Find Your Perfect Job

Job Search Results for cybersecurity

Sort and Filter  | 24 Results for cybersecurity  | Save This Search

Feb 13, 2026

Miami, OH

|

System Administrator

|

Contract,Perm Possible

|

$46 - $57 (hourly estimate)

{"JobID":494617,"JobType":["Contract,Perm Possible"],"EmployerID":null,"Location":{"Latitude":-84.28,"Longitude":39.17,"Distance":null},"State":"Ohio","Zip":"45150","ReferenceID":"CIN-1048312d-1326-4e1e-a4fa-ba7bd7e83514","PostedDate":"\/Date(1770995528000)\/","Description":"We are looking for a Vulnerability Management Analyst with strong Linux expertise to identify, assess, and drive remediation of security vulnerabilities across Linux-based systems. This role partners closely with infrastructure, security, and engineering teams to reduce risk and improve security posture.Key Responsibilities?Analyse vulnerability scan results, validate findings, and assess risk based on severity, exploitability, and business impact?Coordinate and track remediation efforts with Linux system administrators, engineering teams, and application owners?Provide remediation guidance, including patching, configuration changes, and compensating controls?Perform vulnerability trend analysis and reporting for leadership and stakeholders?Ensure timely remediation in alignment with internal security policies and regulatoryrequirements?Perform manual validation of identified vulnerabilities to minimize false positives and ensure accurate reporting.?Support compliance initiatives (e.g., CIS benchmarks as applicable)?Participate in incident response and root cause analysis related to vulnerability exploitation?Contribute to the development and improvement of vulnerability management standards, metrics, and processesWe are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to HR@insightglobal.com.To learn more about how we collect, keep, and process your private information, please review Insight Global\u0027s Workforce Privacy Policy: https://insightglobal.com/workforce-privacy-policy/.","Title":"Linux Vulnerability Management Analyst","City":"Miami","ExpirationDate":null,"PriorityOrder":0,"Requirements":"?Bachelor?s degree in computer science, Information Security, or a related technical field, or equivalent practical experience.?3+ years of experience in a dedicated cybersecurity role, with significant experience in vulnerability management.?Strong experience with Linux operating systems (RHEL, Ubuntu, SUSE, etc.)?Hands-on experience with vulnerability scanning tools (Tanium Comply, Qualys, Nessus, etc.)?Understanding of CVEs, CVSS scoring, and Linux security best practices?Familiarity with patching, system hardening, and security configurations?Ability to work cross-functionally and communicate clearly","Skills":"?Scripting skills (Bash, Python, )?Experience with configuration management or automation tools (Puppet, Ansible, etc.)?Knowledge of cloud-native computing and container security?Security or Linux certifications","Industry":"System Administrator","Country":"US","Division":"IT","Office":null,"IsRemoteJob":true,"IsInternalJob":false,"ExtraValues":null,"__RecordIndex":0,"__OrdinalPosition":0,"__Timestamp":0,"Status":null,"ApplicantCount":0,"SubmittalCount":0,"ApplicationToHireRatio":0,"JobDuration":null,"SalaryHigh":57.0000,"SalaryLow":45.6000,"PayRateOvertime":0,"PayRateStraight":0,"Filled":0,"RemainingOpenings":0,"TotalOpenings":0,"Visa":null,"ClearanceType":null,"IsClearanceRequired":false,"IsHealthcare":false,"IsRemote":false,"EndClient":null,"JobCreatedDate":"\/Date(-62135578800000)\/","JobModifiedDate":"\/Date(-62135578800000)\/"}

We are looking for a Vulnerability Management Analyst with strong Linux expertise to identify, assess, and drive remediation of security vulnerabilities across Linux-based systems. This role partners... closely with infrastructure, security, and engineering teams to reduce risk and improve security posture.Key Responsibilities?Analyse vulnerability scan results, validate findings, and assess risk based on severity, exploitability, and business impact?Coordinate and track remediation efforts with Linux system administrators, engineering teams, and application owners?Provide remediation guidance, including patching, configuration changes, and compensating controls?Perform vulnerability trend analysis and reporting for leadership and stakeholders?Ensure timely remediation in alignment with internal security policies and regulatoryrequirements?Perform manual validation of identified vulnerabilities to minimize false positives and ensure accurate reporting.?Support compliance initiatives (e.g., CIS benchmarks as applicable)?Participate in incident response and root cause analysis related to vulnerability exploitation?Contribute to the development and improvement of vulnerability management standards, metrics, and processesWe are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to HR@insightglobal.com.To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: https://insightglobal.com/workforce-privacy-policy/.

Mar 13, 2026

Coral Gables, FL

|

Security Engineering

|

Perm

|

$165k - $175k (estimate)

{"JobID":506588,"JobType":["Perm"],"EmployerID":null,"Location":{"Latitude":-80.2,"Longitude":25.77,"Distance":null},"State":"Florida","Zip":"33146","ReferenceID":"MIA-46b787eb-29a1-4177-bff8-ba835b7f0e60","PostedDate":"\/Date(1773435488000)\/","Description":"The Senior SOC Cloud Engineer is a SOC-focused, cloud security engineer responsible for cloud-native detection, incident response, and remediation across Azure and AWS. Reporting to the SOC Manager, this role owns the cloud incident response lifecycle and acts as an engineering extension of the SOC as the organization moves cloud-first. This is a control and detection?focused role. Day-to-Day? Own and support cloud incident response from detection through containment, remediation, and lessons learned? Enable high-fidelity alerts for SOC analysts (this role is not alert-triage heavy)? Build, tune, and automate cloud-native detections? Route and optimize Defender and cloud security alerts into Splunk? Support investigations involving identity compromise, ransomware, and cloud-based threats? Improve SOC readiness for real-world cloud incidentsWe are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to HR@insightglobal.com.To learn more about how we collect, keep, and process your private information, please review Insight Global\u0027s Workforce Privacy Policy: https://insightglobal.com/workforce-privacy-policy/.","Title":"Sr. SOC Cloud Engineer","City":"Coral Gables","ExpirationDate":null,"PriorityOrder":0,"Requirements":"? 7+ years in cybersecurity with strong SOC and incident response experience? Hands-on experience securing Azure and AWS (mostly production)? Deep experience with cloud-native security tooling, including: ? Microsoft Defender (E5 today, E7 exposure a plus)? AWS CloudTrail, GuardDuty, Security Data Lake? DNS logging (Route 53)? Proven ability to identify, contain, and remediate threats? Experience enabling SOC teams through better detections and telemetry? Strong understanding of cloud attack paths and response actions","Skills":"? Experience automating detections and response workflows? SIEM integration experience (Splunk preferred)? Exposure to ransomware or high-severity cloud incidentsExperience supporting SOC maturity in cloud-first environments","Industry":"Security Engineering","Country":"US","Division":"IT","Office":null,"IsRemoteJob":true,"IsInternalJob":false,"ExtraValues":null,"__RecordIndex":0,"__OrdinalPosition":0,"__Timestamp":0,"Status":null,"ApplicantCount":0,"SubmittalCount":0,"ApplicationToHireRatio":0,"JobDuration":null,"SalaryHigh":175000.0000,"SalaryLow":165000.0000,"PayRateOvertime":0,"PayRateStraight":0,"Filled":0,"RemainingOpenings":0,"TotalOpenings":0,"Visa":null,"ClearanceType":null,"IsClearanceRequired":false,"IsHealthcare":false,"IsRemote":false,"EndClient":null,"JobCreatedDate":"\/Date(-62135578800000)\/","JobModifiedDate":"\/Date(-62135578800000)\/"}

The Senior SOC Cloud Engineer is a SOC-focused, cloud security engineer responsible for cloud-native detection, incident response, and remediation across Azure and AWS. Reporting to the SOC Manager,... this role owns the cloud incident response lifecycle and acts as an engineering extension of the SOC as the organization moves cloud-first. This is a control and detection?focused role. Day-to-Day? Own and support cloud incident response from detection through containment, remediation, and lessons learned? Enable high-fidelity alerts for SOC analysts (this role is not alert-triage heavy)? Build, tune, and automate cloud-native detections? Route and optimize Defender and cloud security alerts into Splunk? Support investigations involving identity compromise, ransomware, and cloud-based threats? Improve SOC readiness for real-world cloud incidentsWe are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to HR@insightglobal.com.To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: https://insightglobal.com/workforce-privacy-policy/.

Mar 10, 2026

Dallas, TX

|

Security Engineering

|

Contract

|

$74 - $92 (hourly estimate)

{"JobID":504709,"JobType":["Contract"],"EmployerID":null,"Location":{"Latitude":-96.76,"Longitude":32.79,"Distance":null},"State":"Texas","Zip":"75201","ReferenceID":"DAL-cf52ce15-28ca-48ba-81a1-0e6e19ea70fd","PostedDate":"\/Date(1773160497000)\/","Description":"The Network Security Compliance Lead will serve as the primary architect for translating high-level regulatory mandates into granular, technical requirements. Candidates will bridge the gap between Legal/Regulatory bodies and Platform/Network Engineering teams, ensuring that \"Security by Design\" is not a slogan, but a documented, auditable technical reality. As a \"Technical Architect-Auditor.\" you will deconstruct legal mandates into engineering specs and then execute the hands-on implementation of those requirements. You are responsible for the technical enforcement of the Sovereign Data Controller concept, ensuring the client?s network can programmatically respond to regulatory demandsCore Responsibilities:-Automated Regulatory Architecture \u0026 Engineering (30%)?The Translator: Deconstruct complex legal mandates (e.g., NIS2 Directive Article 21, SOC 2 Trust Services Criteria) into actionable technical requirements for platform delivery and network teams.?Compliance-as-Code: Translate NIS2 and SOC 2 requirements into automated security policies (e.g., Open Policy Agent (OPA) or AWS Config).?Methodology Authoring: Develop and maintain the official Incident Handling Methodology and step-by-step procedures for regional compliance authorities.?Platform Delivery Specs: Create and sign off on Security Requirement Documents (SRDs) for all new platform features, ensuring network segmentation and identity controls are baked in.?Stakeholder Liaison: Interface directly with Legal, Regulatory CRAs, and external auditors to defend technical control logic.-Hands-on Technical Execution (20%)?Configuration \u0026 Implementation: Execute hands-on configuration changes and network modifications based on defined requirements (e.g., Firewall rules, VPC hardening, IAM policies).?Sovereign Data Controller: Build and manage the Sovereign Data Controller framework; specifically, engineering the capability to programmatically turn connections on/off based on data residency or compliance triggers.?Technical Operations: Act as the primary technical executor once requirements and processes are defined, ensuring no \"gap\" between policy and production.?Network Automation: Utilize Ansible, Terraform, or Python to automate network hardening and firewall rule lifecycle management.-Audit \u0026 Stakeholder Interface (30%)?Legal \u0026 Regulatory Liaison: Act as the technical point of contact for the Legal department and External Auditors. Defend technical implementations and explain control logic in non-technical terms.?CRA/Regulatory Management: Manage submissions and evidence gathering for Cyber Resilience Act (CRA) or similar regional certifications.?Risk Reporting: Translate technical network risks into Business Impact Analyses for executive leadership and legal counsel.?Data Portability: Develop and maintain automated download capabilities for audit evidence and regulatory logs to streamline external review.-Network \u0026 Platform Security Governance (10%)?Technical Oversight: Leverage deep knowledge of TCP/IP, Zero Trust Architecture, and Cloud Networking to validate that configurations (Firewalls, VPCs, IAM) actually meet the intended compliance goals.?Gap Analysis: Lead continuous \"pre-audit\" assessments of the network stack to identify and remediate non-conformities before they reach an official auditor.?Process Automation: Work with engineering to automate the collection of compliance evidence (Evidence-as-Code) to reduce manual audit toil.-Reporting \u0026 Audit Automation (10%)?Automated Reporting: Build and maintain regulatory reporting views and dashboards that provide real-time, \"downloadable\" compliance status for auditors.?Reporting Engineering: Design and build regulatory reporting views within internal dashboards to provide real-time visibility into compliance status.?Data Portability: Develop and maintain automated download capabilities for audit evidence and regulatory logs to streamline external review.?Gap Remediation: Identify network vulnerabilities and manually implement the required technical fixes to maintain an \"Always Audit-Ready\" state.We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to HR@insightglobal.com.To learn more about how we collect, keep, and process your private information, please review Insight Global\u0027s Workforce Privacy Policy: https://insightglobal.com/workforce-privacy-policy/.","Title":"Network Security Compliance Lead","City":"Dallas","ExpirationDate":null,"PriorityOrder":0,"Requirements":"- 7+ years in Cybersecurity, with at least 3 years in a Lead/Managerial compliance role.-Ability to read a network diagram and understand BGP, VPN tunneling, and micro-segmentation ? this role will not be configuring the router, but must know what a secure configuration looks like.-Proven experience implementing NIS2 and successfully passing SOC 2 Type II audits.-Expert-level proficiency in Infrastructure as Code (IaC) -Strong scripting skills (Terraform, Python, Bash).-Deep knowledge of SDN (Software Defined Networking), Zero Trust, and cloud-native networking (VPC, Transit Gateways).-Direct experience implementing NIS2 Directive and SOC 2 Type II in a high-growth environment.-Hands-on with SIEM/SOAR platforms (e.g., Palo Alto Cortex XSOAR) for automating response.","Skills":"-CISA (Certified Information Systems Auditor) or CISSP","Industry":"Security Engineering","Country":"US","Division":"IT","Office":null,"IsRemoteJob":true,"IsInternalJob":false,"ExtraValues":null,"__RecordIndex":0,"__OrdinalPosition":0,"__Timestamp":0,"Status":null,"ApplicantCount":0,"SubmittalCount":0,"ApplicationToHireRatio":0,"JobDuration":null,"SalaryHigh":92.0000,"SalaryLow":73.6000,"PayRateOvertime":0,"PayRateStraight":0,"Filled":0,"RemainingOpenings":0,"TotalOpenings":0,"Visa":null,"ClearanceType":null,"IsClearanceRequired":false,"IsHealthcare":false,"IsRemote":false,"EndClient":null,"JobCreatedDate":"\/Date(-62135578800000)\/","JobModifiedDate":"\/Date(-62135578800000)\/"}

The Network Security Compliance Lead will serve as the primary architect for translating high-level regulatory mandates into granular, technical requirements. Candidates will bridge the gap between... Legal/Regulatory bodies and Platform/Network Engineering teams, ensuring that "Security by Design" is not a slogan, but a documented, auditable technical reality. As a "Technical Architect-Auditor." you will deconstruct legal mandates into engineering specs and then execute the hands-on implementation of those requirements. You are responsible for the technical enforcement of the Sovereign Data Controller concept, ensuring the client?s network can programmatically respond to regulatory demandsCore Responsibilities:-Automated Regulatory Architecture & Engineering (30%)?The Translator: Deconstruct complex legal mandates (e.g., NIS2 Directive Article 21, SOC 2 Trust Services Criteria) into actionable technical requirements for platform delivery and network teams.?Compliance-as-Code: Translate NIS2 and SOC 2 requirements into automated security policies (e.g., Open Policy Agent (OPA) or AWS Config).?Methodology Authoring: Develop and maintain the official Incident Handling Methodology and step-by-step procedures for regional compliance authorities.?Platform Delivery Specs: Create and sign off on Security Requirement Documents (SRDs) for all new platform features, ensuring network segmentation and identity controls are baked in.?Stakeholder Liaison: Interface directly with Legal, Regulatory CRAs, and external auditors to defend technical control logic.-Hands-on Technical Execution (20%)?Configuration & Implementation: Execute hands-on configuration changes and network modifications based on defined requirements (e.g., Firewall rules, VPC hardening, IAM policies).?Sovereign Data Controller: Build and manage the Sovereign Data Controller framework; specifically, engineering the capability to programmatically turn connections on/off based on data residency or compliance triggers.?Technical Operations: Act as the primary technical executor once requirements and processes are defined, ensuring no "gap" between policy and production.?Network Automation: Utilize Ansible, Terraform, or Python to automate network hardening and firewall rule lifecycle management.-Audit & Stakeholder Interface (30%)?Legal & Regulatory Liaison: Act as the technical point of contact for the Legal department and External Auditors. Defend technical implementations and explain control logic in non-technical terms.?CRA/Regulatory Management: Manage submissions and evidence gathering for Cyber Resilience Act (CRA) or similar regional certifications.?Risk Reporting: Translate technical network risks into Business Impact Analyses for executive leadership and legal counsel.?Data Portability: Develop and maintain automated download capabilities for audit evidence and regulatory logs to streamline external review.-Network & Platform Security Governance (10%)?Technical Oversight: Leverage deep knowledge of TCP/IP, Zero Trust Architecture, and Cloud Networking to validate that configurations (Firewalls, VPCs, IAM) actually meet the intended compliance goals.?Gap Analysis: Lead continuous "pre-audit" assessments of the network stack to identify and remediate non-conformities before they reach an official auditor.?Process Automation: Work with engineering to automate the collection of compliance evidence (Evidence-as-Code) to reduce manual audit toil.-Reporting & Audit Automation (10%)?Automated Reporting: Build and maintain regulatory reporting views and dashboards that provide real-time, "downloadable" compliance status for auditors.?Reporting Engineering: Design and build regulatory reporting views within internal dashboards to provide real-time visibility into compliance status.?Data Portability: Develop and maintain automated download capabilities for audit evidence and regulatory logs to streamline external review.?Gap Remediation: Identify network vulnerabilities and manually implement the required technical fixes to maintain an "Always Audit-Ready" state.We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to HR@insightglobal.com.To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: https://insightglobal.com/workforce-privacy-policy/.

Mar 17, 2026

Sandy Springs, GA

|

Security Engineering

|

Contract-to-perm

|

$64 - $80 (hourly estimate)

{"JobID":507686,"JobType":["Contract-to-perm"],"EmployerID":null,"Location":{"Latitude":-84.38,"Longitude":33.93,"Distance":null},"State":"Georgia","Zip":"30328","ReferenceID":"ATL-300550a7-27d4-4a71-aee5-8f74dd1b0ddd","PostedDate":"\/Date(1773775285000)\/","Description":"The PAM Engineer will be responsible for technical deployment, rollout, maintenance, and support for the end-to-end Privileged Access Management (PAM) systems (BeyondTrust Solutions ? Password Safe-PS, Endpoint Privileged Management EPM ? PM Window, PM Mac, Unix Linux-PMUL, AD Bridge or Identity Security Insight- ISI, Privileged Remote Access-PRA)? Responsible for the BeyondTrust delivery and operations, including strategic direction, establishing technical standards, overseeing staffing, performance, career growth, and serve as escalation for complex PAM issues? Provides technical support across IAM applications to define, implement and enhance current and new IAM software, hardware requirements, delivering and supporting PAM solutions, and processes? Provide support with respect to implementation, and concurrent delivery of two or more Privileged platforms (i.e., PAM) such as BeyondTrust, Delinea, Microsoft Entra ID, Privileged Identity Manager? Assist with onboarding and managing privileged accounts across servers, databases, network devices, cloud platforms, and applications? Assist with implementing password vaulting, credential rotation, secrets management, service accounts and non-human identities, reducing shared and hard-coded credentialsRate will range between $65-$85/hr depending on skills and experience ? Assist with various privileged access management policy tasks which include creating policies for application elevated access, policy enforcement errors, failed elevations and rule conflicts, reviews logs for policy bypass attempts, review/adjust flex group policies for appropriateness, review/adjust PMUL configurations to allow users access to appropriate systems, review discovery logs, and correct discovery issuesWe are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to HR@insightglobal.com.To learn more about how we collect, keep, and process your private information, please review Insight Global\u0027s Workforce Privacy Policy: https://insightglobal.com/workforce-privacy-policy/.","Title":"Lead PAM Engineer","City":"Sandy Springs","ExpirationDate":null,"PriorityOrder":0,"Requirements":"Bachelor?s degree in Information Technology, Cybersecurity, Computer Science, Engineering, or related field? 8?10 years IAM / Security engineering experience, including 8+ years hands-on with BeyondTrust (BT) PAM solutions (i.e., Password Safe (PS), Privileged Remote Access (PRA), Endpoint Privilege Management (EPM) and other PAM platforms (e.g., Delinea, CyberArk, Azure PIM)? Proven leadership in designing, deploying, and operating BeyondTrust PAM solutions, including privileged discovery, onboarding, vaulting, rotation, Just-in-time (JIT) access, least privilege, and session monitoring? Deep experience securing privileged access across Windows, Mac, End Points, Linux/Unix, AD, Databases, Network Devices, and Cloud platforms (AWS, Azure, GCP)? Strong integration experience with IAM/IGA (SailPoint, Entra ID), ITSM (ServiceNow), SIEM (Splunk, CrowdStrike), and MFA solutions? Advance discovery/current-state assessment of BT environment and leading implementation of actions plan? Expertise in developing and maintaining detailed system documentation and change records while collaborating with other teams to resolve complex technical issues and promoting continuous improvement.? Advanced administration, monitoring, and maintenance of the BeyondTrust PAM platform, including complex configuration, upgrades, patching, and troubleshooting? Experience overseeing technical cyber activities such as account provisioning, access reviews, credential management, log analysis, and incident response within BeyondTrust? Advanced Active Directory expertise (domains, trusts, replication, GPOs) and identities migrations post-merger/acquisition? Ability to lead and mentor PAM engineers, define architecture and standards, build runbooks, drive adoption, and remediate environments (get-well plans), Experience leading audit engagements related to PAM controls? Strong automation and scripting skills (PowerShell, Python, JavaScript, Bash, SQL, etc.) and experience with Zero Trust architectures? 4?6 years AWS experience (EC2, Lambda); certifications a plus (CISSP, CISM, CRISC, CISA) and BeyondTrust certifications or formal training (Password Safe, PRA, or EPM).? Experience deploying BeyondTrust PAM in large, global, or M\u0026A-driven environments.? Strong communication skills, executive presence, documentation, and ability to operate in fast-paced environments? Strong attention to detail, analytical, decision-making, effective documentation, and process review skills? Demonstrates strategic thinking in application of security technologies and interoperability","Skills":"Lead experience","Industry":"Security Engineering","Country":"US","Division":"IT","Office":null,"IsRemoteJob":true,"IsInternalJob":false,"ExtraValues":null,"__RecordIndex":0,"__OrdinalPosition":0,"__Timestamp":0,"Status":null,"ApplicantCount":0,"SubmittalCount":0,"ApplicationToHireRatio":0,"JobDuration":null,"SalaryHigh":80.0000,"SalaryLow":64.0000,"PayRateOvertime":0,"PayRateStraight":0,"Filled":0,"RemainingOpenings":0,"TotalOpenings":0,"Visa":null,"ClearanceType":null,"IsClearanceRequired":false,"IsHealthcare":false,"IsRemote":false,"EndClient":null,"JobCreatedDate":"\/Date(-62135578800000)\/","JobModifiedDate":"\/Date(-62135578800000)\/"}

The PAM Engineer will be responsible for technical deployment, rollout, maintenance, and support for the end-to-end Privileged Access Management (PAM) systems (BeyondTrust Solutions ? Password... Safe-PS, Endpoint Privileged Management EPM ? PM Window, PM Mac, Unix Linux-PMUL, AD Bridge or Identity Security Insight- ISI, Privileged Remote Access-PRA)? Responsible for the BeyondTrust delivery and operations, including strategic direction, establishing technical standards, overseeing staffing, performance, career growth, and serve as escalation for complex PAM issues? Provides technical support across IAM applications to define, implement and enhance current and new IAM software, hardware requirements, delivering and supporting PAM solutions, and processes? Provide support with respect to implementation, and concurrent delivery of two or more Privileged platforms (i.e., PAM) such as BeyondTrust, Delinea, Microsoft Entra ID, Privileged Identity Manager? Assist with onboarding and managing privileged accounts across servers, databases, network devices, cloud platforms, and applications? Assist with implementing password vaulting, credential rotation, secrets management, service accounts and non-human identities, reducing shared and hard-coded credentialsRate will range between $65-$85/hr depending on skills and experience ? Assist with various privileged access management policy tasks which include creating policies for application elevated access, policy enforcement errors, failed elevations and rule conflicts, reviews logs for policy bypass attempts, review/adjust flex group policies for appropriateness, review/adjust PMUL configurations to allow users access to appropriate systems, review discovery logs, and correct discovery issuesWe are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to HR@insightglobal.com.To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: https://insightglobal.com/workforce-privacy-policy/.

21 - 24 of 24