Post job

Information Assurance Engineer jobs at Vencore - 2786 jobs

  • AWS Security Engineer

    Perspecta 4.5company rating

    Information assurance engineer job at Vencore

    Responsibilities We are seeking an experienced AWS Security Engineer to ensure the security, compliance, and protection of our cloud-based infrastructure. The ideal candidate will have strong hands-on experience with AWS security services, cloud risk assessments, incident response, and continuous security monitoring. This role collaborates closely with Cloud Engineering, DevOps, and Application teams to maintain a secure, compliant, and resilient cloud environment. What you will do: Lead and support vulnerability scanning and remediation efforts for cloud resources Manage IAM roles/policies, identity federation, encryption, KMS, and secrets management Provision and manage AWS infrastructure using Infrastructure as Code (IaC) tools such as Terraform Develop custom scripts for CloudWatch metrics and alarms based on application-specific probes Implement alerting and automated remediation workflows Assist with incident response, investigations, and root cause analysis of cloud security events Develop and maintain security architecture documentation, runbooks, and procedures Conduct AWS security posture assessments using automated tools Monitor and maintain AWS security controls using cloud-native detection and monitoring tools Partner with DevOps and engineering teams to embed security best practices into CI/CD pipelines and IaC Implement and enhance AWS security controls, guardrails, and baseline configurations Continuously evaluate AWS environments for cost-effective security improvements Conduct threat modeling, vulnerability analysis, and remediation coordination Support internal and external audits by gathering evidence and preparing documentation Maintain compliance with NIST, FISMA, and FedRAMP requirements Assist in risk assessments and security control testing Support change control processes and ensure accurate system/process documentation Evaluate emerging cloud security tools and recommend improvements Participate in on-call rotations to support 24/7 production systems Qualifications Required Qualifications: Bachelor's degree and 8 years or 6 years with a Master's degree. Proficiency with Python and Bash scripting Hands-on experience with ECS, EKS, EC2, and Lambda Strong experience with Git and CI/CD pipelines Advanced Terraform skills, including modules, variables, and workspaces Deep knowledge of AWS security services: IAM, KMS, GuardDuty, Security Hub, CloudTrail, Config Rules Ability to conduct IAM policy/permissions audits and enforce least privilege Skilled at interpreting access logs, cloud configurations, and IAM policies Excellent written and verbal communication skills Strong analytical and problem-solving abilities Must be a U.S. Citizen Must be able to obtain and maintain the required Agency clearance Preferred Qualifications: AWS certifications such as Cloud Practitioner or Security Specialty Security compliance or audit certifications (e.g., CISA, Security+, etc.) Peraton Overview Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can't be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we're keeping people around the world safe and secure. Target Salary Range $80,000 - $128,000. This represents the typical salary range for this position. Salary is determined by various factors, including but not limited to, the scope and responsibilities of the position, the individual's experience, education, knowledge, skills, and competencies, as well as geographic location and business and contract considerations. Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. EEO EEO: Equal opportunity employer, including disability and protected veterans, or other characteristics protected by law.
    $80k-128k yearly Auto-Apply 36d ago
  • Job icon imageJob icon image 2

    Looking for a job?

    Let Zippia find it for you.

  • Lead Cyber Threat Analyst

    Directviz Solutions, LLC 3.6company rating

    Washington, DC jobs

    DirectViz Solutions, (DVS) is a rapidly growing government contractor that provides strategic services that meet mission IT needs for government customers. DVS offers competitive compensation, comprehensive medical plans, 401k match, PTO accrual, professional development reimbursement, corporate-funded technology certifications, and employee recognition programs. At DVS, we recognize that our employees are our number one resource. If you are a problem-solving people-person, apply today! Location Washington, DC Position Lead Cyber Threat Analyst Location: Washington, DC Position Summary The Lead Cyber Threat Analyst serves as the technical and operational lead for enterprise cybersecurity operations, overseeing approximately 63 systems and ensuring compliance with all federal security standards. This role drives the organization\'s threat detection, analysis, and response strategy, leads the Computer Security Incident Response Center (CSIRC), and manages enterprise security monitoring tools within the Enterprise Security Operations Center (ESOC). The position requires deep expertise in cybersecurity frameworks, threat intelligence, and vulnerability management, combined with strong leadership, analytical, and communication skills to guide analysts, coordinate incident response, and safeguard sensitive financial and operational systems. Key Responsibilities Lead enterprise-wide cybersecurity operations across ~63 systems, ensuring continuous protection and compliance with federal security standards. Oversee daily security monitoring, analysis, and response activities within the ESOC. Direct 24/7 CSIRC operations, including incident triage, containment, and recovery. Develop and maintain comprehensive security documentation, including System Security Plans (SSPs), Privacy Impact Assessments (PIAs), and RMF artifacts. Conduct annual Security Control Assessments (SCAs) and evaluate new systems and applications. Identify, track, and remediate vulnerabilities and risks across enterprise environments. Develop and maintain a real-time Cyber Threat Dashboard for senior leadership reporting and situational awareness. Lead the Vulnerability Management Program, including prioritization, patching, and remediation oversight. Monitor and analyze network traffic for potential intrusions, unauthorized activity, and anomalous behavior. Manage security tools, threat intelligence feeds, and automation solutions supporting the ESOC mission. Provide training, mentoring, and technical guidance to cybersecurity analysts and SOC staff. Oversee incident handling involving Personally Identifiable Information (PII) and ensure proper documentation and escalation. Collaborate with cross-functional and government stakeholders to align operations with NIST, FISMA, and organizational security policies. Support the protection and compliance of financial systems under the OCFO through proactive risk management. Maintain system and application security posture, ensuring ongoing compliance and operational integrity. Qualifications Bachelor\'s degree in Computer Science, Information Technology, Engineering, or a related field. Minimum of 10 years of progressive IT or technology experience, including at least 5 years within the past decade supporting large-scale federal technical contracts. At least 7 years of cybersecurity experience, with 5 years focused on threat analysis in SOC or CSIRC environments supporting government systems. Required Certification: Certified Information Systems Security Professional (CISSP). Preferred Certifications: GIAC Certified Intrusion Analyst (GCIA), Certified Ethical Hacker (CEH), CompTIA Cybersecurity Analyst (CySA+). Required: Information Technology Infrastructure Library (ITIL) 4 Foundation certification. Strong understanding of cybersecurity frameworks and principles (NIST 800-53, FISMA, RMF, ISO 27001). Proven experience with enterprise risk management, incident response, and vulnerability remediation. Excellent analytical and problem-solving skills, with strong attention to detail. Effective communication and interpersonal skills to collaborate across technical, executive, and federal teams. Ability to lead multiple projects simultaneously and deliver results under tight deadlines. Physical and Mental Qualifications Be able to maintain awareness during scheduled working hours. Prolonged periods sitting or standing at desk and working on a computer (mouse and keyboard). Able to lift up to 15 pounds. Excellent verbal and written communication; good command of the English language. Execute tasks independently and work as a team. Learns and memories routine tasks. Strong organizational, grammar, business correspondence, and self-management skills. Candidates must be able to perform the essential functions of the position satisfactorily. If requested, reasonable accommodation will be provided for employees with disabilities. DVS retains the right to change or assign other duties to this position. Equal Opportunity DirectViz Solutions, LLC (DVS) is an equal opportunity employer and prohibits discrimination and harassment against any employee or applicant for employment because of race, color, sex (including pregnancy), age, gender identity, creed, religion, national origin, sexual orientation, marital status, genetic information, disability, political affiliation, protected veteran status, or any other status protected by federal, state or local law. DVS has a zero-tolerance policy for harassment, threats, coercion, discrimination, and intimidation. Employees may file a complaint or exercise any right protected by Executive Order 11246, Section 503 of the Rehabilitation Act of 1973, as amended, Section 4212 of the Vietnam Era Veterans Readjustment Assistance Act of 1974, or the Veterans Employment Opportunities Act of 1998. #J-18808-Ljbffr
    $87k-115k yearly est. 1d ago
  • Junior Information System Security Officer

    Mantech 4.5company rating

    Washington, DC jobs

    MANTECH seeks a motivated, career and customer-oriented Junior Information System Security Officer (ISSO) to join our team in Washington, D.C. Responsibilities include, but are not limited to: Ensure the day-to-day implementation, oversight, continuous monitoring, and maintenance of the security configuration, practices, and procedures for each IS. Ensure that selected security controls are implemented and operating as intended during all phases of the IS lifecycle. Ensure that system security documentation is developed, maintained, reviewed, and updated on a continuous basis Provide liaison support between the system owner and other IS security personnel. Conduct required IS vulnerability scans according to risk assessment parameters. Develop Plan of Action and Milestones (POAMs) in response to reported security vulnerabilities Manage the risks to ISs and other FBI assets by coordinating appropriate correction or mitigation actions and oversee and track the timely completion of (POAMs). Coordinate system owner concurrence for correction or mitigation actions. Monitor security controls for FBI ISs to maintain security Authorized to Operate (ATO) Upload all security control evidence to the Governance, Risk, and Compliance (GRC) application to support security control implementation during the monitoring phase Ensure that changes to an FBI IS, its environment, and/or operational needs that may affect the authorization status are reported to the system owner and IS Security Manager (ISSM). Ensure the removal and retirement of ISs being decommissioned in coordination with the system owner, ISSM, and ISSR Minimum Qualifications: At least 3 years' experience performing duties of an Information Systems Security Officer (ISSO) at a cleared facility At least 5 years of work experience in a computer science or cybersecurity related field Hold at least one of the following certifications: Certified Information Systems Security Professional (CISSP), Global Information Security Professional (GISP), or the CompTIA Advanced Security Practitioner (CASP) or Information Assurance Management (IAM) Level II proficiency Familiarity with the use and operation of security tools including Tenable Nessus and/or Security Center, IBM Guardium, HP Weblnspect, Network Mapper (NMAP), and/or similar applications Preferred Qualifications: A bachelor's or advanced degree in Computer Science, Cybersecurity, or other cyber discipline Clearance Requirements: Must have a current/active Top Secret security clearance with eligibility to obtain SCI. Selected candidate must be willing to undergo a Polygraph. Physical Requirements: Must be able to remain in a stationary position 50% Needs to occasionally move about inside the office to access file cabinets, office machinery, etc. Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer Often positions self to maintain computers in the lab, including under the desks and in the server closet Frequently communicates with co-workers, management and customers, which may involve delivering presentations. Must be able to exchange accurate information in these situations
    $60k-81k yearly est. 1d ago
  • Cyber Security Engineer SME - Associate Director

    Dovel Technologies, Inc. 4.2company rating

    Palo Alto, CA jobs

    Cyber Security Engineer SME - Associate Director page is loaded## Cyber Security Engineer SME - Associate Directorlocations: US - Remote (Any location)time type: Full timeposted on: Posted Todayjob requisition id: 34211**Job Family:**Cyber Consulting**Travel Required:**None**Clearance Required:**Active SecretOur Cybersecurity Consultants are a team of business integrators with extensive consulting and industry experience who help our clients solve their complex business issues from strategy through execution. A career in an integrated team of developers and consultants provides the opportunity to grow and contribute to our clients' business issues every day, applying a collection of security spectrum capabilities, including security strategy and governance, IT risk, security technologies, and cybercrime and breach response.We are seeking an experienced **Cyber Security Engineer SME - Associate Director** with a strong background in designing, implementing, and managing enterprise-level security solutions, particularly within federal government environments. The ideal candidate will possess deep technical expertise across cybersecurity domains, including threat detection, incident response, vulnerability management, and security architecture. This role requires a strategic thinker and hands-on practitioner who can lead security initiatives, mentor junior engineers, and ensure compliance with federal cybersecurity standards.**What You Will Do:*** Provide technical leadership on major cybersecurity engineering tasks across all networks and environments.* Propose, develop, deploy, configure, operate, integrate, maintain, and support enhancements of cybersecurity capabilities including threat detection tools, traffic segmentation controls, and security infrastructure.* Establish goals for cybersecurity tool implementation that meet project objectives.* Direct cybersecurity engineering activities with domain expertise in multiple capability categories.* Make critical decisions regarding cybersecurity tool selection, design, and deployment.* Ensure cyber capabilities meet or exceed minimum standards to operate on the Department of Defense Information Network (DoDIN.)* Focus areas may include: Secure Design, Tool Engineering/Lead, Cyber Incident Response Team Lead, Comply-to-Connect (C2C) Network Access Control (NAC), Data Security, Defensive Cyberspace Operations Infrastructure, Endpoint Security, Scanner Ops, Zero Trust Architecture (ZTA) Implementation, Vulnerability Management Lead, DevSecOps, and various specialized tool/process engineering roles.**What You Will Need:*** Bachelor's Degree is required* Minimum of TEN (10) years of relevant cybersecurity or IT security experience.* An ACTIVE and CURRENT SECRET federal security clearance.* Demonstrated expertise in enterprise security architecture, threat intelligence, and incident response.* Mastery of of security frameworks and compliance standards (e.g., NIST, RMF SP 800-53 Rev 5, DoD 8570).* Experience with cybersecurity platforms such as Splunk, Tenable, Palo Alto, CrowdStrike, and AWS/Azure security services.* Experience in incident response, threat hunting, and forensic analysis.* Experience with cloud security practices and technologies (AWS, Azure, GCP).* Demonstrated ability to be effective as a Subject Matter Expert delivering cyber theories, concepts and principles in cross-functional teams and manage complex technical projects.* Strong analytical and problem-solving skills.* Excellent communication skills with the ability to convey technical concepts to non-technical stakeholders.**What Would Be Nice To Have:*** Master's Degree in relevant cybersecurity or IT field* One or more of the following certifications:* ISC2 Zero Trust Strategy Certificate* Certified Information Security Manager (CISM)* Certified Authorization Professional (CAP) / Certified in Governance, Risk and Compliance (CGRC)* IAT Level II (Information Assurance Technical)* IAM Level II (Information Assurance Management)* Cloud Security Certification (AWZ, Azure, or Google)* Familiarity with emerging technologies such as AI/ML in cybersecurity, quantum-resistant cryptography, and secure software supply chain practices.* Experience with Zero Trust Architecture and implementation based on CISA, DOD and/or IC maturity models.The annual salary range for this position is $149,000.00-$248,000.00. Compensation decisions depend on a wide range of factors, including but not limited to skill sets, experience and training, security clearances, licensure and certifications, and other business and organizational needs.**What We Offer:**Guidehouse offers a comprehensive, total rewards package that includes competitive compensation and a flexible benefits package that reflects our commitment to creating a diverse and supportive workplace.Benefits include:* Medical, Rx, Dental & Vision Insurance* Personal and Family Sick Time & Company Paid Holidays* Position may be eligible for a discretionary variable incentive bonus* Parental Leave and Adoption Assistance* 401(k) Retirement Plan* Basic Life & Supplemental Life* Health Savings Account, Dental/Vision & Dependent Care Flexible Spending Accounts* Short-Term & Long-Term Disability* Student Loan PayDown* Tuition Reimbursement, Personal Development & Learning Opportunities* Skills Development & Certifications* Employee Referral Program* Corporate Sponsored Events & Community Outreach* Emergency Back-Up Childcare Program* Mobility Stipend**About Guidehouse**Guidehouse is an Equal Opportunity Employer-Protected Veterans, Individuals with Disabilities or any other basis protected by law, ordinance, or regulation.Guidehouse will consider for employment qualified applicants with criminal histories in a manner consistent with the requirements of applicable law or ordinance including the Fair Chance Ordinance of Los Angeles and San Francisco.If you have visited our website for information about employment opportunities, or to apply for a position, and you require an accommodation, please contact Guidehouse Recruiting at ************** or via email at RecruitingAccommodation@guidehouse.com. All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodation.All communication regarding recruitment for a Guidehouse position will be sent from Guidehouse email domains including @guidehouse.com or ************************. Correspondence received by an applicant from any other domain should be considered unauthorized and will not be honored by Guidehouse. Note that Guidehouse will never charge a fee or require a money transfer at any stage of the recruitment process and does not collect fees from educational institutions for participation in a recruitment event. Never provide your banking information to a third party purporting to need that information to proceed in the hiring process.If any person or organization demands money related to a job opportunity with Guidehouse, please report the matter to Guidehouse's Ethics Hotline. If you want to check the validity of correspondence you have received, please contact *************************. Guidehouse is not responsible for losses incurred (monetary or otherwise) from an applicant's dealings with unauthorized third parties.*Guidehouse does not accept unsolicited resumes through or from search firms or staffing agencies. All unsolicited resumes will be considered the property of Guidehouse and Guidehouse will not be obligated to pay a placement fee.* #J-18808-Ljbffr
    $149k-248k yearly 1d ago
  • Senior Workday HCM & Security Success Plans Consultant

    Workday, Inc. 4.8company rating

    Chicago, IL jobs

    A leading software company in Chicago seeks a Senior Functional Consultant specializing in Human Capital Management to assist customers with HR technology challenges. The ideal candidate will have over 5 years of experience with Workday and must excel in communication and project management skills. This role involves providing customer service, supporting multiple projects, and partnering with engagement managers. Competitive salary range between $122,800 and $184,200, with flexibility for remote work. #J-18808-Ljbffr
    $122.8k-184.2k yearly 2d ago
  • Senior Security Engineer, Spam & Abuse Lead

    Snap Inc. 4.7company rating

    Palo Alto, CA jobs

    A leading technology company in California is seeking a Security Engineer for the Spam & Abuse team. This role involves architecting solutions against spam threats, collaborating across departments, and leading incident response efforts. The ideal candidate has a strong background in software engineering, experience with big data technologies, and excels in a collaborative setting. Compensation in the range of $209,000-$313,000 annually, along with additional employee benefits. #J-18808-Ljbffr
    $209k-313k yearly 5d ago
  • Senior Platform Security Engineer

    Asana 4.6company rating

    San Francisco, CA jobs

    A leading software company in San Francisco seeks a Senior Software Engineer to join its Security Development team. This role involves designing secure frameworks and improving core services. Candidates should have over 4 years of experience in software development and an interest in security engineering. The position offers a competitive salary range of $202,000-$258,000 and a hybrid work schedule. #J-18808-Ljbffr
    $202k-258k yearly 3d ago
  • Manager, Security Services - Apple Information Security

    Apple Inc. 4.8company rating

    Seattle, WA jobs

    Seattle, Washington, United States Corporate Functions Imagine what you could do here. At Apple, new ideas have a way of becoming extraordinary products, services, and customer experiences very quickly. Bring passion and dedication to your job and there's no telling what you could accomplish. We're a diverse collection of problem solvers and doers, continually reimagining our products, systems, and practices to help people do what they love in new ways. This is a deeply reciprocal place, where everything we build is the result of people in different roles and teams working together to make each other's ideas stronger. That same real passion for innovation that goes into our products also applies to our practices, strengthening our dedication to leave the world better than we found it! We are seeking a leader for our Security Services team. This role requires a strategic, results-driven leader to advance our security services portfolio while ensuring delivery excellence, operational efficiency, and exceptional customer outcomes. In this role, you will drive the evolution, optimization, and continuous improvement of security offerings, aligning capabilities with business objectives and emerging security needs. The ideal candidate brings a strong blend of security or technical expertise, proven people leadership, and a customer‑centric mindset. We are seeking a strategic and results-oriented leader in Service Delivery to drive and advance our security service portfolio, ensuring consistent delivery excellence, operational efficiency, and customer satisfaction. This role will drive the evolution, optimization, and continuous improvement of our security service offerings, aligning capabilities with business objectives and emerging security needs. The ideal candidate will possess a strong blend of technical or security expertise, leadership skills, and a customer‑centric approach. Description The Manager, Security Services will be responsible for influencing and driving transformational change to across the organization. This is an opportunity to play a key role in shaping the future of our security service offerings. You must be passionate about service excellence and continuous improvement. Responsibilities Service Catalog Management: Develop and maintain a comprehensive service catalog that clearly defines and describes all available services, ensuring alignment with business objectives, customer and security needs. Service Standards Design: Establish and implement service standards that ensure consistent quality and performance across all service offerings. Maturity Assessments & Roadmaps: Conduct maturity assessments to evaluate current service capabilities and develop strategic roadmaps for continuous improvement. Performance Metrics Establishment: Work across teams to monitor key performance indicators (KPIs) to assess service effectiveness, efficiency, and customer satisfaction. Minimum Qualifications Demonstrated ability to manage, lead, and inspire teams while driving transformational organizational change Expertise with service delivery management; overseeing the end-to-end delivery of managed services Experience leading teams in a matrixed environment including working with security engineering, engineering managers, software developers, and other cross‑functional teams Strong problem solving skills; with the ability to lead through ambiguity to deliver incremental value to our customers Exceptional communication and presentation skills Preferred Qualifications Experience in leading an MSP (managed service provider) or MSSP (managed security service provider) organization Expert knowledge of service management frameworks (e.g. ITIL) and security best practices. CISSP and related security certifications is a plus At Apple, base pay is one part of our total compensation package and is determined within a range. This provides the opportunity to progress as you grow and develop within a role. The base pay range for this role is between $197,800 and $297,300, and your base pay will depend on your skills, qualifications, experience, and location. Apple employees also have the opportunity to become an Apple shareholder through participation in Apple's discretionary employee stock programs. Apple employees are eligible for discretionary restricted stock unit awards, and can purchase Apple stock at a discount if voluntarily participating in Apple's Employee Stock Purchase Plan. You'll also receive benefits including: Comprehensive medical and dental coverage, retirement benefits, a range of discounted products and free services, and for formal education related to advancing your career at Apple, reimbursement for certain educational expenses - including tuition. Additionally, this role might be eligible for discretionary bonuses or commission payments as well as relocation. Learn more about Apple Benefits. Note: Apple benefit, compensation and employee stock programs are subject to eligibility requirements and other terms of the applicable plan or program. Apple is an equal opportunity employer that is committed to inclusion and diversity. We seek to promote equal opportunity for all applicants without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, Veteran status, or other legally protected characteristics. Learn more about your EEO rights as an applicant . Apple accepts applications to this posting on an ongoing basis. #J-18808-Ljbffr
    $197.8k-297.3k yearly 1d ago
  • Manager, Security Services - Apple Information Security

    Apple Inc. 4.8company rating

    Sunnyvale, CA jobs

    Sunnyvale, California, United States Corporate Functions Imagine what you could do here. At Apple, new ideas have a way of becoming extraordinary products, services, and customer experiences very quickly. Bring passion and dedication to your job and there's no telling what you could accomplish. We're a diverse collection of problem solvers and doers, continually reimagining our products, systems, and practices to help people do what they love in new ways. This is a deeply reciprocal place, where everything we build is the result of people in different roles and teams working together to make each other's ideas stronger. That same real passion for innovation that goes into our products also applies to our practices, strengthening our dedication to leave the world better than we found it! We are seeking a leader for our Security Services team. This role requires a strategic, results-driven leader to advance our security services portfolio while ensuring delivery excellence, operational efficiency, and exceptional customer outcomes. In this role, you will drive the evolution, optimization, and continuous improvement of security offerings, aligning capabilities with business objectives and emerging security needs. The ideal candidate brings a strong blend of security or technical expertise, proven people leadership, and a customer-centric mindset. Description The Manager, Security Services will be responsible for influencing and driving transformational change across the organization. This is an opportunity to play a key role in shaping the future of our security service offerings. You must be passionate about service excellence and continuous improvement. Responsibilities Service Catalog Management: Develop and maintain a comprehensive service catalog that clearly defines and describes all available services, ensuring alignment with business objectives, customer and security needs. Service Standards Design: Establish and implement service standards that ensure consistent quality and performance across all service offerings. Maturity Assessments & Roadmaps: Conduct maturity assessments to evaluate current service capabilities and develop strategic roadmaps for continuous improvement. Performance Metrics Establishment: Work across teams to monitor key performance indicators (KPIs) to assess service effectiveness, efficiency, and customer satisfaction. Minimum Qualifications Demonstrated ability to manage, lead, and inspire teams while driving transformational organizational change Expertise with service delivery management; overseeing the end-to-end delivery of managed services Experience leading teams in a matrixed environment including working with security engineering, engineering managers, software developers, and other cross-functional teams Strong problem solving skills; with the ability to lead through ambiguity to deliver incremental value to our customers Exceptional communication and presentation skills Preferred Qualifications Experience in leading an MSP (managed service provider) or MSSP (managed security service provider) organization Expert knowledge of service management frameworks (e.g. ITIL) and security best practices. CISSP and related security certifications is a plus At Apple, base pay is one part of our total compensation package and is determined within a range. This provides the opportunity to progress as you grow and develop within a role. The base pay range for this role is between $208,400 and $313,500, and your base pay will depend on your skills, qualifications, experience, and location. Apple employees also have the opportunity to become an Apple shareholder through participation in Apple's discretionary employee stock programs. Apple employees are eligible for discretionary restricted stock unit awards, and can purchase Apple stock at a discount if voluntarily participating in Apple's Employee Stock Purchase Plan. You'll also receive benefits including: Comprehensive medical and dental coverage, retirement benefits, a range of discounted products and free services, and for formal education related to advancing your career at Apple, reimbursement for certain educational expenses - including tuition. Additionally, this role might be eligible for discretionary bonuses or commission payments as well as relocation. Learn more about Apple Benefits. Note: Apple benefit, compensation and employee stock programs are subject to eligibility requirements and other terms of the applicable plan or program. Apple is an equal opportunity employer that is committed to inclusion and diversity. We seek to promote equal opportunity for all applicants without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, Veteran status, or other legally protected characteristics. Learn more about your EEO rights as an applicant. Apple accepts applications to this posting on an ongoing basis. #J-18808-Ljbffr
    $208.4k-313.5k yearly 1d ago
  • Client Information Security Manager

    Unisys 4.6company rating

    Santa Clara, CA jobs

    Client Security Executive page is loaded## Client Security Executivelocations: Santa Clara, CA, United States of Americatime type: Full timeposted on: Posted Todayjob requisition id: REQ569131**What success looks like in this role:***Work with one of Unisys's prized clients in the heart of Silicon Valley by ensuring security for critical infrastructure. We are looking for a talented hands-on security professional that has deep technical knowledge also likes contributing to the strategic direction. In this role you will get to work with the full array of security solutions as well as support the security provisions throughout the environment's infrastructure - networks, servers, desktops and applications. You will also contribute toward strategic planning based on risk assessments and analysis.*Provides Cybersecurity Analysis support for broad areas of the company and client environments. • Develops, executes and presents on security controls and reports; defenses and countermeasures to detect, analyze, investigate and respond to internal or external attacks and infiltration attempts. • Coordinates, administering, and monitoring system access and relevant controls. • Leads or provides direction for diverse analysis, monitoring and related projects. • Assists with root-cause-analysis for cybersecurity incidents. • Provides complex analysis of potential risks to information systems security and recommends innovative solutions. • Recommends and implements changes to procedures and systems to enhance information systems security. • Integrates network security controls into an environment to identify risks and reduce their impact. • Performs transitions, implementations, and migrations • Provides guidance and advice to less experienced team members.**Benefits***Unisys offers an outstanding benefits package, featuring unlimited paid time off, a 401(k) match, comprehensive healthcare, HSA matching, ongoing learning opportunities, and more! We're committed to supporting work-life balance and investing in your future success.***Video Interview***At Unisys, we incorporate video interviews as a key part of our hiring process. This allows us to get to know you better and provide a more engaging and convenient interview experience. We appreciate your understanding and look forward to connecting with you virtually!*#LI-MT1**You will be successful in this role if you have:**BA/BS degree and 6-8 years' relevant experience OR equivalent combination of education and experience This role may require access to export-controlled commodities and technology. Therefore, to conform to U.S. export control regulations, applicant should be eligible for any required authorizations from the U.S. Government.Unisys is proud to be an equal opportunity employer that considers all qualified applicants without regard to age, caste, citizenship, color, disability, family medical history, family status, ethnicity, gender, gender expression, gender identity, genetic information, marital status, national origin, parental status, pregnancy, race, religion, sex, sexual orientation, transgender status, veteran status or any other category protected by law.This commitment includes our efforts to provide for all those who seek to express interest in employment the opportunity to participate without barriers. If you are a US job seeker unable to review the job opportunities herein, or cannot otherwise complete your expression of interest, without additional assistance and would like to discuss a request for reasonable accommodation, please contact our Global Recruiting organization at *************************** or alternatively Toll Free: ************ (Prompt 4). US job seekers can find more information about Unisys' . #J-18808-Ljbffr
    $130k-173k yearly est. 1d ago
  • Senior Security Engineer, Google Public Sector

    Google Inc. 4.8company rating

    Urban Honolulu, HI jobs

    Apply Must be a US Citizen to meet customer and compliance requirements, including potential access to classified information. This position requires onsite client-facing work 5 days a week in Honolulu, Hawaii. Bachelor's degree in Computer Science, IT, or related field or equivalent practical experience. 5 years of experience with security assessments, security design reviews, or threat modeling. 5 years of experience with security engineering, computer and network security, and security protocols. Experience delivering comprehensive security solutioning through design, coding, configuration, and deployment. Must possess an active Top Secret/SCI Security Clearance. Must currently have or be able to obtain advanced DoD 8140 DCWF certification. Preferred qualifications Certifications in CISSP, CISM, GCIH, GCIA, or OSCP. Experience in a regulated industry (e.g., finance, healthcare, government). Experience securing cloud environments (Cloud Computing Platform, Google Cloud Platform). Understanding of cloud security principles and best practices. About the job Security is at the core of Google's design and development process: it is built into the DNA of our products. The same is true of our offices. You're an expert who shares our seriousness about security and our commitment to confidentiality. You'll collaborate with our Facilities Management team to create innovative security strategies, investigate breaches and create risk assessment plans for the future. You believe that providing effective security doesn't come at the expense of customer service - you will be our bodyguard (and our long lost pal). The GPS Cyber Defense and Security Operations Group leads our Security Operations (SECOPs) function for a range of GPS platforms and services. Combining Mandiant's deep security experience with Google technologies, our team sets the standard in Security Engineering, Assessment, and Operations across Government Cloud programs. Google Public Sector brings the magic of Google to the mission of government and education with solutions purpose-built for enterprises. We focus on helping United States public sector institutions accelerate their digital transformations, and we continue to make significant investments and grow our team to meet the complex needs of local, state and federal government and educational institutions. The US base salary range for this full-time position is $166,000-$244,000 + bonus + equity + benefits. Our salary ranges are determined by role, level, and location. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific salary range for your preferred location during the hiring process. Please note that the compensation details listed in US role postings reflect the base salary only, and do not include bonus, equity, or benefits. Learn more about benefits at Google. Responsibilities Implement security monitoring strategies, incident response plans, and security awareness programs. Oversee the deployment and operation of security information and event management (SIEM) systems, intrusion detection/prevention systems (IDS/IPS) and other security tools. Leverage cyber threat intelligence to conduct ongoing network hunt activities and identify active and dormant threats within the environment. Develop and implement custom-built AI-driven security detections and workflows. Google is proud to be an equal opportunity and affirmative action employer. We are committed to building a workforce that is representative of the users we serve, creating a culture of belonging, and providing an equal employment opportunity regardless of race, creed, color, religion, gender, sexual orientation, gender identity/expression, national origin, disability, age, genetic information, veteran status, marital status, pregnancy or related condition (including breastfeeding), expecting or parents-to-be, criminal histories consistent with legal requirements, or any other basis protected by law. See also Google's EEO Policy, Know your rights: workplace discrimination is illegal, Belonging at Google, and How we hire. Google is a global company and, in order to facilitate efficient collaboration and communication globally, English proficiency is a requirement for all roles unless stated otherwise in the job posting. To all recruitment agencies: Google does not accept agency resumes. Please do not forward resumes to our jobs alias, Google employees, or any other organization location. Google is not responsible for any fees related to unsolicited resumes. #J-18808-Ljbffr
    $123k-155k yearly est. 4d ago
  • Firewall Security Engineer

    Novacoast 3.9company rating

    Washington, DC jobs

    Novacoast Staffing is currently assisting a financial government institution in its search for an experienced Firewall Security Engineer that is experienced in Palo Alto Firewalls for a contract role that is expected to go a minimum of 2 years with option to extend. This is a hybrid role with a few days onsite in Alexandria VA and a pay range of 60-68/ hour. To qualify for this role, you must be able to pass an extensive federal background check. Qualifications To qualify for this position, you must have at least 5 years of experience with Palo Alto Next Generation firewalls, Zero Trust, and strong knowledge of advanced firewall features such as Wildfire, App-ID, User-ID, Global Protect, Security, and NAT policies, within Cloud environments. Responsibilities In this role, you will be responsible for the design, administrations, and management of Palo Alto Firewalls using Centralized Panorama Management. You will also be responsible for configuration and troubleshooting IPSEC site-to-site VPNs and SSL decryption on Palo Alto Firewalls. Requirements 5+ years experience with Palo Alto next-generation Firewalls and working in cloud and Zero Trust environments Strong knowledge of advanced firewall features such as Wildfire, App-ID, User-ID, Global Protect, Security and NAT policies Expert level knowledge in the design, administration of Palo Alto Firewalls using Centralized Panorama Management Expert level knowledge in configuration and troubleshooting IPSEC Site-to-Site VPNs US Citizenship is required due to the position being with a Federal Client If this role is aligned with your next career move, submit your resume today for immediate consideration! Job Type: Contract Pay: $60.00 - $68.00 per hour #J-18808-Ljbffr
    $60-68 hourly 5d ago
  • Security Engineer, Corporate - IAM, DLP & Automation

    Asana 4.6company rating

    San Francisco, CA jobs

    A technology firm in San Francisco is seeking a Corporate Security Engineer to lead initiatives ensuring the safety of its corporate environment. The ideal candidate will have over 4 years of experience in Corporate Security, familiarity with Identity and Access Management, and a strong understanding of security concepts. This role offers hybrid working arrangements and a competitive compensation and benefits package, including mental health support and career coaching. #J-18808-Ljbffr
    $142k-185k yearly est. 2d ago
  • Security Engineer, Corporate - IAM, DLP & Automation

    Asana 4.6company rating

    San Francisco, CA jobs

    A leading collaboration platform seeks a Corporate Security Engineer to lead security initiatives and protect the corporate environment. You will collaborate with IT and engineering teams, design security tools, and drive the implementation of Data Loss Prevention strategies. Ideal candidates have 4 years of experience in IT Security, knowledge of security frameworks, and familiarity with various security tools. This role is hybrid, based at the San Francisco office. #J-18808-Ljbffr
    $142k-185k yearly est. 3d ago
  • Senior Systems Security Engineer - Cloud, IR & Compliance Lead

    Nava 4.0company rating

    Washington, DC jobs

    A leading technology solutions provider in Washington, DC is seeking a Senior Systems Security Engineer. This role involves hands-on engineering and securing multiple operating systems, managing vulnerabilities, and ensuring compliance with security frameworks. Ideal candidates will have 5-10 years of experience in system engineering and strong communication skills. The position offers competitive pay and extensive benefits including paid medical and dental insurance. #J-18808-Ljbffr
    $74k-97k yearly est. 1d ago
  • Senior Systems Security Engineer

    Nava 4.0company rating

    Washington, DC jobs

    Be Challenged and Make a Difference In a world of technology, people make the difference. We believe if we invest in great people, then great things will happen. At AnaVation, we provide unmatched value to our customers and employees through innovative solutions and an engaging culture. Description of Task to be Performed: AnaVation is looking for a Sr. Systems Security Engineer to assist the customer with engineering and administration tasks. The ideal candidate will be comfortable engaging with client leadership on a regular basis and interacting with senior level team members. Responsibilities Perform hands-on engineering, administration, and securing of multiple operating systems (e.g., Windows, RHEL, Unix variants), and applying DISA STIGs across diverse vendor technologies, including virtualization platforms (VMWare, Hyper-V), cloud environments (AWS, Azure, Google Cloud), and enterprise applications. Perform system administration tasks to include audit and log management, availability monitoring and remediation, account management and access reviews, and configuration update scheduling and performance. Contribute to the design and development of secure system architectures, ensuring security is integrated through system and network lifecycles. Evaluate, implement, and document security architecture solutions, aligning with compliance requirements and organizational mission needs. Ensure technical compliance with applicable security frameworks, standards, and regulations (e.g., DISA SITGs, NIST 800-53, RMF). Conducting, configuring, and managing vulnerability scans. Conducting vulnerability remediations, patching, and system hardening. Collaborate with ISSOs, Assessors, System Owners, and other stakeholders to implement security controls. Support security assessments, audits, and accreditation/authorization (ATO) activities. Document security configurations, engineering solutions, and compliance evidence. Troubleshoot and resolve security-related technical issues in a timely manner. Understanding and advising the client regarding critical application data and vulnerability points, coordinating with industry partners to advise the government regarding those security vulnerabilities, and providing recommendations and advice on incident response and recovery plans. Providing Incident Response (IR) activities including triage, investigation, interviewing, resolving, and reporting on events. Promoting information security awareness across the program, ensuring security controls and processes are implemented. Presenting vulnerability analysis to system owners and leadership. Required Qualifications 5-10 years of experience in information system engineering and configuration management. 5 years of experience in control implementation and secure system engineering or design. Excellent communication skills. Hands on experience with: Security monitoring and evaluation, including audits, assessments, and risk management SIEM tools (e.g., Splunk) Vulnerability Scanning tools (e.g., Tenable, Nessus) EDR tools (e.g., Crowdstrike) Web App Scanning tools (e.g., Burpsuite, Acunetix) Active Directory SANs VMWare Networking Devices Expertise in batch, bash, and/or PowerShell scripting Able to deliver and present security compliance to a wide range of audiences (i.e., system owners, division leadership). Experience configuring and operating enterprise storage across networks (SAN) Server visualization - design solutions and configuration (VMWare, VSphere, Hyper-V, etc) Experience with: Linux (RHEL 7/8), Windows Operating Systems, and Oracle/SQL Databases Agile Methodologies GRC Tools (e.g., CSAM) Strong desire to learn, grow and be highly motivated. Certifications: OS specific certifications, Security + Personnel assigned to this task shall possess a blend of strong technical skills (networking, operating systems, security tools, programming, encryption) and essential soft skills (problem-solving, critical thinking, communication, collaboration) to design, implement, and maintain an information system's security control implementation. Desired Qualifications Knowledgeable on different cloud providers: AWS, Azure, Oracle, GCP Understanding of servers and security tools Education: Bachelor's degree in Engineering, Computer Science, or Information Systems Certifications: CompTIA Server+, Cloud certifications (AWS, Azure, Google), Network+, CCNA, RHCSA, Azure (AZ-104, AZ-204, AZ-500, AZ-305), AWS Solutions Architect Benefits Generous cost sharing for medical insurance for the employee and dependents 100% company paid dental insurance for employees and dependents 100% company paid long-term and short-term disability insurance 100% company paid vision insurance for employees and dependents 401k plan with generous match and 100% immediate vesting Competitive Pay Generous paid leave and holiday package Tuition and training reimbursement Life and AD&D Insurance About AnaVation AnaVation is the leader in solving the most complex technical challenges for collection and processing in the U.S. Federal Intelligence Community. We are a US owned company headquartered in Chantilly, Virginia. We deliver groundbreaking research with advanced software and systems engineering that provides an information advantage to contribute to the mission and operational success of our customers. We offer complex challenges, a top-notch work environment, and a world-class, collaborative team. If you want to grow your career and make a difference while doing it, AnaVation is the perfect fit for you! AnaVation is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to sex, race, color, religion, national origin, disability, protected Veteran status, age, or any other characteristic protected by law. #J-18808-Ljbffr
    $74k-97k yearly est. 1d ago
  • Senior Cloud Visibility & Security PM

    Gigamon 4.8company rating

    Santa Clara, CA jobs

    A leading technology firm is seeking a Senior Product Manager to drive strategy and execution for cloud visibility and security solutions. This role involves collaborating cross-functionally with engineering, sales, and marketing teams. The ideal candidate should have a master's degree with an MBA preferred, along with over 10 years of experience in product management within cloud technologies. The role offers a competitive salary ranging from $192,000 to $240,000 and various employee benefits including health insurance and 401(k) matching. #J-18808-Ljbffr
    $192k-240k yearly 1d ago
  • Principal Enterprise Security Engineer

    F5 Networks, Inc. 4.6company rating

    Palo Alto, CA jobs

    **Location:** Remote **About the Role** We are seeking a seasoned **Principal Enterprise Security Engineer** to design, implement, and manage enterprise-wide security solutions. You'll shape our security strategy across endpoint protection, network, SaaS, IAM, and observability, while aligning to NIST and CIS standards. This role reports to the Head of Enterprise Security, with close collaboration with the CISO, CISO staff, and cross-functional teams. **Key Responsibilities** Experience with Security Service Edge and Software-Defined Perimeter enables ZTNA solutions such as NetSCOPE, Zscaler, and PAN**Qualifications & Experience** **Education:** Bachelor's degree in cybersecurity, computer science, engineering-or equivalent years of corporate security/SOC experience. **Experience:** 7+ years in enterprise or cloud security with hands-on background in IAM, endpoint/network/SaaS security, incident management, vulnerability management, and log analytics. Experience with DoD IL‑4/IL‑5 programs-understand added encryption, personnel restrictions, and control overlays **Technical Skills:** Proficiency with tools like CrowdStrike, Palo Alto, F5, Splunk/ELK, and IAM platforms (Okta, Entra ID, etc.).**Soft Skills:** Strong verbal and written communication; ability to convey complex topics to executives; experience working with stakeholders across multiple time zones. Nice to have experience with F5 BigIP LTM**Personality Traits:** Strategic thinker, collaborative, proactive, with the ability to thrive in fast-moving environments. It is the policy of F5 to provide equal employment opportunities to all employees and employment applicants without regard to unlawful considerations of race, religion, color, national origin, sex, sexual orientation, gender identity or expression, age, sensory, physical, or mental disability, marital status, veteran or military status, genetic information, or any other classification protected by applicable local, state, or federal laws. This policy applies to all aspects of employment, including, but not limited to, hiring, job assignment, compensation, promotion, benefits, training, discipline, and termination. F5 offers a variety of reasonable accommodations for candidates. Requesting an accommodation is completely voluntary. F5 will assess the need for accommodations in the application process separately from those that may be needed to perform the job. Request by contacting accommodations@f5.com.**Remote**: Primarily work from designated home location but can come into an F5 office to work or travel to an offsite location as needed. #J-18808-Ljbffr
    $133k-172k yearly est. 5d ago
  • Lead Cyber Fusion Analyst

    Leidos 4.7company rating

    Odenton, MD jobs

    This position will support GSM-O II Task Number 07 (TN07), which provides support to the DoD Cyber Defense Command (DCDC). DCDC provides network operations and defensive cyber operations support to the United States Cyber Command in support of the DoD. The selected candidate shall provide analysis that provides 24 hours per day x 7 days per week x 365 days per year support DCDC Operations Center, providing command, control, and defensive cyber operations (DCO) functions across the Combatant Commands, Service Cyber Components, Agencies, and Field Activities in addition to 24/7 coordination with USCYBERCOM and other partner agencies. Primary Responsibilities Lead the DCDC Fusion Analyst team including employee engagement, training, performance reviews, and all other Leidos employee needs. Includes mentoring, assigning and reviewing work and planning/scheduling to ensure milestones are completed in accordance with the program work statement. Identify problems, determine accuracy and relevance of a broad range of technical information. Use sound judgment to generate, evaluate, and execute alternative courses of action. Produce timely, effective, decision-quality technical recommendations to support senior leadership. Serve as a lead for planning, coordination, implementation, validation, mitigation, and compliance of cyber operations/intel security tasks. Leverage an array of network monitoring and detection capabilities (including netflow, custom application protocol logging, signature-based IDS, and full packet capture (PCAP) data) to identify cyber adversary activity. Support the development of Cyber Fusion standard operating procedures (SOPs), and Cyber Fusion Framework and Methodology based on industry best practice and department of defense instruction, guidance, and policy. Identify threats to the enterprise and provide mitigation strategies to improve security and reduce the attack surface. Perform analysis by leveraging serialized threat reporting, intelligence product sharing, OSINT, and open-source vulnerability information to ensure prioritized plans are developed. Analyze and document malicious cyber actors TTPs, providing recommendations and alignment to vulnerabilities and applicability to the enterprise operational environment. Discover adversary campaigns, anomalies and inconsistencies in sensor and system logs, SIEMs, and other data. Analyze and track vulnerability disclosure program (VDP) incidents as it relates to intelligence reporting. Identify, investigate and rule out system compromises, with the capacity to provide written analytic summaries and attack life cycle visualizations. Provide risk assessments and recommendations based on analysis of technologies, threats, intelligence, and vulnerabilities. Offer recommendations to adjust enterprise or tactical countermeasures to for threats impacting the DODIN. Collect analysis metrics and trending data, identify key trends, and provide situational awareness on these trends. Provide guidance regarding the use of OSINT techniques in the pursuit of investigatory requirements. Perform quality assurance duties on behalf of JDOC leadership, ensuring that SIGACTs are compliant with JDOC policies, as well as ensuring that all information is captured before closure. Required Qualifications Active DoD TS/SCI Clearance and eligible for polygraph. DoDD 8570 IAT Level II Certification (SEC+, CySA, GICSD, etc.). Bachelor's degree in related discipline and 12+ years of related experience. Additional experience may be accepted in lieu of degree. Strong communications and interpersonal skills. Proficient in Microsoft Office applications (Word, Excel, Outlook, PowerPoint). Proficient in Windows 7/8/10/11. Ability to work in a virtual environment like Microsoft Teams. Experience working with members of the Intelligence Community (IC) and knowledge and understanding of Intelligence processes. In-depth knowledge of network and application protocols, cyber vulnerabilities and exploitation techniques and cyber threat/adversary methodologies. Proficiency with datasets, tools and protocols that support analysis (e.g. Splunk, CMRS, VDP, passive DNS, Virus Total, TCP/IP, OSI, WHOIS, enumeration, threatindicators, malware analysis results, Wireshark, Arcsight, etc.). Experience with IC repositories (Pulse, TESTFLIGHT, etc.) Experience with various open-source and commercial vendor portals, services and platform that provide insight into how to identify and/or combat threats or vulnerabilities to the enterprise. Proficiency working with various types of network data (e.g. netflow, PCAP, custom application logs). Preferred Qualifications Experience with the DODIN and other DoD Networks. Familiarity with DoD portals and tools (RAMs, IKE, JCC2, etc.) Experience with proprietary OSINT Sources (Mandiant, Recorded Future, Shodan, etc.) Skilled in building extended cyber security analytics (Trends, Dashboards, etc.). Demonstrated experience briefing Senior Executive Service (SES) and General Officer/Flag Officer (GO/FO) leadership. Experience in intelligence driven defense and/or Cyber Kill Chain methodology. IAT Level III or IAM Level II+III Certifications Commitment to Non-Discrimination All qualified applicants will receive consideration for employment without regard to sex, race, ethnicity, age, national origin, citizenship, religion, physical or mental disability, medical condition, genetic information, pregnancy, family structure, marital status, ancestry, domestic partner status, sexual orientation, gender identity or expression, veteran or military status, or any other basis prohibited by law. Leidos will also consider for employment qualified applicants with criminal histories consistent with relevant laws. #J-18808-Ljbffr
    $72k-90k yearly est. 2d ago
  • DevOps and Security Engineer

    Comrise 4.3company rating

    Miami, FL jobs

    Job Posting Title DevOps & Security Engineer We are looking for a DevOps & Security Engineer to maintain and secure our Web3 stablecoin infrastructure. You will be responsible for overall server architecture, security hardening, node maintenance, and CI/CD deployments to ensure 24/7 system reliability for both our off-chain systems and on-chain nodes. Location: Miami, Florida (temporarily remote, with future hybrid in-office requirements) Key Responsibilities: Manage day-to-day operations of company infrastructure including servers, cloud services, and container platforms. Maintain critical node services including RPC services and oracle components. Establish security protocols and implement host/network security hardening (WAF, security groups, firewalls) Oversee service monitoring, log analysis, troubleshooting, and capacity planning. Build and maintain CI/CD pipelines using GitHub Actions/GitLab CI Manage Docker and Kubernetes clusters. Administer certificates, TLS, VPN, and IAM permission systems. Conduct regular vulnerability scans, coordinate penetration tests, and manage patch updates. Undertake ad hoc projects as we continue to grow. Qualifications: 3+ years of experience in DevOps, infrastructure, or security roles. Strong Linux administration skills with substantial experience in troubleshooting and performance tuning. Proficiency with Docker/Kubernetes, Nginx, load balancing, and logging systems (ELK/EFK). Solid understanding of network security concepts: VPC, ACL, WAF, DDoS protection, firewalls, zero-trust. Experience with at least one major cloud platform (AWS/GCP/Azure). Scripting skills in Shell, Python, or Go.
    $73k-101k yearly est. 3d ago

Learn more about Vencore jobs

View all jobs