Principal Security Engineer - Hardware Security
Security engineer job in Urban Honolulu, HI
The Oracle Cloud Infrastructure (OCI) team can provide you the opportunity to build and operate a suite of massive scale, integrated cloud services in a broadly distributed, multi-tenant cloud environment. OCI is committed to providing the best in cloud products that meet the needs of our customers who are tackling some of the world's biggest challenges.
We offer unique opportunities for smart, hands-on security engineers with the expertise and passion to solve difficult problems in distributed highly available services and virtual infrastructure. At every level, our engineers have a significant technical and business impact designing and building innovative new systems to power our customer's business critical applications. Our customers run their businesses on our cloud, and our mission is to provide them with the most secure cloud services.
The OCI Hardware Security group conducts Security assessments of the production hardware that runs our cloud, and develops the requirements for future Networking, Storage, Compute components. We work closely across Oracle, with third party vendors, and with standards organization to influence the next generation of hardware platform security. In addition to defining the best hardware, OCI HW Security knows that platform security also depends on how that hardware is used. To that end, HW Security also works closely with OCI's operations and engineering teams, constantly striving to improve Oracle Cloud's overall operational security posture by defining the supply chain and operational requirements to establish best practices for managing security for every device in our data centers.
A security-focused engineer at any level can have significant technical and business impact. Come shape the future of one of the largest clouds on earth with us. Overall, the OCI Security Architecture team performs a variety of work ranging from cloud security, application security, vulnerability analysis, threat modeling, and hacking/enterprise network penetration.
The biggest challenges for the team are the dynamic and fast growth of the business, driving us to improve our systems, tools, and automation to scale to our security expertise several orders of magnitude greater than what we can support today. We understand that software is living and needs investment. The challenge is making the right tradeoffs, communicating those decisions effectively, and crisp execution.
**Responsibilities**
Career Level - IC4
+ Develop and communicate requirements for new vendors and hardware (compute, storage, networking)
+ Perform architectural reviews, penetration testing, vulnerability analysis of compute infrastructure hardware such as
o Servers (Intel, AMD and ARM)
o Baseboard Management Controllers such as Oracle's ILOM
o UEFI and platform firmware
o Smart NICS
o Storage devices
o Network controllers and other peripherals
Network hardware/firmware, topology, and security expertise
+ Provide consulting on security risk associated with compute hardware and firmware in the context of cloud usage.
+ Provide consulting and review of device sanitization as per NIST-800-88 R1 standards.
+ Provide standard operating procedures for safe use of compute hardware through its lifecycle i.e., provisioning, operations and reuse/decommission.
Skills
+ Engage with Oracle Hardware Division and third-party vendors to understand their roadmaps.
+ Create planning roadmaps to drive multi-year security improvements across the OCI Infrastructure
+ Review or assess engineering changes, or revisions of, an existing component. E.g.: new firmware for a device, vendor revision of an existing device Identify and participate in external standards groups to drive improvements across the industry
+ Consult development teams and third-party vendors in design and architecture of secure systems.
+ Champion and consult on secure development life cycle practices.
+ Communicate and educate Senior Management on key Security topics and directions.
Disclaimer:
**Certain US customer or client-facing roles may be required to comply with applicable requirements, such as immunization and occupational health mandates.**
**Range and benefit information provided in this posting are specific to the stated locations only**
US: Hiring Range in USD from: $109,200 to $223,400 per annum. May be eligible for bonus and equity.
Oracle maintains broad salary ranges for its roles in order to account for variations in knowledge, skills, experience, market conditions and locations, as well as reflect Oracle's differing products, industries and lines of business.
Candidates are typically placed into the range based on the preceding factors as well as internal peer equity.
Oracle US offers a comprehensive benefits package which includes the following:
1. Medical, dental, and vision insurance, including expert medical opinion
2. Short term disability and long term disability
3. Life insurance and AD&D
4. Supplemental life insurance (Employee/Spouse/Child)
5. Health care and dependent care Flexible Spending Accounts
6. Pre-tax commuter and parking benefits
7. 401(k) Savings and Investment Plan with company match
8. Paid time off: Flexible Vacation is provided to all eligible employees assigned to a salaried (non-overtime eligible) position. Accrued Vacation is provided to all other employees eligible for vacation benefits. For employees working at least 35 hours per week, the vacation accrual rate is 13 days annually for the first three years of employment and 18 days annually for subsequent years of employment. Vacation accrual is prorated for employees working between 20 and 34 hours per week. Employees working fewer than 20 hours per week are not eligible for vacation.
9. 11 paid holidays
10. Paid sick leave: 72 hours of paid sick leave upon date of hire. Refreshes each calendar year. Unused balance will carry over each year up to a maximum cap of 112 hours.
11. Paid parental leave
12. Adoption assistance
13. Employee Stock Purchase Plan
14. Financial planning and group legal
15. Voluntary benefits including auto, homeowner and pet insurance
The role will generally accept applications for at least three calendar days from the posting date or as long as the job remains posted.
Career Level - IC4
**About Us**
As a world leader in cloud solutions, Oracle uses tomorrow's technology to tackle today's challenges. We've partnered with industry-leaders in almost every sector-and continue to thrive after 40+ years of change by operating with integrity.
We know that true innovation starts when everyone is empowered to contribute. That's why we're committed to growing an inclusive workforce that promotes opportunities for all.
Oracle careers open the door to global opportunities where work-life balance flourishes. We offer competitive benefits based on parity and consistency and support our people with flexible medical, life insurance, and retirement options. We also encourage employees to give back to their communities through our volunteer programs.
We're committed to including people with disabilities at all stages of the employment process. If you require accessibility assistance or accommodation for a disability at any point, let us know by emailing accommodation-request_************* or by calling *************** in the United States.
Oracle is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans' status, or any other characteristic protected by law. Oracle will consider for employment qualified applicants with arrest and conviction records pursuant to applicable law.
Cyber Defense Forensics Analyst
Security engineer job in Urban Honolulu, HI
At EY, you'll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we're counting on your unique voice and perspective to help EY become even better. Join us and build an exceptional experience for yourself, and a better working world for all.
The exceptional EY experience. It's yours to build.
EY focuses on high-ethical standards and integrity among its employees and expects all candidates to demonstrate these qualities.
Today's world is fuelled by vast amounts of information. Data is more valuable than ever before. Protecting data and information systems is central to doing business, and everyone in EY Information Security has a critical role to play. Join a global team of almost 950 people who collaborate to support the business of EY by protecting EY and client information assets! Our Information Security professionals enable EY to work securely and deliver secure products and services, as well as detect and quickly respond to security events as they happen. Together, the efforts of our dedicated team helps protect the EY brand and build client trust.
Within Information Security we blend risk strategy, digital identity, cyber defense, application security and technology solutions as we consider the entire security lifecycle. You will join a team of hardworking, security-focused individuals dedicated to supporting, protecting and enabling the business through innovative, secure solutions that provide speed to market and business value.
**The opportunity**
Cyber Triage and Forensics (CTF) Incident Analyst will work as a senior member of the technical team responsible for security incident response for EY. The candidate will work as an escalation point for suspect or confirmed security incidents. Responsibilities include performing digital forensic analysis, following security incident response standard methodologies, malware analysis, identify indicators of compromise, support remediation or coordinate remediation efforts of a security incident, and develop documentation to support the security incident response process.
**Your key responsibilities**
+ Investigate, coordinate, bring to resolution, and report on security incidents as they are brought up or identified
+ Forensically analyze end user systems and servers found to have possible indicators of compromise
+ Analysis of artifacts collected during a security incident/forensic analysis
+ Identify security incidents through 'Hunting' operations within a SIEM and other relevant tools
+ Interface and connect with server owners, system custodians, and IT contacts to pursue security incident response activities, including: obtaining access to systems, digital artifact collection, and containment and/or remediation actions
+ Provide consultation and assessment on perceived security threats
+ Maintain, manage, improve and update security incident process and protocol documentation
+ Regularly provide reporting and metrics on case work
+ Resolution of security incidents by identifying root cause and solutions
+ Analyze findings in investigative matters, and develop fact based reports
+ Be on-call to deliver global incident response
**Skills and attributes for success**
+ Resolution of security incidents by identifying root cause and solutions
+ Analyze findings in investigative matters, and develop fact-based reports
+ Proven integrity and judgment within a professional environment
+ Ability to appropriately balance work/personal priorities
**To qualify for the role you must have**
+ Bachelors or Masters Degree in Computer Science, Information Systems, Engineering or a related field
+ 5+ years experience in incident response, computer forensics analysis and/or malware reverse engineering;
+ Understanding of security threats, vulnerabilities, and incident response;
+ Understanding of electronic investigation, forensic tools, and methodologies, including: log correlation and analysis, forensically handling electronic data, knowledge of the computer security investigative processes, malware identification and analysis;
+ Be familiar with legalities surrounding electronic discovery and analysis;
+ Experience with SIEM technologies (i.e. Splunk);
+ Deep understanding of both Windows and Unix/Linux based operating systems;
**Ideally, you'll also have**
+ Hold or be willing to pursue related professional certifications such as GCFE, GCFA or GCIH
+ Background in security incident response in Cloud-based environments, such as Azure
+ Programming skills in PowerShell, Python and/or C/C++ Understanding of the best security practices for network architecture and server configuration
**What we look for**
+ Demonstrated integrity in a professional environment
+ Ability to work independently
+ Have a global mind-set for working with different cultures and backgrounds
+ Knowledgeable in business industry standard security incident response process, procedures, and life cycle
+ Excellent teaming skills
+ Excellent social, communication, and writing skills
**What we offer you**
The compensation ranges below are provided in order to comply with United States pay transparency laws. Other geographies will follow their local salary guidelines, which may not be a direct conversion of published US salary range/s. At EY, we'll develop you with future-focused skills and equip you with world-class experiences. We'll empower you in a flexible environment, and fuel you and your extraordinary talents in a diverse and inclusive culture of globally connected teams. Learn more .
We offer a comprehensive compensation and benefits package where you'll be rewarded based on your performance and recognized for the value you bring to the business. The base salary range for this job in all geographic locations in the US is $87,700 to $164,000. The salary range for New York City Metro Area, Washington State and California (excluding Sacramento) is $105,200 to $186,400. Individual salaries within those ranges are determined through a wide variety of factors including but not limited to education, experience, knowledge, skills and geography. In addition, our Total Rewards package includes medical and dental coverage, pension and 401(k) plans, and a wide range of paid time off options. Join us in our team-led and leader-enabled hybrid model. Our expectation is for most people in external, client serving roles to work together in person 40-60% of the time over the course of an engagement, project or year. Under our flexible vacation policy, you'll decide how much vacation time you need based on your own personal circumstances. You'll also be granted time off for designated EY Paid Holidays, Winter/Summer breaks, Personal/Family Care, and other leaves of absence when needed to support your physical, financial, and emotional well-being.
**Are you ready to shape your future with confidence? Apply today.**
EY accepts applications for this position on an on-going basis.
For those living in California, please click here for additional information.
EY focuses on high-ethical standards and integrity among its employees and expects all candidates to demonstrate these qualities.
**EY | Building a better working world**
EY is building a better working world by creating new value for clients, people, society, and the planet, while building trust in capital markets.
Enabled by data, AI and advanced technology, EY teams help clients shape the future with confidence and develop answers for the most pressing issues of today and tomorrow.
EY teams work across a full spectrum of services in assurance, consulting, tax, strategy, and transactions. Fueled by sector insights, a globally connected, multi-disciplinary network and diverse ecosystem partners, EY teams can provide services in more than 150 countries and territories.
EY provides equal employment opportunities to applicants and employees without regard to race, color, religion, age, sex, sexual orientation, gender identity/expression, pregnancy, genetic information, national origin, protected veteran status, disability status, or any other legally protected basis, including arrest and conviction records, in accordance with applicable law.
EY is committed to providing reasonable accommodation to qualified individuals with disabilities including veterans with disabilities. If you have a disability and either need assistance applying online or need to request an accommodation during any part of the application process, please call 1-800-EY-HELP3, select Option 2 for candidate related inquiries, then select Option 1 for candidate queries and finally select Option 2 for candidates with an inquiry which will route you to EY's Talent Shared Services Team (TSS) or email the TSS at ************************** .
Cyber User Behavior Engineer
Security engineer job in Urban Honolulu, HI
*****CANDIDATE MUST BE US Citizen (due to contractual/access requirements)***** **For candidates residing within a 50-mile radius of a Highmark office, a hybrid work schedule of three days per week (Tuesday, Wednesday, and Thursday) in the office is required.**
The Cyber User Behavior Engineer is a pivotal role at Highmark, dedicated to enhancing our organization's security by cultivating a robust "security-first" culture. This individual will lead the design, implementation, and ongoing management of comprehensive security awareness programs. Their primary responsibility will be to educate, train, and inspire all Highmark employees to effectively identify and report security threats, ensuring adherence to Highmark's security policies and industry best practices. This role is crucial in minimizing human-centric security risks and fostering a vigilant and informed workforce.
**ESSENTIAL RESPONSIBILITIES**
+ Develop, implement, and continuously improve a proactive program to identifying internal threats.
+ Establish close relationships with business stakeholders outside of the security discipline, working closely with privacy, physical security, fraud, legal, human resources and senior leadership.
+ Perform predictive analysis of behavior, anomalies, and concerns to identify internal threats.
+ Execute campaigns designed to improve enterprise security posture.
+ Continually enhance insider risk program to increase efficiencies and measure program effectiveness and report accordingly on progress.
+ Utilize change management methodologies to mitigate identified security risks.
+ Provide insider threat support to security operations and incident response teams in advance of and during cyber security incidents.
+ Ensure clear lines of communication including but not limited to; transparency to the business on upcoming security initiatives, identifying impact to the business and to consumers, helping shape remediation, and developing external and internal communications.
+ Ensure the education and awareness program is aligned with the Information Security Program, Policies and Standards.
+ Other duties as assigned or requested.
**EDUCATION**
**Required**
+ Bachelor's Degree in Business Education, Marketing or Information Systems
**Substitutions**
+ Six (6) years relevant, progressive experience
**Preferred**
+ Bachelors in Information Security
**EXPERIENCE**
**Required**
+ 3 years in IT or IT Security Focus
+ 3 years of Insider Threat Program focus
To include:
+ 3 years with Human Intelligence (HUMINT) **OR** as an Open-source Intelligence Analyst
**Preferred**
+ 1-3 years in a Security Awareness or adjacent role
**LICENSES or CERTIFICATIONS**
**Required**
+ None
**Preferred**
+ Security + **OR**
+ GSEC **OR**
+ CISSP **OR**
+ CERT Insider Threat
+ SANS Security Awareness Professional (SSAP) Proofpoint Certified Security Awareness Specialist
**SKILLS**
+ Change Management
+ Presentation Delivery
+ Prioritizing
+ Analytical and Logical Reasoning/Thinking
+ Communication Skills
+ Cyber Security
+ User Behavior
+ Continuous Improvement
**Language (Other than English):**
None
**Travel Requirement:**
0% - 25%
**PHYSICAL, MENTAL DEMANDS and WORKING CONDITIONS**
**Position Type**
Office-based
Teaches / trains others regularly
Frequently
Travel regularly from the office to various work sites or from site-to-site
Rarely
Works primarily out-of-the office selling products/services (sales employees)
Never
Physical work site required
Yes
Lifting: up to 10 pounds
Occasionally
Lifting: 10 to 25 pounds
Rarely
Lifting: 25 to 50 pounds
Never
**_Disclaimer:_** _The job description has been designed to indicate the general nature and essential duties and responsibilities of work performed by employees within this job title. It may not contain a comprehensive inventory of all duties, responsibilities, and qualifications required of employees to do this job._
**_Compliance Requirement_** _: This job adheres to the ethical and legal standards and behavioral expectations as set forth in the code of business conduct and company policies._
_As a component of job responsibilities, employees may have access to covered information, cardholder data, or other confidential customer information that must be protected at all times. In connection with this, all employees must comply with both the Health Insurance Portability Accountability Act of 1996 (HIPAA) as described in the Notice of Privacy Practices and Privacy Policies and Procedures as well as all data security guidelines established within the Company's Handbook of Privacy Policies and Practices and Information Security Policy._
_Furthermore, it is every employee's responsibility to comply with the company's Code of Business Conduct. This includes but is not limited to adherence to applicable federal and state laws, rules, and regulations as well as company policies and training requirements._
Highmark Health and its affiliates prohibit discrimination against qualified individuals based on their status as protected veterans or individuals with disabilities and prohibit discrimination against all individuals based on any category protected by applicable federal, state, or local law.
We endeavor to make this site accessible to any and all users. If you would like to contact us regarding the accessibility of our website or need assistance completing the application process, please contact the email below.
For accommodation requests, please contact HR Services Online at *****************************
California Consumer Privacy Act Employees, Contractors, and Applicants Notice
Req ID: J272819
Detection & Response Security Engineer, Threat Intelligence
Security engineer job in Urban Honolulu, HI
Meta Security is looking for a threat intelligence investigator with extensive experience in investigating cyber threats with an intelligence-driven approach. You will be proactively responding to a broad set of security threats, as well as tracking actor groups with an interest or capability to target Meta and its employees. You will also be identifying the gaps in current detections and preventions by long-term intelligence tracking and research, and working with cross-functional stakeholders to improve Meta's security posture. You will help the team establish, lead and execute multi-year roadmaps that improve research efficiency and quality across the team, and drive improvements to stakeholder management across a broad range of intelligence requirements.
**Required Skills:**
Detection & Response Security Engineer, Threat Intelligence Responsibilities:
1. Influence and align the team's vision and strategy. Collaboratively prioritize and deliver specific multi-year roadmaps and projects
2. Build, cultivate, and maintain impactful relationships with intelligence stakeholders to identify and facilitate solutions to increase the impact of the team's work
3. Refine operational metrics, key performance indicators, and service level objectives to measure Intelligence research and services
4. Lead cross-functional projects to improve the security posture of Meta's infrastructure, such as red team operations, surface detection coverage expansion and vulnerability management discussions
5. Track threat clusters posing threats to Meta's infrastructure and employees, and identify, develop and implement countermeasures on our corporate network
6. Investigate, mitigate, and forecast emerging technical trends and communicate effectively with actionable suggestions to different types of audiences
7. Work closely with incident responders to provide useful and timely intelligence to enrich ongoing investigations
8. Improve the tooling of threat cluster tracking and intelligence data integration to existing systems
**Minimum Qualifications:**
Minimum Qualifications:
9. 8+ years threat intelligence experience
10. B.S. or M.S. in Computer Science or related field, or equivalent experience
11. Be a technical and process subject matter expert regarding Security Operations and Threat Intelligence services
12. Experience developing and delivering information on threats, incidents and program status for leadership
13. Expertise with campaign tracking techniques and converting tracking results to long term countermeasures
14. Expertise with threat modeling frameworks, such as Diamond Model or/and MITRE ATT&CK framework
15. Experience intelligence-driven hunting to spot suspicious activities in the network and identify potential risks
16. Proven track record of managing and executing on short term and long term projects
17. Ability to work with a team spanning multiple locations/time zones
18. Ability to prioritize and execute tasks with minimal direction or oversight
19. Ability to think critically and qualify assessments with solid communications skills
20. Coding or scripting experience in one or more scripting languages such as Python or PHP
**Preferred Qualifications:**
Preferred Qualifications:
21. Experience recruiting, building, and leading technical teams, including performance management
22. Experience close collaborating with incident responders on incident investigations
23. Experience in threat hunting including leveraging intelligence data to proactively identify and iteratively investigates suspicious behavior across networks and systems
24. Familiarity with malware analysis or network traffic analysis
25. Familiarity with nation-state, sophisticated criminal, or supply chain threats
26. Familiarity with file-based or network-based rules and signatures for detection and tracking of complex threats, such as YARA or Snort
27. Experience in one or more query languages such as SQL
28. Experience authoring production code for threat intelligence tooling
29. Experience conducting large scale data analysis
30. Experience working across the broader security community
**Public Compensation:**
$177,000/year to $251,000/year + bonus + equity + benefits
**Industry:** Internet
**Equal Opportunity:**
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
Offensive Security Engineer, Assessments (Web3)
Security engineer job in Urban Honolulu, HI
Ready to be pushed beyond what you think you're capable of? At Coinbase, our mission is to increase economic freedom in the world. It's a massive, ambitious opportunity that demands the best of us, every day, as we build the emerging onchain platform - and with it, the future global financial system.
To achieve our mission, we're seeking a very specific candidate. We want someone who is passionate about our mission and who believes in the power of crypto and blockchain technology to update the financial system. We want someone who is eager to leave their mark on the world, who relishes the pressure and privilege of working with high caliber colleagues, and who actively seeks feedback to keep leveling up. We want someone who will run towards, not away from, solving the company's hardest problems.
Our ******************************** is intense and isn't for everyone. But if you want to build the future alongside others who excel in their disciplines and expect the same from you, there's no better place to be.
While many roles at Coinbase are remote-first, we are not remote-only. In-person participation is required throughout the year. Team and company-wide offsites are held multiple times annually to foster collaboration, connection, and alignment. Attendance is expected and fully supported.
The Application Security organization at Coinbase is seeking to hire an experienced Offensive Security Engineer specializing in Web3 penetration testing and Web3 bug bounty program management and optimization. In this role, you will collaborate with the Bug Bounty Program Lead to drive Web3 bug bounty triage, validation, and strategic initiatives aimed at increasing program efficiency, maturity, and hacker engagement. You will work closely with whitehat hackers, security engineers, and cross-functional teams to enhance Coinbase's security posture through an effective bug bounty program. Additionally, you will perform penetration tests on Web3 technologies and applications, ensuring the security of Coinbase's blockchain-based products and services.
*What you'll be doing (ie. job duties):*
* Conduct security assessments of Web3 products and services, including smart contracts, DeFi protocols, and blockchain infrastructure.
* Collaborate with partner teams to enhance detection and response capabilities for Web3 vulnerabilities.
* Stay informed on emerging security trends, advisories, and academic research in the Web3 space.
* Lead Web3 bug bounty triage and validation, ensuring timely and accurate assessments of reported vulnerabilities.
* Develop and implement strategies to incentivize high-quality bug bounty submissions and engage with the hacker community.
* Manage the Web3 bug bounty program, including scope updates, researcher communication, and payout disbursements.
* Analyze bug bounty data to identify trends, common vulnerabilities, and areas for improvement.
* Collaborate with engineering teams to prioritize and remediate vulnerabilities identified through the bug bounty program.
* Mentor and train junior security engineers in Web3 bug bounty triage and analysis.
* Provide on-call support for critical Web3 bug bounty-related incidents.
* Document and report on Web3 bug bounty metrics and program effectiveness.
*What we look for in you (ie. job requirements):*
* Bachelor's or Master's degree in Computer Science, Cybersecurity, Software Engineering, or a related field.
* 3+ years of experience in Web3 application security and penetration testing.
* Proven track record of identifying critical vulnerabilities across the blockchain protocol stack, Web2, and Web3 components.
* Extensive knowledge of the blockchain ecosystem, including L1/L2 networks, DeFi protocols, and staking mechanisms.
* Deep understanding of Web2 security concepts and common vulnerabilities (e.g., OWASP Top 10, SANS Top 25).
* Strong analytical skills to identify trends and patterns in vulnerabilities.
* Excellent communication skills for engaging with internal teams.
* Passion for security and a drive to improve Web3 security posture.
* Ability to work independently and take ownership of penetration testing initiatives.
* Energy and self-drive for continuous learning in the rapidly evolving crypto space.
* Excellence in clear, direct, and kind communication with technical and non-technical stakeholders.
* Experience building relationships with product, engineering, and security teams.
*Nice to haves:*
* Participation in CTFs, bug bounty programs, or open-source security research.
* Expertise in Application Security, Network Security, or Cloud Security.
* Relevant security certifications (e.g., OSCP, GPEN).
* Experience developing and implementing security tooling to support bug bounty triage and analysis.
* Experience with bug bounty programs and platforms, including triage, validation, and researcher communication.
* Strong analytical skills to identify trends and patterns in bug bounty submissions.
* Excellent communication skills to effectively engage with bug bounty researchers.
Position ID: P69494
\#LI-remote
*Pay Transparency Notice:* Depending on your work location, the target annual salary for this position can range as detailed below. Full time offers from Coinbase also include bonus eligibility + equity eligibility**+ benefits (including medical, dental, vision and 401(k)).
Pay Range:
$152,405-$179,300 USD
Please be advised that each candidate may submit a maximum of four applications within any 30-day period. We encourage you to carefully evaluate how your skills and interests align with Coinbase's roles before applying.
Commitment to Equal Opportunity
Coinbase is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, sex, gender expression or identity, sexual orientation or any other basis protected by applicable law. Coinbase will also consider for employment qualified applicants with criminal histories in a manner consistent with applicable federal, state and local law. For US applicants, you may view the *********************************************** in certain locations, as required by law.
Coinbase is also committed to providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation because of a disability for any part of the employment process, please contact us at accommodations***********************************
*Global Data Privacy Notice for Job Candidates and Applicants*
Depending on your location, the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) may regulate the way we manage the data of job applicants. Our full notice outlining how data will be processed as part of the application procedure for applicable locations is available ********************************************************** By submitting your application, you are agreeing to our use and processing of your data as required.
*AI Disclosure*
For select roles, Coinbase is piloting an AI tool based on machine learning technologies to conduct initial screening interviews to qualified applicants. The tool simulates realistic interview scenarios and engages in dynamic conversation. A human recruiter will review your interview responses, provided in the form of a voice recording and/or transcript, to assess them against the qualifications and characteristics outlined in the job description.
For select roles, Coinbase is also piloting an AI interview intelligence platform to transcribe and summarize interview notes, allowing our interviewers to fully focus on you as the candidate.
*The above pilots are for testing purposes and Coinbase will not use AI to make decisions impacting employment*. To request a reasonable accommodation due to disability, please contact accommodations[at]coinbase.com
Lead Adversarial Security Engineer
Security engineer job in Urban Honolulu, HI
**_Job Title:_** Lead Adversarial Security Engineer **About** **Trellix:** **Trellix, the trusted CISO ally, is redefining the future of cybersecurity and soulful work.** Our comprehensive, GenAI-powered platform helps organizations confronted by today's most advanced threats gain confidence in the protection and resilience of their operations. Along with an extensive partner ecosystem, we accelerate technology innovation through artificial intelligence, automation, and analytics to empower over 53,000 customers with responsibly architected security solutions.
We also recognize the importance of closing the 4-million-person cybersecurity talent gap. We aim to create a home for anyone seeking a meaningful future in cybersecurity and look for candidates across industries to join us in soulful work. More at ************************ .
**_Role Overview:_**
Trellix is seeking an Adversarial Security Engineer to lead the evolution of its cybersecurity posture. This is a senior, hands-on, remote-first role for a red/blue/purple expert who possesses a valuable blend of offensive tradecraft and defensive-engineering skills.
**Role Overview:**
As a lead member of the security operations team, and reporting to the Deputy CISO the mission of this role is to bridge the gap between "what if" and "what is" to continuously test the organization's defenses, find gaps, and personally lead the engineering effort to close them. By collaborating with the Security Operations Center (SOC), Threat Intelligence, and infrastructure teams, this expert will act as a force multiplier, mentoring junior security operations staff and providing the technical leadership to measurably improve the ability to detect and respond to advanced threats.
**About the role:**
+ Plan and execute sophisticated, end-to-end red team engagements against our on-premise and cloud infrastructure.
+ Develop and validate new detection logic, transforming the results of your own attacks into high-fidelity alerts.
+ Lead continuous purple team exercises, acting as the primary bridge between the SOC, Threat Intelligence, and Detection Engineering teams.
+ Leverage Attack Surface Management (ASM) data to find "Shadow IT" and prioritize your offensive operations based on the most likely and impactful attack vectors.
+ Act as a senior technical leader, mentoring SOC analysts and junior engineers on advanced attack chains, detection theory, and defensive best practices.
+ Communicate complex findings and remediation strategies to a wide range of stakeholders, from highly technical engineers to executive leadership.
**About you:**
+ You have a blended career path of 7+ years, demonstrating experience in both offensive security (like Red Teaming) and defensive operations (like Detection Engineering or Threat Hunting).
+ You possess exceptional communication skills, with an ability to create reports and presentations for both highly technical and executive audiences.
+ You are a U.S. citizen.
+ Your technical expertise is built on a deep, practical understanding of frameworks like MITRE ATT&CK and the Diamond Model.
+ You have proficiency in modern offensive tools and C2 frameworks (e.g., Cobalt Strike, Metasploit) and/or experience developing custom attack methods to evade EDR and network controls.
+ You are proficient in writing, tuning, and validating detection logic in SIEM and EDR platforms.
+ Your knowledge of automation is clear from your proficiency in any scripting languages such as Python or PowerShell.
+ You have practical experience assessing and defending modern cloud environments.
+ You may hold advanced offensive (e.g., OSCP, OSEP, GXPN) or defensive (e.g., GCIH, GDAT) certifications.
+ You may contribute to the community through public-facing research, conference talks, or open-source tools.
**_Company Benefits and Perks:_**
We believe that the best solutions are developed by teams who embrace each other's unique experiences, skills, and abilities. We work hard to create a dynamic workforce where we encourage everyone to bring their authentic selves to work every day. We offer a variety of social programs, flexible work hours and family-friendly benefits to all of our employees.
+ Retirement Plans
+ Medical, Dental and Vision Coverage
+ Paid Time Off
+ Paid Parental Leave
+ Support for Community Involvement
We're serious about our commitment to a workplace where everyone can thrive and contribute to our industry-leading products and customer support, which is why we prohibit discrimination and harassment based on race, color, religion, gender, national origin, age, disability, veteran status, marital status, pregnancy, gender expression or identity, sexual orientation or any other legally protected status.
Principal Information Security Architect
Security engineer job in Urban Honolulu, HI
Lumen connects the world. We are igniting business growth by connecting people, data and applications - quickly, securely, and effortlessly. Together, we are building a culture and company from the people up - committed to teamwork, trust and transparency. People power progress.
We're looking for top-tier talent and offer the flexibility you need to thrive and deliver lasting impact. Join us as we digitally connect the world and shape the future.
**The Role**
The Principal Information Security Architect provides subject matter expertise for multiple, complex security systems, including developing security architectures and roadmaps, and evaluating, planning and designing security solutions. Additionally, the Principal Architect provides subject matter expertise to Product, IT, Network, and Security teams in the implementation of recommended solutions for identified technical security issues; ensures the implementation of security solutions utilizing advanced technical expertise; serves as architecture lead on major projects with the ability and expertise to develop overall architectural direction; initiates and executes advanced research and development activities of significance to future business security strategies.
**The Main Responsibilities**
+ Drives beneficial security change into the business through the development or review of architectures to ensure that they fit business requirements for security, mitigate risks, conform to the relevant security standards, and balance information risk against the cost of appropriate countermeasures.
+ Develops and designs new security solutions to reduce risk and align business requirements with security standards. Supports vendor relationships; leads vendor reviews through RFx process, working with Procurement and appropriate business partners on requirements and success criteria. Supports development of business case and approval process.
+ Delivers guidelines, best practices, and direction on security standards/policies and roadmaps. Provides subject matter expertise, consultation, and escalation support.
+ Provides support to Security Review process by assisting with complex questions and projects. Work with business units and partners as needed.
+ Acts as liaison between the business and technology from a security perspective, maintains an overview of the environment as a whole and its security aspects, understands business strategy and how it relates to security strategy, acts as a liaison between appropriate regulatory bodies, IT auditors, and business stakeholders, educates IT and enterprise roles on the need for (and consequences of) reducing information-related risk, and ultimately drives organizational change at all levels of the business.
**What We Look For in a Candidate**
Required:
+ Bachelor's degree in computer science, engineering, or related field with 15+ years of relevant experience or
+ Master's degree in computer science, engineering, or related field with 12+ years of relevant experience.
+ Applicable professional/technical certifications must be in place, such as CISSP, GPEN, GWAPT, GISEC, CISM or CISA.
+ Knowledge of information security industry and regulatory obligations (ISO 27001/27002, NIST Framework, FISMA, FedRAMP, and GDPR).
+ Software development experience.
**Compensation**
This information reflects the anticipated base salary range for this position based on current national data. Minimums and maximums may vary based on location. Individual pay is based on skills, experience and other relevant factors.
Location Based Pay Ranges:
$149,084 - $198,779 in these states: AL, AR, AZ, FL, GA, IA, ID, IN, KS, KY, LA, ME, MO, MS, MT, ND, NE, NM, OH, OK, PA, SC, SD, TN, UT, VT, WI, WV, and WY.
$156,539 - $208,718 in these states: CO, HI, MI, MN, NC, NH, NV, OR, and RI.
$163,993 - $218,657 in these states: AK, CA, CT, DC, DE, IL, MA, MD, NJ, NY, TX, VA, and WA.
Lumen offers a comprehensive package featuring a broad range of Health, Life, Voluntary Lifestyle benefits and other perks that enhance your physical, mental, emotional and financial wellbeing. We're able to answer any additional questions you may have about our bonus structure (short-term incentives, long-term incentives and/or sales compensation) as you move through the selection process.
Learn more about Lumen's:
+ Benefits (****************************************************
+ Bonus Structure
\#LI-Remote
**What to Expect Next**
Requisition #: 340981
**Background Screening**
If you are selected for a position, there will be a background screen, which may include checks for criminal records and/or motor vehicle reports and/or drug screening, depending on the position requirements. For more information on these checks, please refer to the Post Offer section of our FAQ page (************************************* . Job-related concerns identified during the background screening may disqualify you from the new position or your current role. Background results will be evaluated on a case-by-case basis.
Pursuant to the San Francisco Fair Chance Ordinance, we will consider for employment qualified applicants with arrest and conviction records.
**Equal Employment Opportunities**
We are committed to providing equal employment opportunities to all persons regardless of race, color, ancestry, citizenship, national origin, religion, veteran status, disability, genetic characteristic or information, age, gender, sexual orientation, gender identity, gender expression, marital status, family status, pregnancy, or other legally protected status (collectively, "protected statuses"). We do not tolerate unlawful discrimination in any employment decisions, including recruiting, hiring, compensation, promotion, benefits, discipline, termination, job assignments or training.
**Disclaimer**
The job responsibilities described above indicate the general nature and level of work performed by employees within this classification. It is not intended to include a comprehensive inventory of all duties and responsibilities for this job. Job duties and responsibilities are subject to change based on evolving business needs and conditions.
In any materials you submit, you may redact or remove age-identifying information such as age, date of birth, or dates of school attendance or graduation. You will not be penalized for redacting or removing this information.
Please be advised that Lumen does not require any form of payment from job applicants during the recruitment process. All legitimate job openings will be posted on our official website or communicated through official company email addresses. If you encounter any job offers that request payment in exchange for employment at Lumen, they are not for employment with us, but may relate to another company with a similar name.
NOSC Cyber Analyst
Security engineer job in Urban Honolulu, HI
Aloha! One of Hawaii's utility companies is seeking a technical specialist responsible for, monitoring, operating, and troubleshooting network and security status of any component comprising the assigned customer's networks, systems, and software. Additionally, he/she will also be a member of the Network Operations and Security Center (NOSC) team providing 24x7 operations and security monitoring for client.
RESPONSIBILITIES:
- 30% Perform pro-active monitoring of system and network element alarms and alerts to identify those components/elements that may lead to, or already are causing degradation or failure.
- 30% Perform security monitoring and management, fault isolation and diagnostic functions to include determination and execution of corrective actions on a real-time basis. Use network and system management platforms to remotely access and analyze systems, nodes, and devices to identify resolutions to correct anomalies.
- 10% Interface with functional users, other NOSC support personnel and management in both routine and reactive monitoring situations. Execute reporting and data input associated with NOSC operations and ticket management.
- 10% Maintains inventory in conjunction with the Desktop Services Section of installed hardware and software and insures adequate maintenance coverage.
- 10% Document data and telecommunication networks, network servers, software, and service configurations. Update and maintains configuration tables and drawings. Maintains up-to-date knowledge of IT, security, telecommunications, products, trends, and directions.
- 10% Analyze network traffic data, throughput, reliability, and other characteristics related to efficient operation and support of networks and systems.
Basic Qualifications and Knowledge Requirements:
Thorough knowledge of the principles of information and office technology normally acquired through college level courses or equivalent experience.
Thorough knowledge of data security and disaster recovery principles, IBM operating systems concepts, access methods, file structures and data communications normally acquired through specialized education and several years of professional experience.
Work Environment
7x24 operations
Must be able to work holidays
Must be able to work night shifts, graveyard shifts and weekends.
The 3 shifts are below
7-4 shift
3-12 shift
11-8 shift
5-6 month rotation
Job Type & Location
This is a Permanent position based out of Honolulu, HI.
Pay and Benefits
The pay range for this position is $60000.00 - $87000.00/yr.
holidays, pto. no longer have a pension plan but their 401k plan is generous. they do have 10% employer match and the duration to get fully vested is 5 years.
Workplace Type
This is a fully onsite position in Honolulu,HI.
Application Deadline
This position is anticipated to close on Dec 23, 2025.
h4>About TEKsystems:
We're partners in transformation. We help clients activate ideas and solutions to take advantage of a new world of opportunity. We are a team of 80,000 strong, working with over 6,000 clients, including 80% of the Fortune 500, across North America, Europe and Asia. As an industry leader in Full-Stack Technology Services, Talent Services, and real-world application, we work with progressive leaders to drive change. That's the power of true partnership. TEKsystems is an Allegis Group company.
The company is an equal opportunity employer and will consider all applications without regards to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic protected by law.
About TEKsystems and TEKsystems Global Services
We're a leading provider of business and technology services. We accelerate business transformation for our customers. Our expertise in strategy, design, execution and operations unlocks business value through a range of solutions. We're a team of 80,000 strong, working with over 6,000 customers, including 80% of the Fortune 500 across North America, Europe and Asia, who partner with us for our scale, full-stack capabilities and speed. We're strategic thinkers, hands-on collaborators, helping customers capitalize on change and master the momentum of technology. We're building tomorrow by delivering business outcomes and making positive impacts in our global communities. TEKsystems and TEKsystems Global Services are Allegis Group companies. Learn more at TEKsystems.com.
The company is an equal opportunity employer and will consider all applications without regard to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic protected by law.
Information Assurance Analyst
Security engineer job in Urban Honolulu, HI
Information Assurance AnalystLOCATIONHonolulu, HI 96815CLEARANCETS/SCI Full Poly (Please note this position requires full U.S. Citizenship) KEY SUMMARYWe are seeking a detail-oriented and proactive Information Assurance Analyst to join our team and safeguard critical information systems. In this role, you will play a key part in identifying, assessing, and mitigating security risks to ensure compliance with organizational policies and industry standards. Collaborating with technical teams, you will implement best practices, monitor systems for vulnerabilities, and provide solutions to enhance security. If you are passionate about protecting sensitive data and thrive in a dynamic, fast-paced environment, we encourage you to apply!
*** Please note that our job openings are dynamic and can open or close quickly (much faster than we can publish). If you do not see an opening you are looking for, know that we see almost all types of positons. We strive to keep our listings up to date, but please consider submitting your current resume. Our team will work with you to identify the most recent opportunities that align with your skillset and career goals. We look forward to you joining our family. ***
SIMILAR CAREER TITLESCybersecurity Analyst, Security Analyst, Information Security Specialist, Risk Management Analyst, Compliance Analyst, IT Security Analyst, Security Operations Analyst, Network Security Analyst, Vulnerability Analyst, Data Protection Analyst, etc.DEGREE (Level Desired) Bachelor's DegreeDEGREE (Focus) Cybersecurity, Information Assurance, Computer Science, Information Technology, Systems Engineering, Network Security, Information Systems, Data Science, Risk Management, Software Engineering, etc.ALTERNATE EXPERIENCEGeneral comment on degrees: Most contracts allow additional experience (4-5 years) in lieu of a Bachelor's Degree. Some contracts give 4-5 years experience credit for a Bachelor's Degree. Some contracts give 2 years experience credit for a Master's Degree. We will work with you to find the right fit.POSITION RESPONSIBILITIES
Identify and mitigate security risks
Conduct system vulnerability assessments
Monitor compliance with security policies
Implement security best practices
Document security incidents and resolutions
Collaborate with IT and security teams
REQUIRED SKILLS
Knowledge of security frameworks
Risk assessment and analysis
Incident response techniques
Proficiency in security tools
Understanding of access control
Strong analytical thinking
DESIRED SKILLS
Familiarity with SIEM platforms
Experience with penetration testing
Knowledge of cloud security
Understanding of compliance standards (e.g., NIST, ISO)
Familiarity with encryption protocols
Proficiency in security automation tools
PLUG IN to CYMERTEK - And design your future... YOUR FOREVER CAREER STARTS HERE
Are you looking for more than just a job? Join a company where employees are treated like family, and your career is built to last. We are a growing small business and a trusted federal contractor offering full scope consulting services in information technology, cybersecurity, and analyst workforce development.
At our company, you come first. We're committed to creating an environment where you'll thrive professionally and personally. We provide meaningful, challenging work using cutting-edge technologies while investing in your growth and success. With direct access to company leadership, a laid-back and inclusive atmosphere, and exceptional work-life balance, you'll feel valued every day.
We also believe in taking care of our family - both yours and ours. Our benefits are phenomenal, family-friendly, and designed with your well-being in mind. From employee and family events to career-long support, we create a community you'll never want to leave.
Ready to make your next move the best one? Join us and experience the difference.
BENEFITS
Excellent Salaries
Flexible Work Schedule
Cafeteria Style Benefits
10% - 401k Matching (Vested Immediately)
Additional 401k Profit Sharing
30 days Paid Leave/Holiday (No Use or Lose!)
The day off for your birthday
Medical/Dental/Vision - 100% employee coverage. ($1200 allowance - or a bonus)
HSA/FSA
AFLAC
Long Term/Short Term Disability - 100% employee coverage. No cost to you.
Life Insurance - 100% employee coverage. No cost to you.
Additional Discretionary Life Insurance
Paid Training
No long, wordy reviews with tons of paperwork!!!
Referral bonus program with recurring annual payments
HOW TO APPLY
Email us at ***************** or apply today: ****************
Want to see what our employees think? Click here .
EQUAL OPPORTUNITY EMPLOYER STATEMENT
Cymertek is proud to be an Equal Opportunity Employer committed to fostering an inclusive and diverse workplace. We embrace and celebrate differences in our employees, recognizing that a diverse workforce enhances our creativity, innovation, and overall success. At Cymertek, employment decisions are made based on merit, qualifications, and business needs without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, veteran status, or any other characteristic protected by applicable laws. We believe in creating an environment where all individuals are treated with respect and dignity, and where opportunities for professional growth and advancement are accessible to everyone, regardless of background or identity.
Easy ApplyComputer Network Defense (CND) Analyst 3 (CCAs Accepted)
Security engineer job in Urban Honolulu, HI
At Wyetech, you'll be at the center of an award-winning corporate culture, breaking technological barriers and solving real-world problems for our federal government customers. We are committed to hiring the best of the best, and in return, we offer a world-class, truly unique employee experience that is rare within our industry.
Use information collected from a variety of computer network defense resources (including, but not limited to, intrusion detection system alerts, firewall and network traffic logs, and host system logs) to identify, analyze, and report events that occur or might occur within their environment.
Due to federal contract requirements, United States Citizenship and position appropriate security clearance is required. (e.g. Active TS/SCI security clearance with agency appropriate polygraph).
Required Qualifications
TS/SCI with agency appropriate poly
Ten (10) years of experience and an Associate's Degree in Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security).
OR
Eight (8) years of experience and an Bachelor's Degree in Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security).
OR
Six (6) years of experience and an Master's Degree in Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security).
OR
Four (4) years of experience and an Doctorate Degree in Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security).
Relevant Experience
Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering. Additionally, must have experience in network or system administration. If not credited toward education requirements, completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered towards relevant experience requirement (i.e., 20-24 week courses will count as 6 months of experience, 10-14 weeks will count as 3 months of experience).
18 semester hours of military training/ coursework in networking, computer science, or cyber topics is equivalent to an Associate's degree
Required Technical Skills
Excellent communication and collaboration skills to interface across NSA
Be able to ACTIVELY participate in leadership/IC exchanges
Strong verbal and written communication skills
Be able to identify intrusions and actors current intrusion sets commercial Cybersecurity Firms
Need an understanding of Virtual Private Servers, VPNs, and The Diamond Model obfuscation networks
Highly proficient Agency tools: DX, BuffaloBuffalo, CLEARVISION, CVEs, SSVE, VirusTotal
Author and read highly technical reports
The Benefits Package
Wyetech believes in generously supporting employees as they prepare for retirement. The company automatically contributes 20% of each employee's gross compensation to a Simplified Employee Pension (SEP) IRA, with no requirement for employee matching. All contributions are fully vested from day one, ensuring immediate ownership of retirement funds.
Additional benefits include:
Wyetech provides a generous PTO plan of up to 200 hours annually, aligned with applicable state leave regulations. Employees have the flexibility to adjust their PTO allocation at the start of each calendar year, ensuring it meets their evolving needs.
Full-time employees have the option to participate in a variety of voluntary benefit plans including:
A Choice of Medical Plan Options, some with Health Savings Account (HSA)
Vision and Dental
Life and AD&D Benefits
Short and Long-Term Disability
Hospital Indemnity, Accident, and Critical Illness Insurances
Optional Identity Theft and Legal Protection Services
Company Environment & Perks
Employee Referral Bonus Eligibility up to $10,000
Mobility Among Wyetech-supported Contracts
Various contract and work locations throughout Maryland, Virginia, Colorado, Texas, Utah, Alaska, Hawaii and OCONUS
Various team-building events throughout the year such as: monthly lunches, summer company picnic, and an annual holiday party.
Employees receive two complementary branded clothing orders annually.
Wyetech, LLC is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Affirmative Action Statement:
Wyetech, LLC is committed to the principles of affirmative action in all hiring and employment for minorities, women, individuals with disabilities, and protected veterans.
Accommodations:
Wyetech, LLC is committed to providing an inclusive and accessible hiring process. If you need any accommodations during the application or interview process, please contact Brittney Wood. at 844-WYETECH x727 or ********************. We are happy to provide reasonable accommodations to ensure equal access to all candidates.
Auto-ApplySecurity Consultant - Engineering
Security engineer job in Urban Honolulu, HI
**About Us** **As a digital and cybersecurity services company, Stratascale exists to help the Fortune 1000 transform the way they use technology to advance the business, generate revenue, and respond quickly to market demands. We call it Digital Agility.**
**To learn more about how we're shaping the future of digital business and a more secure world, visit stratascale.com.**
**Job Description Summary**
The Security Consultant - Engineering provides subject matter expertise and technical support on Security Incident and Event Management (SIEM) platforms, supporting and delivering practice focused solutions to our customers. This role involves developing governance models, collaborating with sales and technical teams, delivering training content, and staying informed on industry trends to ensure successful solution delivery and continuous improvement in security practices. Help clients gain insight and context to their complex operating environments and provide services and technology to assess and optimize their existing security platforms to meet the client's security specific needs.
This position is remote with a Home Office setup as determined by Stratascale management.
+ Provide subject matter expertise on Security Incident and Event Management (SIEM) platforms to ensure successful delivery of services to include technologies such as, but not limited to, Palo Alto XSIAM
+ Proactively identify customer needs and requirements through data, customer engagement and other methods to recommend appropriate solutions and drive these solutions through implementation and adoption.
+ Engage with internal team members and client stakeholders to ensure successful solution delivery
+ Stay educated on new product technology, tangential team capabilities, and other specific offerings or programs emerging within our company and within the practice industry
+ Identify areas for continued advancement of strategies aligned with Industry direction, client need, practice scope and present solutions to leadership
+ Execute services by ensuring client needs and practice obligations are met successfully
+ Participate in the development of cross practice training or delegate trainings to team members on practice discipline capability, associated offerings, industry positioning and selling strategies
+ Collaborate with peers to develop and optimize cross practice capabilities as appropriate
+ Serve as a subject matter expert in maintaining, optimizing, and delivering security engineering solutions
**Behaviors and Competencies**
+ Communication: Can effectively communicate complex ideas and information to diverse audiences, facilitate effective communication between others, and mentor others in effective communication.
+ Relationship Building: Can take ownership of complex team initiatives, collaborate with diverse groups, and drive results through effective relationship management.
+ Self-Motivation: Can take ownership of complex personal or professional initiatives, collaborate with others when necessary, and drive results through self-motivation.
+ Negotiation: Can take ownership of complex negotiations, collaborate with others, and drive consensus.
+ Impact and Influence: Can rally a team or group towards a common goal, creating a positive and persuasive influence.
+ Business Development: Can take ownership of significant business initiatives, collaborate with various stakeholders, and drive business results.
+ Emotional Intelligence: Can use emotional information to guide thinking and behavior, manage and/or adjust emotions to adapt to environments or achieve one's goal(s), and help others do the same.
+ Detail-Oriented: Can oversee multiple projects, maintaining a high level of detail orientation, identifying errors or inconsistencies in work, and ensuring accuracy across all tasks.
+ Follow-Up: Can take ownership of tasks, collaborate with others in managing follow-ups, and drive results through effective task completion.
+ Presenting: Can effectively use visual aids, storytelling, and persuasive techniques to enhance presentations and engage audiences.
+ Delegation: Can delegate responsibilities across a team, balancing workload, and ensuring all members understand their roles.
+ Analytical Thinking: Can use advanced analytical techniques to solve complex problems, draw insights, and communicate the solutions effectively.
+ Critical Thinking: Can integrate and synthesize information from various sources to inform strategic decision-making and problem-solving.
+ Technical Troubleshooting: Can take ownership of complex technical problems, collaborate with others to manage solutions, and drive results in problem resolution.
**Skill Level Requirements**
+ Deep knowledge of Palo Alto Networks XSIAM: Hands-on experience with XSIAM (Extended Security Intelligence & Automation Management), including deployment, configuration, and ongoing management.
+ Log Management: Experience with log ingestion, parsing, normalization, and correlation.
+ Threat Intelligence: Ability to integrate and operationalize threat intelligence feeds within XSIAM.
+ Outstanding written and verbal communication and strong ability to build relationships with customers, partners and staff members
+ Ability to resolve and close complex technical and selling situations while support competitive selling motions
+ Ability to train and disseminate information within an area or operation and work effectively within all levels of an organization, both internally and externally
+ Ability to influence and lead all aspects of sales cycle and engage appropriate internal and external subject matter experts as needed
+ Ability to engage and discuss technical and non-technical concepts and explain complex problems with a wide array of customer audience types including C-Suite, VP/Director,
+ Willingness, drive and winning mindset to compete in customer opportunities
+ Entrepreneurial mindset with ability to identify value in unstructured situations
+ Problem solving skills with the ability to serve as an escalation point and knowledgeable resource and direct resolution while accessing circumstances and current information to make informed and best decision
+ Security Frameworks: Familiarity with MITRE ATT&CK, NIST, and other security frameworks.
**Other Requirements**
+ Completed Bachelor's Degree or relevant work experience required
+ 5+ years of experience working with large organizations on security engineering projects
+ Familiarity with SOC workflows, incident response, threat detection, and security automation.
+ Experience with SIEM (Security Information and Event Management) and SOAR (Security Orchestration, Automation, and Response) platforms, especially Palo Alto Cortex XSOAR and XSIAM.
+ Understanding of cloud platforms (AWS, Azure, GCP) and their integration with XSIAM.
+ Ability to travel to SHI, Partner, and Customer Events
+ Advanced industry certifications preferred
The estimated annual pay range for this position is $130,000 - $153,900 which includes a base salary and bonus. The compensation for this position is dependent on job-related knowledge, skills, experience, and market location and, therefore, will vary from individual to individual. Benefits may include, but are not limited to, medical, vision, dental, 401K, and flexible spending.
Equal Employment Opportunity - M/F/Disability/Protected Veteran Status
Cyber Defense Analyst
Security engineer job in Urban Honolulu, HI
The Alaka`ina Foundation Family of Companies (FOCs) is looking for a Cyber Defense Analyst to support our government customer located in Honolulu, Hawai'i. DESCRIPTION OF RESPONSIBILITIES: * Coordinate with enterprise-wide cyber defense staff to validate network alerts
* Document and escalate incidents (including event's history, status, and potential impact for further action) that may cause ongoing and immediate impact to the environment
* Perform cyber defense trend analysis and reporting
* Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack
* Perform security reviews and identify security gaps in security architecture resulting in recommendations for the inclusion into the risk mitigation strategy
* Provide daily summary reports of network events and activity relevant to cyber defense practices
* Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts
* Provide timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities
* Use cyber defense tools for continual monitoring and analysis of system activity to identify malicious activity
* Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information
* Identify and analyze anomalies in network traffic using metadata (e.g., CENTAUR)
* Conduct research, analysis, and correlation across a wide variety of all source data sets (indications and warnings)
* Identify applications and operating systems of a network device based on network traffic
* Other duties as assigned
REQUIRED DEGREE/EDUCATION/CERTIFICATION:
* A Bachelor of Science degree in Information Technology, Cybersecurity, Data Science, Information Systems, or Computer Science
* Must meet at least one of the following baseline certifications in lieu of education: GFACT, GISF, Cloud+, GCED, PenTest+, Security+, or GSEC
* Minimum of 20 hours annually of continued education
REQUIRED SKILLS AND EXPERIENCE:
* Minimum of five (5) years related experience
* Knowledge of Intrusion Detection System (IDS)/Intrusion Prevention System (IPS) tools and applications
* Knowledge of cyber defense and vulnerability assessment tools, including open-source tools, and their capabilities
* Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions via intrusion detection technologies
* Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.
* Able to perform packet level analysis
* Skilled in collecting data from a variety of cyber defense resources
* Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions via intrusion detection technologies
* Knowledge of cyber defense policies, procedures, and regulations.
* Able to recognize and categorize types of vulnerabilities and associated attacks
* Must meet DoD 8140 Cyber Defense Analyst (511)
REQUIRED CITIZENSHIP AND CLEARANCE:
* Must be a U.S. Citizen
* Must have an active TOP SECRET SCI/Poly clearance
The Alaka`ina Foundation Family of Companies (FOCs) is a fast-growing government service provider. Employees enjoy competitive salaries. Eligible full-time employees enjoy a 401K plan with company match; medical, dental, disability, and life insurance coverage; tuition reimbursement; paid time off; and 11 paid holidays.
We are an Equal Opportunity/Affirmative Action Employer of individuals with disabilities and veterans. We are proud to state that we do not illegally discriminate in employment decisions on the basis of any protected categories. If you are a person with a disability and you need an accommodation during the application process, please click here to request accommodation. We E-Verify all employees
"EOE, including Disability/Vets" OR "Equal Opportunity Employer, including Disability/Veterans"
The Alaka`ina Foundation Family of Companies (FOCs) is comprised of industry-recognized government service firms designated as Native Hawaiian Organization (NHO)-owned and 8(a) certified businesses. The Family of Companies (FOCs) includes Ke`aki Technologies, Laulima Government Solutions, Kūpono Government Services, and Kāpili Services, Po`okela Solutions, Kīkaha Solutions, LLC, and Pololei Solutions, LLC. Alaka`ina Foundation activities principally benefit the youth of Hawaii through charitable efforts which includes providing innovative educational programs that combine leadership, science & technology, and environmental stewardship.
For additional information, please visit **************************
#LI-JS1
#ClearanceJobs
Sr. Cyber Security Analyst - Top Secret Clearance (SCI Eligible)
Security engineer job in Pearl City, HI
Full-time Description
With more than twenty years of securing some of the U.S. Department of Defense and the Intelligence Community's most critical networks, JFL Consulting, LLC provides advanced network security solutions to a range of US Government and US commercial clients. Our cybersecurity operators are experts at assessing and defending mission-critical data and the networks that facilitate their operation. We are focused on delivering advanced products and industry best practices that meet each customer's unique requirements. Visit *********************
Job Description
JFL Consulting, LLC is seeking a Senior Cyber Security Operator to support critical cybersecurity operations within highly secure environments. This role offers the opportunity to work on advanced network defense strategies, with a unique focus on passive vulnerability analysis: a specialized and low-impact method of identifying risks without active scanning. You'll play a key role in detecting anomalies, analyzing complex systems, and strengthening network security for high-value missions. This position is ideal for professionals who enjoy deep technical work, problem-solving, and contributing to meaningful national security efforts within a collaborative, mission-driven team.
Job Title: Senior Cyber Security Operator
Place of Performance: Pearl Harbor HI, 96701
Mandatory Requirements: Top Secret Clearance (SCI Eligible)
Experience Level: Senior-Level (8+ years in cybersecurity, 3+ years in passive vulnerability analysis)
Responsibilities:
Ensure the safe and proper functional operation of the toolkit and its components.
Collect and document measures of performance per approved CONOPS.
Analyze and document behaviors, characteristics, and attributes of a network's baseline activity within steady-state operations.
Analyze and investigate potential anomalies or outliers from established baseline.
Analyze and identify misconfigurations, faults, and vulnerabilities within the network's architecture, subcomponents, and utilized communication protocols.
Determine root source of anomalies and extent of vulnerable findings for validation with system users and administrators.
Document and report anomalies to appropriate channels for further investigation and notification.
Document vulnerable findings and provide recommendations through appropriate channels that increase both security and operational capacity of the respective network.
Recommend improvements to current operations for potential incorporation into the overall program.
Collaborate with cross-functional teams to support incident response, system hardening, and policy development as needed.
Additional duties as assigned
5-10% Conus Travel
Requirements
Education:
Bachelor's degree in Cybersecurity, Computer Science, Information Systems, or a related field preferred. Equivalent work experience may be considered in lieu of a degree.
A master's degree is a plus.
Certifications:
Must hold an IAT Level II certification as defined and described in DoDD 8570.01, 8570.01-M, and 8140.01-03, and as amended. (e.g., Security+ CE, CySA+, CCNA Security, GSEC).
Must hold a CSSP Analyst certification as defined and described in DoDD 8570.01, 8570.01-M, and 8140.01-03, and as amended. (e.g., CEH, CySA+, GCIA, GCIH).
Preferred: Advanced certifications such as CISSP (Certified Information Systems Security Professional), OSCP (Offensive Security Certified Professional), or similar.
Experience:
Minimum 8 years in cybersecurity operations or analysis
Minimum 3 years of experience with passive vulnerability detection techniques
Experience supporting DoD or Intelligence Community networks
Technical Skills:
Practical experience with firewalls, network TAPs, IDS/IPS, endpoint protection, and other network defense technologies
Adept in evaluating network protocols utilizing network analyzers, such as Wireshark, Tshark, and tcpdump
Experienced in analyzing network datasets, including Zeek and firewall logs, to support threat hunting and security investigations.
Experienced in leveraging data analysis platforms, such as Splunk, Kibana, and Arkime, to detect and analyze anomalous network activity
Proficient in triaging Suricata alerts, tuning rules, and creating custom detections.
Knowledge:
In-depth understanding of network vulnerabilities and misconfigurations
Strong knowledge of cybersecurity principles, adversary techniques, and detection/response strategies
Experience working within the framework of a CONOPS or similar operational document
Awareness of DoD cybersecurity frameworks (e.g., RMF, CMMC, NIST 800-53) and their application in secure system design and monitoring.
Knowledge of common enterprise network architectures and defense mechanisms
Experienced in analyzing TCP/IP, DNS, HTTP/S, SSL/TLS, SMB, and RDP protocols to identify vulnerabilities, misconfigurations, and indicators of malicious activity.
Soft Skills:
Strong analytical and investigative mindset
Excellent documentation and reporting skills
Effective communicator with ability to explain technical issues to both technical and non-technical audiences
Comfortable working independently and as part of a cross-functional team
Competitive Benefits Package Includes:
100% employer-paid medical, dental, and vision for employees and dependents
401(k) with 3% company contribution and immediate vesting
Generous PTO policy (15 vacation, 5 sick, 2 personal days)
Reimbursement for job-related certifications, generous training budget and company provided access to training platforms.
JFL Consulting, LLC is an Equal Opportunity Employer.
We do not discriminate against any applicant for employment on any legally recognized basis including, but not limited to: race, religion or creed, color, national origin, sex, age, disability, marital status, sexual orientation, genetic information, veteran status, status with regard to public assistance or any other protected class under federal, state or local statute. It is also the policy of JFL Consulting, LLC to provide reasonable accommodations for qualified individuals with disabilities.
Engineer, Information Security and Risk
Security engineer job in Urban Honolulu, HI
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
Lead IAM work for new customer onboardings and migrations. Collaborate with CAH Account Management, Application Teams, and Customers to design, implement, and test federated SSO solution based on customer login requirements. Provide technical guidance and act as primary point of contact for business partners and customer related to IAM work for onboarding. Additional responsibilities include supporting application integrations and enhancing SSO self service application onboarding.
**Responsibilities:**
+ **Customer Onboarding IAM Efforts - Strategy & Execution :** Lead the planning, design, and execution for Customer Onboarding via federated SSO, ensuring alignment with overall business and security objectives. This includes assessing multiple Cardinal Health e-commerce applications, understanding login requirements for new/existing customers, designing, testing and implementing solutions etc to ensure top notch user login experience and enhancing Cardinal Health's security posture.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Customer Business and IT teams, Cardinal Health's Account Management/Sales and Application teams, Information Security and others to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical internal and external stakeholders.
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) frameworks.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
Security Cooperation Analyst (Periphery CFT), SOCPAC
Security engineer job in Urban Honolulu, HI
The Unconventional is seeking a qualified Security Cooperation Analyst (Periphery CFT) to support our team. The Security Cooperation Analyst (Periphery CFT) is aligned to periphery countries in the INDOPACOM Area of Responsibility. The team plans and coordinates the full range of special operations for Special Operations Command Pacific (SOCPAC) operations, activities and investments (OAIs) within the Periphery in support of the USINDOPACOM campaign plan. The Security Cooperation Analyst (Periphery CFT) will shepherd OAIs specific to Security Cooperations (SC) programs within their assigned portfolio area from inception to completion and as directed by COMSOCPAC and the SOCPAC Director of Operations (SOJ3).
Specific duties may include, but are not limited to:
Manages multiple SC programs to include Title 10 USC 312,321,322, 333, 345, and APRI.
Engages with foreign partners to synchronize regional efforts abroad.
Review Annual Proposal and Training & Equipment List from subordinate JSOTF submissions.
Provides support Provides support to Global Force Management to ensure timely deployment of SOCOM forces for operational use.
Responsible for continuity of information between rotational units and headquarters. Forward integration during RIP/TOA periods will be required.
Coordinate with Defense Security Cooperation Agency for tracking of annual 333 submissions and OAIs.
Coordinate with component commands for implementation of 333 OAIs.
Collaborate with receipt partner units to determine capability gaps in line with SOCPAC requirements.
Consolidate annual assess, monitor, and evaluate reports to integrate into future campaign planning.
Coordinate Title 10 and APRI projects through the Overseas Humanitarian Assistance Shared Information System (OHASIS).
Responsible for integration SC resources and plans into the Country Integration Plans and the SOCPAC Campaign Plan.
Attend SC planning conferences as required abroad and in the United States.
Requirements
Required Qualifications:
Must be able to conduct periodic (~4-6 weeks annually) theater and CONUS travel ISO conference and program familiarity.
Must possess or be able to obtain a TS/SCI security clearance.
Must possess proficiency in Microsoft Excel.
3+ years of experience managing people and teams.
Requires 2-3 years of Security Cooperation Experience.
Knowledge of Security Cooperation Authorities, Objectives, Primary Stakeholders and Processes.
Prefer 2-3 years of Special Operations Experience.
Clearance: Requires an active Top-Secret / SCI clearance.
Location: Camp Smith, HI
Travel: CONUS and OCONUS travel will be required.
Security Engineer II
Security engineer job in Urban Honolulu, HI
Trustmark's mission is to improve wellbeing - for everyone. It is a mission grounded in a belief in equality and born from our caring culture. It is a culture we can only realize by building trust. Trust established by ensuring associates feel respected, valued and heard. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture of diversity and inclusion where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves. At Trustmark, we have a commitment to welcoming people, no matter their background, identity or experience, to a workplace where they feel safe being their whole, authentic selves. A workplace made up of diverse, empowered individuals that allows ideas to thrive and enables us to bring the best to our colleagues, clients and communities.
We are seeking a highly skilled Cyber Security Engineer to join our team and play a pivotal role in safeguarding our organization's digital assets. The ideal candidate will possess a deep understanding of cybersecurity principles, a strong technical background, and a passion for protecting sensitive information.
You will be responsible for engineering, implementing and monitoring security measures for the protection of Trustmark's computer systems, networks and information. The role helps identify and define system security requirements as well as develop detailed cyber security designs.
**Responsibilities:**
+ Design, implement, and maintain security architectures, systems, and solutions to protect critical infrastructure and data.
+ Conduct vulnerability assessments and penetration testing to identify and mitigate risks.
+ Develop and implement security policies, standards, and procedures.
+ Monitor security systems and respond to incidents promptly and effectively.
+ Stay up-to-date with the latest cybersecurity threats and trends.
+ Collaborate with cross-functional teams to ensure security is integrated into all aspects of the business.
+ Provide technical guidance and support to internal stakeholders.
**Qualifications:**
+ Bachelor's degree in Computer Science, Information Technology, or a related field or
+ 3-5 Years of network engineering or cyber engineering experience
+ Strong understanding of cybersecurity frameworks and standards (e.g., NIST, ISO 27001).
+ Proficiency in network security, systems security, application security, and data security.
+ Hands-on experience with security tools and technologies (e.g., firewalls, intrusion detection systems, encryption, SIEM).
+ Excellent problem-solving and analytical skills.
+ Strong communication and interpersonal skills.
+ Ability to work independently and as part of a team.
**Preferred Qualifications:**
+ Certifications such as CISSP, CISA, or CEH.
+ Experience with cloud security (e.g., AWS, Azure, GCP).
+ Knowledge of scripting and programming languages (e.g., Python, PowerShell).
Brand: Trustmark
Come join a team at Trustmark that will not only utilize your current skills but will enhance them as well. Trustmark benefits include health/dental/vision, life insurance, FSA and HSA, 401(k) plan, Employee Assistant Program, Back-up Care for Children, Adults and Elders and many health and wellness initiatives. We also offer a Wellness program that enables employees to participate in health initiatives to reduce their insurance premiums.
**For the fourth consecutive year we were selected as a Top Workplace by the Chicago Tribune.** The award is based exclusively on Trustmark associate responses to an anonymous survey. The survey measured 15 key drivers of engaged cultures that are critical to the success of an organization.
All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, sex, sexual orientation, sexual identity, age, veteran or disability.
Join a passionate and purpose-driven team of colleagues who contribute to Trustmark's mission of helping people increase wellbeing through better health and greater financial security. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves.
Introduce yourself to our recruiters and we'll get in touch if there's a role that seems like a good match.
When you join Trustmark, you become part of an organization that makes a positive difference in people's lives. You will play a vital role in delivering on our mission of helping people increase wellbeing through better health and greater financial security. Our customers tell us they simply appreciate the personal attention and knowledgeable service. Others tell us we've changed their lives.
At Trustmark, you'll be part of a close-knit team. You'll enjoy abundant opportunities to grow your career. That's why so many of our associates stay at Trustmark and thrive. Trustmark benefits from more than 100 years of experience but pairs that rich history with a palpable sense of optimism, growth and excitement for what's ahead - and beyond. This is a place where associates bring their whole selves to work each day. A place where you can be yourself. Whatever your beyond is, you can achieve it at Trustmark.
Cyber Security Architect
Security engineer job in Urban Honolulu, HI
Senior Cyber Security Architect
The Senior Security Architect designs and drives the secure architecture of DataHouse platforms and client solutions across cloud and hybrid environments. This role leads threat modeling, control selection, and reference architectures aligned to ISO/IEC 27001, NIST, and HIPAA, partners with engineering to embed security in delivery pipelines, and advises public-sector and healthcare clients on compliance-aligned architectures. You ll be a senior individual contributor with broad influence mentoring engineers, shaping standards, and participating in architecture reviews and program governance.
*This position requires the candidate to be based in Hawaii and able to work on-site in Honolulu as needed.
Primary Responsibilities and Duties
Architecture & Design: Define secure reference architectures (network, identity, data, application, and cloud) for AWS/Azure; champion zero-trust and least-privilege patterns.
Risk Management: Identify, assess, and mitigate security risks to protect company assets, data, and systems from external and internal threats.
Security Strategy Development: Develop and implement comprehensive security strategies and roadmaps that include key policies, procedures, and practices to safeguard the company s information technology infrastructure.
Security Compliance: Ensure that security architecture meets regulatory requirements and compliance standards, such as GDPR, HIPAA, or industry-specific regulations.
Governance & Compliance: Translate ISO/IEC 27001, NIST (CSF/800-53/171), and HIPAA into practical architectures, patterns, and evidence requirements; support internal audits and renewals.
Advisory & Reviews: Sit on internal and client architecture review boards; support executive-level guidance to SLED and healthcare clients.
Collaborate with Leadership: Work closely with senior leadership, including the CTO, and other department heads, to ensure security strategies align with business priorities and technology initiatives.
Incident Readiness: Partner with SecOps to refine detection logic, playbooks, and tabletop exercises; ensure architectures support rapid containment and recovery.
Mentorship & Standards: Coach engineers; author standards, patterns, and runbooks; lead brown-bags and security awareness sessions for delivery teams.
Vendor Management: Work with external vendors to evaluate and select security tools, technologies, and services to enhance the company s security posture.
Specific Responsibilities and Duties
Develop and implement frameworks for the secure design and deployment of cloud services, network infrastructure, and enterprise applications.
Lead the evaluation and integration of new security technologies and methodologies to enhance the company s security infrastructure.
Collaborate with the IT department to ensure security controls are integrated into all software development and systems engineering processes.
Define and enforce standards and best practices for secure software development, network security, data protection, and vulnerability management.
Implement and continually improve the organization s Information Security Management System (ISMS) to maintain ongoing ISO 27001 certification.
Advise client leadership teams on IT governance, budget planning, security roadmaps, and risk management programs.
Ensure security practices address requirements specific to healthcare, government, and other regulated industries.
Qualifications
Bachelor s degree in Computer Science, Information Security, or a related field.
6+ years of experience in information security, with at least 2 years in a senior security architecture role or similar management position.
Proven experience in designing and implementing security architectures for large, complex systems across multiple platforms (cloud, on-premise, hybrid).
Expert knowledge of security frameworks, such as NIST, CIS, ISO 27001, comparable ISMS frameworks, and experience with industry compliance standards.
Strong understanding of network security, encryption technologies, access controls, threat modeling, and risk management.
Experience with public sector and healthcare IT security requirements preferred.
Experience with cloud security, including public cloud platforms such as AWS, Azure, or Google Cloud.
Leadership and team management experience, with the ability to mentor and inspire a security team.
Excellent problem-solving and analytical skills, with the ability to design secure systems and mitigate risks proactively.
Proven track record delivering security services to external clients, including executive advisory and program governance.
Strong ability to communicate risk and security strategy to executives, boards, and non-technical stakeholders.
Certified Information Systems Security Professional (CISSP) or other relevant certifications (e.g., Certified Cloud Security Professional (CCSP), Certified Information Security Manager (CISM)) is preferred.
AWS/Azure security certifications preferred.
Cyber Security Consultant
Security engineer job in Urban Honolulu, HI
Public Consulting Group LLC (PCG) is a leading public sector solutions implementation and operations improvement firm that partners with health, education, and human services agencies to improve lives. Founded in 1986, PCG employs approximately 2,000 professionals throughout the U.S.-all committed to delivering solutions that change lives for the better. The firm is a member of a family of companies with experience in all 50 states, and clients in three Canadian provinces and Europe. PCG offers clients a multidisciplinary approach to meet challenges, pursue opportunities, and serve constituents across the public sector. To learn more, visit ***************************** .
Collaborating with our Technology Consulting team, you will help organizations streamline operations and achieve strategic goals to serve the public better. We provide the full spectrum of technology consulting services to help state and local agencies meet operational and program needs that enhance the lives of their user base.
Services:
+ Strategy, Architecture, Planning, and Procurement
+ Business Enablement
+ Business Solutions
+ Project Assurance
+ Performs security assessments of information technology (IT) systems to verify they comply with applicable security standards.
+ Performs reviews and assessments of organizational security controls (policies, processes, configurations) to verify they comply with applicable security standards.
+ Coordinates and/or conducts penetration testing or simulates attacks to look for vulnerabilities in systems before they can be exploited.
+ Coordinates with client organizations (state departments and federal agencies) to perform security audit activities.
+ Writes and Prepares reports that document findings from security assessments and testing.
+ Advises project managers of security and privacy requirements required by state and federal agencies.
+ Assists with development and implementation of security standards and best practices.
+ Interfaces with various architects, technicians, and business leaders to understand organizational needs, capabilities, and constraints related to IT security.
+ Researches the latest IT security trends.
+ Learns and adapts to new technologies in the ever-changing world of Information Security.
+ Creates and documents security and privacy policies, procedures, or contractual language, as required.
+ Establishes standard documentation and reporting templates for use in assessments.
+ Recommends security enhancements.
+ Participates in proposal teams, including writing proposal responses and advising of strategic approaches
**The above is intended to describe the general contents and requirements of work being performed by people assigned to this classification. It is not intended to be construed as an exhaustive statement of all duties, responsibilities or skills of personnel so classified.**
**Qualifications**
+ Experience with writing and/or developing system security plans - NIST 800-53
+ Experience with databases and SQLExperience with penetration testing
+ Experience with cloud architecture and federal standards
+ Experience in working state and federal government agencies
+ Excellent interpersonal, verbal and written communication, including good presentation skills
+ Can multi-task, communicate clearly, learn new technologies and processes, and provide support to process/solution owners
+ Strong analytical and conceptual skills
+ Ability to thrive in various hierarchical situations
+ Ability to work within high-performing virtual teams and highly collaborative
+ Builds excellent relationships with key internal resources based on trust and confidence
+ Interested in both short-term results and long-term goals
+ Ability to work with resources in multiple locations and business units
+ Ability to get results while maintaining a service orientation
+ DevOps experience and automated deployment of applications
+ Experience in working with and communicating with technical staff and subject matter expert
**Education:**
+ B.S. or B.A. degree is a plus, with related business discipline experience.
**Experience:**
+ 3+ years of experience in information security or information risk management.
+ General operating knowledge of security for application and infrastructure, security threat/risk/data classification.
+ Knowledge of industry standards NIST-800, HIPAA, HITECH, FERPA and various security protocols, such as PKI, SSL, Encryption, Data Redacting, DLP.
+ Familiarity with FireEye, Qualys, Email Security Systems, DLP, Data Encryption Antivirus, SIEM (Log Analysis), IRS Publication 1075, and Minimum Acceptable Risk Standards for Exchanges (MARS-E) a big plus.
+ 3+ years managing or developing IT systems/solutions
+ Understanding of various systems, like MS Active Directory, MS Windows, MS Exchange, Unix/Linux OS.
**Certification**
+ Information security professional certifications such as CEH, CISSP, SANS, CISA, GIAC or similar are highly desired
Remote:
This position is hybrid with travel/onsite requirements. To be successful at PCG, you must:
+ be available during your set working hours
+ have a safe, private, and distraction-free environment in which to complete your work, and
+ be able to give your full attention to the completion of your PCG job duties
Some travel to the office or elsewhere may be required for team meetings, client meetings, etc.
**Compensation:**
Compensation for roles at Public Consulting Group varies depending on a wide array of factors including, but not limited to, the specific office location, role, skill set, and level of experience. As required by applicable law, PCG provides a reasonable range of compensation for this role. In addition, PCG provides a range of benefits for this role, including medical and dental care benefits, 401k, PTO, parental leave, bereavement leave
We are accepting applications on an ongoing basis until filled. Compensation for roles at Public Consulting Group varies depending on a wide array of factors including, but not limited to, the specific office location, role, skill set, and level of experience. As required by applicable law, PCG provides the following reasonable range of compensation for this role: $75,000-$120,000
\#LI-AH1
\#D-PCG
\#LI-remote
PCG does not sponsor newly hired foreign national workers for work authorization, including H-1B sponsorship.
**EEO Statement:**
Public Consulting Group is an Equal Opportunity Employer dedicated to celebrating diversity and intentionally creating a culture of inclusion. We believe that we work best when our employees feel empowered and accepted, and that starts by honoring each of our unique life experiences. At PCG, all aspects of employment regarding recruitment, hiring, training, promotion, compensation, benefits, transfers, layoffs, return from layoff, company-sponsored training, education, and social and recreational programs are based on merit, business needs, job requirements, and individual qualifications. We do not discriminate on the basis of race, color, religion or belief, national, social, or ethnic origin, sex, gender identity and/or expression, age, physical, mental, or sensory disability, sexual orientation, marital, civil union, or domestic partnership status, past or present military service, citizenship status, family medical history or genetic information, family or parental status, or any other status protected under federal, state, or local law. PCG will not tolerate discrimination or harassment based on any of these characteristics. PCG believes in health, equality, and prosperity for everyone so we can succeed in changing the ways the public sector, including health, education, technology and human services industries, work.
Public Consulting Group is an equal opportunity employer. All qualified applicants receive consideration for employment without regard to race, color, religion, gender, national origin, age, sexual orientation, gender identity, protected veteran status, or status as a qualified individual with a disability. VEVRAA Federal Contractor.
Senior Information Systems Security Officer (ISSO)
Security engineer job in Aiea, HI
Founded in 1989, SOSi is among the largest private, founder-owned technology and services integrators in the defense and government services industry. We deliver tailored solutions, tested leadership, and trusted results to enable national security missions worldwide.
Job Description
Join SOSi and Shape the Future of Secure Networks in the Pacific!
SOSi is seeking a Secret-cleared Senior Information Systems Security Officer (ISSO) to join our elite team at Hickam AFB, Hawaii. We design and deliver secure, resilient, and innovative network infrastructures that power USINDOPACOM's mission and connect 5,000+ customers across the Pacific theater.
As part of our team, you'll tackle complex cybersecurity challenges, architect unique solutions, and help deploy a private cloud platform that empowers the warfighter. If you're ready to make an impact with cutting-edge technology and ensure the health and security of enterprise systems spanning hundreds of embedded devices, this is your opportunity to lead from the front.
Principal Duties:
Assist the ISSM in developing and maintaining a formal information system (IS) security program and policies for their assigned area of responsibility.
Provide technical and procedural IS Security advice to engineering team and senior management regarding the RMF process.
Establish and maintain computer systems and networks for classified processing, responsible for administration, maintenance, and security auditing.
Develop and oversee operational information systems security implementation policy and guidelines.
Maintain a repository using eMASS with all security authorizations for IS under their purview.
Coordinate IS security inspections, tests, and reviews.
Ensure proper measures are taken when an IS incident or vulnerability is discovered.
Ensure development and implementation of an effective IS security education, training, and awareness program.
Ensure Configuration Management policies and procedures for authorizing the use of hardware/software on an IS are followed. Any additions, changes or modifications to hardware, software, or firmware must be coordinated with the appropriate AO prior to the addition, change or modification.
Maintain a working knowledge of system functions, security policies, technical security safeguards, and operational security measures.
Manage, maintain, and execute the information security continuous monitoring plan.
Ensure records are maintained of all security-related vulnerabilities and ensure serious or unresolved violations are reported to the AO/DAO.
Assess changes to the system, its environment, and operational needs that could affect the security authorization.
Qualifications
Minimum Requirements
Active Secret DoD security clearance.
Bachelor's degree in a related field plus 4 years of related experience.
DoD 8570 IAT-II compliant (Security+ CE, CCNA, CND, CySA+, GICSP, GSEC, or SSCP).
Knowledge of NSA's Commercial Solution for Classified (CSfC) solution and Cross Domain Solutions (CDS).
Thorough understanding of NIST Publication 800-53r5, Risk Management Framework, Executive Order 14028, and OMB Mandate M-22-09.
Prior experience with eMASS.
Strong communication skills and ability to coordinate tasks across functional groups.
Preferred Qualifications
Master's degree in Information Technology or related discipline
Recent experience supporting system authorizations.
Additional Information
Work Environment:
Working conditions are normal for an office environment.
Fast paced, deadline-oriented environment.
May require periods of non-traditional working hours including consecutive nights or weekends.
Target Salary Range: $110,556 to $136,257.
Working at SOSi:
All interested individuals will receive consideration and will not be discriminated against for any reason.
Computer Network Defense Analyst (CCA allowed)
Security engineer job in Urban Honolulu, HI
Job DescriptionAs a Computer Network Defense Analyst (CNDA), you will: Use information collected from a variety sources (e.g., intrusion detection systems, firewalls, network traffic logs, and host system logs) to identify potential vulnerabilities, respond to cyber events that occur, and defend against events that might occur.
Help develop mitigations to strengthen network defenses and protect against attacks on network infrastructure devices or systems.Support a wide range of data transport possibilities, such as traditional wired networks, wireless transport (including Wi-Fi and cellular), collaborative platforms such as video teleconferencing, and the hardware and software that enable it all.
Advance your career as you develop increasing expertise in networking protocols and architectures, cloud security, Internet of Things protocols, and advanced network security.
Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise.
Distill, document, contextualize and share your findings--including any new tradecraft that you develop--with teammates, stakeholders, and intelligence consumers.
Qualifications:STEM degree in Network Engineering, Systems Engineering, Information Technology, or related field. Extended military cyber training courses may be counted toward degree requirement.Strong understanding with customer policies and workflows Strong understanding in interpreting cyber activity Demonstrative experience w/SIGINT and AMOD (XKS, DX, UTT and others)
LEVEL 1: Bachelors Degree + 2 years of experience LEVEL 2: Bachelors Degree + 5 years of experience LEVEL 3: Bachelors Degree + 8 years of experience LEVEL 4: Bachelors Degree + 11 years of experience
We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.