Cyber Security Engineer Lead
Springfield, VA jobs
MANTECH seeks a motivated, career and customer-oriented Cyber Security Engineer Lead to join our team in Springfield, VA.
The Cyber Security Engineer Lead is responsible for the detection, identification, analysis, and reporting of cyber threats, intrusions, anomalous activities, and potential misuse of systems. This role supports the protection of customer's digital assets and sensitive data through the administration, monitoring, and continuous improvement of cybersecurity technologies and processes.
Responsibilities include but are not limited to:
Threat Detection & Response: Identify, assess, and report potential cyber-attacks, intrusions, and abnormal system behaviors. Participate actively in incident response and recovery activities.
Technology Administration: Administer and maintain systems supporting Identity Management, Privileged User Access, Access Control (firewall), End Point Protection, Internet Protection, Vulnerability Scanning, and Security Information and Event Management (SIEM) tools.
Mitigation & Remediation: Develop and implement enterprise-level mitigation strategies to address complex vulnerabilities.
Operational Support: Ensure proper installation, testing, patching, upgrading, and performance of cybersecurity tools and applications. Maintain system resiliency and availability across all managed technologies.
Policy Enforcement & Compliance: Enforce cybersecurity policies, standards, and best practices in alignment with ManTech's security framework and regulatory requirements.
Leadership & Collaboration: Lead or participate in cross-functional projects and initiatives. Provide technical mentorship and subject matter expertise to junior team members.; Continuous Improvement: Interpret internal and external cybersecurity trends and business challenges; recommend and implement innovative solutions to strengthen the enterprise security
posture.
Monitor intrusion detection and prevention systems and other security event data sources; determine if security events monitored should be escalated to incidents and follow all applicable incident response and reporting processes and procedures.
Minimum Qualifications:
Bachelor's Degree in Cybersecurity, Information Technology, Computer Science, or a related Cyber Security field.
Certified Information Systems Security Professional (CISSP) certification (required within 6 months of assignment to the position, otherwise failure to obtain certification within 6 months of assignment to the position may result in removal).
8+ years of relevant cybersecurity experience, including hands-on technical administration and operational security support.
Strong analytical and problem-solving abilities
Deep knowledge of cybersecurity frameworks, principles, and technologies
Proficiency in SIEM, endpoint protection, and identity management tool
Must be able to travel up to 25%
Preferred Qualifications:
Have a good understanding of DISA compliance directives and recommend having knowledge of the JSIG.
Ability to lead small teams or projects
Excellent communication and influence skills; Strong judgment in identifying and mitigating security risks
Correlate data from intrusion detection and prevention systems with data from other sources
Clearance Requirements:
Must have current/active TS/SCI with the ability to obtain and maintain a Yankee White security clearance
Physical Requirements:
Must be able to remain in a stationary position 50%
The person in this position needs to occasionally move about inside the office to access file cabinets, office machinery, etc.
Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer.
The person in this position frequently communicates with co-workers, management and customers, which may involve delivering presentations.
Must be able to exchange accurate information in these situations.
Information Security Analyst - Lead
Atlanta, GA jobs
Immediate need for a talented Information Security Analyst - Lead . This is a 09+ months contract opportunity with long-term potential and is located in Atlanta,GA(Hybrid). Please review the job description below and contact me ASAP if you are interested.
Job ID:25-93807
Pay Range: $68 - $68.61/hour. Employee benefits include, but are not limited to, health insurance (medical, dental, vision), 401(k) plan, and paid sick leave (depending on work location).
Key Responsibilities:
Act as a liaison between cybersecurity metric owners, data engineers, and governance teams to ensure accurate and timely metric development.
Facilitate metric working sessions to define metric name, definition, calculation, system of record, and critical data elements (CDEs).
Support the documentation and validation of metric logic and data lineage.
Coordinate and lead standing meetings to provide updates, manage timelines, and escalate blockers or data challenges.
Review and validate data quality and completeness of metric inputs in coordination with data engineers.
Support the development of root cause commentary and trend analysis for metrics that breach established thresholds.
Partner with control and process owners to align metrics with applicable frameworks (e.g., NIST CSF, CIS, FFIEC).
Prepare clear, concise executive-level summaries and presentations on metric performance and risk trends.
Maintain oversight of multiple metrics in different stages of the build lifecycle, ensuring governance and consistency.
Contribute to continuous improvement of the metrics program, including standardization, automation, and data quality enhancements.
Key Requirements and Technology Experience:
Key Skills;Metrics governance/Risk Metrics/Performance Metrics .
Bachelor's degree or five years of related experience or an equivalent combination of education and experience
In-depth knowledge of principles, practices, theories, and/or methodologies associated with the professional discipline (e.g., information technology, project management, finance, risk management, etc.)
Understands foundational concepts of other related professional disciplines. Experience managing small projects
Ability to interpret and explain complex information to a range of audiences and build consensus among different stakeholders.
Ability to provide direction and mentor less experienced teammates
Strong organizational skills with the ability to manage multiple priorities simultaneously.
Excellent written and verbal communication skills, including experience drafting executive summaries.
Proficiency in Microsoft Excel, PowerPoint, and collaboration tools (e.g., Teams, SharePoint).
5-7 years of experience in cybersecurity, risk management, technology project coordination, or data analytics.
Familiarity with cybersecurity domains (e.g., vulnerability management, DLP, IAM, cloud security, incident management).
Working knowledge of risk and performance metric design, including KRIs, KPIs, and operational indicators.
Experience gathering and documenting business requirements and translating them into actionable data or metric logic.
Basic understanding of SQL or ability to read data dictionaries and data mappings.
Exposure to cyber control frameworks such as NIST CSF, ISO 27001, or CIS.
Exposure to Agile or iterative project delivery methods.
Cybersecurity/Risk management Vulnerability management
Stakeholder engagement .
Our client is a leading Financial Industry, and we are currently interviewing to fill this and other similar contract positions. If you are interested in this position, please apply online for immediate consideration.
Pyramid Consulting, Inc. provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, colour, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state or local laws.
By applying to our jobs you agree to receive calls, AI-generated calls, text messages, or emails from Pyramid Consulting, Inc. and its affiliates, and contracted partners. Frequency varies for text messages. Message and data rates may apply. Carriers are not liable for delayed or undelivered messages. You can reply STOP to cancel and HELP for help. You can access our privacy policy here.
Senior IT Quality Assurance Analyst
Columbus, OH jobs
Immediate need for a talented Senior IT Quality Assurance Analyst . This is a 06+ Months contract opportunity with long-term potential and is located in Columbus, OH (Remote). Please review the job description below and contact me ASAP if you are interested.
Job Diva ID: 25-94603
Pay Range: $60-$62 /hour. Employee benefits include, but are not limited to, health insurance (medical, dental, vision), 401(k) plan, and paid sick leave (depending on work location).
Key Responsibilities:
Establishes readiness, specifies skill needs, analyzes risk, provides estimates and plans work for testing efforts.
Participates in requirements reviews, design reviews, systems analysis and testing review discussions.
Determines scope and focus of testing effort and creates Test Strategy and risk analysis to guide testing efforts.
Prepares test tools, automation and environment assets to support testing effort.
Creates, uses and maintains automated scripts to increase efficiencies in testing, including troubleshooting problems with scripts.
Tests systems or system components utilizing black box testing methods.
Validates the function of system under test and observes results from various external and internal interfaces.
Gathers test activity information during execution and prepares summarized information about the testing effort.
Communicates regularly with project members and advocates for resolution of high priority problems with Project Sponsors, Service Manager and Project Manager.
Maintains assigned test assets and recognizes gaps in current test assets, identifying ways to create needed assets.
Creates effective ways to display data using various modeling, reporting, statistical perspectives and trending methods.
Performs in-depth analysis by weighing relevance and accuracy of information to provide alternative solutions while appropriately incorporating input from others.
Provide on the job support to others on a variety of testing topics.
Provides guidance on complex issues to others as needed
Collaboration & Communication:
Works effectively with cross-functional teams (security, architecture, infrastructure)
Can explain technical findings and recommendations to non-technical stakeholders
Curiosity-driven problem solving
Thrives on figuring things out without a full map
Resilience in ambiguity
Comfortable making progress with partial information
Bias toward action
Identifies and executes remediation steps without waiting for perfect clarity
Key Requirements and Technology Experience:
Skills; SQL Server Always Encrypted (AE), OWASP Top 10, Data-at-rest and data-in-transit encryption
SQL AE experience
Comfortable working with SQL Server Always Encrypted (AE)
Schema analysis and remediation for encryption compatibility
Experience designing security-focused test cases
Ability to validate encryption implementation and data protection mechanisms
Familiarity with automated testing frameworks that support security validation
Application Security Expertise
Deep understanding of OWASP Top 10 and secure coding practices
Experience with threat modeling and vulnerability remediation
Encryption Implementation
Hands-on experience with data-at-rest and data-in-transit encryption
Familiarity with key management and integration with enterprise security tools
Data-Driven Inquiry:
Demonstrates ability to analyze data and formulate meaningful questions
Brings insights and hypotheses back to the team to guide investigation and decision-making
Leads with curiosity to uncover root causes and improvement opportunities
Our client is a leading Insurance Industry , and we are currently interviewing to fill this and other similar contract positions. If you are interested in this position, please apply online for immediate consideration
Pyramid Consulting, Inc. provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state, or local laws.
By applying to our jobs, you agree to receive calls, AI-generated calls, text messages, or emails from Pyramid Consulting, Inc. and its affiliates, and contracted partners. Frequency varies for text messages. Message and data rates may apply. Carriers are not liable for delayed or undelivered messages. You can reply STOP to cancel and HELP for help. You can access our privacy policy here.
Information Security Specialist
Horsham, PA jobs
Delta Information Systems, Inc. is seeking a highly skilled Information Security Specialist to protect and secure critical systems, data, and intellectual property in a fast-paced Aerospace & Defense environment.
This role is responsible for implementing and managing security controls, ensuring compliance with strict regulatory requirements, and defending against advanced cyber threats. The ideal candidate will bring deep technical knowledge, strong problem-solving skills, and the ability to work across teams to maintain the confidentiality, integrity, and availability of sensitive information that supports our national security mission.
This is a fully onsite position located in Horsham, PA.
Key Responsibilities
Implement, monitor, and maintain security tools, including firewalls, intrusion detection/prevention systems, endpoint protection, and SIEM platforms.
Perform continuous monitoring, vulnerability assessments, penetration testing, and risk analysis of systems and networks.
Ensure compliance with DoD, NIST 800-171, CMMC, ITAR, DFARS, and other regulatory frameworks.
Champion the company's certification to CMMC Level 2.
Develop, document, and enforce cybersecurity policies, procedures, and incident response plans.
Support Government and customer security audits, preparing evidence and remediation plans as required.
Investigate and respond to cybersecurity incidents, performing root-cause analysis and recommending corrective actions.
Collaborate with IT, Engineering, Program Management, and Security teams to embed cybersecurity best practices into operations and product development.
Provide cybersecurity awareness training to employees with a focus on handling sensitive defense-related data.
Stay current on emerging cyber threats, nation-state tactics, and evolving compliance regulations impacting aerospace and defense.
Qualifications
Required:
Bachelor's degree in Information Security, Computer Science, or related field (or equivalent experience).
5+ years of experience in information security, IT security operations, or cybersecurity.
Strong knowledge of NIST 800-171, CMMC, and DFARS cybersecurity requirements.
Experience developing, implementing and achieving CMMC compliance.
Experience supporting DoD or government contracts with cybersecurity compliance needs.
Hands-on experience with security infrastructure: SIEM, IDS/IPS, endpoint security, and network monitoring tools.
Strong understanding of Windows, Linux, and cloud environments (Microsoft Office 365, Deltek Costpoint).
Excellent analytical, documentation, and communication skills.
U.S. Citizenship (required due to defense industry regulations).
Preferred:
Active security clearance (Secret or higher), or ability to obtain one.
Relevant certifications: CISSP, CISM, Security+, CEH, or GIAC.
Experience with RMF (Risk Management Framework) and STIG compliance.
Familiarity with secure software development, DevSecOps practices, or classified system security.
Compensation
Competitive salary
Outstanding benefits package
100% Paid Coverage for Medical, Dental, and Vision
401(k) Employer Match
Employee Stock Ownership Program (company funded)
Life Insurance (company funded)
Short-Term Disability (company funded)
Long-Term Disability (company funded)
Vacation & Sick
Holidays: 11 days
HealthCare FSA
Dependent Care FSA
What We Offer
Opportunities for training, certifications, and career growth.
A mission-driven culture where your work contributes to national security.
Exposure to advanced technologies and programs critical to the aerospace and defense sector.
About Delta Information Systems, Inc.
Delta Information Systems (DIS) is an industry-leading supplier of high-quality aerospace telemetry products for Flight Test, Missile Test, Range Safety, Launch Support and Satellite Command and Control applications. Their products address the complete telemetry chain from Data Acquisition, Storage, Transport and Distribution to Telemetry Processing and Display. DIS customers include all DoD entities, all Major Primes, Integrators, Gov Labs, Aircraft & Missile Manufacturers, & Launch Facilities.
In addition, Delta Information Systems (DIS) designs and develops sophisticated electronic equipment that is specifically designed to reliably operate in harsh environments. They deliver critical video communications capability for manned and unmanned Intelligence, Surveillance and Reconnaissance (ISR) programs.
Technology - Security Analyst Senior
Jacksonville, FL jobs
Job Title: Technology - Security Analyst Senior
Duration: Long term contract
Experienced professional responsible for implementing, maintaining, monitoring, and troubleshooting enterprise-wide security systems. Supports 24/7 availability, mentors junior staff, and ensures compliance with security frameworks and policies.
✅ Core Responsibilities:
Implement and manage enterprise security systems, including cloud-based (AWS/Azure).
Perform security audits, risk analysis, and vulnerability assessments.
Conduct log analysis via SIEM tools; respond to security incidents.
Lead incident response, threat hunting, and forensic analysis.
Maintain firewalls, encryption systems, and endpoint protections.
Develop and enforce security policies, SOPs, and compliance protocols.
Manage user access, logical security, and secure configurations.
Collaborate cross-functionally on infrastructure and software security.
Support regulatory compliance with standards (e.g., NIST, COBIT).
Train and mentor team members; provide escalated issue resolution.
Evaluate and onboard new security technologies.
✅ Technical Skills Required:
Operating Systems: Windows (5+ years), Linux is a plus
Cloud Platforms: AWS (EC2, IAM, Security), Azure (AD, Sentinel, Security Center)
Security Tools: SIEM (e.g., Splunk), Firewalls, IDS/IPS, Endpoint Protection
Scripting: PowerShell, Python, VBScript, Regex
Frameworks & Compliance: NIST, COBIT, ISO 27001, ITIL
Forensics & IR: Evidence gathering, threat profiling, penetration testing
Documentation: RFPs, RFIs, policy writing, technical reporting
Protocols: TCP/IP, DNS, HTTP/S, LDAP, SNMP, VPN, SSH
✅ Soft Skills & Abilities:
Critical thinking and creative problem-solving
Leadership in projects and incident response
Effective communication (written and verbal)
Mentoring and knowledge-sharing
Ability to prioritize and work independently under pressure
Collaboration across departments and vendors
✅ Educational Requirements:
Preferred: Bachelor's degree in CS, InfoSec, or related
Alternate: 8 years equivalent experience in system/security administration
✅ Experience Requirements:
Minimum: 4 years in security/system admin in enterprise IT
Mandatory: 5 years in Windows environment
✅ Required Certifications (any 2 or equivalent):
Security & Compliance: GIAC GMON, GPCS, DoD 8570 certs
Cloud & Microsoft:
AWS: Cloud Practitioner, Solutions Architect, Security Specialty
Azure: Fundamentals, Security Ops/Engineer, Solutions Architect
MCSE
Aviatrix Certified Engineer (ACE)
Chief Information Security Officer
New York, NY jobs
A financial firm is looking for a Chief Information Security Officer (CISO) to join their team in New York, NY.
Compensation: $150-200K
Responsibilities:
Define and maintain the enterprise information security strategy, roadmap, and governance framework, aligned with business objectives and regulatory requirements
Draft, maintain, and periodically review security-related policies and procedures
Establish and chair/co-chair an Information Security / Cyber Risk Committee and contribute to Board-level reporting on cyber risk
Develop and maintain the firm's information security governance framework
Lead the firm's SOC 1 (Type 1/Type 2) and SOC 2 (Type 1/Type 2) readiness and ongoing attestation efforts
Own the control catalog, control testing coordination, evidence collection, and remediation tracking across technology, operations, and third parties
Act as primary security point of contact for external auditors, assessment firms, and key institutional partners
Ensure security program alignment with SEC Regulation S-P, Reg S-ID, Reg SCI, SEC / Client cybersecurity expectations, and NYDFS 23 NYCRR 500
Partner with Compliance and Legal to interpret new regulations, assess impact, and implement necessary control and policy changes
Maintain and periodically test the Incident Response Plan, Business Continuity and Disaster Recovery (BC/DR) from a security perspective
Provide security oversight for cloud (AWS) and on-prem infrastructure, including network security, endpoint security, identity and access management (IAM), and data protection
Work with Infrastructure/DevOps and application teams to embed secure SDLC practices, including code review, security testing, and secure deployment pipelines
Oversee vulnerability management, including patch management processes, penetration testing, and remediation programs
Define and oversee Security Operations Center (SOC) / XDR usage, log management, SIEM, threat detection, and incident handling
Design and enforce data classification, data loss prevention (DLP), encryption, and key management controls
Partner with business and product teams to ensure client data privacy and secure data flows, including with third-party vendors and partners
Own the vendor security risk management program, including security due diligence, contract security clauses, and ongoing monitoring
Evaluate and manage key security vendors
Build and lead a small but high-impact security team, scaling capabilities over time
Promote a security-first culture through training, awareness programs, and regular communication with staff at all levels
Qualifications:
Required
Bachelor's degree in Computer Science, Information Security, Engineering, or related field; or equivalent experience
7+ years of progressive experience in information security, including at least 3 years in a leadership role (Head of Security, Deputy CISO, CISO, or equivalent)
Hands-on experience leading SOC 1 and/or SOC 2 attestation projects at a financial institution, fintech, or SaaS provider
Strong background in financial services or capital markets (broker-dealer, clearing firm, trading platform, or similar)
Understanding of Information security frameworks (e.g., NIST CSF, NIST 800-53, ISO 27001)
Understanding of Regulatory landscape for U.S. financial firms (e.g., SEC, Client, possibly NYDFS 500)
Experience with Identity & access management, network security, endpoint security, and cloud security (preferably AWS)
Experience building and maintaining incident response, BC/DR, and vulnerability/patch management programs
Strong track record of cross-functional leadership, communicating complex security and risk topics to non-technical executives and boards
Preferred
Experience as CISO, Deputy CISO, or security leader at a broker-dealer, clearing firm, exchange/ATS, or large fintech
Professional certifications such as CISSP, CISM, CISA, CRISC, CCSP or similar
Experience with AWS security services
Familiarity with DevSecOps practices and secure CI/CD pipelines
Experience managing data localization and cross-border data separation initiatives
Information Security Manager
Santa Clara, CA jobs
Role: Cybersecurity Manager
Duration: 6+ months
Summary: The Cybersecurity Manager leads global cybersecurity operations, incident response, cloud security, and vulnerability management across IT, OT, and cloud environments. This role drives security maturity, manages SOC functions, and ensures compliance with frameworks like ISO 27001, NIST, and ITAR.
Key Responsibilities:Lead cybersecurity operations, including SOC oversight, threat detection, and endpoint security.
Manage incident response for ransomware, APT, insider threats, and major security events.
Oversee vulnerability and patch management programs (Tenable, Automox, CrowdStrike).
Strengthen cloud and identity security across Azure, Entra ID, and Microsoft 365.
Implement Zero Trust architecture and secure configuration standards.
Support compliance efforts (ISO 27001, NIST CSF/800-53/171, ITAR, GDPR, HIPAA, PCI).
Lead global cybersecurity teams, contractors, and MSSP partners.
Provide executive-level reporting on risk posture, incidents, and security metrics.
Requirements:10+ years of cybersecurity experience with leadership responsibilities.
Strong background in SOC operations, IR, EDR, SIEM/SOAR, and cloud security.
Hands-on experience with Sentinel, XSOAR, CrowdStrike, Defender, Tenable.
Knowledge of ISO 27001, NIST, ITAR, and broader regulatory frameworks.
Strong communication, team leadership, and cross-functional collaboration skills.
Sr Security Engineer
Columbus, OH jobs
Design and implement advanced security architectures across cloud, on-prem, and hybrid environments while driving Zero Trust, SASE, and cloud-native security initiatives.
Lead global strategic programs, network modernization efforts, and rapid tactical responses to critical incidents, converting gaps into standards and governance.
Develop security reference architectures, HLD/LLD solution packages, and Infra-as-Code-driven delivery models aligned with enterprise transformation goals.
Conduct threat modeling, risk assessments, and gap analysis across applications, infrastructure, APIs, containers, and third-party integrations.
Implement cloud and DevSecOps security controls, integrating tooling into CI/CD pipelines and enforcing secure coding and IaC policies.
Build security automation, SOAR playbooks, and SIEM integrations to streamline detection, vulnerability management, compliance, and response workflows.
Enhance detection engineering through custom rules, behavioral analytics, log enrichment, and purple-team/adversary emulation exercises.
Provide cross-functional leadership for initiatives involving cloud migration, AI/ML, M&A, and digital modernization, presenting strategies and risk posture to executive stakeholders.
Security Architect
Santa Ana, CA jobs
1. Security, Compliance and Audit Readiness
a. Enforce network security controls aligned with Criminal Justice Information Services (“CJIS”), National Institute of Standards and Technology (“NIST”), and department policy.
b. Implement and maintain firewall rulesets, Network Access Control (“NAC”) solutions (e.g., Cisco Identity Service Engine (“ISE”)), and endpoint access policies.
c. Support the cybersecurity team in incident detection, forensic analysis, and mitigation strategies.
d. Provide documentation and evidence for security audits and compliance reviews.
2. Implementation, Operations and Support
a. Serve as the hands-on engineer for network deployment, upgrades, and incident response.
b. Configure and manage Cisco switches, routers, firewalls, WLCs, and wireless endpoints.
c. Design and manage VPNs, QoS, ACLs, network monitoring, and logging systems (SolarWinds, NetFlow, SNMP).
3. SME Leadership and Staff Development
a. Serve as the department's SME on enterprise security, guiding decisions across IT, public safety systems, and operations.
b. Train, coach, and mentor internal IT staff, including junior and mid-level network technicians.
c. Lead structured knowledge transfer sessions, hands-on training, and real-time coaching during support and implementation activities.
d. Create SOPs, how-to guides, and step-by-step documentation tailored for ongoing use by internal staff.
e. Support staff in preparation for certification paths (e.g., CCNA/CCNP) if desired.
4. Any other activities reasonably related to the foregoing, as assigned by OCSD.
Deputy, Global Information Security Officer
Richardson, TX jobs
The Deputy, Global Information Security Officer is responsible for leading the security strategy roadmap, consulting with security solution partners and defining company security policies and standards. Will have oversight of global security operations, incident response and both US and international Aerospace and Defence (A&D) security and compliance. The right candidate will have the required presence, confidence, and knowhow to quickly gain trust, credibility, and respect. They will have a proven record of taking a fact-based approach to the assessment of the current state of operations and the implementation of pragmatic solutions to address business needs. They will extract maximum value from existing technology investments while leveraging industry trends to introduce new and relevant technologies to deliver the necessary protection to the enterprise.
Detailed Description:
Performs tasks such as, but not limited to, the following:
Drive the overall security strategy for Celestica, aligning security initiatives with business objectives, influencing stakeholders, and securing buy-in for security investments.
Act as a champion for security across the organization, fostering a security-conscious culture and promoting best practices.
Provide leadership to the information security organization.
Take ownership of the incident response program, including developing and testing incident response plans, coordinating response activities, and conducting post-incident reviews to improve future response capabilities.
Leverage data analytics to inform security strategy, identify threats, and measure the effectiveness of security controls. This includes promoting a data-driven security culture within the team.
Drive improvements and efficiencies within the security operating model including identifying areas for optimization, streamlining processes, and championing change.
Drive the development and implementation of security standards and policies. This includes ensuring compliance with relevant regulations and industry frameworks, and staying abreast of emerging security threats and best practices.
Actively scans laws, guidelines, and regulations in all the countries that we operate to ensure that any major exposure on data privacy is addressed or mitigated.
Establish, implement and monitor strategic processes to maintain and improve IT solutions, infrastructure and support services.
Coordinate with external authorities to assure monitoring posture is at a high level of attentiveness.
Accountable for monitoring suspicious network and endpoint activities, and taking corrective actions, as required.
Responsible for managing security partners and other third-party security relationships.
Appraise CIO/CISO of cybersecurity trends and threats.
Responsible for developing and testing threat identification, containment, and recovery plans.
Accountability for cybersecurity awareness, training, and internal phishing campaigns.
Key liaison and collaboration with physical security.
Collaborate on pre-acquisition requirements with stakeholders assuring that security standards are met prior to acquisition.
Facilitate the necessary efforts and resources to ensure that duration of exposure to cyber events is addressed rapidly
Participate on company world-wide teams to share information, help implement global initiatives, leverage IT resources and investments, and develop future state of company architecture.
Build, manage, and mentor a high-performing security team. This includes setting clear goals, providing development opportunities, and fostering a collaborative and innovative work environment.
Responsible for maturing the Information Security function and driving discipline on execution of all security initiatives to ensure they are delivered on-time, on-budget, and with quality.
Knowledge/Skills/Competencies:
Advanced knowledge of project management and Full Project Scope Experience
Experience in partnering with the business in promoting cybersecurity initiatives
Demonstrated experience implementing Security strategies and solution designs
Advanced understanding of virtualized cloud computing environments
Performing full security compliance and risk assessments
Advanced knowledge of Information Security Penetration Testing, IT Vulnerability Assessments
Mastery level of understanding in IT Risk Management and IT Governance/Audit Procedures
Advanced understanding of Cybersecurity incident Response Management and advanced experience in incident response activities
Advanced understanding of IT Security Architecture
Advanced knowledge of Security Standards, Regulations, and Best Practices
Extensive knowledge of IT design and deployment, and operations process
Knowledge and understanding of the business unit and how decisions impact customer satisfaction, product quality, on-time delivery and the profitability of the unit
Information security forensics
Knowledge of common information security frameworks and IT controls frameworks, such as NIST 800-171, ISO/IEC 27001, and ITIL
Knowledge and understanding of relevant legal and regulatory requirements, such as Sarbanes-Oxley Act (SOX), Health Insurance Portability and Accountability Act (HIPAA) and Payment Card Industry/Data Security Standard. Knowledge of global requirements
Effectively manage relationships with security vendors, negotiating contracts and ensuring the organization is getting the best value for its security investments.
Experience working with customers on security assessments and audits
Proven ability to influence and promote safe technology usage, practices and behaviours across all levels of the entire organization by leveraging direct and indirect resources, delivering effective global communication, and enforcing policy attestation and mandatory employee training.
Demonstrated understanding of how security decisions impact the business, including customer trust, brand reputation, and revenue generation.
Ability to articulate the value of security investments in business terms.
Ability to communicate complex security concepts clearly and concisely to a variety of audiences, including senior management, board members, and external stakeholders. This includes building consensus, influencing decision-making, and securing support for security initiatives.
Required knowledge of the U.S. GOVERNMENT COMPLIANCE but not limited to, DFAR ************/NIST 800-171, DFARS ************, ************, and ************, CMMC Model Version 2.0 and associated testing requirements, and 48 CFR 52.204-21
Physical Demands:
Duties of this position are performed in a normal office environment.
Duties may require extended periods of sitting and sustained visual concentration on a computer monitor or on numbers and other detailed data. Repetitive manual movements (e.g., data entry, using a computer mouse, using a calculator, etc.) are frequently required.
Typical Experience:
15+ years of IT experience with a proven track record of delivering global capabilities around risk management, information security and progressive IT roles.
5+ years of Senior-level IT Security leadership experience within an organization of comparable scale and complexity, experience in the manufacturing industry is preferred.
Knowledge of all aspects of IT business.
Typical Education: Bachelor's Degree.
Notes:
This job description is not intended to be an exhaustive list of all duties and responsibilities of the position. Employees are held accountable for all duties of the job. Job duties and the % of time identified for any function are subject to change at any time.
Senior Security Architect
Orange, CA jobs
Security, Compliance and Audit Readiness:
Enforce network security controls aligned with Criminal Justice Information Services (“CJIS”), National Institute of Standards and Technology (“NIST”), and department policy.
Implement and maintain firewall rulesets, Network Access Control (“NAC”) solutions (e.g., Cisco Identity Service Engine (“ISE”)), and endpoint access policies.
Support the cybersecurity team in incident detection, forensic analysis, and mitigation strategies.
Provide documentation and evidence for security audits and compliance reviews.
Implementation, Operations and Support:
Serve as the hands-on engineer for network deployment, upgrades, and incident response.
Configure and manage Cisco switches, routers, firewalls, WLCs, and wireless endpoints.
Design and manage VPNs, QoS, ACLs, network monitoring, and logging systems (SolarWinds, NetFlow, SNMP).
SME Leadership and Staff Development:
Serve as the department's SME on enterprise security, guiding decisions across IT, public safety systems, and operations.
Train, coach, and mentor internal IT staff, including junior and mid-level network technicians.
Lead structured knowledge transfer sessions, hands-on training, and real-time coaching during support and implementation activities.
Create SOPs, how-to guides, and step-by-step documentation tailored for ongoing use by internal staff.
Support staff in preparation for certification paths (e.g., CCNA/CCNP) if desired.
Any other activities reasonably related to the foregoing, as assigned by the Client
Information Technology Security Analyst
Richmond, VA jobs
Our government client is looking for an experienced IT Security Analyst on a hybrid 6+ months renewable contract role in Richmond, VA.
- IT Security Analyst | HYBRID
W2 RATE - $65/hr - $70/hr
Job description:
Individual is able to work without assistance; provides leadership for others; able to manage highly complex work efforts; may have advanced education; has extensive industry experience.
The IT Security Analyst monitors and advises on information security issues related to the systems and workflow at an agency to ensure the internal IT security controls for an agency are appropriate and operating as intended. Coordinates and executes IT security related projects for the agency. Coordinates response to information security incidents. Develops and publishes Information Security policies, procedures, standards and guidelines based on knowledge of best practices and compliance with Commonwealth IT Security policies, standards, and guidelines. Conducts campus-wide data classification assessment and security audits and manages remediation plans. Collaborates with IT management, Internal Audit, and VITA to manage security vulnerabilities. Creates, manages and maintains user security awareness. Conducts security research and keeps abreast of latest security issues. Prepares IT security documentation, including department policies and procedures, agency notifications, Web content, and alerts.
Required/Desired Experience:
12 Years of Individual must have experience working without assistance; providing leadership for others; managing highly complex work efforts. Required
7 Years of Individual must have experience in the IT Security or related field. Required
About Vector:
Vector Consulting, Inc., (Headquartered in Atlanta) is an IT Talent Acquisition Solutions firm committed to delivering results. Since our founding in 1990, we have been partnering with our customers, understanding their business, and developing solutions with a commitment to quality, reliability and value. Our continuing growth has been and continues to be built around successful relationships that are based on our organization's operating philosophy and commitment to ** People, Partnerships, Purpose and Performance - THE VECTOR WAY
************************
“Celebrating 30 years of service.”
Director Information Security
Richardson, TX jobs
We are seeking an experienced and strategic Director of Data Security and Governance to lead our comprehensive data protection program. This critical role involves establishing and enforcing data security policies to meet stringent regulatory requirements, including the International Traffic in Arms Regulations (ITAR), and fulfilling complex data security obligations within commercial contracts. You will be responsible for building our data governance framework from the ground up, including implementing a robust data classification program and deploying modern security solutions like Data Security Posture Management (DSPM) and Data Rights Management (DRM)., in addition to managing the DLP program.
Detailed Description
Performs tasks such as, but not limited to, the following:
Strategy & Policy Development: Design, implement, and oversee the enterprise-wide data security and governance strategy, policies, and standards.
Compliance & Regulatory Oversight: Serve as the primary expert on data security requirements for ITAR and other government regulations. Ensure all data handling processes and systems are compliant with contractual and legal obligations.
Data Classification Program: Develop and manage a corporate data classification policy and program. Work with business units to identify, classify, and protect sensitive and regulated data throughout its lifecycle.
Technology Implementation: Lead the selection, implementation, and operationalization of a Data Security Posture Management (DSPM) solution to provide visibility and control over our data landscape.
Data Rights Management (DRM): Implement and manage a DRM solution to control access to and usage of sensitive data, ensuring that only authorized individuals can access and interact with protected information according to defined policies.
Risk Management: Conduct regular data security risk assessments, identify vulnerabilities, and oversee remediation efforts to mitigate risks.
Incident Response: Develop and lead the data-focused components of the incident response plan, including containment, investigation, and reporting of data breaches.
Collaboration & Training: Partner closely with Legal, IT, Engineering, and business stakeholders to embed data security principles into their operations. Develop and deliver training programs to raise awareness about data governance and security best practices.
Typical Experience
Minimum of 10 years of experience in cybersecurity and data governance, with at least 4 years in a leadership role.
Proven track record of successfully implementing a data classification program across an enterprise.
Direct experience with the procurement and deployment of DSPM and DRM technologies.
Skills & Knowledge:
Deep understanding of data protection principles, including encryption, access control, data loss prevention (DLP), and data discovery.
Expert knowledge of security frameworks such as NIST Cybersecurity Framework, NIST 800-171, and ISO 27001.
Excellent project management skills and the ability to lead cross-functional teams.
Strong communication skills, with the ability to articulate complex security concepts to technical and non-technical audiences.
Certifications (Preferred):
Certified Information Systems Security Professional (CISSP)
Certified Information Security Manager (CISM)
Certified Information Privacy Professional (CIPP)
Typical Education
Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or related field, or equivalent experience.
A Master's degree is a plus.
Educational requirements may vary by geography.
Physical Demands
Duties of this position are performed in a normal office environment.
Duties may require extended periods of sitting and sustained visual concentration on a computer monitor or on numbers and other detailed data. Repetitive manual movements (e.g., data entry, using a computer mouse, using a calculator, etc.) are frequently required.
Notes
This job description is not intended to be an exhaustive list of all duties and responsibilities of the position. Employees are held accountable for all duties of the job. Job duties and the % of time identified for any function are subject to change at any time.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Celestica's policy on equal employment opportunity prohibits discrimination based on race, color, creed, religion, national origin, gender, sexual orientation, gender identity, age, marital status, veteran or disability status, or other characteristics protected by law.
This policy applies to hiring, promotion, discharge, pay, fringe benefits, job training, classification, referral and other aspects of employment and also states that retaliation against a person who files a charge of discrimination, participates in a discrimination proceeding, or otherwise opposes an unlawful employment practice will not be tolerated. All information will be kept confidential according to EEO guidelines.
COMPANY OVERVIEW:
Celestica (NYSE, TSX: CLS) enables the world's best brands. Through our recognized customer-centric approach, we partner with leading companies in Aerospace and Defense, Communications, Enterprise, HealthTech, Industrial, Capital Equipment and Energy to deliver solutions for their most complex challenges. As a leader in design, manufacturing, hardware platform and supply chain solutions, Celestica brings global expertise and insight at every stage of product development - from drawing board to full-scale production and after-market services for products from advanced medical devices, to highly engineered aviation systems, to next-generation hardware platform solutions for the Cloud. Headquartered in Toronto, with talented teams spanning 40+ locations in 13 countries across the Americas, Europe and Asia, we imagine, develop and deliver a better future with our customers.
Celestica would like to thank all applicants, however, only qualified applicants will be contacted.
Celestica does not accept unsolicited resumes from recruitment agencies or fee based recruitment services.
This location is a US ITAR facility and these positions will involve the release of export controlled goods either directly to employees or through the employee's movement within the facility. As such, Celestica will require necessary information from all applicants upon an applicant's acceptance of employment to determine if any export control exemptions or licenses must be filed.
Security Engineer
Cary, NC jobs
We are seeking a skilled Security Engineer with strong Networking and Compliance experience to join our team in Millennia. This position is required to reside in the vicinity of our Durham, NC Data Center. In this role, you will be crucial in maintaining the integrity and security of our network systems, ensuring privacy and security controls within processes, assets, and data flow within our healthcare-focused environment
Responsibilities:
· Maintain and manage all processes systems supporting Millennia's security posture.
· Monitor, manage, and implement security infrastructure to support organizational needs
· Monitor logs and alerts to identify incidents. Perform and or document Root Cause Analysis and remediation on Security Incidents.
· Monitor network performance and troubleshoot issues and Security Incidents.
· Plan, manage, and execute system upgrades and weekly patches to all endpoints.
· Develop and enforce security policies to protect sensitive patient data.
· Conduct regular system audits and vulnerability assessments.
· Provide technical support for network-related issues to staff and clients.
· Maintain documentation of network configurations and procedures.
· Stay updated on industry trends and emerging technologies
· Collaborate with IT teams to integrate new technologies into existing systems.
· Provide hand-on support to our offices and data center.
Qualifications:
· Strong knowledge of network and security administration, controls, protocols, and best practices.
· Experience with SOC2 or HITRUST, and HIPAA Security and Privacy Rule.
· Proven experience as a Network Administrator or similar role.
· Proficiency in configuring firewalls, routers, and switches, encryption protocols, and certificates.
· Familiarity with cybersecurity principles and incident response strategies.
· Excellent problem-solving skills and attention to detail.
· Exceptional communication skills and ability to work independently and collaboratively in a team-oriented environment.
· Experience with cloud computing platforms (AWS, Azure) is a plus.
Relevant certifications (e.g., CCNA, CompTIA Security+) are preferred
Information Systems Security Officer (ISSO)
Port Hueneme, CA jobs
JT4 Point Mugu is seeking an Information Systems Security Specialist. This role is responsible for assessing, developing and implementing programs and controls set in place to help increase cybersecurity within our company. The Information Systems Security Specialist will be detail-oriented, have great problem-solving and analytical skills, and a passion for cybersecurity.
JT4, LLC provides engineering and technical support to multiple western test ranges for the U.S. Air Force, Space Force, and Navy under the Joint Range Technical Services Contract, better known as J-Tech II. JT4 develops and maintains realistic, integrated test and training environments and prepares our nation's war-fighting aircraft, weapons systems, and aircrews for today's missions and tomorrow's global challenges.
**An ideal candidate will have an active DoD secret clearance**
**This position is located at Point Mugu and is not eligible for telework**
Job Summary -- Essential Functions/Duties
This position is the on-site technical specialist for monitoring information systems and maintaining the environment of operation to include developing and updating System Security Plans, managing and controlling changes to the systems, conducting audits, providing incident response, perpetration for vulnerability assessments, and assessing the security impact of security and non-security-relevant changes.
Employee will be responsible to perform the following functions/duties:
Provides incident handling in conjunction with the Facility Security Office (FSO) and Information Security Officer / Information Systems Security Manager (ISSO/ISSM)
Assists in writing and maintaining computer security processes to meet Navy requirements of Risk Management Framework
Monitors computer system use and audits logs
Makes recommendations for future hardware / software implementations and related process improvements
This position requires skills in team building and customer service
Provides operational status as required
Uses established policies and procedures and subject matter knowledge to complete complex assignments requiring originality and ingenuity performed under minimum supervision with considerable latitude for independent contribution
Provides security training and awareness briefings
Other duties as assigned.
Requirements -- Education, Technical, and Work Experience
Associates or higher degree in Computer/Information Technology, or equivalent academic/technical training/certification. Possess two to three years of experience in computer system security and/or related areas of expertise. Must be compliant to DoD 8570.01-M levels and possess or working toward Security+ certification with a CISSP desired. Should have experience with JSIG, NIST 800 and NISPOM, Chapter 8.
In addition, an Information Systems Security Specialist must possess the following qualifications:
Must possess and apply a broad knowledge of principles, practices and procedures in computer security and information systems and working experience with Microsoft Office, Access, and Visio
Must possess experience supporting various system configurations such as Stand Alone, Local Area Networks, and Wide Area Networks
Must possess excellent skills in verbal and written communications, planning, and organizing
Ability to work under deadlines. Employee is expected to routinely cross fields in the completion of somewhat difficult and varied assignments. Government vehicle is used on an as-needed basis
Ability to work in a field environment at remote locations with occasional overnight assignments
Must qualify for and maintain a government security clearance
Must possess a valid, state-issued driver's license.
Security Incident Response Engineer III
Philadelphia, PA jobs
Are you considering a new role in Cyber Security and want to work in a company that is helping to change the world? Consider joining an organization serving the global scientific research community, supporting the brightest minds on the planet.
Are you a collaborative Incident Response Engineer looking to work for a mission driven global organization?
About the role, Elsevier is expanding its Global InfoSec Security Incident Response team. As a Security Incident Response Engineer, you will play a crucial role in our internal security support team, assisting with incident response investigations.
This team is entrusted with analyzing, triaging, scoping, containing, and providing guidance for remediation, as well as determining the root cause of security incidents. This team also is empowered by collecting and analyzing security incident-related data to identify indicators of attack and compromise.
Responsibilities:
Assisting in scoping security incidents and identifying indicators of attack and compromise.
Analyzing incident data from threat analytics tools.
Communicating recommendations and guidance based on security incident analysis.
Coordinating responses to security incidents with other security and consulting teams.
Developing, documenting, and implementing runbooks, capabilities, and techniques for Incident Response.
Performing security triage and analysis on endpoint, server, and network infrastructure.
Conducting activities necessary for immediate containment and short-term resolution of incidents.
Maintaining current knowledge of the threat landscape, emerging security threats, and vulnerabilities.
Investigating the root cause of complex security incidents.
Maintaining a high level of confidentiality.
Requirements
Possess experience in cybersecurity incident response or related fields.
Proven ability to analyze, triage, scope, contain, and remediate security incidents.
Have current and extensive knowledge of security technologies, tools, and processes.
Experience with major cloud providers, including cloud security, networking, and multi-cloud or hybrid deployments.
Have current skills in automation using PowerShell, Python, Java, or similar languages.
Experience in Linux and/or Mac administration. Experience in Network Security Administration or Systems Administration.
Experience supporting large, complex, and geographically distributed enterprise environments.
Preferred certifications: CISSP, CISM, SANS, GIAC, ethical hacking/penetration tester, or security risk assessment.
Elsevier employs 10,000 people worldwide, including over 2,500 technologists. We have supported the work of our research and health partners for more than 140 years. Growing from our roots in publishing, we offer knowledge and valuable analytics that help our users make breakthroughs and drive societal progress.
Information Security Architect -- MAHDC5660809
San Francisco, CA jobs
Information Security
Need Local to San Francisco, CA
Onsite role
Looking for independent folks.
Top Skills: KQL - kusto query language - used by different Microsoft security tools like sentinel or defender
SPL that Splunk uses
General incident response
actual incident tickets - resolve actual security incident tickets
Requirements
• Self-starter, able to readily explore and learn new areas and concepts.
• Knowledge and experience normally acquired through, or equivalent to, the completion of a Computer Science or Computer Engineering Bachelor's degree with a minimum of 5 years of job-related experience.
• Degrees in Computer Science or Engineering and/or relevant technically focused certifications in Cloud and/or enterprise security architecture such as GCAD or GDSA are advantageous
Experience with
• AWS commercial or government cloud
• Experience securing critical workloads in a cloud environment.
• Knowledge and experience with Databricks, Starburst, Collibra and Immuta is advantageous.
Job Role Summary
Lead and produce system threat models for integration of commercial components into a data lake platform. Help design secure cloud architectures. Propose effective security controls within the environment and identify and mitigate security vulnerabilities. Simplify complex security topics, lead discussion in technical and business teams, communicate risk accurately.
Skills
• Able to create AWS secure cloud architecture designs
• Understand current security threats, techniques, and landscape
• System threat modeling of applications and platforms
• Able to identify and provide mitigation for security vulnerabilities within applications and application environments based on threat models.
• Able to simplify complex security topics for consumption and critical decision making.
• Clear and accurate communication
• Able to lead/direct discussions with technical and business teams to achieve common goals.
• Able to work well within a team and support team goals
• Understand cyber security frameworks such as NIST 800-53
• Ability to work on a geographically distributed team across multiple time zones
• Familiarity with SAFe a plus
Responsibilities
• Evolve and mature our models, templates, standards and procedures related to secure application development and secure application and cloud architecture. Ensure these artifacts are in alignment with FRS policy and standards.
• Consult with our development teams to help them align with FRS policy and standards and meet the risk appetite of the customer.
• Work with members of application development teams to review and create secure application and infrastructure designs and patterns.
• Assist development teams by reviewing threat models related to applications and related systems. Analyze potential business impact and exposure leading to risk, based on emerging security threats, vulnerabilities, configurations, threat actor TTPs, etc.
• Evaluate CICD pipeline design, and related development team processes and help to mature and secure creation, management and utilization of pipelines.
• Assist in identification and integration of security focused tooling into development and operations processes.
• Support secure application architecture within the Federal Reserve System by fostering constructive dialogue and seeking resolution when confronted with discordant views.
• Solicit feedback and continuously improve your knowledge, skills and capabilities related to the position.
• Assist with recruiting activities and administrative work.
Security Architect GCP
Sunnyvale, CA jobs
Security Architect / Implementation Engineer
Duration: 6 Months contract with possibility of extension
We are seeking a highly skilled Security Architect / Security Implementation Engineer with expertise in designing, implementing, and integrating Google Cloud Security Command Center (SCC), Chronicle SIEM, and Cybereason XDR. The candidate will be responsible for architecting the end-to-end solution, implementing GCP native security controls, integrating third-party security tools, and producing detailed design and operational documentation.
Key Responsibilities:
Design and architect cloud-native security controls in GCP aligned with security and compliance frameworks (CIS, ISO 27001, NIST, etc.).
Implement Google Security Command Center (SCC) for threat detection, vulnerability management, and risk insights.
Architect and configure Chronicle SIEM for log ingestion, correlation, and advanced threat analytics.
Integrate Cybereason XDR with SCC, Chronicle, and other security tools to establish end-to-end threat detection and response workflows.
Define use cases, rules, policies, and security playbooks to automate detection and response.
Document the solution architecture, design decisions, configuration standards, and integration workflows.
Conduct knowledge transfer sessions with security operations and support teams.
Collaborate with GCP Cloud Platform teams, SOC teams, and compliance teams to align solutions with enterprise policies.
Required Skills & Experience:
8-12 years of overall IT security experience with at least 4-5 years in Google Cloud Security.
Proven experience with Google Security Command Center (SCC), Chronicle SIEM, and XDR platforms (Cybereason preferred).
Strong knowledge of GCP IAM, VPC Service Controls, Cloud Armor, DLP, Cloud Logging, Cloud Monitoring.
Hands-on experience in integrating SIEM, XDR, and native GCP security tools.
Experience with Terraform, Deployment Manager, or automation frameworks for security deployment.
Strong documentation and presentation skills.
Security certifications preferred: Google Professional Cloud Security Engineer, GCP Professional Architect, CISSP, CISM, CCSP.
Kubernetes Security Engineer
Hillsboro, OR jobs
Role: Kubernetes Security Engineer
About the job you're considering
Are you passionate about securing the future of cloud-native infrastructure in mission-critical environments? Join our team in Portland, OR, as a Kubernetes Security & Isolation Engineer supporting the aerospace industry, where security, reliability, and precision are paramount. In this onsite role, you'll focus on hardening and isolating Kubernetes clusters to minimize blast radius in the event of compromise. This includes enforcing Linux security modules like SELinux and AppArmor, leveraging Trusted Platform Module (TPM) for secure boot and attestation, implementing least privilege across nodes and workloads, and ensuring multi-tenant isolation within hybrid Kubernetes environments-spanning x86, ARM, and accelerator-based architectures. You'll work hands-on with cutting-edge technologies and collaborate with cross-functional teams to build resilient, secure infrastructure that supports aerospace innovation.
Your role
Architect and deploy security-first Kubernetes cluster configurations across diverse hardware platforms, including x86, ARM, and accelerators.
Enforce Linux security modules (SELinux, AppArmor) and sandboxing techniques (seccomp, gVisor, Kata) to protect workloads and system services.
Integrate TPM for secure boot and attestation, ensuring hardware and OS integrity, and support cryptographic operations with HSM/KMS systems.
Design multi-tenant isolation strategies using namespaces, node pools, and hardware partitioning to prevent lateral movement and reduce blast radius.
Apply least-privilege policies using RBAC, PodSecurityStandards, NetworkPolicies, and resource constraints to secure workload execution and mitigate denial-of-service risks.
Harden Kubernetes components (API server, etcd, kubelet) using CIS and NSA benchmarks, and implement kernel-level protections like seccomp-bpf and IMA/EVM.
Secure workload secrets using TPM-backed storage and tools like SealedSecrets, HashiCorp Vault, or SOPS for safe distribution and access control.
Strengthen supply chain security through image signing (cosign, Notary), SBOM scanning, and CI/CD vulnerability management.
Monitor runtime behavior with tools like Falco and Cilium Tetragon, and collaborate with SRE and Security teams to develop incident response runbooks and conduct breach simulation drills.
Your skills and experience
Bachelor's degree in Computer Science, Engineering, or a related technical field, with 8-10 years of experience in infrastructure, security, or systems engineering.
Deep expertise in Kubernetes (especially K3s) internals, including cluster hardening, multi-tenant isolation, and security architecture.
Advanced proficiency in Linux security features such as SELinux, AppArmor, seccomp, and kernel-level protections.
Hands-on experience with TPM for secure boot, attestation, and integration with HSM/KMS for cryptographic operations and secrets management.
Strong understanding of Pod Security frameworks (PodSecurityStandards, OPA, Gatekeeper, Kyverno) and implementation of RBAC, NetworkPolicies, and workload isolation at scale.
Familiarity with container runtimes (containerd, CRI-O, gVisor, Kata) and their security implications in hybrid environments.
Experience with runtime and supply chain security tools and frameworks, including Falco, Cilium Tetragon, cosign, Notary, SLSA, and NIST 800-190.
Knowledge of confidential computing (TEE, SGX, SEV), air-gapped deployments, and hardened Linux distributions like Flatcar and Bottlerocket.
Life at Capgemini
Capgemini supports all aspects of your well-being throughout the changing stages of your life and career. For eligible employees, we offer:
Flexible work
Healthcare including dental, vision, mental health, and well-being programs
Financial well-being programs such as 401(k) and Employee Share Ownership Plan
Paid time off and paid holidays
Paid parental leave
Family building benefits like adoption assistance, surrogacy, and cryopreservation
Social well-being benefits like subsidized back-up child/elder care and tutoring
Mentoring, coaching and learning programs
Employee Resource Group
Disaster Relief
About Capgemini Engineering
World leader in engineering and R&D services, Capgemini Engineering combines its broad industry knowledge and cutting-edge technologies in digital and software to support the convergence of the physical and digital worlds. Coupled with the capabilities of the rest of the Group, it helps clients to accelerate their journey towards Intelligent Industry. Capgemini Engineering has 65,000 engineer and scientist team members in over 30 countries across sectors including Aeronautics, Space, Defense, Naval, Automotive, Rail, Infrastructure & Transportation, Energy, Utilities & Chemicals, Life Sciences, Communications, Semiconductor & Electronics, Industrial & Consumer, Software & Internet.
Capgemini Engineering is an integral part of the Capgemini Group, a global business and technology transformation partner, helping organizations to accelerate their dual transition to a digital and sustainable world, while creating tangible impact for enterprises and society. It is a responsible and diverse group of 340,000 team members in more than 50 countries. With its strong over 55-year heritage, Capgemini is trusted by its clients to unlock the value of technology to address the entire breadth of their business needs. It delivers end-to-end services and solutions leveraging strengths from strategy and design to engineering, all fueled by its market leading capabilities in AI, generative AI, cloud and data, combined with its deep industry expertise and partner ecosystem. The Group reported 2024 global revenues of €22.1 billion.
Get the future you want | *****************
Disclaimer
Capgemini is an Equal Opportunity Employer encouraging inclusion in the workplace. All qualified applicants will receive consideration for employment without regard to race, national origin, gender identity/expression, age, religion, disability, sexual orientation, genetics, veteran status, marital status or any other characteristic protected by law. This is a general description of the Duties, Responsibilities and Qualifications required for this position. Physical, mental, sensory or environmental demands may be referenced in an attempt to communicate the manner in which this position traditionally is performed. Whenever necessary to provide individuals with disabilities an equal employment opportunity, Capgemini will consider reasonable accommodations that might involve varying job requirements and/or changing the way this job is performed, provided that such accommodations do not pose an undue hardship.
Capgemini is committed to providing reasonable accommodations during our recruitment process. If you need assistance or accommodation, please reach out to your recruiting contact.Please be aware that Capgemini may capture your image (video or screenshot) during the interview process and that image may be used for verification, including during the hiring and onboarding process.Click the following link for more information on your rights as an Applicant http://*****************/resources/equal-employment-opportunity-is-the-law Applicants for employment in the US must have valid work authorization that does not now and/or will not in the future require sponsorship of a visa for employment authorization in the US by Capgemini.
Application Security Engineer
Orlando, FL jobs
We are seeking a Senior Software Engineer with strong expertise in application security to join a forward-thinking technology team focused on enhancing secure software development practices. This role combines deep technical knowledge with the ability to collaborate across engineering and security teams to ensure robust, secure applications.
Role Overview
The ideal candidate will have a software development background (Java and JavaScript preferred) and hands-on experience in application security, including vulnerability analysis, remediation strategies, and secure coding principles. This position requires strong communication skills to act as a bridge between development and security teams, driving best practices and influencing architecture decisions.
Key Responsibilities
Implement and manage software security testing techniques aligned with enterprise standards.
Analyze and assess open-source vulnerabilities, including zero-day threats, and determine impact on applications.
Develop and execute remediation plans for identified risks, including code refactoring and dependency updates.
Champion secure coding practices and lead security reviews across engineering teams.
Provide technical designs and recommendations to reduce vulnerabilities and improve security posture.
Collaborate with development, architecture, and security teams to integrate security into the software delivery lifecycle.
Stay current on emerging threats, tools, and best practices in application and cloud security.
Desired Skills & Competencies
Strong experience in application security testing and software composition analysis.
Knowledge of web application security, cloud security, and container security.
Familiarity with OWASP, CWE, CVE standards and vulnerability mitigation techniques.
Hands-on experience with tools such as Sonatype, Qualys, SonarQube, and AWS Inspector.
Proficiency in Java, JavaScript, and Python.
Working knowledge of AWS services, Docker, Terraform, and DevSecOps practices.
Excellent communication skills and ability to influence technical and non-technical stakeholders.
Preferred Qualifications
Bachelor's degree in Computer Science or related field (AWS and security certifications a plus).
Experience collaborating with cross-functional teams and driving secure development initiatives.
Familiarity with industry-standard tools for code quality, repository management, and CI/CD pipelines.