Find Jobs in Cyber Security

Find Jobs in Infosec and Cyber Security.

isecjobs.com – Jobs and Talents in InfoSec / Cybersecurity â˜•â˜•đŸ’»đŸ˜žđŸ›ĄïžđŸ‘Ÿ Latest jobs in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Compliance, Cryptography, Digital Forensics and Cyber Security in general

  • Senior Manager, Information Security Office Consultant @ Capital One
    on March 8, 2025 at 9:25 pm

    Senior Manager, Information Security Office ConsultantAt Capital One, you will help consult on initiatives, programs, and projects to raise their game in Information Security. You are pragmatic and practical in your understanding of risk and security, but also willing to know when to pull in experts and escalate. You collaborate and innovate with other teams within Capital One to push the envelope. You are comfortable with Cloud Service technologies like Storage Services, Security & Access Control Management, Container Services, and API Implementation and Management. You are familiar with various Cloud computing models to include IaaS, PaaS, and SaaS along with their architectural differences. Security is essential to what we do here, from protecting our customers to our associates.Responsibilities:Act as a central Information Security point of contact for the Privileged Access and Secrets Management teams supporting Enterprise Identity and Access ManagementCoordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and User Access ManagementServe as an expert in Capital One’s Information Security capabilities, solutions, policies, procedures and standardsInfluence customers to leverage security capabilities and solutions to shift and integrate security to the left in the development processesEscalate and manage cyber security riskProvide ad hoc support on special Information Security hot topics for the businessProvide regular updates to executive leadership with your line of business on the overall Information Security health and risk environmentWork with line of business leadership to anticipate their objectives and needs to better serve the line of businessAbout You:You have a desire to work in a very fast moving, forward leaning, and modern computing environmentYou have a deep passion for Securing modern computing platformsYou have a strong desire to continually learn about new technologiesYou possess strong conceptual thinking and communication skillsYou are able to work


  • Senior Manager, Technology – Associate Experience Technology: Risk & Controls @ Capital One
    on March 8, 2025 at 9:25 pm

    Senior Manager, Technology – Associate Experience Technology: Risk & ControlsAre you a seasoned IT project manager, with full Software Delivery Lifecycle (SDLC) expertise, and experience in risk and compliance? As an IT Sr. Manager in Capital One’s Associate Experience Technology (AXT) Risk & Controls (R&C) team, you will apply your project management and analytical skills to high profile Technology Risk Management projects. You will lead initiatives across the enterprise to develop and implement cutting edge Tech Risk solutions to ensure Capital One’s continued stability and success. You will work with business and technology partners for new innovations, process improvements, or operations. The ideal candidate will lead through project design, development and delivery, ensuring adherence to defined Software Development Life Cycle. As a leader, you will recommend changes to people / process / technology to ensure technology risk is mitigated and managed appropriately. We nurture a work environment where people with a variety of thoughts, ideas and backgrounds, guided by our shared values, come together to make Capital One a great company and an exciting place to work!Primary Responsibilities:Gather and analyze business requirements – work with business partners and other groups to identify technical and functional needs of the Technology Project/ProgramDesign and document technology risk processesCoordinate and liaise between developers / engineers, customer / stakeholders, across multiple organizations such as Operational Risk Management, Enterprise Risk Management, Compliance, Business Risk Offices, Operational Risk Sub-Steward organizations, Information Technology, Basel Program, Internal Audit, Regulator Relations, etc. Manage project timelines and deliverablesIdentify areas of risk and recommend the appropriate control mitigation strategiesEnsure that IT projects are delivered on time and within budgetControl Governance – Ensure Technology controls are operating effectively and as designed/intended, to mitigate Technology risk. Own operational oversight adhering to appropriate policies/standards and provide risk consulting for assigned controls portfolio. Provide consultation and


  • Desktop & Asset Management Support Specialist @ The Ohio State University
    on March 8, 2025 at 9:24 pm

    Screen reader users may encounter difficulty with this site. For assistance with applying, please contact hr-accessibleapplication@osu.edu. If you have questions while submitting an application, please review these frequently asked questions.Current Employees and Students:If you are currently employed or enrolled as a student at The Ohio State University, please log in to Workday to use the internal application process. Welcome to The Ohio State University’s career site. We invite you to apply to positions of interest. In order to ensure your application is complete, you must complete the following:Ensure you have all necessary documents available when starting the application process. You can review the additional job description section on postings for documents that may be required.Prior to submitting your application, please review and update (if necessary) the information in your candidate profile as it will transfer to your application. Job Title:Desktop & Asset Management Support SpecialistDepartment:Libraries | Information TechnologyThe Desktop & Asset Management Support Specialist’s primary focus is to provide desktop and technical assistance to customers and other support specialists for OSU Libraries managed equipment. Your role is crucial in maintaining client satisfaction as you resolve issues across various Windows and MAC OS platforms, supporting customers on-site and remotely in a professional and client-focused manner. Whether working in a team setting or independently, with limited direction, your goal is to ensure client satisfaction. This position delivers and sets up new and updated workstations and peripherals, addresses related support issues, and documents inventory management.The Desktop & Asset Management Support Specialist assists the asset manager in ensuring that all desktop support assets, both Windows and Apple, are correctly tagged and tracked using an asset management database. Confirms that basic standard device configurations are kept in stock and ready to image and deploy as needed. Coordinates new hire and refresh requests and fulfillment (enter


  • Security and Access Provisioning Manager – Cloud @ The Cigna Group
    on March 8, 2025 at 9:24 pm

    Job Posting TitleSecurity and Access Provisioning Manager – CloudJob Description SummaryThe job profile for this position is Security and Access Provisioning Manager – Cloud, which is a Band 4 Management role.The Medicare Technology Operations organization is looking for experienced, innovative and motivated leaders with strong technology engineering and cloud acumen, a strategic mindset, and demonstrated empathic collaboration.The Security and Access Provisioning Manager is responsible for overseeing and implementing comprehensive security strategies across a company’s cloud infrastructure, ensuring the protection of data, applications, and networks by managing security policies, monitoring for threats, and collaborating with other teams to maintain compliance with industry regulations, all within a cloud computing environment; key duties include risk assessments, vulnerability management, incident response planning, and identity and access management (IAM) oversightResponsibilitiesTeam Leadership:Leads, mentors, and manage the engineering team, fostering a culture of innovation, automation, collaboration, and excellence.Responsible for career development and performance management of the team members.IAM Management:Manage user access controls, including provisioning, deprovisioning and least privileged principles.Architecture Design: Develop and implement cloud security architecture, including network segmentation, data encryption, and access controls, aligned with industry best practices and company requirementSecurity Monitoring:Utilize cloud security tools to continuously monitor for suspicious activity, log analysis, and anomaly detection. Compliance ManagementEnsure adherence to relevant data privacy regulations (GDPR, HIPAA, etc.) and industry standards (SOC 2, PCI DSS) by monitoring compliance posture and implementing necessary controls. Threat Assessment, Risk Management and Incident ManagementConduct regular security risk assessments to identify potential vulnerabilities and prioritize mitigation strategies. Lead incident response activities in case of security breaches, including containment, investigation, remediation, and post-incident analysis. Required Skillset and QualificationsDeep understanding of cloud computing platforms (AWS (preferred), Azure, GCP) and their security featuresExpertise in network security, application security, and data security principlesKnowledge of security frameworks like NIST, ISO 27001, and CISExperience with security tools like


  • Senior Technology Auditor @ Alberta Investment Management Corporation
    on March 8, 2025 at 9:24 pm

    CLOSING DATE:March 24, 2025OpportunityWork our way from Edmonton or Calgary. Our flexible work style lets you work remotely while allowing regular visits to our vibrant offices, where you can soak up our culture and collaborate with colleagues.AIMCo is seeking a highly skilled Senior Technology Internal Auditor to join our Internal Audit team. The successful candidate will play a crucial role in evaluating and enhancing our technology processes, cybersecurity measures, and IT governance processes. You will have the opportunity to leverage various Information Technology controls in order to help AIMCo achieve optimal operational efficiency and reach its business goals.***Job Posting will close at 11:59pm MST on March 23, 2025Responsibilities Include:Planning, coordinating and executing audits of IT processes leveraging control frameworks (such as COBIT, NIST, and OSFI)Conduct comprehensive audits of our technology systems, including trading, accounting, performance and data platformsDraft audit reports and present issues to the business while discussing practical cross-functional solutionsDeveloping IT audit programs that proactively address organizational risks and align with the strategic priorities of leadershipConsulting on IT initiatives and monitoring, assessing, and recommending solutions to emerging risksFollowing up on existing management action plansContributing to the development of audit process improvements, including the development of automated routinesApplying internal audit standards, policies, and regulations to provide timely audit assurance and influence audit scopeDevelop effective line management relationships to ensure a strong understanding of the businessOur Ideal Candidate Qualifications: Undergraduate degree in Information Systems, Computer Science, or related field is preferred.5+ years of experience auditing IT systems and applications in a medium to large-scale environment, preferably in Investment Management or Capital Markets, with a strong understanding of related IT risks, controls, and regulations.Completion of relevant designations such as Certified Information Systems Auditor (CISA) or Certified Information Systems Security Professional (CISSP) is required. Other designations such as CIA are desirable.Experience managing or


  • Cybersecurity Subject Matter Expert (Pen-Testing, Red Team, Purple Team) @ Guidehouse
    on March 8, 2025 at 9:24 pm

    Job Family:Cyber ConsultingTravel Required:Up to 10%Clearance Required:Active Top Secret (TS)This posting is not for immediate hire. Seeking prospective candidate to be considered under Proposal to be award in late Q1 2025 or early Q2 2025.What You Will Do:We are seeking a highly skilled and experienced Cybersecurity Subject Matter Expert (SME) to join our dynamic team. The ideal candidate will have a strong background in penetration testing, red teaming, and purple teaming. This role requires a proactive individual who can identify vulnerabilities, simulate cyber-attacks, and enhance our security posture through comprehensive testing strategies.Key Responsibilities:Penetration Testing:Conduct thorough penetration tests on networks, applications, and systems to identify security weaknesses.Develop and execute test plans, document findings, and provide actionable recommendations for remediation.Utilize various tools and techniques to simulate real-world attacks and assess the effectiveness of security measures.Red Team Operations:Plan and execute red team exercises to simulate advanced persistent threats (APTs) and other sophisticated attack scenarios.Collaborate with blue team members to test and improve detection and response capabilities.Document and present findings to stakeholders, highlighting potential risks and mitigation strategies.Purple Team Collaboration:Work closely with both red and blue teams to facilitate purple team exercises aimed at improving overall security posture.Share insights and knowledge to enhance the effectiveness of defensive measures and incident response plans.Foster a culture of continuous improvement and knowledge sharing within the cybersecurity team.Security Assessments and Audits:Perform regular security assessments and audits to ensure compliance with industry standards and best practices.Identify and prioritize security risks, and work with relevant teams to implement corrective actions.Stay up-to-date with the latest cybersecurity threats, trends, and technologies.What You Will Need:An ACTIVE and MAINTAINED TOP SECRET DoD security clearanceBachelor’s degree from an accredited university or college in Computer Science, Information Security, Cybersecurity or a related field AND FIVE (5+) plus years of post-graduation work experience in cybersecurity, with a


  • Associate Director, Directory Services Engineering – IAM @ S&P Global
    on March 8, 2025 at 9:23 pm

    About the Role:Grade Level (for internal use):12S&P Global – CorporateAbout the Role: Associate Director, Directory Services Engineering (IAM)The Team: You will work with a talented team of IAM Engineers to define the architecture and strategy of Directory Services. This team is committed to reducing cyber risk while handling migrations, integrations, and consolidations. In this role, you will lead a dedicated team of directory services engineers who are passionate about identity management technologies. You will closely work with your team to collaborate, innovate, develop & support this function.Responsibilities and Impact:Develop and execute the long-term strategy for the organization’s Active Directory & Entra ID architecture, ensuring scalability, security, and alignment with business objectives. Drive innovation and continuous improvement in Active Directory and Entra ID technologies and processes. Oversee the design, implementation, and maintenance of complex, enterprise-level Active Directory solutions, including multi-forest environmentsEnsure the security and reliability of the corporate Active Directory infrastructure while maintaining the integrity of the AD schema. Direct large-scale projects, including domain consolidations and AD to Entra ID migrations Lead complex troubleshooting efforts and incident resolution for critical Active Directory issues Foster a culture of continuous learning and technical excellence Develop and maintain policies, standards, and best practices for Active Directory & Entra ID management and security Ensure compliance with industry regulations and internal security policies Oversee regular security audits and risk assessments of directory services infrastructure What We’re Looking For:Basic Required Qualifications:10+ years of experience in Directory Services Active Directory architecture and engineering in multi-forest environments Microsoft Entra ID and hybrid identity solutions Public Key Infrastructure (PKI) design and implementation PowerShell scripting and automation DNS architecture in relation to directory services Domain consolidation and migration projects SSO and federation technologies Proven track record of leading large-scale directory services projects Strong understanding of identity security best practices and emerging


  • Cyber Security Analyst @ CACI International Inc
    on March 8, 2025 at 9:22 pm

    Cyber Security AnalystJob Category: Information TechnologyTime Type: Full timeMinimum Clearance Required to Start: SecretEmployee Type: Regular-Long Term AssignmentPercentage of Travel Required: Up to 10%Type of Travel: Local* * *The Opportunity:Join CACI International in an exciting and dynamic role as a Cybersecurity Analyst supporting the Department of Defense (DoD) at USEUCOM (United States European Command) in Stuttgart, Germany. This OCONUS position offers the chance to work in a fast-paced, collaborative environment, where you will play a crucial role in protecting critical systems and data. We’re seeking a self-motivated, experienced individual who thrives in a team-oriented, technical setting, and can effectively communicate complex ideas with clarity and professionalism.Responsibilities:Implement and manage cybersecurity measures to ensure the confidentiality, integrity, and availability of USEUCOM systems.Research, develop, and coordinate policies for multiple intrusion detection/prevention systems, both at the host and perimeter levels.Monitor security events using log collection tools, assess threats, and triage potential vulnerabilities.Collaborate with internal teams to address identified vulnerabilities and implement solutions.Oversee and manage cybersecurity tools such as ESS/HBSS, ACAS, Carbon Black, and Splunk.Conduct comprehensive threat analysis, identify potential risks, and coordinate with internal and external teams for resolution.Perform continuous monitoring and security auditing to ensure robust protection against evolving threats.Ensure security testing is executed and documented in compliance with DoD standards.Offer technical guidance on information systems security throughout their lifecycle.Maintain awareness of common cybersecurity tools and enterprise security devices.Leverage expertise in Microsoft and Linux operating systems, Active Directory, and SIEM tools like Splunk.Qualifications:Required:Proven ability to work collaboratively in a team-oriented environment, with a focus on continuous learning and process improvement.Active Secret Clearance with eligibility for a TS/SCI clearance.Bachelor’s degree + 3 years of recent specialized experience, or Associate’s degree + 7 years, or equivalent certifications + 7 years, or 11 years of relevant experience.DoD 8570 IAT II Baseline Certification and a relevant Computing


  • VP – Cloud Security Reliability Engineer (SRE) @ Citi
    on March 8, 2025 at 9:22 pm

    Overview of Citi:Citi, the world leading global bank, has approximately 200 million customer accounts and a presence in more than 160 countries and jurisdictions worldwide. Citi provides consumers, corporations, governments, and institutions with a broad range of financial products and services, including consumer banking and credit, corporate and investment banking, securities brokerage, transaction services, and wealth management. Citi enables clients to achieve their strategic financial objectives by providing them with cutting-edge ideas, best-in-class products and solutions, and unparalleled access to capital and liquidity.The Team:The Chief Information Security Office (CISO) is responsible for looking after the cyber security of all of Citi’s technical assets. It has several new and exciting programmes utilising cutting edge cloud and container technologies, with a view to ensuring that our cyber security is best in class and offers reassurance to our wider business lines and clients alike.The job:This role sits within the Cloud Security team which is responsible for Private and Public Cloud Security, Container Security as well as strategic Secrets products. As we look to expand our programme, we are creating a consolidated SRE team that will work across our portfolio of products.As a member of the SRE team, you will be responsible for working towards our SRE strategy and operating model, as the team embarks on a multiyear transformation journey.Engineering excellence and secure by design are important principles for our CISO organisation. You will raise the bar on both our existing products but also the frameworks and capabilities that are engineered within the SRE team.Partnership and collaboration are key. You will work closely with the existing Engineering and Operations teams, building out the SRE capability alongside evangelising SRE best practice and techniques for the wider organisation. Reducing TOIL will be paramount to your success.What the role covers:Working across Container products and Secrets products, across


  • Carbon Black Endpoint Security Engineer @ Booz Allen Hamilton
    on March 8, 2025 at 9:21 pm

    Carbon Black Endpoint Security EngineerThe Opportunity:Booz Allen is seeking an endpoint security specialist to provide advanced cybersecurity support to global real-time operational activities. Critical thinking and troubleshooting skills are essential to resolving operational problems, and clear communication and briefing skills are essential when communicating with the team, its users, and individuals in leadership roles.If you have a strong background in endpoint security, leadership experience, and a passion for driving innovation, this is an excellent opportunity to contribute to a cutting-edge cybersecurity program.Work with us as we secure and protect our nation’s cybersecurity infrastructure. What You’ll Work On: Ensure that the customer technology solutions meet the highest standards of security, performance, and scalability with a particular focus on endpoint security.Provide thought leadership on emerging trends and best practices in endpoint security and ensure that the customer technology strategy reflects the latest developments in the field.Drive continuous improvement in the program’s endpoint security operations, policies, and procedures, including incident response and vulnerability management.Provide technical expertise and guidance to the customer security analysts and IT teams.Develop, configure, and optimize policies and rules within Carbon Black products to enhance threat detection, prevention, and response capabilities.Develop and maintain comprehensive documentation for Carbon Black configurations, procedures, and best practices.Collaborate with other cybersecurity and IT teams to ensure a coordinated approach to security challenges.Evaluate and integrate new security technologies to enhance the organization’s cybersecurity posture.Provide training and technical guidance to other team members on Carbon Black products and best practices.Join us. The world can’t wait. You Have: 5+ years of experience in endpoint security, including EDR, threat intelligence, and incident response2+ years of experience with implementation, management, and maintenance of VMware Carbon Black solutions, including Carbon Black Cloud, App Control, Endpoint Detection and Response (EDR), and Capture Client2+ years of experience leading migrations, deployments, and configurations of


  • Information Security Engineer @ QuidelOrtho
    on March 8, 2025 at 9:21 pm

    The Opportunity QuidelOrtho unites the strengths of Quidel Corporation and Ortho Clinical Diagnostics, creating a world-leading in vitro diagnostics company with award-winning expertise in immunoassay and molecular testing, clinical chemistry and transfusion medicine. We are more than 6,000 strong and do business in over 130 countries, providing answers with fast, accurate and consistent testing where and when they are needed most – home to hospital, lab to clinic.Our culture puts our team members first and prioritizes actions that support happiness, inspiration and engagement. We strive to build meaningful connections with each other as we believe that employee happiness and business success are linked. Join us in our mission to transform the power of diagnostics into a healthier future for all.The RoleAs we continue to grow as QuidelOrtho, we are seeking an Information Security Engineer to support our SecOps team. The Information Security Engineer will focus on manufacturing security architecture, engineering and implementation of solutions. This role is a hands-on position which delivers cyber security expertise on manufacturing secure designs, standards, solution engineering, projects and lifecycle management activities. You must be a strong influencer, focusing on how best to implement and operationalize manufacturing security best practices with industry best practices, architecture and design. This position is ideally suited to a self-motivated, team-player capable of operating with minimal levels of supervision and capable of delivering on results.This position is open to work in a hybrid schedule out of our San Diego, CA, Raritan, NJ, or Rochester, NY office (1-2 days onsite).The PositionProviding technical security expertise for QuidelOrtho’s global enterprise.Allocate approximately 60% of time to manufacturing Information Security initiatives (challenges, projects, tasks) and 40% with Security Architecture/Engineering on enterprise security tasks, projects, and tools.Responsible for serving as a manufacturing security subject matter expert, collaborating with manufacturing and QuidelOrtho leaders to architect solutions for


  • Manager, Cyber Product Owner (Email Security) @ Capital One
    on March 8, 2025 at 9:21 pm

    Manager, Cyber Product Owner (Email Security)Capital One is seeking a product owner to help deliver game-changing cybersecurity solutions based on threat, data, and design thinking. At Capital One, we believe in the values of Excellence and Doing the Right Thing. We are a technology-oriented company delivering financial products to market through modern technology and constant innovation at a massive scale. Part of that innovation is leveraging technology to deliver the best cybersecurity solutions for our business. As a Product Owner supporting the Endpoint Security Cyber Service Area, you will be accountable for contributing to and delivering upon the strategic agenda for our core cyber products to drive meaningful progress for our customers and our business. In this capacity, you will drive product vision into our development teams, translate vision into delivery objectives, provide customer-informed guidance to shape products, and work with cross-functional teams to deliver well-managed and sustainable features that bring that vision to life. You will use your deep technical knowledge and subject matter expertise in cybersecurity and systems engineering to drive impactful improvements to our cyber capabilities. What you’ll do:Communicate the delivery roadmap to our technology teams by inspiring the team through the product vision Clearly articulate and advocate target persona, customer benefit, and value of features across teamsLeverage technical knowledge and skills on how systems work and how code is built to effectively support engineering teams in delivering value Utilize strong cybersecurity background and customer research and insights to represent the voice of the customer to the engineering team(s)Incorporate design thinking and analytics to inform product designActively participate in research or design sessions for new featuresContribute to the development of a healthy product backlog, collaborating with the Product Manager, Engineering, and Solution Architects to break down business epics, document user stories (to also include things like addressing


  • Cyber Engineer – ISO Assurance @ Capital One
    on March 8, 2025 at 9:21 pm

    Nottingham Trent House (95002), United Kingdom, Nottingham, NottinghamshireCyber Engineer – ISO AssuranceAbout the RoleCapital One is one of the fastest growing organizations in the world today. The growth of the business is being accelerated by leveraging innovative and emerging technologies. We are serious about technology, we dream big, and we execute: Capital One moved our entire enterprise to the public cloud over the course of five years, fully exiting our data centers. Just as we prioritize driving innovation through technology, we equally prioritize cybersecurity and managing technology risk. Cybersecurity Risk professionals at Capital One are trusted expert advisers who shape decisions, challenge activities to ensure they meet our standards, and generally oversee technology, cybersecurity, and information security risk across the business and the central technology organisation.Cybersecurity is a strategic priority at Capital One, with heavy engagement from the Board, the Chief Executive Officer, and the executive committee. By joining Capital One, you will be providing these executives with the trusted, independent voice they need to ensure our company’s cybersecurity risks are appropriately managed. The position affords opportunities for substantial growth. The demands and high-visibility nature of this position require an expert with a proven ability to work independently in a fast-paced environment and who can begin contributing immediately.What You’ll DoEnsure consistency and develop data-driven assurance practices that will facilitate deeper technical risk reviews in order to support strategic decision-making for Cyber and Technology leadershipTake the lead in evaluating and recommending standardized risk sloping & scoring methods across Tech and Cyber domains, including Vulnerability Management, Data Security, and Network Security across the enterpriseServe as a point of contact for ISO Assurance Team service offerings and assist with onboarding junior team members.Standardize the review of mitigating factors and controls in support of risk management activities so that technology and business teams can


  • Program Cybersecurity Lead @ Booz Allen Hamilton
    on March 8, 2025 at 9:21 pm

    Program Cybersecurity LeadThe Opportunity:When our country’s cybersecurity is on the line, simply reacting is not enough—we need a plan. And when that plan needs to support cybersecurity-focused aspects of user activity, we need strategic policy analysis. That’s why we need you, a cybersecurity specialist with the expertise required to analyze the policies that determine our cyber resilience.As a Program Cybersecurity Lead on our team, you’ll lead the assessment of the Department of Defense’s current cyber policies, the coverage of those policies, and areas of risks. You’ll evaluate how policies stack up to regulations, best practices, and industry standards. As you guide your client through understanding acceptable risk and availability, you’ll advance the development of a strategic cyber roadmap. You’ll work in a consultative role to ensure the client operates securely as they navigate an evolving IT environment.Work with us as we secure the Department’s systems and networks through strategic cyber policy analysis.Join us. The world can’t wait.You Have:Knowledge of the Department of Defense and its componentsKnowledge of cybersecurity principles and best practicesKnowledge of threat and user activity monitoring practices and applicationsAbility to translate technology, intelligence, or cybersecurity information into enterprise-level reports and strategy documentsTS/SCI clearanceBachelor’s degree and 10+ years of experience with cybersecurity or Information Technology matters, or 14+ years of experience with cybersecurity or Information Technology matters in lieu of a degreeNice If You Have:Experience within the DoD at a senior-level office or Joint CommandExperience overseeing a cybersecurity focused-team, project, or work effortKnowledge of Zero Trust principles and their applicationsKnowledge of CATMS or a similar task management system to direct tasking across a broad organizationAbility to conduct required research and coordination to represent leadership intent and interests in a Joint OfficePossession of excellent verbal, written, and visual communication skills to communicate with executives and C-suite equivalentsDoD 8570 IAT Level


  • Cybersecurity Engineer – Encryption @ M&T Bank
    on March 8, 2025 at 9:21 pm

    This role offers a hybrid work schedule; offering the flexibility to work from home two days a week, while providing the opportunity for in-person collaboration. At M&T Tech, we’re a team of makers, doers, and builders, working to create the most advanced technology solutions in banking. We’re not your stereotypical suit and tie bankers: we’re an innovative team of leading tech experts, pushing boundaries, and taking risks. We’re building an agile team of the most skilled and creative workers to solve complex problems, architect solutions, write high-performance software, and chart our new path, all to make the lives of our customers, and the communities that we serve, better. Join us and be part of something new as we build tomorrow’s bank, today.Overview:We are seeking a highly skilled PKI Encryption Engineer, where you’ll play a crucial role in ensuring the security and integrity of our infrastructure. This pivotal role involves supporting the design and implementation of our Public Key Infrastructure (PKI) and encryption solutions. The ideal candidate will exhibit expertise in cryptographic protocols, possess a deep understanding of PKI, and demonstrate the ability to create and maintain secure cryptographic environmentsPrimary Responsibilities:Design and implement encryption and PKI solutions to secure digital transactions, communications, and data within the bankManage and maintain the bank’s encryption infrastructure to ensure compliance with industry standardsProvide expertise and support for cryptographic key management, including key generation, distribution, and revocationStay abreast of industry trends and emerging technologies related to PKI, encryption, and cybersecurity to enhance the bank’s security postureOversee the day-to-day operations of PKI services, including certificate issuance, renewal, revocation, and key managementDrive automation initiatives to streamline PKI processes and enhance service delivery efficiencyEvaluate emerging technologies and tools, making recommendations for their integration and optimization of our service offeringWork closely with Technology management, senior Engineers, and support teams on


  • Cyber Security Analyst – CSOC @ Capital One
    on March 8, 2025 at 9:20 pm

    Nottingham Trent House (95002), United Kingdom, Nottingham, NottinghamshireCyber Security Analyst – CSOCAbout this roleCapital One’s mission is to change banking for good by bringing humanity, ingenuity and simplicity to banking. Sitting at the core of such values is our cyber security team, a team whose innate passion to safeguard allows Capital One to maintain the confidence of its customers while at the same time maintaining a strong market presence.We are looking for a talented Cyber Security Analyst to join our Cyber Security Operations Center (CSOC) in Nottingham, UK. The Senior Associate CSOC Analyst position will require a deep knowledge of network protocols and infrastructure, log investigation techniques, knowledge and understanding of cloud infrastructures, and incident handling experience. Not only will you need to know about the threats to networks, applications, cloud infrastructure, and theory regarding network protocols, but also the ability to proactively identify signs of misuse and abuse using various log sources.The UK CSOC team is part of a 24/7 rotation that protects Capital One from Cyber threats.What you’ll doSo, what do we expect from you?We want you to help us defend our business and customers from Cyber related attacks. A typical day would be arriving at work and then reviewing a variety of alerts that may represent a Cyber threat. Your job will be to investigate, and using a keen eye for detail, figure out if there is any risk for Capital One associated with each one. If there is no risk, Great! If there is, you will use your skills (and a few more that we give you on the way!) to determine the best course to reducing or eliminating that risk. You will also get involved in some cool projects when things are a little quieter, helping us develop and grow.In addition to the technical skills,


  • Senior Software Engineer-Splunk @ Humana
    on March 8, 2025 at 9:20 pm

    Become a part of our caring community and help us put health first Humana IT Enterprise Observability engineering team is looking for a well versed and experienced Senior Software Engineer-Splunk. As a Senior Engineer, you should be proficient and hands-on within Splunk AWS; editing and maintaining Splunk configuration files and apps. As a Senior software engineer, you will provide support for the full system engineering life-cycle. Additionally, will handle troubleshooting, work with vendors on open request/tickets as well as working in an Agile environment and with enterprises change management/control systems. Our engineers serve as experts for metrics, events, logs and traces solutions that meet our enterprise needs.Key Responsibilities:Support and improve the company’s Splunk installation.Maintain Splunk configuration files and apps.Provide support for the full system engineering life-cycle.Ensure software is developed to meet functional, non-functional, and compliance requirements.Code solutions and perform unit testing.Ensure the solution can be integrated successfully into the overall application/system with clear, robust, and well-tested interfaces.Provide engineering and administration in supporting complex and large Splunk environments consisting of search heads, indexers, deployment servers, heavy/universal forwarders, etc.System performance and optimizationCollaborate and be the Splunk subject matter expert for Enterprise Observability Splunk Cloud Platform.Work in partnership with Enterprise Security, Site Reliability Engineering, and IT Operations teams.Perform troubleshooting, work through complex requirements/solutions, and provide assistance/coaching with the creation of Splunk search queries and dashboards.Use your skills to make an impact Required QualificationsBachelors degree in a technical related field or 8+ years of experience as a Splunk Engineer6+ years of experience administering Splunk in distributed deployments Subject Matter Expert in Splunk and AWS Cloud Platforms 6+ years of experience in creating Splunk search queries and dashboards. 4+ years of experience in supporting complex and large Splunk environments. 4+ years of experience configuring and maintaining the tool in a multi-tenant environment 4+ years of


  • Associate Cybersecurity Incident Response Specialist @ Boeing
    on March 8, 2025 at 9:20 pm

    Associate Cybersecurity Incident Response SpecialistCompany:The Boeing CompanyThe Boeing Company is currently seeking an Associate Cybersecurity Incident Response Specialist to join the team in Mesa, AZ or Hazelwood, MO. Join our team for an exciting opportunity in a critical 24/7 monitoring role on the 3rd shift! You’ll be at the forefront of safeguarding the Boeing network against intrusions, working dynamically across multiple global sites. This is your chance to make a real impact in a fast-paced environment where vigilance and innovation are key. Be part of a mission that ensures the security and integrity of our operations around the clock!Position Responsibilities:Performs incident response activities across broad technology profiles or multiple systemsInterrogates industry sources and evaluates incident indicatorsDetermines nature, mechanisms, scope and location of the incidentCollects and preserves evidence, identifies intrusion or incident path and methodPerforms event correlation and malware analysisIsolates, blocks or removes threat accessBasic Qualifications (Required Skills/Experience):1+ years of experience with network security specifically related to malware analysis, monitoring, and log event correlation1+ years of experience with cybersecurity, information protection and/or risk management1+ years of experience in analytical and report writing in processing, organizing, analyzing and assisting in contextualization of incident indicatorsPreferred Qualifications (Desired Skills/Experience):Security certifications in Cloud/Network/ForensicsExperience in a Cybersecurity Operations CenterExperience with monitoring, incident response, or digital forensicsExperience monitoring cloud platforms such as Google Cloud Platform (GCP), Microsoft Azure, and/or Amazon Web Services (AWS)Drug Free Workplace:Boeing is a Drug Free Workplace where post offer applicants and employees are subject to testing for marijuana, cocaine, opioids, amphetamines, PCP, and alcohol when criteria is met as outlined in our policies.Pay & Benefits:At Boeing, we strive to deliver a Total Rewards package that will attract, engage and retain the top talent. Elements of the Total Rewards package include competitive base pay and variable compensation opportunities. The Boeing Company also provides eligible


  • IngĂ©nieur Logiciel – SystĂšmes Avioniques Militaires – F/H @ Thales
    on March 8, 2025 at 6:25 pm

    Lieu : Cergy, FranceConstruisons ensemble un avenir de confianceThales est un leader mondial des hautes technologies spĂ©cialisĂ© dans trois secteurs d’activitĂ© : DĂ©fense & SĂ©curitĂ©, AĂ©ronautique & Spatial, et Cyber & Digital. Il dĂ©veloppe des produits et solutions qui contribuent Ă  un monde plus sĂ»r, plus respectueux de l’environnement et plus inclusif. Le Groupe investit prĂšs de 4 milliards d’euros par an en Recherche & DĂ©veloppement, notamment dans des domaines clĂ©s de l’innovation tels que l’IA, la cybersĂ©curitĂ©, le quantique, les technologies du cloud et la 6G. Thales compte prĂšs de 81 000 collaborateurs dans 68 pays. ​Nos engagements, vos avantagesUne rĂ©ussite portĂ©e par notre excellence technologique, votre expĂ©rience et notre ambition partagĂ©eUn package de rĂ©munĂ©ration attractifUn dĂ©veloppement des compĂ©tences en continu : parcours de formation, acadĂ©mies et communautĂ©s internesUn environnement inclusif, bienveillant et respectant l’équilibre des collaborateursUn engagement sociĂ©tal et environnemental reconnuVotre quotidienA Cergy, vous contribuez aux systĂšmes d’entraĂźnement et de simulation parmi les plus sophistiquĂ©s au monde. Vous rĂȘvez de piloter hĂ©licoptĂšres, avions de chasse ou vĂ©hicules blindĂ©s ? Rejoignez-nous et relevez les dĂ©fis des domaines aĂ©rien, terrestre, et naval !Nos simulateurs sont constituĂ©s de plusieurs composants aussi bien logiciels que matĂ©riels qu’il convient de faire fonctionner ensemble de maniĂšre la plus efficace possible afin de rĂ©pondre aux besoins d’entraĂźnement de nos clients.Au sein du Centre de CompĂ©tences de Training et Simulation, vous rejoindrez le dĂ©partement Composants des VĂ©hicules EmbarquĂ©s (CVE), en tant que ingĂ©nieur logiciel avionique et audio et contribuerez au dĂ©veloppement de nos modĂšles de simulation au sein de projets de simulateurs d’avions ou d’hĂ©licoptĂšres, civils et militaires.MISSIONS DU POSTE :A ce titre, vos missions se dĂ©composeront ainsi :Participer Ă  la dĂ©finition de modĂšles de simulation des composants avioniques (spĂ©cification, dĂ©finition des interfaces, conception prĂ©liminaire, dĂ©veloppement, tests) dans une dĂ©marche Ligne de Produits HĂ©licoptĂšre et Avion.Participer


  • IS Security Engineer (ISSE), TS/SCI with Polygraph @ General Dynamics Information Technology
    on March 8, 2025 at 6:25 pm

    Type of Requisition:RegularClearance Level Must Currently Possess:Top Secret SCI + PolygraphClearance Level Must Be Able to Obtain:Top Secret SCI + PolygraphPublic Trust/Other Required:NoneJob Family:Information SecurityJob Qualifications:Skills:Continuous Monitoring, Information Security, Risk Management FrameworkCertifications:NoneExperience:3 + years of related experienceUS Citizenship Required:YesJob Description:Information Systems Security Engineer (ISSE)We are seeking an experienced Information Systems Security Engineer (ISSE) to support Assessment and Authorization (A&A) and Continuous Monitoring (ConMon) activities, ensuring compliance with Risk Management Framework (RMF) requirements across multi-level classification environments with diverse technologies.Key ResponsibilitiesThe ISSE will play a critical role in maintaining system security by tracking and executing RMF actions in accordance with ICD 503 (NIST 800-53) to obtain and sustain system authorizations. Responsibilities include:Assessment & Authorization (A&A):Preparing and submitting Interim Authorization to Test (IATT) and Authority to Operate (ATO) requests with Plans of Action and Milestones (PoAMs)Developing, maintaining, and coordinating required Body of Evidence (BoE) documentation for system assetsCollaborating across Technical Services and Security Services teams, as well as customer agency stakeholders, to ensure complianceTracking workflow for lien remediation/resolution activities and entering tracking tool updatesEvaluating system change requests and assessing both system and organizational risks associated with modificationsContinuous Monitoring (ConMon):Executing ConMon activities within established timelines, including BoE collection and tracking tool updatesConducting recurring reviews of system state and security posture to ensure that systems are being operated securely, and information systems security policies and procedures are being implemented as defined.Providing recommendations for security control implementation and identifying necessary countermeasures or mitigating controlsResponding to queries and requests for security information and reportsIncident Response & Security Oversight:Supporting investigations of security incidents and reporting findings as necessaryAssisting in the communication, implementation and enforcement of security policies and plans for data, applications, hardware, and telecommunications systemsAdvising stakeholders on information assurance standards, dependencies, and emerging security technologiesEngaging with Enterprise Security Services tools (e.g., Trellix, ACAS, Splunk) to track


  • Systems Administrator @ General Dynamics Information Technology
    on March 8, 2025 at 6:25 pm

    Type of Requisition:RegularClearance Level Must Currently Possess:Top Secret/SCIClearance Level Must Be Able to Obtain:Top Secret/SCIPublic Trust/Other Required:NoneJob Family:Systems AdministrationJob Qualifications:Skills:EMC Storage Area Network (SAN) Administration, Unix System Administration, Windows System AdministrationCertifications:NoneExperience:5 + years of related experienceUS Citizenship Required:YesJob Description:Transform technology into opportunity as a Systems Administrator with GDIT. A career in enterprise IT means connecting and enhancing the systems that matter most. At GDIT you’ll be at the forefront of innovation and play a meaningful part in improving how agencies operate.At GDIT, people are our differentiator. As a Systems Administrator you will help ensure today is safe and tomorrow is smarter. Our work depends on Systems Administrator joining our team to support our intelligence customer in Fort Gordon, GA.HOW A SYSTEMS ADMINISTRATOR WILL MAKE AN IMPACTMaintains an organization’s computer systems’ workflows and is responsible for the upkeep, configuration and reliable operation of computer systems, As a Systems Administrator, you will work closely with both on-site and remote users to coordinate site visits and upgrades, provide on-site and remote resolution support for trouble calls, and provide TIER 2/3 support of Unix/Windows workstations and servers, including Web servers, network attached storage devices, and stored data in support of business processing requirements.​Job Duties:‱ Systems administration of desktop and server systems connected to local and wide area networks. Desktop system management responsibilities involving account monitoring, security, Operating System (OS) installation, and other local area system administration related functions.‱ Provide support for implementation, troubleshooting and maintenance of IT systems and management of system infrastructure and any processes related to these systems‱ Provide support to IT systems including day-to-day operations, monitoring and problem resolution for all of the client/server/storage/network devices, mobile devices, etc.‱ Provide Tier 2 and Tier 3 problem identification, diagnosis and resolution‱ Provide support for the escalation and communication of status to agency management


  • Systems Administrator @ General Dynamics Information Technology
    on March 8, 2025 at 6:25 pm

    Type of Requisition:RegularClearance Level Must Currently Possess:Top Secret/SCIClearance Level Must Be Able to Obtain:Top Secret SCI + PolygraphPublic Trust/Other Required:NoneJob Family:Systems AdministrationJob Qualifications:Skills:EMC Storage Area Network (SAN) Administration, Unix System Administration, Windows System AdministrationCertifications:NoneExperience:5 + years of related experienceUS Citizenship Required:YesJob Description:Transform technology into opportunity as a Systems Administrator with GDIT. A career in enterprise IT means connecting and enhancing the systems that matter most. At GDIT you’ll be at the forefront of innovation and play a meaningful part in improving how agencies operate.At GDIT, people are our differentiator. As a Systems Administrator you will help ensure today is safe and tomorrow is smarter. Our work depends on Systems Administrator joining our team to support our intelligence customer in Offutt AFB, NE.HOW A SYSTEMS ADMINISTRATOR WILL MAKE AN IMPACTAs a Systems Administrator, you will work closely with both on-site and remoteusers to coordinate site visits and upgrades, provide on-site and remote resolution supportfor trouble calls and provide TIER 2/3 support of Unix/Windows workstations and servers, including Web servers, network attached storage devices, and stored data in support of business processing requirements.WHAT YOU’LL NEED TO SUCCEED:Job Duties:‱ Systems administration of desktop and server systems connected to local and wide area networks. Desktop system management responsibilities involving account monitoring, security, Operating System (OS) installation, and other local area system administration related functions.‱ Provide support for implementation, troubleshooting and maintenance of IT systems and management of system infrastructure and any processes related to these systems‱ Provide support to IT systems including day-to-day operations, monitoring and problem resolution for all of the client/server/storage/network devices, mobile devices, etc.‱ Provide Tier 2 and Tier 3 problem identification, diagnosis and resolution‱ Provide support for the escalation and communication of status to agency management and internal customers‱ Install/load operating system and application software‱ Isolate and resolve hardware and


  • Systems Administrator @ General Dynamics Information Technology
    on March 8, 2025 at 6:25 pm

    Type of Requisition:RegularClearance Level Must Currently Possess:Top Secret/SCIClearance Level Must Be Able to Obtain:Top Secret SCI + PolygraphPublic Trust/Other Required:NoneJob Family:Systems AdministrationJob Qualifications:Skills:EMC Storage Area Network (SAN) Administration (Inactive), Unix System Administration, Windows System AdministrationCertifications:NoneExperience:10 + years of related experienceUS Citizenship Required:YesJob Description:Transform technology into opportunity as a Systems Administrator with GDIT. A career in enterprise IT means connecting and enhancing the systems that matter most. At GDIT you’ll be at the forefront of innovation and play a meaningful part in improving how agencies operate.At GDIT, people are our differentiator. As a Systems Administrator you will help ensure today is safe and tomorrow is smarter. Our work depends on Systems Administrator joining our team to support our intelligence customer in Fort Meade, MD.HOW A SYSTEMS ADMINISTRATOR WILL MAKE AN IMPACTThe Regional Systems Engineer will provide SME support to both on-site and remote uses to coordinate site visits and upgrades and will design and/or define system architecture for new or existing computer systems. The candidate will coordinate system development to include design, modeling, security, integration and formal testing. The Systems Engineer will create and maintain programmatic and technical documentation to insure efficient planning and execution.Job DescriptionPerforms systems design, development, and integration in a Windows and Unix environment.Performs continual maintenance and provides highly complex solutions for security, backup and redundancy problems.Provide engineering support to IT systems including day-to-day operations, monitoring and problem resolution for all of the client server and network devices.Provide engineering support for the systems administrator for systems issues that have been escalated and communicate status to agency managementIsolate, troubleshoot and resolve hardware and software problems involving the applications, the operating system, the hardware, the communications infrastructure, or any combination thereforeResponsible for infrastructure including design, installing, configuring, testing and maintaining integrity of operating systems and configure network components along with


  • Microsoft Endpoint Configuration Manager (MECM) Engineer – Remote/Hybrid @ General Dynamics Information Technology
    on March 8, 2025 at 6:25 pm

    Type of Requisition:RegularClearance Level Must Currently Possess:Top SecretClearance Level Must Be Able to Obtain:Top SecretPublic Trust/Other Required:NoneJob Family:Systems EngineeringJob Qualifications:Skills:Linux, Microsoft Windows Environment, Red Hat Enterprise Linux (RHEL), Systems Engineering, VMwareCertifications:NoneExperience:5 + years of related experienceUS Citizenship Required:YesJob Description:Deliver simple solutions to complex problems as a MECM Engineer at GDIT. Here, you’ll tailor cutting-edge solutions to the unique requirements of our clients. With a career in application development, you’ll make the end user’s experience your priority and we’ll make your career growth ours.This is a Hybrid role and selected candidate will primarily provide on-site support at the Pentagon in Arlington, VA along with tele-work a few days a week. How an MECM Engineer will make an impact:Performs secure baseline image creation and development of Windows Desktop OS images (Windows 10, 11) for specific hardware configurations from a common core baseline.Develops physical workstations images and VDI templates.Designs, develops, and evaluates software packages for server and workstation deployments.Develops MECM task sequences for OS upgrades and software package deployments.Troubleshoots OS and software deployment failures.Troubleshoots MECM health issues, including Distribution Points and client remediation.Designs, develops, and administers Group Policy Objects for security compliance and configuration management.Provides escalation support for Tier III/IV issues. Collaborates with customers, stakeholders, vendors, and other support teams for troubleshooting and resolving problems.Manages customer service requests through their lifecycle, from receiving the request through to its closure. Interfaces closely with customers to understand requirements and ensure customer satisfaction.Effective verbal and written communication skills. Must be able to adapt communication style to suit different audiences.Ensures compliance with established company and regulatory guidelines and procedures to provide high quality service and outstanding customer care.Adheres to change management policies and takes the necessary testing/development steps to mitigate risks with changes.Installs new hardware and software making sure that all components (hardware, software, drivers, agents, etc.)


  • Jr Eng Cybersecurity Eng @ Unisys
    on March 8, 2025 at 6:25 pm

    What success looks like in this role: ‱ Gains familiarity with cybersecurity engineering concepts, practices and methodologies.‱ With guidance performs standard cybersecurity engineering duties, including:o Knowledge/Hand on experience on Firewalls, Load balancers, Proxy VPN is must.o Should be Open for 24*7 support o Assisting with deployment of firewalls, intrusion detection systems and anti-virus software, o Assisting with or performing security tool administration and updates, o Network scanning to identify vulnerabilities, o System modification and upgrade / enhancement, o Incident response (i.e., investigation of incidents, breaches and threats), o Security audit coordination, o Security product evaluation.‱ Proactively learns about / keeps up to date with security technologies, trends and best practices.‱ Assists with special projects as assigned.You will be successful in this role if you have:BA/BS degree and 0-2 years’ relevant experience OR equivalent combination of education and experienceUnisys is proud to be an equal opportunity employer that considers all qualified applicants without regard to age, blood type, caste, citizenship, color, disability, family medical history, family status, ethnicity, gender, gender expression, gender identity, genetic information, marital status, national origin, parental status, pregnancy, race, religion, sex, sexual orientation, transgender status, veteran status or any other category protected by law.This commitment includes our efforts to provide for all those who seek to express interest in employment the opportunity to participate without barriers. If you are a US job seeker unable to review the job opportunities herein, or cannot otherwise complete your expression of interest, without additional assistance and would like to discuss a request for reasonable accommodation, please contact our Global Recruiting organization at GlobalRecruiting@unisys.com or alternatively Toll Free: 888-560-1782 (Prompt 4). US job seekers can find more information about Unisys’ EEO commitment here.


Share Websitecyber
We are an ethical website cyber security team and we perform security assessments to protect our clients.