End User Desktop Support
Central Point Partners
Columbus, OH
Mortgage Company Columbus OH Work HYBRID 3 days onsite each week Needed ASAP Direct Hire In person Interview Desktop Support About the Role: Desktop Support will assist End Users in resolving computer/network (hardware and software) related issues and implementing changes on behalf of the user. You will act as a liaison between the End User and the Windows and Networking departments. What You'll Need: Associate's degree in Information Technology, Computer Science, or equivalent IT certification required 1-2 years of hands-on IT support experience in a business environment Advanced proficiency with Windows 10/11 administration, configuration, and troubleshooting Expert-level knowledge of Microsoft Office Suite with ability to train and support end users Working knowledge of Active Directory fundamentals, Microsoft Intune, and Entra ID administration Strong hardware troubleshooting skills including desktops, laptops, printers, and peripheral devices Experience using AI Exceptional customer service skills with ability to communicate technical concepts to non-technical users Strong analytical and problem-solving abilities with systematic approach to issue resolution Proven ability to work independently, manage multiple priorities, and meet deadlines in fast-paced environment Patient, empathetic approach when assisting users with varying technical skill levels What You'll Do: Administer end-user workstations and support end-user activities utilizing TCP/IP on a primarily Microsoft Windows-based local area network (LAN). Investigate user problems and identify their source; determine possible solutions; test and implement solutions. Install, configure and maintain personal computers, Windows networks, file servers, network cabling, and other related equipment, devices and systems; add, upgrade, and configure disk drives, printers and related equipment. Perform and/or oversee software and application installation and upgrades. Maintain site licenses for department/organization. Plan and implement network security, including maintaining firewalls, configuring VPN, managing host security, file permissions, file system integrity, and adding and deleting users. Troubleshoot networks, systems and applications to identify and correct malfunctions and other operational difficulties. Develop and conduct various training and instruction for system users on operating systems and other applications; assist users in maximizing use of networks and computing systems. Maintain strict confidentiality and data security protocols when accessing, processing, or storing sensitive end-user information and network data. Serve as technical liaison and provide IT consultation to personnel across all departments, ensuring seamless technology integration. Deliver comprehensive computer orientation and onboarding support to new hires and provide ongoing technical training to existing staff. Manage and resolve help desk tickets efficiently using ticketing systems, ensuring timely response and resolution tracking with clear communication to end users. Maintain accurate asset management records and conduct regular inventory tracking of all IT equipment, software licenses, and hardware deployments. Create and maintain comprehensive documentation of troubleshooting procedures, solutions, and IT processes to build organizational knowledge base. Provide reliable remote support capabilities using various tools and platforms to assist users regardless of location or connectivity challenges. Other duties as assigned.$38k-51k yearly est. 2d agoInformation Technology Support Specialist
Vinebrook Technology
Remote job
**THIS IS AN OVERNIGHT SHIFT FROM 11 pm - 7:30 am ET** Overview: IT Support Specialist will work with a team of managed services specialists, administrators, and engineers to deliver excellent support and management of our customers' environments. They will field issues and requests escalated directly by customer IT personnel, end-users, and monitoring tools. This role will have broad exposure across a range of end-user devices, networks, servers, virtualization, and security platforms. The support specialist will be expected to work issues independently, and when needed, with the assistance of senior subject matter experts on the team. The ideal candidate will be a self-starter, with an ability to learn quickly and provide exceptional customer service. Schedule 11pm - 7:30am EST Monday to Friday Fully remote Location: Orlando, FL (Remote) Experience 2 years (minimum) in a technical support role Experience providing customer support Experience in 24x7x365 Managed Services preferred Experience using ITSM and Monitoring toolsets Qualifications, Education, and Training High school diploma required; college degree strongly preferred Must be a U.S. Citizen *NO VISAS* Microsoft Teams: 2 years (Required) Microsoft 365: 2 years (Required) Windows: 2 years (Required) Google IT Support Professional (Preferred) CompTIA A+, Network+, Security+ (Preferred) Microsoft MTA (Preferred) ITIL v4 Foundation (Preferred) Mac OS: 2 years (Preferred) Skills Highly analytical thinker and troubleshooter Detail oriented with excellent documentation and communication skills Self-motivated, passionate about technology, with the desire to learn new things Ability to use and troubleshoot Microsoft Windows, Office, Office365, and mac OS Foundational understanding of operating systems and servers, both physical and virtual. Experience working with active directory to perform basic tasks, such as user creation and password resets Responsibilities Triage tickets per specified severity levels Refer/ escalate customer issues to the appropriate level of support, as needed Provide excellent customer service, staying calm and communicating clearly and professionally in stressful situations Perform basic troubleshooting steps such as checking logs, checking capacity, and running basic diagnostics across a variety of platforms including Linux/Windows servers, network devices, hypervisors, and storage systems Respond to automated alerts performing troubleshooting and resolution of issues, as well as proper notifications where required Fulfill service requests and remediate incidents using customer Standard Operating Procedures (SOPs) Perform account management services - User Account creates/disables/terminations/name changes, etc. Use a ticket system to provide regular status updates and make sure tasks are completed based on priority and in compliance with SLAs Distribute scheduled reports to customers as required Supporting end-users by diagnosing and resolving computer hardware, network, and application issues Assist with cross-training of other team members, as needed Perform other tasks as assigned by management Benefits 401(k) Dental insurance Health insurance Health savings account Paid time off Vision insurance Department: Managed Services$34k-57k yearly est. 5d agoMajor Account Manager, Enterprise
Fortinet
Remote job
In this key role, you will manage and drive direct sales into Major Enterprise Accounts. Create and implement strategic account plans focused on attaining enterprise-wide deployments of Fortinet products and services. Develop executive relationships with key buyers and influencers in Major Enterprise Accounts and leverage these during the sales process. Coordinate with appropriate internal groups to generate and deliver winning Contract Bids, Proposals, RFI/RFP Responses, and Statements of Work. Negotiate terms of business with clients to achieve win/win results that provide the basis for solid ongoing relationships. Responsibilities: Generating Major Enterprise Accounts business opportunities and managing the sales process through to closure of the sale. Achievement of agreed quarterly sales goals. Generate a sales pipeline, qualifying opportunities, and accurately forecast pipeline Required Skills Proven ability to sell solutions to Major Enterprise customers. A proven track record of quota achievement and demonstrated career stability Experience in closing large Enterprise deals. Excellent presentation skills to executives & individual contributors Excellent written and verbal communication skills A self-motivated, independent thinker that can move deals through the selling cycle 8+ years of experience selling to Major Enterprise Accounts 2+ years of experience selling enterprise network security products and services Results-oriented, Self-starter, Hunter-type mentality. The Major Account Manager, Enterprise is required to customarily and regularly work outside of their office or home office engaged in selling, including travel as needed to make a sale.$121k-162k yearly est. Auto-Apply 60d+ agoData Migration Specialist
Gentis Solutions
Columbus, OH
Highly Regulated environment, not open to third parties. Job Title: Entra Join / Autopilot Migration Specialist Work Style: Hybrid Pay Rate: $67.00 - $77.00 per hour Employment Type: Contract Start: ASAP About the Role Gentis Solutions is seeking an Entra Join / Autopilot Migration Specialist to lead a large-scale enterprise transition from Hybrid Azure AD Join to cloud-native Entra Join. This role requires deep expertise in Microsoft Autopilot, Intune, Entra ID, and Windows endpoint modernization, combined with strong project leadership capabilities. In addition to identity transformation work, this role will also guide the organization through an enterprise-wide upgrade from Windows 10 to Windows 11 and ensure seamless compatibility with GlobalProtect VPN across all provisioning workflows. This is a hands-on, senior-level technical role responsible for evaluating current-state architecture, developing a phased migration roadmap, leading implementation, and documenting and supporting all aspects of the transition. What You'll Do (Responsibilities) Enterprise Identity Transition Lead the full lifecycle migration from Hybrid Azure AD Join to Entra Join. Build and maintain a phased migration roadmap aligned with security, compliance, and operational requirements. Collaborate with infrastructure, compliance, and security teams to ensure alignment and smooth adoption. Autopilot Configuration & Deployment Design and deploy optimized Autopilot profiles for modern Entra Join environments. Integrate Autopilot with Intune and Entra ID to support zero-touch provisioning. Ensure provisioning workflows meet corporate security, configuration, and compliance standards. Windows 10 → Windows 11 Enterprise Upgrade Lead the planning and deployment of the enterprise OS upgrade to Windows 11. Validate hardware readiness and compatibility across all device types. Support testing, rollout planning, communication, and change management. GlobalProtect Integration Ensure compatibility between Entra Join, Autopilot, and GlobalProtect VPN. Work with network/security teams to validate policies, configurations, and access controls. Troubleshoot and resolve VPN-related connectivity issues during and after migration. Project Leadership Define scope, requirements, milestones, and deliverables in partnership with Program Management. Provide technical leadership throughout planning, pilot, rollout, and stabilization phases. Communicate proactive updates, risks, and mitigation strategies to stakeholders. Documentation & Change Management Create detailed documentation for Entra Join, Autopilot, and Windows 11 upgrade processes. Build training materials for IT teams, service desks, and end users. Track issues, risks, outcomes, and lessons learned for continuous optimization. Post-Deployment Support Monitor and optimize Entra Join, Autopilot, and Windows 11 environments. Troubleshoot device identity, provisioning, enrollment, and VPN issues. Stay up-to-date on Microsoft identity modernization best practices and updates. What We're Looking For (Requirements) Proven, hands-on experience with Microsoft Autopilot, Intune, and Entra ID (Azure AD). Deep understanding of Hybrid Azure AD Join vs. Entra Join identity models. Experience with Windows 10/11 provisioning, OS upgrades, lifecycle management, and device readiness validation. Familiarity with GlobalProtect VPN configuration, testing, and troubleshooting. Strong PowerShell scripting skills for automation, reporting, and configuration. Solid understanding of enterprise security, compliance, and identity governance standards. Ability to assess and map current infrastructure and recommend modernization strategies. Strong communication and documentation capabilities, including training and technical writing. Nice to Have Experience leading large-scale Azure AD/Entra ID modernization or device management migrations. Background refining enterprise identity, OS, and endpoint management strategies. Familiarity with broader security frameworks, compliance controls, and IT governance models.$67-77 hourly 1d agoBusiness Development ~ Cyber-Security ~100% Remote ~ San Diego
Us Healthcare Careers
Remote job
National technology company seeking a Business Development Representative that has cyber-security software sales experience or software product experience and understands Technology, IT, Computer Networking and Cyber-security. This critical role will call on IT, Infrastructure and Network Security Engineers and their teams. Best Fit ~ Hunter, Smart, Go Getter, with a strong personality & great Cold Calling skills! 100% Remote with no in-person client meetings! Generous Base Salary & Uncapped Commission! Requirements • 3-5 years of Enterprise Customers sales experience, phone sales experience, 3-5 years of which were in an Inside Sales or Business Development role. • Previous experience selling computer software, cyber-security or related networking products. • 3-5 years' experience calling on Enterprise Accounts • Results oriented, Self-Starting, and highly motivated • Strong verbal and written communications skills • Ability to work in a team environment • MS Office Tools • SFDC, Salesloft, Outreach.io, Zoominfo, Discoverorg, and LinkedIn Gretchen Sheppard ~ US HealthCare Careers ~ gretchen@ushealthcarecareers.biz ~ 408-686-9450$107k-195k yearly est. 60d+ agoSenior Security Engineer
Ringside Talent
Columbus, OH
We are looking for a Senior Security Engineer to work for our client. The ideal candidate aligns with the responsibilities and qualifications outlined below. Responsibilities: Design, implement, and maintain security solutions to protect enterprise systems and data Conduct vulnerability assessments, penetration testing, and risk analysis Develop and enforce security policies, standards, and best practices Collaborate with IT and development teams to integrate security into system architecture Monitor and respond to security incidents, ensuring timely resolution Qualifications: 5+ years of experience in cybersecurity engineering or related roles Strong knowledge of network security, application security, and cloud security principles Experience with security tools such as SIEM, IDS/IPS, and endpoint protection Familiarity with compliance frameworks (ISO, NIST, SOC, HIPAA) Excellent problem-solving and communication skills What Our Client Offers: A critical role in safeguarding enterprise systems and sensitive data Opportunities to work with cutting-edge security technologies and methodologies A collaborative environment focused on innovation and resilience Competitive compensation and comprehensive benefits$92k-127k yearly est. 2d agoSecurity Operations Vice President
JPMC
Westerville, OH
Be part of a dynamic team where your distinctive skills will contribute to a winning culture and team. As a Security Operations Vice President in our global team of technologists and innovators, you will significantly impact our company, clients, and business partners worldwide. You'll guide a highly motivated team in analyzing, designing, developing, and delivering solutions to counter adversaries and enhance our operations. Your contributions will help identify internal threat indicators and prevent sensitive data loss using world-class tools and technology. Job responsibilities - Guide a highly motivated team motivated team in designing, configuring, and implementing Data Protection and DLP policies using Microsoft Information Protection (Microsoft Purview), Broadcom (Symantec) DLP, and Palo Alto DLP, both on-premises and in the cloud, utilizing CASB and Cloud Proxy at the enterprise level. Leverage your scripting skills in Python, PowerShell, and JavaScript to automate tasks and workflows, and use your API working knowledge to integrate various DLP solutions with SIEM, CASB and UEBA tools. Provide technical expertise to manage, configure, and optimize Palo Alto DLP, CASB, and Cloud Proxy solutions, Broadcom (Symantec) DLP, and Microsoft 365 Security Solutions while producing reports on program status and progress for senior management. Lead incident response, conduct risk reviews, assess policies, and identify new threat vectors, driving the development of new data identifiers, data governance policies, and standards to ensure compliance and data integrity. Use strong communication skills to present findings and solutions related to existing and emerging threats in the data loss prevention/internal threat arena to senior leaders and stakeholders. Collaborate with stakeholders and businesses to provide guidance on best practices, define data management requirements, and establish effective controls, practices, and procedures, delivering cost-effective strategic solutions that prioritize our clients. Assist in training and retaining talent and identify growth opportunities for junior team members for talent development. Required qualifications, capabilities, and skills - 7 or more years of cybersecurity operations or SOC related experience with 2 years as a technical lead with strong project management skills. Deep understanding of cybersecurity practices, Data Loss Prevention concepts, security incident triage, Insider Threat, and operations risk management processes, along with architectural requirements, engineering threats, vulnerabilities, and incident response methodologies. Proven experience in managing and configuring DLP and EDR solutions in large-scale enterprise environments, with expertise in Information Protection/Sensitivity Labels, Data Loss Prevention, Secure Browsers and Insider Risk/Threat Management. Proficient in scripting with PowerShell, Python, JavaScript and knowledgeable in regular expressions and APIs. Experience in developing and implementing new DLP or Insider Threat programs using tools like Palo Alto DLP, CASB, Microsoft Purview, Symantec DLP, Crowd Strike, Island Browser and Splunk or other SIEM tool. Excellent analytical and problem-solving skills, capable of translating complex technical concepts into practical solutions based on risk assessment and risk appetite. Preferred qualifications, capabilities and skills - Possess two or more of the following certifications - Microsoft Certified: Security, Compliance and Identity Fundamentals, Broadcom DLP Administrator, Palo Alto Networks Certified Network Security Administrator, Cybersecurity Architect Expert, Security Operations Analyst Associate, Azure Security Engineer, CISSP, Splunk Certified Power User Experience with Agile methodology and the ability to work with at least one of the common frameworks with knowledge of tools like Confluence, JIRA and ServiceNow. Ability to identify network attacks and systemic security issues as they relate to threats and vulnerabilities, with a focus on recommendations for enhancements or remediation based on in-depth risk assessment. Good understanding of national and international laws, regulations, policies and ethics related to financial industry cybersecurity and foundational knowledge of computer forensics; legal, government and jurisprudence as they relate to cybersecurity; operating systems; and methods for intelligence gathering and sharing.$103k-176k yearly est. Auto-Apply 60d+ agoSell a Patented Cyber Platform to Elite BFSI Accounts - Remote AE Role with Massive Upside
Bundoran Group
Remote job
On behalf of our client, a category-defining cybersecurity platform We've partnered with a fast-scaling cybersecurity vendor that's redefining how enterprises secure themselves against DDoS attacks and validate their risk posture. Backed by patented technology and deep traction in financial services, they are hiring a Senior Enterprise AE to own strategic growth in the U.S. - with a focus on large, security-sensitive BFSI clients. If you're a true enterprise hunter with command over complex sales cycles and a track record of winning CISO-level trust, this is the kind of role that can accelerate your career and earnings trajectory. About the Client Our client helps global enterprises move from reactive defense to proactive DDoS resilience. Their platform addresses a mission-critical blind spot in security programs - delivering continuous, non-disruptive validation that existing tools can't match. Their go-to-market focus is sharp: high-ACV, complex enterprise sales into BFSI with real-world impact. What You'll Be Doing Own and drive full-cycle sales from first outbound to close across the BFSI vertical Navigate multi-threaded enterprise sales processes and complex procurement cycles Sell a differentiated, patent-backed platform to CISOs, security leaders, and procurement teams Help shape U.S. sales strategy at a company in high-growth mode What We're Looking For 8+ years in enterprise cybersecurity sales, ideally with experience in BFSI A consistent track record of new logo wins and outbound success Confidence and technical fluency in conversations with CISOs and security stakeholders Experience selling risk, DDoS, or network security a plus Familiarity with MEDDIC, Challenger, or other structured enterprise methodologies Current or past employers may include: Akamai, Cloudflare, Palo Alto, Zscaler, Netskope, etc. Compensation and Benefits Competitive Base Salary & Uncapped Commission Equity: Generous stock option plan Benefits: Full medical, remote-first flexibility Travel: Minimal - limited to key client visits and conferences High-performers with deep BFSI experience may qualify for accelerated packages Why This Role This is not a spray-and-pray sales org. This is a precision play into a high-stakes market. The product is proven, differentiated, and patented - and buyers understand the risk it solves. If you're tired of transactional deals or feature-chasing, and want to sell something with weight and consequence, this is the role. We're screening for true enterprise sales professionals. Apply now to learn more - or refer someone exceptional in your network.$26k-82k yearly est. 58d agoTechnical Manager - Secure Cloud Transformation | Remote, USA
Optiv
Remote job
will be fully remote and can be hired anywhere in the continental U.S. We are seeking a Technical Manager to join our Secure Cloud Transformation practice. As a Technical Manager, you will be responsible for overseeing the successful delivery of a portfolio of client engagements. You will provide technical delivery oversight, manage client relationships, and lead project management efforts to deliver measurable client outcomes. Your deep expertise in AWS and/or Azure, Cloud Native Application Protection Platforms (CNAPP) such as Wiz, and infrastructure-as-code (e.g., Terraform) will directly enable our clients to securely mature their cloud environments. You will guide a team of consultants and ensure our engagements meet our high-quality standards for client satisfaction. The Technical Manager will establish and maintain productive relationships with consultants, practice leadership, and client stakeholders. Actively contribute to practice development initiatives and improving operational efficiency on projects. In line with Optiv's commitment to quality, you will confirm that work is of the highest quality as per Optiv's quality standards by peer reviewing the work provided by team members. How you'll make an impact Oversee the technical delivery of portfolio of client engagements; ensuring that each engagement fulfills client goals. Manage engagement scope, timelines, budget, and client expectations; ensure the successful and timely delivery of engagement outcomes. Craft detailed end-to-end engagement plans and ensure full alignment between signed Statement of Work (SOW) and engagement delivery artifacts. Manage client stakeholder expectations and clearly communicate scope and deliverables throughout the engagement lifecycle. Act as the primary escalation point for technical and project-related issues; provide resolution guidance and leadership. Provide strategic and technical guidance on cloud strategy, architecture, governance, and secure migration. Lead client workshops and maturity sessions with a focus on providing actionable recommendations for clients to adopt secure cloud practices. Actively engage in internal practice development including creating reusable assets, documentation standards, deliverable templates, and thought leadership contributions. Maintain professional and technical knowledge through continuous learning, industry conferences, certifications, reviewing professional publications, and thought leadership. Complete administrative tasks related to project delivery such as resource allocation, project tracking, and status reporting. Provide consistent and high-quality technical delivery across a portfolio of engagements with a focus on secure cloud strategy and architecture, migration, remediation, and maturity of client cloud environments. Lead the deployment and configuration of CNAPP solutions (e.g., Wiz) to enhance cloud security visibility and management capabilities. Oversee the development and management of infrastructure-as-code (IaC) templates using Terraform to drive secure deployments. Create high-quality client deliverables using PowerPoint, Word, Excel, PowerBI, and Visio to articulate technical designs, strategic recommendations, and engagement outcomes. Conduct periodic engagement milestone readouts with clients to incorporate feedback and proactively manage engagement risks and dependencies. Actively participate in internal knowledge-sharing and thought leadership initiatives to enhance the capabilities of our practice. What we're looking for Bachelor's degree and approximately 5-7 years of related consulting and technical management experience. Demonstrated experience managing and delivering multiple cloud transformation engagements. Approximately 5 years of hands-on experience design, deploying, and securing cloud environments using AWS and/or Azure. Deep technical experience in at least one major CNAPP platform (i.e., Wiz, CrowdStrike, Prisma Cloud). Demonstrate experience creating and managing infrastructure-as-Code (IaC) templates using Terraform for secure cloud provisioning. Proven ability to effectively communicate technical details and concepts to client stakeholders in working sessions and deliverable documentation. Experience creating high-quality deliverables including technical documentation, architectural diagrams, and strategic roadmaps. Solid understanding of cloud security governance, identity and access management, network security, data protection, and compliance frameworks (i.e., NIST, CSA). Ability to build consensus and manage multiple tasks in parallel. Willingness to travel to meet client needs. Experience working in multi-cloud environments (AWS and Azure) is highly desirable. AWS or Azure certifications such as AWS Solutions Architect, AWS Security Specialty, Azure Solutions Architecture, and/or Azure Security Engineer is strongly preferred. Practical knowledge of DevSecOps and CI/CD pipeline tooling such as Azure DevOps. Strong consultative skills with experience guiding clients toward successful engagement outcomes. #LI-SM1 #LI-Remote Salary Range Description $134,600.00 - $184,500.00 Annual The Hiring Range provided for this role is informed by (but not limited to) various factors including responsibilities of the position, work experience, education/training, internal peer equity, geography, as well as other market influences when extending an offer. The disclosed range has not been adjusted for these factors. This role may also be eligible to participate in a variable incentive-based bonus plan. Optiv offers a comprehensive compensation and benefits package, of which salary is a component. What you can expect from Optiv A company committed to championing Diversity, Equality, and Inclusion through our Employee Resource Groups. Work/life balance Professional training resources Creative problem-solving and the ability to tackle unique, complex projects Volunteer Opportunities. “Optiv Chips In” encourages employees to volunteer and engage with their teams and communities. The ability and technology necessary to productively work remotely/from home (where applicable) EEO Statement Optiv is an equal opportunity employer. All qualified applicants for employment will be considered without regard to race, color, religion, sex, gender identity or expression, sexual orientation, pregnancy, age 40 and over, marital status, genetic information, national origin, status as an individual with a disability, military or veteran status, or any other basis protected by federal, state, or local law. Optiv respects your privacy. By providing your information through this page or applying for a job at Optiv, you acknowledge that Optiv will collect, use, and process your information, which may include personal information and sensitive personal information, in connection with Optiv's selection and recruitment activities. For additional details on how Optiv uses and protects your personal information in the application process, click here to view our Applicant Privacy Notice. If you sign up to receive notifications of job postings, you may unsubscribe at any time.$134.6k-184.5k yearly Auto-Apply 60d+ agoProduct Specialist 4/PS4 (37381)
Idealforce
Columbus, OH
IDEALFORCE has a CONTRACT position available immediately for Network Security Engineer (Product Specialist 4/PS4) to join our customer in Phoenix Arizona. This is an ONSITE position. Please find below additional details about this job. Client is considering only LOCAL CANDIDATES for this role. Job Description The Product Specialist 4 is the expert for a technical development or execution environment product or set of products. This consultant will be working in the Client's Infrastructure and Operations department. Perform as an Architect in designing security infrastructure on firewalls both internal and external, and designing solutions based on needs keeping things such as PCI, etc. criteria in mind. • Manage and configure QRadar SIEM • Manage and configure McAfee Firewall Enterprise (SideWinder). • Manage and configure McAfee IDS. • Manage and configure IBM XGS. • Manage and configure VPN Environment with Cisco ASA (IPSEC/SSL, remote VPN, Site to Site VPN). • TCP Traffic Analysis (TCPdump, WireShark, WildPackets, Infinistream). • Manage and configure Web Application Firewalls. • General Network Administration and Network Management. • General Security issues/alerts monitoring, researching and troubleshooting. • Performing periodic external network scanning with Nessus and other pertinent tools. • Providing DMZ and network security design considerations and suggestions to the Network Team. Qualifications • Firewall Required: on general firewall administration. (5 Years) • Specific experience on McAfee Firewalls. (3 Years) • IDS experience. (5 years) • McAfee IDS. (3 years) • Source Fire (2 years desired) • Experience switch/router management. (1 Year) • Linux (2 Years) • VPN - IPSEC/SSL • TCP Traffic Analysis (3 Years desired) • Cisco ASR (desired) • Cisco Firewall Service Module (desired) • Breech Security Web Application Firewall (desired) • Q-Radar SIEM (desired) • Penetration testing (3 years desired) Interview Process: Initial 15 minute phone call for 1st Round. 2nd round face to face Interview. Additional Information Additional Information : - "All your information will be kept confidential according to EEO guidelines". - All candidates who are authorized to work in US are encouraged to apply. - Most of our positions require Candidate to clear the Background check prior to commencing the assignment. THIRD PARTY CANDIDATES: Email your candidate/s resume to pete dot tylor at idealforce.com along with the following details: Rate, Current location and Availability. Disclaimer : The above statements are intended to describe the general nature and level of work being performed by people assigned to this classification. They are not to be construed as an exhaustive list of all responsibilities, duties, and skills required of personnel so classified. All personnel may be required to perform duties outside of their normal responsibilities from time to time, as needed.$43k-79k yearly est. 60d+ agoSenior Data Engineer(only W2)
CBTS
Columbus, OH
Bachelor's Degree in Computer Science or related technical field AND 5+ years technical engineering experience with coding in languages including, but not limited to, C, C++, C#, or Java. Proficiency with Azure data services, such as Azure Data Lake, Azure Data Factory and Databricks. Expertise using Cloud Security (i.e., Active Directory, network security groups, and encryption services). Proficient in Python for developing and maintaining data solutions. Experience with optimizing or managing technology costs. Ability to build and maintain a data architecture supporting both real-time and batch processing. Ability to implement industry standard programming techniques by mastering advanced fundamental concepts, practices, and procedures, and having the ability to analyze and solve problems in existing systems. Expertise with unit testing, integration testing and performance/stress testing. Database management skills and understanding of legacy and contemporary data modeling and system architecture. Demonstrated leadership skills, team spirit, and the ability to work cooperatively and creatively across an organization Experience on teams leveraging Lean or Agile frameworks.$68k-95k yearly est. 3d agoChannel Account Manager
Firemon
Remote job
As a Channel Vendor Manager at FireMon, you'll be the bridge between our company and our valued channel partners. Your mission is to build lasting, trust-based relationships that help our partners succeed and, in turn, drive growth for FireMon. You'll recruit and enable new resellers in the mid-to-large market segment while strengthening partnerships with existing ones through collaboration, training, and ongoing support. This is a role for someone who enjoys connecting with people, understanding their business goals, and helping them grow through shared success.About the role Identify, recruit, and onboard new channel partners that align with FireMon's business objectives. Nurture relationships with existing partners, supporting their sales, marketing, and technical initiatives. Collaborate closely with partners to develop business plans that drive mutual growth and customer satisfaction. Provide ongoing enablement through training sessions, joint meetings, and educational opportunities. Participate in industry events, trade shows, and partner programs to strengthen relationships and expand market presence. Serve as a trusted advisor, sharing market insights and feedback with internal teams to shape future strategies. Work in partnership with the sales, marketing, and technical teams to achieve territory goals and deliver value to both partners and customers. Required Skills and Experience Bachelor's degree in Business, Information Technology, or related field. 3+ years of experience in channel or partner management, ideally within the cybersecurity or network software space. A proven ability to build and sustain productive relationships with partners and customers. Excellent communication and interpersonal skills - both technical and business-focused. A collaborative approach with strong problem-solving and organizational abilities. Self-motivated, adaptable, and able to manage multiple priorities while maintaining a positive, team-oriented attitude. What it Takes to be Part of the FireMon Team FireMon provides persistent network security for hybrid environments through a powerful fusion of real-time asset visibility, continuous compliance, and automation. Since creating the first-ever network security policy management solution, FireMon has delivered command and control over complex network security infrastructures for more than 1,700 customers. Our customers have unique and complex security problems that are difficult to solve. This doesn't intimidate us, it inspires us. It pushes us to be more creative and find solutions to ensure their success. If this sounds like a movement you'd be interested in joining, we invite you to apply today. FireMon provides equal employment opportunities to all employees, and applicants for employment, and prohibits discrimination and harassment of any type without regard to race, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state or local laws.$104k-142k yearly est. Auto-Apply 44d agoCybersecurity Event Analyst (Remote - US)
Jobgether
Remote job
This position is posted by Jobgether on behalf of a partner company. We are currently looking for a Cybersecurity Event Analyst in the United States. In this role, you will be a key member of a global Cyber Investigations & Response Team (CIRT), monitoring, detecting, triaging, and responding to cybersecurity events and incidents in a 24/7 operational environment. You will analyze complex data, leverage threat intelligence, and utilize advanced security technologies to protect enterprise networks. The role involves mentoring SOC analysts, collaborating with cross-functional teams, and continuously improving monitoring, detection, and response capabilities. You will have the opportunity to influence security processes, enhance organizational defenses, and directly contribute to safeguarding critical assets. This position combines technical expertise, analytical skills, and strategic problem-solving in a fast-paced, dynamic environment. Accountabilities: Monitor, detect, triage, and respond to cybersecurity events and incidents across enterprise networks. Mentor and develop SOC L1/L2 analysts, ensuring adherence to processes, and drive improvements in detection and response. Serve as an escalation point for SOC analysts and collaborate with threat hunters, incident responders, and forensic investigators. Analyze security threats, tactics, techniques, and procedures (TTPs) using frameworks such as MITRE ATT&CK and Cyber Kill Chain. Utilize automation and orchestration tools to optimize workflow and reduce repetitive tasks. Assist with incident response, including triage, remediation, and documentation. Tune cyber defense tools to enhance detection and prevention while minimizing false positives. Investigate and document security events, providing actionable insights to the SOC team and leadership. Requirements Bachelor's degree in Computer Science, Information Security, Information Technology, or related technical field, or equivalent practical experience. 7+ years of experience in cybersecurity, including Threat Hunting, Incident Response, IT Security, or network security. Experience working in a 24x7 operational environment with geographically distributed teams preferred. Proficiency with SIEM systems, EDR solutions, threat intelligence platforms, IDS/IPS, DLP, and other security monitoring tools. Strong analytical, investigative, and problem-solving skills. Excellent communication skills for interaction with IT professionals, senior management, and auditors. High level of integrity, confidentiality, judgment, and professionalism. Preferred: Cybersecurity certifications such as Security+, CySA+, CASP+, Pentest+, CEH, GSEC, GCIH, GCIA, CISSP. Familiarity with security principles, network systems, regulatory standards (HIPAA, HITRUST, SOX, GDPR), and scripting languages (Python, JavaScript, Perl) is a plus. Benefits Competitive base salary range: $97,700 - $162,800. Additional rewards including annual bonuses and long-term incentive programs. Comprehensive health, dental, vision, life, and disability insurance. Paid time off and flexible work arrangements. Opportunities for professional development, mentoring, and career growth. Participation in a diverse and inclusive work environment with a culture of innovation and collaboration. Jobgether is a Talent Matching Platform that partners with companies worldwide to efficiently connect top talent with the right opportunities through AI-driven job matching. When you apply, your profile goes through our AI-powered screening process designed to identify top talent efficiently and fairly. 🔍 Our AI evaluates your CV and LinkedIn profile thoroughly, analyzing your skills, experience, and achievements. 📊 It compares your profile to the job's core requirements and past success factors to determine your match score. 🎯 Based on this analysis, we automatically shortlist the 3 candidates with the highest match to the role. 🧠 When necessary, our human team may perform an additional manual review to ensure no strong profile is missed. The process is transparent, skills-based, and free of bias - focusing solely on your fit for the role. Once the shortlist is completed, we share it directly with the company that owns the job opening. The final decision and next steps (such as interviews or additional assessments) are then made by their internal hiring team. Thank you for your interest! #LI-CL1$97.7k-162.8k yearly Auto-Apply 60d agoManager, Detection & Response
Censys
Remote job
Company Background Censys' mission is to be the one place to understand everything on the internet. Frustrated by the lack of trustworthy Internet intelligence, we set out to create the industry's most comprehensive, accurate, and up-to-date map of the Internet. Today, Censys delivers real-time Internet intelligence and actionable threat insights to global governments, over 50% of the Fortune 500, and leading threat intelligence providers worldwide. Location: This position is remote within the United States. Role Summary Censys is looking for a Manager of Product Detection & Response to join our Research and Threat Analysis team to drive both strategy and vision as well as be hands on keyboard with their engineers. This is not a typical corporate detection and response role. This role will lead the effort within Censys to fingerprint software and services in the Censys Internet Intelligence Platform - like a SIEM for Censys scan data. In this leadership role, you will have to work with members of our Research, Data Engineering, and Product teams to figure out how we can label C2 at scale, discover anomalies across infrastructure, interpret patterns and limitations of our rules engine, and operate as an authority on our detection capabilities. What you'll do: In this role you will serve as the cornerstone of Censys' effort to build the most comprehensive understanding of the Internet. You will lead a team and our strategy to tactically fingerprint software and devices that are susceptible to attack via configuration errors and vulnerabilities as well as roadmap future efforts in active vulnerability testing. Research and develop custom fingerprints against Censys scan data to further enrich and contextualize services and infrastructure running on the Internet. Consult with the Data engineering team for implementing possible changes to scanning targets, payloads, and collection of data to further increase the fidelity and accuracy of identification of software and hardware versions and models. Coordinate with our Go-to-Market and Sales teams to facilitate researching and fingerprinting of emerging vulnerabilities, threats, and high-priority detections. Participate in on-call rotations to ensure 24x7 coverage of hi-impact, critical security vulnerabilities Qualifications: Bachelor's degree in Computer Science, Data Science, Engineering, or other technical discipline (or equivalent professional experience). 7+ years of experience in security research/systems security/network security or a similar field. 2+ years leading a security engineering function Previous experience in Application Security, Penetration Testing, and/or Red Team is preferred. Active vulnerability testing experience with frameworks like Nuclei; exploit development experience Experience with protocol analysis and in-depth knowledge of common protocols such as TLS, HTTP, SSH, SMB, SMTP High-level understanding of common network security vulnerabilities, CVSS scoring and exploit techniques. Experience exploring active scan data using tools such as Censys Search, Shodan, or similar; and/or experience with data analysis tools such as Google BigQuery. Proficient with regular expressions and other pattern-matching expressions. Experience in at least one scripting/programming language with a preference for Go and Python. Ability to concisely communicate complex subject matter to technical and non-technical audiences. Ability to work independently as a researcher while being part of a larger cross-functional team. Operational experience within a Product driven environment that should include GTM involvement For high cost of living areas, the expected salary range for this position is $172,000 - $205,000 For all other locations, the expected salary range for this position is $140,000 - $167,000. In addition to our great compensation package, our benefits are effective on day one and include but are not limited to: 401k match, health, vision, dental, and more! Please see our careers page for more details. Our roots are in Ann Arbor, Michigan and our innovation is fueled by the team's global perspectives. For this role, we are open to remote employees across the continental US. We value diversity and are committed to creating an inclusive environment for all employees. Censys is an equal opportunity employer. California Privacy Rights Notice Pursuant to the California Consumer Privacy Act (CCPA), we are providing you with notice that we collect personal information from job applicants for business purposes, including evaluating your candidacy for employment, conducting interviews, and, if applicable, completing the hiring process. The categories of information we may collect include identifiers (such as name and contact information), professional or employment-related information (such as work history, education, and references), and other information you provide in your application. We do not sell or share your personal information. For more information on how we use and protect your personal information, and your rights under the CCPA, please refer to our Privacy Policy.$172k-205k yearly Auto-Apply 22d agoSecurity Operations Senior Associate - Data Loss Prevention / Insider Threat
JPMC
Westerville, OH
Seize the opportunity to enhance cybersecurity, utilizing your skills in threat analysis and incident response to protect vital data and systems. As a Security Operations Senior Associate - Data Loss Prevention / Insider Threat within the Cybersecurity - Data Loss Prevention team, you will play an important role in safeguarding the organization's digital assets and infrastructure by proactively detecting, assessing, and responding to threats, vulnerabilities, and security incidents. Drawing on your knowledge of security principles, practices, and theories, you will collaborate with cross-functional teams to develop a coordinated approach to security and educate employees on best practices, policies, and procedures. Your work will have a direct impact on departmental outcomes, as you plan and ensure progress, identify gaps in information, and conduct analyses to solve complex cybersecurity problems. By utilizing your advanced analytical, technical, and problem-solving skills, you will contribute to the continuous improvement of our cybersecurity posture and help maintain the integrity, confidentiality, and availability of sensitive data and systems. The Data Loss Prevention Triage team performs many functions of data security at the firm. They review prioritized alerts generated by monitoring systems, perform an initial investigation to determine if the activity requires further investigation by Global Security. Also, they assist in technology and process improvement efforts, work with the content development team to refine detection, prioritize capabilities, analyze trends and patterns in DLP activity, and work with stakeholders to reduce the risk of data loss across all lines of business. Job responsibilities Perform daily operational real time monitoring and analysis of internal security events in accordance with standard operating procedures Review network and endpoint DLP events to determine the risk and impact to the firm and deliver findings in a clear, concise and fact-based manner Conduct in-depth security investigations, analyzing logs, network traffic, and other data sources to identify root causes, assess impact, and gather evidence for response and mitigation actions Collaborate with cross-functional teams to develop and implement coordinated security strategies, policies, and procedures, while educating employees on best practices Required qualifications, capabilities, and skills 3+ years of experience in cybersecurity operations, including threat detection, incident response, and vulnerability management Demonstrated experience in network traffic analysis, log analysis, and security investigation techniques to identify and respond to security incidents Understand investigation activities and the ability to follow data / build a case, with foundational knowledge of cybersecurity organizational practices, operations, risk management processes, principles, architectural requirements, engineering, threats and vulnerabilities - including incident response methodologies Proficiency in the use of Splunk, staying current with skills, participating in multiple forums related to cybersecurity, Data Loss Prevention or Insider Threat Proficiency in scripting to automate tasks, implement controls, and manipulate data Advanced knowledge of security protocols, cryptography, authentication, authorization, and security architecture design principles Ability to collaborate with high-performing Agile teams and individuals throughout the firm to accomplish goals. Preferred qualifications, capabilities, and skills Knowledge of Data Loss Prevention (DLP), potentially including experience developing risk-aligned DLP monitoring rules, knowledge of DLP systems, and products or experience on a security assurance operations team, performing DLP triage operational functions Experience reviewing logs, developing Splunk queries and dashboards, and automating manual tasks is a plus Foundational knowledge of: computer forensics; legal, government, and jurisprudence - relating to cybersecurity, operating systems, and methods for intelligence gathering and sharing preferable Ability to analyze vulnerabilities, threats, designs, procedures and architectural design, producing reports and sharing intelligence Understands foundational cloud computing, computer network defense, external organization and academic institutions dealing with cybersecurity issues Experience with financial authorities and regulations, identity and incident management, information assurance, information management, information systems, network security, and infrastructure design is preferable Knowledge and experience related to insider threat monitoring and operations is a plus$61k-90k yearly est. Auto-Apply 60d+ agoSecurity Risk & Compliance Manager
GWC Warranty
Westerville, OH
We are seeking an experienced Security Risk & Compliance Manager to join our Enterprise Information Security team and reporting to the Director, Information Security. In this role, the Security Risk and Compliance Manager will be responsible for developing, implementing, and overseeing the risk management and compliance program against standards, policies, and compliance requirements to reduce the risk of cyber security threats and ensure compliance with SOC 2 and regulatory compliance. The candidate will work closely with IT and other teams to continually identify risk exposure and implement security controls in support of compliances, possess a strong understanding of security best practice, project management skillsets, a high level of accountability and responsibility, and the proven ability to execute and deliver. Responsibilities * Manage and develop risk management and compliance programs to track and monitor risk to resolution. * Interact and collaborate across the company to assure security controls align with SOC 2 requirements and regulatory compliance. * Regularly monitor, track, and audit SOC 2 controls and other security risks to ensure compliance with requirements such as FTC Safeguards Rule, CCPA, and NYCRR. * Facilitate and ensure compliance with SOC 2 certification and regulatory compliance. * Collaborate with IT and other teams to develop and implement secure processes. * Develop and facilitate security awareness training. * Develop security policy, standard, and process documents. * Conduct security risk assessments. * Conduct regular security audits. * Develop and maintain assessment questionnaires * Stay abreast of relevant security and privacy regulations, laws, technologies, and threats. Qualifications/Desired Skills & Abilities * Must have 10+ years of IT Security experience or related field. * Must have 8+ years of risk and regulatory compliance experience. * Must have 5+ years of leading successful SOC 2 or equivalent certification. * Must demonstrate in-depth knowledge of current security best practice for application and network security. * Must be meticulous and detailed oriented with projects and outputs, including development of reports and management of work. * Additional experience with implementing security frameworks such as NIST or ISO 27001. * Understanding of network and application security best practice. * Familiar with security technologies such SIEM, WAF, vulnerability scanning. * Manage risk and compliance projects/tasks issues to solution. * Outstanding project management and organizational skills to manage multiple security projects. * Must be self-motivated, analytical and possess a problem-solving outlook. * Superior attention to detail and conscientious quality of work product. * Professional demeanor with superior oral and written communication skills Education and Experience * Bachelor's Degree in Information Security, or similar discipline * CISSP or CRISC certification or similar qualifications * Experienced with SOC 2 audits and FTC Safeguards Rule, CCPA, and NYCRR requirements Physical Demands While performing the duties of this job, the employee is regularly required to type and look at a computer screen for long periods of the day. The employee must be able to sit for long periods of time. Qualifications To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed above are representative of the knowledge, skill, and/or ability required. Reasonable accommodations will be made to enable individuals with disabilities to perform the essential functions. Note This job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice. Employee signature below constitutes employee's understanding of the responsibilities and the job qualifications of the position. Employee__________________________________ Date_____________ Automobile Protection Corporation (APCO) is a Drug Free Workplace as well as an Equal Opportunity Employer. Qualified applicants shall be considered for all positions without regard to race, color, sex, religion, national origin, age, disability, veteran status, or any other status protected by federal, state or local law.$74k-111k yearly est. 16d agoLinux Unix Systems Administrator
Lumen
Remote job
Lumen connects the world. We are igniting business growth by connecting people, data and applications - quickly, securely, and effortlessly. Together, we are building a culture and company from the people up - committed to teamwork, trust and transparency. People power progress. We're looking for top-tier talent and offer the flexibility you need to thrive and deliver lasting impact. Join us as we digitally connect the world and shape the future. **The Role** As the Linux/Unix Systems Administrator, you will be responsible for managing and maintaining the Voice Core Engineering and Test Teams' Linux and Unix-based systems. Your primary focus will be on ensuring the stability, security, and performance of these systems to support the Team. You'll provide technical expertise in Linux/Unix systems administration, Oracle SQL and PostgreSQL database management, scripting automation, and system performance optimization. A strong emphasis is placed on cloud-readiness and infrastructure configuration to support scalable services. Undertakes multiple highly complex Voice Core Engineering and Test projects and may require coordination across multiple business units. Understands that projects have defined timelines and missed dates impact performance. Voice Core Engineering and Test Team contributes to the overall strategic engineering and test vision, analyzes test requirements, provides test solutions, and supports deployment into production as needed for assigned projects. **Location** This position is Work From Home from any US-based location. **US Citizenship or Permanent Residency/Green Card is required for consideration.** **The Main Responsibilities** **Admin Responsibilities:** **System Management:** Install, configure, and maintain Linux/Unix servers and related hardware. Ensure systems are running efficiently and securely. **Database Management:** Expertise in Oracle SQL and PostgreSQL database management including the ability to analyze database performance and provide recommendations to improve database performance. **Automation and Scripting:** Develop and maintain scripts to automate routine tasks and improve system efficiency. Utilize tools such as shell scripting, Python, or Ansible for automation. **Troubleshooting and Support:** Provide technical support and troubleshooting for Linux/Unix systems and applications. Resolve system-related issues and work with other IT teams to address complex problems. **Team Responsibilities:** As you integrate into the Team, you will begin to learn and participate in these team responsibilities: + Virtualization and cloud computing solutions + Implementation of innovative technologies, processes, and tools within voice environments + Deploy and support voice technologies in large-scale network environments + Application of network security, server operating systems, virtualization, and open-source platforms + Manage voice test platforms, ensuring robust simulation and validation environments + Develop comprehensive test plans to assess system scalability, performance, redundancy, and maintainability + Collaborate on long-term voice platform and service strategy + Analyze complex test data and functional outcomes to drive quality assurance in diverse, real-world conditions **What We Look For in a Candidate** **Education:** + Bachelor's degree in Engineering, Computer Science, or a related technical discipline (or equivalent combination of education and experience) **Experience:** + 5+ years of Linux/Unix experience in a large-scale enterprise environment. Solid grasp of Linux/Unix system administration and performance optimization + Strong foundation in automation scripting (e.g., Python, Shell, Perl) for performance tuning and system + In-depth knowledge of Oracle SQL and PostgreSQL database management + Cloud computing solutions such as public providers AWS, Google Cloud and Microsoft Azure, as well as private environments like VMWare + Skilled in troubleshooting and proactive problem resolution across diverse environments + Capable of managing multiple concurrent projects with shifting priorities + Highly professional, detail-oriented, and self-motivated with the flexibility to work nights, weekends, or non-standard shifts to meet critical deadlines. **Compensation** This information reflects the anticipated base salary range for this position based on current national data. Minimums and maximums may vary based on location. Individual pay is based on skills, experience and other relevant factors. **Location Based Pay Ranges:** **$103,711 - $138,281 in these states: AL, AR, AZ, FL, GA, IA, ID, IN, KS, KY, LA, ME, MO, MS, MT, ND, NE, NM, OH, OK, PA, SC, SD, TN, UT, VT, WI, WV, and WY.** **$108,896 - $145,195 in these states: CO, HI, MI, MN, NC, NH, NV, OR, and RI.** **$114,082 - $152,109 in these states: AK, CA, CT, DC, DE, IL, MA, MD, NJ, NY, TX, VA, and WA.** Lumen offers a comprehensive package featuring a broad range of Health, Life, Voluntary Lifestyle benefits and other perks that enhance your physical, mental, emotional and financial wellbeing. We're able to answer any additional questions you may have about our bonus structure (short-term incentives, long-term incentives and/or sales compensation) as you move through the selection process. Learn more about Lumen's: + Benefits (**************************************************** + Bonus Structure \#LI-JS1 Requisition #: 340705 **Background Screening** If you are selected for a position, there will be a background screen, which may include checks for criminal records and/or motor vehicle reports and/or drug screening, depending on the position requirements. For more information on these checks, please refer to the Post Offer section of our FAQ page (************************************* . Job-related concerns identified during the background screening may disqualify you from the new position or your current role. Background results will be evaluated on a case-by-case basis. Pursuant to the San Francisco Fair Chance Ordinance, we will consider for employment qualified applicants with arrest and conviction records. **Equal Employment Opportunities** We are committed to providing equal employment opportunities to all persons regardless of race, color, ancestry, citizenship, national origin, religion, veteran status, disability, genetic characteristic or information, age, gender, sexual orientation, gender identity, gender expression, marital status, family status, pregnancy, or other legally protected status (collectively, "protected statuses"). We do not tolerate unlawful discrimination in any employment decisions, including recruiting, hiring, compensation, promotion, benefits, discipline, termination, job assignments or training. **Disclaimer** The job responsibilities described above indicate the general nature and level of work performed by employees within this classification. It is not intended to include a comprehensive inventory of all duties and responsibilities for this job. Job duties and responsibilities are subject to change based on evolving business needs and conditions. In any materials you submit, you may redact or remove age-identifying information such as age, date of birth, or dates of school attendance or graduation. You will not be penalized for redacting or removing this information. Please be advised that Lumen does not require any form of payment from job applicants during the recruitment process. All legitimate job openings will be posted on our official website or communicated through official company email addresses. If you encounter any job offers that request payment in exchange for employment at Lumen, they are not for employment with us, but may relate to another company with a similar name.$114.1k-152.1k yearly 22d agoSenior Manager, Incident Reponse
Vultr
Remote job
Who We Are Vultr is on a mission to make high-performance cloud infrastructure easy to use, affordable, and locally accessible for enterprises and AI innovators around the world. With 32 global cloud data center locations, Vultr is trusted by hundreds of thousands of active customers across 185 countries for its flexible, scalable, global Cloud Compute, Cloud GPU, Bare Metal, and Cloud Storage solutions. In December 2024 Vultr announced an equity financing at a $3.5 billion valuation. Founded by David Aninowsky and self-funded for over a decade, Vultr has grown to become the world's largest privately-held cloud infrastructure company. Why Vultr Simply put, Vultr is committed to providing businesses worldwide with the best price-to-performance of any cloud computing platform. Our global reach of data centers and strategic new partnerships provide the foundation to maximize the impact of our existing services, new product improvements, and releases, which in turn, is a catalyst for your own success. Vultr is taking flight, and this is your opportunity to leave your mark on the future of Cloud Infrastructure! Vultr Cares Excellent Medical Benefits w/ 100% company paid premiums for employee only plan + 100% company paid dental & vision premiums 401(k) plan that matches 100% up to 4% with immediate vesting Professional Development Reimbursement of $2,500 each year 11 Holidays + Paid Time Off Accrual + Rollover Plan Commitment matters to Vultr! Increased PTO at 3 year & 10 year anniversary + 1 month paid sabbatical every 5 years + Anniversary Bonus each year $500 first year remote office setup + $400 each following year for new equipment Internet reimbursement up to $75 per month Gym membership reimbursement up to $50 per month Company paid Wellable subscription Join Vultr The Security Operations team is a central pillar of our growth strategy, and we are looking for a Senior Manager of Incident Response to oversee the day-to-day operations of the incident management and response team. This role involves executing incident response strategies, coordinating with cross-functional teams during security incidents, and improving processes based on post-incident reviews. The Manager of Incident Response will also ensure the readiness of the organization by supporting team development, maintaining incident response tools, and aligning with industry standards and regulatory requirements. As our Incident Response Manager, you'll lead the charge against sophisticated threat actors targeting our global infrastructure, collaborating with international partners and government agencies to track and neutralize cyber threats while serving as the face of Vultr's security expertise to federal stakeholders worldwide. This high-visibility role offers the rare opportunity to make a tangible impact on global cybersecurity while working with cutting-edge technology and representing a respected industry leader. Key Responsibilities Manage and coordinate the incident response team in identifying, handling, and mitigating security incidents. Execute incident response plans, playbooks, and standard operating procedures, ensuring they are adhered to during incidents. Conduct investigations and analyze security incidents to identify root cause and recommend corrective actions. Collaborate with internal teams to facilitate communication and coordination during incident response efforts. Monitor security alerts to ensure timely response to threats and escalate when necessary. Participate in post-incident reviews to gather lessons learned and recommend improvements to the incident response process. Train and support team members to ensure they follow best practices in incident response. Ensure compliance with regulatory requirements and maintain awareness of emerging threats and trends in cybersecurity. Contribute to the development of the incident response team, setting expectations and helping to achieve incident response objectives. Assist in evaluating and recommending tools and technologies that enhance the incident response team's capabilities. Qualifications Bachelor's degree in computer science, information security, or a related field. At least 7 years of experience in information security, with 3 years in an incident response or security operations role. Experience in managing incident response efforts within a medium to large organization. Proven ability to handle moderate-to-high-severity incidents and contribute to their resolution. Relevant industry certifications such as GCIH (GIAC Certified Incident Handler), GCFA (GIAC Certified Forensic Analyst), or similar. Extensive experience in managing and responding to complex security incidents across various environments, including cloud and on-premises infrastructures. Proficiency in Linux and Windows operating systems, with the ability to identify, investigate, and respond to security breaches within these systems. Hands-on expertise with automation and scripting languages, such as Python, Bash, and PowerShell, to automate incident detection, response workflows, and forensic data collection. In-depth knowledge of security monitoring tools, including platforms for real-time incident detection and forensic analysis. Strong understanding of network security technologies, including firewalls, VPNs, intrusion detection/prevention systems, and packet capture/analysis tools, to track and mitigate threat vectors. Advanced forensic investigation skills using tools for system and memory analysis. Experience with orchestration, automation, and response tools to streamline and enhance incident response processes. Knowledge of threat intelligence frameworks to improve detection and response strategies. Familiarity with malware analysis techniques and tools to understand threats, reverse engineer attacks, and develop defense strategies. Experience in conducting tabletop exercises and incident simulations to assess and improve incident response capabilities. Strong leadership and team-building skills, with the ability to manage and mentor junior team members. Effective communication skills to convey security issues to both technical and non-technical audiences. Ability to handle multiple tasks and work in a dynamic, fast-paced environment. Up-to-date knowledge of cybersecurity threats and mitigation strategies. Experience working with regulatory compliance requirements. Availability to support 24/7 incident response efforts when necessary. Compensation: $130,000 - $150,000 This salary can vary based on location, years of experience, background and skill set. #LI-remote Inclusion & Privacy We are an equal opportunity employer and are committed to creating an inclusive environment for all employees. We welcome applications from individuals of all backgrounds and experiences, and we prohibit discrimination based on race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, veteran status, or any other protected status under applicable laws. We also take your privacy seriously. We handle personal information responsibly and follow applicable laws, including U.S. privacy rules and India's Digital Personal Data Protection Act, 2023. Your data is used only for legitimate business purposes and is protected with proper security measures. Where allowed by law, applicants may request details about the data we collect, access or delete their information, withdraw consent for its use, and opt out of nonessential communications. For more details, please see our Privacy Policy.$130k-150k yearly Auto-Apply 22d agoRed Team Tester - REMOTE
Gulf Coast Automation Group
Remote job
Job Description Job Title: Red Team Tester Position Type: Full-Time TalentFish is casting a line for a Red Team Tester. This is a Full-Time, Remote role; Chicago/Milwaukee preferred. Our client is building an Offensive Security team that red teamers believe in. These aren't tool-heavy, checkbox pentests. Our testers think and act like adversaries endpoint evasion, privilege escalation, moving laterally, and chaining attacks until we hit business-critical objectives. We write reports, sure, but they're narrative-driven. The full story from entry to impact, showing the path taken and the attacker mindset, and conveying the risks in a way that the client understands. SKILLS Consulting experience is preferred; candidates without direct consulting experience should be prepared to demonstrate transferable skills and how they can bridge any gaps. Candidates should demonstrate strong expertise in either network security or application security, with working knowledge of the other. Strong professionalism and communication skills (both written and verbal), with minimal reliance on LLMs and a willingness to engage in video calls. What You'll Do. Perform red team engagements simulating real-world adversaries. Conduct endpoint evasion, privilege escalation, and lateral movement. Write narrative-driven reports detailing attack paths and business impact. Communicate findings effectively to technical and non-technical audiences. Develop custom scripts and tools when needed. Research and apply new TTPs in engagements. Collaborate with team members and contribute to knowledge sharing. Preferred: Can demonstrate experience in chaining smaller vulnerabilities during real-world assessments to illustrate significant security impact. Ability to create custom tools, scripts, or proof-of-concepts when existing solutions do not meet requirements. Experience with EDR evasion and C2 frameworks. Been part of CTFs, cons, local meetups, or have published write-ups. Certifications (Offensive Security, Zeropoint Security, SEKTOR7, etc.). Some level of scripting/coding proficiency. Compensation Information The expected salary range for this position is $100,000 - $160,000 per year, depending on experience and qualifications. This role also qualifies for comprehensive benefits such as health insurance, 401(k), and paid time off. TalentFish is committed to pay transparency and equal opportunity. The salary range provided is in compliance with applicable state and federal regulations. This role requires authorization to work in the U.S. without current or future visa sponsorship. All offers are contingent upon the completion of a background check, which may include but is not limited to: reference checks, education verification, employment verification, drug testing, criminal records checks, and any required certifications or compliance requirements based on the end client's background check policies and applicable laws. TalentFish is an employee-owned company pioneering a new realm in talent acquisition. We are redefining IT staffing by evolving AI, video screening, and our unique platform. TalentFish focuses on providing the best employee, consultant, and client experience possible. At TalentFish we are an Equal Opportunity Employer; we embrace and encourage diversity!$100k-160k yearly 25d agoCyber Operations Advisor | Remote, USA
Optiv
Remote job
will be fully remote and can be hired anywhere in the continental U.S. The Cyber Operations Advisor (COA) is a senior technical leader and strategic partner responsible for driving measurable security outcomes, operational maturity, and client value through data-driven insights. The COA combines deep cyber operations expertise with advisory capabilities to lead complex technical engagements across multiple clients. This role focuses on metrics-driven performance, proactive risk management, and continuous improvement-defining, analyzing, and optimizing KPIs, SLAs, and service metrics to demonstrate value. Acting as a trusted advisor, the COA translates business requirements into actionable security strategies and collaborates with internal engineering and threat teams to implement corrective actions and systemic enhancements that elevate client satisfaction and operational efficiency. The Cyber Operations Advisor believes and lives the Cyber Operations guiding principles: * Deliver quality security outcomes * Drive efficient and timely operations * Actualize continual improvement and innovation * Protect the customer How you'll make an impact: * Independently lead multiple technical engagements simultaneously, ensuring timely delivery of measurable security outcomes and operational improvements across client environments * Convert client business requirements into actionable technical strategies and capabilities that align with security objectives and deliver measurable value * Collaborate with internal teams and clients to design strategic roadmaps and execute plans that advance operational maturity and security posture * Drive service maturity by analyzing KPIs, KRIs, SLAs, and performance trends to deliver actionable insights and continuous value improvements * Evaluate and align security solutions and recommendations with client requirements, risk profiles, and strategic objectives to ensure optimal fit and effectiveness * Assist in the documentation of business requirements, use cases, and ROI analyses to support informed decision-making and demonstrate value * Act as a technical advisor during pre-sales and post-sales engagements, ensuring solution alignment and client confidence * Provide technical expertise for proposals, contracts, and service descriptions to ensure accuracy and alignment with client needs * Recognize and recommend cross-sell and up-sell opportunities across AFC services * Lead or support security initiatives from planning through execution * Apply hands-on expertise to operationalize threat intelligence across EDR, SIEM, SOAR, and related domains, improving detection and response capabilities * Analyze patterns and anomalies to identify potential advanced threats and recommend proactive mitigation strategies * Conduct architectural reviews and provide recommendations to strengthen security, posture and operational efficiency * Assess and recommend custom detection logic, automation, or tool enhancements to address evolving threats and operational needs * Assist with platform configurations, detection logic, automation improvements * Build and develop relationships with internal and external stakeholders * Identify and assess project risks, developing mitigation strategies to ensure successful delivery and minimize impact * Validate project scope and deliverables to ensure alignment with client expectations and contractual obligations * Represent Optiv in client meetings, delivering clear technical guidance and executive-level communication * Collaborate with team members to identify issues, develop strategies, and drive continuous improvement * Provide support for projects spanning multiple functional groups by identifying collaborative opportunities, enhancing existing deliverables, and strengthening Optiv's value to our clients * Ensure projects are delivered on time, within budget, and to quality standards, meeting or exceeding client expectations What we're hiring for: * Bachelor's degree (or equivalent experience) and a minimum of 8 years in cybersecurity operations, with proven advisory and leadership responsibilities * Demonstrated success in leading client-facing engagements and managing strategic security programs in professional services or consulting settings * Advanced analytical skills with the ability to interpret complex data and translate insights into actionable security strategies * In-depth knowledge of SOC operations, threat analysis methodologies, risk assessment practices, and incident response frameworks * Hands on experience and in depth understanding of platform management processes including, but not limited to: EDR, Vuln Management, SIEM, SOAR, Identity, Network, and Perimeter tooling * Comprehensive understanding of NIST CSF, MITRE ATT&CK, and key regulatory frameworks such as PCI, SOC 2, and ISO 27001 * Senior-level security certifications preferred, such as CISSP, CISM, or GCIHGCIH, OSCP, (or equivalent) * Exceptional communication skills, including the ability to craft and deliver executive-level reports and compelling security narratives * Proven ability to establish trust and maintain strong relationships with senior client stakeholders and cross-functional internal teams * Expertise in cloud security across AWS, Azure, and GCP, with working knowledge of virtualization and containerization technologies * Working knowledge of project management methodologies (Agile, Scrum, PMI) and experience driving security initiatives * Familiarity with common Large Language Models and their impact on Security Operations * Preferred experience in security architecture, risk mitigation, disaster recovery planning, compliance testing, data loss prevention, and network security strategies, with familiarity in ITIL, COBIT, ISO standards, PCI, and SOX * Skilled in addressing client inquiries and resolving issues with professionalism and clarity * Proficient in creating presentations and technical content that adhere to organizational standards and effectively communicate complex concepts #LI-TW1 #LI-Remote What you can expect from Optiv * A company committed to championing Diversity, Equality, and Inclusion through our Employee Resource Groups. * Work/life balance * Professional training resources * Creative problem-solving and the ability to tackle unique, complex projects * Volunteer Opportunities. "Optiv Chips In" encourages employees to volunteer and engage with their teams and communities. * The ability and technology necessary to productively work remotely/from home (where applicable) EEO Statement Optiv is an equal opportunity employer. All qualified applicants for employment will be considered without regard to race, color, religion, sex, gender identity or expression, sexual orientation, pregnancy, age 40 and over, marital status, genetic information, national origin, status as an individual with a disability, military or veteran status, or any other basis protected by federal, state, or local law. Optiv respects your privacy. By providing your information through this page or applying for a job at Optiv, you acknowledge that Optiv will collect, use, and process your information, which may include personal information and sensitive personal information, in connection with Optiv's selection and recruitment activities. For additional details on how Optiv uses and protects your personal information in the application process, click here to view our Applicant Privacy Notice. If you sign up to receive notifications of job postings, you may unsubscribe at any time.$95k-136k yearly est. Auto-Apply 5d ago