Find Your Perfect Job

Job Search Results for cybersecurity

Sort and Filter  | 19 Results for cybersecurity  | Save This Search

Mar 16, 2023

Charlotte, NC

|

Managerial / Professional

|

Contract

{"JobID":272585,"JobType":["Contract"],"EmployerID":null,"Location":{"Latitude":-80.8151818181818,"Longitude":35.1981818181818,"Distance":null},"State":"North Carolina","Zip":"28202","ReferenceID":"CLT-610505","PostedDate":"\/Date(1678965367000)\/","Description":"An employer is seeking a Senior Technical Manager, Digital and Technology to join a large automotive company sitting fully remote. This person will report to the CIO of Platform Services.. This role will oversee strategy, delivery, and evolution of data, digital, and technology capability for one of its core business segments. This person will be responsible for evaluating, planning, implementing, and evolving the technology strategy in support of this client\u0027s digital growth and operational priorities, and will be accountable for the services enabled by the digital ecosystem for the business unit. Other responsibilities include: *Oversees projects and assignments within the marketplace technology department. *Leads efficient operation of the marketplace team inclusive of internal IT employees, contractors, vendors, and business partners. *Maintains a strong business acumen to effectively shift software development focus from optimizing development efficiency to driving business effectiveness, value creation and growth. *Remains current on evolving technology, software development processes, languages and front / back-end technologies in to improve solutions value and growth. *Conducts vendor evaluations that are timely and constructive. *Collaborates with members of the executive team to identify ways that technology, data, and insights can assist the company in achieving business and financial goals. *Identifies new developments and technologies; anticipates resulting organizational modifications. *Develops, implements and is accountable for the technology budget of marketplace. *Communicates goals, projects, and timelines of the company to the department; plans ways to execute those goals within the department. *Establishes long-term technology needs and plans and develops strategies for developing systems, software, data, and insights necessary to meet those needs. *Drives the build and adoption of our IT / business marketplace strategy, roadmap, program increments and overall agile execution. *Ensures compliance with privacy, cybersecurity, and regulatory requirements that apply to systems operations. *Provides coaching and mentorship to members of the cross functional team. *Performs other related duties as assigned.","Title":"REMOTE Senior Technical Manager, Digital and Technology","City":"Charlotte","ExpirationDate":null,"PriorityOrder":0,"Requirements":"*7+ years\u0027 experience with retail ecommerce solutions *5+ years in B2B or B2C retail *5+ years\u0027 experience in SAP Hybris, SAP Commerce Cloud Solutions *5+ years\u0027 experience in participating and leading Agile activities and ceremonies. *5+ years\u0027 experience leading teams, preferred onshore offshore mix. *3+ years\u0027 experience with JIRA or similar *3+ years\u0027 experience with Master Data *3+ years\u0027 experience with applications that integrate with data solutions (DW, ML, AI) *Very strong business-writing skills, ability to synthesize complex concepts, and translate to business opportunity. *Strong planning, priority setting, and project management skills to manage multiple projects and resources in a fast-paced environment. *Highly effective at cultivating relationships across diverse teams (technical teams as well as key business partners) *Thorough understanding of marketing technology, information technology, analytics, and enterprise systems. *Bachelor\u0027s degree in Business Administration, Industrial Engineering, Computer Science, or Information Technology","Skills":"","Industry":"Managerial / Professional","Country":"US","Division":"IT","Office":null,"IsRemoteJob":true,"IsInternalJob":false,"ExtraValues":null,"__RecordIndex":0,"__OrdinalPosition":0,"__Timestamp":0,"Status":null,"ApplicantCount":0,"SubmittalCount":0,"ApplicationToHireRatio":0,"JobDuration":null,"SalaryHigh":105.3000,"SalaryLow":70.2000,"PayRateOvertime":0,"PayRateStraight":0,"Filled":0,"RemainingOpenings":0,"TotalOpenings":0,"Visa":null,"ClearanceType":null,"IsClearanceRequired":false,"IsHealthcare":false,"IsRemote":false,"EndClient":null,"JobCreatedDate":"\/Date(-62135578800000)\/","JobModifiedDate":"\/Date(-62135578800000)\/"}

An employer is seeking a Senior Technical Manager, Digital and Technology to join a large automotive company sitting fully remote. This person will report to the CIO of Platform Services.. This role... More will oversee strategy, delivery, and evolution of data, digital, and technology capability for one of its core business segments. This person will be responsible for evaluating, planning, implementing, and evolving the technology strategy in support of this client's digital growth and operational priorities, and will be accountable for the services enabled by the digital ecosystem for the business unit. Other responsibilities include: *Oversees projects and assignments within the marketplace technology department. *Leads efficient operation of the marketplace team inclusive of internal IT employees, contractors, vendors, and business partners. *Maintains a strong business acumen to effectively shift software development focus from optimizing development efficiency to driving business effectiveness, value creation and growth. *Remains current on evolving technology, software development processes, languages and front / back-end technologies in to improve solutions value and growth. *Conducts vendor evaluations that are timely and constructive. *Collaborates with members of the executive team to identify ways that technology, data, and insights can assist the company in achieving business and financial goals. *Identifies new developments and technologies; anticipates resulting organizational modifications. *Develops, implements and is accountable for the technology budget of marketplace. *Communicates goals, projects, and timelines of the company to the department; plans ways to execute those goals within the department. *Establishes long-term technology needs and plans and develops strategies for developing systems, software, data, and insights necessary to meet those needs. *Drives the build and adoption of our IT / business marketplace strategy, roadmap, program increments and overall agile execution. *Ensures compliance with privacy, cybersecurity, and regulatory requirements that apply to systems operations. *Provides coaching and mentorship to members of the cross functional team. *Performs other related duties as assigned.Less

Mar 16, 2023

Boulder, CO

|

System Administrator

|

Contract-to-perm

|

$32 - $49 (hourly estimate)

{"JobID":272734,"JobType":["Contract-to-perm"],"EmployerID":null,"Location":{"Latitude":-105.245090909091,"Longitude":40.0339090909091,"Distance":null},"State":"Colorado","Zip":"80304","ReferenceID":"DC0-610702","PostedDate":"\/Date(1678986969000)\/","Description":"Insight Global is hiring for a Red Hat Administrator to join a cybersecurity focused program designed to protect a government agencies networks, computers, programs and data from cyber-attack damage and unauthorized access. As a Mid-Level Red Hat Engineer on the Enterprise Infrastructure Engineering team, you will interact regularly with the Network, Applications, SIEM/SOAR, ISSO, Vulnerability Assessment teams, and on-site technical resources to ensure both the security and on-going stability of the systems and networks. Responsibilities include:-Responsible for the operations, maintenance, and upkeep of the Red Hat Server environment (both physical and virtual.)-Configure Red Hat Satellite Server and implement patches using Satellite-Write Ansible scripts/playbooks for pushing system updates, patches, and configurations.-Responsible for maintaining the appropriate DOD Cyber compliance level as directed by the program Cyber Security Office via patching and configuration using DISA STIGs.-Fluent using Red Hat CLI with solid appreciation of Linux kernel on OS initialization.-Works with project managers, developers, and end users to ensure application designs meet business needs.-Install and configuring new hardware and software.-Add, remove, or update user account information, resetting passwords, etc.-Responsible for security of the Linux systems.-Responsible for documenting the configuration of the systems.","Title":"REMOTE Red Hat Administrator - Secret Cleared","City":"Boulder","ExpirationDate":null,"PriorityOrder":0,"Requirements":"-Bachelor\u0027s Degree and 4+ years of relevant Red Hat Administration experience-Hands on system administration with Linux / Red Hat experience-Background in Linux Tools (RHEL 7/8, Ansible, Satellite, RHV)-Ability to write and script in Ansible and develop Ansible playbooks-Familiarity with large scale operational environments (patching, monitoring of CPU\u0027s, memory, disk utilization)-Requires troubleshooting background-Background with DoD DISA STIG and patching process","Skills":"","Industry":"System Administrator","Country":"US","Division":"Government","Office":null,"IsRemoteJob":true,"IsInternalJob":false,"ExtraValues":null,"__RecordIndex":0,"__OrdinalPosition":0,"__Timestamp":0,"Status":null,"ApplicantCount":0,"SubmittalCount":0,"ApplicationToHireRatio":0,"JobDuration":null,"SalaryHigh":48.6360,"SalaryLow":32.4240,"PayRateOvertime":0,"PayRateStraight":0,"Filled":0,"RemainingOpenings":0,"TotalOpenings":0,"Visa":null,"ClearanceType":null,"IsClearanceRequired":false,"IsHealthcare":false,"IsRemote":false,"EndClient":null,"JobCreatedDate":"\/Date(-62135578800000)\/","JobModifiedDate":"\/Date(-62135578800000)\/"}

Insight Global is hiring for a Red Hat Administrator to join a cybersecurity focused program designed to protect a government agencies networks, computers, programs and data from cyber-attack damage... More and unauthorized access. As a Mid-Level Red Hat Engineer on the Enterprise Infrastructure Engineering team, you will interact regularly with the Network, Applications, SIEM/SOAR, ISSO, Vulnerability Assessment teams, and on-site technical resources to ensure both the security and on-going stability of the systems and networks. Responsibilities include:-Responsible for the operations, maintenance, and upkeep of the Red Hat Server environment (both physical and virtual.)-Configure Red Hat Satellite Server and implement patches using Satellite-Write Ansible scripts/playbooks for pushing system updates, patches, and configurations.-Responsible for maintaining the appropriate DOD Cyber compliance level as directed by the program Cyber Security Office via patching and configuration using DISA STIGs.-Fluent using Red Hat CLI with solid appreciation of Linux kernel on OS initialization.-Works with project managers, developers, and end users to ensure application designs meet business needs.-Install and configuring new hardware and software.-Add, remove, or update user account information, resetting passwords, etc.-Responsible for security of the Linux systems.-Responsible for documenting the configuration of the systems.Less

Feb 02, 2023

Houston, TX

|

Security Engineering

|

Perm

{"JobID":261061,"JobType":["Perm"],"EmployerID":null,"Location":{"Latitude":-95.3645454545455,"Longitude":29.7649090909091,"Distance":null},"State":"Texas","Zip":"77077","ReferenceID":"HOU-600564","PostedDate":"\/Date(1675332979000)\/","Description":"One of the largest food distribution companies in the world is looking for a REMOTE Tier III SOC Analyst to join their Vulnerability and Threat Management team. This person will use defensive measures and information collected from a variety of sources to identify, analyze, and report cybersecurity events that occur or might occur within the company\u0027s network to protect information, resources, and networks from threats.- Receive, characterize, and analyze endpoint and network alerts from various sources within the enterprise and determine possible causes of such alerts to identify anomalous activity and potential threats to network resources and users- Provide timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities- Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack- Serve as an escalation point to SOC Analysts providing support, guidance, as well as work and track security incidents through final resolution- Create and maintain incident response processes, procedures and blueprints. Documenting and maintaining knowledge base of incident methodologies and plans","Title":"Tier III SOC Analyst - Threat Hunting \u0026 IR","City":"Houston","ExpirationDate":null,"PriorityOrder":0,"Requirements":"5-7 years experience in Incident Response (with Threat Hunting experience)Background in networking and security including intrusion detection/preventionExcellent knowledge of security applications such as IDS, IPS, EDR, SIEM, next-gen AV and anomaly detection toolsKnowledge of cyber attack stagesExcellent knowledge of the 6 phases in Cyber incident response planAbility to configure and conduct vulnerability scans using VM tools such as Tenable.io and Tanium","Skills":"","Industry":"Security Engineering","Country":"US","Division":"IT","Office":null,"IsRemoteJob":true,"IsInternalJob":false,"ExtraValues":null,"__RecordIndex":0,"__OrdinalPosition":0,"__Timestamp":0,"Status":null,"ApplicantCount":0,"SubmittalCount":0,"ApplicationToHireRatio":0,"JobDuration":null,"SalaryHigh":135000.0000,"SalaryLow":120000.0000,"PayRateOvertime":0,"PayRateStraight":0,"Filled":0,"RemainingOpenings":0,"TotalOpenings":0,"Visa":null,"ClearanceType":null,"IsClearanceRequired":false,"IsHealthcare":false,"IsRemote":false,"EndClient":null,"JobCreatedDate":"\/Date(-62135578800000)\/","JobModifiedDate":"\/Date(-62135578800000)\/"}

One of the largest food distribution companies in the world is looking for a REMOTE Tier III SOC Analyst to join their Vulnerability and Threat Management team. This person will use defensive... More measures and information collected from a variety of sources to identify, analyze, and report cybersecurity events that occur or might occur within the company's network to protect information, resources, and networks from threats.- Receive, characterize, and analyze endpoint and network alerts from various sources within the enterprise and determine possible causes of such alerts to identify anomalous activity and potential threats to network resources and users- Provide timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities- Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack- Serve as an escalation point to SOC Analysts providing support, guidance, as well as work and track security incidents through final resolution- Create and maintain incident response processes, procedures and blueprints. Documenting and maintaining knowledge base of incident methodologies and plansLess

Feb 20, 2023

Barrington, IL

|

System Administrator

|

Perm

{"JobID":266093,"JobType":["Perm"],"EmployerID":null,"Location":{"Latitude":-88.108,"Longitude":42.1518181818182,"Distance":null},"State":"Illinois","Zip":"60010","ReferenceID":"KPD-604632","PostedDate":"\/Date(1676920575000)\/","Description":"Our client is seeking an IAM Engineer to join their global team. This person will provide level 3 support and troubleshooting for Active Directory, SSO, Azure AD and AD management tools. The IAM Engineer will maintain and improve the environment in both an unregulated as well as Government regulated environment. Some tasks could include implementing AD policies and governance, ensuring IAM compliance, delegate administration of group policies.","Title":"REMOTE IAM Engineer","City":"Barrington","ExpirationDate":null,"PriorityOrder":0,"Requirements":"5+ years of experience as an IAM Engineer with Active Directory and Azure AD services such as AD Domain Services, Azure AD Connect, GPOs, DHCP, DNS, AD Certificate Services, DFS, MIM, MFA, SSOExperience implementing and using IGA (Identity governance and administration) tools (ex. Saviynt or Okta or SailPoint)Experience setting up Domain Controllers Experience setting up and consolidating Active Directory domains or conditional access policiesKnowledge of AD Integration and synchronization with Azure, Azure AD, Office 365Knowledge of Active Directory and Azure AD security best practices as well as Zero Trust principlesExperience working within the ITIL framework for change and incident management Designs and implements single sign-on (SSO) solutions for cloud-based applicationsExperience working in a highly regulated and controlled environment (Government, Federal, CMMC, ITAR)","Skills":"Experience utilizing CyberArk for Privileged Access Management (PAM)Experience with Cisco DuoUnderstanding of Cybersecurity Maturity Model Certification (CMMC) ComplianceKnowledge of NIST Compliance","Industry":"System Administrator","Country":"US","Division":"IT","Office":null,"IsRemoteJob":true,"IsInternalJob":false,"ExtraValues":null,"__RecordIndex":0,"__OrdinalPosition":0,"__Timestamp":0,"Status":null,"ApplicantCount":0,"SubmittalCount":0,"ApplicationToHireRatio":0,"JobDuration":null,"SalaryHigh":129000.0000,"SalaryLow":115000.0000,"PayRateOvertime":0,"PayRateStraight":0,"Filled":0,"RemainingOpenings":0,"TotalOpenings":0,"Visa":null,"ClearanceType":null,"IsClearanceRequired":false,"IsHealthcare":false,"IsRemote":false,"EndClient":null,"JobCreatedDate":"\/Date(-62135578800000)\/","JobModifiedDate":"\/Date(-62135578800000)\/"}

Our client is seeking an IAM Engineer to join their global team. This person will provide level 3 support and troubleshooting for Active Directory, SSO, Azure AD and AD management tools. The IAM... More Engineer will maintain and improve the environment in both an unregulated as well as Government regulated environment. Some tasks could include implementing AD policies and governance, ensuring IAM compliance, delegate administration of group policies.Less

Feb 22, 2023

South Carolina, SC

|

Analyst

|

Contract

{"JobID":274160,"JobType":["Contract"],"EmployerID":null,"Location":{"Latitude":-81.163725,"Longitude":33.836081,"Distance":null},"State":"South Carolina","Zip":"","ReferenceID":"VMS-CEN-CTLKJP00003665","PostedDate":"\/Date(1677024000000)\/","Description":"*****MUST BE US CITIZEN***** *****SUBMISSION OF MORE THAN 43HR WILL NOT BE CONSIDERED***** *****MUST BE RELIABLE SHOW INITIATIVE AND BE FLEXIBLE TO WORK EITHER 8AM-8PM AND/OR 8PM-8AM SHIFTS EST****** ***** CYBERSECURITY EXPERIENCE EXCELLENT COMMUNICATION SKILLS STRONG ATTENTION TO DETAIL ABILITY TO READ AND FOLLOW WRITTEN INSTRUCTIONS ARE ESSENTIAL***** 6-12 month Contract to Hire Lumen is seeking a SOC Cyber Analyst. This is an entry to mid-level position in Cyber Security targeted toward individuals with 0-3 years of experience. Educational and personal experience with network/systems administration and/or information security-related work is necessary. Responsibilities: SOC Analysts are responsible for monitoring and maintaining systems used in our internal security program. This includes the following procedures to triage and investigate security alerts phishing emails and escalate issues as necessary. SOC Analysts have opportunities for mentorship from more senior members of the team involvement with maturing procedures evaluating new security technologies incident response and the freedom to try out new ideas and technologies to improve the SOC. Duties: bull Performs network security monitoring security event triage and incident response for a mid-size organization coordinates with other team members management to document and report incidents bull He/she will be part of rotating SOC shifts supporting 24/7 coverage. Nights and weekends can be performed remotely after sufficient training and familiarization. bull Maintains records of security events investigated and incident response activities utilizing case management and ticketing systems bull Monitors and analyzes Intrusion Detection Systems IDS Security Orchestration Automation Response SOAR alerts and Security Information and Event Management SIEM to identify security issues for remediation bull Makes recommendations creates modifies and updates Intrusion Detection Systems IDS and Security Information Event Management SIEM tool rules bull Ensure that we are implementing best practice security policies that address the client\u0027s business need while protecting their vital corporate assets bull Take on Security Operations responsibilities when not on a SOC shift: This includes but is not limited to vulnerability scanning bull Apply and retain learned knowledge across key lines of business including products practices and procedures bull Attend and fully engage in team and customer meetings bull Become a deep technical resource that earns our customers trust bull Innovate on behalf of customers translate your thoughts into action yielding measurable results bull This is a customer-facing role in a hybrid delivery model bull Other continuous education and training in the security field REQUIRED: bull 1 - 3 years of professional work experience in Security Operation Security SOC bull Experience working with common security tools and products: bull Ability to work in a team environment with a proven history of being able to collaborate successfully with team members. bull Knowledge of Runbooks Playbooks and following Standard Operating Procedures bull Strong analytical skills to define risk identify potential threats and develop action/mitigation plan bull Strong interpersonal skills ability to mentor/train staff and bring awareness to current and emerging threats bull Strong written and verbal communications skills with an ability to present technical risks and issues to non-technical audiences bull Proven ability to multitask thrive and prioritize responsibilities in a fast-paced environment bull BS/BA degree in Computer Science Information Systems or related discipline or equivalent experience Desired: bull Firewalls e.g. PaloAlto Networks Checkpoint Cisco ASA Juniper SSGPFSense etc.. is a plus bull Log Management and SIEM e.g. Splunk IBM QRadar HP ArcSight is a plus bull Network Analysis Tools e.g. Netwitness Wireshark bull Analyzing Phishing Emails is a plus bull Endpoint Security e.g. Carbon Black Enterprise Protection Carbon Black Enterprise Response Symantec McAfee Forefront bull Various Open-Source security and networking tools MRTG SysInternals Whatsup Gold bull System Analysis and Forensic Tools e.g. FTK EnCase are a plus bull SOAR Platforms e.g. Siemplify Resilient are a plus bull Linux OS and scripting skills. OSX and Windows skills are a plus bull Cyber Security Certifications: Security CySa CASP SAN GIAC Certifications GCIH GPEN GSEC etc. etc. are a plus","Title":"IT Security Analyst I","City":"South Carolina","ExpirationDate":null,"PriorityOrder":0,"Requirements":null,"Skills":null,"Industry":"Analyst","Country":"US","Division":"Triage","Office":null,"IsRemoteJob":true,"IsInternalJob":false,"ExtraValues":null,"__RecordIndex":0,"__OrdinalPosition":0,"__Timestamp":0,"Status":null,"ApplicantCount":0,"SubmittalCount":0,"ApplicationToHireRatio":0,"JobDuration":null,"SalaryHigh":54.2900,"SalaryLow":44.7100,"PayRateOvertime":0,"PayRateStraight":0,"Filled":0,"RemainingOpenings":0,"TotalOpenings":0,"Visa":null,"ClearanceType":null,"IsClearanceRequired":false,"IsHealthcare":false,"IsRemote":false,"EndClient":null,"JobCreatedDate":"\/Date(-62135578800000)\/","JobModifiedDate":"\/Date(-62135578800000)\/"}

*****MUST BE US CITIZEN***** *****SUBMISSION OF MORE THAN 43HR WILL NOT BE CONSIDERED***** *****MUST BE RELIABLE SHOW INITIATIVE AND BE FLEXIBLE TO WORK EITHER 8AM-8PM AND/OR 8PM-8AM SHIFTS... More EST****** ***** CYBERSECURITY EXPERIENCE EXCELLENT COMMUNICATION SKILLS STRONG ATTENTION TO DETAIL ABILITY TO READ AND FOLLOW WRITTEN INSTRUCTIONS ARE ESSENTIAL***** 6-12 month Contract to Hire Lumen is seeking a SOC Cyber Analyst. This is an entry to mid-level position in Cyber Security targeted toward individuals with 0-3 years of experience. Educational and personal experience with network/systems administration and/or information security-related work is necessary. Responsibilities: SOC Analysts are responsible for monitoring and maintaining systems used in our internal security program. This includes the following procedures to triage and investigate security alerts phishing emails and escalate issues as necessary. SOC Analysts have opportunities for mentorship from more senior members of the team involvement with maturing procedures evaluating new security technologies incident response and the freedom to try out new ideas and technologies to improve the SOC. Duties: bull Performs network security monitoring security event triage and incident response for a mid-size organization coordinates with other team members management to document and report incidents bull He/she will be part of rotating SOC shifts supporting 24/7 coverage. Nights and weekends can be performed remotely after sufficient training and familiarization. bull Maintains records of security events investigated and incident response activities utilizing case management and ticketing systems bull Monitors and analyzes Intrusion Detection Systems IDS Security Orchestration Automation Response SOAR alerts and Security Information and Event Management SIEM to identify security issues for remediation bull Makes recommendations creates modifies and updates Intrusion Detection Systems IDS and Security Information Event Management SIEM tool rules bull Ensure that we are implementing best practice security policies that address the client's business need while protecting their vital corporate assets bull Take on Security Operations responsibilities when not on a SOC shift: This includes but is not limited to vulnerability scanning bull Apply and retain learned knowledge across key lines of business including products practices and procedures bull Attend and fully engage in team and customer meetings bull Become a deep technical resource that earns our customers trust bull Innovate on behalf of customers translate your thoughts into action yielding measurable results bull This is a customer-facing role in a hybrid delivery model bull Other continuous education and training in the security field REQUIRED: bull 1 - 3 years of professional work experience in Security Operation Security SOC bull Experience working with common security tools and products: bull Ability to work in a team environment with a proven history of being able to collaborate successfully with team members. bull Knowledge of Runbooks Playbooks and following Standard Operating Procedures bull Strong analytical skills to define risk identify potential threats and develop action/mitigation plan bull Strong interpersonal skills ability to mentor/train staff and bring awareness to current and emerging threats bull Strong written and verbal communications skills with an ability to present technical risks and issues to non-technical audiences bull Proven ability to multitask thrive and prioritize responsibilities in a fast-paced environment bull BS/BA degree in Computer Science Information Systems or related discipline or equivalent experience Desired: bull Firewalls e.g. PaloAlto Networks Checkpoint Cisco ASA Juniper SSGPFSense etc.. is a plus bull Log Management and SIEM e.g. Splunk IBM QRadar HP ArcSight is a plus bull Network Analysis Tools e.g. Netwitness Wireshark bull Analyzing Phishing Emails is a plus bull Endpoint Security e.g. Carbon Black Enterprise Protection Carbon Black Enterprise Response Symantec McAfee Forefront bull Various Open-Source security and networking tools MRTG SysInternals Whatsup Gold bull System Analysis and Forensic Tools e.g. FTK EnCase are a plus bull SOAR Platforms e.g. Siemplify Resilient are a plus bull Linux OS and scripting skills. OSX and Windows skills are a plus bull Cyber Security Certifications: Security CySa CASP SAN GIAC Certifications GCIH GPEN GSEC etc. etc. are a plusLess

Feb 22, 2023

South Carolina, SC

|

Analyst

|

Contract

{"JobID":269222,"JobType":["Contract"],"EmployerID":null,"Location":{"Latitude":-81.163725,"Longitude":33.836081,"Distance":null},"State":"South Carolina","Zip":"","ReferenceID":"VMS-CEN-CTLKJP00003665","PostedDate":"\/Date(1677024000000)\/","Description":"*****MUST BE US CITIZEN***** *****SUBMISSION OF MORE THAN 43HR WILL NOT BE CONSIDERED***** *****MUST BE RELIABLE SHOW INITIATIVE AND BE FLEXIBLE TO WORK EITHER 8AM-8PM AND/OR 8PM-8AM SHIFTS EST****** ***** CYBERSECURITY EXPERIENCE EXCELLENT COMMUNICATION SKILLS STRONG ATTENTION TO DETAIL ABILITY TO READ AND FOLLOW WRITTEN INSTRUCTIONS ARE ESSENTIAL***** 6-12 month Contract to Hire Lumen is seeking a SOC Cyber Analyst. This is an entry to mid-level position in Cyber Security targeted toward individuals with 0-3 years of experience. Educational and personal experience with network/systems administration and/or information security-related work is necessary. Responsibilities: SOC Analysts are responsible for monitoring and maintaining systems used in our internal security program. This includes the following procedures to triage and investigate security alerts phishing emails and escalate issues as necessary. SOC Analysts have opportunities for mentorship from more senior members of the team involvement with maturing procedures evaluating new security technologies incident response and the freedom to try out new ideas and technologies to improve the SOC. Duties: bull Performs network security monitoring security event triage and incident response for a mid-size organization coordinates with other team members management to document and report incidents bull He/she will be part of rotating SOC shifts supporting 24/7 coverage. Nights and weekends can be performed remotely after sufficient training and familiarization. bull Maintains records of security events investigated and incident response activities utilizing case management and ticketing systems bull Monitors and analyzes Intrusion Detection Systems IDS Security Orchestration Automation Response SOAR alerts and Security Information and Event Management SIEM to identify security issues for remediation bull Makes recommendations creates modifies and updates Intrusion Detection Systems IDS and Security Information Event Management SIEM tool rules bull Ensure that we are implementing best practice security policies that address the client\u0027s business need while protecting their vital corporate assets bull Take on Security Operations responsibilities when not on a SOC shift: This includes but is not limited to vulnerability scanning bull Apply and retain learned knowledge across key lines of business including products practices and procedures bull Attend and fully engage in team and customer meetings bull Become a deep technical resource that earns our customers trust bull Innovate on behalf of customers translate your thoughts into action yielding measurable results bull This is a customer-facing role in a hybrid delivery model bull Other continuous education and training in the security field REQUIRED: bull 1 - 3 years of professional work experience in Security Operation Security SOC bull Experience working with common security tools and products: bull Ability to work in a team environment with a proven history of being able to collaborate successfully with team members. bull Knowledge of Runbooks Playbooks and following Standard Operating Procedures bull Strong analytical skills to define risk identify potential threats and develop action/mitigation plan bull Strong interpersonal skills ability to mentor/train staff and bring awareness to current and emerging threats bull Strong written and verbal communications skills with an ability to present technical risks and issues to non-technical audiences bull Proven ability to multitask thrive and prioritize responsibilities in a fast-paced environment bull BS/BA degree in Computer Science Information Systems or related discipline or equivalent experience Desired: bull Firewalls e.g. PaloAlto Networks Checkpoint Cisco ASA Juniper SSGPFSense etc.. is a plus bull Log Management and SIEM e.g. Splunk IBM QRadar HP ArcSight is a plus bull Network Analysis Tools e.g. Netwitness Wireshark bull Analyzing Phishing Emails is a plus bull Endpoint Security e.g. Carbon Black Enterprise Protection Carbon Black Enterprise Response Symantec McAfee Forefront bull Various Open-Source security and networking tools MRTG SysInternals Whatsup Gold bull System Analysis and Forensic Tools e.g. FTK EnCase are a plus bull SOAR Platforms e.g. Siemplify Resilient are a plus bull Linux OS and scripting skills. OSX and Windows skills are a plus bull Cyber Security Certifications: Security CySa CASP SAN GIAC Certifications GCIH GPEN GSEC etc. etc. are a plus","Title":"IT Security Analyst I","City":"South Carolina","ExpirationDate":null,"PriorityOrder":0,"Requirements":null,"Skills":null,"Industry":"Analyst","Country":"US","Division":"Triage","Office":null,"IsRemoteJob":true,"IsInternalJob":false,"ExtraValues":null,"__RecordIndex":0,"__OrdinalPosition":0,"__Timestamp":0,"Status":null,"ApplicantCount":0,"SubmittalCount":0,"ApplicationToHireRatio":0,"JobDuration":null,"SalaryHigh":54.2900,"SalaryLow":44.7100,"PayRateOvertime":0,"PayRateStraight":0,"Filled":0,"RemainingOpenings":0,"TotalOpenings":0,"Visa":null,"ClearanceType":null,"IsClearanceRequired":false,"IsHealthcare":false,"IsRemote":false,"EndClient":null,"JobCreatedDate":"\/Date(-62135578800000)\/","JobModifiedDate":"\/Date(-62135578800000)\/"}

*****MUST BE US CITIZEN***** *****SUBMISSION OF MORE THAN 43HR WILL NOT BE CONSIDERED***** *****MUST BE RELIABLE SHOW INITIATIVE AND BE FLEXIBLE TO WORK EITHER 8AM-8PM AND/OR 8PM-8AM SHIFTS... More EST****** ***** CYBERSECURITY EXPERIENCE EXCELLENT COMMUNICATION SKILLS STRONG ATTENTION TO DETAIL ABILITY TO READ AND FOLLOW WRITTEN INSTRUCTIONS ARE ESSENTIAL***** 6-12 month Contract to Hire Lumen is seeking a SOC Cyber Analyst. This is an entry to mid-level position in Cyber Security targeted toward individuals with 0-3 years of experience. Educational and personal experience with network/systems administration and/or information security-related work is necessary. Responsibilities: SOC Analysts are responsible for monitoring and maintaining systems used in our internal security program. This includes the following procedures to triage and investigate security alerts phishing emails and escalate issues as necessary. SOC Analysts have opportunities for mentorship from more senior members of the team involvement with maturing procedures evaluating new security technologies incident response and the freedom to try out new ideas and technologies to improve the SOC. Duties: bull Performs network security monitoring security event triage and incident response for a mid-size organization coordinates with other team members management to document and report incidents bull He/she will be part of rotating SOC shifts supporting 24/7 coverage. Nights and weekends can be performed remotely after sufficient training and familiarization. bull Maintains records of security events investigated and incident response activities utilizing case management and ticketing systems bull Monitors and analyzes Intrusion Detection Systems IDS Security Orchestration Automation Response SOAR alerts and Security Information and Event Management SIEM to identify security issues for remediation bull Makes recommendations creates modifies and updates Intrusion Detection Systems IDS and Security Information Event Management SIEM tool rules bull Ensure that we are implementing best practice security policies that address the client's business need while protecting their vital corporate assets bull Take on Security Operations responsibilities when not on a SOC shift: This includes but is not limited to vulnerability scanning bull Apply and retain learned knowledge across key lines of business including products practices and procedures bull Attend and fully engage in team and customer meetings bull Become a deep technical resource that earns our customers trust bull Innovate on behalf of customers translate your thoughts into action yielding measurable results bull This is a customer-facing role in a hybrid delivery model bull Other continuous education and training in the security field REQUIRED: bull 1 - 3 years of professional work experience in Security Operation Security SOC bull Experience working with common security tools and products: bull Ability to work in a team environment with a proven history of being able to collaborate successfully with team members. bull Knowledge of Runbooks Playbooks and following Standard Operating Procedures bull Strong analytical skills to define risk identify potential threats and develop action/mitigation plan bull Strong interpersonal skills ability to mentor/train staff and bring awareness to current and emerging threats bull Strong written and verbal communications skills with an ability to present technical risks and issues to non-technical audiences bull Proven ability to multitask thrive and prioritize responsibilities in a fast-paced environment bull BS/BA degree in Computer Science Information Systems or related discipline or equivalent experience Desired: bull Firewalls e.g. PaloAlto Networks Checkpoint Cisco ASA Juniper SSGPFSense etc.. is a plus bull Log Management and SIEM e.g. Splunk IBM QRadar HP ArcSight is a plus bull Network Analysis Tools e.g. Netwitness Wireshark bull Analyzing Phishing Emails is a plus bull Endpoint Security e.g. Carbon Black Enterprise Protection Carbon Black Enterprise Response Symantec McAfee Forefront bull Various Open-Source security and networking tools MRTG SysInternals Whatsup Gold bull System Analysis and Forensic Tools e.g. FTK EnCase are a plus bull SOAR Platforms e.g. Siemplify Resilient are a plus bull Linux OS and scripting skills. OSX and Windows skills are a plus bull Cyber Security Certifications: Security CySa CASP SAN GIAC Certifications GCIH GPEN GSEC etc. etc. are a plusLess

Jan 26, 2023

Dorchester, MA

|

Architect

|

Contract,Perm Possible

{"JobID":259844,"JobType":["Contract,Perm Possible"],"EmployerID":null,"Location":{"Latitude":-71.0578454545454,"Longitude":42.3428181818182,"Distance":null},"State":"Massachusetts","Zip":"02125","ReferenceID":"BOS-599120","PostedDate":"\/Date(1674767778000)\/","Description":"A large retail \u0026 commercial bank is looking for a Solution Architect to join their team responsible for architecting API solutions for Digital Banking (mobile and online). The Solution Architect will also be familiar with the information security surrounding digital banking and online/mobile transactions (such as Zelle, Fiserv, Experian, Akamai, etc). The role is preferred to be hybrid remote onsite to Dorchester MA twice a week but for the right candidate can be fully REMOTE working East Coast hours. The bank has close to $90B in assets, 9K employees and more than 2M customers along the east coast. In addition to providing excellent banking experiences for their customers, the bank also very involved in the community through charitable giving and philanthropy to give back to low/moderate income and underserved communities. The solutions architect will be both functional and technical - 50% will be time spent directly with the business and cooresponding IT teams and 50% hands-on technical designs (utilizing JIRA, Confluence, PowerPoint, Figma). They will be responsible for sitting in EPIC or requirements review sessions with the business from an architecture capacity; own entire API technical design and approval of tech design, work with info sec architecture reviewing functional requirements and technical proposals and work through the architectural review process. The Solution Architect should be familiar with Agile since Digital Banking is an Agile workshop.As a Solution Architect for Consumer Banking and Channels Architecture utilizes his/her expertise to recommend operational strategies and plans for the Solutions Architecture function with direct impact on company and IT results. S/he manages most strategic Consumer Banking Architecture accounts and communicates with senior leadership on matters of strategic importance; influencing business decision made by leadership. In addition s/he evaluates and takes in care of the compliance with the organization\u0027s technology standards and works with internal business groups on implementation opportunities, challenges, and requirements of various applications.Responsibilities: strong ongoing relationships with key business partners and managers within each business segments * Builds and maintains relationships and trust with key business stakeholders to understand business strategy and future needs * Communicates monthly updates and produces presentations to senior management on matters of strategic importance to the department * Communicates with senior leadership on matters of strategic importance * Consults the Enterprise Architecture team on systems design and implementation, helping to grow and develop the current retail business processes and technology implementations * Consults with project teams to fit projects to Enterprise Architecture * Consults with senior leadership and IT leaders to develop project scopes and business cases that meet both business and IT strategies and roadmaps * Consults with the Enterprise Level Architecture team to develop blueprints and roadmaps needed to achieve appropriate balance between IT efficiency and business innovation, allowing individual business units to innovate safely in their pursuit of competitive advantage * Continually communicates and builds consensus on Enterprise Architecture with IT and business partners * Develops and implements new Enterprise Architecture products, processes, standards of operational plans that will impact the achievement of functional standards and principles throughout the organization., Directs the research and evaluation of emerging technology, industry, and market trends * Facilitates the development and implementation of Enterprise Architecture standards and adoption of requirements across the enterprise * Guides improvements in tools and capabilities to support the Enterprise Architecture strategy and vision * Improves efficiencies by identifying cost saving projects and opportunities for the corporate business lines * Influences business decisions made by leadership * Leads, guides, and mentors best practices, design standards, and implementation strategies for EA team * Maintains a keen awareness of ever-developing industry methods, techniques, strategies and tools for risk and risk information, reporting recommendations regarding their adoption where applicable * Manages most strategic accounts and relationships for the Enterprise Architecture department * Manages strategic accounts with key stakeholders to help drive improved business performance * Monitors and analyzes department work to develop more efficient procedures and use of resources while maintaining a high level of accuracy., Oversees the implementation and operation of Information Technology solutions * Recommends and implements agreed process improvements to the Enterprise Architecture function * Recommends operational strategies and plans with direct impact on the company\u0027s results * Researches any issues to optimize the opportunities for improvement to the EA function * Trains, mentors, and coaches colleagues and subordinates as needed * Candidate will perform comprehensive discovery analysis and definition of client issues and documents implementation in the form of a technical (\"blue-print\") solution. * Determine how products and services could be designed or modified to suit the commercial banking needs * Act as a liaison between Business Units and Consumer Banking IT during design, development, testing, deployment, and ongoing maintenance phases, throughout the entire life cycle of the product. * complete current state analysis, requirements gathering, and documentation. * Combine exceptional interpersonal skills, technical aptitude and creative thinking to consult with prospective and existing clients to understand their business needs, map those needs to Client solutions, requirements.","Title":"Solutions Architect (REMOTE - EST)","City":"Dorchester","ExpirationDate":null,"PriorityOrder":0,"Requirements":"- 8+ years in solution architecture- Digital Banking background (online or mobile banking)- Experience interacting directly with the business and IT- hands on technical design experience - Integration design experience- Create logical/functional architecture diagram, create integration by use case sequence diagram- restful API design/ API-led design, along with API platforms familiarity (Mulesoft, API Connect, Apigee etc) - understanding around security (MFA, Two-Factor Authentication, Fraud detection, encryption, Biometric Authentication, etc)- Agile- Confident communicator","Skills":"- iOS and Android digital app design- Bilingual in Spanish- Cybersecurity risk assessment- Consumer Online Banking - browser and native app- Banking functional concepts: customer authentication, payments, billpay, monetary movements Zelle, FundNow, TransferNow","Industry":"Architect","Country":"US","Division":"IT","Office":null,"IsRemoteJob":true,"IsInternalJob":false,"ExtraValues":null,"__RecordIndex":0,"__OrdinalPosition":0,"__Timestamp":0,"Status":null,"ApplicantCount":0,"SubmittalCount":0,"ApplicationToHireRatio":0,"JobDuration":null,"SalaryHigh":102.0000,"SalaryLow":68.0000,"PayRateOvertime":0,"PayRateStraight":0,"Filled":0,"RemainingOpenings":0,"TotalOpenings":0,"Visa":null,"ClearanceType":null,"IsClearanceRequired":false,"IsHealthcare":false,"IsRemote":false,"EndClient":null,"JobCreatedDate":"\/Date(-62135578800000)\/","JobModifiedDate":"\/Date(-62135578800000)\/"}

A large retail & commercial bank is looking for a Solution Architect to join their team responsible for architecting API solutions for Digital Banking (mobile and online). The Solution Architect will... More also be familiar with the information security surrounding digital banking and online/mobile transactions (such as Zelle, Fiserv, Experian, Akamai, etc). The role is preferred to be hybrid remote onsite to Dorchester MA twice a week but for the right candidate can be fully REMOTE working East Coast hours. The bank has close to $90B in assets, 9K employees and more than 2M customers along the east coast. In addition to providing excellent banking experiences for their customers, the bank also very involved in the community through charitable giving and philanthropy to give back to low/moderate income and underserved communities. The solutions architect will be both functional and technical - 50% will be time spent directly with the business and cooresponding IT teams and 50% hands-on technical designs (utilizing JIRA, Confluence, PowerPoint, Figma). They will be responsible for sitting in EPIC or requirements review sessions with the business from an architecture capacity; own entire API technical design and approval of tech design, work with info sec architecture reviewing functional requirements and technical proposals and work through the architectural review process. The Solution Architect should be familiar with Agile since Digital Banking is an Agile workshop.As a Solution Architect for Consumer Banking and Channels Architecture utilizes his/her expertise to recommend operational strategies and plans for the Solutions Architecture function with direct impact on company and IT results. S/he manages most strategic Consumer Banking Architecture accounts and communicates with senior leadership on matters of strategic importance; influencing business decision made by leadership. In addition s/he evaluates and takes in care of the compliance with the organization's technology standards and works with internal business groups on implementation opportunities, challenges, and requirements of various applications.Responsibilities: strong ongoing relationships with key business partners and managers within each business segments * Builds and maintains relationships and trust with key business stakeholders to understand business strategy and future needs * Communicates monthly updates and produces presentations to senior management on matters of strategic importance to the department * Communicates with senior leadership on matters of strategic importance * Consults the Enterprise Architecture team on systems design and implementation, helping to grow and develop the current retail business processes and technology implementations * Consults with project teams to fit projects to Enterprise Architecture * Consults with senior leadership and IT leaders to develop project scopes and business cases that meet both business and IT strategies and roadmaps * Consults with the Enterprise Level Architecture team to develop blueprints and roadmaps needed to achieve appropriate balance between IT efficiency and business innovation, allowing individual business units to innovate safely in their pursuit of competitive advantage * Continually communicates and builds consensus on Enterprise Architecture with IT and business partners * Develops and implements new Enterprise Architecture products, processes, standards of operational plans that will impact the achievement of functional standards and principles throughout the organization., Directs the research and evaluation of emerging technology, industry, and market trends * Facilitates the development and implementation of Enterprise Architecture standards and adoption of requirements across the enterprise * Guides improvements in tools and capabilities to support the Enterprise Architecture strategy and vision * Improves efficiencies by identifying cost saving projects and opportunities for the corporate business lines * Influences business decisions made by leadership * Leads, guides, and mentors best practices, design standards, and implementation strategies for EA team * Maintains a keen awareness of ever-developing industry methods, techniques, strategies and tools for risk and risk information, reporting recommendations regarding their adoption where applicable * Manages most strategic accounts and relationships for the Enterprise Architecture department * Manages strategic accounts with key stakeholders to help drive improved business performance * Monitors and analyzes department work to develop more efficient procedures and use of resources while maintaining a high level of accuracy., Oversees the implementation and operation of Information Technology solutions * Recommends and implements agreed process improvements to the Enterprise Architecture function * Recommends operational strategies and plans with direct impact on the company's results * Researches any issues to optimize the opportunities for improvement to the EA function * Trains, mentors, and coaches colleagues and subordinates as needed * Candidate will perform comprehensive discovery analysis and definition of client issues and documents implementation in the form of a technical ("blue-print") solution. * Determine how products and services could be designed or modified to suit the commercial banking needs * Act as a liaison between Business Units and Consumer Banking IT during design, development, testing, deployment, and ongoing maintenance phases, throughout the entire life cycle of the product. * complete current state analysis, requirements gathering, and documentation. * Combine exceptional interpersonal skills, technical aptitude and creative thinking to consult with prospective and existing clients to understand their business needs, map those needs to Client solutions, requirements.Less

Mar 14, 2023

South Carolina, SC

|

Analyst

|

Contract

{"JobID":275393,"JobType":["Contract"],"EmployerID":null,"Location":{"Latitude":-81.163725,"Longitude":33.836081,"Distance":null},"State":"South Carolina","Zip":"","ReferenceID":"VMS-CEN-CTLKJP00003692","PostedDate":"\/Date(1678752000000)\/","Description":"*****MUST BE US CITIZEN***** *****SUBMISSION OF MORE THAN 43HR WILL NOT BE CONSIDERED***** *****MUST BE RELIABLE SHOW INITIATIVE AND BE FLEXIBLE TO WORK EITHER 8AM-8PM AND/OR 8PM-8AM SHIFTS EST****** ***** CYBERSECURITY EXPERIENCE EXCELLENT COMMUNICATION SKILLS STRONG ATTENTION TO DETAIL ABILITY TO READ AND FOLLOW WRITTEN INSTRUCTIONS ARE ESSENTIAL***** 6-12 month Contract to Hire Lumen is seeking a SOC Cyber Analyst. This is an entry to mid-level position in Cyber Security targeted toward individuals with 0-3 years of experience. Educational and personal experience with network/systems administration and/or information security-related work is necessary. Responsibilities: SOC Analysts are responsible for monitoring and maintaining systems used in our internal security program. This includes the following procedures to triage and investigate security alerts phishing emails and escalate issues as necessary. SOC Analysts have opportunities for mentorship from more senior members of the team involvement with maturing procedures evaluating new security technologies incident response and the freedom to try out new ideas and technologies to improve the SOC. Duties: bull Performs network security monitoring security event triage and incident response for a mid-size organization coordinates with other team members management to document and report incidents bull He/she will be part of rotating SOC shifts supporting 24/7 coverage. Nights and weekends can be performed remotely after sufficient training and familiarization. bull Maintains records of security events investigated and incident response activities utilizing case management and ticketing systems bull Monitors and analyzes Intrusion Detection Systems IDS Security Orchestration Automation Response SOAR alerts and Security Information and Event Management SIEM to identify security issues for remediation bull Makes recommendations creates modifies and updates Intrusion Detection Systems IDS and Security Information Event Management SIEM tool rules bull Ensure that we are implementing best practice security policies that address the client\u0027s business need while protecting their vital corporate assets bull Take on Security Operations responsibilities when not on a SOC shift: This includes but is not limited to vulnerability scanning bull Apply and retain learned knowledge across key lines of business including products practices and procedures bull Attend and fully engage in team and customer meetings bull Become a deep technical resource that earns our customers trust bull Innovate on behalf of customers translate your thoughts into action yielding measurable results bull This is a customer-facing role in a hybrid delivery model bull Other continuous education and training in the security field REQUIRED: bull 1 - 3 years of professional work experience in Security Operation Security SOC bull Experience working with common security tools and products: bull Ability to work in a team environment with a proven history of being able to collaborate successfully with team members. bull Knowledge of Runbooks Playbooks and following Standard Operating Procedures bull Strong analytical skills to define risk identify potential threats and develop action/mitigation plan bull Strong interpersonal skills ability to mentor/train staff and bring awareness to current and emerging threats bull Strong written and verbal communications skills with an ability to present technical risks and issues to non-technical audiences bull Proven ability to multitask thrive and prioritize responsibilities in a fast-paced environment bull BS/BA degree in Computer Science Information Systems or related discipline or equivalent experience Desired: bull Firewalls e.g. PaloAlto Networks Checkpoint Cisco ASA Juniper SSGPFSense etc.. is a plus bull Log Management and SIEM e.g. Splunk IBM QRadar HP ArcSight is a plus bull Network Analysis Tools e.g. Netwitness Wireshark bull Analyzing Phishing Emails is a plus bull Endpoint Security e.g. Carbon Black Enterprise Protection Carbon Black Enterprise Response Symantec McAfee Forefront bull Various Open-Source security and networking tools MRTG SysInternals Whatsup Gold bull System Analysis and Forensic Tools e.g. FTK EnCase are a plus bull SOAR Platforms e.g. Siemplify Resilient are a plus bull Linux OS and scripting skills. OSX and Windows skills are a plus bull Cyber Security Certifications: Security CySa CASP SAN GIAC Certifications GCIH GPEN GSEC etc. etc. are a plus","Title":"IT Security Analyst I","City":"South Carolina","ExpirationDate":null,"PriorityOrder":0,"Requirements":null,"Skills":null,"Industry":"Analyst","Country":"US","Division":"Triage","Office":null,"IsRemoteJob":true,"IsInternalJob":false,"ExtraValues":null,"__RecordIndex":0,"__OrdinalPosition":0,"__Timestamp":0,"Status":null,"ApplicantCount":0,"SubmittalCount":0,"ApplicationToHireRatio":0,"JobDuration":null,"SalaryHigh":54.2900,"SalaryLow":44.7100,"PayRateOvertime":0,"PayRateStraight":0,"Filled":0,"RemainingOpenings":0,"TotalOpenings":0,"Visa":null,"ClearanceType":null,"IsClearanceRequired":false,"IsHealthcare":false,"IsRemote":false,"EndClient":null,"JobCreatedDate":"\/Date(-62135578800000)\/","JobModifiedDate":"\/Date(-62135578800000)\/"}

*****MUST BE US CITIZEN***** *****SUBMISSION OF MORE THAN 43HR WILL NOT BE CONSIDERED***** *****MUST BE RELIABLE SHOW INITIATIVE AND BE FLEXIBLE TO WORK EITHER 8AM-8PM AND/OR 8PM-8AM SHIFTS... More EST****** ***** CYBERSECURITY EXPERIENCE EXCELLENT COMMUNICATION SKILLS STRONG ATTENTION TO DETAIL ABILITY TO READ AND FOLLOW WRITTEN INSTRUCTIONS ARE ESSENTIAL***** 6-12 month Contract to Hire Lumen is seeking a SOC Cyber Analyst. This is an entry to mid-level position in Cyber Security targeted toward individuals with 0-3 years of experience. Educational and personal experience with network/systems administration and/or information security-related work is necessary. Responsibilities: SOC Analysts are responsible for monitoring and maintaining systems used in our internal security program. This includes the following procedures to triage and investigate security alerts phishing emails and escalate issues as necessary. SOC Analysts have opportunities for mentorship from more senior members of the team involvement with maturing procedures evaluating new security technologies incident response and the freedom to try out new ideas and technologies to improve the SOC. Duties: bull Performs network security monitoring security event triage and incident response for a mid-size organization coordinates with other team members management to document and report incidents bull He/she will be part of rotating SOC shifts supporting 24/7 coverage. Nights and weekends can be performed remotely after sufficient training and familiarization. bull Maintains records of security events investigated and incident response activities utilizing case management and ticketing systems bull Monitors and analyzes Intrusion Detection Systems IDS Security Orchestration Automation Response SOAR alerts and Security Information and Event Management SIEM to identify security issues for remediation bull Makes recommendations creates modifies and updates Intrusion Detection Systems IDS and Security Information Event Management SIEM tool rules bull Ensure that we are implementing best practice security policies that address the client's business need while protecting their vital corporate assets bull Take on Security Operations responsibilities when not on a SOC shift: This includes but is not limited to vulnerability scanning bull Apply and retain learned knowledge across key lines of business including products practices and procedures bull Attend and fully engage in team and customer meetings bull Become a deep technical resource that earns our customers trust bull Innovate on behalf of customers translate your thoughts into action yielding measurable results bull This is a customer-facing role in a hybrid delivery model bull Other continuous education and training in the security field REQUIRED: bull 1 - 3 years of professional work experience in Security Operation Security SOC bull Experience working with common security tools and products: bull Ability to work in a team environment with a proven history of being able to collaborate successfully with team members. bull Knowledge of Runbooks Playbooks and following Standard Operating Procedures bull Strong analytical skills to define risk identify potential threats and develop action/mitigation plan bull Strong interpersonal skills ability to mentor/train staff and bring awareness to current and emerging threats bull Strong written and verbal communications skills with an ability to present technical risks and issues to non-technical audiences bull Proven ability to multitask thrive and prioritize responsibilities in a fast-paced environment bull BS/BA degree in Computer Science Information Systems or related discipline or equivalent experience Desired: bull Firewalls e.g. PaloAlto Networks Checkpoint Cisco ASA Juniper SSGPFSense etc.. is a plus bull Log Management and SIEM e.g. Splunk IBM QRadar HP ArcSight is a plus bull Network Analysis Tools e.g. Netwitness Wireshark bull Analyzing Phishing Emails is a plus bull Endpoint Security e.g. Carbon Black Enterprise Protection Carbon Black Enterprise Response Symantec McAfee Forefront bull Various Open-Source security and networking tools MRTG SysInternals Whatsup Gold bull System Analysis and Forensic Tools e.g. FTK EnCase are a plus bull SOAR Platforms e.g. Siemplify Resilient are a plus bull Linux OS and scripting skills. OSX and Windows skills are a plus bull Cyber Security Certifications: Security CySa CASP SAN GIAC Certifications GCIH GPEN GSEC etc. etc. are a plusLess

Feb 16, 2023

Medford, OR

|

Security Engineering

|

Contract-to-perm

{"JobID":263762,"JobType":["Contract-to-perm"],"EmployerID":null,"Location":{"Latitude":-122.879454545455,"Longitude":42.2840909090909,"Distance":null},"State":"Oregon","Zip":"97501","ReferenceID":"POR-603908","PostedDate":"\/Date(1676556972000)\/","Description":"- Help to assess, design and roadmap the Information Security Strategic Program, leveraging skill sand experience as a subject matter expert to deliver successful outcomes- Be the technical lead and SME for Information Security for technical related and risk management related aspects of the Information Security program. - Next-Generation Firewall design and architecture, implementing application access requests, troubleshooting technical issues with application availability and performance, periodic review and audit of firewall rules \u0026 ensuring that infrastructure is compliant with standards.- Secure Cloud Firewall Planning and Implementations. Configuring cloud security edge policies, including in-line DLP policies, File security, bandwidth controls and URL and Cloud App filtering. - Implementing policy and compliance changes to Cisco Network Infrastructure, including Extended Access Lists, interface configurations, route statements, GRE/IPsec Tunnels, VPN access (including posturing profiles), Multi-Factor Authentication.- Administering Identity and Access policies using relevant tools.- Support of Cloud Security technologies such as Secure Email Gateway Filtering Policies.- Deploying End Point Security policies, Malware Defense, Anti-Virus \u0026 local PII scans- Account monitoring and controls using Active Directory, including identity and access configurations using SAML \u0026 SSO.- Domain Security tasks, such as auditing \u0026 monitoring logs and alerts for changes to administrative privileges- Web Proxy design and implementation responsibilities, such as configuring domain exceptions and URL whitelists.- Responsibility for configuring tools for SIEM logging and alert administration- Support of an enterprise privacy program which will include workflows for tracking, reporting, and deleting customer PII. Also implementing File Security \u0026 Data Classification technologies- Support of and Wireless Access Controls \u0026 security best practices- Web Application Security including OWASP and External Penetration Testing \u0026 Vulnerability Scanning- Participation in a Continuous vulnerability management \u0026 ISRM program, working with other teams to manage \u0026 mitigate IT risks.- Participate in Incident Management activities, including level 3 on-call support rotation.","Title":"REMOTE Senior Security Engineer","City":"Medford","ExpirationDate":null,"PriorityOrder":0,"Requirements":"- 9+ years of information security, cybersecurity, and risk management experience- CCNA/CCNP (Cyber Ops, Security), PCNSA/PCNSE, Microsoft Certified: Azure Security Engineer Associate, AVSE, CISSP, PCI QSA, GIAC or similar relevant information security certifications required (at least one, multiple preferred)- Must have strong knowledge of vulnerabilities in various operating systems, databases and networks in relation to hardening, configuration, deployment and administration- Business, computer, or related technical degree from an accredited institution- Direct experience of IDS/IPS, Next Gen / L7 firewalls, VPN, DLP, data encryption, SIEM, vulnerability assessment and penetration testing, Windows / Linux, and database security- Experience working with industry laws, regulations, standards, and compliance frameworks. Including PCI DSS, NIST, CIS, Privacy (CCPA), ISO27001/27002, FISMA, ITIL, COBIT- Demonstrate self-confidence, energy and enthusiasm- Excellent oral, written, interpersonal, and communication skills required- Manage time well, correctly prioritizing tasks- Must meet performance standards - Present ideas, expectations, and information in a concise, well-organized way- Proven ability to plan, test, and implement security controls- Proven ability to share knowledge, resolves conflict, create consensus, and lead complex projects- Relevant network administration, information security or technical IT audit experience required; consulting experience strongly preferred- Ability to be resourceful, creative, and flexible- Ability to manage processes and associate relationships in multiple locations- Ability to work independently towards goals","Skills":"","Industry":"Security Engineering","Country":"US","Division":"IT","Office":null,"IsRemoteJob":true,"IsInternalJob":false,"ExtraValues":null,"__RecordIndex":0,"__OrdinalPosition":0,"__Timestamp":0,"Status":null,"ApplicantCount":0,"SubmittalCount":0,"ApplicationToHireRatio":0,"JobDuration":null,"SalaryHigh":85.8000,"SalaryLow":57.2000,"PayRateOvertime":0,"PayRateStraight":0,"Filled":0,"RemainingOpenings":0,"TotalOpenings":0,"Visa":null,"ClearanceType":null,"IsClearanceRequired":false,"IsHealthcare":false,"IsRemote":false,"EndClient":null,"JobCreatedDate":"\/Date(-62135578800000)\/","JobModifiedDate":"\/Date(-62135578800000)\/"}

- Help to assess, design and roadmap the Information Security Strategic Program, leveraging skill sand experience as a subject matter expert to deliver successful outcomes- Be the technical lead and... More SME for Information Security for technical related and risk management related aspects of the Information Security program. - Next-Generation Firewall design and architecture, implementing application access requests, troubleshooting technical issues with application availability and performance, periodic review and audit of firewall rules & ensuring that infrastructure is compliant with standards.- Secure Cloud Firewall Planning and Implementations. Configuring cloud security edge policies, including in-line DLP policies, File security, bandwidth controls and URL and Cloud App filtering. - Implementing policy and compliance changes to Cisco Network Infrastructure, including Extended Access Lists, interface configurations, route statements, GRE/IPsec Tunnels, VPN access (including posturing profiles), Multi-Factor Authentication.- Administering Identity and Access policies using relevant tools.- Support of Cloud Security technologies such as Secure Email Gateway Filtering Policies.- Deploying End Point Security policies, Malware Defense, Anti-Virus & local PII scans- Account monitoring and controls using Active Directory, including identity and access configurations using SAML & SSO.- Domain Security tasks, such as auditing & monitoring logs and alerts for changes to administrative privileges- Web Proxy design and implementation responsibilities, such as configuring domain exceptions and URL whitelists.- Responsibility for configuring tools for SIEM logging and alert administration- Support of an enterprise privacy program which will include workflows for tracking, reporting, and deleting customer PII. Also implementing File Security & Data Classification technologies- Support of and Wireless Access Controls & security best practices- Web Application Security including OWASP and External Penetration Testing & Vulnerability Scanning- Participation in a Continuous vulnerability management & ISRM program, working with other teams to manage & mitigate IT risks.- Participate in Incident Management activities, including level 3 on-call support rotation.Less

11 - 19 of 19