Cyber Security Analyst jobs at World Wide Technology - 2700 jobs
Cyber ML Engineer: Real-Time Threat Detection
Phase2 Technology 3.9
McLean, VA jobs
A leading technology firm is seeking a Cyber Machine Learning Engineer to build and improve machine learning models for detecting cyber threats. The ideal candidate has significant experience in cyber threat hunting and proficiency in Python and MLOps practices. This position offers a competitive compensation range of $99,000 to $225,000 annually, along with comprehensive benefits including health, life, and professional development opportunities. The job supports flexible work arrangements.
#J-18808-Ljbffr
$99k-225k yearly 4d ago
Looking for a job?
Let Zippia find it for you.
Lead Security Engineer, GovCloud
Salesforce, Inc. 4.8
San Francisco, CA jobs
*To get the best candidate experience, please consider applying for a maximum of 3 roles within 12 months to ensure you are not duplicating efforts.*Job CategorySoftware EngineeringJob Details****About Salesforce****Salesforce is the #1 AI CRM, where humans with agents drive customer success together. Here, ambition meets action. Tech meets trust. And innovation isn't a buzzword - it's a way of life. The world of work as we know it is changing and we're looking for Trailblazers who are passionate about bettering business and the world through AI, driving innovation, and keeping Salesforce's core values at the heart of it all.**About the team** Salesforce is looking to hire a Lead Security Engineer for Government Cloud Services. We prioritize security and data protection to ensure the confidentiality, integrity, and availability of our systems and information. As we continue to expand our operations, we are seeking a skilled and experienced Lead SecurityAnalyst to join our dynamic team and play a pivotal role in safeguarding our organization against evolving cyber threats. As the Lead Security Engineer, you will be responsible for driving the overall security posture of our organization. You will work closely with cross-functional teams to assess risks, implement security measures, monitor security systems, and respond to security incidents. Your expertise in security frameworks, technologies, and best practices will be critical in developing and executing strategies to protect our critical assets and infrastructure. **What you will be doing:*** Apply security policies to meet security objectives of the system.* Assess adequate access controls based on principles of least privilege and need-to-know.* Assess all the configuration management (change configuration/release management) processes.* Assess the effectiveness of security controls.* Ensure cybersecurity-enabled products or other compensating security control technologies reduce identified risk to an acceptable level.* Develop and implement comprehensive security policies, procedures, and guidelines to ensure the protection of company assets and compliance with applicable regulations.* Conduct (or coordinate with third party partners) regular security risk assessments, vulnerability assessments, and penetration tests to identify potential weaknesses in systems, networks, and applications and coordinate remediation of findings. Drive related mitigations.* Collaborate with stakeholders to design and implement security controls, including firewalls, intrusion detection systems, access controls, and encryption technologies.* Conduct analysis of logs and events, identify gaps for deeper analysis as needed, and coordinate with Detection and Response teams on detection and alerting betterment efforts and uplift.* Stay up-to-date with the latest security trends, vulnerabilities, and threat intelligence, and provide recommendations to proactively address emerging risks.* Liaison with Incident Response teams on incidents and response efforts, recommend and/or instigate remediation actions to prevent future occurrences.* Develop and deliver security awareness and training programs to educate employees on security best practices and promote a culture of security across the organization.* Collaborate with external vendors, partners, and auditors to ensure compliance with security standards and regulations. Further, implement system security measures in accordance with established procedures to ensure confidentiality, integrity, availability, authentication, and non-repudiation* Maintain documentation of security procedures, incident response plans, and security incident reports.**What you should have:*** Experience with using cloud infrastructure as code (IaC), including Terraform, CloudFormation, or Azure Resource Manager to deploy secure cloud infrastructure, and using version control based on Git* Professional certifications such as CISSP, CISM, CEH, or similar are highly desirable.* Proven experience (5+ years) in a securityanalyst role, with a focus on information security, incident response, and vulnerability management.* Must be US Citizen operating on US Soil and pass both enhanced background check as long as Criminal Justice background check.* Strong understanding of security frameworks such as ISO 27001, NIST, or CIS Controls, and their practical application.* Extensive knowledge of security technologies, including firewalls, IDS/IPS, SIEM, DLP, antivirus, and endpoint protection systems.* Hands-on experience with vulnerability assessment tools, network scanning tools, and penetration testing methodologies.* Experience with using cloud infrastructure as code (IaC), including Terraform, CloudFormation, or Azure Resource Manager to deploy secure cloud infrastructure, and using version control based on Git“* Proficiency in log analysis, incident response, and forensic investigation techniques.* Excellent communication skills, both written and verbal, with the ability to articulate complex security concepts to technical and non-technical stakeholders.* Demonstrated leadership abilities, with the capacity to motivate and inspire a team.* Strong analytical and problem-solving skills, with the ability to think strategically and develop innovative solutions to security challenges.Joining Salesforce Government Cloud as a Lead Security Engineer provides an exciting opportunity to make a significant impact on the organization's security posture and contribute to its overall success. If you are passionate about security, possess strong leadership skills, and thrive in a fast-paced environment, we encourage you to apply for this challenging and rewarding position.Unleash Your PotentialWhen you join Salesforce, you'll be limitless in all areas of your life. Our benefits and resources support you to find balance and *be your best*, and our AI agents accelerate your impact so you can *do your best*. Together, we'll bring the power of Agentforce to organizations of all sizes and deliver amazing experiences that customers love. Apply today to not only shape the future - but to redefine what's possible - for yourself, for AI, and the world.AccommodationsIf you require assistance due to a disability applying for open positions please submit a request via this .Posting StatementAny employee or potential employee will be assessed on the basis of merit, competence and qualifications - without regard to race, religion, color, national origin, sex, sexual orientation, gender expression or identity, transgender status, age, disability, veteran or marital status, political viewpoint, or other classifications protected by law. This policy applies to current and prospective employees, no matter where they are in their Salesforce employment journey. It also applies to recruiting, hiring, job assignment, compensation, promotion, benefits, training, assessment of job performance, discipline, termination, and everything in between. Recruiting, hiring, and promotion decisions at Salesforce are fair and based on merit. The same goes for compensation, benefits, promotions, transfers, reduction in workforce, recall, training, and education.In the United States, compensation offered will be determined by factors such as location, job level, job-related knowledge, skills, and experience. Certain roles may be eligible for incentive compensation, equity, and benefits. Salesforce offers a variety of benefits to help you live well including: time off programs, medical, dental, vision, mental health support, paid parental leave, life and disability insurance, 401(k), and an employee stock purchasing program. More details about company benefits can be found at the following link: ******************************************* to the San Francisco Fair Chance Ordinance and the Los Angeles Fair Chance Initiative for Hiring, Salesforce will consider for employment qualified applicants
#J-18808-Ljbffr
A global technology consulting firm is seeking a Senior SecurityAnalyst to support governance in the enterprise security program. The role involves monitoring service provider activities, facilitating audits, and providing expertise on security issues. Ideal candidates should have strong self-management skills, familiarity with security technologies, and security certifications are preferred. This position comes with a comprehensive benefits package and competitive compensation in New York, with a compensation range between $65,586 and $121,980.
#J-18808-Ljbffr
$65.6k-122k yearly 4d ago
Senior Security Analyst
Capgemini 4.5
New York, NY jobs
Choosing Capgemini means choosing a company where you will be empowered to shape your career in the way you'd like, where you'll be supported and inspired bya collaborative community of colleagues around the world, and where you'll be able to reimagine what's possible. Join us and help the world's leading organizationsunlock the value of technology and build a more sustainable, more inclusive world.
The Senior SecurityAnalyst supports the governance of service provider activities in the enterprise security program, monitoring and escalating problems and providing information on security issues. Undertakes security assurance and audit activities to ensure compliance and to identify risks and opportunities. Provides information to senior managers and executives to ensure that they are aware of any security-related risks or opportunities. Provides subject matter expertise, consultancy and training in security-related matters. Must be able to function in a fast-paced, multi-vendor outsourced environment, facilitating conference calls among other subject matter experts and the client.
Responsibilities
Handles monthly reporting duties for the Information Risk Management team.
Facilitates audit planning and audit remediation activities of the service providers, leading calls and documenting and reporting progress.
Has familiarity with security technologies and controls; expertise not required, but the ability to escalate to more senior subject matter experts is important.
Develops work plans to structure solutions and communications.
Involves client and vendor staff appropriately in resolving security problems.
Participates effectively within the business' security governance framework.
Tracks the corrective and preventive actions being taken to improve security to closure.
Possesses strong communication skills to communicate technical and security risk information to management.
Experience
Ability to self-manage with little interaction from other management staff.
Flexible and able to adapt to manage a fast‑changing environment.
Ability to solve complex issues and provide recommendations and advice regarding remediations.
Experience with security architecture, security software, or security policy.
Ability to organize agendas, lead conference calls, and track action items to completion.
Security and Audit certifications such as SSCP, CISSP, CISA, CISM, CGEIT, CRISC, Security+ are preferred.
Job Description - Grade Specific
The base compensation range for this role in the posted location is: $65,586-121,980.
Capgemini provides compensation range information in accordance with applicable national, state, provincial, and local pay transparency laws. The base compensation range listed for this position reflects the minimum and maximum target compensation Capgemini, in good faith, believes it may pay for the role at the time of this posting. This range may be subject to change as permitted by law.
The actual compensation offered to any candidate may fall outside of the posted range and will be determined based on multiple factors legally permitted in the applicable jurisdiction.
These may include, but are not limited to: Geographic location, Education and qualifications, Certifications and licenses, Relevant experience and skills, Seniority and performance, Market and business consideration, Internal pay equity.
It is not typical for candidates to be hired at or near the top of the posted compensation range.
In addition to base salary, this role may be eligible for additional compensation such as variable incentives, bonuses, or commissions, depending on the position and applicable laws.
Capgemini offers a comprehensive, non‑negotiable benefits package to all regular, full‑time employees. In the U.S. and Canada, available benefits are determined by local policy and eligibility and may include:
Paid time off based on employee grade (A-F), defined by policy: Vacation: 12‑25 days, depending on grade, Company paid holidays, Personal Days, Sick Leave
Medical, dental, and vision coverage (or provincial healthcare coordination in Canada)
Retirement savings plans (e.g., 401(k) in the U.S., RRSP in Canada)
Life and disability insurance
Employee assistance programs
Other benefits as provided by local policy and eligibility
Important Notice: Compensation (including bonuses, commissions, or other forms of incentive pay) is not considered earned, vested, or payable until it becomes due under the terms of applicable plans or agreements and is subject to Capgemini's discretion, consistent with applicable laws. The Company reserves the right to amend or withdraw compensation programs at any time, within the limits of applicable legislation.
Disclaimers
Capgemini is an Equal Opportunity Employer encouraging inclusion in the workplace. Capgemini also participates in the Partnership Accreditation in Indigenous Relations (PAIR) program which supports meaningful engagement with Indigenous communities across Canada by promoting fairness, accessibility, inclusion and respect. We value the rich cultural heritage and contributions of Indigenous Peoples and actively work to create a welcoming and respectful environment. All qualified applicants will receive consideration for employment without regard to race, national origin, gender identity/expression, age, religion, disability, sexual orientation, genetics, veteran status, marital status or any other characteristic protected by law.
Physical, mental, sensory or environmental demands may be referenced in an attempt to communicate the manner in which this position traditionally is performed. Whenever necessary to provide individuals with disabilities an equal employment opportunity, Capgemini will consider reasonable accommodations that might involve varying job requirements and/or changing the way this job is performed, provided that such accommodation does not pose an undue hardship. Capgemini is committed to providing reasonable accommodation during our recruitment process. If you need assistance or accommodation, please reach out to your recruiting contact.
Ref. code 385096-en_US
Posted on 05 Jan 2026
Contract type Permanent
Location Atlanta, Austin, Bellevue, Berwyn, Bridgewater, Brooklyn, Burlington, Chicago, Columbia, Dallas, Dayton - Sogeti US, Guaynabo, Houston, Irving, Mclean, Nashville, New York, San Francisco, Santa Clara, Seattle, Southfield, Tampa, Westerville
#J-18808-Ljbffr
$65.6k-122k yearly 4d ago
Security Analyst
Matlen Silver 3.7
Charlotte, NC jobs
Title: SecurityAnalyst
Duration: 1 year, contract to hire
Environment: 5 Days onsite (NON NEGOTIABLE)
Pay: $52-$65/hour W2 (NO C2C)
** Due to client requirements, US Citizen or Green Card Holders ONLY**
Requirements:
Minimum 7+ years of professional related experience
Previous experience in financial services, banking, wealth management, credit card, or payment processing: preferably in enterprise level environment
Lead and drive cybersecurity initiatives across a range of projects, balancing scope, priorities, and business needs while operating in a fast-paced, multi-tasking environment.
Bring strong hands-on experience with Identity Governance and Administration (IGA) platforms such as SailPoint, Saviynt, Oracle Identity Governance (OIG), or ForgeRock, with the ability to identify and resolve access and security issues.
Apply strong analytical skills to work with complex data, including writing SQL queries, Python, and shell scripts to extract, analyze, and validate information from databases and file systems.
Design, build, and maintain meaningful dashboards and metrics that provide insight into security posture, performance, and operational effectiveness.
Collaborate closely with IAM teams, business users, and leadership to remediate issues, improve processes, and support access governance objectives.
Mentor and train junior analysts, helping to improve workflows, consistency, and overall team capability.
Nice to have: 7+ years of experience with any IGA Platforms
Responsibilities:
This project focuses on reviewing user access on a daily basis to confirm it aligns with established controls and application requirements. The team works closely with application owners and business partners to address access issues, follow through on remediation, and escalate items when needed. Team members are supported and coached on the process to ensure work is completed accurately and consistently. Overall, the effort helps maintain strong access governance while keeping day-to-day operations running smoothly.
$52-65 hourly 5d ago
Acquisition Security Analyst
Mantech 4.5
Los Angeles, CA jobs
MANTECH seeks a motivated, career and customer-oriented Acquisition SecurityAnalyst II to join our team in El Segundo, CA.
The Acquisition SecurityAnalyst II will assist the Government Program Manager with the development and implementation of comprehensive program protection methodologies to protect advanced technology programs throughout the system's lifecycle.
Responsibilities include but are not limited to:
In-depth lifecycle program analysis to identify critical program information (CPI), Critical System Resources (CSR), and their associated vulnerabilities. Assist with the identification and implementation of countermeasures. Develop and implement a risk management-based program protection plan and strategy.
Provide security recommendations to the PM, GSSO, and cognizant security authorities as to the Air Force acquisition and sustainment process.
Maintain a working relationship with the PM, Contracting Officer and contractor security officers to ensure a standardized and correct format/process is utilized for all DD Form 254 efforts throughout the acquisition and sustainment lifecycle, in coordination with Program Security Officers.
Conduct analysis of foreign intelligence threats against programs involving customer's critical research, sensitive technologies or CPI.
Prepare and produce analytical products from numerous resources, to include various databases, to ensure a real-time, tailored product is provided.
Write, review, and/or edit Security Classification Guides (SCG), Exposure Contingency Plans (ECP), Managed Access Plans (MAP), Security Operating Procedures (SOPs), System Test Plans (STP)
Provide technical analysis and OPSEC support to SMC or AFSPC Special programs and other associated operations, missions, and organizational elements involved in developing system requirements to associated systems RDT&E.
Minimum Qualifications:
Bachelor's degree in a related area; an additional 4 years of related experience might be considered for a degree.
10+ years of related experience with acquisition programs
6+ years of experience with SCI programs.
Must be familiar with security policy/manuals and the appropriate ICDs/JAFANs/DOD Manuals and other guiding policy documents.
Must have extensive knowledge of the DD Form 254 and how it is incorporated in the Air Force acquisition process.
Willingness to travel within the scope of the Program's Area of Responsibility (AOR) (note- could be extensive, and will include both air and ground transportation)
Preferred Qualifications:
4+ years of experience with SAR program acquisitions desired.
Working knowledge of Microsoft Office (Word, PowerPoint, and Excel)
Possess a high degree of originality, creativity, initiative requiring minimal supervision.
Have the ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners.
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a polygraph.
Physical Requirements:
Must be able to remain in a stationary position 50%.
Needs to occasionally move about inside the office to access file cabinets, office machinery, etc.
Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer.
Frequently communicates with co-workers, management and customers, which may involve delivering presentations. Must be able to exchange accurate information in these situations.
$67k-89k yearly est. 2d ago
Senior Network & Security Consultant - Remote
Thales Group 4.5
Palo Alto, CA jobs
A leading global security company in California is seeking a Consultant for Network & Security. Key responsibilities include acting as a technical advisor, defining architecture for solutions, and supporting operational teams. Ideal candidates should have expertise in firewalls, encryption, and IT security practices. The role offers hybrid working conditions and emphasizes continuous learning and coaching.
#J-18808-Ljbffr
A leading cybersecurity firm in California is seeking a Senior Consultant for Network Security Engineering. This role involves designing and implementing secure network solutions across various environments. The ideal candidate will have a strong background in network security, experience with technologies like Palo Alto and Cisco, and a focus on delivering risk-based recommendations. This position offers a hybrid work model, competitive remuneration, and opportunities for professional development.
#J-18808-Ljbffr
$104k-138k yearly est. 2d ago
Staff Cyber Security Engineer
Infovision Inc. 4.4
Dallas, TX jobs
As a Staff CyberSecurity Engineer, you will collaborate closely with the Engineering Organization, IT, Information Security, Software Engineers, and our DevOps departments.
Your team will ensure our embedded platforms, back-end and front-end services, cloud infrastructure, DevOps pipelines, data pipelines, and software are secured in the most efficient manner.
You will work to develop new systems and procedures to counteract threat vectors that arise within our cloud and embedded environments.
The ideal candidate is passionate about understanding complex architectures they work in and is adept at translating non-functional security requirements to red-team actions.
The ideal candidate is also a meticulous problem solver who can work under pressure when required and remains current with the latest attack trends and technologies.
Preferred Qualifications:
Master's degree in Computer Science or relevant field of study.
Cyber related certifications such as CompTIA CySA+, CISSP, CHFI, OSCP.
Experience in digital forensics.
Working experience within a DevSecOps environment.
Minimum Qualifications
Expertise in secure API integration design and implementation
Expertise in the OWASP top 10 for web applications, and LLMs along with mitigation and remediation techniques
Bachelor's degree in Computer Science, Information Technology, or a related field.
Extensive experience in cybersecurity within software engineering environments.
Experience with a programming language (C/C++, Python, Go, JavaScript / TypeScript, Rust)
Proficiency in cloud security, threat detection, data analysis, and incident response.
Expertise with security tools such as BurpSuite, PyRIT, Garak, MitM, Metasploit, Wireshark, Wiz, Sonarqube
Experience standing up Security tooling to automate security hygiene, analysis, reporting or otherwise host tools or enhance intel capabilities
Strong technical knowledge of microservice architecture, content distribution networks, data lakes, serverless functions, and databases.
Familiarity with various cloud platforms and DevOps tools.
Excellent analytical and problem-solving skills.
Strong communication skills, both written and verbal.
Ability to independently develop and implement security solutions.
Experience in developing and implementing automated security testing functions.
$77k-100k yearly est. 4d ago
Senior Security Engineer
OSI Engineering 4.6
Mountain View, CA jobs
A globally leading consumer device company headquartered in Mountain View, CA is looking for a Senior Offensive Security Engineer to proactively identify, exploit, and help eliminate security weaknesses across our web platforms and AI/ML systems. In this role, you will think like an attacker, operate with engineering rigor, and work closely with product, platform, and AI teams to raise the security bar across the organization. You will lead complex penetration tests, design novel attack techniques for web and modern AI-powered applications, and influence secure-by-design architecture at scale.
Responsibilities:
• Conduct offensive security assessments on large-scale web applications, REST APIs, and cloud-backed services.
• Identify and validate vulnerabilities including injection flaws, access control
issues, authentication/authorization weaknesses, SSRF, deserialization, and logic
bugs.
• Evaluate LLM-based systems and AI agents for prompt injection, data exfiltration, model abuse and jailbreaks
• Design and execute red team-style engagements simulating real-world adversaries.
• Develop custom exploitation tools, PoCs, and fuzzers for web and AI attack surfaces.
• Identify systemic security weaknesses and collaborate with engineering teams to drive long-term mitigations.
• Review architectures and designs for new products with an attacker mindset.
• Produce clear, actionable security reports and present findings to technical and executive stakeholders.
Minimum Qualifications:
• Master's degree in Computer Science, Computer Engineering, Information Security, or a closely related technical field.
• Doctorate (PhD) in a relevant field is a plus but not required.
• 5+ years of experience in offensive security, penetration testing, or red teaming.
• Deep expertise in web application security.
• Strong understanding of API security.
• Hands-on experience testing AI/ML or LLM-based systems, or strong motivation with demonstrated research in this area.
• Proficiency in at least one scripting or programming language (Python, Go, JavaScript, or similar).
• Strong knowledge of common exploitation techniques and attacker tooling.
Preferred Qualifications:
• Prior work on adversarial ML, red-teaming AI systems, or secure LLM pipeline
design.
• Experience with cloud security (AWS, GCP, Azure) and containerized environments.
• Background in security research, published CVEs, CTF experience, blog posts, or conference talks.
• OSCP, OSEP, OSWE, CRTO, or similar.
What We Look For:
• An attacker-first mindset with strong engineering discipline.
• Ability to go beyond scanners and find novel, high-impact vulnerabilities.
• Clear communicator who can translate complex exploits into actionable fixes.
• Curiosity about emerging threats, especially in AI security.
• Ownership mentality and comfort operating in ambiguous problem spaces.
Type: Contract
Duration: 12 months with extension
Work Location: Mountain View, CA (on site)
Pay Range: $ 85.00 - $ 100.00 (DOE)
A leading software company in Chicago seeks a Senior Functional Consultant specializing in Human Capital Management to assist customers with HR technology challenges. The ideal candidate will have over 5 years of experience with Workday and must excel in communication and project management skills. This role involves providing customer service, supporting multiple projects, and partnering with engagement managers. Competitive salary range between $122,800 and $184,200, with flexibility for remote work.
#J-18808-Ljbffr
$122.8k-184.2k yearly 3d ago
Information Security Analyst
Supermicro 4.7
San Jose, CA jobs
Supermicro is a Top Tier provider of advanced server, storage, and networking solutions for Data Center, Cloud Computing, Enterprise IT, Hadoop/ Big Data, Hyperscale, HPC and IoT/Embedded customers worldwide. We are the #5 fastest growing company among the Silicon Valley Top 50 technology firms. Our unprecedented global expansion has provided us with the opportunity to offer a large number of new positions to the technology community. We seek talented, passionate, and committed engineers, technologists, and business leaders to join us.
Job Summary:
Supermicro is looking for an experienced and knowledgeable Information SecurityAnalyst to join our information security team. As a gatekeeper that keeps track to the high-volume data over the cyberspace for the company, the securityanalyst must possess knowledge of every aspect of information security, with its main focus on analyzing the security measures of a company and determine how effective they are, and assess risks and provide recommendations for remediation. The securityanalyst must work with business administrators as well as IT professionals in communicating flaws in security systems, and recommend changes that will improve every aspect of company security. This position will be based in our headquarters located in San Jose, CA.
Essential Duties and Responsibilities:
The responsibilities will include, but not limited to:
Design, implement and enforce information security policy including asset management and system hardening.
Insuring all networks have adequate security to prevent unauthorized access.
Develop reports to share with administrators about the efficiency of security policies and recommend any changes.
Organize and conduct training for all employees regarding company security and information safeguarding.
Ensure that all security systems are current with any software or hardware changes in the company.
Perform penetration tests and security scanning on hosts and networks.
Follow up on security mitigations.
Qualifications:
Basic Qualifications:
Bachelor's degree in Computer Science, Management Information Systems or equivalent experiences.
Experience with system and network administration and able to perform networking penetration tests using software tools.
Preferred Qualifications:
Master's degree in Computer Science or Management Information Systems.
2-4+ years of hands-on experience in information security environment, with prior experiences in high-tech corporate environment.
Solid understanding in security framework and best practices.
Strong analytical, troubleshooting and problem-solving skills.
Excellent communication skills in both verbal and written.
Certifications in the following is highly preferred - GIAC, CISSP, SSCP, etc.
Salary Range
$90,000 - $100,000
The salary offered will depend on several factors, including your location, level, education, training, specific skills, years of experience, and comparison to other employees already in this role. In addition to a comprehensive benefits package, candidates may be eligible for other forms of compensation, such as participation in bonus and equity award programs.
EEO Statement
Supermicro is an Equal Opportunity Employer and embraces diversity in our employee population. It is the policy of Supermicro to provide equal opportunity to all qualified applicants and employees without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, protected veteran status or special disabled veteran, marital status, pregnancy, genetic information, or any other legally protected status.
$90k-100k yearly 3d ago
Consultant Network & Security
Thales Group 4.5
Palo Alto, CA jobs
Consultant Network & Security page is loaded## Consultant Network & Securityremote type: Hybrid or Remotelocations: Contern\_EXCtime type: Full timeposted on: Posted 30+ Days Agojob requisition id: R0287400Les entreprises et les gouvernements comptent sur Thales pour apporter de la confiance aux milliards d'interactions numériques qu'ils établissent avec les utilisateurs. L'Activité Mondiale Identité & Sécurité Numériques (DIS) fournit des technologies et services (des logiciels sécurisés en passant par la biométrie ou encore le cryptage), qui permettent aux entreprises ainsi qu'aux gouvernements de vérifier des identités, et de protéger les données afin qu'elles restent sûres.**Tasks and responsibilities*** Act as the dedicated technical advisor towards the customer in the limit of the scope of skills of the consultant* Gather technical needs from customer and propose the most adapted solutions to customer* Define architecture and participate to conception of technical solutions* Realize advisory and expertize missions* Support Account Managers during the presales phase of writing offers to customers such as “Proof of Concept” realization, writing Statements of Work, technical solutions presentations, preparation of technical aspects for all call for tenders* Implement and support operational teams during rollout phases* Manage and ensure engagement on deliverables in due time in the limit of the scope of skills of the consultant* Maintain updated general skills on network security (best practices, protocols, security fundamentals, risks identification, methodology etc.)* Technical skills to maintain updated (certifications / self-training / trainings to follow) further to the Personal targets defined* Skills, tailor made trainings and knowledge transfer towards customers* Skills, tailor made trainings and knowledge transfer towards team mates (to ensure coverage in case of absence)* Coaching junior consultants in order to make them grow up in terms of soft and technical skills* Coaching trainees (manage and follow up of the whole internship of the trainees)* Creativity in problem solving on a constant basis in day to day tasks and in exceptional tasks (such as incidents) in the limit of the scope of skills of the consultant* Detect and evaluate level of importance of any crisis situation* Escalate any crisis situation (previously detected and evaluated by the junior consultant himself) to confirmed and senior peers when necessary* Reporting and documentation (French and English)* Act the role of Back-Up for 1rst/2nd line support Engineer* Act the role of 3rd line for the SOD in the limit of the scope of skills of the consultant**Prerequisite**Expertise in one or more of the following areas:* Firewalls,* Web and Database Application firewalls,* Protection systems against unknown threats (Sandboxing* Messaging Security,* Strong authentication and SAML identity federation, OpenID Connect, …* Encryption (IPSEC VPN, data encryption, …),* Hardware Security Module (HSM),* More specifically, you are familiar with the technologies of the following manufacturers,* Firewalls: Checkpoint, Palo Alto Networks, Fortinet,* Web Proxy: Bluecoat ProxySG, McAfee Web Gateway R,* Load Balancing / WAFF: F5, Netscaler, DenyAll, Imperva,* Email Security: Cisco, TrendMicro, Trustwave,* Strong authentication: RSA, Gemalto, RCDevs,* HSM: Gemalto, Thales,* Sandboxing: BlueCoat MAA, TrendMicro,* Identity Federation: Microsoft ADFS, auth0, okta.**Security*** In-depth knowledge of IT security practices, including identity and access management, vulnerability management, network and operating system security, and application security* Competence in cryptography and data security* Knowledge of information security standards and regulations* Experience in detecting and responding to information security incidents, including compliance management and conducting information security audits**Back-up**Other Senior consultants / Practice Leader/ Team LeaderThales, entreprise Handi-Engagée, reconnait tous les talents. La diversité est notre meilleur atout. Postulez et rejoignez nous !remote type: Hybrid or Remotelocations: Contern\_EXCtime type: Full timeposted on: Posted 30+ Days Ago
#J-18808-Ljbffr
$104k-138k yearly est. 4d ago
E-Mail Security Engineer
Mavensoft Technologies 3.9
Atlanta, GA jobs
Job Title: E-Mail Security Engineer
(Local Candidates only)
Duration: ~6 Months
Work Hours: Hybrid (Some evenings; NTE 40 hrs/week)
Key Skills: Microsoft 365 Exchange Online, Exchange Server 2013/2016/2019, Hybrid Exchange, Proofpoint, Microsoft Defender for Office 365, Email Security, SMTP, DNS (MX, SPF, DKIM, DMARC), Azure Active Directory, SSO, Identity Integration
Preferred Skills: PowerShell automation and reporting, message tracing, transport rules, Microsoft Purview compliance tools, government or regulated enterprise experience
Job Description:
This Email Security & Exchange Engineer will serve as the technical lead and subject matter expert (SME) for enterprise messaging and email security platforms. This role supports Microsoft 365 Exchange, on-premises Exchange, Proofpoint, Microsoft Defender for Email, and Azure-based identity services, with a focus on platform reliability, security, modernization, and incident response in a large enterprise environment.
Job Responsibilities
Administer and optimize Microsoft 365 Exchange Online and on-prem Exchange in hybrid environments.
Manage mail flow, routing, compliance, retention, and messaging security controls.
Support Exchange upgrades, migrations, and modernization initiatives.
Administer and tune email security platforms including Proofpoint and Microsoft Defender for Office 365.
Troubleshoot complex email delivery issues, security threats, and user-impacting incidents.
Support Azure AD integration, SSO, and hybrid identity synchronization.
Lead high-severity incident response, root cause analysis, and remediation efforts.
Develop operational documentation including SOPs, runbooks, dashboards, and reports.
Provide technical guidance and knowledge transfer to internal engineering teams.
Required Qualifications
7+ years of experience supporting enterprise messaging systems.
Strong hands-on experience with Microsoft 365 Exchange Online, Exchange Server 2013/2016/2019, and hybrid Exchange environments.
Proven experience administering Proofpoint and Microsoft Defender for Office 365.
Advanced troubleshooting skills with SMTP, email routing, and DNS (MX, SPF, DKIM, DMARC).
Experience supporting Azure Active Directory and enterprise identity integrations.
$87k-119k yearly est. 2d ago
Senior Security Engineer
Loft Orbital, Inc. 4.0
San Francisco, CA jobs
Loft Orbital is revolutionizing access to space by building reliable, shareable satellites that drastically reduce the time and complexity traditionally required to get to orbit. We operate satellites, fly customer payloads, and handle entire missions from end‑to‑end. We're a close‑knitted team of space enthusiasts, software experts, and cutting‑edge technologists, all working together to make space simple for our customers.
As a Senior Security Engineer on our Security and Compliance Team, your mission will be to ensure that our highly automated, containerized, and globally distributed infrastructure remains secure throughout its lifecycle, from architecture to incident response. You'll be at the heart of our DevSecOps efforts, collaborating directly with infrastructure, software, product, and solution teams to scale Loft's security maturity while embracing our startup agility and culture.
This is a hands‑on, deeply collaborative role, offering broad scope, rapid growth opportunities, and yes, a chance to contribute to space missions.
About the Role:
Champion DevSecOps best practices by designing and implementing security controls directly into our CI/CD pipelines (e.g., GitLab CI).
Lead and automate application and infrastructure security assessments, including threat modeling and code review.
Partner with developers and SREs to identify, remediate, and prevent vulnerabilities through secure design and practical guidance.
Design, build, and maintain secure architecture patterns for containerized, cloud‑native, and distributed workloads.
Develop and maintain automated security tooling, such as container image scanning, IaC validation, and policy‑as‑code.
Collaborate on automated security tooling for container image scanning, IaC validation, and RBAC compliance.
Support incident response workflows, including detection, forensics, root cause analysis, and post‑mortems.
Provide technical mentorship and real‑time enablement to help teams adopt a “secure‑by‑default” mindset.
Contribute to internal security tools and automation using Python, Go, or other modern languages.
Continuously improve how we measure and scale security across our SRE and infrastructure platforms.
Must Haves:
Deep experience with cloud security in AWS, Azure, or GCP environments.
Strong knowledge of container and Kubernetes security in production environments.
Proficiency in at least one modern programming language (e.g., Python, Go, C++).
Hands‑on experience with zero‑trust architecture, service mesh, and software‑defined networking.
Solid understanding of DevSecOps pipelines, IaC tools, and secure build processes.
Hands‑on experience with vulnerability scanning, SAST/DAST tools, and automated security testing.
Proven success in fast‑paced, highly collaborative environments, ideally at a startup or scale‑up.
Comfortable working closely with developers and SREs in an enablement‑first security culture.
Clear, concise communication and documentation skills.
Ability to thrive in a multicultural, globally distributed engineering team.
Nice to Haves:
Practical experience with policy‑as‑code (OPA, Sentinel, etc.).
Understanding of software‑defined networking and security policy enforcement in mesh environments.
Familiarity with modern SRE practices, observability, and resilience engineering.
Contributions to open‑source security tools or frameworks.
Interest or experience in space operations or aerospace systems.
Some of Our Awesome Benefits:
100% company‑paid medical, dental, and vision insurance option for employees and dependents
Flexible Spending (FSA) and Health Savings (HSA) Accounts offered with an employer contribution to the HSA
100% employer paid Life, AD&D, Short‑Term, and Long‑Term Disability insurance
Flexible Time Off policy for vacation and sick leave, and 12 paid holidays
401(k) plan and equity options
Daily catered lunches and snacks in office
International exposure to our team in France
Fully paid parental leave; 14 weeks for birthing parent and 10 weeks for non‑birthing parent
Carrot Fertility provides comprehensive, inclusive fertility healthcare and family‑forming benefits with financial support
Off‑sites and many social events and celebrations
Relocation assistance when applicable
$140,250 - $190,000 a year
State law requires us to tell you the base compensation range for this role, which is $140,250- $190,000 per year. This is determined by your education, experience, knowledge, skills, and abilities. The salary range for this role is intentionally wide as we evaluate individuals based on their unique experience and abilities to fit our needs. Most importantly, we are excited to meet you, and see if you are a great fit for our team. What we can't quantify for you are the exciting challenges, supportive team, and amazing culture we enjoy.
* Research shows that while men apply to jobs where they meet an average of 60% of the criteria, women and other underrepresented people tend to only apply when they meet 100% of the qualifications. At Loft, we value respectful debate and people who aren't afraid to challenge assumptions. We strongly encourage you to apply, even if you don't check all the boxes.
Who We Are
Loft: Space Made Simple.
Founded in 2017, Loft provides governments, companies, and research institutions with a fast, reliable, and flexible way to deploy missions in orbit.
We integrate, launch, and operate spacecraft, offering end‑to‑end missions as a service across Earth observation, IoT connectivity, in‑orbit demonstrations, national security missions, and more. Leveraging our existing space infrastructure and an extensive inventory of satellite buses, Loft is reducing years‑long integration and launch timelines to months. With more than 25 missions flown, Loft's flight heritage and proven technologies enable customers to focus on their mission objectives.
At Loft, you'll be given the autonomy and ownership to solve significant challenges, but with a close‑knot and supportive team at your back. We believe that diversity and community are the foundation of an open culture. We are committed to hiring the best people regardless of background and make their time at Loft the most fulfilling period of their career.
We value kind, supportive and team‑oriented collaborators. It is also crucial for us that you are a problem solver and a great communicator. As our team is international, you will need strong English skills to better collaborate, easily communicate complex ideas and convey important messages.
With 4 satellites on‑orbit and a wave of exciting missions launching soon, we are scaling up quickly across our offices in San Francisco, CA | Golden, CO | and Toulouse, France.
As an international company your resume will be reviewed by people across our offices so please attach a copy in English.
#J-18808-Ljbffr
$139k-189k yearly est. 3d ago
Principal Offensive Security Engineer, Hardware
Openai 4.2
San Francisco, CA jobs
A leading AI research company in San Francisco is hiring a Principal Offensive Security Engineer. In this role, you will craft attack simulations and collaborate with teams to strengthen security posture across products. The ideal candidate has over 7 years of experience, exceptional programming skills, and a strong background in identifying vulnerabilities. This position offers an opportunity to influence security strategy and contribute to innovative projects in a dynamic environment.
#J-18808-Ljbffr
$125k-175k yearly est. 1d ago
Offensive Security Engineer, Hardware
Openai 4.2
San Francisco, CA jobs
Security is at the foundation of OpenAI's mission to ensure that artificial general intelligence benefits all of humanity. The Security team protects OpenAI's technology, people, and products. We are technical in what we build but are operational in how we do our work, and are committed to supporting all products and research at OpenAI. Our Security team tenets include: prioritizing for impact, enabling researchers, preparing for future transformative technologies, and engaging a robust security culture.
About the Role
We're seeking an exceptional Principal-level Offensive Security Engineer to challenge and strengthen OpenAI's security posture. This role isn't your typical red team job - it's an opportunity to engage broadly and deeply, craft innovative attack simulations, collaborate closely with defensive teams, and influence strategic security improvements across the organization.
You have the chance to not only find vulnerabilities but actively drive their resolution, automate offensive techniques with cutting-edge technologies, and use your unique attacker perspective to shape our security strategy. This role will be primarily focused on continuously testing our hardware products and related services.
In this role you will:
Collaborate proactively with engineering teams to enhance security and mitigate risks in hardware, firmware, and software.
Perform comprehensive penetration testing on our diverse suite of products.
Leverage advanced automation and OpenAI technologies to optimize your offensive security work.
Present insightful, actionable findings clearly and compellingly to inspire impactful change.
Influence security strategy by providing attacker-driven insights into risk and threat modeling.
You might thrive in this role if you have:
7+ years of hands‑on experience or exceptional accomplishments demonstrating equivalent expertise.
Exceptional skill in code review, identifying novel and subtle vulnerabilities.
Demonstrated mastery assessing complex technology stacks, including:
Proven ability to reverse engineer bootrom images, firmware, or silicon‑level components.
Deep familiarity with low‑level kernel operations, secure boot processes, and hardware‑software interactions.
Hands‑on experience building and validating secure boot chains and threat models.
Proficiency with hardware debugging tools (UART, JTAG, SWD, oscilloscopes, logic analyzers).
Solid programming skills in C/C++, Python, or assembly for embedded systems.
Industry experience securing consumer hardware (e.g., mobile devices, IoT, chipsets).
Excellent written and verbal communication skills for technical and non‑technical audiences.
Strong intuitive understanding of trust boundaries and risk assessment in dynamic contexts.
Excellent coding skills, capable of writing robust tools and automation for offensive operations.
Ability to communicate complex technical concepts effectively through compelling storytelling.
Proven track record of not just finding vulnerabilities but actively contributing to solutions in complex codebases.
Prior experience working in tech startups or fast‑paced technology environments.
Experience in related disciplines such as Software Engineering (SWE), Detection Engineering, Site Reliability Engineering (SRE), Security Engineering, or IT Infrastructure.
About OpenAI
OpenAI is an AI research and deployment company dedicated to ensuring that general‑purpose artificial intelligence benefits all of humanity. We push the boundaries of the capabilities of AI systems and seek to safely deploy them to the world through our products. AI is an extremely powerful tool that must be created with safety and human needs at its core, and to achieve our mission, we must encompass and value the many different perspectives, voices, and experiences that form the full spectrum of humanity.
We are an equal opportunity employer, and we do not discriminate on the basis of race, religion, color, national origin, sex, sexual orientation, age, veteran status, disability, genetic information, or other applicable legally protected characteristic.
Qualified applicants with arrest or conviction records will be considered for employment in accordance with applicable law, including the San Francisco Fair Chance Ordinance, the Los Angeles County Fair Chance Ordinance for Employers, and the California Fair Chance Act. For unincorporated Los Angeles County workers: we reasonably believe that criminal history may have a direct, adverse and negative relationship with the following job duties, potentially resulting in the withdrawal of a conditional offer of employment: protect computer hardware entrusted to you from theft, loss or damage; return all computer hardware in your possession (including the data contained therein) upon termination of employment or end of assignment; and maintain the confidentiality of proprietary, confidential, and non‑public information. In addition, job duties require access to secure and protected information technology systems and related data security obligations.
To notify OpenAI that you believe this job posting is non‑compliant, please submit a report through this form . No response will be provided to inquiries unrelated to job posting compliance.
We are committed to providing reasonable accommodations to applicants with disabilities, and requests can be made via this link.
At OpenAI, we believe artificial intelligence has the potential to help people solve immense global challenges, and we want the upside of AI to be widely shared. Join us in shaping the future of technology.
#J-18808-Ljbffr
$125k-175k yearly est. 1d ago
Network Security Analyst / Network Engineer/ System Admin
Collabera 4.5
Illinois jobs
Established in 1991, Collabera has been a leader in IT staffing for over 22 years and is one of the largest diversity IT staffing firms in the industry. As a half a billion dollar IT company, with more than 9,000 professionals across 30+ offices, Collabera offers comprehensive, cost-effective IT staffing & IT Services. We provide services to Fortune 500 and mid-size companies to meet their talent needs with high quality IT resources through Staff Augmentation, Global Talent Management, Value Added Services through CLASS (Competency Leveraged Advanced Staffing & Solutions) Permanent Placement Services and Vendor Management Programs.
Collabera recognizes true potential of human capital and provides people the right opportunities for growth and professional excellence.
Job Description
Location: 100 Abbott Park Road, Lake County, Abbott Park, IL 60064
Duration: 6+ months (could go beyond)
Roles:
• Network Directory and Infrastructure Services Administration.
• Knowledge of domain administration and troubleshooting, Active Directory, MS FIM, Exchange, MS Office365 and supporting technologies, MS Azure, NPS, Federation and SQL Server administration required.
Responsibilities:
• Provide technical Level III problem isolation and resolution for a Global Active Directory Network.
• Configures and performs advanced diagnostics on infrastructure components and cloud based applications.
• Understands and repairs Domain infrastructure including DNS, DHCP, ADLDS, ADFS and FIM Sync.
• Understands and can configure/install Win Server 2008r2/2012r2 technologies for domain controllers and Radius Authentication servers.
• Repair and recover from hardware or software failures.
• Rotate on-call and must be available to work a varied shift schedule in a 7x24 hour operations center environment.
• Initiate major outage communication technical bridges as requested.
• Apply fix procedures as instructed for repetitive events as instructed and coordinate with impacted constituencies.
Competencies:
• Superior knowledge of Active Directory overall and its administrative components.
• Perform domain administration for 61,000+ workstations including domain controllers, NPS, Win 2003/2008R2/2012 server hardware, dynamic host configuration protocol (DHCP), domain name servers (DNS) configuration integrated with active directory, desktop configuration and end user support.
• Candidate will have worked in an AD environment that has done acquisition and divestiture work, Candidate will have worked with products such as ADMT, and ADLDS and the roles they play in M&A activities such as management of active directory structure in creation, administration of organizational units (OU), containers and sub containers throughout the domain from geographic to organizational standards, while setting policies and permissions.
• Candidate should have expert knowledge of Federation protocols including OAuth, SAML, WSFed, and a deep understanding of the IDP and SP roles associated with Federation environments.
• Candidate will have worked with Office 365 from an Identity standpoint and have an understanding of Azure Active Directory Sync and Identity Federation for Cloud services.
• Expertise should include attribute mapping and troubleshooting as well as rule sets associated with AADSync.
• Candidate must be able to correctly configure servers and clients for all services.
• Can isolate and repair most DNS and IP service problems.
• Understands and uses the appropriate tools in all instances during problem isolation and repair.
• Possesses an in depth understanding of communications technologies and can isolate and resolve most infrastructure issues.
Qualifications
• Associates Degree Minimum, prefer Computer Science or technology area or telecommunications science business minor
• Three (3) to six (6) months of specialized technical courses in Win and Active Directory technology's typically provided by vendors, technical societies, or equivalent experience.
Additional Information
To know more about this position, please contact:
Himanshu Prajapat
************
**********************************
$83k-112k yearly est. Easy Apply 3d ago
Network Security Analyst / Network Engineer/ System Admin
Collabera 4.5
Illinois jobs
Established in 1991, Collabera has been a leader in IT staffing for over 22 years and is one of the largest diversity IT staffing firms in the industry. As a half a billion dollar IT company, with more than 9,000 professionals across 30+ offices, Collabera offers comprehensive, cost-effective IT staffing & IT Services. We provide services to Fortune 500 and mid-size companies to meet their talent needs with high quality IT resources through Staff Augmentation, Global Talent Management, Value Added Services through CLASS (Competency Leveraged Advanced Staffing & Solutions) Permanent Placement Services and Vendor Management Programs.
Collabera recognizes true potential of human capital and provides people the right opportunities for growth and professional excellence.
Job Description
Location: 100 Abbott Park Road, Lake County, Abbott Park, IL 60064
Duration: 6+ months (could go beyond)
Roles:
• Network Directory and Infrastructure Services Administration.
• Knowledge of domain administration and troubleshooting, Active Directory, MS FIM, Exchange, MS Office365 and supporting technologies, MS Azure, NPS, Federation and SQL Server administration required.
Responsibilities:
• Provide technical Level III problem isolation and resolution for a Global Active Directory Network.
• Configures and performs advanced diagnostics on infrastructure components and cloud based applications.
• Understands and repairs Domain infrastructure including DNS, DHCP, ADLDS, ADFS and FIM Sync.
• Understands and can configure/install Win Server 2008r2/2012r2 technologies for domain controllers and Radius Authentication servers.
• Repair and recover from hardware or software failures.
• Rotate on-call and must be available to work a varied shift schedule in a 7x24 hour operations center environment.
• Initiate major outage communication technical bridges as requested.
• Apply fix procedures as instructed for repetitive events as instructed and coordinate with impacted constituencies.
Competencies:
• Superior knowledge of Active Directory overall and its administrative components.
• Perform domain administration for 61,000+ workstations including domain controllers, NPS, Win 2003/2008R2/2012 server hardware, dynamic host configuration protocol (DHCP), domain name servers (DNS) configuration integrated with active directory, desktop configuration and end user support.
• Candidate will have worked in an AD environment that has done acquisition and divestiture work, Candidate will have worked with products such as ADMT, and ADLDS and the roles they play in M&A activities such as management of active directory structure in creation, administration of organizational units (OU), containers and sub containers throughout the domain from geographic to organizational standards, while setting policies and permissions.
• Candidate should have expert knowledge of Federation protocols including OAuth, SAML, WSFed, and a deep understanding of the IDP and SP roles associated with Federation environments.
• Candidate will have worked with Office 365 from an Identity standpoint and have an understanding of Azure Active Directory Sync and Identity Federation for Cloud services.
• Expertise should include attribute mapping and troubleshooting as well as rule sets associated with AADSync.
• Candidate must be able to correctly configure servers and clients for all services.
• Can isolate and repair most DNS and IP service problems.
• Understands and uses the appropriate tools in all instances during problem isolation and repair.
• Possesses an in depth understanding of communications technologies and can isolate and resolve most infrastructure issues.
Qualifications
• Associates Degree Minimum, prefer Computer Science or technology area or telecommunications science business minor
• Three (3) to six (6) months of specialized technical courses in Win and Active Directory technology's typically provided by vendors, technical societies, or equivalent experience.
Additional Information
To know more about this position, please contact:
Himanshu Prajapat
************
**********************************
$83k-112k yearly est. Easy Apply 60d+ ago
Network Security Analyst
Collabera 4.5
Durham, NC jobs
Established in 1991, Collabera is one of the fastest growing end-to-end information technology services and solutions companies globally. As a half a billion dollar IT company, Collabera's client-centric business model, commitment to service excellence and Global Delivery Model enables its global 2000 and leading mid-market clients to deliver successfully in an increasingly competitive marketplace.
With over 8200 IT professionals globally, Collabera provides value-added onsite, offsite and offshore technology services and solutions to premier corporations. Over the past few years, Collabera has been awarded numerous accolades and Industry recognitions including.
Collabera awarded Best Staffing Company to work for in 2012 by SIA. (hyperlink here)
Collabera listed in GS 100 - recognized for excellence and maturity
Collabera named among the Top 500 Diversity Owned Businesses
Collabera listed in GS 100 & ranked among top 10 service providers
Collabera was ranked:
32 in the Top 100 Large Businesses in the U.S
18 in Top 500 Diversity Owned Businesses in the U.S
3 in the Top 100 Diversity Owned Businesses in New Jersey
3 in the Top 100 Privately-held Businesses in New Jersey
66th on FinTech 100
35th among top private companies in New Jersey
***********************************************
Collabera recognizes true potential of human capital and provides people the right opportunities for growth and professional excellence. Collabera offers a full range of benefits to its employees including paid vacations, holidays, personal days, Medical, Dental and Vision insurance, 401K retirement savings plan, Life Insurance, Disability Insurance.
Job Description
Work Location: Durham NC 27703
Job Title: Network SecurityAnalyst
Duration: 24 Months
Roles & Responsibilities:
• Primary job responsibility will be to perform Intrusion Detection Sensor Threat Analysis.
• Support for any one of McAfee IDS, Sourcefire IDS, Cisco IDS, Tipping Point IDS, Enterasys IDS, Juniper IDP and Fortinet IDS strongly desired.
• The Operations team supports 24x7 and an off shift work schedule may be required.
Qualifications
IDS/IPS
"Network analyst jobs" ; "Network security" ; "firewall analyst"; "network security position"; "network engineer"; "security engineer"
Additional Information
Should you have any questions, please feel free to call:
************
Aditika Sithta