Post job

Security Engineer jobs at The Blackstone

- 92 jobs
  • Cyber Threat Emulation Analyst

    Blackstone Talent Group 4.1company rating

    Security engineer job at The Blackstone

    Blackstone Talent Group, an award-winning technology consulting and talent agency, is seeking a Mid-Level Cyber Threat Emulation Analyst to join our Client's team. The Mid-Level Cyber Threat Emulation Analyst supports the Missile Defense Agency (MDA) on the Integrated Research and Development for Enterprise Solutions (IRES) contract. This position can be located in Colorado Springs or Huntsville. The candidate will: Perform Defensive Cyber Operations (DCO)/Cyber Security Service Provider (CSSP) duties outlined in Evaluator Scoring Metrics (ESM). Perform cybersecurity duties on customer networks (proactively and reactively) to improve enterprise-wide security posture. Analyze correlated assets, threats, and vulnerability data against known adversary exploits and techniques to determine impact and improve network defensive posture. Support the development, establishment, review, and update of DCO procedures, processes, manuals, and other documentation. Measures the effectiveness of the defense-in-depth architecture against known vulnerabilities. Generate vulnerability assessment reports for customers and escalate for further review. Support Incident Response across the enterprise IAW DoD regulations and instructions. Lead cyber events and incident investigations from start to conclusion, to include gathering data, analysis, and reporting. Assist in developing an Exploitation Analyst training plan by instructing, evaluating, and mentoring junior, mid, and senior analysts. Receive, review, and implement directed Higher Headquarters Tasking Orders (HHQ) and/or Fragmentary Orders weekly. Perform Cyber Threat Emulation (CTE) actions with the Automated Security Validation toolset as directed by HHQ Execute CTE actions within the approved network zones with the specific adversary tactics, techniques, and procedures (TTPs) documented in each engagement to assess toolset detection and alerting. Create custom dashboards and reports to communicate post-engagement analysis of each CTE engagement, including identified vulnerabilities, recommended remediation steps, assessment of the system's security posture, and incident response to the government within a specified amount of time after completion of engagement. Draft and submit Cyber Tasking Orders (CTOs) to remediate issues found in the report findings during CTE actions. Collaborate with the Cyberspace Domain Awareness (CDA) to develop evaluation criteria and methodologies aligned with HHQ inspection requirements and industry best practices. Basic Requirements: Must have 6 or more years of general (full-time) work experience Must have 4 years of combined experience with: Performing manual or automated penetration test in an enterprise environment Practical experience with vulnerability assessment, cybersecurity frameworks, or conducting risk assessments Experience performing the full life cycle of incident response and enterprise-level monitoring Must have 1 year of experience in management or leadership in a team environment Must have a current DoD 8570.01-M IAT Level II certification with Continuing Education (CE) - (CySA+, GICSP, GSEC, Security+ CE, SSCP) Must have, or obtain within 6 months of start date, a PenTest+ certification Must have an active DoD Secret Security Clearance Desired Requirements: Have a Bachelor's degree, or higher, in Cybersecurity, Computer Science, or a related field Have experience with Cyber Threat Emulation tools, policies, and procedures Have experience operating custom software on top of a Linux platform Have experience with security analysis and solutions in a WAN/LAN environment to include Routers, Switches, Network Devices, and Operating Systems (e.g., Windows, and Linux) Have experience with other Security Operations Centers (SOC)/DCO tools/applications, such as Firewalls, Intrusion Detection Systems / Intrusion Prevention Systems, Network Security Manager, Bluecoat, Barracuda, etc. Have experience performing security compliance scans across a WAN (ACAS/Nessus preferred) Have a background in configuration, troubleshooting, and deployment of host-based security (ESS preferred) Be able to mentor and train personnel in an evolving, high-paced environment Be familiar with DoD Security Operations Centers (SOC) (aka CSSP) Be familiar with DCO/Cybersecurity Service Provider (CSSP)-guiding security policies and procedures Have an active DoD Top Secret clearance Security Clearance Required: Secret Blackstone Talent Group is a wholly owned subsidiary of Blackstone Technology Group, a global IT services and software firm that implements technological solutions across commercial industry verticals and the US Federal Government. Blackstone's global talent augmentation practice was founded in 1998. Blackstone Talent Group has offices in San Francisco, Denver, Houston, Colorado Springs, and Washington, DC. We specialize in providing clients the best talent across a variety of industries and sectors. EOE of Minorities/Females/Veterans/Disabilities?
    $68k-93k yearly est. 53d ago
  • Network Engineer

    Forbes Technical Consulting 4.6company rating

    Itasca, IL jobs

    Title: Network Engineer Type: 24+ month contract Domestic and International Travel required: 20-25% US Citizens and GCH encouraged to apply (this opportunity does not offer sponsorship now or in the future) Required Skills: Proven experience in a Network Engineer role 5+ years' work experience in Cisco and FortiGate and other related network technologies Support network integration efforts related to mergers and acquisitions (M&A), including infrastructure consolidation, data migration, and application alignment across acquired entities. Previous experience designing\implementing\administrating an SD-WAN network Excellent knowledge of best practices around management, control, and monitoring of Cisco infrastructure Good Knowledge and experience with routing protocols like EIGRP, BGP, and MPLS Experience with hybrid network design\administration, on-prem and cloud environments like Azure and AWS Working knowledge of Cisco ISE environments Configuration and monitoring of Cisco WIFI networks Ability to set up and configure hardware connections to different WAN technologies Experience in configuration of Cisco Routers and Switches to support a multi - VLAN, environment Great at organizing, prioritizing, and multitasking Strong troubleshooting skills Bachelor's degree in related field or 5+ years work experience in CISCO and other related network technologies Holding credentials that demonstrates ability to perform a specific level of tasks related to implementing and maintaining network infrastructure. Troubleshoot network operation errors Experience working in Windows and VMware environments Contact: Ashley Falkenberg - Senior Recruiting Consultant Forbes Technical Consulting *******************
    $66k-83k yearly est. 2d ago
  • Platform Security Engineer

    Akka 3.9company rating

    San Francisco, CA jobs

    Akka's platform for agentic AI systems simplifies building new classes of applications, enabled by AI - based on our experience of building distributed systems We are seeking a hands-on Platform Security Engineer to join our team. You will help architect, implement, and maintain security solutions that safeguard our systems, applications, and data. You'll partner closely with development, operations, and product teams to build secure services from the ground up, detect and respond to threats, and continuously improve our security posture. Responsibilities Harden Akka's PaaS for the bring your own cloud deployment model Review existing security infrastructure, identify critical systems and data flows, and understand current compliance requirements. Conduct AI threat modeling and improve our adversarial robustness Maintain CNAPP solution to manage and secure cloud infrastructure, Kubernetes deployments, and applications. Establish policies and alerting mechanisms within the CNAPP. Develop plans to integrate telemetry data and configure processing for use in security analysis. Utilize next-gen SIEM platform. Optimize the existing SIEM, ensuring data integrity and compliance. Integrate security practices into the software development lifecycle. Implement measures to secure the software supply chain and develop secure development policies. Create and implement security policies as code to automate and enforce security controls. Identify and implement automation opportunities for collecting evidence required for compliance. Analyze findings and implement improvements to the organization's security posture, remediating vulnerabilities and deploying additional security controls. Create comprehensive documentation for all configurations, processes, and procedures. Provide training and knowledge sharing with other team members. Qualifications CISSP, OSCP, AWS Security Specialty, or GCP Cloud Security preferred AWS/Azure/GCP security services; Kubernetes hardening Solid understanding of cloud security principles and practices Familiarity with modern security tools and methodologies Strong analytical and problem-solving skills The team is distributed, which means that a very high degree of both autonomy and teamwork skills are required Excellent verbal and written communication skills (English) Frequently cited statistics show that women and underrepresented groups apply to jobs only if they meet 100% of the qualifications. Akka encourages you to break that statistic and to apply. No one ever meets 100% of the qualifications. We look forward to your application. Location This is a remote position where the candidate can be located anywhere in the world. We would like some overlap with America to allow proper cooperation with our current team. What We Offer Akka is a welcoming, transparent, and highly distributed company dedicated to creating high-performance distributed systems that bring success to all who use them. With a strong focus on work-life balance, our company offers a fast-paced, collaborative environment mixed with challenging and engaging work. This combination has attracted and retained some of the brightest minds in our technology communities. Benefits: Competitive salary with performance-based incentives. Remote-first, flexible work environment. Comprehensive health and wellness benefits. Opportunities for professional development and continuous learning. Collaborative, inclusive, and innovative company culture. Our Core Values: We're Authentic: We value transparency and genuine communication, without politics or games. We're honest and assume good intentions, cultivating trust and accountability within our organization and in our interactions with others outside of Akka. We're Customer-Focused: We value customer outcomes above all else. By prioritizing our customers' interests, and meeting them where they are today, we help ensure their success. We are dedicated to deeply understanding our customer's needs, anticipating challenges, navigating time constraints and striving to exceed expectations. We're Nonconventional: We value fearless innovation by challenging the status quo and embracing alternative approaches. Continuous learning and a growth mindset aimed at improving ourselves, our company, and our products, drives us to push boundaries and explore new solutions. Guided by a bias for action, we leverage industry and customer insights to inspire fresh ideas, enabling optimal future offerings. We're Persistent: We value excellence through continuous experimentation and courageous problem-solving. We recognize that achieving success often demands approaching challenges with tenacity and taking calculated risks to achieve leading-edge solutions. Akka is an Equal Opportunity Employer.
    $126k-179k yearly est. Auto-Apply 8d ago
  • Staff Security Engineer

    Abnormal 4.5company rating

    Los Angeles, CA jobs

    Abnormal AI is looking for a Staff Security Engineer to lead the development of the next evolution of our security capabilities at scale. This is a staff level, individual contributor role that demands deep technical security expertise, architectural leadership, and strong engineering fundamentals to work horizontally across our security organization and our stakeholder teams. You'll be responsible for driving the strategy and implementation of integrations between infrastructure and security tooling, pioneering security automation workflows, and strategically partnering with platform engineering teams to significantly harden our platforms. You will have access to AI and LLM with modern development copilots to help ideate, pressure test, and increase agility and efficiency. As a technical leader, you will own the architecture, development, and long-term vision of systems that enhance both preventative guardrails and detective capabilities, ensuring security is a foundational partner to our stakeholders. You'll mentor senior engineers, act as a principal technical liaison across multiple teams, and make critical contributions to keeping our platforms and customers secure. This is a role for engineers who are intellectually curious, possess a strong bias for action, and are motivated to bridge the gap between advanced security principles and engineering execution at an organizational level. Who you are A technologist that understands how to make the most of AI an LLM to influence and deliver. An intellectually curious, solution focused engineer with a security mindset who thrives in fast paced, complex environments. A technical leader who can architect and drive scalable security solutions while maintaining engineering velocity across multiple initiatives. Someone who thinks like an attacker but builds like a defender, possessing a deep understanding of both offensive and defensive security principles at an enterprise level. A highly collaborative engineer who can translate complex security requirements into actionable engineering tasks and influence cross-functional roadmaps. A mentor who enjoys teaching advanced security best practices and automation techniques to both junior and senior engineers. What you will do Lead and drive threat modeling and security design discussions with platform teams, translating complex risks into strategic engineering actions and architectural decisions. Collaborate extensively with platform, infrastructure, and development teams to architect and deploy scalable preventative controls via Infrastructure as Code (primarily Terraform, with CloudFormation experience welcome). Evaluate, uplift, and strategically integrate security tooling across commercial and cloud native capabilities, with a focus on scale, efficiency, and precision across the organization. Mentor and provide technical leadership to junior and senior engineers on automation best practices, secure architecture, and complex tooling integrations. Design, deploy, and optimize advanced automation workflows to correlate diverse signals, enrich alerts, and auto-remediate complex known failure patterns. Architect, build, and maintain critical integrations between cloud infrastructure and security tooling (e.g. CSPM, SOAR, JIT/PAM, Cloud and Kubernetes IAM ), utilizing industry best practices and real world experiences. Serve as a hands on technical contributor and lead during critical security incidents, tracing complex system behavior and enhancing response processes and playbooks. Stay current with emerging AI platforms and advanced security technologies, evaluating them for strategic business applicability and integration opportunities. Must Haves Proven track record of delivering significant impact in security engineering or infrastructure security roles, ideally in large scale cloud environments. Expert level hands on experience with AWS tooling (IAM, KMS, Config, Lambda, EKS) and strong working knowledge of the equivalents in Azure and GCP. Exceptional scripting and development skills in Python and/or Go; deep proficiency with Git, Linux, and advanced infrastructure automation patterns. Expertise in efficient use of AI and LLMs to deliver. Expertise in architecting, integrating, or building tooling for security visibility and protection. (SIEM, SOAR, vulnerability management, and CSPM platforms). Extensive experience deploying and managing preventative security controls via Infrastructure as Code (Terraform or CloudFormation) for complex systems. Passion for digging into complex logs, tracing distributed events, and leading incident analysis workflows. Proven ability to influence, lead, and collaborate cross functionally with engineering, infra, and IT at a senior level. Exceptional written communication and documentation skills, capable of conveying complex designs and strategies to educate and influence diverse audiences. Deep background with using and securing container orchestration (Kubernetes), including advanced workload security and service mesh controls. Nice to Have Experience working in fast paced or startup environments and navigating ambiguous ownership lines, demonstrating proactive leadership and a team mentality. Familiarity with JavaScript or TypeScript, particularly from an application security perspective. . Hands-on experience with commercial Cloud Security tools (CNAPP, CSPM, DSPM, KSPM) and using them to derive value and minimize toil. Strategic partnership with cloud infrastructure teams to implement and maintain advanced security controls across multi cloud services. Prior experience building security telemetry pipelines or log correlation frameworks for large scale data. Exposure to compliance frameworks (SOC 2, ISO 27001, Frameworks FedRAMP) and a deep understanding of how engineering decisions affect auditability. Familiarity with CI/CD systems and integrating advanced security checks into developer workflows. #LI-AJ1
    $114k-160k yearly est. Auto-Apply 43d ago
  • Lead Adversarial Security Engineer

    Trellix 4.1company rating

    Phoenix, AZ jobs

    **_Job Title:_** Lead Adversarial Security Engineer **About** **Trellix:** **Trellix, the trusted CISO ally, is redefining the future of cybersecurity and soulful work.** Our comprehensive, GenAI-powered platform helps organizations confronted by today's most advanced threats gain confidence in the protection and resilience of their operations. Along with an extensive partner ecosystem, we accelerate technology innovation through artificial intelligence, automation, and analytics to empower over 53,000 customers with responsibly architected security solutions. We also recognize the importance of closing the 4-million-person cybersecurity talent gap. We aim to create a home for anyone seeking a meaningful future in cybersecurity and look for candidates across industries to join us in soulful work. More at ************************ . **_Role Overview:_** Trellix is seeking an Adversarial Security Engineer to lead the evolution of its cybersecurity posture. This is a senior, hands-on, remote-first role for a red/blue/purple expert who possesses a valuable blend of offensive tradecraft and defensive-engineering skills. **Role Overview:** As a lead member of the security operations team, and reporting to the Deputy CISO the mission of this role is to bridge the gap between "what if" and "what is" to continuously test the organization's defenses, find gaps, and personally lead the engineering effort to close them. By collaborating with the Security Operations Center (SOC), Threat Intelligence, and infrastructure teams, this expert will act as a force multiplier, mentoring junior security operations staff and providing the technical leadership to measurably improve the ability to detect and respond to advanced threats. **About the role:** + Plan and execute sophisticated, end-to-end red team engagements against our on-premise and cloud infrastructure. + Develop and validate new detection logic, transforming the results of your own attacks into high-fidelity alerts. + Lead continuous purple team exercises, acting as the primary bridge between the SOC, Threat Intelligence, and Detection Engineering teams. + Leverage Attack Surface Management (ASM) data to find "Shadow IT" and prioritize your offensive operations based on the most likely and impactful attack vectors. + Act as a senior technical leader, mentoring SOC analysts and junior engineers on advanced attack chains, detection theory, and defensive best practices. + Communicate complex findings and remediation strategies to a wide range of stakeholders, from highly technical engineers to executive leadership. **About you:** + You have a blended career path of 7+ years, demonstrating experience in both offensive security (like Red Teaming) and defensive operations (like Detection Engineering or Threat Hunting). + You possess exceptional communication skills, with an ability to create reports and presentations for both highly technical and executive audiences. + You are a U.S. citizen. + Your technical expertise is built on a deep, practical understanding of frameworks like MITRE ATT&CK and the Diamond Model. + You have proficiency in modern offensive tools and C2 frameworks (e.g., Cobalt Strike, Metasploit) and/or experience developing custom attack methods to evade EDR and network controls. + You are proficient in writing, tuning, and validating detection logic in SIEM and EDR platforms. + Your knowledge of automation is clear from your proficiency in any scripting languages such as Python or PowerShell. + You have practical experience assessing and defending modern cloud environments. + You may hold advanced offensive (e.g., OSCP, OSEP, GXPN) or defensive (e.g., GCIH, GDAT) certifications. + You may contribute to the community through public-facing research, conference talks, or open-source tools. **_Company Benefits and Perks:_** We believe that the best solutions are developed by teams who embrace each other's unique experiences, skills, and abilities. We work hard to create a dynamic workforce where we encourage everyone to bring their authentic selves to work every day. We offer a variety of social programs, flexible work hours and family-friendly benefits to all of our employees. + Retirement Plans + Medical, Dental and Vision Coverage + Paid Time Off + Paid Parental Leave + Support for Community Involvement We're serious about our commitment to a workplace where everyone can thrive and contribute to our industry-leading products and customer support, which is why we prohibit discrimination and harassment based on race, color, religion, gender, national origin, age, disability, veteran status, marital status, pregnancy, gender expression or identity, sexual orientation or any other legally protected status.
    $86k-113k yearly est. 21d ago
  • System Security Engineer - Clifton, NJ - Active Secret Clearance Required

    SOC Support Services 4.7company rating

    Clifton, NJ jobs

    System Security Engineer needed for a contract to direct-hire opportunity with SOC's client to work on-site in Clifton, NJ. * Active Secret clearance is required prior to starting* Qualifications: * Bachelor's Degree and a minimum of 9 years of prior relevant experience. Graduate Degree and a minimum of 7 years of prior related experience. In lieu of a degree, minimum of 13 years of prior related experience. * Minimum of Collateral Secret security clearance required. * Must be able to obtain and maintain a DOD 8140 certification (or NIST 800-181), appropriate for the position within 6-months of start. * Prior or current experience with the development and implementation of Anti-Tamper (AT) for the protection of CPI throughout the System Development Lifecycle. Preferred Additional Skills: * Experience in configuration and use of cyber defense and vulnerability assessment tools such as ACAS and SCC. * NSA Type 1 Certification of cryptographic high assurance devices. * Experience with NSA High Assurance products and IASRD and SERD requirements. * Professional experience with RMF (Risk Management Framework) in embedded systems. * Active TS/SCI Clearance is highly desired. Employment Prerequisites The following requirements must be met to be eligible for this position: successful completion of a background investigation and drug urinalysis. SOC, a Day & Zimmermann company, is an Equal Opportunity Employer, EOE AA M/F/Vet/Disability. Note: Any pay ranges displayed are estimations, which may have been provided by job boards. Actual pay is determined by an applicant's experience, technical expertise, and other qualifications as listed in the job description. All qualified applicants are welcome to apply. Estimated Min Rate: $68.29 Estimated Max Rate: $97.56
    $68.3 hourly 37d ago
  • Senior Security Engineer

    Abnormal 4.5company rating

    Los Angeles, CA jobs

    About the Role Abnormal AI is seeking a Senior Security Engineer to ensure Abnormal's FedRAMP environment operates securely, resiliently, and efficiently. This role focuses on security operations engineering, with responsibilities spanning CI/CD pipelines, access management, patch management, change reviews, incident response, and security automation. The engineer will directly own and improve the technical workflows that keep Abnormal Gov systems compliant and resilient at scale. The ideal candidate combines deep cloud and infrastructure security expertise with operational discipline, and is AI-enabled to maximize efficiency and reduce overhead. What you will do Maintain and improve CI/CD pipelines to support secure deployments and infrastructure workflows. Manage infrastructure-as-code (IaC) PR and Change Control Board reviews, ensuring changes are tested, approved, and secure before release. Perform security impact analyses (SIAs) for system/application changes and provide recommendations. Run OS and infrastructure patch cycles; manage hardened images and patch workflows for FedRAMP environments. Govern access management, including account provisioning, RBAC module maintenance, and periodic reviews. Manage logging and monitoring pipelines; tune SIEM ingestion and alerting for coverage and accuracy. Triage and respond to security incidents, from alert investigation through containment, recovery, and after-action reporting. Maintain and refine runbooks, SOPs, and documentation to ensure consistent operations and audit readiness. Collaborate with DevInfra, FedOps, Product, and Compliance teams to embed secure practices into operations and development. Must Haves 5+ years in security engineering or infrastructure operations within federal or regulated cloud environments. Strong familiarity with NIST 800-53 controls and continuous monitoring practices. Proven delivery of AWS/SaaS security best practices. Hands-on expertise with CI/CD, infrastructure automation, and IaC security practices. Experience in patch management, hardened baselines, and secure image pipelines. Strong knowledge of identity and access management (IAM) design and enforcement in large-scale environments. Proven ability to manage SIEM pipelines and lead Tier 1/ Tier 2 incident response. Strong technical documentation, collaboration, and incident/project management skills. Nice to Have Experience integrating security automation into CI/CD pipelines and SecOps workflows. Prior experience supporting federal audits or 3PAO engagements. Knowledge of SaaS security operations and monitoring at scale. Experience driving automation in security operations, compliance tracking, and evidence management. Knowledge of SaaS security operations and modern cloud environments; exposure to DevSecOps pipelines or security reviews for Terraform/containers. #LI-AJ1
    $130k-176k yearly est. Auto-Apply 43d ago
  • Senior Cyber Defense Analyst

    Abnormal 4.5company rating

    San Francisco, CA jobs

    About the Role We at Abnormal AI are looking for a hands-on Security Operations/ Cyber Defense Analyst who thrives in a fast-paced, engineering-driven environment. You'll be responsible for monitoring, investigating, and responding to security alerts across cloud, endpoint, identity, and application layers. You'll work closely with detection engineers, cloud security, and IT teams to protect our hybrid environment from threats in real time. This is not a "click-through-the-console" SOC role - we're looking for someone who can think critically, automate relentlessly, and own incidents end-to-end. Key Responsibilities Detection & Triage: Monitor alerts from tools like SIEM, EDR, IAM, CSPM, CDR etc. Perform initial triage, enrichment, and correlation across multiple data sources. Identify false positives and fine-tune rules with detection engineering. Incident Response: Lead containment, eradication, and recovery for endpoint, cloud, and identity incidents. Document and communicate incidents through SOAR/Jira/ServiceNow workflows. Perform root cause analysis and propose permanent preventive controls. Threat Hunting & Analysis: Proactively hunt using hypotheses mapped to MITRE ATT&CK. Investigate anomalies across CloudTrail, Okta, GitHub, and other telemetry sources. Collaborate with threat intelligence to identify emerging TTPs. Automation & Process Improvement: Build or enhance playbooks in SOAR (Torq or equivalent). Create custom enrichment scripts and automations (Python, Bash, etc.). Suggest new detection logic and operational improvements. Reporting & Metrics: Track and report operational metrics (MTTD, MTTR, incident categories). Maintain documentation and lessons learned. Required Skills & Qualifications 5-7 years of hands-on SOC or Incident Response experience in a cloud-first or hybrid environment. Strong understanding of attacker lifecycle, MITRE ATT&CK, and threat actor TTPs. Experience with EDR (CrowdStrike preferred), SIEM (Splunk preferred), and SOAR (Torq, XSOAR, or Phantom). Familiarity with AWS, Okta, and SaaS platforms. Proficiency in writing queries and automations using Python, SPL, or equivalent. Excellent analytical and investigative skills - capable of operating independently with minimal hand-holding. Strong documentation and communication skills for technical and executive audiences. Nice to Have Experience with CSPM/CDR/VM tools. Knowledge of Containers and Kubernetes security. Relevant certifications like CEH, Security+, GCIH, GCIA, or AWS Security Specialty. What Success Looks Like You consistently deliver high-quality triage with minimal false positives. You automate repetitive tasks instead of manually doing them twice. You can take a vague alert and turn it into a well-documented case with actionable findings. #LI-EM5 You make measurable improvements to detection coverage, response time, or tooling maturity.
    $89k-122k yearly est. Auto-Apply 33d ago
  • Analyst Sr., Cloud Security

    Carnival Corporation 4.3company rating

    Miami, FL jobs

    The Senior Cloud Security Analyst is responsible for daily management of security posture pertaining to our digital environment operations as well as support of identity access management (IAM) for the Holland America, Seabourn, and Holland America Princess (Brands). This role requires assisting the GCS IAM team with bringing the Brands into and maintaining compliance in accordance with GCS policies and directives. All responsibilities transverse shoreside and shipboard across the fleets. This role requires experience in evaluation of cloud environment security posture, security directives and project creation, as well as risk mitigation to achieve and maintain desired business outcomes. This position requires working with brand stakeholders in pursuit of security and compliance solutions across the Brands. Essential Functions: * Management, evaluation, maintenance, and enhancement of the cloud security posture. * Continuous improvement of the brand vulnerability management people, process, and technology analyzing cloud environment reporting, prioritizing, and working with brand IT to make Cloud Security Management data actionable and understandable. * Operation of identity and access processes and controls for SailPoint, Active Directory, Email, and Collaboration Platforms and cloud-based solutions. * Evaluation and providing directives and guidance regarding our SIEM integrations, identifying potential blind spots, and assisting with configuration validations. Augment and assist GISCS Security Operations, monitoring and triaging brand security events (Security Operations). * Creates visual information in the form of dashboard(s) and reports for executives and business stakeholders on a regular basis that communicates Cybersecurity risks and KRIs. Provides regular information briefs to Senior Leadership. * Helping to continuously improve the brands cybersecurity Key Risk Indicators (KRI) and reporting. * Assisting with security architecture reviews for new and proposed integrated solutions. * Evaluating and assisting with managing shoreside and shipboard access management and cloud processes and solutions. * Providing consultation and training to brand IT team members on new configurations and solutions. * Assisting the Cybersecurity PMO to build and prioritize backlog. Qualifications: * High School Diploma or GED in Computer Science or other technical degree or equivalent experience. * Bachelor's Degree preferred. * Minimum 5+ years of relevant industry experience with access management and cloud security. Knowledge, Skills, and Abilities: * Hands-on experience with Azure administration * Hands-on experience with Orca Security * Hands-on experience with AWS security administration * Hands-on experience with PowerShell scripting * Hands-on experience with SailPoint IAM solution * Hands-on experience with Active Directory * Hands-on experience with Windows workstations and server operating systems * Hands-on experience with managing security for AWS cloud environment tenants * Proven track record of taking ownership of strategic initiatives and driving results in complex environments * Proven success in contributing to a team-oriented environment * Proven ability to work creatively and analytically in a problem-solving environment Physical Demands: Must be able to remain in a stationary position at a desk and/or computer for extended periods of time. Travel: Less than 25% with shipboard travel likely Work Conditions: Work primarily in a climate-controlled environment with minimal safety/health hazard potential. This position is classified as "in-office." As an in-office role, it requires employees to work from a designated Carnival office in South Florida Tuesday through Thursday each week. Employees may work from their homes on Mondays and Fridays. Candidates must be located in (or willing to relocate to) the Miami/Ft. Lauderdale area. Offers to selected candidates will be made on a fair and equitable basis, taking into account specific job-related skills and experience. At Carnival, your total rewards package is much more than your base salary. All non-sales roles participate in an annual cash bonus program, while sales roles have an incentive plan. Director and above roles may also be eligible to participate in Carnival's discretionary equity incentive plan. Plus, Carnival provides comprehensive and innovative benefits to meet your needs, including: * Health Benefits: * Cost-effective medical, dental and vision plans * Employee Assistance Program and other mental health resources * Additional programs include company paid term life insurance and disability coverage * Financial Benefits: * 401(k) plan that includes a company match * Employee Stock Purchase plan * Paid Time Off * Holidays - All full-time and part-time with benefits employees receive days off for 8 company-wide holidays, plus 2 additional floating holidays to be taken at the employee's discretion. * Vacation Time - All full-time employees at the manager and below level start with 14 days/year; director and above level start with 19 days/year. Part-time with benefits employees receive time off based on the number of hours they work, with a minimum of 84 hours/year. All employees gain additional vacation time with further tenure. * Sick Time - All full-time employees receive 80 hours of sick time each year. Part-time with benefits employees receive time off based on the number of hours they work, with a minimum of 60 hours each year. * Other Benefits * Complementary stand-by cruises, employee discounts on confirmed cruises, plus special rates for family and friends * Personal and professional learning and development resources including tuition reimbursement * On-site Fitness center at our Miami campus #LI-Hybrid #Corp #LI-SH1 About Us Carnival Corporation & plc is the world's largest leisure travel company, our mission to deliver unforgettable happiness to our guest through our diverse portfolio of leading cruise brands and island destinations, including Carnival Cruise Line, Holland America Line, Princess Cruises, and Seabourn in North America and Australia; P&O Cruises and Cunard Line in the United Kingdom; AIDA in Germany; Costa Cruises in Southern Europe. Join us and embark on a career that offers not only the chance to grow professionally but also the opportunity to be part of a global community that makes a difference. In addition to other duties/functions, this position requires full commitment and support for promoting ethical and compliant culture. More specifically, this position requires integrity, honesty, and respectful treatment of others, as well as a willingness to speak up when they see misconduct or have concerns. Carnival Corporation & plc and Carnival Cruise Line is an equal employment opportunity/affirmative action employer. In this regard, it does not discriminate against any qualified individual on the basis of sex, race, color, national origin, religion, sexual orientation, age, marital status, mental, physical or sensory disability, or any other classification protected by applicable local, state, federal, and/or international law. ***************************************************************** ******************************************************************
    $86k-104k yearly est. 18d ago
  • Analyst Sr., Cloud Security

    Carnival Cruise Line 4.3company rating

    Miami, FL jobs

    The Senior Cloud Security Analyst is responsible for daily management of security posture pertaining to our digital environment operations as well as support of identity access management (IAM) for the Holland America, Seabourn, and Holland America Princess (Brands). This role requires assisting the GCS IAM team with bringing the Brands into and maintaining compliance in accordance with GCS policies and directives. All responsibilities transverse shoreside and shipboard across the fleets. This role requires experience in evaluation of cloud environment security posture, security directives and project creation, as well as risk mitigation to achieve and maintain desired business outcomes. This position requires working with brand stakeholders in pursuit of security and compliance solutions across the Brands. Essential Functions: Management, evaluation, maintenance, and enhancement of the cloud security posture. Continuous improvement of the brand vulnerability management people, process, and technology analyzing cloud environment reporting, prioritizing, and working with brand IT to make Cloud Security Management data actionable and understandable. Operation of identity and access processes and controls for SailPoint, Active Directory, Email, and Collaboration Platforms and cloud-based solutions. Evaluation and providing directives and guidance regarding our SIEM integrations, identifying potential blind spots, and assisting with configuration validations. Augment and assist GISCS Security Operations, monitoring and triaging brand security events (Security Operations). Creates visual information in the form of dashboard(s) and reports for executives and business stakeholders on a regular basis that communicates Cybersecurity risks and KRIs. Provides regular information briefs to Senior Leadership. Helping to continuously improve the brands cybersecurity Key Risk Indicators (KRI) and reporting. Assisting with security architecture reviews for new and proposed integrated solutions. Evaluating and assisting with managing shoreside and shipboard access management and cloud processes and solutions. Providing consultation and training to brand IT team members on new configurations and solutions. Assisting the Cybersecurity PMO to build and prioritize backlog. Qualifications: High School Diploma or GED in Computer Science or other technical degree or equivalent experience. Bachelor's Degree preferred. Minimum 5+ years of relevant industry experience with access management and cloud security. Knowledge, Skills, and Abilities: Hands-on experience with Azure administration Hands-on experience with Orca Security Hands-on experience with AWS security administration Hands-on experience with PowerShell scripting Hands-on experience with SailPoint IAM solution Hands-on experience with Active Directory Hands-on experience with Windows workstations and server operating systems Hands-on experience with managing security for AWS cloud environment tenants Proven track record of taking ownership of strategic initiatives and driving results in complex environments Proven success in contributing to a team-oriented environment Proven ability to work creatively and analytically in a problem-solving environment Physical Demands: Must be able to remain in a stationary position at a desk and/or computer for extended periods of time. Travel: Less than 25% with shipboard travel likely Work Conditions: Work primarily in a climate-controlled environment with minimal safety/health hazard potential. This position is classified as “in-office.” As an in-office role, it requires employees to work from a designated Carnival office in South Florida Tuesday through Thursday each week. Employees may work from their homes on Mondays and Fridays. Candidates must be located in (or willing to relocate to) the Miami/Ft. Lauderdale area. Offers to selected candidates will be made on a fair and equitable basis, taking into account specific job-related skills and experience. At Carnival, your total rewards package is much more than your base salary. All non-sales roles participate in an annual cash bonus program, while sales roles have an incentive plan. Director and above roles may also be eligible to participate in Carnival's discretionary equity incentive plan. Plus, Carnival provides comprehensive and innovative benefits to meet your needs, including: Health Benefits: Cost-effective medical, dental and vision plans Employee Assistance Program and other mental health resources Additional programs include company paid term life insurance and disability coverage Financial Benefits: 401(k) plan that includes a company match Employee Stock Purchase plan Paid Time Off Holidays - All full-time and part-time with benefits employees receive days off for 8 company-wide holidays, plus 2 additional floating holidays to be taken at the employee's discretion. Vacation Time - All full-time employees at the manager and below level start with 14 days/year; director and above level start with 19 days/year. Part-time with benefits employees receive time off based on the number of hours they work, with a minimum of 84 hours/year. All employees gain additional vacation time with further tenure. Sick Time - All full-time employees receive 80 hours of sick time each year. Part-time with benefits employees receive time off based on the number of hours they work, with a minimum of 60 hours each year. Other Benefits Complementary stand-by cruises, employee discounts on confirmed cruises, plus special rates for family and friends Personal and professional learning and development resources including tuition reimbursement On-site Fitness center at our Miami campus #LI-Hybrid #Corp #LI-SH1
    $86k-104k yearly est. Auto-Apply 18d ago
  • Analyst Sr., Cloud Security

    Carnival Corporation 4.3company rating

    Miami, FL jobs

    The Senior Cloud Security Analyst is responsible for daily management of security posture pertaining to our digital environment operations as well as support of identity access management (IAM) for the Holland America, Seabourn, and Holland America Princess (Brands). This role requires assisting the GCS IAM team with bringing the Brands into and maintaining compliance in accordance with GCS policies and directives. All responsibilities transverse shoreside and shipboard across the fleets. This role requires experience in evaluation of cloud environment security posture, security directives and project creation, as well as risk mitigation to achieve and maintain desired business outcomes. This position requires working with brand stakeholders in pursuit of security and compliance solutions across the Brands. Essential Functions: Management, evaluation, maintenance, and enhancement of the cloud security posture. Continuous improvement of the brand vulnerability management people, process, and technology analyzing cloud environment reporting, prioritizing, and working with brand IT to make Cloud Security Management data actionable and understandable. Operation of identity and access processes and controls for SailPoint, Active Directory, Email, and Collaboration Platforms and cloud-based solutions. Evaluation and providing directives and guidance regarding our SIEM integrations, identifying potential blind spots, and assisting with configuration validations. Augment and assist GISCS Security Operations, monitoring and triaging brand security events (Security Operations). Creates visual information in the form of dashboard(s) and reports for executives and business stakeholders on a regular basis that communicates Cybersecurity risks and KRIs. Provides regular information briefs to Senior Leadership. Helping to continuously improve the brands cybersecurity Key Risk Indicators (KRI) and reporting. Assisting with security architecture reviews for new and proposed integrated solutions. Evaluating and assisting with managing shoreside and shipboard access management and cloud processes and solutions. Providing consultation and training to brand IT team members on new configurations and solutions. Assisting the Cybersecurity PMO to build and prioritize backlog. Qualifications: High School Diploma or GED in Computer Science or other technical degree or equivalent experience. Bachelor's Degree preferred. Minimum 5+ years of relevant industry experience with access management and cloud security. Knowledge, Skills, and Abilities: Hands-on experience with Azure administration Hands-on experience with Orca Security Hands-on experience with AWS security administration Hands-on experience with PowerShell scripting Hands-on experience with SailPoint IAM solution Hands-on experience with Active Directory Hands-on experience with Windows workstations and server operating systems Hands-on experience with managing security for AWS cloud environment tenants Proven track record of taking ownership of strategic initiatives and driving results in complex environments Proven success in contributing to a team-oriented environment Proven ability to work creatively and analytically in a problem-solving environment Physical Demands: Must be able to remain in a stationary position at a desk and/or computer for extended periods of time. Travel: Less than 25% with shipboard travel likely Work Conditions: Work primarily in a climate-controlled environment with minimal safety/health hazard potential. This position is classified as “in-office.” As an in-office role, it requires employees to work from a designated Carnival office in South Florida Tuesday through Thursday each week. Employees may work from their homes on Mondays and Fridays. Candidates must be located in (or willing to relocate to) the Miami/Ft. Lauderdale area. Offers to selected candidates will be made on a fair and equitable basis, taking into account specific job-related skills and experience. At Carnival, your total rewards package is much more than your base salary. All non-sales roles participate in an annual cash bonus program, while sales roles have an incentive plan. Director and above roles may also be eligible to participate in Carnival's discretionary equity incentive plan. Plus, Carnival provides comprehensive and innovative benefits to meet your needs, including: Health Benefits: Cost-effective medical, dental and vision plans Employee Assistance Program and other mental health resources Additional programs include company paid term life insurance and disability coverage Financial Benefits: 401(k) plan that includes a company match Employee Stock Purchase plan Paid Time Off Holidays - All full-time and part-time with benefits employees receive days off for 8 company-wide holidays, plus 2 additional floating holidays to be taken at the employee's discretion. Vacation Time - All full-time employees at the manager and below level start with 14 days/year; director and above level start with 19 days/year. Part-time with benefits employees receive time off based on the number of hours they work, with a minimum of 84 hours/year. All employees gain additional vacation time with further tenure. Sick Time - All full-time employees receive 80 hours of sick time each year. Part-time with benefits employees receive time off based on the number of hours they work, with a minimum of 60 hours each year. Other Benefits Complementary stand-by cruises, employee discounts on confirmed cruises, plus special rates for family and friends Personal and professional learning and development resources including tuition reimbursement On-site Fitness center at our Miami campus #LI-Hybrid #Corp #LI-SH1
    $86k-104k yearly est. Auto-Apply 18d ago
  • Analyst Sr., Cloud Security

    Carnival Cruise Line 4.3company rating

    Miami, FL jobs

    The Senior Cloud Security Analyst is responsible for daily management of security posture pertaining to our digital environment operations as well as support of identity access management (IAM) for the Holland America, Seabourn, and Holland America Princess (Brands). This role requires assisting the GCS IAM team with bringing the Brands into and maintaining compliance in accordance with GCS policies and directives. All responsibilities transverse shoreside and shipboard across the fleets. This role requires experience in evaluation of cloud environment security posture, security directives and project creation, as well as risk mitigation to achieve and maintain desired business outcomes. This position requires working with brand stakeholders in pursuit of security and compliance solutions across the Brands. **Essential Functions:** + Management, evaluation, maintenance, and enhancement of the cloud security posture. + Continuous improvement of the brand vulnerability management people, process, and technology analyzing cloud environment reporting, prioritizing, and working with brand IT to make Cloud Security Management data actionable and understandable. + Operation of identity and access processes and controls for SailPoint, Active Directory, Email, and Collaboration Platforms and cloud-based solutions. + Evaluation and providing directives and guidance regarding our SIEM integrations, identifying potential blind spots, and assisting with configuration validations. Augment and assist GISCS Security Operations, monitoring and triaging brand security events (Security Operations). + Creates visual information in the form of dashboard(s) and reports for executives and business stakeholders on a regular basis that communicates Cybersecurity risks and KRIs. Provides regular information briefs to Senior Leadership. + Helping to continuously improve the brands cybersecurity Key Risk Indicators (KRI) and reporting. + Assisting with security architecture reviews for new and proposed integrated solutions. + Evaluating and assisting with managing shoreside and shipboard access management and cloud processes and solutions. + Providing consultation and training to brand IT team members on new configurations and solutions. + Assisting the Cybersecurity PMO to build and prioritize backlog. **Qualifications:** + High School Diploma or GED in Computer Science or other technical degree or equivalent experience. + Bachelor's Degree preferred. + Minimum 5+ years of relevant industry experience with access management and cloud security. **Knowledge, Skills, and Abilities:** + Hands-on experience with Azure administration + Hands-on experience with Orca Security + Hands-on experience with AWS security administration + Hands-on experience with PowerShell scripting + Hands-on experience with SailPoint IAM solution + Hands-on experience with Active Directory + Hands-on experience with Windows workstations and server operating systems + Hands-on experience with managing security for AWS cloud environment tenants + Proven track record of taking ownership of strategic initiatives and driving results in complex environments + Proven success in contributing to a team-oriented environment + Proven ability to work creatively and analytically in a problem-solving environment Physical Demands: Must be able to remain in a stationary position at a desk and/or computer for extended periods of time. Travel: Less than 25% with shipboard travel likely Work Conditions: Work primarily in a climate-controlled environment with minimal safety/health hazard potential. This position is classified as "in-office." As an in-office role, it requires employees to work from a designated Carnival office in South Florida Tuesday through Thursday each week. Employees may work from their homes on Mondays and Fridays. Candidates must be located in (or willing to relocate to) the Miami/Ft. Lauderdale area. Offers to selected candidates will be made on a fair and equitable basis, taking into account specific job-related skills and experience. At Carnival, your total rewards package is much more than your base salary. All non-sales roles participate in an annual cash bonus program, while sales roles have an incentive plan. Director and above roles may also be eligible to participate in Carnival's discretionary equity incentive plan. Plus, Carnival provides comprehensive and innovative benefits to meet your needs, including: + Health Benefits: + Cost-effective medical, dental and vision plans + Employee Assistance Program and other mental health resources + Additional programs include company paid term life insurance and disability coverage + Financial Benefits: + 401(k) plan that includes a company match + Employee Stock Purchase plan + Paid Time Off + Holidays - All full-time and part-time with benefits employees receive days off for 8 company-wide holidays, plus 2 additional floating holidays to be taken at the employee's discretion. + Vacation Time - All full-time employees at the manager and below level start with 14 days/year; director and above level start with 19 days/year. Part-time with benefits employees receive time off based on the number of hours they work, with a minimum of 84 hours/year. All employees gain additional vacation time with further tenure. + Sick Time - All full-time employees receive 80 hours of sick time each year. Part-time with benefits employees receive time off based on the number of hours they work, with a minimum of 60 hours each year. + Other Benefits + Complementary stand-by cruises, employee discounts on confirmed cruises, plus special rates for family and friends + Personal and professional learning and development resources including tuition reimbursement + On-site Fitness center at our Miami campus \#LI-Hybrid \#Corp \#LI-SH1 About Us Carnival Corporation & plc is the world's largest leisure travel company, our mission to deliver unforgettable happiness to our guest through our diverse portfolio of leading cruise brands and island destinations, including Carnival Cruise Line, Holland America Line, Princess Cruises, and Seabourn in North America and Australia; P&O Cruises and Cunard Line in the United Kingdom; AIDA in Germany; Costa Cruises in Southern Europe. Join us and embark on a career that offers not only the chance to grow professionally but also the opportunity to be part of a global community that makes a difference. In addition to other duties/functions, this position requires full commitment and support for promoting ethical and compliant culture. More specifically, this position requires integrity, honesty, and respectful treatment of others, as well as a willingness to speak up when they see misconduct or have concerns. Carnival Corporation & plc and Carnival Cruise Line is an equal employment opportunity/affirmative action employer. In this regard, it does not discriminate against any qualified individual on the basis of sex, race, color, national origin, religion, sexual orientation, age, marital status, mental, physical or sensory disability, or any other classification protected by applicable local, state, federal, and/or international law. ***************************************************************** ******************************************************************
    $86k-104k yearly est. 16d ago
  • SECURITY ENGINEER - WEB APPLICATION

    Seminole Hard Rock Support Services 4.4company rating

    Fort Lauderdale, FL jobs

    Job Description We are seeking a skilled and motivated Web Application Security Engineer to join our team. As a Web Application Security Engineer, your primary focus will be on managing, monitoring, and responding to security alerts generated by the security tools, while also possessing a solid understanding of various aspects of web application security. You will work closely with development teams to ensure the continuous effectiveness of security measures, identify vulnerabilities, and implement appropriate controls. The ideal candidate will have a strong technical background, a good understanding of web application security principles, and the ability to excel in managing, monitoring, and responding to security alerts. Responsibilities Assist in determining needs and implementing configurations of various tools based on incoming requests. Assist in the testing and validation of security controls to ensure their effectiveness and compliance with industry standards. Manage, monitor, and respond to security alerts generated by the security tools specific to our web application environment. Investigate and triage security alerts, taking appropriate actions and escalations as necessary. Assist in security assessments and penetration testing to identify potential vulnerabilities and recommend suitable solutions. Monitor security logs, alerts, and events to proactively identify potential security incidents. Create and maintain metrics to track the performance and efficacy of security tools, programs, and controls. Contribute to compliance efforts by ensuring adherence to relevant security standards, regulations, and policies. Stay updated with the latest web application security trends, emerging threats, and industry best practices to enhance security measures. Qualifications Bachelor's degree in Computer Science, Information Security, or a related field (or equivalent experience). 3-5 years of relevant experience in web application security, with proficiency in programming languages (HTML, CSS, JavaScript, ASP.NET, PHP, Java, etc.). At least one industry standard certification such as Certified Ethical Hacker (CEH), GIAC Certified Web Application Defender (GWEB), Certified Information Systems Security Professional (CISSP), Certified Application Security Engineer (CASE) or other security vendor certification. Understanding of web application security fundamentals, secure coding practices, and common vulnerabilities (such as SQL injections, cross-site scripting). Demonstrated experience in managing, monitoring, and responding to security alerts generated by security tools and programs specific to web application security. Experience with managing and maintaining Content Delivery Networks (CDNs) and their configurations, preferably Cloudflare. Familiarity with security testing and assessment tools (such as Burp Suite, OWASP ZAP, Nikto, Nessus, Nmap) and their application in vulnerability identification and mitigation. Knowledge of secure software development lifecycle (SDLC) methodologies and ability to apply security principles throughout the development process. Familiarity with security standards and frameworks (OWASP, NIST, PCI DSS, ISO 27001) and their practical application in securing web applications. Excellent communication and collaboration skills with the ability to work effectively with technical and nontechnical stakeholders. Strong analytical mindset and problem-solving abilities to identify and address security risks and vulnerabilities. Self-motivated with a passion for continuous learning and professional development in the field of web application security. Native American Preference Policy: The Tribal Council gives preference in all of its employment practices to Native Americans. First preference in hiring, training, promoting and in all other aspects of employment is given to members of the Seminole Tribe who meet the job requirements. Second preference is given to members of other federally recognized Native American Tribes who meet the job requirements.
    $77k-98k yearly est. 8d ago
  • Information Security Specialist- Washington D.C. - Public Trust Needed

    SOC Support Services 4.7company rating

    Washington, DC jobs

    Information Security Specialist needed for a contract opportunity with SOC's client to work onsite in Washington, DC. Contract Length: 6+ Months, possible conversion to FTE * Must have an active Public Trust clearance to be considered for this role. Our Client is seeking a proactive, detail-oriented Information Security Specialist to join our growing team. In this role, you will be responsible for implementing and maintaining our organization's security posture, monitoring threats, and ensuring compliance with relevant frameworks and regulations. The ideal candidate is a critical thinker with a strong technical background and a passion for safeguarding systems and data. Key Responsibilities: * Monitor, detect, and respond to security threats and incidents. * Conduct vulnerability assessments and risk mitigation. * Ensuring security updates are current across all systems * Implement and manage security tools (e.g., SIEM , endpoint protection). * Monitor for compliance with security standards such as NIST Risk Management Framework (RMF), * Collaborate with IT and Engineering teams to embed security in infrastructure and applications. * Investigate security breaches and document findings and recommendations. * Participate in security awareness training and programs. * Stay current with emerging threats, trends, and technologies. Required Qualifications: * Bachelor's degree in Information Security, Computer Science, or related field (or equivalent experience). * 3+ years of hands-on experience in cybersecurity roles. * Strong understanding of networking, operating systems (Windows, Linux), and cloud security (AWS/Azure,). * Hands-on experience with tools such as Splunk, CrowdStrike, Nessus Security Center, BigFix, Wireshark, etc. * Knowledge of incident response processes and procedures * Knowledge of security frameworks and compliance standards (e.g., NIST, ISO, HIPAA). * Excellent problem-solving, analytical, and communication skills. Preferred Qualifications: * Professional certifications (e.g., CISSP, , CEH, Security+). * DOJ Public Trust Employment Prerequisites The following requirements must be met to be eligible for this position: successful completion of a background investigation and drug urinalysis. SOC, a Day & Zimmermann company, is an Equal Opportunity Employer, EOE AA M/F/Vet/Disability. Note: Any pay ranges displayed are estimations, which may have been provided by job boards. Actual pay is determined by an applicant's experience, technical expertise, and other qualifications as listed in the job description. All qualified applicants are welcome to apply. #INDSOC Estimated Min Rate: $34.03 Estimated Max Rate: $48.61
    $34 hourly 17d ago
  • Fire and Security Consultant

    Martin Systems 4.6company rating

    Milwaukee, WI jobs

    Martin Systems has been a trusted provider of security, fire, and life safety solutions since 1974. With more than five decades of experience, we are known for delivering innovative technology and outstanding service to clients throughout Wisconsin. Our presence spans Green Bay, Milwaukee, Madison, Door County, Appleton, The Lakeshore, and Central Wisconsin. As a community-oriented organization, Martin Systems is actively involved in civic and safety initiatives. We support programs such as McGruff House, the Boys & Girls Clubs, Big Brothers Big Sisters, and children's fire and safety education. Our employees also engage with organizations like Crime Stoppers and Crime Prevention Associations. Position Summary The Security Consultant plays a key role in developing new business and managing client relationships for installation projects. This position is responsible for identifying prospective customers, conducting site evaluations, preparing proposals, and ensuring a high standard of customer satisfaction throughout the sales and implementation process. Key Responsibilities Identify and pursue new business opportunities through referrals, networking events, directories, and some door-to-door outreach Follow up on sales leads and schedule appointments with prospective clients Conduct needs assessments and site evaluations to determine appropriate solutions Prepare and present detailed proposals and sales presentations Develop and maintain accurate records of customer data, sales activity, and completed tasks within the company's CRM system Submit sales contracts and coordinate with installation and service teams to ensure proper project execution Collaborate with project coordinators and division managers to collect technical data and building information Track and communicate project status, ensuring milestones, deadlines, and deliverables are met Monitor budgets and report on variances where applicable Maintain ongoing communication with clients to ensure satisfaction, foster retention, and generate referrals Serve as a knowledgeable resource on product capabilities, technical features, and service options Respond to customer inquiries and escalate technical questions as appropriate Qualifications Minimum of 3 years of successful experience in a sales or account executive role Industry experience in electronic security systems is strongly preferred Familiarity with electronics and technical solutions is advantageous Strong interpersonal, communication, and customer service skills Demonstrated ability to present complex information in a clear and engaging manner Effective time management and organizational skills EEOC Statement Martin Systems provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state or local laws.
    $51k-80k yearly est. 60d+ ago
  • Cisco Network Security Consultant

    Sv Tech Systems 3.9company rating

    Fort Worth, TX jobs

    SV Tech Systems prides itself in being the leading provider of recruitment and staffing services for a wide range of industries. We provide staffing services to firms throughout the United States and Canada. We attract the best pool of talent with the aim of nurturing sound work ethics and solid values amongst a highly motivated and diverse workforce. Title : Cisco Network Security Consultant Duration : 12 Months Contract Location : Ft. Worth, TX 76102 Require CCNA Security, Cisco Firewall Security Specialist, or Cisco VPN Security Specialist certifications. CCNP Security / CCSP Preferred. Job Description: Assists with the design, development and maintenance of the computer and network infrastructure. Typically has at least 3 years experience and professional degree. Expert in supporting Checkpoint/Solaris firewalls in a high-availability enterprise environment. Excellent customer service experience highly desired to fit culture. Strong Checkpoint, Solaris and Cisco network skills. In-depth experience in Network Security technology architecture design, evaluation, deployment or support that addresses one or more of the following security areas: • Firewalls • VPN • Authentication • Encryption • Vulnerability Assessment • Penetration Analysis • Intrusion Detection Qualifications Provide operational support and maintenance of Cisco Security Technologies. The successful candidate will have experience configuring, supporting, and maintaining with Cisco ASAs configured to provide Firewall services, VPN Services, and IPS services. • Require excellent communication skills as this position will interface with both the customer and other IT and Non-IT organizations with the business. • Customer first attitude. • Ability to work in inter-departmental and intra-departmental collaborative team environments. • Ability to deploy new Firewalls with and without the use of configuration templates. • Ability to add, change and delet e firewall access lists . • Understand the order of NAT operations and be able to implement the various type of NAT (PAT, Static NAT, NAT exemption, etc.). • Troubleshoot Firewall access issues though the use of Enterprise Log Management Tool. • Perform Intrusion Prevention System signature updates and signature filtering • Configure SSL VPN groups and authentication methods. • Candidate should have a firm understanding of the Multiple Context technology and its limitations; Hands-on experience preferred. • Experience with Cisco Security Manager is desired. • Experience with Firemon is desired. • Generation of technology documentation and diagramming with tools such as Visio. • Additional security-related tasks as required. • Work hours are approx. 8:30AM - 5:30PM CST. • Work to be onsite in downtown Fort Worth. Working remote or from home is not available. • Part of on-call rotation approximately 1 Week Every Month; light duty. • No travel is anticipated but should be available for light travel if required (10% or less). • Availability to perform after hours and weekend work as required. • Position Length: 6 - 12 Months minimum. Position is not currently expected to be converted to Full Time. Require CCNA Security, Cisco Firewall Security Specialist, or Cisco VPN Security Specialist certifications. CCNP Security / CCSP Preferred. • Candidate will be required to take a hands-on skill assessment. • Start date will be 2 weeks after successful candidate accepts contract position. Additional Information Regards, Praveen, Technical Recruiter, Office: ************** ***************************************** **********************************
    $86k-114k yearly est. 14h ago
  • Cisco Network Security Consultant

    SV Tech Systems 3.9company rating

    Fort Worth, TX jobs

    SV Tech Systems prides itself in being the leading provider of recruitment and staffing services for a wide range of industries. We provide staffing services to firms throughout the United States and Canada. We attract the best pool of talent with the aim of nurturing sound work ethics and solid values amongst a highly motivated and diverse workforce. Title : Cisco Network Security Consultant Duration : 12 Months Contract Location : Ft. Worth, TX 76102 Require CCNA Security, Cisco Firewall Security Specialist, or Cisco VPN Security Specialist certifications. CCNP Security / CCSP Preferred. Job Description: Assists with the design, development and maintenance of the computer and network infrastructure. Typically has at least 3 years experience and professional degree. Expert in supporting Checkpoint/Solaris firewalls in a high-availability enterprise environment. Excellent customer service experience highly desired to fit culture. Strong Checkpoint, Solaris and Cisco network skills. In-depth experience in Network Security technology architecture design, evaluation, deployment or support that addresses one or more of the following security areas: • Firewalls • VPN • Authentication • Encryption • Vulnerability Assessment • Penetration Analysis • Intrusion Detection Qualifications Provide operational support and maintenance of Cisco Security Technologies. The successful candidate will have experience configuring, supporting, and maintaining with Cisco ASAs configured to provide Firewall services, VPN Services, and IPS services. • Require excellent communication skills as this position will interface with both the customer and other IT and Non-IT organizations with the business. • Customer first attitude. • Ability to work in inter-departmental and intra-departmental collaborative team environments. • Ability to deploy new Firewalls with and without the use of configuration templates. • Ability to add, change and delet e firewall access lists . • Understand the order of NAT operations and be able to implement the various type of NAT (PAT, Static NAT, NAT exemption, etc.). • Troubleshoot Firewall access issues though the use of Enterprise Log Management Tool. • Perform Intrusion Prevention System signature updates and signature filtering • Configure SSL VPN groups and authentication methods. • Candidate should have a firm understanding of the Multiple Context technology and its limitations; Hands-on experience preferred. • Experience with Cisco Security Manager is desired. • Experience with Firemon is desired. • Generation of technology documentation and diagramming with tools such as Visio. • Additional security-related tasks as required. • Work hours are approx. 8:30AM - 5:30PM CST. • Work to be onsite in downtown Fort Worth. Working remote or from home is not available. • Part of on-call rotation approximately 1 Week Every Month; light duty. • No travel is anticipated but should be available for light travel if required (10% or less). • Availability to perform after hours and weekend work as required. • Position Length: 6 - 12 Months minimum. Position is not currently expected to be converted to Full Time. Require CCNA Security, Cisco Firewall Security Specialist, or Cisco VPN Security Specialist certifications. CCNP Security / CCSP Preferred. • Candidate will be required to take a hands-on skill assessment. • Start date will be 2 weeks after successful candidate accepts contract position. Additional Information Regards, Praveen, Technical Recruiter, Office: ************** ***************************************** **********************************
    $86k-114k yearly est. 60d+ ago
  • CLOUD INFORMATION SECURITY ENGINEER

    Seminole Hard Rock Support Services 4.4company rating

    Fort Lauderdale, FL jobs

    Job Description Cloud Security Engineers are responsible for the secure operations of cloud infrastructure, platforms, and software, including the installation, maintenance, and improvement of cloud computing environments. They also help develop new designs and security strategies across cloud-based and hybrid applications, infrastructure, platforms, and SaaS. Leads the analysis, implementation, execution, and improvement of proactive security controls to prevent external threat actors from infiltrating company information or systems. Conducts research and provides leadership updates regarding advanced attempts/efforts to compromise security protocols. Maintains and reviews security systems while assessing security policies that control access to systems. Provides status updates and recommendations to the leadership team regarding the impact of theft, destruction, alteration, or denial of access to information. Follows standard practices and procedures in analyzing situations or data. This position reports to the Director of Information Security. Responsibilities The primary duties and responsibilities of the Cloud Security Engineer are: Assessing Existing Infrastructure and Identifying Threats. Providing recommendations on New Infrastructure and Threat Modeling to assist in stakeholder decisions. Developing, solutioning, operating, maintaining, and supporting a secure cloud environment with technologies including but not limited to: Servers, Storage, Network services, Enterprise applications, Cloud platform support, Automation, CI/CD, Managing cryptography and encryption, IAM, Threat Detection, Logging, PKI, SaaS, and PaaS. Monitoring for and responding to incidents in cloud environments. Keeping cloud infrastructure current, making recommendations, and continually improving cloud security technologies. Analyzing, designing, and developing programs, shell scripts, tests, and infrastructure automation capabilities. Develop security standards in partnership with Engineering, Infrastructure Services, and Application Development. Representing the cloud security team in change control activities and ensure proposed changes are in alignment with security best practices. Staying abreast with security standards and emerging vulnerabilities/threats to proactively resolve/remediate/mitigate. Engage in digital forensics to investigate breaches or security incidents in the cloud. Collaborate with Disaster Recovery and Business Continuity Teams and play a pivotal role in developing, testing, and refining disaster recovery plans tailored for cloud environments. Empower the Security Compliance and Data Protection Team to audit cloud environments to ensure compliance and pinpoint areas of improvement. Using metrics and KPIs to drive and further Security Posture Initiatives. Establish and maintain a feedback mechanism where security measures are not only implemented but also refined based on feedback to enhance security protocols continuously. Performing other security team relevant duties and responsibilities as assigned. Participate in incident response activities as assigned. Preferred Experience Experience in designing, deploying and operating secure cloud solutions, including design documentation, assessment of risk, cost impact, and proposal of savings. Experience with Cloud Security Posture Management, Cloud Workload Management, SaaS Security Posture Management, Cloud Network Security, Cloud Native Application Protection and Cloud Identity Security. Deep technical knowledge of on-prem Data Center technologies as well as Cloud Service, PaaS and SaaS Providers. Has experience writing formal security assessments and ad-hoc security reports. Experience working as part of a security incident response team as needed and key escalation point for all cloud related incidents. Experience delivering security metrics and measurement capability to demonstrate operational security posture. Experience in data protection and privacy management. Skills Required Team player able to work effectively at all levels of an organization with the ability to influence others to move toward consensus. Clear ability to build strong relationships and establish trust with stakeholders at all levels. Excellent verbal and written communications skills. Multiple language abilities preferred - fluency in English (written and spoken) required. Strong leadership skills with demonstrated ability to prioritize and execute in a methodical and disciplined manner. Ability to solve complex problems in a timely manner by working with multiple stakeholders. Ability to manage multiple tasks and work streams effectively. Ability to follow detailed procedures and processes with a high degree of accuracy. Customer-focused mindset, with demonstrated skill in managing expectations, providing proactive status updates, and producing high-quality work product. Deep understanding of Cyber Security control environments and their relationship to zero-trust networks. Display a keen ability to adapt to new tools, technologies, and evolving threat landscapes in the realm of cloud security. Experience in 3 or more of the following: network design, mobile security, network and firewall security technologies, SaaS/PaaS Security, vulnerability management or penetration testing. Flexibility to travel as required up to 15% overnight travel. Qualifications Experience / Education / Certifications Bachelor's degree preferred in Computer Sciences, Information Technology, Information Security or other related field Three (3) years or more experience with architecting and operating solutions involving one or more cloud service providers Microsoft Azure, AWS, GCP, etc. Five (5) years of Cyber Security related work experience Practical knowledge of any combination of Payment Card Industry (PCI), GDPR, NIST standards, or ISO27000 series. At least one industry standard certification such as CCSK, CCSP, Certified Information Systems Security Professional (CISSP), or other Cloud Security certification. #IndeedSHRSS #LI-Hybrid #zipcorpor
    $68k-87k yearly est. 11d ago
  • SECURITY ENGINEER - WEB APPLICATION

    Seminole Hard Rock Hotel & Casino 4.0company rating

    Davie, FL jobs

    We are seeking a skilled and motivated Web Application Security Engineer to join our team. As a Web Application Security Engineer, your primary focus will be on managing, monitoring, and responding to security alerts generated by the security tools, while also possessing a solid understanding of various aspects of web application security. You will work closely with development teams to ensure the continuous effectiveness of security measures, identify vulnerabilities, and implement appropriate controls. The ideal candidate will have a strong technical background, a good understanding of web application security principles, and the ability to excel in managing, monitoring, and responding to security alerts. Responsibilities * Assist in determining needs and implementing configurations of various tools based on incoming requests. * Assist in the testing and validation of security controls to ensure their effectiveness and compliance with industry standards. * Manage, monitor, and respond to security alerts generated by the security tools specific to our web application environment. * Investigate and triage security alerts, taking appropriate actions and escalations as necessary. * Assist in security assessments and penetration testing to identify potential vulnerabilities and recommend suitable solutions. * Monitor security logs, alerts, and events to proactively identify potential security incidents. * Create and maintain metrics to track the performance and efficacy of security tools, programs, and controls. * Contribute to compliance efforts by ensuring adherence to relevant security standards, regulations, and policies. * Stay updated with the latest web application security trends, emerging threats, and industry best practices to enhance security measures. Qualifications * Bachelor's degree in Computer Science, Information Security, or a related field (or equivalent experience). * 3-5 years of relevant experience in web application security, with proficiency in programming languages (HTML, CSS, JavaScript, ASP.NET, PHP, Java, etc.). * At least one industry standard certification such as Certified Ethical Hacker (CEH), GIAC Certified Web Application Defender (GWEB), Certified Information Systems Security Professional (CISSP), Certified Application Security Engineer (CASE) or other security vendor certification. * Understanding of web application security fundamentals, secure coding practices, and common vulnerabilities (such as SQL injections, cross-site scripting). * Demonstrated experience in managing, monitoring, and responding to security alerts generated by security tools and programs specific to web application security. * Experience with managing and maintaining Content Delivery Networks (CDNs) and their configurations, preferably Cloudflare. * Familiarity with security testing and assessment tools (such as Burp Suite, OWASP ZAP, Nikto, Nessus, Nmap) and their application in vulnerability identification and mitigation. * Knowledge of secure software development lifecycle (SDLC) methodologies and ability to apply security principles throughout the development process. * Familiarity with security standards and frameworks (OWASP, NIST, PCI DSS, ISO 27001) and their practical application in securing web applications. * Excellent communication and collaboration skills with the ability to work effectively with technical and nontechnical stakeholders. * Strong analytical mindset and problem-solving abilities to identify and address security risks and vulnerabilities. * Self-motivated with a passion for continuous learning and professional development in the field of web application security. Native American Preference Policy: The Tribal Council gives preference in all of its employment practices to Native Americans. First preference in hiring, training, promoting and in all other aspects of employment is given to members of the Seminole Tribe who meet the job requirements. Second preference is given to members of other federally recognized Native American Tribes who meet the job requirements.
    $66k-85k yearly est. Auto-Apply 43d ago
  • CLOUD INFORMATION SECURITY ENGINEER

    Seminole Hard Rock Hotel & Casino 4.0company rating

    Davie, FL jobs

    Cloud Security Engineers are responsible for the secure operations of cloud infrastructure, platforms, and software, including the installation, maintenance, and improvement of cloud computing environments. They also help develop new designs and security strategies across cloud-based and hybrid applications, infrastructure, platforms, and SaaS. Leads the analysis, implementation, execution, and improvement of proactive security controls to prevent external threat actors from infiltrating company information or systems. Conducts research and provides leadership updates regarding advanced attempts/efforts to compromise security protocols. Maintains and reviews security systems while assessing security policies that control access to systems. Provides status updates and recommendations to the leadership team regarding the impact of theft, destruction, alteration, or denial of access to information. Follows standard practices and procedures in analyzing situations or data. This position reports to the Director of Information Security. Responsibilities The primary duties and responsibilities of the Cloud Security Engineer are: * Assessing Existing Infrastructure and Identifying Threats. * Providing recommendations on New Infrastructure and Threat Modeling to assist in stakeholder decisions. * Developing, solutioning, operating, maintaining, and supporting a secure cloud environment with technologies including but not limited to: Servers, Storage, Network services, Enterprise applications, Cloud platform support, Automation, CI/CD, Managing cryptography and encryption, IAM, Threat Detection, Logging, PKI, SaaS, and PaaS. * Monitoring for and responding to incidents in cloud environments. * Keeping cloud infrastructure current, making recommendations, and continually improving cloud security technologies. * Analyzing, designing, and developing programs, shell scripts, tests, and infrastructure automation capabilities. * Develop security standards in partnership with Engineering, Infrastructure Services, and Application Development. * Representing the cloud security team in change control activities and ensure proposed changes are in alignment with security best practices. * Staying abreast with security standards and emerging vulnerabilities/threats to proactively resolve/remediate/mitigate. * Engage in digital forensics to investigate breaches or security incidents in the cloud. * Collaborate with Disaster Recovery and Business Continuity Teams and play a pivotal role in developing, testing, and refining disaster recovery plans tailored for cloud environments. * Empower the Security Compliance and Data Protection Team to audit cloud environments to ensure compliance and pinpoint areas of improvement. Using metrics and KPIs to drive and further Security Posture Initiatives. * Establish and maintain a feedback mechanism where security measures are not only implemented but also refined based on feedback to enhance security protocols continuously. * Performing other security team relevant duties and responsibilities as assigned. * Participate in incident response activities as assigned. Preferred Experience * Experience in designing, deploying and operating secure cloud solutions, including design documentation, assessment of risk, cost impact, and proposal of savings. * Experience with Cloud Security Posture Management, Cloud Workload Management, SaaS Security Posture Management, Cloud Network Security, Cloud Native Application Protection and Cloud Identity Security. * Deep technical knowledge of on-prem Data Center technologies as well as Cloud Service, PaaS and SaaS Providers. * Has experience writing formal security assessments and ad-hoc security reports. * Experience working as part of a security incident response team as needed and key escalation point for all cloud related incidents. * Experience delivering security metrics and measurement capability to demonstrate operational security posture. * Experience in data protection and privacy management. Skills Required * Team player able to work effectively at all levels of an organization with the ability to influence others to move toward consensus. * Clear ability to build strong relationships and establish trust with stakeholders at all levels. * Excellent verbal and written communications skills. Multiple language abilities preferred - fluency in English (written and spoken) required. * Strong leadership skills with demonstrated ability to prioritize and execute in a methodical and disciplined manner. * Ability to solve complex problems in a timely manner by working with multiple stakeholders. * Ability to manage multiple tasks and work streams effectively. * Ability to follow detailed procedures and processes with a high degree of accuracy. * Customer-focused mindset, with demonstrated skill in managing expectations, providing proactive status updates, and producing high-quality work product. * Deep understanding of Cyber Security control environments and their relationship to zero-trust networks. * Display a keen ability to adapt to new tools, technologies, and evolving threat landscapes in the realm of cloud security. * Experience in 3 or more of the following: network design, mobile security, network and firewall security technologies, SaaS/PaaS Security, vulnerability management or penetration testing. * Flexibility to travel as required up to 15% overnight travel. Qualifications Experience / Education / Certifications * Bachelor's degree preferred in Computer Sciences, Information Technology, Information Security or other related field * Three (3) years or more experience with architecting and operating solutions involving one or more cloud service providers Microsoft Azure, AWS, GCP, etc. * Five (5) years of Cyber Security related work experience * Practical knowledge of any combination of Payment Card Industry (PCI), GDPR, NIST standards, or ISO27000 series. * At least one industry standard certification such as CCSK, CCSP, Certified Information Systems Security Professional (CISSP), or other Cloud Security certification. #IndeedSHRSS #LI-Hybrid #zipcorpor
    $63k-81k yearly est. Auto-Apply 15d ago

Learn more about The Blackstone jobs