Cyber SDC- M365 Security Operations Lead Engineer - Senior - Consulting - Location OPEN
Security Engineer Job 33 miles from Westlake
At EY, you'll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we're counting on your unique voice and perspective to help EY become even better. Join us and build an exceptional experience for yourself, and a better working world for all.
The exceptional EY experience. It's yours to build.
EY focuses on high-ethical standards and integrity among its employees and expects all candidates to demonstrate these qualities.
We are seeking a skilled and motivated Microsoft Purview and Defender for Office Operations Engineer to join our cybersecurity team. The ideal candidate will be responsible for the administration, management, and optimization of Microsoft Purview and Microsoft Defender for Office platforms. This role requires a strong understanding of data governance, compliance, and security best practices, along with the ability to work collaboratively with cross-functional teams to enhance our information protection posture.
**Key Responsibilities:**
1. **Platform Administration:**
1. Administer and support Microsoft Purview and Microsoft Defender for Office, ensuring optimal performance and availability of the platforms.
2. Configure and manage security settings, policies, and compliance features within Microsoft Purview and Defender for Office.
2. **Data Governance and Compliance:**
1. Implement and maintain data governance policies and procedures to ensure compliance with regulatory requirements and organizational standards.
2. Monitor and report on compliance metrics, data classification, and data loss prevention (DLP) policies.
3. **User Support:**
1. Provide technical support to end-users regarding Microsoft Purview and Defender for Office tools and best practices.
4. **Collaboration and Communication:**
1. Work closely with IT, security, and compliance teams to integrate Microsoft Purview and Defender for Office with existing systems and workflows.
2. Communicate effectively with stakeholders to report on security incidents, compliance metrics, and recommendations for improvement.
5. **Continuous Improvement:**
1. Stay updated on the latest features, updates, and best practices related to Microsoft Purview and Defender for Office.
2. Identify opportunities for process improvements and automation within the operations of Microsoft Purview and Defender for Office.
3. Automate activities through scripting (PowerShell, Python) and automation (Tines, PowerAutomate, etc.)
6. **Documentation and Reporting:**
1. Maintain accurate documentation of configurations, processes, and procedures related to Microsoft Purview and Defender for Office operations.
2. Generate reports on platform performance, security incidents, and compliance metrics for management review.
**Qualifications:**
+ Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field.
+ Proven experience in managing and supporting Microsoft Purview and Microsoft Defender for Office.
+ Strong understanding of data governance, compliance frameworks, and information security best practices.
+ Excellent problem-solving skills and attention to detail.
+ Strong communication and interpersonal skills.
+ Scripting experience, including PowerShell, Python, etc.
+ Ticket and change management experience in ServiceNow
+ Relevant certifications (e.g., Microsoft Certified: Security, Compliance, and Identity Fundamentals, Microsoft Certified: Azure Security Engineer Associate) are a plus.
**Preferred Skills:**
+ Experience with data loss prevention (DLP) technologies and strategies.
+ Familiarity with compliance regulations (e.g., GDPR, HIPAA) and data protection laws.
+ Knowledge of cloud security concepts and technologies.
**Work Environment:**
This position may require occasional after-hours support and on-call availability. The Microsoft Purview and Defender for Office Operations Engineer will work in a collaborative team environment, contributing to the overall security and compliance posture of the organization.
**What we offer**
We offer a comprehensive compensation and benefits package where you'll be rewarded based on your performance and recognized for the value you bring to the business. The base salary range for this job in all geographic locations in the US is $73,100 to $132,900. The salary range for New York City Metro Area, Washington State and California (excluding Sacramento) is $87,600 to $151,400. Individual salaries within those ranges are determined through a wide variety of factors including but not limited to education, experience, knowledge, skills and geography. In addition, our Total Rewards package includes medical and dental coverage, pension and 401(k) plans, and a wide range of paid time off options. Join us in our team-led and leader-enabled hybrid model. Our expectation is for most people in external, client serving roles to work together in person 40-60% of the time over the course of an engagement, project or year. Under our flexible vacation policy, you'll decide how much vacation time you need based on your own personal circumstances. You'll also be granted time off for designated EY Paid Holidays, Winter/Summer breaks, Personal/Family Care, and other leaves of absence when needed to support your physical, financial, and emotional well-being.
+ **Continuous learning:** You'll develop the mindset and skills to navigate whatever comes next.
+ **Success as defined by you:** We'll provide the tools and flexibility, so you can make a meaningful impact, your way.
+ **Transformative leadership:** We'll give you the insights, coaching and confidence to be the leader the world needs.
+ **Diverse and inclusive culture:** You'll be embraced for who you are and empowered to use your voice to help others find theirs.
EY accepts applications for this position on an on-going basis. **If you can demonstrate that you meet the criteria above, please contact us as soon as possible.**
EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets.
Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate.
Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.
For those living in California, please click here (********************************************************************************************************************************************************************** for additional information.
EY is an equal opportunity, affirmative action employer providing equal employment opportunities to applicants and employees without regard to race, color, religion, age, sex, sexual orientation, gender identity/expression, pregnancy, genetic information, national origin, protected veteran status, disability status, or any other legally protected basis, including arrest and conviction records, in accordance with applicable law.
EY is committed to providing reasonable accommodation to qualified individuals with disabilities including veterans with disabilities. If you have a disability and either need assistance applying online or need to request an accommodation during any part of the application process, please call 1-800-EY-HELP3, select Option 2 for candidate related inquiries, then select Option 1 for candidate queries and finally select Option 2 for candidates with an inquiry which will route you to EY's Talent Shared Services Team (TSS) or email the TSS at **************************
Security Engineer - Database Activities / Imperva
Security Engineer Job 11 miles from Westlake
At PNC, our people are our greatest differentiator and competitive advantage in the markets we serve. We are all united in delivering the best experience for our customers. We work together each day to foster an inclusive workplace culture where all of our employees feel respected, valued and have an opportunity to contribute to the company's success. As a Security Engineer- Database Activities / Imperva within PNC's DATA PROTECTION organization, you will be based in Pittsburgh, PA, Cleveland, OH, Dallas, TX, Phoenix, AZ or Birmingham.
**PNC will not provide sponsorship for employment visas or participate in STEM OPT for this position.**
Required Skills:
- Database Administration experience with the ability to write and translate
scripts on SQL and various Database types
- Experience with Database Monitoring and Scanning. Specific Imperva DAM Assessment scanning experience is a Plus.
- Ability to work with Business on requirements documentation and process
improvement.
- Strong Communication skills - Written, Verbal and Organizational
- Collaboration with cross functional teams to translate technical and business processes.
- Conduct & Lead meetings across various lines of business.
Good to Have Skills:
PowerShell scripting
Database experience in: Cloudera, Mongo, Hadoop, Containers, Neo4J, Cassandra
Ability to perform repetitive tasks
**Job Description**
+ Provides subject matter expertise when applying security concepts. Leverages technical knowledge and industry experience to design, build, and maintain technology solutions. Responsible for deliverables related to project timelines.
+ Responsible for working with architecture to take high level architectural designs and determine the specifics around implementation details (ex: sizing) integration details, onboarding and operationalization.
+ Evaluates patches, updates, and ongoing maintenance. Determines impacts to existing solutions when new standards are implemented. Utilizes change control and other governance processes to ensure alignment of solutions .
+ Develops detailed implementation, configuration, design, and engineering documentation. Build and implement solutions.
+ Works with operational partners to enable transition and day-to-day supportability.
+ Provides engineering support to existing technology in a production environment and collaborating with other groups as required. Seeks opportunities to grow a broad knowledge base to complement specific subject matter expertise.
PNC Employees take pride in our reputation and to continue building upon that we expect our employees to be:
+ **Customer Focused** - Knowledgeable of the values and practices that align customer needs and satisfaction as primary considerations in all business decisions and able to leverage that information in creating customized customer solutions.
+ **Managing Risk** - Assessing and effectively managing all of the risks associated with their business objectives and activities to ensure they adhere to and support PNC's Enterprise Risk Management Framework.
**Qualifications**
Successful candidates must demonstrate appropriate knowledge, skills, and abilities for a role. Listed below are skills, competencies, work experience, education, and required certifications/licensures needed to be successful in this position.
**Preferred Skills**
Access Control (AC), Building Architecture, Customer Solutions, Disaster Recovery Planning, Information Security, Network Security, Physical Security, Risk Assessments, Security Technologies
**Competencies**
Analytical Thinking, Effective Communications, Information Security Management, Information Security Technologies, IT Environment, IT Standards, Procedures & Policies, IT Systems Management, Network and Internet Security, Problem Solving, Technical Troubleshooting
**Work Experience**
Roles at this level typically require a university / college degree, with 5+ years of industry-relevant experience. Specific certifications are often required. In lieu of a degree, a comparable combination of education, job specific certification(s), and experience (including military service) may be considered.
**Education**
Bachelors
**Certifications**
No Required Certification(s)
**Licenses**
No Required License(s)
**Benefits**
PNC offers a comprehensive range of benefits to help meet your needs now and in the future. Depending on your eligibility, options for full-time employees include: medical/prescription drug coverage (with a Health Savings Account feature), dental and vision options; employee and spouse/child life insurance; short and long-term disability protection; 401(k) with PNC match, pension and stock purchase plans; dependent care reimbursement account; back-up child/elder care; adoption, surrogacy, and doula reimbursement; educational assistance, including select programs fully paid; a robust wellness program with financial incentives.
In addition, PNC generally provides the following paid time off, depending on your eligibility: maternity and/or parental leave; up to 11 paid holidays each year; 8 occasional absence days each year, unless otherwise required by law; between 15 to 25 vacation days each year, depending on career level; and years of service.
To learn more about these and other programs, including benefits for full time and part-time employees, visit Your PNC Total Rewards (******************************* .
**Disability Accommodations Statement**
If an accommodation is required to participate in the application process, please contact us via email at AccommodationRequest@pnc.com . Please include "accommodation request" in the subject line title and be sure to include your name, the job ID, and your preferred method of contact in the body of the email. Emails not related to accommodation requests will not receive responses. Applicants may also call ************ and say "Workday" for accommodation assistance. All information provided will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations.
At PNC we foster an inclusive and accessible workplace. We provide reasonable accommodations to employment applicants and qualified individuals with a disability who need an accommodation to perform the essential functions of their positions.
**Equal Employment Opportunity (EEO)**
PNC provides equal employment opportunity to qualified persons regardless of race, color, sex, religion, national origin, age, sexual orientation, gender identity, disability, veteran status, or other categories protected by law.
This position is subject to the requirements of Section 19 of the Federal Deposit Insurance Act (FDIA) and, for any registered role, the Secure and Fair Enforcement for Mortgage Licensing Act of 2008 (SAFE Act) and/or the Financial Industry Regulatory Authority (FINRA), which prohibit the hiring of individuals with certain criminal history.
**California Residents**
Refer to the California Consumer Privacy Act Privacy Notice (****************************************************************************************************** to gain understanding of how PNC may use or disclose your personal information in our hiring practices.
Specialist - Network Security
Security Engineer Job 21 miles from Westlake
Eaton's IT team is currently seeking a Specialist - Network Infrastructure Security to join our team. Preferred locations: Beachwood, Ohio ; Moon TWP, PA ; Houston, TX ; Galesburg, MI ; Raleigh, NC or Menomonee Falls, WI. The expected annual salary range for this role is $105,000 - $175,000 a year.
Please note the salary information shown above is a general guideline only. Salaries are based upon candidate skills, experience, and qualifications, as well as market and business considerations.
What you'll do:
Job summary:
Purpose: Deliver, maintain, and update technology and platform solutions to address business and technical requirements, leveraging standard principles and patterns that follow Eaton's security standards. Focused on building, delivering, maintaining, and updating infrastructure security services including DC and Cloud Firewalls (DMZs, VPNs, IPS), Web Proxies, Guest Access, Remote Access, Load Balancers, DNS, SSL/Certificate mgmt, switch/router configurations, scripting and automation.
Job responsibilities:
1. Provides input as a subject matter expert and leader to platform and system design, development, implementation, and life cycle management.
2. Leads overall effort and works with resources across functions to deliver technology, platform, and system solutions to meet customer requirements, providing solution options, making recommendations, and highlighting operational or security risks, as well as providing alternative solutions.
3. Monitors technology, platform, and systems to ensure required performance, availability, and capacity. Identifies and eliminates gaps in monitoring and potential impact on service delivery.
4. Support the operational function of global, business critical IT systems.
5. Work with the Business Relationship Managers and the business to deploy and secure network aware devices and solutions.
6. Configures, deploys and maintains new hardware-based and software-based security tools that provide network and endpoint security.
7. Provides new capabilities through implementation of acquired and open-source applications and development of automation scripts.
8. Tunes and optimizes existing systems to minimize external threats and meet internal needs, balancing security and operations.
9. Collaborates with Information Security stakeholders to improve prevention, detection and response.
10. Support network and security related activities for acquisitions/divestitures.
Qualifications:
Required (Basic) Qualifications:
* Associate's degree from an accredited institution.
* Minimum of 7 years of IT (information technology) experience.
* Minimum 5 years of networking/cyber security experience.
* Must be legally authorized to work in the United States without company sponsorship now or in the future.
* No relocation benefit is being offered for this position. Only candidates within a 50-mile radius of the posted work location (s) will be considered. Active-Duty Military Service member candidates are exempt from the geographical area limitation.
Preferred Qualifications:
* Bachelor's degree from an accredited institution.
* Network and Security Certifications preferred.
* Experience with Azure & AWS.
* Experience with the following technologies:
Check Point GAIA firewalls(DMZ, VPN, IPS, PBR, VSX)
Zscaler ZIA and ZPA, Perl/Python or Powershell scripting
F5 Big IP platform (DNS, Load balancing, WAF, iRules)
Cisco CLI, Solar Winds, DynaTrace, JIRA, Service Now
* Firewall configuration, deployment and management.
* Configuring Virtual Private Networks.
* Configuring DMZ segments.
* IPv4 and DHCP
* TCP/IP networking and advanced routing such as BGP
* Switch/Router configuration
* Remote computing
* Intrusion Detection / Prevention systems
* Linux/Unix administration via CLI
* Domain Name System administration
* Security Proxy administration
* Scripting Ability
* SSL Certificate management
* Cloud experience.
We are committed to ensuring equal employment opportunities for all job applicants and employees. Employment decisions are based upon job-related reasons regardless of an applicant's race, color, religion, sex, sexual orientation, gender identity, age, national origin, disability, marital status, genetic information, protected veteran status, or any other status protected by law.
Eaton considers qualified applicants regardless of criminal histories, consistent with local laws. To request a disability-related reasonable accommodation to assist you in your job search, application or interview process, please call us at ************** to discuss your specific need. Only accommodation requests will be accepted by this phone number.
We know that good benefit programs are important to employees and their families. Eaton provides various Health and Welfare benefits as well as Retirement benefits, and several programs that provide for paid and unpaid time away from work. Click here for more detail: Eaton Benefits Overview. Please note that specific programs and options available to an employee may depend on eligibility factors such as geographic location, date of hire, and the applicability of collective bargaining agreements.
Senior Security Engineer/OHIO /W2
Security Engineer Job 12 miles from Westlake
Senior Security Engineer Location: Cleveland, OH Long Term, Multi-Year Contract Can be Remote Opprotunity for growth and development Required Skills: 3-5 years of experience Cisco Firepower Fortnet Fortigate Cisco ASA Setting up and managing Firewalls General Networking - Routing/Switching - CISCO.
Responsibilities:
A typical day of a Security Engineer revolves around system changes, lifecycle of firewalls, and the user VPN environment. It is the responsibility of this individual for device monitoring and response, proactive fault management, vendor engagement, vulnerabilities, and compliance of these systems.
The engineer will design, build, and administrate the security infrastructure of the Fortinet firewalls and Cisco VPN environment. Even though their job focusses more on the technical aspects, candidates will need to possess strong communication and organizational skills as the engineer will engage with other departments and vendors. The engineer will participate in the corporate change management process and would be required to complete these changes during nights and weekends.
The engineer will be responsible for troubleshooting firewall and VPN incidents, identifying root cause of incidents, and making appropriate recommendations to resolve them. The individual will need to review vulnerability, compliance risks, and fault analysis on perimeter devices and develop and implement remediation plans. This individual will also participate in the on-call rotation and annual projects as assigned.
Summary:
Potential candidates will have a strong networking background with a proven history of network security expertise focused on VPN and Firewall technologies. The selected candidate will be mainly responsible for administering and supporting security solutions in a large enterprise environment. Excellent communication skills and the ability to solve complex problems are desired.
Detailed Description:
Provide network security diligence in configuration, implementation and support of enterprise assets such as firewalls and remote access. Responsibilities include ongoing management and support of security infrastructure in a large environment. Must be able to analyze situations, assess risk and determine appropriate actions necessary to complete requests or support the infrastructure. Must exercise good judgment in the handling of security related matters, must be sensitive to both legal and personnel related ramifications of their actions. Candidate will work to ensure that the security of enterprise devices is kept within an acceptable level of risk. Provide routine maintenance to components and systems. Providing 24/7 support of security systems as necessary to proactively protect the integrity, confidentiality, and availability of information of the company. Tasks may include updating systems, researching logs, reporting metrics, time reporting, Change Control records, production documentation, etc.
Information Security Senior Engineer
Security Engineer Job 29 miles from Westlake
The Senior Information Security Engineer is a vital contributor on our growing security team. In this role, the Senior Engineer won't just be responding to alerts-they will help design, build, and refine the tools, controls, and processes that protect our company. This is a senior-level engineering role focused on making a direct impact on our enterprise security posture, working across network, cloud, endpoint, and application layers. This role will be part of a collaborative environment where you'll lead complex initiatives, contribute to our security strategy, and help level up the team.
The Senior Information Security Engineer will work in a hybrid IT environment (on-prem and cloud), with an emphasis on security automation, network and endpoint protection, and other security platforms/tooling. This is an opportunity to be part of a mature yet evolving security organization where technical input matters.
Job Responsibilities
* Lead the design and deployment of security tooling, including firewalls, intrusion prevention systems, EDR, DLP, and cloud-native controls
* Build and maintain security automation around threat detection, response, and compliance reporting
* Partner with infrastructure, app dev, and cloud teams to embed security into projects and platforms
* Evaluate, test, and implement new tools and capabilities based on threat landscape and internal needs
* Collaborate with the Security Architecture team by providing technical input and context during architecture reviews, threat modeling, and risk assessments to ensure practical, implementable security controls
* Drive continuous improvement of existing security controls-identifying gaps, tuning configurations, and retiring legacy solutions
* Support the SOC during incident response by providing infrastructure and tooling expertise, assisting with containment efforts, and implementing post-incident improvements
* Mentor junior staff and contribute to team development through documentation, process design, and knowledge sharing
Technology Used
* NGFWs, IDS/IPS, WAFs, proxies, micro segmentation, and VPNs (e.g., Palo Alto, F5, VMware NSX)
* Endpoint protection and management tools (e.g., CrowdStrike)
* Cloud platforms (AWS and Azure) with a focus on secure configurations and native security services
* Email security tools (e.g., Abnormal, Proofpoint, Microsoft 365)
* Microsoft Sentinel (SIEM) and Tines (SOAR); contribute to detections and automation in collaboration with the SOC
* Scripting and automation using Python, PowerShell, or Bash
* DevSecOps practices and tools (e.g., Azure DevOps) for automation, CI/CD, and infrastructure-as-code workflows
Job Qualifications
* 5+ years of experience in Information Security or a related field.
* Bachelor's degree in Computer Science, Information Technology or a related field and/or commensurate experience.
* Deep knowledge of enterprise security tools and frameworks (e.g., NIST CSF, CIS Controls)
* Experience integrating security controls into hybrid IT environments (on-prem + cloud)
* Ability to communicate effectively with technical and non-technical teams
* Proven experience working across IT disciplines (network, endpoint, cloud, app dev)
* Ability to think strategically, execute tactically, and stay hands-on with tools
* CISSP, CCSP, Security+ or AWS/Azure security certifications preferred
* Experience building security automation or integrations between tools using APIs or scripting preferred
* Background in network engineering or systems administration preferred
* Experience influencing and implementing endpoint security, including EDR tuning, hardening standards, and collaboration on Group Policy or device management tooling (e.g., Intune, SCCM) preferred
Location
* Hybrid defined as three or more days per week in the office
Behavioral Competencies
* Collaborates
* Customer focus
* Communicates effectively
* Decision quality
* Nimble learning
Technical Skills
* Threat Intelligence
* Vulnerability Management
* Security Engineering
* Network Security
* Firewalls
* Encryption Techniques
* Security Assessments
* Information Security
* Incident Response
* Security Monitoring
* Identity Management
This job description describes the general nature and level of work performed in this role. It is not intended to be an exhaustive list of all duties, skills, responsibilities, knowledge, etc. These may be subject to change and additional functions may be assigned as needed by management.
Senior Security Engineer - SSO / Web Security
Security Engineer Job 11 miles from Westlake
Pittsburgh Pennsylvania Strongsville, OH Exp 5-7 yrs Deg Bachelors Occasional Travel Job Description As an Infrastructure Engineer Senior and a member of our Information Technology, you will be part of a diversified financial services firm that reflects the needs, values and goals of our customers, employees, communities and shareholders. You will be institutional in helping to maintain our reputation for technology excellence in both business applications and new innovations.
As an Infrastructure Engineer you will provide accurate and cost efficient security maintenance and support services to internal & external clients. Responsibilities include ongoing management and support of security infrastructure in a large environment. Must be able to analyze situations, assess risk and determine appropriate actions necessary to remediate risk. This individual must be able to work with internal technology groups to coordinate deployment of solutions. Must exercise good judgment in the handling of security related matters, must be sensitive to both legal and personnel related ramifications of their actions. Provide consulting support in area of responsibility to other internal teams. Participate in providing 24/7 support of security systems as necessary to proactively protect the integrity, confidentiality, and availability of information of the company. Perform administrative tasks including updating and maintaining trouble logs, metrics, time reporting, Change Control records, production documentation, etc. Maintains expertise on the security products and functions supported through continued education and training.
Work hours 8-5 with 24x7 on call rotation duties.
Summary:
This position will be responsible for supporting systems and solutions within Cyber Security specifically authentication and authorization. Support will not be limited to break-fix situations, but also includes implementation activities and day-to-day administration of devices & solutions. Opportunities to cross train on other security platforms.
Requirements:
• 4-7 years experience in Information Technology
• Possess an expert level and thorough understanding of IT concepts including network structures, operating system capabilities, and application architecture requirements
• Strong understanding of web based applications
• Unix / Linux, TCP/IP networking proficiency
• Strong verbal and written communication skills
• Programming / scripting experience preferred
Additional Information
All your information will be kept confidential according to EEO guidelines.
Direct Staffing Inc
Information Security and Network Analyst
Security Engineer Job 12 miles from Westlake
Would you like to be a part of a team that delivers industry experience and creative solutions?
Avondale seeks goal-driven professionals ready to take their career to the next level.
At Unison Risk Advisors, we protect our digital infrastructure and data assets while supporting business growth. We are hiring an Information Security and Network Analyst to enhance our cybersecurity efforts. You'll lead security initiatives, investigate events, and provide expert guidance across URA. Collaborate with others to prioritize, assess, and manage security risks. Ideal candidates have 2-4 years of IT or cybersecurity experience, knowledge of network infrastructure, and a desire to grow in a collaborative environment.
Position Responsibilities
The responsibilities of this role include:
Threat Monitoring & Incident Response
Monitor and analyze logs, alerts, and security data to identify threats and indicators of compromise.
Conduct proactive threat hunting activities targeting known vulnerabilities and attack vectors.
Investigate, document, and support the resolution of security incidents and policy violations.
Infrastructure & Security Operations
Support the maintenance and implementation of key network and security infrastructure (e.g., firewalls, endpoint protection, email security, IAM).
Collaborate with cloud and infrastructure teams to maintain secure configurations in Microsoft Azure and Microsoft 365 environments.
Assist in vulnerability management processes including scanning, remediation tracking, and reporting.
Risk, Compliance & Audit Support
Assist in vendor due diligence, third-party risk assessments, and audit response efforts.
Provide operational support for IT risk mitigation tasks and security requests from other departments.
Participate in security assessments, control reviews, and continuous improvement initiatives.
Preferred Qualifications
Network and security certifications are strongly preferred: CompTIA Security+, CompTIA Network+.
Skills Requirements
At least 2-4 years of experience in system or network administration.
Strong attention to detail and rarely makes the same mistake twice; learns from failure.
Hands-on experience managing and securing Microsoft Azure and Microsoft 365 environments, including user account management, security settings, and access controls.
Strong understanding of cybersecurity concepts, client-server architecture, and network protocols (e.g., TCP/IP, DNS, DHCP, OSI model).
Knowledge of security frameworks, standards, and regulations.
Experience with cloud-based security tools (MFA, DLP, Conditional Access).
Proficiency in network firewall administration, vulnerability management, and endpoint security technologies.
Knowledge of OKTA administration, including user lifecycle management, application provisioning, authentication policies, and organizational customization through the Admin Console.
Ability to evaluate, implement, and manage security technologies for encryption, authentication, intrusion detection, and vulnerability management.
Collaboration with cloud and infrastructure administrators to secure Azure-hosted services, including virtual machines, storage accounts, databases, and key vaults.
Proactively identifying, assessing, and remediating vulnerabilities through log analysis, system scanning, and alert response.
Investigating and documenting security incidents, including malware infections, policy violations, or unacceptable use of IT resources.
Ability to respond to identified security incidents and risks and execute consistent improvements in processes to identify, detect, and prevent threats to the environment.
Experience in administering platforms such as Exabeam, Proofpoint, SentinelOne, OKTA, Palo Alto, Tenable, Cisco, and Meraki network equipment is considered an advantage.
Why Join Us?
Opportunity to grow your cybersecurity skill set and take ownership of impactful security projects.
Work with experienced professionals who value collaboration, learning, and continuous improvement.
Competitive compensation and benefits package, plus ongoing training and certification support.
A culture that supports innovation, diversity, and work-life balance.
Location: Hybrid, with a base in Cleveland, Baltimore and Chicago areas. Travel will be required from time to time.
Who is Avondale?
Established in 2006, Avondale Insurance Associates is an Excess and Surplus Lines Underwriting Management Company focused on small to mid-sized accounts across all property and general liability classes.
What you'll get...
At Avondale, you will have the opportunity to build a long-term career with unlimited growth potential. Aim high, work hard and we'll help you achieve your goals.
At Avondale, you will experience our caring work environment. We care about our employees, we care about our customers, and we care about the world around us.
At Avondale, you will achieve a work-life balance. We care about your physical and emotional well-being, so work-life balance is encouraged and practiced. We understand you have a life outside of work, and we want you to live it.
At Avondale, you will have access to a world-class Total Rewards package. We truly value our people, which shows in our compensation, benefits, and perks.
In addition to competitive pay, we have designed a performance-based annual incentive program. All employees are eligible to earn a bonus by meeting performance objectives.
Comprehensive medical, dental and vision plans and numerous supplemental benefit offerings.
Flexible Paid time off annually
Assistance with parking expenses, discount programs for area services/experiences, and financial support for professional development and licensure/designations
Access to specialized leadership development programming designed to take your career to the next level.
And so much more!
Avondale, a Unison Risk Advisors company is an equal opportunity employer and will consider all applications without regard to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic.
It Security Engineer
Security Engineer Job 12 miles from Westlake
Job Title: IT Security Engineer
Salary: $85,000 - $90,000 (Negotiable, based on experience)
Work Arrangement: 3 days in the office, 2 days remote
Responsibilities:
Maintain the daily operations of various security products and platforms.
Identify, investigate, escalate, or resolve security events detected by security products or services through log analysis and other alert mechanisms.
Implement new security products, services, or procedures to enhance our security posture.
Create and maintain documentation, including security policies and procedures.
Provide valuable input to the enterprise security architecture.
Collaborate in the evaluation and selection of new security products or services.
Assist in the development and review of security procedures.
Contribute to the planning, design, and testing of business continuity and disaster recovery plans.
Participate in the vulnerability assessment process.
Stay current with IT security trends, vulnerabilities, and products to proactively address emerging threats.
Requirements:
Bachelor's or Associate degree in Computer Science, Engineering, Information Technology, or equivalent experience with industry certifications (CompTIA, GIAC, Cisco, or ISC2).
Strong knowledge of firewalls, network security concepts, and end-point security products.
Understanding of Ethernet and TCP/IP networking fundamentals.
Familiarity with the current threat landscape, including threat actors, APT, and cybercrime.
Proficiency in Linux and Windows server administration.
Knowledge of cybersecurity tools, including end-point detection, email security solutions, security awareness training solutions, privileged access management solutions, and other security-related technologies.
Familiarity with Microsoft Defender and Sentinel is a plus.
Understanding of PKI and certificate lifecycle management.
Ability to prioritize and execute tasks efficiently in a high-pressure environment.
Strong research skills to stay updated on security issues and products.
Excellent collaboration skills to work effectively with colleagues from diverse technology and non-technology backgrounds.
Effective business communication skills in both oral and written forms.
Analytical and problem-solving skills.
Ability to assess risk using both quantitative and qualitative approaches.
If you are passionate about IT security and have the skills and certifications required to thrive in this role, we encourage you to apply. We offer a competitive salary, a dynamic work environment, and opportunities for professional growth in the ever-evolving field of cybersecurity.
To apply, please send your resume and a cover letter detailing your relevant experience and qualifications to ******************************. Join us in safeguarding our organization's digital assets and ensuring a secure environment for our team and customers.
We are an equal opportunity employer committed to creating a diverse and inclusive workplace. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, disability, age, or veteran status.
Attention Employers!
Seeking exceptional talent? We've got the solution: Share your s with us.
Precision Matching: We'll pinpoint the perfect candidates.
Time Saver: Fill crucial roles faster than ever.
Showcase Your Brand: Attract top talent aligned with your mission.
Partnership: We're your allies in successful hiring.
Network Access: Tap into our extensive candidate pool.
Confidentiality: Your needs are handled discreetly.
Elevate your team today! Contact us to share your job descriptions and discover your next top performer.
Information Security and Network Analyst
Security Engineer Job 12 miles from Westlake
Would you like to take ownership in a dynamic, high-growth business that truly walks the talk?
Oswald Companies seeks goal-driven professionals ready to take their career to the next level.
At Unison Risk Advisors, we protect our digital infrastructure and data assets while supporting business growth. We are hiring an Information Security and Network Analyst to enhance our cybersecurity efforts. You'll lead security initiatives, investigate events, and provide expert guidance across URA. Collaborate with others to prioritize, assess, and manage security risks. Ideal candidates have 2-4 years of IT or cybersecurity experience, knowledge of network infrastructure, and a desire to grow in a collaborative environment.
Position Responsibilities
The responsibilities of this role include:
Threat Monitoring & Incident Response
Monitor and analyze logs, alerts, and security data to identify threats and indicators of compromise.
Conduct proactive threat hunting activities targeting known vulnerabilities and attack vectors.
Investigate, document, and support the resolution of security incidents and policy violations.
Infrastructure & Security Operations
Support the maintenance and implementation of key network and security infrastructure (e.g., firewalls, endpoint protection, email security, IAM).
Collaborate with cloud and infrastructure teams to maintain secure configurations in Microsoft Azure and Microsoft 365 environments.
Assist in vulnerability management processes including scanning, remediation tracking, and reporting.
Risk, Compliance & Audit Support
Assist in vendor due diligence, third-party risk assessments, and audit response efforts.
Provide operational support for IT risk mitigation tasks and security requests from other departments.
Participate in security assessments, control reviews, and continuous improvement initiatives.
Preferred Qualifications
Network and security certifications are strongly preferred: CompTIA Security+, CompTIA Network+.
Skills Requirements
At least 2-4 years of experience in system or network administration.
Strong attention to detail and rarely makes the same mistake twice; learns from failure.
Hands-on experience managing and securing Microsoft Azure and Microsoft 365 environments, including user account management, security settings, and access controls.
Strong understanding of cybersecurity concepts, client-server architecture, and network protocols (e.g., TCP/IP, DNS, DHCP, OSI model).
Knowledge of security frameworks, standards, and regulations.
Experience with cloud-based security tools (MFA, DLP, Conditional Access).
Proficiency in network firewall administration, vulnerability management, and endpoint security technologies.
Knowledge of OKTA administration, including user lifecycle management, application provisioning, authentication policies, and organizational customization through the Admin Console.
Ability to evaluate, implement, and manage security technologies for encryption, authentication, intrusion detection, and vulnerability management.
Collaboration with cloud and infrastructure administrators to secure Azure-hosted services, including virtual machines, storage accounts, databases, and key vaults.
Proactively identifying, assessing, and remediating vulnerabilities through log analysis, system scanning, and alert response.
Investigating and documenting security incidents, including malware infections, policy violations, or unacceptable use of IT resources.
Ability to respond to identified security incidents and risks and execute consistent improvements in processes to identify, detect, and prevent threats to the environment.
Experience in administering platforms such as Exabeam, Proofpoint, SentinelOne, OKTA, Palo Alto, Tenable, Cisco, and Meraki network equipment is considered an advantage.
Why Join Us?
Opportunity to grow your cybersecurity skill set and take ownership of impactful security projects.
Work with experienced professionals who value collaboration, learning, and continuous improvement.
Competitive compensation and benefits package, plus ongoing training and certification support.
A culture that supports innovation, diversity, and work-life balance.
Location: Hybrid, with a base in Cleveland, Baltimore and Chicago areas. Travel will be required from time to time.
Who is Oswald?
Oswald is a 129-year-old company that creates a world of protection around the lives and businesses of our clients.
We are an independent, employee-owned company. So, essentially, you own your own success in a personally and financially rewarding opportunity.
Inclusivity is a priority. We foster an environment of collaboration and belonging where our Employee-Owners thrive on their unique path. Our diverse talent reflects the communities and clients we serve, while driving unmatched risk and insurance innovations.
Our people-first culture and client service excellence have built our reputation of integrity, resourcefulness, and a relentless care for our clients and employees. Don't believe us? Ask your friends, colleagues, and mentors about Oswald. There's a reason Oswald has been named a Top Workplace for nine consecutive years.
What you'll get...
At Oswald, you will have the opportunity to build a long-term career with unlimited growth potential. Aim high, work hard and we'll help you achieve your goals.
At Oswald, you will experience our caring work environment. We care about our Employee-Owners, we care about our customers, and we care about the world around us. Our caring personality comes to life in the form of volunteering in the community. We even give employees paid time off to volunteer with an organization of their choice.
At Oswald, you will achieve a work-life balance. We care about your physical and emotional well-being, so work-life balance is encouraged and practiced. We understand you have a life outside of work, and we want you to live it.
At Oswald, you will have access to a world-class Total Rewards package. We truly value our people, which shows in our compensation, benefits, and perks.
In addition to competitive pay, we have designed a performance-based annual incentive program. All employees are eligible to earn a bonus by meeting performance objectives.
Comprehensive medical, dental and vision plans and numerous supplemental benefit offerings.
Paid time off annually and a sabbatical at every 10-year service anniversary.
Ownership in the company in the form of company stock (discretionary profit-sharing and 401(k) match contribution)
Assistance with parking expenses, discount programs for area services/experiences, and financial support for professional development and licensure/designations
Access to specialized leadership development programming designed to take your career to the next level.
And so much more!
To learn more about Oswald, our culture and everything we have to offer, visit us on LinkedIn.
Oswald, a Unison Risk Advisors company is an equal opportunity employer and will consider all applications without regard to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic.
Cyber Security Analyst
Security Engineer Job 33 miles from Westlake
Provide support for data and information security technology at the University. Collaborate with relevant constituents to increase the security, reliability, and resiliency of the data and information assets of the University. Assist with the development and implementation of policies, procedures, standards, and guidelines to ensure the security of the University technology environments. Advocate the use of emerging information security best practices and technologies.
35% Handle day-to-day security operations activities including vulnerability scanning, security monitoring and alerting, and incident handling. Work with system owners to ensure patches are kept up to date or implemented in a timely manner when critical vulnerabilities are identified. Assist with incident handling and response.
25% Design and implement security monitoring solutions and make changes when needed to improve visibility and relevancy of
alerts. Work with the University community to foster a culture of shared security responsibility.
20% Assist with the development and administration of a University-wide Technology Security plan and program and in the development of priorities and requirements for Information Security in academic and administrative departments.
10% Provide assistance with the design and implementation of the Technology disaster recovery plan. Assist with regular
exercises to test and refine this disaster recovery plan.
Additional Position Information:
Education:
Relevant bachelor's degree..
Licenses/Certifications/Requirements:
Current security certification, such as CISSP, CISA, Security+, or GIAC preferred.
Experience:
Requires a minimum of 2 years of experience in Security, System or Network administration. Technical understanding of a broad range of security concepts including those related to application security, operating system security, network security, and cryptography is required. Must have extensive knowledge of application, infrastructure, and networking operations. Working knowledge of requirements for organizational compliance with multiple laws, regulations, and standards such as PCI-DSS, HIPAA, FISMA, GLBA, FERPA, and DMCA preferred. Knowledge of common attack methodologies, malware, and incident response is required. Experience with vulnerability management tools and open source penetration testing tools is preferred. Experience with Workday security preferred. Experience with cloud infrastructure/security services and an EDR product preferred.
Leadership:
Responsible for directing and monitoring the work of student and/or temporary workers.
Physical Requirements:
Job is physically comfortable; individual is normally seated and has discretion about walking, standing, etc. May occasionally lift very lightweight objects.
Working Conditions:
Standard working environment with possible minor inconveniences due to occasional noise, crowded working conditions and/or minor heating/cooling or ventilation problems. Near continuous use (>70% of the time) of a video display terminal.
Application Instructions:
In order to be considered for this position, please, complete the online application and attach your resume, cover letter and a list of three professional references.
Application Deadline:
Review of applicants will begin on May 14, 2025.
Compensation:
The compensation for this position is commensurate with experience and qualifications.
FLSA Status (exempt/nonexempt):
United States of America (Exempt)
Union Affiliation (if applicable):
For assistance with your application or attachments, please contact the Human Resources representative listed:
Sena Jodoin
Email:
******************
________________________________________________________________________
Background Check Statement
The University of Akron is committed to providing a safe environment for all students and employees. The University endeavors to protect the health, welfare and safety of all students, employees and visitors on our campus. As such, all offers of employment with The University of Akron are contingent upon verification of credentials, and satisfactory completion of a criminal background check. Some positions may require additional credit investigation and a pre-employment driving record search.
Non-Discrimination Statement
The University of Akron is an Equal Education and Employment Institution. View our Non-Discrimination Statement for more information. Equal Opportunity Employer, including disability/veterans.
State of Residence Statement
It is the expectation of the University of Akron that all work performed as an employee of the University will be performed in Ohio.
Security Engineer - Database Activities / Imperva
Security Engineer Job 11 miles from Westlake
At PNC, our people are our greatest differentiator and competitive advantage in the markets we serve. We are all united in delivering the best experience for our customers. We work together each day to foster an inclusive workplace culture where all of our employees feel respected, valued and have an opportunity to contribute to the company's success. As a Security Engineer- Database Activities / Imperva within PNC's DATA PROTECTION organization, you will be based in Pittsburgh, PA, Cleveland, OH, Dallas, TX, Phoenix, AZ or Birmingham.
PNC will not provide sponsorship for employment visas or participate in STEM OPT for this position.
Required Skills:
* Database Administration experience with the ability to write and translate
scripts on SQL and various Database types
* Experience with Database Monitoring and Scanning. Specific Imperva DAM Assessment scanning experience is a Plus.
* Ability to work with Business on requirements documentation and process
improvement.
* Strong Communication skills - Written, Verbal and Organizational
* Collaboration with cross functional teams to translate technical and business processes.
* Conduct & Lead meetings across various lines of business.
Good to Have Skills:
PowerShell scripting
Database experience in: Cloudera, Mongo, Hadoop, Containers, Neo4J, Cassandra
Ability to perform repetitive tasks
Job Description
* Provides subject matter expertise when applying security concepts. Leverages technical knowledge and industry experience to design, build, and maintain technology solutions. Responsible for deliverables related to project timelines.
* Responsible for working with architecture to take high level architectural designs and determine the specifics around implementation details (ex: sizing) integration details, onboarding and operationalization.
* Evaluates patches, updates, and ongoing maintenance. Determines impacts to existing solutions when new standards are implemented. Utilizes change control and other governance processes to ensure alignment of solutions .
* Develops detailed implementation, configuration, design, and engineering documentation. Build and implement solutions.
* Works with operational partners to enable transition and day-to-day supportability.
* Provides engineering support to existing technology in a production environment and collaborating with other groups as required. Seeks opportunities to grow a broad knowledge base to complement specific subject matter expertise.
PNC Employees take pride in our reputation and to continue building upon that we expect our employees to be:
* Customer Focused - Knowledgeable of the values and practices that align customer needs and satisfaction as primary considerations in all business decisions and able to leverage that information in creating customized customer solutions.
* Managing Risk - Assessing and effectively managing all of the risks associated with their business objectives and activities to ensure they adhere to and support PNC's Enterprise Risk Management Framework.
Qualifications
Successful candidates must demonstrate appropriate knowledge, skills, and abilities for a role. Listed below are skills, competencies, work experience, education, and required certifications/licensures needed to be successful in this position.
Preferred Skills
Access Control (AC), Building Architecture, Customer Solutions, Disaster Recovery Planning, Information Security, Network Security, Physical Security, Risk Assessments, Security Technologies
Competencies
Analytical Thinking, Effective Communications, Information Security Management, Information Security Technologies, IT Environment, IT Standards, Procedures & Policies, IT Systems Management, Network and Internet Security, Problem Solving, Technical Troubleshooting
Work Experience
Roles at this level typically require a university / college degree, with 5+ years of industry-relevant experience. Specific certifications are often required. In lieu of a degree, a comparable combination of education, job specific certification(s), and experience (including military service) may be considered.
Education
Bachelors
Certifications
No Required Certification(s)
Licenses
No Required License(s)
Benefits
PNC offers a comprehensive range of benefits to help meet your needs now and in the future. Depending on your eligibility, options for full-time employees include: medical/prescription drug coverage (with a Health Savings Account feature), dental and vision options; employee and spouse/child life insurance; short and long-term disability protection; 401(k) with PNC match, pension and stock purchase plans; dependent care reimbursement account; back-up child/elder care; adoption, surrogacy, and doula reimbursement; educational assistance, including select programs fully paid; a robust wellness program with financial incentives.
In addition, PNC generally provides the following paid time off, depending on your eligibility: maternity and/or parental leave; up to 11 paid holidays each year; 8 occasional absence days each year, unless otherwise required by law; between 15 to 25 vacation days each year, depending on career level; and years of service.
To learn more about these and other programs, including benefits for full time and part-time employees, visit Your PNC Total Rewards.
Disability Accommodations Statement
If an accommodation is required to participate in the application process, please contact us via email at AccommodationRequest@pnc.com. Please include "accommodation request" in the subject line title and be sure to include your name, the job ID, and your preferred method of contact in the body of the email. Emails not related to accommodation requests will not receive responses. Applicants may also call ************ and say "Workday" for accommodation assistance. All information provided will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations.
At PNC we foster an inclusive and accessible workplace. We provide reasonable accommodations to employment applicants and qualified individuals with a disability who need an accommodation to perform the essential functions of their positions.
Equal Employment Opportunity (EEO)
PNC provides equal employment opportunity to qualified persons regardless of race, color, sex, religion, national origin, age, sexual orientation, gender identity, disability, veteran status, or other categories protected by law.
This position is subject to the requirements of Section 19 of the Federal Deposit Insurance Act (FDIA) and, for any registered role, the Secure and Fair Enforcement for Mortgage Licensing Act of 2008 (SAFE Act) and/or the Financial Industry Regulatory Authority (FINRA), which prohibit the hiring of individuals with certain criminal history.
California Residents
Refer to the California Consumer Privacy Act Privacy Notice to gain understanding of how PNC may use or disclose your personal information in our hiring practices.
Information Security Engineer
Security Engineer Job 29 miles from Westlake
As an Information Security Engineer in our Security Operations Center (SOC), you will contribute to the organization's security efforts by actively participating in the monitoring, detection, and response to security threats. This role involves implementing security measures, supporting incident response activities, and collaborating with various teams to ensure a strong security posture. You will have the opportunity to work closely with senior engineers to enhance your skills and apply your knowledge to protect the organization's digital assets.
Job Responsibilities
Assist in the design, implementation, maintenance, and management of comprehensive information security projects and initiatives within the Security Operations team. Ensuring the confidentiality, integrity, and availability of information assets within the insurance company.
Assist in coordinating and executing incident response activities, including identifying, investigating, and documenting security incidents, following established protocols and collaborating with senior engineers to ensure effective resolution.
Assist in the delivery, implementation, and maintenance of SIEM and SOAR platforms to improve incident response capabilities and security operations.
Monitor security events and manage ongoing incident response efforts to ensure efficient threat detection, analysis, and containment.
Engage with industry forums, security communities, and regulatory bodies to stay informed about emerging security threats and regulations, representing the company's interests and contributing to industry-wide security initiatives.
Collaborate with IT, network, and development teams to seamlessly integrate security practices across all technological domains of the organization.
Familiarity with utilizing pre-trained AI models (such as OpenAI models) for security applications, including integrating AI for threat intelligence, automated threat detection and response, and data analytics for processing and analyzing security data. Comfortable with deploying AI solutions within security frameworks and aligning AI tools with cybersecurity strategies while ensuring their ethical use and maintenance in secure environments.
Actively engage in internal groups such as Technical Advisory Boards (T-CAB), Communities of Practice, and cohorts to advocate for security best practices and drive a culture of security awareness across the organization.
Contribute innovative ideas to refine security processes and documentation, aligning them with industry best practices to continuously strengthen the organization's security framework.
Participate in the evaluation and integration of new security solutions and technologies to enhance the organization's defense capabilities.
Job Qualifications
Minimum 1-3 years of relevant experience in Information Security or Information Technology.
Bachelor's degree in Information Security, Computer Science, Information Technology or a related field and/or commensurate experience.
Good understanding of information security principles and secure event log analysis
Familiarity with SIEM (Security Information and Event Management) systems and tools.
Basic experience in scripting and programming (e.g., Python, PowerShell) is a plus.
Strong analytical skills and attention to detail.
Preferred Certifications:
Pursuing industry recognized security certifications, such as
ISC(2)
CISSP, CCSP, CSSLP, ISSEP, ISSAP, ISSMP
GIAC (Global Information Assurance Certifications)
GCIH, GMON, GSOC, GDSA, GCDA, GISF, GSLC
ISACA
CISM, CRISC, CDPSE, CET, CSX-P
Behavioral Competencies
Certified Information Systems Security Professional
Collaborates
Customer focus
Communicates effectively
Decision quality
Nimble learning
Technical Skills
Security Engineering
Firewall Management
Threat Intelligence
Network Security
Incident Response
Security Monitoring
Vulnerability Management
Identity Management
Encryption Techniques
Security Assessments
Information Security
This job description describes the general nature and level of work performed in this role. It is not intended to be an exhaustive list of all duties, skills, responsibilities, knowledge, etc. These may be subject to change and additional functions may be assigned as needed by management.
Information Security Analyst
Security Engineer Job 33 miles from Westlake
Job Details INSXCloud, Inc Ohio - Akron, OH Full Time DayDescription
The Security Analyst is responsible for supporting information security operations in compliance with the company's information security policy.
ESSENTIAL DUTIES AND RESPONSIBILITIES
Configure and maintain security and audit software systems
Provide first-tier incident response support
Assist with audits and risk assessments
Analyze and respond to security incidents, conduct forensic investigations and document findings.
Prepare and maintain critical documentation such as policies, procedures, standards, baselines, guidelines, incident reports, and audit responses
Coordinate third-party service provider and vendor risk assessments
Perform vulnerability scanning and coordinate penetration testing utilizing third-party tools and services
Contribute to disaster recovery and business continuity planning efforts
Contribute to data classification, data retention, and data loss prevention efforts
Report key metrics to management
Stay informed of industry best practices and information security frameworks
Identify vulnerabilities, assess potential risks, and recommend security measures to mitigate threats.
Meet department attendance requirements, including being prompt and available during scheduled shift
Performs other related duties and tasks as needed.
Qualifications
To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
A bachelor's degree in computer science or a related discipline is preferred, but not required. A minimum of five years of experience in an information security role is necessary.
Knowledge of Microsoft and Mac operating systems, SQL Server user administration, networking devices, and security systems such as firewalls, IDS and IPS, SIEM, endpoint protection, encryption, and multifactor authentication
Knowledge of common security frameworks (ISO, NIST, etc.) and regulatory compliance (PCI, SOX, HIPAA, NYDFS, CCPA)
Ability to build relationships with all levels within the organization via in person, virtual and written communication.
SUPERVISORY RESPONSIBILITIES
None
CERTIFICATES, LICENSES, REGISTRATION
While a current information security certification (such as Security+, CISSP, or similar) is not required at the time of hire, the individual must obtain the certification within 15 months of starting the role.
PHYSICAL DEMANDS
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Small Motor Skills: Picking, pinching, typing or otherwise working primarily with fingers rather than with whole hand or arm, as in handling.
Speaking: Expressing or exchanging ideas by means of spoken word. Those activities in which require detailed or important spoken instructions must be conveyed to other workers accurately and quickly.
Hearing: Ability to receive detailed information through oral communication with or without correction.
Repetitive Motion: Substantial movement (motions) of the wrist, hands and fingers.
WORK ENVIRONMENT
This Hybrid Remote / In-office role provides the opportunity to gain knowledge while collaborating with co-workers while also considering a life work balance.
The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Normal office environment with controlled temperature.
ADDITIONAL REQUIREMENTS
The company reserves the right to determine if this position will be assigned to work on-site, remotely, or a combination of both. Assigned work location may change. In the case of remote work, physical presence in the office/on-site may be required to engage in face-to-face interaction and coordination of work among co-workers.
COMPUTER PROGRAMS USED ON A DAILY BASIS
Microsoft Office
Asana
BOX
Trend Micro
Acunetix
Arctic Wolf
Barracuda
Cloudflare
Wordfence / WordPress
Wiz
Jamf / Apple Business Manager
KnowBe4
Senior Information Security Analyst
Security Engineer Job 12 miles from Westlake
Third Federal is a leading lender of conventional home mortgages lending in 27 states, plus the District of Columbia, with retail branch offices in Ohio and Florida. Our mission is to help people achieve the dream of home ownership and financial security while creating value for our customers, our communities, our associates, and our stockholders. Our value system of love (concern for others), trust, respect, a commitment to excellence, and fun is at the heart of our commitment to our mission, and just as importantly, to our company culture. Through this, we help people find the loan or savings product that makes sense for them. At Third Federal, you will find strength and stability in your career. In our nearly 90-year history, we have never had layoffs, and have one of the lowest annual turnover rates at 6% (versus an industry average of nearly 19%). We have been certified as a 'Great Place to Work' multiple times in the last decade alone, and have been recognized with several additional workplace awards and recognitions. Because Third Federal associates are the foundation of our success, we take a genuine interest in each of them - from their professional development to their health and wellness. About the Role This is a senior-level position within the Information Security team. Responsibilities include monitoring and investigation of alerts, administration of software used by the team, and researching and implementing improvements to our Information Security posture. This position requires 8+ years of hands-on experience in multiple areas of Information Security, and knowledge and skills in areas such as networking, Windows, Linux, and Cloud platforms. This position will be hybrid at our corporate location in Cleveland, OH (7007 Broadway Ave, Cleveland, OH 44105). The role will be onsite two days per week. Responsibilities * Respond to alerts, events, and incidents * Perform detailed investigation and analysis of events * Use personal knowledge, skills, and tools to monitor for threats * Develop and implement monitoring rules and alerts * During investigations act as the go-to person for junior members of the team * Troubleshoot and support software and devices used by the Information Security team * Maintain situational awareness about the entire Information Technology environment at Third Federal * Regularly provide ideas and recommendations to improve the Information Security posture * Awareness and understanding of current topics and threats occurring in the Information Security community * Provide training to other members of the Information Security * Implement new Information Security tools and products * Create policies, playbooks, how-to guides, and other documentation * Act as a technical leader on threat and vulnerability management by reviewing and analyzing vulnerability data to identify trends and patterns. Additionally, collaborate with colleagues in prioritizing vulnerability fixes and developing remediation plans. * Provide technical guidance on secure system design and configurations * Collaborate with the rest of the security team to enhance overall security posture * Proactively hunt for cyber threats and vulnerabilities within the organization's environment * Analyze security data and logs from multiple sources (DLP, SIEM, EDR tools, etc.) to detect anomalous activity * Build and improve detection mechanisms to identify malicious behavior * Perform incident response tasks related to emerging threats and vulnerabilities * Act as a liaison between security, other technical teams, and the business to align security practices * Additionally, the role involves participating in cross-departmental security projects, staying updated on industry trends, and advocating for information security through awareness initiatives Qualifications * Minimum 8-10 years of experience in an Information Security role * Experience working with the following: * Cloud security tools and concepts *
Firewalls, IPS, WAF, SIEM, and EDR technologies * DLP Tools and Technology * Vulnerability scanning and threat analysis tools * Email Protection and Phishing solutions * Hands-on administration with a broad security understanding of one or more products such as anti-malware/anti-virus, firewalls, web proxies, SIEMs, vulnerability scanners, penetration testing, email filtering, DLP, etc. * Fluency in SIEM systems with proven ability to understand all the inputs/data sources * Ability and strong understanding of how to monitor networks for security breaches and analyzing network traffic, activity logs and system alerts * Hands on experience with responding to security events, threats and/or incidents by investigating and analyzing to identify root causes * Proven ability to prepare reports on security events, incidents and threats * Ability to protect systems by using and maintaining software like firewalls and data encryption programs to protect sensitive information * Capable of conducting security assessments, vulnerability testing (scanning) and risk analysis with having key abilities to identify vulnerabilities and assess their risk and impact to the organization * Proven ability to create documentation for security related plans including incident response and disaster recovery plans * Strong problem-solving skills to investigate and understand security events * Ability to think critically and innovatively about the security solutions that can keep data secure * Understanding of TCP/IP and networking * Knowledge of best practices and frameworks used in Information Security * Capable of explaining technical information to both I.T. and non-technical audiences * Detailed orientated * Ability to handle multiple projects and prioritize critical work * Desire to self-educate on the ever-changing landscape of cyber tactics * Superior written and verbal communication skills * Bachelor's degree in computer science, information security, or related, preferred * Certifications such as CISSP, CEH, Security+ etc., preferred * Experience with Azure and AWS platforms is preferred Third Federal Perks & Benefits * Competitive compensation packages * Medical, dental, vision, and more * 401k match * 11 Bank Holidays + vacation/sick time * Exceptional culture and value system * Strong work/life balance * Growth opportunities * Mortgage Discount Program * Education Reimbursement Program Third Federal is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, ethnicity, religion, sex, national origin, gender identification or sexual orientation, disability, protected veteran status or any other classification protected under law.
Cyber Security Specialist
Security Engineer Job 38 miles from Westlake
Description We are looking for a talented Cyber Security Specialist to safeguard our organization's networks, systems, and applications from potential threats. This role requires a proactive individual who can implement robust security measures, investigate vulnerabilities, and ensure compliance with industry standards. Join our team to play a key role in protecting critical assets and enhancing cybersecurity awareness.
Responsibilities:
- Monitor and respond to cybersecurity threats, incidents, and vulnerabilities across various systems and applications.
- Conduct in-depth risk assessments, vulnerability scans, and penetration tests to identify and address security gaps.
- Develop, implement, and maintain security policies, procedures, and best practices to strengthen the organization's defenses.
- Configure and manage security tools, including firewalls, endpoint protection, and intrusion detection systems.
- Collaborate with IT teams and business units to design and implement secure system architectures.
- Investigate security breaches, contain threats, and recommend mitigation strategies to prevent future incidents.
- Ensure compliance with relevant industry standards and regulations, such as ISO 27001 and other frameworks.
- Provide cybersecurity training and awareness programs, including phishing simulations for employees.
- Stay informed about the latest security trends, vulnerabilities, and evolving regulatory requirements. Requirements - Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or equivalent relevant experience.
- A minimum of 3 years of experience in cybersecurity, information security, or related fields.
- Strong knowledge of network protocols, firewalls, VPNs, encryption, and security architecture.
- Hands-on experience with security tools, including SIEMs (e.g., Splunk, QRadar), antivirus software, and vulnerability scanners (e.g., Nessus, Qualys).
- Familiarity with industry frameworks and standards, such as NIST and CIS Controls.
- Exceptional analytical and problem-solving skills to address complex security challenges.
- Ability to clearly communicate technical concepts to both technical and non-technical audiences.
- Proficiency with Office 365 and familiarity with managing cyber and security threats. Technology Doesn't Change the World, People Do.
Robert Half is the world's first and largest specialized talent solutions firm that connects highly qualified job seekers to opportunities at great companies. We offer contract, temporary and permanent placement solutions for finance and accounting, technology, marketing and creative, legal, and administrative and customer support roles.
Robert Half works to put you in the best position to succeed. We provide access to top jobs, competitive compensation and benefits, and free online training. Stay on top of every opportunity - whenever you choose - even on the go. Download the Robert Half app (https://www.roberthalf.com/us/en/mobile-app) and get 1-tap apply, notifications of AI-matched jobs, and much more.
All applicants applying for U.S. job openings must be legally authorized to work in the United States. Benefits are available to contract/temporary professionals, including medical, vision, dental, and life and disability insurance. Hired contract/temporary professionals are also eligible to enroll in our company 401(k) plan. Visit roberthalf.gobenefits.net for more information.
© 2025 Robert Half. An Equal Opportunity Employer. M/F/Disability/Veterans. By clicking "Apply Now," you're agreeing to Robert Half's Terms of Use (https://www.roberthalf.com/us/en/terms) .
Chief Information Security Officer - Information Technology
Security Engineer Job 45 miles from Westlake
The Chief Information Security Officer ( CISO ) would report to the CITO and is responsible for engineering activities and systems that monitor, detect and alert on potential security threats and vulnerabilities. Also identifying, developing, testing, implementing, and maintaining security compliance, risk and vulnerability management for Ashland University students, staff, and faculty. This position is critical to providing daily support, troubleshooting, and resolution of the Ashland University cyber security infrastructure. Works closely with network engineering and technical operations staff as security threats and vulnerabilities are detected and coordinates the response to contain and mitigate threats or breaches. Leads and coordinates the network penetration process for network security operations and communicate event status to leadership.
Physical Demands
Office environment with some lifting and hauling of equipment up to 60 lbs. Typical work week: 8AM - 5PM, however, some weekend and evening work hours required; remote hybrid work is negotiable Cellphone availability during normal and after work hours required Valid Driver's License and ability to drive to remote campus locations and attend training as assigned.
Required Qualifications
Conduct periodic senior level needs analyses as directed Analyze patterns of non-compliance and take appropriate administrative or programmatic actions to minimize security risks and insider threats. Manage accounts, network rights, and access to systems and equipment. Analyze potential security violations to determine if the network environment has been breached, assess the impact, and preserve evidence. Support, monitor, test, implement, document, and troubleshoot hardware and software problems pertaining to the cyber security infrastructure. Analyze systems and network for potential security problems and recommend resolutions or remediate when necessary. Review access control lists on routers, firewalls, and other network devices. Lead and perform system audits to assess security related factors within the network. environment and recommend or implement improvements to security systems. Evaluate potential security risks and take appropriate corrective and recovery action. Monitor/Manage clients' endpoint security and SIEM . Design, implement, and conduct internal and third-party Security Test and Evaluations Serve as an information security resource on projects. Develop and lead formal and informal education and training for Ashland University Develop and utilize “Case Management” processes for incident and resolution tracking. The processes should also be used for historic recording of all anomalous or suspicious activity. Maintain knowledge of the current security threat level by monitoring related Internet postings, Intelligence reports, and other related documents as necessary. Provides advanced technical expertise, consulting, and support to staff members with security tasks. Recommends appropriate actions to improve project security and designs new monitoring strategies for complex securing systems. Maintain system baselines and configuration management items, including security event monitoring “policies” in a manner determined and agreed to by management. Ensure changes are made using an approval process agreed to in advance.
Preferred Qualifications
Experience: Bachelor's degree in IT Security or closely related field from an accredited college or university with a minimum of three (3) years' experience in high-level technology computing or related technology areas, or a bachelor's degree and other relevant education and training from an accredited college or university with a minimum of five(5) years in high-level technology computing or related technology areas. Must possess professional security management certification such as a Certified Information Systems Security Professional ( CISSP ), Certified Information Security Manager ( CISM ), Certified Information Systems Auditor ( CISA ), or other similar credentials. Must demonstrate knowledge of common information security management frameworks such as ISO / IEC 27001 and ITIL , COBIT and NIST , and an understanding of relevant legal and regulatory requirements such as Payment Card Industry/Data Security. Experience with network, application, and security awareness security concepts, methodologies, processes, & tools. Experience with information risk assessment and mitigation concepts, methodologies, processes, and tools. Experience with forensics concepts, methodologies, processes, and tools. Skills: Expert knowledge of application, network, and system security vulnerabilities and exploits. Ability to adapt to a fast-moving IT landscape and keep pace with latest thinking and new security technologies Forms business partnerships that help drive the IT security strategy forward Can make decisions that are well informed and timely Must have organizational skills and can make sound decisions independently. Must possess excellent interpersonal, communications and collaborative skills and have experience working in a service capacity with direct customer interaction. Must be able to build team support as well as can work cooperatively with all levels of the university community.
Lead Information Systems Engineer - OSI PI
Security Engineer Job 31 miles from Westlake
Experienced, hands-on OSI PI engineer needed for life science project work. Excellent opportunities for advancement and development of leadership skills.
Responsibilities
Design and install OSI PI system architecture components.
Update Life Cycle document, and network architecture drawings per GMP standards.
Configure PI applications per design specifications (Data Archive, AF, SQL, PI Vision, PI RtReports).
Install and configure interfaces to control system infrastructure.
Validation per GMP standards of all PI system components.
Work in team environment with RoviSys engineers, client engineers and manufacturing personnel, and 3rd-party equipment vendors and contractors.
Mentor less experienced engineers.
Qualifications
Required Qualifications:
2+ years of configuration experience within OSI PI software platform.
Working knowledge and experience with GDP, cGMP procedures, and engineering practices on pharmaceutical/biotech production processes, facilities, and equipment.
Ability to work in the Pacific Time Zone. Preferred hybrid work schedule with office in Thousand Oaks, CA.
Self-motivated, excellent communication skills, and enjoy working with people.
Understanding and adherence to RoviSys and client safety/quality policies and procedures.
Preferred Qualifications:
S. in Electrical, Computer, or Chemical Engineering or Engineering Technology.
Working knowledge of common control systems and the interfacing to the OSI PI system.
Understanding of GAMP 5 validation processes.
Experience working with any of the following applications is a plus:
PI Event Frames / PI EFGen
PI RtReports and other reporting platforms
PI Vision
Kepware and FactoryTalk Linx Gateway
PI Interfaces
OPC DA/UA
RDBMS
BACnet
EMDVB
PI to PI
Pay Scale: $80,000 - $129,000/year
Your base pay will depend on several factors including Automation related skills and experience, and individualized knowledge base.
Systems Administrator, Security & Facilities
Security Engineer Job 12 miles from Westlake
Programs, maintains, troubleshoots, repairs, analyzes, enhances, and inspects campus security systems i.e., access control, intrusion, CCTV, etc., fire alarms, dispatch software and computer equipment. Generates and analyzes system status reports. Records and maintains documentation, procedures, and reports. Installs, troubleshoots, maintains proprietary Access Control and Facilities Administration software and hardware i.e., PAIRAI, Asset Essentials (DUDE). Provides maintenance and modification of operations systems. Provides training to users and updates the departmental website. Performs other functionally related duties as assigned.
Minimum Qualifications
* Associate degree preferably in computer science or related field.
* Related work experience may be substituted for education requirement. One (1) year of related work experience can be substituted for one (1) year of education. For example, a candidate with a high school diploma, GED or state recognized equivalent and six (6) years of related work experience can be eligible to apply.
* Four (4) years of experience in systems administration including experience with break/fix working with PCs and Macs, Windows, Apple mac OS, and Adobe products.
* Experience with access control systems.
* Ability to work a flexible schedule and maintain on call status, to include evenings and weekends.
* Valid driver's license and ability to establish and maintain driver eligibility under CSU's Driving and Motor Vehicle Policy.
Preferred Qualifications
* Bachelor's degree preferably in Computer Science or related field.
* Experience with Linux, in Windows server management, and report generation libraries such as Python's Report Lab
* Experience installing and maintaining Microsoft server operating systems and writing software applications.
* Experience with one or all of the following programs: Keyscan, Schlage SMS, Key Systems, DS Control Point, or Keystone.
* Microsoft Office Specialist certification.
Information Security Engineer
Security Engineer Job 29 miles from Westlake
As an Information Security Engineer in our Security Operations Center (SOC), you will contribute to the organization's security efforts by actively participating in the monitoring, detection, and response to security threats. This role involves implementing security measures, supporting incident response activities, and collaborating with various teams to ensure a strong security posture. You will have the opportunity to work closely with senior engineers to enhance your skills and apply your knowledge to protect the organization's digital assets.
Job Responsibilities
* Assist in the design, implementation, maintenance, and management of comprehensive information security projects and initiatives within the Security Operations team. Ensuring the confidentiality, integrity, and availability of information assets within the insurance company.
* Assist in coordinating and executing incident response activities, including identifying, investigating, and documenting security incidents, following established protocols and collaborating with senior engineers to ensure effective resolution.
* Assist in the delivery, implementation, and maintenance of SIEM and SOAR platforms to improve incident response capabilities and security operations.
* Monitor security events and manage ongoing incident response efforts to ensure efficient threat detection, analysis, and containment.
* Engage with industry forums, security communities, and regulatory bodies to stay informed about emerging security threats and regulations, representing the company's interests and contributing to industry-wide security initiatives.
* Collaborate with IT, network, and development teams to seamlessly integrate security practices across all technological domains of the organization.
* Familiarity with utilizing pre-trained AI models (such as OpenAI models) for security applications, including integrating AI for threat intelligence, automated threat detection and response, and data analytics for processing and analyzing security data. Comfortable with deploying AI solutions within security frameworks and aligning AI tools with cybersecurity strategies while ensuring their ethical use and maintenance in secure environments.
* Actively engage in internal groups such as Technical Advisory Boards (T-CAB), Communities of Practice, and cohorts to advocate for security best practices and drive a culture of security awareness across the organization.
* Contribute innovative ideas to refine security processes and documentation, aligning them with industry best practices to continuously strengthen the organization's security framework.
* Participate in the evaluation and integration of new security solutions and technologies to enhance the organization's defense capabilities.
Job Qualifications
* Minimum 1-3 years of relevant experience in Information Security or Information Technology.
* Bachelor's degree in Information Security, Computer Science, Information Technology or a related field and/or commensurate experience.
* Good understanding of information security principles and secure event log analysis
* Familiarity with SIEM (Security Information and Event Management) systems and tools.
* Basic experience in scripting and programming (e.g., Python, PowerShell) is a plus.
* Strong analytical skills and attention to detail.
Preferred Certifications:
Pursuing industry recognized security certifications, such as
* ISC(2)
* CISSP, CCSP, CSSLP, ISSEP, ISSAP, ISSMP
* GIAC (Global Information Assurance Certifications)
* GCIH, GMON, GSOC, GDSA, GCDA, GISF, GSLC
* ISACA
* CISM, CRISC, CDPSE, CET, CSX-P
Behavioral Competencies
* Certified Information Systems Security Professional
* Collaborates
* Customer focus
* Communicates effectively
* Decision quality
* Nimble learning
Technical Skills
* Security Engineering
* Firewall Management
* Threat Intelligence
* Network Security
* Incident Response
* Security Monitoring
* Vulnerability Management
* Identity Management
* Encryption Techniques
* Security Assessments
* Information Security
This job description describes the general nature and level of work performed in this role. It is not intended to be an exhaustive list of all duties, skills, responsibilities, knowledge, etc. These may be subject to change and additional functions may be assigned as needed by management.
Information Security Analyst
Security Engineer Job 33 miles from Westlake
The Security Analyst is responsible for supporting information security operations in compliance with the company's information security policy. ESSENTIAL DUTIES AND RESPONSIBILITIES * Configure and maintain security and audit software systems * Provide first-tier incident response support
* Assist with audits and risk assessments
* Analyze and respond to security incidents, conduct forensic investigations and document findings.
* Prepare and maintain critical documentation such as policies, procedures, standards, baselines, guidelines, incident reports, and audit responses
* Coordinate third-party service provider and vendor risk assessments
* Perform vulnerability scanning and coordinate penetration testing utilizing third-party tools and services
* Contribute to disaster recovery and business continuity planning efforts
* Contribute to data classification, data retention, and data loss prevention efforts
* Report key metrics to management
* Stay informed of industry best practices and information security frameworks
* Identify vulnerabilities, assess potential risks, and recommend security measures to mitigate threats.
* Meet department attendance requirements, including being prompt and available during scheduled shift
* Performs other related duties and tasks as needed.
Qualifications
To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
* A bachelor's degree in computer science or a related discipline is preferred, but not required. A minimum of five years of experience in an information security role is necessary.
* Knowledge of Microsoft and Mac operating systems, SQL Server user administration, networking devices, and security systems such as firewalls, IDS and IPS, SIEM, endpoint protection, encryption, and multifactor authentication
* Knowledge of common security frameworks (ISO, NIST, etc.) and regulatory compliance (PCI, SOX, HIPAA, NYDFS, CCPA)
* Ability to build relationships with all levels within the organization via in person, virtual and written communication.
SUPERVISORY RESPONSIBILITIES
* None
CERTIFICATES, LICENSES, REGISTRATION
* While a current information security certification (such as Security+, CISSP, or similar) is not required at the time of hire, the individual must obtain the certification within 15 months of starting the role.
PHYSICAL DEMANDS
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Small Motor Skills: Picking, pinching, typing or otherwise working primarily with fingers rather than with whole hand or arm, as in handling.
Speaking: Expressing or exchanging ideas by means of spoken word. Those activities in which require detailed or important spoken instructions must be conveyed to other workers accurately and quickly.
Hearing: Ability to receive detailed information through oral communication with or without correction.
Repetitive Motion: Substantial movement (motions) of the wrist, hands and fingers.
WORK ENVIRONMENT
This Hybrid Remote / In-office role provides the opportunity to gain knowledge while collaborating with co-workers while also considering a life work balance.
The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Normal office environment with controlled temperature.
ADDITIONAL REQUIREMENTS
The company reserves the right to determine if this position will be assigned to work on-site, remotely, or a combination of both. Assigned work location may change. In the case of remote work, physical presence in the office/on-site may be required to engage in face-to-face interaction and coordination of work among co-workers.
COMPUTER PROGRAMS USED ON A DAILY BASIS
Microsoft Office
Asana
BOX
Trend Micro
Acunetix
Arctic Wolf
Barracuda
Cloudflare
Wordfence / WordPress
Wiz
Jamf / Apple Business Manager
KnowBe4