Post job

Security Operations jobs near me - 271 jobs

  • OT Security Architect

    First Quality 4.7company rating

    Remote job

    We are seeking an OT Security Architect to work remotely. This position will be responsible for safeguarding our operational technology infrastructure. This role offers the flexibility to work remotely with periodic travel to our manufacturing sites. First Quality is a growing manufacturing organization that has defined security as one of its key business values. Joining our team will provide you with unique personal and professional growth opportunities where you'll be hands-on and securing cutting-edge industrial automation and technologies contributing to a growing field where cybersecurity directly protects critical processes, manufacturing, and safety. Primary responsibilities include: • Primarily responsible for OT security event monitoring, management, and response • Create an IS reference architecture for our OT networks • Work with OT engineering team, as well as with SOC team and verify that the reference architecture fits the business processes and requirements • Work with OT engineering teams for defining security controls for their on-going projects • Provide technical guidance to the GRC team with assessing OT 3rd party vendor and supply chain • Integrate with OT engineering projects and verify that the required IS controls are properly implemented • Revise and develop processes to strengthen the current OT Security Operations Framework, review policies and highlight the challenges in managing SLAs • Perform threat management, threat modeling, identify threat vectors and develop use cases for OT security monitoring including red\blue penetrations tests • Responsible for developing, configuring, and maintaining OT security automation and orchestration IR's and tools. • Creation of reports, dashboards, metrics for OT security operations and presentation to Sr. Mgmt. • Create required standards and procedures (i.e. IS purchasing standard, sanitization process) in coordination with all relevant stakeholders The ideal candidate should possess the following: • Minimum of five (5) years of professional experience in OT security and operations. • Knowledge of controls and automation equipment and principles (i.e. PLCs, SCADA, DCS, HMIs, VFDs, etc.) • Familiarity with security frameworks and standards such as NIST, ICS Mitre ATT&CK, and IEC 62443 • Experience in defining and implementing security controls for OT engineering projects. • Experience managing projects with the abilities to prioritize tasks and manage time effectively. • Experience in developing, configuring, and maintaining OT security automation and orchestration tools. • Bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field. In lieu of degree, related experience will be considered. • Background in manufacturing controls is preferred What We Offer You We believe that by continuously improving the quality of our benefits, we can help to raise the quality of life for our team members and their families. At First Quality you will receive: • Competitive base salary and bonus opportunities • Paid time off (three-week minimum) • Medical, dental and vision starting day one • 401(k) with employer match • Paid parental leave • Child and family care assistance (dependent care FSA with employer match up to $2500) • Bundle of joy benefit (years' worth of free diapers to all team members with a new baby) • Tuition assistance • Wellness program with savings of up to $4,000 per year on insurance premiums • ...and more! First Quality is committed to protecting information under the care of First Quality Enterprises commensurate with leading industry standards and applicable regulations. As such, First Quality provides at least annual training regarding data privacy and security to employees who, as a result of their role specifications, may come in to contact with sensitive data. First Quality is an Equal Opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, sexual orientation, gender identification, or protected Veteran status. For immediate consideration, please go to the Careers section at ******************** to complete our online application.
    $85k-133k yearly est. 3d ago
  • Cleared Armed Security Officer - OH

    Patriot Group International 4.4company rating

    Columbus, OH

    Cleared Armed Security Officer Position Type : Full-Time / Non-Exempt Clearance Required: Active Top Secret / Sensitive Compartmented Information Shift: 12-hour Panama Schedule (Days / Midnights) Patriot Group International (PGI) isn't just another company - we're a veteran-owned global leader in mission support, protecting critical infrastructure and information for clients in the intelligence, defense, and private sectors. Voted #1 Best Place to Work by Virginia Business Magazine and The Best Companies Group, PGI offers a team-driven environment where integrity, professionalism, and service excellence are the standard. As one of the highest-paying security employers in the nation, ($86,000 - $97,000 plus an additional $1,500 Biannual Retention Bonus!). PGI also provides 100% employer-paid medical and life insurance for employees, ensuring our professionals are as protected as the missions they serve. Position Overview We're seeking a Cleared Armed Security Officer to join our elite team in Columbus, Ohio , providing world-class data center security solutions that safeguard client assets from global threats. You'll serve as the first line of defense-protecting people, property, and sensitive information-while maintaining the highest standards of professionalism and operational readiness. This position reports to the PGI Site Manager. The Cleared Armed Security Officer will be responsible for the following: The Cleared Armed Security Officer will develop, maintain, and continuously improve knowledge of written and oral post orders, policies, procedures, and standards of conduct. Prevent all unauthorized access by enforcing all Client and PGI policies, including implementing and enforcing badging policies, controlling physical locks and keys, and inspecting persons and equipment. Provide security protection for all Client and PGI personnel and property within the assigned area of responsibility. Report or respond to incidents, security, and safety concerns per established post orders, including responding to alarms. Monitor security cameras and other electronic surveillance systems. Guide, follow, and direct individuals throughout the Site. Assist in controlling physical and electronic locks and unlocking and locking doors and areas. The Cleared Armed Security Officer will perform testing and other inspection services related to access control, including routine inspections, and testing of alarms, locks, doors, monitoring systems, and other access control mechanisms. Prevent the theft of physical or intellectual property. Assist in promoting communication and awareness of data center security policies to client employees, vendors, contractors, and others. The Cleared Armed Security Officer will maintain standards of Armed Security Officer competency, conduct, appearance, and integrity, including compliance with PGI and the Client's Code of Conduct and Uniform Policy Execute and deliver various reports assigned by the Site Manager Complete and maintain pre-assignment, client, State, and PGI sustainment training as directed. Assist in collateral duties, including but not limited to armory and security equipment maintenance tasks. Other duties as assigned. Required Qualifications: Must have a High School diploma or GED. A minimum of one (1) year of security, or one year of local, state, or federal law enforcement experience; or a minimum of two (2) years of honorable military service, active or reserve, in any branch of the US Armed Forces A minimum of 21 years of age Ability to complete an Ohio Security Guard License, including the application process, fingerprints, and background investigation. Ability to complete a firearms training course in compliance with the Ohio Security Guard License and conduct regularly scheduled sustainment training. Must have reliable transportation. Must fluently speak, read, comprehend, and write in English. Ability to pass a pre-employment drug screening and periodic random drug screening. U.S. Citizenship Required Security Clearance: Active Top Secret / Sensitive Compartmented Information Preferred Qualifications: Current Ohio Security Guard License Two (2) years of security, military, or law enforcement experience Demonstrated history of safe and successful security operations experience in highly secure facilities General working knowledge of the Lenel access control system Handgun weapons proficiency Physical Requirements: Must be able to bend at the waist and knees. Must have the physical ability to perform a variety of training functions. Ability to walk on uneven surfaces, walk long distances, climb stairs. Must be physically capable of standing a 12-hour post. Why PGI? 🏆 Voted #1 Best Place to Work - recognized for our culture of excellence and respect. 💰 Among the highest-paid security jobs in the U.S. ❤️ 100% Employer-Paid Medical and Life Insurance for Employees - because we take care of those who protect others. 🌎 Veteran-Owned and Operated - with operations in 50+ countries and a proven record in austere environments. Patriot Group International Inc. is a global mission support service provider with expeditionary capabilities, providing services to select clients within the intelligence, defense, and private sectors. PGI is a veteran-owned and operated company with experience performing in over 50 countries, including austere and high-threat environments. DISCLAIMER: Patriot Group International Inc. is proud to be an Affirmative Action/Equal Opportunity Employer. PGI provides equal employment opportunity for all persons in all facets of employment. PGI maintains a drug-free workplace and performs pre-employment substance abuse testing and background checks. If you are a qualified individual with a disability or a disabled veteran and need a reasonable accommodation to use or access our online system, please contact us on our home page. *************************************
    $23k-30k yearly est. Auto-Apply 34d ago
  • Director, Security Operations

    Cybersheath 3.7company rating

    Remote job

    CyberSheath Services International LLC is a rapidly growing Managed Services Provider primarily focused on providing Cybersecurity services to the Defense Industrial Base (DIB). We are excited to be expanding our staff due to our growth and are looking to add to our team! CyberSheath integrates compliance and threat mitigation efforts and eliminates redundant security practices that don't improve and, in fact, may weaken an organization's security posture. Our professionals tell clients where to stop spending, where to invest, and how to take what they are already doing and integrate it in a way that delivers improved security. Successful candidates for CyberSheath are self-motivated, think out of the box, work, and solve issues independently. Additionally, our most successful people are self-starters and willing to put on many hats in order to succeed. CyberSheath is fast-growing and seeks candidates who want to be part of our upward trajectory. Job Overview The Director of Security Operations will lead the operational security strategy, governance, and delivery functions for a managed service provider supporting a diverse client base. This role is accountable for overseeing the Security Operations Center (SOC), implementing incident detection and response capabilities, managing a security operations team, and ensuring compliance with client contractual obligations and industry regulations. The Director will collaborate with technology, compliance, and client-facing teams to align security operations with broader business objectives. Key Responsibilities Leadership & Strategy Develop and execute the overall vision for the Security Operations Center (SOC) in alignment with organizational goals and client requirements. Build, mentor, and lead a high-performing team of security analysts, engineers, and incident responders. Establish and maintain operational metrics, key performance indicators (KPIs), and service-level agreements (SLAs) to demonstrate effectiveness. Serve as the primary escalation point for severe security incidents across the client base. Operational Management Direct daily SOC activities including threat monitoring, incident detection, response, remediation, and forensic investigations. Oversee the development of runbooks, playbooks, and procedures for security incident handling. Coordinate with engineering teams on deployment and continuous improvement of security monitoring tools, SIEM, endpoint detection, and intrusion detection systems. Ensure consistent delivery of managed detection and response (MDR) and managed security services (MSS) to clients. Client & Stakeholder Engagement Act as the senior point of contact for clients on all security operations matters. Provide regular reporting, executive summaries, and recommendations on threat intelligence, vulnerabilities, and incident response posture. Support sales and account management by participating in prospective client meetings and articulating security capabilities. Ensure security deliverables and compliance obligations are met for each client contract. Risk & Compliance Oversee vulnerability management and coordinate with client IT teams on remediation efforts. Ensure alignment with frameworks like CMMC, NIST CSF, ISO 27001, CIS Controls, and relevant regulatory requirements (HIPAA, PCI DSS, GDPR, etc.). Partner with compliance and risk teams to ensure audit readiness and coordinate evidence collection. Continuously review and update security policies, procedures, and technologies to align with emerging threats. Innovation & Continuous Improvement Stay current on threat landscape trends and emerging technologies to ensure proactive defense posture. Introduce intelligence-driven improvements to incident response strategies and SOC operations. Champion automation and orchestration of operational workflows for efficiency and accuracy. Evaluate and recommend new security tools, services, and vendor solutions. Qualifications Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or related field (Master's preferred). 10+ years of progressive experience in cybersecurity, including at least 5 years in leadership roles. Proven experience managing security operations in a managed services or MSSP environment preferred. Strong understanding of SOC operations, SIEM platforms, endpoint protection, threat intelligence, and incident response workflows. Familiarity with cloud security operations (AWS, Azure, Google Cloud). Demonstrated success in building and leading diverse, distributed teams. Excellent communication skills with the ability to engage technical teams and executive stakeholders. Relevant certifications such as CISSP, CISM, GIAC, or equivalent. Key Competencies Strategic thinker with hands-on problem-solving abilities. Strong leadership and organizational skills. Ability to thrive in high-pressure, fast-paced environments. Exceptional client communication and relationship management. Continuous improvement mindset and passion for innovation. Work Environment A virtual work environment CyberSheath is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender identity, national origin, age, protected veteran status, among other things, or status as a qualified individual with a disability. Budgeted Pay Range$150,000-$180,000 USD
    $150k-180k yearly Auto-Apply 20h ago
  • Threat Analyst

    Halcyon 4.7company rating

    Remote job

    What we do: Halcyon is the industry's first dedicated, adaptive security platform that combines multiple proprietary advanced prevention engines along with AI models focused specifically on stopping ransomware. Who we are: Halcyon was formed in 2021 by a team of cyber industry veterans after battling the scourge of ransomware (and advanced threats) for years at some of the largest global security vendors. Comprised of leaders from Cylance (now Blackberry), Accuvant (now Optiv), Fireye and ISS X-Force (now IBM), Halcyon is focused on building products and solutions for mid-market and enterprise customers. As a remote-native, completely distributed global team, we recognize great talent can exist anywhere. We invite you to apply to a job you're interested in and we'll work a plan to meet your needs. The Role: Halcyon's mission is to empower our customers with a solution that defeats ransomware, makes "ransomware history", and ensures operational resilience. To support this mission, we are seeking a highly skilled Threat Analyst with deep technical expertise in malware reversing, detection engineering, and security operations. This role is critical to advancing our detection, prevention, and response capabilities, ensuring broad coverage of emerging threats, eliminating false positives, and effectively responding to these threats. The right candidate will ensure that our customers are kept safe from the latest ransomware without impacting legitimate business operations. Responsibilities Monitor and analyze security events to detect, investigate, contain, and escalate potential threats. Correlate data across multiple sources to identify malicious activity and patterns. Triage and assess events to determine impact, contain incidents, and drive threat remediation in a 24/7 security operations environment. Willingness to accommodate changing shift schedules when necessary to support our 24/7/365 team. Reverse engineer Windows PE files and other malicious binaries using static and dynamic techniques to uncover capabilities, persistence methods, and indicators of compromise (IOCs). Design, develop, and maintain internal tools to support threat triage, correlation, and research (log parsers, incident tracking systems, custom sandboxes, etc.). Conduct malware analysis in disassemblers, debuggers, and sandbox environments to understand payloads, infection chains, and evasion techniques. Research and track evolving ransomware techniques, publishing findings to improve detection logic and response processes. Collaborate closely with Customers, Incident Response, Engineering and Customer Success to improve product resilience and ensure smooth customer communication during security events. Skills and Qualifications 10+ years of combined experience in reverse engineering, detection engineering, threat research, incident response, or security operations related roles. High proficiency in malware reversing, with demonstrated expertise in analyzing Windows PE files, unpacking obfuscated samples, and extracting behavioral and static indicators. Experience with Artificial Intelligence / Machine Learning methodologies and their practical use cases to enhance cybersecurity strategies and operational efficiency. Hands-on experience with Yara, Python, and scripting languages (PowerShell, Bash/Shell, Batch). Advanced knowledge of static and dynamic analysis using tools such as IDA Pro, Ghidra, x64dbg, WinDbg, Cuckoo or similar sandboxes. Familiarity with EDR evasion techniques, persistence mechanisms, and exploitation methods. Cloud Service Provider experience preferred (cloud log analysis, security, threat hunting in cloud environments). Proven track record in cyber threat research, malware analysis, or security operations. Strong collaboration and communication skills, with the ability to explain technical findings to both technical and non-technical stakeholders. Benefits: Halcyon offers the following benefits to eligible employees: Comprehensive healthcare (medical, dental, and vision) with premiums paid in full for employees and dependents. 401k plan with a generous employer contribution. Short and long-term disability coverage, basic life and AD&D insurance plans. Medical and dependent care FSA options. Flexible PTO policy. Parental leave. Generous equity offering. The Company reserves the right to modify or change these benefits programs at any time, with or without notice. Base Salary Range: $175,000 - $200,000, 10% bonus, and equity. In accordance with applicable state and federal laws, the range provided is Halcyon's reasonable estimate of the base compensation for this role. The actual amount may differ based on non-discriminatory factors such as experience, knowledge, skills, abilities, and location. Base pay is one part of the total package that is provided to compensate and recognize employees for their work, and this role may be eligible for additional discretionary bonuses/incentives, and equity in the Company. We understand it takes a diverse team of highly intelligent, passionate, curious, and creative people to develop the exceptional product we are building. Our dynamic team has incredible perspectives to share, just as we know you do, and we take great pride in being an equal opportunity employer.
    $58k-90k yearly est. Auto-Apply 2d ago
  • Security Operations Vice President

    JPMC

    Westerville, OH

    Be part of a dynamic team where your distinctive skills will contribute to a winning culture and team. As a Security Operations Vice President in our global team of technologists and innovators, you will significantly impact our company, clients, and business partners worldwide. You'll guide a highly motivated team in analyzing, designing, developing, and delivering solutions to counter adversaries and enhance our operations. Your contributions will help identify internal threat indicators and prevent sensitive data loss using world-class tools and technology. Job responsibilities - Guide a highly motivated team motivated team in designing, configuring, and implementing Data Protection and DLP policies using Microsoft Information Protection (Microsoft Purview), Broadcom (Symantec) DLP, and Palo Alto DLP, both on-premises and in the cloud, utilizing CASB and Cloud Proxy at the enterprise level. Leverage your scripting skills in Python, PowerShell, and JavaScript to automate tasks and workflows, and use your API working knowledge to integrate various DLP solutions with SIEM, CASB and UEBA tools. Provide technical expertise to manage, configure, and optimize Palo Alto DLP, CASB, and Cloud Proxy solutions, Broadcom (Symantec) DLP, and Microsoft 365 Security Solutions while producing reports on program status and progress for senior management. Lead incident response, conduct risk reviews, assess policies, and identify new threat vectors, driving the development of new data identifiers, data governance policies, and standards to ensure compliance and data integrity. Use strong communication skills to present findings and solutions related to existing and emerging threats in the data loss prevention/internal threat arena to senior leaders and stakeholders. Collaborate with stakeholders and businesses to provide guidance on best practices, define data management requirements, and establish effective controls, practices, and procedures, delivering cost-effective strategic solutions that prioritize our clients. Assist in training and retaining talent and identify growth opportunities for junior team members for talent development. Required qualifications, capabilities, and skills - 7 or more years of cybersecurity operations or SOC related experience with 2 years as a technical lead with strong project management skills. Deep understanding of cybersecurity practices, Data Loss Prevention concepts, security incident triage, Insider Threat, and operations risk management processes, along with architectural requirements, engineering threats, vulnerabilities, and incident response methodologies. Proven experience in managing and configuring DLP and EDR solutions in large-scale enterprise environments, with expertise in Information Protection/Sensitivity Labels, Data Loss Prevention, Secure Browsers and Insider Risk/Threat Management. Proficient in scripting with PowerShell, Python, JavaScript and knowledgeable in regular expressions and APIs. Experience in developing and implementing new DLP or Insider Threat programs using tools like Palo Alto DLP, CASB, Microsoft Purview, Symantec DLP, Crowd Strike, Island Browser and Splunk or other SIEM tool. Excellent analytical and problem-solving skills, capable of translating complex technical concepts into practical solutions based on risk assessment and risk appetite. Preferred qualifications, capabilities and skills - Possess two or more of the following certifications - Microsoft Certified: Security, Compliance and Identity Fundamentals, Broadcom DLP Administrator, Palo Alto Networks Certified Network Security Administrator, Cybersecurity Architect Expert, Security Operations Analyst Associate, Azure Security Engineer, CISSP, Splunk Certified Power User Experience with Agile methodology and the ability to work with at least one of the common frameworks with knowledge of tools like Confluence, JIRA and ServiceNow. Ability to identify network attacks and systemic security issues as they relate to threats and vulnerabilities, with a focus on recommendations for enhancements or remediation based on in-depth risk assessment. Good understanding of national and international laws, regulations, policies and ethics related to financial industry cybersecurity and foundational knowledge of computer forensics; legal, government and jurisprudence as they relate to cybersecurity; operating systems; and methods for intelligence gathering and sharing.
    $103k-176k yearly est. Auto-Apply 60d+ ago
  • Cybersecurity Intern - Summer 2026

    Ijm

    Remote job

    Who We Are International Justice Mission (IJM) is the global leader in protecting vulnerable people from violence around the world. Our team of over 1,200 professionals are at work worldwide in over 30 offices. Together we are on a mission to rescue millions, protect half a billion, and make justice unstoppable. We are a global community that cares for one another. We believe that the way we work is as important as the results we achieve. We provide professional excellence with joy and celebration to all those we serve. The Need For over 25 years, IJM has pioneered the work to protect vulnerable people from violence. 9 out of 9 times in the last decade, IJM's Justice System Strengthening Projects have reduced slavery and violence between 50 and 85% for very large populations of people in poverty. As we grow to expand our impact to protect 500 million people from violence, we are seeking a Cybersecurity Intern to join the 2026 Summer Internship class. The Cybersecurity Intern will support various initiatives executed by the Cybersecurity team, who is responsible for design, implementation, and operation of technical controls across IJM's systems, applications, and platforms. The Cybersecurity Intern will learn IJM's security technology and work alongside security analysts in security operation, incident response, and remediation. Tasks may include: Daily support in global security operations; Conducting security reviews of new technology projects; Learn and operate various security solutions; Participating in departmental and general IJM administrative support. This position can be fully in-person or hybrid (onsite Tuesdays & Thursdays) in the Washington, DC area or remote for non-local candidates. It reports to the Director, Cybersecurity. The position requires 30-40 hours per week. Summer internship program dates are June 1 - Aug. 7, 2026. Application Deadline : Dec. 31, 2025. Candidate communication will begin in early January. General Qualifications and Required Skills Applicants must have completed at least two years of relevant undergraduate study. Experience in information technology and information security. Experience in cloud computing. Excellent written and verbal communication skills. Critical Qualities Mature orthodox Christian faith; Humble and resilient; Pursues excellence; Culturally aware and appreciative of difference; Strong service ethic; Innovative problem solver; Ability to build trust and strong partnerships with others; Courageous in pursuing opportunities and challenges; Tenacious in achieving goals; and Professional. Application Process: Upload Resume, Cover Letter & Statement of Faith* in one PDF document. *What is a statement of faith? A statement of faith should describe your Christian faith and how you see it as relevant to your involvement with IJM. The statement can either be incorporated into the cover letter or submitted as a separate document and should include, at a minimum, a description of your spiritual disciplines (prayer, study, etc.) and your current fellowship or place of worship. IJM holds strict safeguarding principles and a zero tolerance to violations of the Safeguarding Policy, Protection against Sexual Exploitation, Abuse and Harassment Policy, and Code of Ethics. Candidate selection is based on technical competence, recruitment, selection and hiring criteria subject to assessing the candidate's value congruence and thorough background, police clearance, and reference check processes. At IJM, we're committed to building a diverse workforce through fair and equitable employment practices. IJM encourages people of any race, color, age, sex, marital status or political ideology to apply for employment. While we welcome everyone into this work, we truly believe that the work we are doing is God's work, not our own, and practice spiritual disciplines together daily. That's why we legally require under SEC. 2000e-1 [Section702] of Title VII of the Civil Rights Act of 1964 that all employees practice a mature orthodox Christian faith, as defined by the Apostles' Creed. IJM requires a background check, police clearance and thorough review of references with an employment offer and/or employment contract. #LI-BR1 #LI-Hybrid #LI-Remote
    $29k-42k yearly est. Auto-Apply 36d ago
  • Cyber Operations Advisor | Remote, USA

    Optiv 4.8company rating

    Remote job

    will be fully remote and can be hired anywhere in the continental U.S._ _The Cyber Operations Advisor (COA) is a senior technical leader and strategic partner responsible for driving measurable security outcomes, operational maturity, and client value through data-driven insights._ _The_ _COA_ _combines deep cyber operations_ _expertise_ _with advisory capabilities to lead complex technical engagements across multiple client_ _s._ _This role focuses on metrics-driven performance, proactive risk management, and continuous improvement-defining, analyzing, and_ _optimizing_ _KPIs, SLAs, and service metrics to_ _demonstrate_ _value. Acting as a trusted advisor, the COA translates business requirements into actionable security strategies and collaborates with internal engineering and threat teams to implement corrective actions and systemic enhancements that elevate client satisfaction and operational efficiency._ _The_ _Cyber Operations Advisor believes and lives the Cyber Operations guiding principles:_ + Deliver quality security outcomes + Drive efficient and timely operations + Actualize continual improvement and innovation + Protect the customer **How** **you'll** **make an impact:** + Independently lead multiple technical engagements simultaneously, ensuring timely delivery of measurable security outcomes and operational improvements across client environments + Convert client business requirements into actionable technical strategies and capabilities that align with security objectives and deliver measurable value + Collaborate with internal teams and clients to design strategic roadmaps and execute plans that advance operational maturity and security posture + Drive service maturity by analyzing KPIs, KRIs, SLAs, and performance trends to deliver actionable insights and continuous value improvements + Evaluate and align security solutions and recommendations with client requirements, risk profiles, and strategic objectives to ensure optimal fit and effectiveness + Assist in the documentation of business requirements, use cases, and ROI analyses to support informed decision-making and demonstrate value + Act as a technical advisor during pre-sales and post-sales engagements, ensuring solution alignment and client confidence + Provide technical expertise for proposals, contracts, and service descriptions to ensure accuracy and alignment with client needs + Recognize and recommend cross-sell and up-sell opportunitiesacross AFC services + Lead or support security initiatives from planning through execution + Apply hands-on expertise to operationalize threat intelligence across EDR, SIEM, SOAR, and related domains, improving detection and response capabilities + Analyze patterns and anomalies to identify potential advanced threats and recommend proactive mitigation strategies + Conduct architectural reviews and provide recommendations to strengthen security,posture and operational efficiency + Assess and recommend custom detection logic, automation, or tool enhancements to address evolving threats and operational needs + Assist with platform configurations, detection logic, automation improvements + Build and develop relationships with internal and external stakeholders + Identify and assess project risks, developing mitigation strategies to ensure successful delivery and minimize impact + Validate project scope and deliverables to ensure alignment with client expectations and contractual obligations + Represent Optiv in client meetings, delivering clear technical guidance and executive-level communication + Collaborate with team members to identify issues, develop strategies, and drive continuous improvement + Provide support for projects spanning multiple functional groups by identifying collaborative opportunities, enhancing existing deliverables, and strengthening Optiv's value to our clients + Ensure projects are delivered on time, within budget, and to quality standards, meeting or exceeding client expectations **What** **we're** **hiring for:** + Bachelor's degree (or equivalent experience) and a minimum of 8 years in cybersecurity operations, with proven advisory and leadership responsibilities + Demonstrated success in leading client-facing engagements and managing strategic security programs in professional services or consulting settings + Advanced analytical skills with the ability to interpret complex data and translate insights into actionable security strategies + In-depth knowledge of SOC operations, threat analysis methodologies, risk assessment practices, and incident response frameworks + Hands on experience and in depth understanding of platform management processes including, but not limited to: EDR, Vuln Management, SIEM, SOAR, Identity, Network, and Perimeter tooling + Comprehensive understanding of NIST CSF, MITRE ATT&CK, and key regulatory frameworks such as PCI, SOC 2, and ISO 27001 + Senior-level security certifications preferred, such as CISSP, CISM, or GCIHGCIH, OSCP, (or equivalent) + Exceptional communication skills, including the ability to craft and deliver executive-level reports and compelling security narratives + Proven ability to establish trust and maintain strong relationships with senior client stakeholders and cross-functional internal teams + Expertise in cloud security across AWS, Azure, and GCP, with working knowledge of virtualization and containerization technologies + Working knowledge of project management methodologies (Agile, Scrum, PMI) and experience driving security initiatives + Familiarity with common Large Language Models and their impact on Security Operations + Preferred experience in security architecture, risk mitigation, disaster recovery planning, compliance testing, data loss prevention, and network security strategies, with familiarity in ITIL, COBIT, ISO standards, PCI, and SOX + Skilled in addressing client inquiries and resolving issues with professionalism and clarity + Proficient in creating presentations and technical content that adhere to organizational standards and effectively communicate complex concepts \#LI-TW1 \#LI-Remote **What you can expect from Optiv** + A company committed to championing Diversity, Equality, and Inclusion through our Employee Resource Groups (************************************************ . + Work/life balance + Professional training resources + Creative problem-solving and the ability to tackle unique, complex projects + Volunteer Opportunities. "Optiv Chips In" encourages employees to volunteer and engage with their teams and communities. + The ability and technology necessary to productively work remotely/from home (where applicable) **EEO Statement** Optiv is an equal opportunity employer. All qualified applicants for employment will be considered without regard to race, color, religion, sex, gender identity or expression, sexual orientation, pregnancy, age 40 and over, marital status, genetic information, national origin, status as an individual with a disability, military or veteran status, or any other basis protected by federal, state, or local law. Optiv respects your privacy. By providing your information through this page or applying for a job at Optiv, you acknowledge that Optiv will collect, use, and process your information, which may include personal information and sensitive personal information, in connection with Optiv's selection and recruitment activities. For additional details on how Optiv uses and protects your personal information in the application process, click here to view our Applicant Privacy Notice (************************************************** . If you sign up to receive notifications of job postings, you may unsubscribe at any time.
    $95k-136k yearly est. 44d ago
  • Senior Build/Release/CI Engineer

    Brave 3.7company rating

    Remote job

    Remote in Americas Brave is on a mission to protect the human right to privacy online. We've built a free web browser that blocks creepy ads and trackers by default, a private search engine with a truly independent index, a browser-native crypto wallet, and a private ad network (opt-in!) that directly rewards you for your attention. And we're just getting started. Already over 100 million people have switched to Brave for a faster, more private web. Millions more switch every year. The internet is a sea of ads, hackers, and echo chambers. Big Tech makes huge profits off our data, and tells us what's true and what's not. Brave is fighting back. Join us! Summary As a colleague (in a team of 7) your work will be around building and supporting the automation and processes that enable us to reach 100+ million users and scale 10x and beyond. We have hundreds of builds running every day for over 900 GitHub repositories (many open source) with languages like C++, Rust, Go, Python, JavaScript, Ruby, Kotlin, Bash/Shell, HCL and many more. We ship fast and on multiple desktop and mobile platforms, architectures and distribution channels. Multiple CI systems and acceleration/optimization techniques are used to build the right thing and the thing right. Our processes are light and we have no mandatory weekly meetings, 0 on-call, no need to be in an office (unless you really want to) and no strict core hours. Work is autonomous (collaborative at times), asynchronous, flexible. Requirements * TeamCity (Kotlin DSL) and Jenkins (Jenkins Job Builder, YAML) * Groovy, Bash/Shell, Kotlin, Python * build and release engineering, testing and reporting tools, packaging * extended and diverse operating system experience (Android, iOS, Linux, mac OS, Windows) * privacy and security * lead on best practices, PoCs and code and script for various initiatives which can include features in our browser, search engine or premium products - or totally new product lines (if interested) Nice to haves * browser or Chromium experience * gn ninja, siso, reclient, Remote Execution API, EngFlow * Terraform * app or web development * automated testing experience at scale * performance testing and tuning * security and quality scanning, supply chain, SAST/DAST * SecOps (Security Operations) Working at Brave * Industry-leader in privacy, with a research and engineering team that's innovating everyday to keep people safer online and beat Big Tech * Highly competitive salaries & benefits, and generous home-office stipends * Fully remote team, though we have offices and gatherings in a few locations around the world * Welcoming, humble, ridiculously smart teammates, and a truly flat org structure * Opportunity to get in early at a hyper-growth company, and revolutionize the web * Oh, and did we mention Brendan, our CEO & co-founder, invented JavaScript? Compensation depends on location and experience. No visa sponsorship provided. Check us out brave.com
    $108k-153k yearly est. Auto-Apply 8d ago
  • Technical Customer Success Manager

    Sumo Logic 4.4company rating

    Remote job

    Sumo Logic, Inc. empowers the people who power modern, digital business. Through its SaaS analytics platform, Sumo Logic enables customers to deliver reliable and secure cloud-native applications. Our platform observes, monitors, and secures modern digital business solutions. As a true cloud-native SaaS solution, you will be working on the cutting edge of cloud technology to deliver a world-class technical experience to our customers, thus enabling them to meet their business outcomes. We are seeking a highly skilled Technical Customer Success Manager. As a trusted customer advisor, Technical Customer Success Manager (CSM) not only help our customers understand best practices to maximize Sumo Logic's value, drive customer ROI and also delve deep into the technical nuances of our platform. You'll be hands-on, assisting customers in navigating the complexities of Sumo Logic and leading strategic growth through robust relationships with users and executives in partnership with the Sumo Logic account team. Your expertise in advanced training, complex problem-solving, and enabling technology adoption will be crucial. We support customers across various verticals with specialized needs in information security, DevSecOps, and observability and monitoring. This role offers the excitement of joining Sumo's team, which is renowned for tackling our customers' most intricate security and operational challenges. As a CSM, you'll have visibility up to the CEO level and engage with our executive team on strategic initiatives. Travel Requirements Flexible, but generally once or twice a quarter (10-25%) Customer Visits Corporate Visits for Training, mandatory meetings, etc. Responsibilities Advanced Technical Expertise: Hands-on keyboard experience and consultative skills. Strategic Adoption Drive: Facilitate training on advanced features and practices, aligning with the customer's specific usage of Sumo Logic. Customized Success Planning: Work closely with customers to understand their unique requirements and challenges, ensuring alignment with their expected business outcomes through a hands-on, consultative approach to build their adoption plan, then help them to achieve it and track progress. You'll keep an eye out for additional opportunities and work to expand the plan as they progress to maximize the value they get from SUMO Logic. Risk Mitigation and Planning: Ability to identify financial and adoption risks within an account and pull the team together to create a thorough plan to turn risky situations into an advocacy scenario Growth Strategy Development: Collaborate with the account team to formulate and implement strategies that balance customer needs with Sumo Logic's business growth. Proactive Monitoring and Support: Vigilantly monitor customer KPIs, proactively address deployment issues, and drive product roadmap suggestions from customer feedback. Executive Engagement: Conduct Quarterly Business Reviews and monthly health check calls, maintaining a proactive, strategic presence in the account team. Monitor and report on the overall well-being of customers, tracking essential health and usage indicators to reduce or eliminate churn risk Data Analysis: Ability to look at data and infer usage patterns Required Qualifications and Skills Extensive SaaS Experience: Proven track record in a technical role managing multiple customer accounts, preferably with a background in DevOps Engineering, SOC analysis, or similar technical positions. Customer-Centric Approach: Passionate about customer satisfaction and problem-solving. Relationship Management: Demonstrated ability in managing relationships across various levels, from technical practitioners to executives. Communication Excellence: Professional and clear communication skills, adept in both executive meetings and technical workshops. Ambiguity Navigation: Ability to work with uncertainty and proactively seek necessary support. Account Management Prowess: Demonstrable skills in managing multiple Accounts with a keen eye for detail. Familiar with Cyber Security frameworks and their applications in the secure DevOps Lifecycle Curiosity to learn about the customer base and curiosity to continue learning Desired Qualifications and Skills Monitoring Platform Experience: Proficiency in Sumo Logic or similar platforms (e.g., Splunk, Data Dog, Elastic, New Relic, Appdynamics, VMWare Tanzu). Cloud Services Knowledge: Hands-on experience with AWS, GCP, Azure, or other cloud services. Query Language Proficiency: SQL or similar query language skills. Security and Operations Background: Experience in monitoring and alerting in security, operations, or SecDevOps settings. Advanced Technologies: Kubernetes expertise (including HELM) and data analytics knowledge are highly advantageous. OSS skills in Otel, Prometheus, and Falco are a plus Sumo Logic experience is a big plus but not required About Us Sumo Logic, Inc. helps make the digital world secure, fast, and reliable by unifying critical security and operational data through its Intelligent Operations Platform. Built to address the increasing complexity of modern cybersecurity and cloud operations challenges, we empower digital teams to move from reaction to readiness-combining agentic AI-powered SIEM and log analytics into a single platform to detect, investigate, and resolve modern challenges. Customers around the world rely on Sumo Logic for trusted insights to protect against security threats, ensure reliability, and gain powerful insights into their digital environments. For more information, visit ****************** Sumo Logic Privacy Policy. Employees will be responsible for complying with applicable federal privacy laws and regulations, as well as organizational policies related to data protection. The expected annual base salary range for this position is $119,000 - $140,000. Compensation varies based on a variety of factors which include (but aren't limited to) role level, skills and competencies, qualifications, knowledge, location, and experience. In addition to base pay, certain roles are eligible to participate in our bonus or commission plans, as well as our benefits offerings, and equity awards. Must be authorized to work in the United States at time of hire and for duration of employment. At this time, we are not able to offer nonimmigrant visa sponsorship for this position.
    $119k-140k yearly Auto-Apply 12d ago
  • Threat Intelligence Lead

    Nuharborsecurity

    Remote job

    The Company Every day, NuHarbor Security improves the cybersecurity of our clients by making it stronger and easier to understand. Our comprehensive suite of security services, from strategic advising to 24-hour monitoring and management, provide an organizational view of security that is focused on results and recommendations that are valuable for both business and technical leaders. We're growing quickly because our clients, and the general market, are looking for these outcomes and for the data it gives them to explain, promote, and justify, their security investment and mission. The Role The Threat Intelligence Lead is critical in proactively searching for indicators of compromise (IOCs) and indicators of attack (IOAs) and actively hunting for threats not yet formally categorized by a threat actor. This position Operator is expected to collaborate with Detection Engineering teams to refine detection capabilities, identifying emerging threats and developing and implementing detection strategies and methodologies. The Operator also holds the critical role in directly working with Clients to provide feedback, recommendations, and provide remediation guidance as needed. What you'll do Live by the NuHarbor corporate values: Help Clients Win, Always Improve, Protect the House. Conduct client directed proactive investigations to identify cyber threats, advanced persistent threats, and anomalous activity within enterprise networks and endpoints. With a focus on client environments and desired outcomes, research new and existing threat actors and associated tactics, techniques, and procedures (TTPs); developing a detailed understanding of their potential impact on the client. Perform deep-dive analysis of suspected security incidents to determine impact, risk, and response actions. Lead and manage threat research initiatives to assess emerging threats and vulnerabilities, and correlate adversary activities, attack chains, and artifacts to provide threat intelligence that supports the timely detection of active threats. Identify and propose automated detections for new and previously unknown threats. Collaborate with NuHarbor internal and external Cyber organizations to mitigate risk by testing, deploying, and developing investigative playbooks. Produce and disseminate timely, actionable, and relevant threat intelligence to detection engineering to inform NHS' detection package based on relevant threats to NuHarbor's client base. Develop and deliver finalized threat intelligence to the SOC that directs intelligence-driven threat hunting efforts and convert results into actionable intelligence that can inform the adjustment of existing detections and the creation of new detections. Lead threat intelligence requirement development and intelligence delivery (tactical, operational, and strategic) across all applicable NuHarbor stakeholders. Lead the management, maintenance, and general administration of NuHarbor's threat intelligence tooling, infrastructure, Threat Intel Platform (TIP), threat feeds, and threat information sharing efforts. Work with Managed Services and Client Success to deliver high priority situational awareness/intelligence to the NuHarbor client based in response to emergent threats while collaborating with detection engineering to provide timely solutions. Act as a centralized point for threat hunters and red team to collaborate with when researching emerging threats that provide opportunities to address detection gaps. Your foundation. The requirements for this role: Bachelor's Degree and five (5) years of experience. Experience should be in a cybersecurity field and should include relevant industry certifications. In lieu of a degree, two (2) years of experience in a related technology field and relevant industry certifications are required. Two (2) or more years of experience in a threat analyst role. A minimum of two (2) years of experience with OSINT and threat hunting. A minimum of one (1) year of experience using Splunk and or other SIEM technologies. Demonstrated expertise in intelligence tradecraft, the intelligence lifecycle, common threat modeling frameworks: MITRE ATT&CK Diamond Model PEAK Cyber Kill Chain D3F3ND Experience using Threat Intelligence tools and processes necessary to collect information about adversary groups and cybercriminals that may target the NuHarbor Security client base. OpenCTI Shodan AbuseIPDB Ability to communicate complex security concepts to audiences of varied technical understanding, including business stakeholders, sales, engineering, and customers. Demonstrated understanding of networking concepts and architecture. Experience giving security recommendations and meeting with clients. Familiarity with network, system, and application layer attacks and mitigations. Maintain at least one (1) industry certification required to support the managed services (MS) Catalog. Security+ Network+ CeH CYSA+ Must be a citizen of the United States. Additional capabilities that will differentiate you for this role: Three (3) or more years of experience in a threat analyst role and/or with OSINT and threat hunting. Five (5) or more years of experience in a security analyst role. Two (2) years of Experience performing threat hunting across client accounts via Splunk, Microsoft Sentinel, or other SIEM Demonstrated experience with security controls and frameworks and the technologies that supply these controls: NIST Risk Management Framework/NIST Cyber Security Framework CIA Triad Identity and Access Management Encryption Incident Response Lifecycle Experience drafting threat intelligence portions of bi-weekly and quarterly reports. Maintains multiple industry certifications required to support the managed services (MS) Catalog. Security+ Network+ CeH CYSA+ Threat Intelligence Certifications: The GIAC Cyber Threat Intelligence (GCTI) The GIAC Defending Advanced Threats (GDAT) The GIAC Enterprise Incident Response (GEIR) Experience in engineering event detection & response tuning. Proven ability to implement simple, scalable, testable, and maintainable detections and code. Experience working in an Agile development process. Experience in Security Operations Center (SOC) content development and automation implementations. Base Salary for this role is targeted at $120,000 - $147,000 annually. *Salary based on Burlington, VT salary data. Offer is based on candidate geography. Additionally, this role is eligible for the company bonus plan at a 10% target. NuHarbor Security hires in the following states: AZ, CO, FL, GA, ID, IL, IN, IA, MA, MD, ME, MI, MN, MO, MT, NC, NE, NH, NJ, NY, OH, OR, PA, SC, TX, UT, VT, VA, WA The Rewards What you can expect: The engagement and support of company leadership who recognize the challenge of marketing a complex cybersecurity service in a chaotic market. An organization that recognizes and rewards employee commitment and contribution to our customers' satisfaction and success Growth in your career and capabilities as you help to chart a path to improving customer interactivity and service adoption. A collaborative and driven working environment in a rapidly growing company and market A fun and social working environment where you are encouraged to be your true self. You can also expect competitive salary and benefits, including paid time to give back in your community and generous PTO. We are purpose driven. We, as an organization, above anything else protect the house first and then help our customers win. If this sounds like the kind of organization you'd like to be a part of, we‘d like to hear from you. AAP/EEO Statement The Equal Employment Opportunity Policy of NuHarbor Security is to provide a fair and equal employment opportunity for all associates and job applicants regardless of race, color, religion, national origin, gender, sexual orientation, age, marital status or disability. NuHarbor Security hires and promotes individuals solely based on their qualifications for the job to be filled. NuHarbor Security believes that employees should be provided with a working environment which enables each associate to be productive and to work to the best of his or her ability. We do not condone or tolerate an atmosphere of intimidation or harassment based on race, color, religion, national origin, gender, sexual orientation, age, marital status, or disability. We expect and require the cooperation of all employees in maintaining a discrimination and harassment-free atmosphere.
    $120k-147k yearly Auto-Apply 7d ago
  • Senior Director, Enterprise IT and SecOps

    Quartz Bio 4.5company rating

    Remote job

    QuartzBio (************** ) is a Software-as-a-Service (SaaS) solutions provider to the life sciences industry. We deliver innovative, data enabling technologies (i.e., software) that provide biotech/pharma (R&D) teams with enterprise-level access to sample/biomarker data management solutions & analytics, information, insight & reporting capabilities. Our end-to-end (from sample collection to biomarker data) suite of solutions are focused on providing sponsors information (data with context) - we do this by connecting biospecimen, assay as well as clinical data sources in a secure and scalable cloud-based infrastructure, enabling seamless, automated data management workflows, key insight development, improved collaboration, and the ability to make faster, more informed decisions. Position Summary We are seeking a strategic and hands-on Senior Director to lead our Enterprise IT and Security Operations (SecOps) functions. This role is critical to ensuring the reliability, scalability, and security of our enterprise systems while supporting a fast-paced, innovation-driven startup environment. As a senior leader, you will define and execute the overall IT and security strategy, manage cross-functional teams, and drive operational excellence across infrastructure, cloud services, endpoint management, and cybersecurity. You will be responsible for building resilient systems, implementing best practices, and ensuring compliance with industry standards while enabling agility and innovation across the organization. The ideal candidate will bring deep technical expertise, a strong track record of leading enterprise IT and security teams, and a passion for building scalable, secure environments that empower business growth. You'll collaborate closely with engineering, product, and business stakeholders to ensure technology and security are aligned with strategic goals. Key Responsibilities Oversee, maintain, and implement core enterprise IT systems including email, virtual meeting platforms, document storage, and collaboration tools. Plan, oversee and support the execution of migrating enterprise IT systems from PMG Corporate IT tenants to QuartzBio specific IT tenants per migration plan. Evaluate existing systems and identify new technologies to enhance operational efficiency and user experience. Lead and mentor a hybrid Enterprise IT team composed of full-time employees and managed services vendors. Foster a culture of accountability, innovation, and continuous improvement. Identify, negotiate, and manage outsourcing partners to support Enterprise IT and SecOps operations. Ensure service level agreements (SLAs) and performance metrics are met. Collaborate with the Governance, Risk, and Compliance (GRC) team to support and maintain the company's compliance framework. Ensure IT systems and processes align with regulatory and internal standards. Oversee SecOps activities in partnership with the IT Security Analyst and managed services provider. Support virtual Chief Information Security Officer (vCISO) and virtual Data Protection Officer (vDPO) functions. Develop and maintain IT asset management and lifecycle processes. Establish and monitor KPIs to measure IT and security performance and user satisfaction. Develop and manage the IT budget, including forecasting and cost optimization strategies. Establish and maintain business continuity and disaster recovery plans. Serve as a strategic advisor to executive leadership on technology and security trends, risks, and opportunities. Lead change management initiatives related to enterprise IT and security implementations. Ensure seamless onboarding and offboarding processes from a systems and access perspective. Monitor emerging threats and proactively adjust security posture and tools. Champion user training and awareness programs for IT systems and cybersecurity best practices. Qualifications Bachelor's degree in a related field and a minimum of 18 years of relevant work experience in cloud/infrastructure technologies, information technology (IT) consulting/support, systems administration, network operations, software development/support, or technology solutions. Minimum of 10 years of experience in managing teams. 10 + years of experience working with internal stakeholders Proven success managing complex IT environments and security programs in high-growth or startup settings. Proven experience implementing and managing an O365 tenant across enterprise environments. Strong knowledge of cloud service providers, particularly AWS, networking, endpoint management, and cybersecurity frameworks. Demonstrated success in managing GRC and SecOps through third-party providers. Relevant certifications (e.g., CISSP, CISM, PMP) are a plus. Experience with compliance audits and risk assessments. Excellent leadership, communication, and vendor management skills. Proven executive leadership and strategic impact. Excellent problem-solving and analytical skills. Strong written and verbal communication skills. Skill in defining and collecting metrics to gauge project progression. Strong ability to develop a clear point of view supported by data and analysis and can sell ideas to others. Demonstrated leadership skills include selecting, retaining, and developing team leads and obtaining high-quality work from staff. Ability to manage geographically dispersed project teams. Preferred: Experience in the life sciences industry or regulated environments. Leadership expectations: Follow Company's Principles and code of ethics on a day-to-day basis. Provide a clear and compelling vision for the organization and be able to communicate effectively with their teams and stakeholders. Think strategically and develop plans and initiatives to achieve the organization's goals, while aligning them with the company's overall strategy. Ability to attract, develop, and retain top talent across multiple teams or functions, creating a culture of learning and growth, identifying skills gaps, and providing development opportunities. Lead change initiatives effectively, managing the impact of change on teams and individuals, and engaging stakeholders in the process. Communicate effectively with their teams, stakeholders, and other leaders in the organization, providing clear direction, feedback, and performance expectations. Possess high levels of emotional intelligence, including self-awareness, self-regulation, empathy, and social skills, to be effective leaders. Build and maintain strong relationships with their teams, stakeholders, and other leaders in the organization, fostering collaboration, innovation, and teamwork. Possess a strong executive presence, projecting confidence, credibility, and authority, and inspiring confidence in their teams and stakeholders. Make complex decisions that support the goals of the organization, taking into account the perspectives of all stakeholders and balancing competing priorities. Results-oriented, setting high standards for themselves and their teams, and holding individuals and teams accountable for achieving their goals. They should also be able to monitor progress and adjust strategies as needed to ensure success. Recognize and reward the contributions of their team members, creating a positive and supportive culture that values and celebrates success. Navigate cultural differences and work effectively with team members from diverse backgrounds, promoting inclusion and diversity within their team. Collaborate effectively with other leaders in the organization, working together to achieve shared goals and drive business success. #LI-Remote Precision is required by law in some states or cities to include a reasonable estimate of the compensation range for this role. This compensation range takes into account the wide range of factors that are considered in making compensation decisions including but not limited to: skill sets, experience and training, licensure and certifications, and other business and organizational needs. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. At Precision, it is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case. This role is also eligible for a discretionary annual bonus, health insurance, retirement savings benefits, life insurance and disability benefits, parental leave, and paid time off for sick leave and vacation, among other benefits.Reasonable estimate of the current range$203,200-$304,800 USD Any data provided as a part of this application will be stored in accordance with our Privacy Policy. For CA applicants, please also refer to our CA Privacy Notice. Precision Medicine Group is an Equal Opportunity Employer. Employment decisions are made without regard to race, color, age, religion, sex, sexual orientation, gender identity, national origin, disability, veteran status or other characteristics protected by law. If you are an individual with a disability and require a reasonable accommodation to complete any part of the application process or are limited in the ability or unable to access or use this online application process and need an alternative method for applying, you may contact Precision Medicine Group at **************************************. It has come to our attention that some individuals or organizations are reaching out to job seekers and posing as potential employers presenting enticing employment offers. We want to emphasize that these offers are not associated with our company and may be fraudulent in nature. Please note that our organization will not extend a job offer without prior communication with our recruiting team, hiring managers and a formal interview process.
    $203.2k-304.8k yearly Auto-Apply 23d ago
  • AI Security Subject Matter Expert (R-00084)

    True Zero Technologies

    Remote job

    True Zero Technologies, a veteran-owned small business, was founded on the principle that the purposeful enablement of people and technology in an organization directly ties to the quality of its outcomes. True Zero recognizes that said outcomes begin and end with our people, and that is what we have built, a community of like-minded, driven, and passionate individuals and innovators who are aligned in a common goal of delivering top tier services to our customers. In 2023, True Zero was recognized as a “Best Places to Work” in two categories ("Prosperous and Thriving" ($5MM - $50MM in gross revenue) and "Mid-Atlantic Region" (DC, DE, MD, NC, VA, WV)) and in 2022, was recognized as one of Inc. Magazine's Top 5000 Fastest Growing Companies. True Zero Technologies is looking for qualified candidates to fulfill the role of an AI Security SME Qualifications Looking to identify an AI security and Crowdstrike SME with a cyber focused background and be able to utilize Crowdstrike SOAR playbooks and Crowdstrike Agentic AI. Collaborate with AI developers to embed security at every stage of the AI development lifecycle, from design to deployment, to build secure-by-default solutions Ensuring AI systems and data usage adhere to regulatory and internal security standards Deep understanding of how AI and ML models work, including their unique vulnerabilities and attack vectors 3-5 years of implementing, managing, and expanding Crowdstrike and related use cases for customers in a variety of public sector and commercial customers. A deep understanding of cybersecurity principles, frameworks (e.g., NIST, CIS), and secure development life cycles (SSDLC) Bachelor's degree in Computer Science, Information Technology, Computer Engineering, or related discipline, and 5 years of experience performing IT deployments or in an end user/customer environment Deep understanding of software deployment technologies, and understanding of security operations, practices, and methodologies Highly knowledgeable on Windows, Mac, and Linux platforms Working knowledge of Microsoft Office applications, Word, Excel, Access, PowerPoint, etc. Good communication and collaboration skills Solid analytical/problem solving skills with capability to identify solutions to unusual and complex problems High level of motivation; self-starter; results driven Ability to travel as needed on-site to customers Additional skills and experience that are highly valued: Entrepreneurial Mindset & Business Acumen Demonstrated ability to identify market opportunities, build business cases, and drive new initiatives from concept to execution. Strong desire to eventually build and lead a company, with the ability to operate in high-ambiguity, fast-moving environments. Innovation Leadership & Emerging Tech Evangelism Passion for exploring and applying the latest advancements in AI, machine learning, and automation to solve the most pressing Cybersecurity challenges facing the United States. Track record of rapid experimentation, prototyping, and delivering proofs-of-concept using cutting-edge technologies and frameworks. Serve as primary engineering resource responsible for end-to-end integration and operational optimization. Strong background in Crowdstrike Falcon, EDR, ITP, and various other related modules Directly support and mature SOC capibilities Experience deploying and operating prominent enterprise EDR platforms such as Tanium, FireEye HX, Cylance, Carbon Black, Microsoft Defender, and SentinelOne in large and complex environments Knowledge of cloud platforms and technologies, such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP) Ability to gain secret clearance if needed Responsibilities Provide technical implementation, configuration, and troubleshooting assistance with the deployment of the CrowdStrike platform and associated applications Install CrowdStrike software both remotely and physically Investigate and understand emerging threats to AI systems, such as adversarial attacks (e.g., prompt injection), model poisoning, and data manipulation Utilize and engineer native and 3rd party software deployment technologies Develop scripts and processes around software deployment Strong understanding of how AI and Machine Learning models work, including their underlying algorithms and architecture Conduct adversarial testing and red teaming to simulate attacks on AI/LLM systems and evaluate their defenses Plan and report software deployment status Work closely and collaboratively with customer information technology teams Leveraging CrowdStrike applications (for example, but not limited to, Spotlight and Discover) provide support to customers in vulnerability and asset management Assist customers with the integration of CrowdStrike into existing tools Troubleshoot customer deployment issues across small to large enterprises Establish roadmap and iterative improvement of endpoint detection capabilities and tooling integrations and use of Crowdstrike with maturity model approach Identify opportunities to expand Crowdstrike and other tools to reduce security related enterprise risk Create, enhance, and continuously update documentation and knowledge base (e.g., user guides, quick starts, documentation, demos) Interview additional candidates applying to True Zero Technologies We're actively searching for talented security and technology practitioners who are ready to experience the True Zero difference. As a True Zero team member, you'll enjoy: - Competitive salary, paid twice per month- Best in class medical coverage- 100% of medical premiums covered by True Zero- Company wide new business incentive programs- Contribution Incentives (i.e. white papers, blog posts, internal webinars, etc.)- 3 weeks of PTO starting + 11 Paid Holidays Annually- 401k Program with 100% company match on the first 4%- Monthly reimbursement of Cell Phone and Home Internet costs- Paternity/Maternity Leave- Investment in training and certifications to broaden and deepen your technical skills
    $86k-124k yearly est. Auto-Apply 60d+ ago
  • IT Specialist (APPSW)

    Department of Defense

    Whitehall, OH

    Apply IT Specialist (APPSW) Department of Defense Defense Finance and Accounting Service Information & Technology Directorate, Payroll Services, ZTB Apply Print Share * * * * Save * This job is open to * Requirements * How you will be evaluated * Required documents * How to apply Summary * Who may apply: See Hiring Path * Applicants on Cleveland list may be placed in Bratenahl. * MUST SUCCESSFULLY COMPLETE COBOL (COMMON BUSINESS-ORIENTED LANGUAGE) AGENCY LED TRAINING * Upon entering the position, you will be required to complete DAU IBM COBOL Basics course at: ******************************************************* Content/ebb7c2c8-d4f1-5af7-8b06-72f641e893bc * This job announcement uses USA Hire Assessment to evaluate applicants. For more information, visit USA Hire Assessment. Summary * Who may apply: See Hiring Path * Applicants on Cleveland list may be placed in Bratenahl. * MUST SUCCESSFULLY COMPLETE COBOL (COMMON BUSINESS-ORIENTED LANGUAGE) AGENCY LED TRAINING * Upon entering the position, you will be required to complete DAU IBM COBOL Basics course at: ******************************************************* Content/ebb7c2c8-d4f1-5af7-8b06-72f641e893bc * This job announcement uses USA Hire Assessment to evaluate applicants. For more information, visit USA Hire Assessment. Overview Help Accepting applications Open & closing dates 12/15/2025 to 12/29/2025 Salary $47,547 to - $131,826 per year View Pay Tables: ******************************************************************* Pay scale & grade GS 5 - 12 Locations many vacancies in the following locations: Indianapolis, IN Limestone, ME Rome, NY Cleveland, OH Show morefewer locations (3) Whitehall, OH Texarkana, TX Alexandria, VA Remote job No Telework eligible No Travel Required Occasional travel - You may be expected to travel for this position. Relocation expenses reimbursed No Appointment type Temporary promotion - Not to Exceed 1 year Work schedule Full-time Service Competitive Promotion potential 12 Job family (Series) * 2210 Information Technology Management Supervisory status No Security clearance Other Drug test No Position sensitivity and risk Noncritical-Sensitive (NCS)/Moderate Risk Trust determination process * National security Financial disclosure No Bargaining unit status Yes Announcement number DFAS-ML-12848501-26 Control number 852361500 This job is open to Help Internal to an agency Current federal employees of the hiring agency that posted the job announcement. Clarification from the agency This announcement is open to current, permanent DFAS employees in the competitive service and current DFAS VRA employees and eligible DoD PPP Military Spouse preference applicants. Duties Help * This position is in a COBOL (COMMON BUSINESS-ORIENTED LANGUAGE) programming language training cadre. * Selected applicants will initially spend approximately 6 months learning COBOL (COMMON BUSINESS-ORIENTED LANGUAGE) and related software development disciplines. Then 6 months on the job practical experience. * Additional disciplines may include, but are not limited to, Job Control Language (JCL), Customer Information Control System (CICS), IBM DbB2, Integrated Data Management System (IDMS), Agile, DevSecOps (Development, Security, Operations). * Supports a team of software engineers engaged in program analysis, design, development, testing, implementation, and documentation for major accounting and finance systems. * Duties will be developmental in nature when the position is filled below the full performance level. Requirements Help Conditions of employment * Must be a U.S Citizen or National * This national security position, which may require access to classified information, requires a favorable suitability review and security clearance as a condition of employment. Failure to maintain security eligibility may result in termination. * Registered for Selective Service (males born after 12-31-1959) * Suitable for Federal employment * Time after Competitive Appointment: Candidates must have served 3 months after latest competitive appointment in the Federal service. * Time in Grade Requirement - see the Qualifications field below for more details. * In accordance with the DoD 8140 policy series, the position may be subject to completing Foundational Qualifications within 9 months and completing Residential Qualification requirements within 12 months. * MUST SUCCESSFULLY COMPLETE COBOL (COMMON BUSINESS-ORIENTED LANGUAGE) AGENCY LED TRAINING * ADDITIONALLY, upon entering the position, you will be required to successfully complete DAU IBM COBOL Basics course at: ******************************************************* Content/ebb7c2c8-d4f1-5af7-8b06-72f641e893bc Qualifications ESSAY SELECTION REQUIREMENT: * In addition to OPM qualifications stated below, management requests submission of an essay, approximately 500 words long, highlighting your information technology background and experience. * Essay content should include: Why are you interested in participating in this COBOL training program and how do you think it would help DFAS achieve its mission 'to be a valued partner in financial management by delivering first class services and products'? * You MUST submit this essay in order to be selected. * Essays should be submitted as an additional attachment in your application package, at the time of application. FOR ENTRY AT GS-05 THROUGH GS-11 Basic Requirement: Applicants must have IT-related experience demonstrating the following competencies appropriate to, or above, the level of this position. Your resume and work experience should clearly support your ability to meet these competencies and will be evaluated as part of the entire application process. * Attention to Detail- experience reviewing my own information technology-related work or data to ensure accuracy, completeness, and consistency with standards. My work or the data that I produce is typically reviewed by my supervisor or another colleague * Customer Service- experience having brief contact with customers to provide information about available information technology products and services and providing customers with standard products or routine services to address information technology needs * Oral Communication- experience informing my supervisor and other IT staff of the status of information technology systems, projects, or daily operations, including the status of information technology systems, projects, or daily operations, including the communication of basic technical information to a non-technical audience * Problem Solving- identifying or selecting from a number of alternatives to address routine information technology-related issues by gathering and applying information from standard sources that provide a limited number of solutions IN ADDITION TO THE BASIC REQUIREMENTS LISTED ABOVE for GS-05, 07, 09, 11: For Entry at GS-05 Level: One year of specialized experience equivalent in level of difficulty and responsibility to that of the next lower grade in the federal service (GS-04), which demonstrates the ability to perform the duties of the position, is required. Specialized experience is defined as: Performing routine tasks involving basic information system work, such as making minor adjustments or examining system parts. With guidance, planning the steps needed to finish tasks. For Entry at GS-07 Level: One year of specialized experience equivalent in level of difficulty and responsibility to that of the next lower grade in the federal service (GS-05), which demonstrates the ability to perform the duties of the position, is required. Specialized experience is defined as: Carrying out assignments consisting of tasks, such as minor modifications to parts of an information system; analysis of the interrelationships of pertinent components of the system; planning the sequence of actions necessary to accomplish the assignment. For Entry at GS-09 Level: One year of specialized experience equivalent in level of difficulty and responsibility to that of the next lower grade in the federal service (GS-07), which demonstrates the ability to perform the duties of the position, is required. Specialized experience is defined as: Carrying out assignments consisting of tasks, such as minor modifications to parts of an information system; analysis of the interrelationships of pertinent components of the system; planning the sequence of actions necessary to accomplish the assignment; and personal responsibility for at least a segment of the overall project. For Entry at GS-11 Level: One year of specialized experience equivalent in level of difficulty and responsibility to that of the next lower grade in the federal service (GS-09), which demonstrates the ability to perform the duties of the position, is required. Specialized experience is defined as: Accomplishment of computer project assignments that required a range of techniques such as developing modifications to parts of an information system; planning the sequence of actions necessary to accomplish the assignment; adaptation of guidelines or precedents to the needs of the assignment. FOR ENTRY AT GS-12 Basic Requirement: Applicants must have IT-related experience demonstrating the following competencies appropriate to, or above, the level of this position. Your resume and work experience should clearly support your ability to meet these competencies and will be evaluated as part of the entire application process. * Attention to Detail- experience reviewing my own information technology-related work or data and have been asked by others to review their work or data to ensure accuracy, completeness, and consistency with standards * Customer Service- experience maintaining relationships with customers, assessing current information technology needs of customers, and developing or identifying information technology products and services that are tailored to meet customer needs * Oral Communication- briefing mid-level management and IT staff on the status of information technology systems, projects, or daily operations, including the communication of technical information to a non-technical audience * Problem Solving- identifying alternatives to address complex information technology-related issues by gathering and applying information from a variety of sources that provide a number of potential solutions IN ADDITION TO THE BASIC REQUIREMENTS LISTED ABOVE for GS-12: For Entry at GS-12 Level: One year of specialized experience equivalent in level of difficulty and responsibility to that of the next lower grade in the federal service (GS-11), which demonstrates the ability to perform the duties of the position, is required. Specialized experience is defined as: Accomplishment of computer project assignments that required a range of techniques; conducting analyses and recommending resolutions of issues; identifying and defining business or technical requirements applied to the design, development, implementation, integration, configuration, testing, and support of software or information systems. Position is developmental. Selections may be made at the GS-05, GS-07, GS-09, GS-11, GS-12 grade levels. Once eligibility and qualification requirements are met, selectees will be eligible for promotion at management discretion to the GS-07, GS-09, GS-11, GS-12 grade levels without further competition. You may qualify for consideration if meeting time-in grade, specialized experience, education requirement, 90 calendar days after competitive appointment requirement, and all other qualification requirements within 30 calendar days after the closing date of the announcement. Current or former federal employees who have held a GS position in the preceding 52 weeks, must meet the time in grade requirement. Time-in-Grade for GS-05: Is not required at GS-05. Time-in-Grade for GS-07: Applicant must have served 52 weeks as a GS-05 or higher grade in Federal Service. Time-in-Grade for GS-09: Applicant must have served 52 weeks as a GS-07 or higher grade in Federal Service. Time-in-Grade for GS-11: Applicant must have served 52 weeks as a GS-09 or higher grade in Federal Service. Time-in-Grade for GS-12: Applicant must have served 52 weeks as a GS-11 or higher grade in Federal Service. The effective date of your SF-50 must reflect you will meet the 52-week time in grade requirement within 30 calendar days of the announcement closing. Education Substitution of Education for Experience: For Entry at the GS-05: Bachelor's Degree or higher in computer science, engineering, information science, information systems management, mathematics, operations research, statistics, or technology management or degree that provided a minimum of 24 semester hours in one or more of the fields identified above and required the development or adaptation of applications, systems or networks. For Entry at the GS-07: One year of graduate education in computer science, engineering, info science, info systems management, mathematics, operations research, statistics, or tech management; or a bachelor's degree with superior academic achievement (S.A.A) that provided a minimum 24 semester hours in one or more of the fields above and required the development or adaptation of applications, systems or networks, may be substituted to meet the specialized experience requirement. S.A.A. is based on (1) class standing, (2) grade-point average, or (3) honor society membership. For Entry at the GS-09: Qualifying Master's degree or equivalent graduate degree or 2 full years of graduate education leading to a Master's degree or equivalent graduate degree in computer science, engineering, info science, info systems management, mathematics, operations research, statistics, or tech management or degree that provided a minimum of 24 semester hours in one or more of the fields identified above & required the development or adaptation of applications, systems or networks. For Entry at the GS-11: Ph.D. or equivalent doctoral degree or 3 full years of graduate education leading to a Ph.D. or equivalent doctoral degree in computer science, engineering, info science, info systems management, mathematics, operations research, statistics, or tech management or degree that provided a minimum of 24 semester hours in one or more of the fields identified above & required the development or adaptation of applications, systems or networks. For Entry at the GS-12: Education is not substitutable for specialized experience at the GS-12 grade level. Combination of education and experience is not applicable for this Job Series. YOU MUST SUBMIT TRANSCRIPTS IF YOU ARE SUBSITUTING EDUCATION FOR EXPERIENCE IN ORDER TO BE CONSIDERED. Additional information * For some positions, the temporary promotion may be made permanent without further competition, or, return to your former grade may be effected at anytime without adverse action procedures. * MUST SUCCESSFULLY COMPLETE COBOL (COMMON BUSINESS-ORIENTED LANGUAGE) AGENCY LED TRAINING TO REMAIN IN THE POSITION. * Upon entering the position, you will be required to successfully complete DAU IBM COBOL Basics course at: ******************************************************* Content/ebb7c2c8-d4f1-5af7-8b06-72f641e893bc * This job announcement uses the USA Hire Assessment to evaluate applicants. For more information, visit USA Hire Assessment. * For Reasonable Accommodation Requests, see the How You Will Be Evaluated section. * Moving expenses will not be paid. * The Tax Cuts and Jobs Act of 2017 makes certain reimbursements/payments taxable. For information on these changes and the Relocation Income Tax Allowance (RITA), for which some appointees are eligible, click here. * For positions where relocation is paid (see Location block of vacancy announcement), you can learn more about relocation allowances and entitlements. * Telework availability is limited and will only be provided on a rare case-by-case basis during situations where Agency Leadership has determined that telework serves a compelling DoD need. * Selections are subject to restrictions resulting from the DoD Program for Stability of Civilian Employment. * As a condition of employment, you may be required to serve a 1 year during which we'll evaluate whether your continued employment advances the public interest. The evaluation will consider: your performance and conduct; the needs and interests of the agency; whether your continued employment advances agency or governmental goals; and whether your continued employment advances the efficiency of the Federal service. At the end of the probationary period, your employment will be terminated unless you receive certification that your continued employment advances the public interest. * We may use this announcement to fill additional vacancies within 120 days of the closing date. * This position is Non Exempt at the GS-05, GS-07 and GS-09 levels and Exempt at the GS-11 and GS-12 levels from the Fair Labor Standards Act. * Priority Placement Program (PPP) Military Spouse Preference (MSP) eligible candidates will receive priority consideration at the highest grade level for which they have applied and been determined best qualified up to and including the full performance level. * Retired Civil Service Employee: Employment of retired Federal employees receiving an annuity is subject to the requirements of the Department of Defense (DoD) policy guidance. (See DoD Instruction 1400.25, Volume 300, here. * The Security Designation varies dependent upon position and may require a secret clearance or higher. Employment requires a background investigation which may delay starting date. If selected and cannot obtain a favorable security determination within a reasonable period of time, the employment offer may be withdrawn. Individuals are required to obtain/maintain a favorable security determination to occupy a sensitive position as a condition of employment. Failure to maintain eligibility to occupy a sensitive position may result in termination. For more information see the security section of Understanding Vacancy Announcements. Expand Hide additional information Candidates should be committed to improving the efficiency of the Federal government, passionate about the ideals of our American republic, and committed to upholding the rule of law and the United States Constitution. Benefits Help A career with the U.S. government provides employees with a comprehensive benefits package. As a federal employee, you and your family will have access to a range of benefits that are designed to make your federal career very rewarding. Opens in a new window Learn more about federal benefits. Review our benefits Eligibility for benefits depends on the type of position you hold and whether your position is full-time, part-time or intermittent. Contact the hiring agency for more information on the specific benefits offered. How you will be evaluated You will be evaluated for this job based on how well you meet the qualifications above. IMPORTANT NOTE - YOU MUST FOLLOW ALL APPLICATION INSTRUCTIONS CAREFULLY. ERRORS OR OMISSIONS MAY AFFECT YOUR RATING. You will be evaluated based on how well you meet the qualifications listed in this vacancy announcement. Your qualifications will be evaluated based on your application materials (e.g., resume, supporting documents), your responses on the application and your responses to all assessments required for this position. You will be assessed on the following competencies (knowledge, skills, abilities, and other characteristics): * Accountability * Attention to Detail * Customer Service * Decision Making * Flexibility * Influencing/Negotiating * Integrity/Honesty * Interpersonal Skills * Learning * Reading Comprehension * Reasoning * Self-Management * Stress Tolerance * Teamwork Reasonable Accommodation (RA) Requests: If you believe you have a disability (i.e., physical or mental), covered by the Rehabilitation Act of 1973 as amended that would interfere with completing the USA Hire Competency Based Assessments, you will be granted the opportunity to request a RA in your online application. Requests for RA for the USA Hire Competency Based Assessments and appropriate supporting documentation for RA must be received prior to starting the USA Hire Competency Based Assessments. Decisions on requests for RA are made on a case-by-case basis. If you meet the minimum qualifications of the position, after notification of the adjudication of your request, you will receive an email invitation to complete the USA Hire Competency Based Assessments, based on your adjudication decision. You must complete all assessments within 48 hours of receiving the URL to access the USA Hire Competency Based Assessments, if you received the link after the close of the announcement. To determine if you need a RA, please review the Procedures for Requesting a Reasonable Accommodation for Online Assessments. Benefits Help A career with the U.S. government provides employees with a comprehensive benefits package. As a federal employee, you and your family will have access to a range of benefits that are designed to make your federal career very rewarding. Opens in a new window Learn more about federal benefits. Review our benefits Eligibility for benefits depends on the type of position you hold and whether your position is full-time, part-time or intermittent. Contact the hiring agency for more information on the specific benefits offered. Required documents Required Documents Help You must provide a complete Application Package which includes: 1. Resume: A two-page maximum resume is required. Applicant guidance on the two-page resume requirement may be found at OPM.gov or at USAJ Resource Center. 2. Complete initial Eligibility Questionnaire: Your resume must demonstrate the quality of your work as it relates to the experience requirements outlined in the job announcement. 3. Other Supporting Documents (including essay). 4. If you are requesting a reasonable accommodation to the USA Hire Competency Based Assessments, submit documentation to support your request, including the Reasonable Accommodation Request Form found here. The following supporting documents are ONLY required if applicable to your personal qualifications or status. They must be received by the closing date of the announcement. 1. Transcripts and/or Certifications: You must submit documentation if you are substituting education for experience. For additional information on acceptable documents or to see if you must submit documentation click here Transcripts and Certifications. You must also document your education and/or certifications in your resume. 2. SF-50: Current and former federal employees, including current and former DFAS employees, must submit their SF-50 (Notification of Personnel Action) reflecting their highest grade held on a permanent basis for at least 52 weeks, tenure, and appointment type. Failure to provide this document may result in disqualification. 3. Veterans Documentation: Click to review these authorities and documents verifying eligibility for a VEOA, VRA and/or 30% or more disabled veterans hiring authorities. 4. Military Spouse Preference (MSP) Eligible: Military Spouse Preference applicants, must be selected and placed at the highest grade level for which they have applied and been determined best qualified up to and including the full performance level. You must include a completed copy of the Military Spouse PPP Self-Certification Checklist dated within 30 days along with the documents identified on the checklist to verify your eligibility for Military Spouse Preference. To download the checklist, select "Save" or "Save As" instead of "Open." Save the document to your device then open it as a PDF. Once the form is opened, select "Enable All Features" and the form will populate so that it can be completed. ************************************************************** 5. Military Reserve (MR) and National Guard (NG) Technicians PPP Eligible: MR and NG technicians PPP applicants must be selected and placed at the full performance level if determined well qualified. You must include a completed copy of the Military Reserve and National Guard Technician PPP Self-Certification Checklist to verify your eligibility for Military Reserve and National Guard Technician preference. Click here to obtain a copy of the Military Reserve and National Guard Technician PPP Self-Certification Checklist. 6. Military Reserve (MR) and National Guard (NG) Technicians Receiving Disability Retirement PPP Eligible: MR and NG technicians receiving disability retirement PPP applicants must be selected and placed at the full performance level if determined well qualified. You must include a completed copy of the Military Reserve and National Guard Technician Disability PPP Self-Certification Checklist to verify your eligibility for Military Reserve and National Guard Technician Disability preference. Click here to obtain a copy of the Military Reserve and National Guard Technician Disability PPP Self-Certification Checklist. 7. Retained Grade PPP Eligible: Retained Grade PPP applicants, must be selected and placed at the full performance level if determined well qualified. You must include a completed copy of the Retained Grade PPP Self-Certification Checklist to verify your eligibility for Retained Grade preference. Click here to obtain a copy of the Retained Grade PPP Self-Certification Checklist. 8. ICTAP Eligibles: A copy of the RIF separation notice and SF-50 if available. 9. Other Special Hiring Authorities: Click here to review these authorities and the documentation you are required to submit. 10. You may submit a cover letter which will be forwarded to the selecting official with your resume. Your cover letter will not be used to verify your qualifications or eligibility. WARNING: Failure to submit a complete application package including any required documentation by 11:59 PM (EST) 12/29/2025, or at the time of application for announcements with an extended closing date, may result in an ineligible rating and loss of consideration. To verify that your application is complete, log into your USAJOBS account, select Application Status and More Information. The Details page will display the status of your application. It is the applicant's responsibility to verify that information entered, uploaded, or faxed is received, legible and accurate. HR will not modify answers submitted by an applicant. How to Apply Help The following link will help you determine if you meet the eligibility to apply for this position: *************************************************************************************** PLEASE NOTE: You will be considered only for those appointment eligibilities for which you select, attach supporting documentation and are found eligible. Please read the entire announcement and all the instructions before you begin an application. To apply and be considered for this position, you must complete all required assessments, and required documentation as specified in the How to Apply and Required Documents section. The complete application package must be submitted by 11:59 PM (ET) on the closing date of the announcement to receive consideration. The application process is as follows: * Click the Apply Online button. * Answer the questions presented in the application and attach all necessary supporting documentation. * Click the Submit Application button prior to 11:59 PM (ET) on the announcement closing date. * If you are required to complete any USA Hire Assessments, you will be notified after submitting your application. The notification will be provided in your application submission screen and via email. The notification will include your unique assessment access link to the USA Hire system and the completion deadline. Additionally, in USAJOBS you can click "Track this application" to return to your assessment completion notice. * Access USA Hire using your unique assessment link. Access is granted through your USAJOBS login credentials. * Review all instructions prior to beginning your assessments. You will have the opportunity to request a testing accommodation before beginning the assessments should you have a disability covered under the Rehabilitation Act of 1973 as amended. * Set aside at least 3 hours to take the USA Hire assessments; however, most applicants complete the assessments in less time. If you need to stop the assessments and continue later, you can re-use your unique assessment link. * Your responses to the USA Hire Assessments will be reused for one year (in most cases) from the date you complete an assessment. If future applications you submit require completion of the same assessments, your responses will be automatically reused. Visit the USA Hire Applicant Resource Center for practice assessments and assessment preparation resources at **************************************** To update your application, including supporting documentation: During the announcement open period, return to your USAJOBS account, find your application record, and click Edit my application. This option will no longer be available once the announcement has closed. To view the announcement status or your application status: Click on this: ******************************************************** Your application status page is where you can view your application status, USA Hire assessment completion status, and review your notifications sent by the hiring agency regarding your application. Agency contact information HR Customer Care Center Phone ************** Email ************************************************ Address DFAS - INFO AND TECHNOLOGY DIR OFFICE 4800 Mark Center Drive Alexandria, VA 22350 US Next steps The resume you submit will be used to assess your qualifications for the job and to identify the best-qualified applicants to be referred to the hiring manager for further consideration and possible interviews. We will notify you of the outcome after each of these steps is completed. After making a tentative job offer, we will conduct a suitability/security background investigation. Fair and transparent The Federal hiring process is set up to be fair and transparent. Please read the following guidance. Criminal history inquiries Equal Employment Opportunity (EEO) Policy Financial suitability New employee probationary period Privacy Act Reasonable accommodation policy Selective Service Signature and false statements Social security number request Required Documents Help You must provide a complete Application Package which includes: 1. Resume: A two-page maximum resume is required. Applicant guidance on the two-page resume requirement may be found at OPM.gov or at USAJ Resource Center. 2. Complete initial Eligibility Questionnaire: Your resume must demonstrate the quality of your work as it relates to the experience requirements outlined in the job announcement. 3. Other Supporting Documents (including essay). 4. If you are requesting a reasonable accommodation to the USA Hire Competency Based Assessments, submit documentation to support your request, including the Reasonable Accommodation Request Form found here. The following supporting documents are ONLY required if applicable to your personal qualifications or status. They must be received by the closing date of the announcement. 1. Transcripts and/or Certifications: You must submit documentation if you are substituting education for experience. For additional information on acceptable documents or to see if you must submit documentation click here Transcripts and Certifications. You must also document your education and/or certifications in your resume. 2. SF-50: Current and former federal employees, including current and former DFAS employees, must submit their SF-50 (Notification of Personnel Action) reflecting their highest grade held on a permanent basis for at least 52 weeks, tenure, and appointment type. Failure to provide this document may result in disqualification. 3. Veterans Documentation: Click to review these authorities and documents verifying eligibility for a VEOA, VRA and/or 30% or more disabled veterans hiring authorities. 4. Military Spouse Preference (MSP) Eligible: Military Spouse Preference applicants, must be selected and placed at the highest grade level for which they have applied and been determined best qualified up to and including the full performance level. You must include a completed copy of the Military Spouse PPP Self-Certification Checklist dated within 30 days along with the documents identified on the checklist to verify your eligibility for Military Spouse Preference. To download the checklist, select "Save" or "Save As" instead of "Open." Save the document to your device then open it as a PDF. Once the form is opened, select "Enable All Features" and the form will populate so that it can be completed. ************************************************************** 5. Military Reserve (MR) and National Guard (NG) Technicians PPP Eligible: MR and NG technicians PPP applicants must be selected and placed at the full performance level if determined well qualified. You must include a completed copy of the Military Reserve and National Guard Technician PPP Self-Certification Checklist to verify your eligibility for Military Reserve and National Guard Technician preference. Click here to obtain a copy of the Military Reserve and National Guard Technician PPP Self-Certification Checklist. 6. Military Reserve (MR) and National Guard (NG) Technicians Receiving Disability Retirement PPP Eligible: MR and NG technicians receiving disability retirement PPP applicants must be selected and placed at the full performance level if determined well qualified. You must include a completed copy of the Military Reserve and National Guard Technician Disability PPP Self-Certification Checklist to verify your eligibility for Military Reserve and National Guard Technician Disability preference. Click here to obtain a copy of the Military Reserve and National Guard Technician Disability PPP Self-Certification Checklist. 7. Retained Grade PPP Eligible: Retained Grade PPP applicants, must be selected and placed at the full performance level if determined well qualified. You must include a completed copy of the Retained Grade PPP Self-Certification Checklist to verify your eligibility for Retained Grade preference. Click here to obtain a copy of the Retained Grade PPP Self-Certification Checklist. 8. ICTAP Eligibles: A copy of the RIF separation notice and SF-50 if available. 9. Other Special Hiring Authorities: Click here to review these authorities and the documentation you are required to submit. 10. You may submit a cover letter which will be forwarded to the selecting official with your resume. Your cover letter will not be used to verify your qualifications or eligibility. WARNING: Failure to submit a complete application package including any required documentation by 11:59 PM (EST) 12/29/2025, or at the time of application for announcements with an extended closing date, may result in an ineligible rating and loss of consideration. To verify that your application is complete, log into your USAJOBS account, select Application Status and More Information. The Details page will display the status of your application. It is the applicant's responsibility to verify that information entered, uploaded, or faxed is received, legible and accurate. HR will not modify answers submitted by an applicant.
    $47.5k-131.8k yearly 2d ago
  • Proposal Manager

    Ultraviolet Cyber

    Remote job

    Make a difference here. UltraViolet Cyber is a leading platform-enabled unified security operations company providing a comprehensive suite of security operations solutions. Founded and operated by security practitioners with decades of experience, the UltraViolet Cyber security-as-code platform combines technology innovation and human expertise to make advanced real-time cybersecurity accessible for all organizations by eliminating risks of separate red and blue teams. By creating continuously optimized identification, detection, and resilience from today's dynamic threat landscape, UltraViolet Cyber provides both managed and custom-tailored unified security operations solutions to the Fortune 500, Federal Government, and Commercial clients. UltraViolet Cyber is headquartered in McLean, Virginia, with global offices across the U.S. and in India. The Proposal Manager will work report directly to the Chief of Revenue Operations (CRO), as well as partnering with the SVP of Federal Operations to ensure Federal and Commercial proposals are submitted for MSSP pursuits. The Proposal Manager will be successful by developing personal and professional relationships with sales, recruiting, business operations, and executive leadership in our Global environment as a key piece to how we deliver Cybersecurity Services to our customers.What You'll Do: Assist proposal team in preparation of meaningful text and graphics Develop Proposal outlines, Proposal Workbook, Color Team Reviews, schedules, and working with other team members to meet deadlines and schedule Maintain boilerplate folders and documents, including the ability to differentiate between boilerplate and customized language Responsible for proposal status reporting Organize, create, and facilitate briefings and templates for all meetings associated with proposal and capture activities Leading the management of our proposal content library Producing standard proposals and supporting proposal managers in the development of larger/strategic proposals Providing graphics support for proposals and presentations Working closely with project managers to deliver a proposal that addresses all required criteria outlined in an RFP Conducting or participating in Request for Proposal (“RFP”) strategy sessions Maintaining information systems, including the marketing database, master resumes, project descriptions, and boilerplate content Drafting proposals and overseeing proposal production Collaborating with proposal coordinators firmwide on best practices Assisting in identifying firms for teaming/partnering Completing forms and documentation required by an RFP/RFQ What Skills You Bring: Familiarity with MSSP contracting in the Federal and Commercial markets preferred Experience & knowledge of cybersecurity and IT services proposals Experience RFP, RFI, RFQ reading and writing Business relationships in the Federal contracting arena with experience coordinating and writing proposals Excellent writing abilities with the ability to craft clear and compelling content Highly proficient in MS Office Suite, Adobe InDesign, and Illustrator, and working knowledge of other Adobe applications Must have strong knowledge of Microsoft Office Suite (Outlook, Word, Excel, PowerPoint, Visio) Must be production and detail-oriented with strong project management skills Technical writing/editing experience Must be a strong team player with the ability to work independently Dependable, patient, and trustworthy, proactive and creative Must possess strong organizational and time management skills to meet hard deadlines under pressure Highly motivated, with strong desire to learn Bachelor's degree preferred in Marketing, Communications, English or Journalism What We Offer: 401(k), including an employer match of 100% of the first 3% contributed and 50% of the next 2% contributed Medical, Dental, and Vision Insurance (available on the 1st day of the month following your first day of employment) Group Term Life, Short-Term Disability, Long-Term Disability Voluntary Life, Hospital Indemnity, Accident, and/or Critical Illness Participation in the Discretionary Time Off (DTO) Program 11 Paid Holidays Annually UltraViolet Cyber maintains broad salary ranges for its roles in order to account for variations in knowledge, skills, experience, market conditions and locations, as well as reflect our company's differing products, services, industries and lines of business. Candidates are typically placed into the range based on the preceding factors. We sincerely thank all applicants in advance for submitting their interest in this position. We know your time is valuable. UltraViolet Cyber welcomes and encourages diversity in the workplace regardless of race, gender, religion, age, sexual orientation, gender identity, disability, or veteran status. If you want to make an impact, UltraViolet Cyber is the place for you!
    $72k-108k yearly est. Auto-Apply 6d ago
  • Security Researcher

    Prelude 3.8company rating

    Remote job

    Prelude Security is building the category leader in Runtime Memory Protection - an endpoint product that detects and blocks in-memory execution, memory zero-day exploitation, and ransomware execution entirely from user mode. We are a small team of security researchers and software developers working to reinvent the way we protect endpoints in a world where threats are complex, emergent, and accelerating. Backed by Sequoia Capital, Insight Partners, and other leading investors, we are building an advanced security solution to detect in-memory attacks on endpoints, which is written in Rust and runs exclusively in user mode. It leverages advances in modern edge computing architecture, hardware-level telemetry, and a graph-based understanding of the Windows operating system to catch adversaries the moment that they compromise an endpoint. Rather than endlessly attempting to predict what an adversary might do, trapping adversaries at this universal and unavoidable chokepoint that lies at the center of their operations allows us to focus all of our efforts on what they must do, regardless of their sophistication or how much creativity (or AI) they apply to their tactics. Our goal is simple: to detect out-of-context execution in a way that remains entirely outside the adversary's control. Out-of-context execution occurs when an attacker coerces an application to run code paths that were not intended by the original application. This includes in-memory execution techniques such as local and remote injection, exploitation that results in the execution of dynamic code, and fileless malware Role Prelude is seeking a Principal Security Researcher to conduct in-depth technical analysis of modern and adaptive adversary tactics, Windows internals, and operating system telemetry sources, enabling the development of relevant tests and effective detections within Prelude's endpoint protection platform. As a subject matter expert, you will specialize in one or more areas crucial to Prelude's research, such as operating system internals, reverse engineering, malware development, offensive security, program analysis, performance profiling or detection engineering. Success in this role hinges on delivering high-quality research, driving innovation, adapting swiftly, and fostering collaboration across teams and business units. Given the confidential nature of our work, we require an NDA to be signed after an introductory call if there is mutual interest in moving forward. Responsibilities Conduct in-depth research on operating system internals to pinpoint sources of defensive telemetry crucial for detecting adversary tactics, specifically targeting code execution Analyze modern adversary tradecraft, deciphering technique relevance, inner workings, and detectability Translate and implement research findings into actionable improvements for Prelude's endpoint protection platform Produce high-quality, public-facing security research content, including blog posts and conference talks Stay abreast of cutting-edge offensive and defensive security techniques through continuous self-study and research Serve as the subject matter expert in adversary tradecraft and security operations, supporting other business units on their projects as needed Support other Researchers on the team with their research and actively engage in team-driven initiatives Skills and Experience Deep knowledge of Windows operating system internals and static/dynamic reverse engineering Our most commonly used tools: IDA Pro, Binary Ninja, Ghidra, and WinDbg 5+ years of experience in one or more of the following areas: Offensive security, specifically red team operations or purple teaming Detection engineering, specifically, writing robust, production-scale queries in any major EDR Systems programming, ideally using Rust or C/C++ Program analysis and performance profiling Strong understanding of how modern EDRs/XDRs work internally Ability to explain complex technical concepts and research outputs to both executive-level and highly technical consumers Aptitude for working in a fast-paced, adaptive startup environment Nice to Haves Prior experience in enterprise software development using Rust Prior vulnerability research and exploit development experience Working at Prelude Prelude is a fully remote team across the US & Canada, built on trust, autonomy, and excellence. We empower our team to take ownership, move with purpose, and continuously improve. Our culture values top performers who align with our mission and embrace high standards. We offer generous healthcare, flexible PTO, and home-office support, ensuring our team has the freedom and resources to thrive. While we move fast, we prioritize quality, collaboration, and remain committed to building impactful security solutions with precision.
    $93k-129k yearly est. Auto-Apply 60d+ ago
  • Cyber Operations Manager | Remote, USA

    Optiv 4.8company rating

    Remote job

    will be fully remote and can be hired anywhere in the continental U.S. The Cyber Operations Manager over Threat Detection & Response is responsible to ensure early and accurate detection, response, and containment for threats directed against our clients. As a technical management role, the ideal candidate possesses deep security knowledge/expertise, previous experience as a security practitioner, systems management and administration experience, proven service management skills, and the ability to attract and retain talent in a challenging market. The position is closely involved in helping to mentor, develop and evaluate employee performance as well as helping with the development and continuous improvement of the Security Operations services. How you'll make an impact * Lead 24x7 Threat Detection and Response Analysts providing operational and strategic planning, including fostering innovation, planning projects, and organizing and negotiating the allocation of resources as well managing the day-to-day operations. * Work closely with customers on reporting, stewardship calls, and in the case of escalations. * Enforce all policies and procedures, including those for security, disaster recovery, standards, and service provision. * Drive continuous refinement and improvement of detection and response and incident response processes. * Oversee the security of Client systems via Advanced Fusion Center (AFC) service. * Keep current with the latest vendor updates, expansion opportunities, and technology directions, utilized in the Clients environment. * Collaborate and consult with other Managers on the overall advancement of the Security Operations organization and Optiv in general. * Direct and drive process and documentation improvement. * Manage staffing, including recruitment, supervision, scheduling, development, evaluation, and disciplinary actions. * Develop and maintain an educational environment where the knowledge and performance of the group are constantly advancing. * Perform staff performance appraisals. * Ensure timely reporting of security control gaps and vulnerabilities to the customer. * Prepare reporting of metrics and trending of SLA & KPIs to the customer and client support staff. * Stay abreast of evolving risks, new developments in the security industry, and industry best practices in risk management, threat analysis, and threat response techniques. * Attend info security-related events and network with industry peers to inform engineering and operations processes of effective risk mitigation strategies for attacks. * Oversee team's production of threat intelligence reports that communicate the results of the analyses to the respective audience. * Responsible for the joint team effort to normalize data from vulnerability assessment, penetration test, incident response, and application security project deliverables. * Establish and maintain regular written and in-person communications with the organization's executives, other group heads regarding pertinent activities. * Develop and mentor staff through open communication, training and development opportunities, and performance management processes; build and maintain employee morale and motivation. * Supervisory Responsibilities: Cyber Operations Manager will report to the Director of Security Operations. Qualifications for success: * 12+ years professional IT and Information Security experience * 5+ years leading technical Threat Detection and Response teams * 5+ years professional experience in cyber operations centers * 3+ years professional experience in managed services * One or more certifications in Security/Networking including Security+, GSEC, GCIA, GCIH, CISSP, CISM, CISA, or other security-specific vendors/product certifications * Proven ability to make decisions and perform complex problem-solving activities under pressure. Advanced business acumen required. * Sharp analytical abilities and the ability to make sound decisions quickly are required. * Deep understanding of SIEM vendors, solutions, and architecture such as LogRhythm, QRadar, Splunk, Exabeam, etc. * Deep understanding of EDR vendors, solutions, and architecture such as Crowdstrike, Cylance, Carbon Black, Microsoft ATP. * Deep understanding of regulatory compliance such as NIST, SOX, HIPPA, NERC CIP, PCI, etc. and their differentiators across global regions * Deep understanding of laws pertaining to cybersecurity and their differentiators across global regions * Understanding of Security Orchestration, Automation, and Response concepts. * Experience working with ticketing and knowledge management systems such as Service Now. * Experience with ITIL concepts and practices. * Experience with security analytics platforms such as Kibana. * Experience with reporting platforms such as DOMO and PowerBI #LI-TW1 #LI-Remote What you can expect from Optiv * A company committed to championing Diversity, Equality, and Inclusion through our Employee Resource Groups. * Work/life balance * Professional training resources * Creative problem-solving and the ability to tackle unique, complex projects * Volunteer Opportunities. "Optiv Chips In" encourages employees to volunteer and engage with their teams and communities. * The ability and technology necessary to productively work remotely/from home (where applicable) EEO Statement Optiv is an equal opportunity employer. All qualified applicants for employment will be considered without regard to race, color, religion, sex, gender identity or expression, sexual orientation, pregnancy, age 40 and over, marital status, genetic information, national origin, status as an individual with a disability, military or veteran status, or any other basis protected by federal, state, or local law. Optiv respects your privacy. By providing your information through this page or applying for a job at Optiv, you acknowledge that Optiv will collect, use, and process your information, which may include personal information and sensitive personal information, in connection with Optiv's selection and recruitment activities. For additional details on how Optiv uses and protects your personal information in the application process, click here to view our Applicant Privacy Notice. If you sign up to receive notifications of job postings, you may unsubscribe at any time.
    $53k-93k yearly est. Auto-Apply 15d ago
  • Cleared Armed Security Officer - OH

    Patriot Group International 4.4company rating

    Columbus, OH

    Cleared Armed Security Officer Position Type: Full-Time / Non-Exempt Clearance Required: Top Secret / Sensitive Compartmented Information (ISA) Shift: 12-hour Panama Schedule (Days / Midnights) Patriot Group International Inc. (PGI), a Virginia-based company voted #1 Best Place to Work by Virginia Business Magazine and the Best Companies Group, offers an unrivaled hybrid of specialized services by combining security and risk management disciplines with an unequaled special operations and intelligence perspective. We are looking to hire a Cleared Armed Security Officer to join our team in the Columbus, Ohio, area, where we provide data center security solutions that protect client applications and data from increasingly sophisticated threats and global attacks. This position reports to the PGI Site Manager. The Cleared Armed Security Officer will be responsible for the following: The Cleared Armed Security Officer will develop, maintain, and continuously improve knowledge of written and oral post orders, policies, procedures, and standards of conduct. Prevent all unauthorized access by enforcing all Client and PGI policies, including implementing and enforcing badging policies, controlling physical locks and keys, and inspecting persons and equipment. Provide security protection for all Client and PGI personnel and property within the assigned area of responsibility. Report or respond to incidents, security, and safety concerns per established post orders, including responding to alarms. Monitor security cameras and other electronic surveillance systems. Guide, follow, and direct individuals throughout the Site. Assist in controlling physical and electronic locks and unlocking and locking doors and areas. The Cleared Armed Security Officer will perform testing and other inspection services related to access control, including routine inspections, and testing of alarms, locks, doors, monitoring systems, and other access control mechanisms. Prevent the theft of physical or intellectual property. Assist in promoting communication and awareness of data center security policies to client employees, vendors, contractors, and others. The Cleared Armed Security Officer will maintain standards of Armed Security Officer competency, conduct, appearance, and integrity, including compliance with PGI and the Client's Code of Conduct and Uniform Policy Execute and deliver various reports assigned by the Site Manager Complete and maintain pre-assignment, client, State, and PGI sustainment training as directed. Assist in collateral duties, including but not limited to armory and security equipment maintenance tasks. Other duties as assigned. Required Qualifications: Must have a High School diploma or GED. A minimum of one (1) year of security, or one year of local, state, or federal law enforcement experience; or a minimum of two (2) years of honorable military service, active or reserve, in any branch of the US Armed Forces A minimum of 21 years of age Ability to complete an Ohio Security Guard License, including the application process, fingerprints, and background investigation. Ability to complete a firearms training course in compliance with the Ohio Security Guard License and conduct regularly scheduled sustainment training. Must have reliable transportation. Must fluently speak, read, comprehend, and write in English. Ability to pass a pre-employment drug screening and periodic random drug screening. U.S. Citizenship Required Security Clearance: Top Secret / Sensitive Compartmented Information Preferred Qualifications: Current Ohio Security Guard License Two (2) years of security, military, or law enforcement experience Demonstrated history of safe and successful security operations experience in highly secure facilities General working knowledge of the Lenel access control system Handgun weapons proficiency Physical Requirements: Must be able to bend at the waist and knees. Must have the physical ability to perform a variety of training functions. Ability to walk on uneven surfaces, walk long distances, climb stairs. Must be physically capable of standing a 12-hour post. Patriot Group International Inc. is a global mission support service provider with expeditionary capabilities, providing services to select clients within the intelligence, defense, and private sectors. PGI is a veteran-owned and operated company with experience performing in over 50 countries, including austere and high-threat environments. DISCLAIMER: Patriot Group International Inc. is proud to be an Affirmative Action/Equal Opportunity Employer. PGI provides equal employment opportunity for all persons in all facets of employment. PGI maintains a drug-free workplace and performs pre-employment substance abuse testing and background checks. If you are a qualified individual with a disability or a disabled veteran and need a reasonable accommodation to use or access our online system, please contact us on our home page. *************************************
    $23k-30k yearly est. Auto-Apply 60d+ ago
  • Remote Senior Checkpoint Firewall Engineer

    Insight Global

    Remote job

    An employer is looking for a Remote Sr Firewall Engineer (L4) in the United States. The ideal candidate will be responsible for designing, implementing, and maintaining firewall solutions to ensure the security of our organization's networks and systems. You will collaborate with cross-functional teams to assess security risks, develop firewall architectures, and monitor firewall performance. Your expertise in firewall technologies, network security, and best practices will play a critical role in safeguarding our infrastructure and data. Key Responsibilities: - Designing, implementing and maintaining firewall architecture and configurations - Ensure effective integration of firewall in network infrastructure and conduct firewall rule reviews - Design and develop firewall architectures and configurations to meet security requirements and best practices. - Collaborate with cross-functional teams to develop and implement firewall-related policies and procedures. - Develop and maintain documentation, including firewall policies, standards, and configuration guidelines. - Provide guidance and support in the evaluation and selection of firewall solutions and vendors. - Conduct firewall rule reviews and audits to ensure adherence to security policies and regulatory requirements. - Participate in network infrastructure planning and design to ensure effective integration of firewalls. - Collaborate with network and security teams to plan and implement firewall changes, upgrades, and migrations. - Assist in capacity planning exercises to ensure optimal performance and scalability of firewall solutions. - Provide expert-level support for firewall technologies, including installation, configuration, and troubleshooting. - Monitor firewall logs and alerts and perform incident response to detect and mitigate security threats. - Collaborate with security operations teams to investigate and resolve firewall- related security incidents. Optimize firewall performance and rule sets by analyzing traffic patterns, conducting rule reviews, and implementing best practice - Perform validation of the load balancer to verify that it meets the requirements - Perform validation of the firewall rules to verify that it meets the requirements - Configure VPN tunnel for MFA implementation - Implement VPN tunnel to allow access to specific services through MFA - Validate implementation VPN tunnels for MFA - Provision user accounts for F5 MFA for infrastructure access - Evaluating the security stance local and wide area networks - Implementing security measures and technologies for the protection of information resources and customer data We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to ********************.To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: **************************************************** Skills and Requirements - 10 years of experience of network security engineering experience - Expert in firewall technologies - Palo Alto, Checkpoint, Cisco, Zscaler, and etc. (Checkpoint is most important but need experience with the others) - Experience configuring and implementing VPN tunnels for MFA - F5 load balancer experience - Firewall certifications - Palo Alto, Checkpoint, Cisco - Bachelors Degree - Zscaler environment
    $72k-96k yearly est. 55d ago
  • Senior Global Campaign and Digital Marketing Manager

    Open 3.9company rating

    Remote job

    Lookout, Inc. is a globally recognized cybersecurity leader delivering advanced protection for the most vulnerable element of any enterprise security strategy - human error and manipulation. Cloud-native by design, the Lookout platform offers rapid, scalable deployment and simplified security operations, defending the frontline of human-centric attacks-the mobile device. Attackers now target the human element more than ever, with mobile devices providing the most direct path to their victims. Using social engineering techniques that exploit basic human instincts like trust, curiosity, and urgency, they deceive users into revealing sensitive credentials, allowing them to slip past legacy security solutions. Lookout Endpoint Detection and Response (EDR) continuously monitors mobile endpoints for signs of human-centric attacks, as well as traditional malware, software vulnerabilities, and other anomalous activity. It uses advanced threat detection techniques, including artificial intelligence (AI) and behavioral analysis, to identify threats before they escalate across the enterprise. Learn more at *************** and follow us on the Lookout Blog, LinkedIn, and X. As Lookout enters its next phase of growth, we're scaling our global marketing engine to drive demand, pipeline, and brand leadership. We're looking for an experienced Senior Global Campaign & Digital Marketing Manager to build and run world-class campaigns that accelerate growth and fuel sales. The Role In this highly visible role, you will own the strategy and execution of integrated global marketing campaigns designed to drive awareness, engagement, and pipeline. You'll be responsible for orchestrating multi-channel programs-paid, owned, earned, and partner-to generate qualified demand for Lookout's cybersecurity solutions. This is an opportunity to shape Lookout's growth strategy, working at the intersection of digital marketing, campaign orchestration, demand generation, and pipeline impact. Key Responsibilities Campaign Strategy & Orchestration Develop and execute global, integrated marketing campaigns aligned to business priorities and target personas. Partner with Product Marketing, Field, and Sales to define campaign strategy, target segments, messaging, and offers. Build campaign blueprints that span top-, mid-, and bottom-of-funnel tactics to drive engagement and conversion. Digital Marketing Leadership Own digital demand strategy across paid media, email, web, social, SEO/SEM/GEO, and ABM channels. Manage performance marketing campaigns with a focus on pipeline generation and ROI. Continuously optimize channels and content through data-driven insights and testing. Pipeline Impact & Measurement Establish clear KPIs for pipeline contribution, lead quality, conversion rates, and ROI. Partner with Marketing Operations to build dashboards and track performance across the funnel. Identify optimization opportunities across the buyer journey to accelerate velocity and improve efficiency. Cross-Functional Collaboration Collaborate closely with Product Marketing, Field Marketing, Partner/Channel Marketing, and Comms to ensure consistent and impactful execution. Coordinate campaign rollout across regions to ensure global scale with local relevance. Partner with SDR/BDR and Sales teams to align lead follow-up and conversion plays. About You 8+ years of experience in B2B demand generation, digital marketing, or integrated campaign management. Proven track record driving pipeline growth for cybersecurity or SaaS companies. Deep understanding of digital channels, performance marketing, and modern campaign orchestration. Strong analytical skills and experience with marketing automation, CRM, and reporting tools (e.g., Marketo, Salesforce, 6sense, Google Analytics, etc.). Excellent cross-functional communication and project management skills. Ability to thrive in a fast-moving, high-growth environment. Ability to travel 20-30% of the time The US base salary range for this full-time position is available below. We offer base + bonus + equity + benefits. The range displayed on each job posting reflects the minimum and maximum target for new hire salaries for the position across all US locations. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific salary range for your preferred location during the hiring process. Please note that the compensation details listed in US role postings reflect the base salary only, and do not include bonus, equity, or benefits. Remote - US$130,000-$178,000 USD
    $130k-178k yearly Auto-Apply 51d ago
  • Systems Engineer

    Onebrief

    Remote job

    Onebrief is collaboration and AI-powered workflow software designed specifically for military staffs. By transforming this work, Onebrief makes the staff as a whole superhuman - meaning faster, smarter, and more efficient. We take ownership, seek excellence, and play to win with the seriousness and camaraderie of an Olympic team. Onebrief operates as an all-remote company, though many of our employees work alongside our customers at military commands around the world. Founded in 2019 by a group of experienced planners, today, Onebrief's team spans veterans from all forces and global organizations, and technologists from leading-edge software companies. We've raised $123m+ from top-tier investors, including Battery Ventures, General Catalyst, Insight Partners, and Human Capital, and today, Onebrief is valued at $1.1B. With this continued growth, Onebrief is able to make an impact where it matters most. About You You are a seasoned cybersecurity professional with a passion for cloud-native technologies and a strong desire to stay ahead of evolving threats. You thrive in collaborative, remote environments and enjoy solving complex security challenges with innovative solutions. Motivated by continuous learning and growth, you're looking to make a meaningful impact by helping secure modern, dynamic IT ecosystems in a company that values both technical excellence and professional development. Technical Skills Mobile Device Management (MDM): Proficient in Workspace One, with additional experience in Intune, Jamf, and other leading MDM platforms. Secure Access Service Edge (SASE): Hands-on experience with Zscaler to enable secure, scalable access across distributed environments. Security Information and Event Management (SIEM): Skilled in using Splunk for threat detection, log analysis, and real-time security monitoring. Identity and Access Management (IAM): Extensive experience with Okta for user provisioning, single sign-on (SSO), and access governance. Automation & Workflow Orchestration: Expertise in automating manual tasks and building integrations using APIs, webhooks, workflows, and triggers to streamline IT and security processes. Scripting & Configuration Management: Proficient in PowerShell, Bash, and Python for automating deployments, enforcing security baselines, and maintaining systems. AWS Security: Deep understanding of securing and hardening AWS environments using both commercial and open-source tools, ensuring continuous compliance and strong security posture. Soft Skills Exceptional analytical and problem-solving skills, with a sharp attention to detail Proactive in identifying, assessing, and mitigating security risks across systems and infrastructure Strong communicator; able to collaborate across teams and explain complex security concepts to non-technical stakeholders Self-motivated and adaptable; thrives in fast-paced, dynamic environments Skilled at translating business needs into functional software and security tooling Experienced in developing and deploying internal tools to enhance security operations Qualifications U.S. Citizen Able to pass a background check (Preferred) Bachelor's degree in Computer Science, Information Systems, Cybersecurity, or a related field 6+ years of experience in cybersecurity, with a strong focus on cloud environments Relevant certifications such as CISSP, Security+, CCSP, AWS Certified Security - Specialty, or equivalent Strong experience with both Windows and mac OS operating systems Comfortable working in a fully remote or distributed team environment Most importantly, you are a true Onebriefer: You are obsessed with creating value for real users You are ambitious, scrappy, and a creative problem-solver You learn quickly, work iteratively, and naturally seek collaboration You approach your work with integrity, intellectual honesty, and a low ego You communicate frankly, clearly, and succinctly You thrive as a self-starter, embracing autonomy and ambiguity
    $71k-95k yearly est. Auto-Apply 60d+ ago

Learn more about Security Operations jobs

Jobs that use Security Operations