplace, you will be part of a team that contributes to a culture that positively impacts the communities and customers we serve.
Job Description
This is temporary position for a Turnaround at a refinery. Onboarding takes 2-3 weeks, we are starting the hiring process now.
LOCATION: Chalmette/Meraux, LA
SITE: Refinery/Plant
PAY: $19.00/hour / pays weekly
SHIFTS: 12-hr shifts available (Morning and Overnight)
QUALIFICATIONS:
Pass full background screen thorugh DISA
Drug Screen (Breath alcohol and hair sample)
Background check
Able to work 12-hr shifts
21 years of age or older
Valid TWIC card (No receipts)
Valid Louisiana drivers license; no active flags or suspensions
Able to stand and walk for extended periods of time
Able to work outdoors in the elements
FIRST INTERVIEW WILL BE A PHONE INTERVIEW. PLEASE HAVE SOCIAL, DRIVERS LICENSE AND TWIC IN-HAND, READY.
This position is responsible for the safety and security of the facilities they protect. Our Critical Facility Officers allow us to accomplish our company's core purpose which is “to service, secure and care for the people and businesses in our communities.” Critical Facility Security Officers act as a visible deterrent to crime and client rule infractions; they detect and report suspicious, unsafe or criminal acts at or near their assigned posts which may be a threat to the property, clients, guests or employees at the site.
RESPONSIBILITIES:
Ensure the facility is provided with high quality security services to protect people and property.
Maintains proficiency in the use of all assigned protective equipment, restraint devices and weapons.
Report safety concern, security breaches and unusual circumstances both verbally and in writing.
Preserves order and acts to enforce regulations and directives for the site pertaining to personnel, visitors and premises.
Monitors closed circuit television systems and alarms; Reports safety concerns, security breaches and unusual circumstances both verbally and in writing.
Maintains awareness and familiarity with the site-specific operations performance manual and post orders.
Meets and continues to meet any applicable state, county and municipal licensing and permit requirements for Armed Security Officers and specific protective device and weapons qualifications.
Build, improve, and maintain effective relationships with both client employees and guests.
Answer questions and assist guests and employees; Answer phones or greet guests/ employees in a professional, welcoming manner.
Patrols the facility on foot or in a vehicle.
Could be required to work for multiple clients at multiple locations; covering special projects, call offs, vacations and open shifts.
QUALIFICATIONS:
High school diploma or equivalent required; at least 21 years of age
Licensing requirements are subject to state and/or local laws and regulations and may be required prior to employment
Be able to obtain a valid Guard License as required in the state for which you are applying, maintain current active status of all required License at all times, and must carry the License at all times while on duty. We provide free training for any hires who do not possess a card/license.
As a condition of employment, candidate must successfully complete a background investigation and a post-offer/pre-employment drug/alcohol test and may be required to pass a Driver's Record check.
Demonstrated ability to take initiative, successfully handle and prioritize multiple competing assignments and effectively manage deadlines.
Ability to handle both common and crisis situations at the client site, calmly and efficiently.
Professional, articulate and able to use good independent judgment and discretion.
Must possess effective oral and written communication and interpersonal skills.
Ability to successfully interact at all levels of personnel and the general public in a professional and effective manner, including with clients.
Have intermediate computer skills to operate innovative wireless technology at client specific sites.
Highly organized and ability to follow procedures concisely and consistently; high level of compliance and unwavering integrity to oversee and ensure policies are enforced in a self-directed environment.
Must be able to frequently prepare reports and read and understand all operating procedures and instructions.
Must possess one or more of the following:
3 years civilian law enforcement
3 years private or corporate security experience
3 years military experience with a positive discharge
Criminal Justice Degree or law enforcement related degree, Associates or higher
Graduate of a law enforcement training academy
PHYSICAL/MENTAL REQUIREMENTS AND WORKING ENVIRONMENT:
While performing the duties of this job, the employee is regularly required to use both hands, is frequently required to stand, sit, stoop, talk and hear (communicate verbally in person and via regular telephone equipment), and must be able to read computer screens, correspondence and reports in English.
The employee must constantly walk, stand, reach with both hands and arms, and must be able to drive a vehicle. The employee may occasionally maneuver up to 40 pounds. May be required to climb stairs on an intermittent basis at client sites.
Constant use of eyes (correctable vision to normal level required) to observe, read, interact with public and co-workers, view security monitors; includes hand/eye coordination.
Work in various environments including adverse outdoor conditions such as cold, rain or heat.
Must be able to focus and multi-task in a busy environment, with the ability to successfully handle stressful situations in a calm and professional manner. Includes being able to effectively manage multiple employees with diverse personalities and engage them to perform at optimum levels.
Remain flexible to ever changing environments; adapt well to different situations.
Closing
Allied Universal is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race/ethnicity, age, color, religion, sex, sexual orientation, gender identity, national origin, genetic information, disability, protected veteran status or relationship/association with a protected veteran, or any other basis or characteristic protected by law. For more information: ***********
If you have difficulty using the online system and require an alternate method to apply or require an accommodation, please contact our local Human Resources department. To find an office near you, please visit: ***********/offices.
Requisition ID 2025-1487911
Auto-Apply