Considering COVID-19, we are still hiring but conducting virtual interviews to keep our candidates and employees safe. Many roles will be temporarily remote or work from home to comply with current safety regulations. These roles will be required to be in the office once it is safe or restrictions are lifted. Read more on our response here: Teradata Response to COVID-19
With all the investments made in analytics, it’s time to stop buying into partial solutions that overpromise and underdeliver. It’s time to invest in answers. Only Teradata leverages all of the data, all of the time, so that customers can analyze anything, deploy anywhere, and deliver analytics that matter most to them. And we do it at scale, on-premises, in the Cloud, or anywhere in between.
We call this Pervasive Data Intelligence. It’s the answer to the complexity, cost, and inadequacy of today’s analytics. And it's the way Teradata transforms how businesses work and people live through the power of data throughout the world. Join us and help create the era of Pervasive Data Intelligence.
The Information Security Analyst will be tasked not only with identifying and responding to potential threats, but also proactively hunting and eliminating them. The ideal candidate will have highly technical skills and should possess an understanding across a broad range of security technologies and will take a proactive approach to network intrusions. You should have several years of experience working within a SOC environment and should have hands-on experience in creating and executing cyber hunting missions. The candidate must be a world-class problem-solver with the ability to handle challenges under pressure. This is a global role with responsibility for Teradata security technologies for all business units.
The ideal candidate will have experience and a proven track record of finding and responding to threats found from various tools DLP, SIEM. Security Analytics, Behavior Analysis etc. As a key member of the security team, flexibility and a broad knowledge of security processes, along with strong communication and collaboration skills, will result in a successful candidate.
Key Areas of Responsibility
Direct hands-on expertise in the following areas of information security
Qualifications
Our Mission
At Palo Alto Networks® everything starts and ends with our mission:
Being the cybersecurity partner of choice, protecting our digital way of life.
We have the vision of a world where each day is safer and more secure than the one before. These aren’t easy goals to accomplish – but we’re not here for easy. We’re here for better. We are a company built on the foundation of challenging and disrupting the way things are done, and we’re looking for innovators who are as committed to shaping the future of cybersecurity as we are.
Your Career
You will join an Information Security (InfoSec) team that will give you the opportunity to make a global impact. One that protects our way of life in the digital age by preventing successful cyberattacks. A team looking for engineers who are passionate about technology, have an interest in cyber security, and also want to make a positive difference in the world that we live in. The projects our interns are assigned will give real hands-on experience working on securing Palo Alto Networks. The Information Security team’s mission is to protect the company's brand integrity, confidentiality, infrastructure, and assets from internal and external threats. They enable business outcomes everywhere while securing the user, product, infrastructure and data, built on a foundation of threat detection and response.
Our top Technical Internship roles we hire for are :
Security Architect
DevOps Engineer
Security Operations Center (SOC) Engineer
Red Team Engineer
Risk & Compliance Analyst
Vulnerability Engineer
Your Impact
Collaborate and execute alongside experienced engineers and security professionals.
Help us disrupt the cybersecurity industry using the latest and greatest technologies.
Write code that meaningfully improves our products and services
Learn about the cybersecurity industry from the world's leading security experts.
Your Experience
Completing a BS/MS/PhD degree in Computer Science, Computer Engineering or other related STEM field
Strong programming skills
An understanding of the fundamentals of Computer Science & Computer Security
Exemplify strong initiative and ability to work independently with limited direction
Ability to work cross functionally with other engineers, researchers and Product Managers
Excellent communications skills
The Team
Our Information Security team is at the core of our products and connected directly to the mission of preventing cyberattacks. We are constantly innovating — challenging the way we, and the industry, think about cybersecurity. Our engineers don’t shy away from building products to solve the problems no one has pursued before.
We define the industry instead of waiting for directions. We need individuals who feel comfortable in ambiguity, excited by the prospect of a challenge, and empowered by the unknown risks facing our everyday lives that are only enabled by a secure digital environment.
Intern Program
Our global internship program trains the next-generation of cybersecurity talent across a range of specializations, from threat intelligence to information security, engineering, sales, and marketing. The program also features a combination of challenging projects with tangible impact, engaging social events, and networking opportunities. Interns and recent graduates can learn about the network security industry from leading thinkers, grow their professional networks, and be part of a career-defining experience.
The summer internship program features a combination of challenging projects with real impact, engaging social events, and networking opportunities:
12-week program
Peers of elite students
One-on-one mentoring by industry leaders
Exposure to and support from Palo Alto Networks executives
Events that pique your intellectual curiosity and inspire new ideas
Opportunities to expand your knowledge and work in a fast-paced environment
Our Commitment
We’re trailblazers that dream big, take risks, and challenge cybersecurity’s status quo. It’s simple: we can’t accomplish our mission without diverse teams innovating, together.
We are committed to providing reasonable accommodations for all qualified individuals with a disability. If you require assistance or accommodation due to a disability or special need, please contact us at accommodations@paloaltonetworks.com.
Palo Alto Networks is an equal opportunity employer. We celebrate diversity in our workplace, and all qualified applicants will receive consideration for employment without regard to age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, or other legally protected characteristics.
St. Joseph’s Health is recognized for the expertise and compassion of its highly skilled and responsive staff. The combined efforts of the organization’s outstanding physicians, superb nurses, and dedicated clinical and professional staff have made us one of the most highly respected healthcare organizations in the state, the largest employer in Passaic County, and one of the nation’s “100 Best Places to Work in Health Care”.
Job Overview
Responsible for assessing security threats and risks involving the security and integrity of data within the St. Joseph Healthcare System. Responsible for the monitoring and analyzing of logs and alerts from a variety of technologies including networks, servers, workstations, firewalls, Intrusion detection and prevention systems (IDS/IPS) virtual private networks (VPNs), encryption, data loss prevention (DLP), and antivirus systems. Responsible for the creation of comprehensive security write-ups which articulate security issues, analysis and remediation techniques, troubleshooting and resolution of security issues.
Work requires the knowledge of theories, principles, and concepts acquired through completion of a Bachelor's degree in Computer Information Systems, Computer Science, MIS, Engineering or closely related field. A minimum of five years experience with desktop, server and/or network administration in a mixed computing environment required. Two years of direct information security experience preferred. CompTIA Network+ Certification, CompTIA Security+ Certification and Microsoft MCP Certification preferred. Understanding of Information Security concepts and business acumen. Strong working knowledge of Windows Server, Desktop, Active Directory and Exchange. Experience using security vulnerability assessment tools and techniques. Experience of using Malware Remediation Tools. Solid understanding of operating systems and platforms (Windows, iOS, Unix, Linux). Experience with Directory Services and LDAP. Knowledge of network infrastructures including firewalls, VPN's, Intrusion Detection Systems, vulnerability assessment strategies, web application and device security. Knowledge of the security requirements for HIPAA, HITECH, ISO 27001/27002 and SOX regulations. Requires analytical skills with the ability to exercise sound judgment, attention to detail and problem resolution. Must possess strong customer service, communication, organizational & interpersonal skills.
RiskIQ is the leader in attack surface management, providing the most comprehensive discovery, intelligence, and mitigation of threats associated with an organization’s digital presence. With more than 75 percent of attacks originating outside the firewall, RiskIQ allows enterprises to gain unified insight and control over web, social and mobile exposures. Trusted by thousands of security analysts, RiskIQ’s platform combines advanced internet data reconnaissance and analytics to expedite investigations, understand digital attack surfaces, assess risk and take action to protect the business, brand, and customers. Based in San Francisco, the company is backed by Summit Partners, Battery Ventures, Georgian Partners and MassMutual Ventures.
We are looking for a Senior Cyber Intelligence Analyst to join our i3 team. This position can be based at our office in Lenexa, KS or remotely.
The Role
The Incident Investigations and Intelligence (i3) Program within RiskIQ is built to oversee managed services of the External Threats Product workspaces for clients and the Executive Guardian product workspaces for clients. Executive Guardian is designed to protect C-Suite and high net worth individuals from physical threats, exposures of Personally Identifiable Information (PII), and instances of social media account impersonation thereby safeguarding the individual, their reputation, family, and by extension, the company. External Threats protects clients from phishing attacks, domain infringement, mobile app impersonation, social & brand impersonation, and data leakage. The i3 Cyber Intelligence Analyst (SCIA) The i3 Cyber Threat Intelligence Analyst is a mid-level analytic role that will capitalize on an existing technical skillset to build and maintain complex technical logic to identify online threats to customers, manage client threat events, and take the appropriate action to suppress harmful content on the internet in order to protect our customers, their people, and their assets. i3 Cyber Threat Intelligence Analysts will also perform threat attribution research for the purposes of providing customers with finished and actionable intelligence products relevant to the safety and security of their assets and operations. The i3 Cyber Threat Intelligence Analyst is technically proficient, proactive, and is business-minded using both available open source and proprietary data sets to confidently support attribution of virtual threat actors with their actions.
Responsibilities
Requirements
Why work at RiskIQ?
At Dominion Energy we love our jobs. That’s right. Love. Every day we go to work filled with passion to be excellent, to creatively problem solve and to innovate. These are exciting days for energy companies, and Dominion Energy aims to shape the future of energy in America. We are looking at all of our work with fresh eyes, retooling everything we do, in every part of the company, to operate more sustainably and to deliver energy more reliably than ever. We are looking for interesting, independent thinkers and doers who can help shape the culture of a forward-looking company that’s proud of its rich legacy. Are you a change agent? Do you think differently? Do you want to fall in love with your job? If you answered “yes,” then read on!
At this time, Dominion Energy cannot transfer nor sponsor a work visa for this position.
This position does not offer relocation assistance.
Do you have what it takes?
This is not your typical cyber role. A cyber war is underway in the world today, with hostile nations seeking to disrupt and destroy critical infrastructure in the United States, all day, and every day. If you want to be on the front lines up against the best cyber criminals and nation state attackers in the world and prove you are better, then this is the place to be.
For our employees, this is a mission, not a job. We educate the company about cyber threats. We establish the standards for cyber security. We perform assessments to ensure proper protections are in place. We manage vulnerabilities and guide the development of defenses. It takes a high degree of skill and a commitment to that mission to be successful. Do you have what it takes?
If this description sounds like you, let’s talk!
This posting is for two positions that will be filled at the level commensurate with the successful candidates’ education, experience, knowledge, skills and abilities.
Associate Cyber Security Analyst
This entry level cyber security position, under close supervision, performs cyber security and cyber risk work, working closely with the Cyber Security Operations Center (CSOC) and other groups focused on the monitoring, analysis, and investigation of cyber security threats and events, both internal and external, that could potentially impact the security posture of the organization. Facilitates client requests to ensure critical business tasks continue uninterrupted. Performs assessments of cyber security risk and vulnerabilities, maintains security policies, and helps facilitate cyber security awareness throughout the organization. Provides updates and detailed information to management regarding the negative impact on the business caused by theft, destruction, alteration or denial of access to information and systems. May work with other staff to assess the cyber security risk on the organization's network systems, applications, and solutions based upon user requests and business needs. Applies a basic understanding of IT technologies and develops an evolving knowledge of mitigation options and risk frameworks to assess the current threat landscape and improve security.
Cyber Security Analyst
Under broad supervision, this intermediate role performs cyber security and cyber risk work, working closely with the Cyber Security Operations Center (CSOC) and other groups focused on the monitoring, analysis, and investigation of cyber security threats and events, both internal and external, that could potentially impact the security posture of the organization. Coordinates organization cyber security response activities, and maintains situational awareness of the security posture of the enterprise. Performs assessment of cyber security risk and vulnerability analysis, creates and maintains security policies, and facilitates cyber security awareness throughout the organization. Provides updates and detailed information to management regarding the negative impact on the business caused by theft, destruction, alteration or denial of access to information and systems. Evaluates the cyber security risk on the organization's network systems, applications, and solutions based upon user requests and business needs. Applies considerable understanding of IT technologies, evaluation of cyber security risks and attack vectors, and develops an evolving knowledge of mitigation options and risk frameworks to assess the current threat landscape and improve security. Consults with subject matter experts and business representatives, as needed, to provide input on cyber security decisions, the establishment of cyber security policies, and to foster security awareness.
Associate Cyber Security Analyst
Must possess 0-2 years of work experience in cyber security, or a cyber risk related role demonstrating a basic understanding regarding the identification, gathering and analysis of information, threats, etc. to investigate and mitigate security risks.
Demonstrates a general understanding of cyber security and or data system protection principles and practices. A basic understand of industrial cyber security standards and risk are desired. Demonstrated good organization and planning skills. Demonstrates a questioning attitude, with basic analytical and investigative skills. Demonstrates verbal and written communication skills, with the ability to interact effectively with others. A willingness to learn new skills and methodologies, conduct research, and learn to maintain hardware, software and network firewalls and encryption. Ability to work cooperatively in a teamed environment. Highly motivated, with the ability to work effectively under basic supervision in a fast-paced environment. Previous work experience or exposure to the security aspects governing software, communications, and network protocols is a plus.
Cyber Security Analyst
Three to five years of work experience in cyber security, or a cyber risk related role demonstrating a general knowledge in the identification, gathering and analysis of information, threats, etc. to investigate and mitigate security risks. (Note: A Master's degree will count as one year of experience. A partial year of six months or more will be rounded up to one year)
Demonstrates a working knowledge of cyber security best practices and frameworks. Possesses a solid understanding of industrial cyber security standards, frameworks and risk assess modeling. Demonstrated good organization and planning skills, to include time and project management skills. Demonstrates good analytical, troubleshooting, and problem solving skills, and has a questioning attitude. Demonstrates verbal and written communication skills, with the proven ability to present information to others. Ability to conduct research and apply, and under broad supervision, maintain hardware, software and network firewalls and encryption. Ability to work cooperatively in a teamed environment. Highly motivated, with the ability to work effectively under minimal supervision in a fastpaced environment. Previous work experience in security aspects of multiple platforms, operating systems, software, communications, and network protocols is desired.
Note: This position requires in office work. You must be willing to report to Dominion Energy's corporate headquarters in Richmond, Virginia.
The company is actively seeking United States military veterans and service members who meet the qualifications outlined below.
Bachelor Degree or will obtain a Bachelor's degree by December 2020. Equivalent combination of education and demonstrated related experience may be accepted in lieu of preferred level of education
Preferred Disciplines: IT Cyber Security or related specialization/track highly desirable
Other Preferred Disciplines: Information Systems, Computer Science, Computer Engineering
Other disciplines may be substituted for the preferred discipline(s) listed above.
No Testing Required
Export Control
Certain positions at Dominion Energy may involve access to information and technology subject to export controls under U.S. law. Compliance with these export controls may result in Dominion Energy limiting its consideration of certain applicants.
Other Information
We offer excellent plans and programs for employees. Employees are rewarded with a competitive salary and comprehensive benefits package which may include: health benefits with coverage for families and domestic partners, vacation, retirement plans, paid holidays, tuition reimbursement, and much more. To learn more about our benefits, click here dombenefits.com.
Dominion Energy is an equal opportunity employer and is committed to a diverse workforce. Qualified applicants will receive consideration for employment without regard to their protected veteran or disabled status.
You can experience the excitement of our company – it's the difference between taking a job and starting a career.
Associate Security Consultant - Entry Level 2021
FireEye is the intelligence-led security company. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant® consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber attacks. FireEye has over 9,000 customers across 103 countries, including more than 50 percent of the Forbes Global 2000.
Do you love the challenge of figuring out solutions to intricate technology puzzles?
Do you like to help others solve their network and information security issues?
If you answered YES, then consider a career at Mandiant as an Associate Consultant!
We have the expertise and experience in information security. This is our focus.
You’re not just a number and you won’t get lost in the shuffle.
You will be working on challenging technical projects that make an impact. You’ll be visible.
You’ll be exposed to many different environments and technologies.
You’ll learn from our best incident responders and red teamers.
We investigate breaches that make headlines (and many more that don’t), as well as break into applications and systems to identify security gaps for our clients. We find evil and solve crime, and are seeking candidates who possess the ability to think like an attacker and stay one step ahead of the game.
Find your niche among the cool projects you'll be involved with, such as:
Responsibilities:
Requirements:
Additional Qualifications:
The NYC Red Team Security Engineer reports to the Senior Manager of Information Security and is responsible for testing and validating all facets of information security controls including networks, servers and web applications. The Red Team Security Engineer carries out attacks and perform security assessments to uncover vulnerable areas of systems and applications and to test defensive security measures using common as well as unique methods and practices.
What You’ll Do
What We’ll Want You To Have
At Optiv, we’re on a mission to help our clients make their businesses more secure. We’re one of the fastest growing companies in a truly essential industry.
In your role at Optiv, you’ll be inspired by a team of the brightest business and technical minds in cyber security. We are passionate champions for our clients, and know from experience that the best solutions for our clients’ needs come from working hard together. As part of our team, your voice matters, and you will do important work that has impact, on people, businesses and nations. Our industry and our company move fast, and you can be sure that you will always have room to learn and grow. We’re proud of our team and the important work we do to build confidence for a more connected world.
Optiv is the leading security solutions integrator creating confidence for a more connected world. Optiv’s corporate security team is tasked with protecting company resources and client data in a dynamic industry with expanding threats. To meet the challenging needs of Optiv’s growing business, the corporate security team is expanding their information security governance and compliance program. The security compliance analyst will report directly to the Director of Governance and Compliance. This position is responsible for assisting with the collection and analysis of key performance metrics, conducting internal audits and assessments, assisting with third-party assessments and internal risk management reviews to help ensure the confidentiality, integrity, and availability of Optiv data and systems. The security compliance analyst must possess strong analytical skills, research capabilities, and an attention to detail to ensure Optiv can efficiently and effectively handle its compliance requirements. This position is highly business-facing, with frequent collaboration and interaction with all Optiv business units.
PRIMARY DUTIES AND RESPONSIBILITIES
SUPERVISORY RESPONSIBILITIES
Will not have direct reports
Education and Experience
Desired Qualifications:
#LI-CP1
Why you'll love it here:
If you are seeking a culture that supports growth, fosters success and moves the industry forward, find your place at Optiv! As a market-leading provider of cyber security solutions, Optiv has the most comprehensive ecosystem of security products and partners to deliver unparalleled services. Our rich and successful history with our clients is based on trust, serving more than 12,000 clients of varying sizes and industries, including commercial, government and education. We have the proven expertise to plan, build, and run successful security programs across Risk Management, Cyber Digital Transformation, Threat Management, Security Operations ? Managed Services and Identity and Data Management. Optiv remains committed to championing Diversity, Equality and Inclusion within our organization and throughout the industry.
With Optiv you can expect:
• Work/life balance. We offer "Recharge", a flexible, time-off program that encourages eligible employees to take the time they need to recharge
• Professional training resources, including tuition reimbursement
• Creative problem-solving and the ability to tackle unique, complex projects
• Volunteer Opportunities. "Optiv Chips In" encourages employees to volunteer and engage with their teams and communities.
• The ability and technology necessary to productively work remote/from home (where applicable).
Technology & Cybersecurity Operational Risk Management – Cybersecurity Engineer - Associate
The Cybersecurity Engineer within Operational Risk Management is responsible for the identification, monitoring, testing, and governance of cybersecurity processes and controls risks inherent in JPMorgan Chase technology environment. This position will be highly engaged with the firm-wide Cybersecurity team who provides high quality security solutions to detect and monitor for threats and vulnerabilities and manage security incidents to keep ahead of threats.
We are looking for a multi-disciplined forward-looking technologist with diverse backgrounds and experiences including in areas such as cybersecurity, big data, compliance and oversight, cloud security, cryptography, rights management, networking technologies (e.g Cisco, Bluecoat, Juniper), and data security architectures. Knowledge of emerging technical trends and cyber threats will be required.
The successful candidate will use experience and leadership skills to give guidance and best practice advice across the Cybersecurity discipline. He/she will lead significant event reviews, risk assessments, and perform monitoring of cybersecurity controls. Written and verbal communication of results of risk assessments will be provided by the Cybersecurity Engineer to management, executive directors, managing directors and stakeholders. The role requires a strong self-starter who can understand program objectives, understand mitigating cybersecurity controls using a logical to independently assess the control environment.
· Perform deep inspection of specific technologies in targeted processes or firm-wide evaluation.
· Keep abreast of current cyber trends, vulnerabilities, and emerging technologies.
· Engage with cyber teams to gain full understanding of cybersecurity and control environment.
· Perform significant event reviews.
· Independently assess technology risk management and controls across the bank
· Understand third party risks as related to specific technology area of expertise.
· Risk assessment of the impact of threats and vulnerabilities on JPMC technology portfolio.
· Coordination and key participation in the development of the evolving risk position of new technology. For each of the technology areas in focus, this person will be charged with escalating and tracking the individual risk items.
· Work with appropriate technology areas to identify potentially elevated risk concentrations globally and perform assessments of the corresponding inherent risks and mitigating controls. Recommend any adjustments required to meet JPMC policy, regulatory requirements, and industry best practices.
· Develop and perform ongoing analysis of Operational Risk loss, near miss and external events to inform RCSA results, technology assessments and scenario analysis. Investigate Operational Risk events meeting selection criteria; assist LOB OROs in determining the appropriate consideration of technology risk management and risk events.
· Participate in key portfolio governance forums.
· Provide feedback and coordination with the application risk assessment process.
· Identify risk measures and thresholds for monitoring key risk cybersecurity controls.
· BS/BA degree in computer science or equivalent experience.
· 2+ years or more proven experience in technology development, engineering or technical architecture with financial services experience
· Working knowledge and interest of current and emerging technologies
· Knowledge of Cybersecurity organization practices, operations, risk management processes, principles, architectural requirements, engineering and threats and vulnerabilities, including incident response methodologies
· Ability to collaborate with high-performing teams and individuals throughout the firm to accomplish common goals
· Demonstrated verbal and written communication skills and excellent analytical skills
· Ability to understand complex technical systems and the business processes they support and synthesize the corresponding risks and controls and recommend adjustments if required.
· Track record of collaboration and relationship building
· Proven ability to anticipate and identify risks and effective mitigants
· Excellent analytical and problem-solving skills, inquisitive nature and comfort challenging current practices
· Proven track record of taking ideas forward without supervision and challenging others, where appropriate
· Adept at developing relationships with senior business executives with a reputation for partnering across organization lines to mitigate risks
· Highly disciplined, able to work with limited supervision and make independent decisions
· Strong organizational, project management, and multi-tasking skills with demonstrated ability to manage expectations and deliver results
· High level of professionalism, self-motivation, and sense of urgencyFireEye is the leader in intelligence-led security-as-a-service. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant® consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber attacks. FireEye has over 7,500 customers across 67 countries, including more than 50 percent of the Forbes Global 2000.
Compliance Analyst Intern - Summer 2021
The Governance and Compliance team is a critical part of the larger FireEye Security team. The team is responsible for performance of internal audits and assessments, external audit coordination, policy management, business continuity management and third-party management.
As a Compliance Analyst on the Governance and Compliance team, you will use your acumen, customer service skills, and cybersecurity knowledge to assess the internal control environments within FireEye and participate in vendor management due diligence activities. You will work with a great team of professionals who will provide you the guidance and support you will need to be successful in our shared goal of supporting our internal and external customers to meet today’s complex regulatory and security requirements.
What You Will Do:
· Interact with our internal customers, internal and external auditors to identify, scope, and evaluate the effectiveness of internal controls
· Conduct vendor risk assessments
· Assist with business continuity and disaster recovery documentation and associated testing exercises
· Be responsible for documenting and tracking your work within internal web-based tools
· Develop a deep understanding of FireEye products and services
· Exemplify industry-leading customer support skills and deliver positive customer experience
Requirements:
· Bachelor’s degree in a technical field or working toward such degree, with at least 3 years of completed post-secondary education
· Experience with cyber security tools, technology and best practices
· Experience working in customer facing environment
· Experience fielding questions and requests from customers, and providing timely and comprehensive responses
Additional Qualifications:
· Demonstrated aptitude and desire to learn new technologies and services
· Ability to ramp up quickly in learning the portfolio of FireEye services and products
· Problem solver with keen attention to detail
· Excellent written and verbal communication skills
At FireEye we are committed to our #OneTeam approach combining diversity, collaboration, and excellence. All qualified applicants will receive consideration for employment without regard to race, sex, color, religion, sexual orientation, gender identity, national origin, protected veteran status, or on the basis of disability. Requests for accommodation due to disability can be sent directly to HR-Accommodations@FireEye.com.
Job Description
At Boeing, we innovate and collaborate to make the world a better place. From the seabed to outer space, you can contribute to work that matters with a company where diversity, equity and inclusion are shared values. We’re committed to fostering an environment for every teammate that’s welcoming, respectful and inclusive, with great opportunity for professional growth. Find your future with us.
Boeing Security is seeking a detail-oriented and self-motivated Mid-Level Cyber Security Specialist to support Department of Defense (DoD) and Special Access Program (SAP) activities. This position will be located in El Segundo, CA, Seal Beach, CA, or Huntington Beach, CA.
Position Responsibilities
Additional Responsibilities
This position requires an active Secret U.S. Security Clearance. (A U.S. Security Clearance that has been active in the past 24 months is considered active.)
Basic Qualifications (Required Skills/Experience):
Preferred Qualifications (Desired Skills/Experience):
Typical Education & Experience:
Education/experience typically acquired through advanced technical education (e.g. Bachelor) and typically 5 or more years' related work experience or an equivalent combination of technical education and experience (e.g. Masters with 3 years' related work experience, PhD with 1+ years' related work experience, etc.).
Relocation:
This position does not offer relocation. Candidates must live in the immediate area or relocate at their own expense.
Employee Referral:
Referral to this job is eligible for bonus.
Drug Free Workplace:
Boeing is a Drug Free Workplace where post offer applicants and employees are subject to testing for marijuana, cocaine, opioids, amphetamines, PCP, and alcohol when criteria is met as outlined in our policies.
Experience Level
Individual Contributor
Contingent Upon Program Award
No, this position is not contingent upon program award
TD Description
About TD Bank, America's Most Convenient Bank
TD Bank, America's Most Convenient Bank, is one of the 10 largest banks in the U.S., providing more than 8 million customers with a full range of retail, small business and commercial banking products and services at approximately 1,300 convenient locations throughout the Northeast, Mid-Atlantic, Metro D.C., the Carolinas and Florida. In addition, TD Bank and its subsidiaries offer customized private banking and wealth management services through TD Wealth®, and vehicle financing and dealer commercial services through TD Auto Finance. TD Bank is headquartered in Cherry Hill, N.J. To learn more, visit www.tdbank.com. Find TD Bank on Facebook at www.facebook.com/TDBank and on Twitter at www.twitter.com/TDBank_US.
TD Bank, America's Most Convenient Bank, is a member of TD Bank Group and a subsidiary of The Toronto-Dominion Bank of Toronto, Canada, a top 10 financial services company in North America. The Toronto-Dominion Bank trades on the New York and Toronto stock exchanges under the ticker symbol "TD". To learn more, visit www.td.com.
Department Overview
Building a World-Class Technology Team at TD
We can't afford to be boring. Neither can you. The scale and scope of what TD does may surprise you. The rapid pace of change makes it a business imperative for us to be smart and open
Job Description
PLEASE REFER TO THE QUALIFICATIONS SECTION FOR SPECIFIC ROLE REQUIREMENTS
About This Role
We are looking for someone to develop and implement Technology Controls and Information Security related policies, programs and tools. You will provide specialized expertise and guidance on assessing risks, identifying potential gaps and providing security solutions to mitigate risks and protect TD. You may also participate on projects of moderate to high complexity and provide complex reporting, analysis, and assessments at the functional, business line or enterprise level.
Meaningful work is fueled by meaningful performance and career development conversations with your manager. Here are the essential job functions of this position:
Job Requirements
PLEASE REFER TO THE QUALIFICATIONS SECTION FOR SPECIFIC ROLE REQUIREMENTS
What can you bring to TD? Share your credentials, but your relevant experience and knowledge can be just as likely to get our attention. Here are the minimum requirements for this position:
Qualifications
Preferred Qualifications - Here are the preferred qualifications for this role:
• Define, develop, implement, manage and govern standards, policies, procedures, and solutions that mitigate risk and maximize security, availability of service, efficiency and effectiveness
• Provide subject matter expertise over network security risk assessment, secure network design and risk/threat/vulnerability management capabilities and functions across People, Process and Technology
• Provide support and consulting in preparation for Audits and in composing management responses and appropriate remediation activities
• Review and analyze large, complex, and comprehensive private and public cloud projects to assess network security risk, ensure compliance with standards, and suggest changes
• Conduct detailed assessments to prioritize program remediation or improvement for various network related technologies
• Build and maintain appropriate relationships with internal and external parties to ensure awareness and understanding of potential or impending threats, and measures to counter these threats
• Contribute to the review of internal processes & activities and assist in identifying potential opportunities for improvement
• Identify and recommend opportunities to enhance productivity, effectiveness and operational efficiency
• Assess / identify key issues and escalate to appropriate levels and relevant stakeholders where required
• Able to work well with others, and in particular be able to influence and change behaviors and build consensus
• Participate in the investigation of Information Security Incidents and development of remediation/prevention mechanisms
• Work with project teams to understand and accommodate application architecture and the applications specific requirements for private and public cloud networking
• Work with security team to understand and accommodate network security requirements for application
• Establish requirements and drive implementation of network security governance and reporting for private and public cloud environments.
Job Requirements :
• 5 to 7 years of experience in an information technology role focused on network infrastructure security preferably within the financial services industry or a consulting company
• Strong technical knowledge and understanding of various software-defined and physical network platforms including, firewalls, IDS/IPS, routers, switches, WAN technologies, MPLS, load balancing and wireless Networks
• Experience and understanding of public cloud networking and network security controls, particularly on Azure
• Experience defining network security standards and processes such as firewall rules request/approval process, B2B communication standards, logging and monitoring standards, device hardening standards for large organizations preferably in the financial services industry
• Resourceful and able to work independently with minimum supervision under the direction of the Senior Manager – Network Security
• Information Security certification or accreditation would be an asset
• Strong research, analytical and problem-solving abilities
• Effective written and verbal communication skills
• Have experience with micro segmentation and network automation in a hybrid public and private cloud environment
• Knowledgeable of cloud and hybrid-cloud implementations including IaaS, PaaS and SaaS
Education:
• University degree in Information Technology, Computer Science, Computer Engineering or equivalent work experience
• Certifications: CISSP, CCSP, Microsoft MCSE Azure – 400 or 500
Job Summary:
The primary purpose of this role is to support the design, implementation and ongoing operations of information security tools and services. This includes translating business and technical requirements into robust enterprise security software solutions that ensure information assets are adequately protected with acceptable levels of control. This also includes monitoring, testing, and evaluating security assessments of systems and taking steps to help design and implement remediation solutions.
To be successful, the individual in this role must have knowledge of security practices and tools related to identity and access management along with enterprise digital certificate management systems. This role helps establish and maintain programs that enable the business to operate efficiently and remain in compliance with regulatory and industry best practices.
Key Responsibilities:
• Supports the implementation and maintenance of assigned information security solutions to ensure successful deployment and operation; develops and documents detailed standards (e.g., guidelines, processes, procedures)
• Assists the Information Security team in monitoring security systems, reviewing logs, and managing information security systems
• Participates in regular security vulnerability assessments
• Performs internal and external penetration validation testing to ensure that computer systems are up to date relative to all operating systems, patches, and virus protection software
• Collaborates with other technology teams including Engineering to design and implement remediation solutions
• Provides assistance during information security incidents as part of an Incident Response Team
• Performs security tests against third-party products
• Remains aware of technological trends and developments in the area of information security
• Solves difficult technical problems; solutions are testable, maintainable, and efficient
• Provides support in the event of escalated security issues for enterprise systems; helps diagnose, troubleshoot, and resolve issues
• Supports the implementation of hardware and software changes into environments to ensure security requirements are met
• Provides input into security breach response procedures; assists with security breach response activities
• Participates in break/fix activities
• Analyzes the output of industry standard cybersecurity tools and helps identify remediations to reduce risk and exposure of applications
• Completes basic custom enhancements of applications using secure coding techniques to reduce the threat of remote or local vulnerabilities
• Evaluates entire applications (Container, Infrastructure, host platform) to identify potential threats and vulnerabilities
Minimum Qualifications:
• Bachelor's Degree in Computer Science, CIS, Engineering, Cybersecurity, or related field (or equivalent work or military experience in a related field)
• 2 years of experience in technology system support, software development or a related field
• 1 year of experience with information security applications and systems
• 1 year of experience in database technologies
• 1 year of experience working on project(s) involving the implementation of solutions applying development life cycles (SDLC)
• 2 years of experience analyzing the output of industry standard cybersecurity tools and identifying remediations to reduce risk and exposure of applications
Preferred Qualifications:
• Master's Degree in Computer Science, CIS, or related field
• Relevant information security certifications (e.g., CISSP, CISM, CEH, PCI ISA, CRISC, CISA, OSCP, GPen)
• Advanced understanding of information security practices and policies
• 2 years of IT experience developing and implementing business systems within an organization
• 4 years of experience working with defect or incident tracking software
• 4 years of experience with technical documentation in a software development environment
• 2 years of experience working with an IT Infrastructure Library (ITIL) framework
• 2 years of experience leading teams, with or without direct reports
• Experience with Cloud technologies
Our Team
As Discovery Inc’s portfolio continues to grow – around the world and across platforms – the Global Technology & Operations team is building media technology and IT systems that meet the world class standard for which Discovery is known. GT&O builds, implements and maintains the business systems and technology that are critical for delivering Discovery’s products, while articulating the long-term technology strategy that will enable Discovery’s growing pay-tv, digital terrestrial, free-to-air and online services to reach more audiences on more platforms.
From Amsterdam to Singapore and from satellite and broadcast operations to SAP, we are driving Discovery forward on the leading edge of technology.
The Role
The Network Security Engineer will be responsible for working with the operations and engineering teams around the strategic, tactical, and improvement of the global network security platforms. The individual will be evaluating processes regularly to ensure expected outcomes are achieved in the most efficient way along with identifying service improvements and document those improvements. Help ensure standards and processes are followed.
* Bachelor’s degree in Computer Science, Information Technology, Information Systems or similar
* Minimum of 5 years of experience in system administration in an enterprise network security production environment
* Strong skills with network protocols, standards and policies
* Strong skills with Juniper, Cisco, and Palo Alto network security platforms
* Strong skills with network access control systems (AAA, NAC)
* Understanding of load balancing, remote access, DNS, DHCP and IPAM platforms
* Process oriented leader with strong execution and follow-through skills
* Able to perform multiple tasks simultaneously and prioritize self
* Strong and consistent customer service and communication skills
* Willingness to work a flexible schedule
* Strong team member with self-motivation and desires to improve the infrastructure
* Excellent troubleshooting, analytical and problem-solving skills
* Minimal travel anticipated for this position
* Must have the legal right to work in the United States
Preferred qualifications
* Media industry experience
Discovery Communications, Inc. is an equal opportunity employer. Discovery is committed to being an employer of choice, not just a good place to work, but a great and inclusive place to work. To that end, we strive to recruit and maintain a workforce that meaningfully represents the diverse and culturally rich communities that we serve. Qualified applicants will receive consideration for employment without regard to their race, color, religion, national origin, sex, sexual orientation, gender identity, protected veteran status or disabled status or, genetic information.
We will consider for employment all qualified applicants, including those with criminal histories, in a manner consistent with the requirements of applicable state and local laws, including but not limited to all local Fair Chance Ordinances.
Specific Responsibilities Include:
Basic Qualifications:
Eligibility Requirements: (Country Specific)
Desired Characteristics:
GE offers a great work environment, professional development, challenging careers, and competitive compensation. GE is an Equal Opportunity Employer. Employment decisions are made without regard to race, color, religion, national or ethnic origin, sex, sexual orientation, gender identity or expression, age, disability, protected veteran status or other characteristics protected by law.
GE will only employ those who are legally authorized to work in the United States for this opening. Any offer of employment is conditioned upon the successful completion of a drug screen (as applicable).
Relocation Assistance Provided: No
Job Description
As an AWS Cloud Architect, you will interface with key stakeholders and apply your technical proficiency across different stages of the Software Development Life Cycle including Requirements Elicitation, Application development, definition and Design. You will play an important role in creating the high-level design artifacts. You will also deliver high quality code deliverables for a module, lead validation for all types of testing and support activities related to implementation, transition and warranty. At Infosys, you may look forward to collaborating with some of the best talent in the industry to create innovative high quality and defect-free solutions to meet our clients’ business needs. We drive a learning culture, where teamwork and collaboration are encouraged, excellence is rewarded, and diversity is respected and valued.
Required AWS Cloud Architect Qualifications:
• Bachelor’s degree or foreign equivalent required from an accredited institution. Will also consider three years of progressive experience in the specialty in lieu of every year of education.
• 7+ years of experience with Information Technology
• U.S. citizens and those authorized to work in the U.S. are encouraged to apply. We are not able to sponsor at this time
• Candidate must be located within the commuting distance of Irving, TX or be willing to relocate to this location. This position may require travel in the US and Canada.
Preferred AWS Cloud Architect Qualifications:
• Hands on experience architecting in AWS and working with Big Data.
• Strong experience in Designing data pipelines and data solutions on-premise and on cloud, in AWS Big Data, Glue/EMR/S3/Redshift, Hadoop distributed frameworks, Apache Spark with Python, Java programming and Hadoop Ecosystems
• Good experience on Snowflake, End to End implementations on ETL and Bigdata Projects
• Good knowledge of Cloud Security implementation practices
• Expertise in scalability and high performance applications meeting various SLAs which are part of architecture and design
• Exposure on design and developing micro-services architecture, Diagnostic /Discovery/As Is Assessment, Solution
• Evaluation and Recommendation and CI / CD Good experience in Project life cycle activities on development and maintenance projects
• Experience in data migration, estimation, sizing of project
• Experience in working in Agile teams, and working independently with Business stakeholders providing solutions and regular updates
• Experience and desire to work in a Global delivery environment with strong written and oral communication skills and Analytical skills
The job entails sitting as well as working at a computer for extended periods of time. Should be able to communicate by telephone, email or face to face. Travel may be required as per the job requirements.
About Us
Infosys is a global leader in next-generation digital services and consulting. We enable clients in 46 countries to navigate their digital transformation.
With over three decades of experience in managing the systems and workings of global enterprises, we expertly steer our clients through their digital journey. We do it by enabling the enterprise with an AI-powered core that helps prioritize the execution of change. We also empower the business with agile digital at scale to deliver unprecedented levels of performance and customer delight. Our always-on learning agenda drives their continuous improvement through building and transferring digital skills, expertise, and ideas from our innovation ecosystem.
About the Role
Cloud Security Posture Management (CSPM) is a new and complementary product area for CrowdStrike. We’re extending CrowdStrike’s mission of “stopping breaches” into the public cloud control plane and native cloud resources. CrowdStrike’s CSPM offering will give customers visibility into both the (mis)configuration and compliance of native cloud resources, and potential adversary activity involving those resources. When coupled with Falcon, CrowdStrike’s endpoint security offering, our CSPM offering will provide a more comprehensive perspective on how the adversary is targeting key customer infrastructure.
What You’ll Need
You’ll use
Key Qualifications
Bonus points awarded for…
Bring your experience in distributed technologies and algorithms, your great API and systems design sensibilities, and your passion for writing code that performs at extreme scale. You will help build a platform that scales to millions of events per second and Terabytes of data per day. If you want a job that makes a difference in the world and operates at high scale, you’ve come to the right place.
#LI-DK1
#LI-Remote
Benefits of Working at CrowdStrike:
Your role
Reporting to the global head of cloud security at IHS Markit, your work will focus primarily on AWS with a secondary focus on VMC, Azure and/or GCP as needed. You will mentor and guide junior members of the cloud security team and partner with stakeholders across information security and other IHS Markit organizations to deliver solutions that harden IHS Markit’s cloud security posture.
Emphasis will be on the following objectives:
· Creating security automation for response and remediation of compliance findings and hardening of AWS and VMWare Cloud on AWS (VMC) environments primarily, and Azure or GCP secondarily
· Onboard corporate and open-source security tools into build pipelines including SAST, DAST, TVM and anti-virus tools using Cloud native and open-source tooling and create custom tooling where needed to fill in gaps
· Partner with the cybersecurity operations center (CSOC), offensive security operations and threat intelligence teams to onboard new services for the purpose of detection and predication of events
Your expertise
· 0 – 2 years of experience of cloud security engineering on AWS
· Basic understanding of security requirements, best practices and execution in various cloud implementation scenarios: IaaS, PaaS, SaaS
· Basic understanding of Lockheed Martin’s Kill Chain or MITRE ATT&CK
· Basic understanding and exposure to automation using scripts and CI/CD pipelines with cloud native or open-source technologies
· Basic experience with a scripting language such as Bash or Python
· Basic understanding of Windows and Linux platforms in the lens of investigations, configuration management and patch management
· Knowledge of Google Cloud Platform (GCP) or Microsoft Azure security concepts in a secondary capacity is strongly desired, but not required
You are
· A naturally curious self-starter - you can deliver on requirements with some limited guidance or supervision, as needed by you and the team
· A relentless learner - you actively seek to add to your skillset and knowledge base while challenging the status quo to drive efficiency in the team
· Strong interpersonal skills – you can communicate with a wide range of technical and non-technical teams
· Insist on the highest standards within the team and actively share your perspectives with the team and the larger information security organization
What we offer:
· Access to the most interesting information technologies
· The ability to implement your own ideas and solutions
· Participation in conferences and training for Information Security qualifications
Flexible Working
We pride ourselves on our agility and diversity, and we welcome requests to work flexibly. For most roles, flexible hours and/or an element of remote working are usually possible. Please talk to us during the interview about the type of arrangement that is best for you. We will always try to be adaptable wherever we can and in accordance with local and regional practices.
The reesource shall provide the organization risk guidance on existing and emerging cloud technologies.
Excelicon seeks a resource to support and execute the following tasks:
suitability for the client. This may require interaction with vendors to gather product security
features, research vulnerabilities/weaknesses, and provide implementation recommendations to Senior Management.
emerging technologies to include new cloud, mobile and desktop application work products.
The Contractor shall provide individuals with the following knowledge, skills and abilities:
the National Institute of Standards and Technology (NIST) to include SP-800-53A: Assessing
Security and Privacy Controls in Federal Information Systems and Organizations: Building
Effective Assessment Plans, NIST SP 800-144: Guidelines on and Security and Privacy in Public
Computing Cloud, NIST SP 800-145: The NIST Definition of Cloud Computing, NIST SP 800-
146: Cloud Computing Synopsis and Recommendations; Federal Risk and Authorization
Management Program (FedRAMP) security control baselines and security guides.
You will:
You are a good fit if you:
You might work on:
Preferred Locations:
You will:
You are a good fit if you:
You might work on:
Preferred Locations:
TD Description
About TD Bank, America's Most Convenient Bank
TD Bank, America's Most Convenient Bank, is one of the 10 largest banks in the U.S., providing more than 8 million customers with a full range of retail, small business and commercial banking products and services at approximately 1,300 convenient locations throughout the Northeast, Mid-Atlantic, Metro D.C., the Carolinas and Florida. In addition, TD Bank and its subsidiaries offer customized private banking and wealth management services through TD Wealth®, and vehicle financing and dealer commercial services through TD Auto Finance. TD Bank is headquartered in Cherry Hill, N.J. To learn more, visit www.tdbank.com. Find TD Bank on Facebook at www.facebook.com/TDBank and on Twitter at www.twitter.com/TDBank_US.
TD Bank, America's Most Convenient Bank, is a member of TD Bank Group and a subsidiary of The Toronto-Dominion Bank of Toronto, Canada, a top 10 financial services company in North America. The Toronto-Dominion Bank trades on the New York and Toronto stock exchanges under the ticker symbol "TD". To learn more, visit www.td.com.
Department Overview
Building a World-Class Technology Team at TD
We can't afford to be boring. Neither can you. The scale and scope of what TD does may surprise you. The rapid pace of change makes it a business imperative for us to be smart and open
Job Description
PLEASE REFER TO THE QUALIFICATIONS SECTION FOR SPECIFIC ROLE REQUIREMENTS
About This Role
We are looking for someone to develop and implement Technology Controls and Information Security related policies, programs and tools. You will provide specialized expertise and guidance on assessing risks, identifying potential gaps and providing security solutions to mitigate risks and protect TD. You may also participate on projects of moderate to high complexity and provide complex reporting, analysis, and assessments at the functional, business line or enterprise level.
Meaningful work is fueled by meaningful performance and career development conversations with your manager. Here are the essential job functions of this position:
Job Requirements
PLEASE REFER TO THE QUALIFICATIONS SECTION FOR SPECIFIC ROLE REQUIREMENTS
What can you bring to TD? Share your credentials, but your relevant experience and knowledge can be just as likely to get our attention. Here are the minimum requirements for this position:
Qualifications
Preferred Qualifications - Here are the preferred qualifications for this role:
• Define, develop, implement, manage and govern standards, policies, procedures, and solutions that mitigate risk and maximize security, availability of service, efficiency and effectiveness
• Provide subject matter expertise over network security risk assessment, secure network design and risk/threat/vulnerability management capabilities and functions across People, Process and Technology
• Provide support and consulting in preparation for Audits and in composing management responses and appropriate remediation activities
• Review and analyze large, complex, and comprehensive private and public cloud projects to assess network security risk, ensure compliance with standards, and suggest changes
• Conduct detailed assessments to prioritize program remediation or improvement for various network related technologies
• Build and maintain appropriate relationships with internal and external parties to ensure awareness and understanding of potential or impending threats, and measures to counter these threats
• Contribute to the review of internal processes & activities and assist in identifying potential opportunities for improvement
• Identify and recommend opportunities to enhance productivity, effectiveness and operational efficiency
• Assess / identify key issues and escalate to appropriate levels and relevant stakeholders where required
• Able to work well with others, and in particular be able to influence and change behaviors and build consensus
• Participate in the investigation of Information Security Incidents and development of remediation/prevention mechanisms
• Work with project teams to understand and accommodate application architecture and the applications specific requirements for private and public cloud networking
• Work with security team to understand and accommodate network security requirements for application
• Establish requirements and drive implementation of network security governance and reporting for private and public cloud environments.
Job Requirements :
• 5 to 7 years of experience in an information technology role focused on network infrastructure security preferably within the financial services industry or a consulting company
• Strong technical knowledge and understanding of various software-defined and physical network platforms including, firewalls, IDS/IPS, routers, switches, WAN technologies, MPLS, load balancing and wireless Networks
• Experience and understanding of public cloud networking and network security controls, particularly on Azure
• Experience defining network security standards and processes such as firewall rules request/approval process, B2B communication standards, logging and monitoring standards, device hardening standards for large organizations preferably in the financial services industry
• Resourceful and able to work independently with minimum supervision under the direction of the Senior Manager – Network Security
• Information Security certification or accreditation would be an asset
• Strong research, analytical and problem-solving abilities
• Effective written and verbal communication skills
• Have experience with micro segmentation and network automation in a hybrid public and private cloud environment
• Knowledgeable of cloud and hybrid-cloud implementations including IaaS, PaaS and SaaS
Education:
• University degree in Information Technology, Computer Science, Computer Engineering or equivalent work experience
• Certifications: CISSP, CCSP, Microsoft MCSE Azure – 400 or 500
Job Summary:
The primary purpose of this role is to support the design, implementation and ongoing operations of information security tools and services. This includes translating business and technical requirements into robust enterprise security software solutions that ensure information assets are adequately protected with acceptable levels of control. This also includes monitoring, testing, and evaluating security assessments of systems and taking steps to help design and implement remediation solutions.
To be successful, the individual in this role must have knowledge of security practices and tools related to identity and access management along with enterprise digital certificate management systems. This role helps establish and maintain programs that enable the business to operate efficiently and remain in compliance with regulatory and industry best practices.
Key Responsibilities:
• Supports the implementation and maintenance of assigned information security solutions to ensure successful deployment and operation; develops and documents detailed standards (e.g., guidelines, processes, procedures)
• Assists the Information Security team in monitoring security systems, reviewing logs, and managing information security systems
• Participates in regular security vulnerability assessments
• Performs internal and external penetration validation testing to ensure that computer systems are up to date relative to all operating systems, patches, and virus protection software
• Collaborates with other technology teams including Engineering to design and implement remediation solutions
• Provides assistance during information security incidents as part of an Incident Response Team
• Performs security tests against third-party products
• Remains aware of technological trends and developments in the area of information security
• Solves difficult technical problems; solutions are testable, maintainable, and efficient
• Provides support in the event of escalated security issues for enterprise systems; helps diagnose, troubleshoot, and resolve issues
• Supports the implementation of hardware and software changes into environments to ensure security requirements are met
• Provides input into security breach response procedures; assists with security breach response activities
• Participates in break/fix activities
• Analyzes the output of industry standard cybersecurity tools and helps identify remediations to reduce risk and exposure of applications
• Completes basic custom enhancements of applications using secure coding techniques to reduce the threat of remote or local vulnerabilities
• Evaluates entire applications (Container, Infrastructure, host platform) to identify potential threats and vulnerabilities
Minimum Qualifications:
• Bachelor's Degree in Computer Science, CIS, Engineering, Cybersecurity, or related field (or equivalent work or military experience in a related field)
• 2 years of experience in technology system support, software development or a related field
• 1 year of experience with information security applications and systems
• 1 year of experience in database technologies
• 1 year of experience working on project(s) involving the implementation of solutions applying development life cycles (SDLC)
• 2 years of experience analyzing the output of industry standard cybersecurity tools and identifying remediations to reduce risk and exposure of applications
Preferred Qualifications:
• Master's Degree in Computer Science, CIS, or related field
• Relevant information security certifications (e.g., CISSP, CISM, CEH, PCI ISA, CRISC, CISA, OSCP, GPen)
• Advanced understanding of information security practices and policies
• 2 years of IT experience developing and implementing business systems within an organization
• 4 years of experience working with defect or incident tracking software
• 4 years of experience with technical documentation in a software development environment
• 2 years of experience working with an IT Infrastructure Library (ITIL) framework
• 2 years of experience leading teams, with or without direct reports
• Experience with Cloud technologies
Our Team
As Discovery Inc’s portfolio continues to grow – around the world and across platforms – the Global Technology & Operations team is building media technology and IT systems that meet the world class standard for which Discovery is known. GT&O builds, implements and maintains the business systems and technology that are critical for delivering Discovery’s products, while articulating the long-term technology strategy that will enable Discovery’s growing pay-tv, digital terrestrial, free-to-air and online services to reach more audiences on more platforms.
From Amsterdam to Singapore and from satellite and broadcast operations to SAP, we are driving Discovery forward on the leading edge of technology.
The Role
The Network Security Engineer will be responsible for working with the operations and engineering teams around the strategic, tactical, and improvement of the global network security platforms. The individual will be evaluating processes regularly to ensure expected outcomes are achieved in the most efficient way along with identifying service improvements and document those improvements. Help ensure standards and processes are followed.
* Bachelor’s degree in Computer Science, Information Technology, Information Systems or similar
* Minimum of 5 years of experience in system administration in an enterprise network security production environment
* Strong skills with network protocols, standards and policies
* Strong skills with Juniper, Cisco, and Palo Alto network security platforms
* Strong skills with network access control systems (AAA, NAC)
* Understanding of load balancing, remote access, DNS, DHCP and IPAM platforms
* Process oriented leader with strong execution and follow-through skills
* Able to perform multiple tasks simultaneously and prioritize self
* Strong and consistent customer service and communication skills
* Willingness to work a flexible schedule
* Strong team member with self-motivation and desires to improve the infrastructure
* Excellent troubleshooting, analytical and problem-solving skills
* Minimal travel anticipated for this position
* Must have the legal right to work in the United States
Preferred qualifications
* Media industry experience
Discovery Communications, Inc. is an equal opportunity employer. Discovery is committed to being an employer of choice, not just a good place to work, but a great and inclusive place to work. To that end, we strive to recruit and maintain a workforce that meaningfully represents the diverse and culturally rich communities that we serve. Qualified applicants will receive consideration for employment without regard to their race, color, religion, national origin, sex, sexual orientation, gender identity, protected veteran status or disabled status or, genetic information.
We will consider for employment all qualified applicants, including those with criminal histories, in a manner consistent with the requirements of applicable state and local laws, including but not limited to all local Fair Chance Ordinances.
Specific Responsibilities Include:
Basic Qualifications:
Eligibility Requirements: (Country Specific)
Desired Characteristics:
GE offers a great work environment, professional development, challenging careers, and competitive compensation. GE is an Equal Opportunity Employer. Employment decisions are made without regard to race, color, religion, national or ethnic origin, sex, sexual orientation, gender identity or expression, age, disability, protected veteran status or other characteristics protected by law.
GE will only employ those who are legally authorized to work in the United States for this opening. Any offer of employment is conditioned upon the successful completion of a drug screen (as applicable).
Relocation Assistance Provided: No
Job Description
As an AWS Cloud Architect, you will interface with key stakeholders and apply your technical proficiency across different stages of the Software Development Life Cycle including Requirements Elicitation, Application development, definition and Design. You will play an important role in creating the high-level design artifacts. You will also deliver high quality code deliverables for a module, lead validation for all types of testing and support activities related to implementation, transition and warranty. At Infosys, you may look forward to collaborating with some of the best talent in the industry to create innovative high quality and defect-free solutions to meet our clients’ business needs. We drive a learning culture, where teamwork and collaboration are encouraged, excellence is rewarded, and diversity is respected and valued.
Required AWS Cloud Architect Qualifications:
• Bachelor’s degree or foreign equivalent required from an accredited institution. Will also consider three years of progressive experience in the specialty in lieu of every year of education.
• 7+ years of experience with Information Technology
• U.S. citizens and those authorized to work in the U.S. are encouraged to apply. We are not able to sponsor at this time
• Candidate must be located within the commuting distance of Irving, TX or be willing to relocate to this location. This position may require travel in the US and Canada.
Preferred AWS Cloud Architect Qualifications:
• Hands on experience architecting in AWS and working with Big Data.
• Strong experience in Designing data pipelines and data solutions on-premise and on cloud, in AWS Big Data, Glue/EMR/S3/Redshift, Hadoop distributed frameworks, Apache Spark with Python, Java programming and Hadoop Ecosystems
• Good experience on Snowflake, End to End implementations on ETL and Bigdata Projects
• Good knowledge of Cloud Security implementation practices
• Expertise in scalability and high performance applications meeting various SLAs which are part of architecture and design
• Exposure on design and developing micro-services architecture, Diagnostic /Discovery/As Is Assessment, Solution
• Evaluation and Recommendation and CI / CD Good experience in Project life cycle activities on development and maintenance projects
• Experience in data migration, estimation, sizing of project
• Experience in working in Agile teams, and working independently with Business stakeholders providing solutions and regular updates
• Experience and desire to work in a Global delivery environment with strong written and oral communication skills and Analytical skills
The job entails sitting as well as working at a computer for extended periods of time. Should be able to communicate by telephone, email or face to face. Travel may be required as per the job requirements.
About Us
Infosys is a global leader in next-generation digital services and consulting. We enable clients in 46 countries to navigate their digital transformation.
With over three decades of experience in managing the systems and workings of global enterprises, we expertly steer our clients through their digital journey. We do it by enabling the enterprise with an AI-powered core that helps prioritize the execution of change. We also empower the business with agile digital at scale to deliver unprecedented levels of performance and customer delight. Our always-on learning agenda drives their continuous improvement through building and transferring digital skills, expertise, and ideas from our innovation ecosystem.
Considering COVID-19, we are still hiring but conducting virtual interviews to keep our candidates and employees safe. Many roles will be temporarily remote or work from home to comply with current safety regulations. These roles will be required to be in the office once it is safe or restrictions are lifted. Read more on our response here: Teradata Response to COVID-19
With all the investments made in analytics, it’s time to stop buying into partial solutions that overpromise and underdeliver. It’s time to invest in answers. Only Teradata leverages all of the data, all of the time, so that customers can analyze anything, deploy anywhere, and deliver analytics that matter most to them. And we do it at scale, on-premises, in the Cloud, or anywhere in between.
We call this Pervasive Data Intelligence. It’s the answer to the complexity, cost, and inadequacy of today’s analytics. And it's the way Teradata transforms how businesses work and people live through the power of data throughout the world. Join us and help create the era of Pervasive Data Intelligence.
The Information Security Analyst will be tasked not only with identifying and responding to potential threats, but also proactively hunting and eliminating them. The ideal candidate will have highly technical skills and should possess an understanding across a broad range of security technologies and will take a proactive approach to network intrusions. You should have several years of experience working within a SOC environment and should have hands-on experience in creating and executing cyber hunting missions. The candidate must be a world-class problem-solver with the ability to handle challenges under pressure. This is a global role with responsibility for Teradata security technologies for all business units.
The ideal candidate will have experience and a proven track record of finding and responding to threats found from various tools DLP, SIEM. Security Analytics, Behavior Analysis etc. As a key member of the security team, flexibility and a broad knowledge of security processes, along with strong communication and collaboration skills, will result in a successful candidate.
Key Areas of Responsibility
Direct hands-on expertise in the following areas of information security
Qualifications
Our Mission
At Palo Alto Networks® everything starts and ends with our mission:
Being the cybersecurity partner of choice, protecting our digital way of life.
We have the vision of a world where each day is safer and more secure than the one before. These aren’t easy goals to accomplish – but we’re not here for easy. We’re here for better. We are a company built on the foundation of challenging and disrupting the way things are done, and we’re looking for innovators who are as committed to shaping the future of cybersecurity as we are.
Your Career
You will join an Information Security (InfoSec) team that will give you the opportunity to make a global impact. One that protects our way of life in the digital age by preventing successful cyberattacks. A team looking for engineers who are passionate about technology, have an interest in cyber security, and also want to make a positive difference in the world that we live in. The projects our interns are assigned will give real hands-on experience working on securing Palo Alto Networks. The Information Security team’s mission is to protect the company's brand integrity, confidentiality, infrastructure, and assets from internal and external threats. They enable business outcomes everywhere while securing the user, product, infrastructure and data, built on a foundation of threat detection and response.
Our top Technical Internship roles we hire for are :
Security Architect
DevOps Engineer
Security Operations Center (SOC) Engineer
Red Team Engineer
Risk & Compliance Analyst
Vulnerability Engineer
Your Impact
Collaborate and execute alongside experienced engineers and security professionals.
Help us disrupt the cybersecurity industry using the latest and greatest technologies.
Write code that meaningfully improves our products and services
Learn about the cybersecurity industry from the world's leading security experts.
Your Experience
Completing a BS/MS/PhD degree in Computer Science, Computer Engineering or other related STEM field
Strong programming skills
An understanding of the fundamentals of Computer Science & Computer Security
Exemplify strong initiative and ability to work independently with limited direction
Ability to work cross functionally with other engineers, researchers and Product Managers
Excellent communications skills
The Team
Our Information Security team is at the core of our products and connected directly to the mission of preventing cyberattacks. We are constantly innovating — challenging the way we, and the industry, think about cybersecurity. Our engineers don’t shy away from building products to solve the problems no one has pursued before.
We define the industry instead of waiting for directions. We need individuals who feel comfortable in ambiguity, excited by the prospect of a challenge, and empowered by the unknown risks facing our everyday lives that are only enabled by a secure digital environment.
Intern Program
Our global internship program trains the next-generation of cybersecurity talent across a range of specializations, from threat intelligence to information security, engineering, sales, and marketing. The program also features a combination of challenging projects with tangible impact, engaging social events, and networking opportunities. Interns and recent graduates can learn about the network security industry from leading thinkers, grow their professional networks, and be part of a career-defining experience.
The summer internship program features a combination of challenging projects with real impact, engaging social events, and networking opportunities:
12-week program
Peers of elite students
One-on-one mentoring by industry leaders
Exposure to and support from Palo Alto Networks executives
Events that pique your intellectual curiosity and inspire new ideas
Opportunities to expand your knowledge and work in a fast-paced environment
Our Commitment
We’re trailblazers that dream big, take risks, and challenge cybersecurity’s status quo. It’s simple: we can’t accomplish our mission without diverse teams innovating, together.
We are committed to providing reasonable accommodations for all qualified individuals with a disability. If you require assistance or accommodation due to a disability or special need, please contact us at accommodations@paloaltonetworks.com.
Palo Alto Networks is an equal opportunity employer. We celebrate diversity in our workplace, and all qualified applicants will receive consideration for employment without regard to age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, or other legally protected characteristics.
St. Joseph’s Health is recognized for the expertise and compassion of its highly skilled and responsive staff. The combined efforts of the organization’s outstanding physicians, superb nurses, and dedicated clinical and professional staff have made us one of the most highly respected healthcare organizations in the state, the largest employer in Passaic County, and one of the nation’s “100 Best Places to Work in Health Care”.
Job Overview
Responsible for assessing security threats and risks involving the security and integrity of data within the St. Joseph Healthcare System. Responsible for the monitoring and analyzing of logs and alerts from a variety of technologies including networks, servers, workstations, firewalls, Intrusion detection and prevention systems (IDS/IPS) virtual private networks (VPNs), encryption, data loss prevention (DLP), and antivirus systems. Responsible for the creation of comprehensive security write-ups which articulate security issues, analysis and remediation techniques, troubleshooting and resolution of security issues.
Work requires the knowledge of theories, principles, and concepts acquired through completion of a Bachelor's degree in Computer Information Systems, Computer Science, MIS, Engineering or closely related field. A minimum of five years experience with desktop, server and/or network administration in a mixed computing environment required. Two years of direct information security experience preferred. CompTIA Network+ Certification, CompTIA Security+ Certification and Microsoft MCP Certification preferred. Understanding of Information Security concepts and business acumen. Strong working knowledge of Windows Server, Desktop, Active Directory and Exchange. Experience using security vulnerability assessment tools and techniques. Experience of using Malware Remediation Tools. Solid understanding of operating systems and platforms (Windows, iOS, Unix, Linux). Experience with Directory Services and LDAP. Knowledge of network infrastructures including firewalls, VPN's, Intrusion Detection Systems, vulnerability assessment strategies, web application and device security. Knowledge of the security requirements for HIPAA, HITECH, ISO 27001/27002 and SOX regulations. Requires analytical skills with the ability to exercise sound judgment, attention to detail and problem resolution. Must possess strong customer service, communication, organizational & interpersonal skills.
RiskIQ is the leader in attack surface management, providing the most comprehensive discovery, intelligence, and mitigation of threats associated with an organization’s digital presence. With more than 75 percent of attacks originating outside the firewall, RiskIQ allows enterprises to gain unified insight and control over web, social and mobile exposures. Trusted by thousands of security analysts, RiskIQ’s platform combines advanced internet data reconnaissance and analytics to expedite investigations, understand digital attack surfaces, assess risk and take action to protect the business, brand, and customers. Based in San Francisco, the company is backed by Summit Partners, Battery Ventures, Georgian Partners and MassMutual Ventures.
We are looking for a Senior Cyber Intelligence Analyst to join our i3 team. This position can be based at our office in Lenexa, KS or remotely.
The Role
The Incident Investigations and Intelligence (i3) Program within RiskIQ is built to oversee managed services of the External Threats Product workspaces for clients and the Executive Guardian product workspaces for clients. Executive Guardian is designed to protect C-Suite and high net worth individuals from physical threats, exposures of Personally Identifiable Information (PII), and instances of social media account impersonation thereby safeguarding the individual, their reputation, family, and by extension, the company. External Threats protects clients from phishing attacks, domain infringement, mobile app impersonation, social & brand impersonation, and data leakage. The i3 Cyber Intelligence Analyst (SCIA) The i3 Cyber Threat Intelligence Analyst is a mid-level analytic role that will capitalize on an existing technical skillset to build and maintain complex technical logic to identify online threats to customers, manage client threat events, and take the appropriate action to suppress harmful content on the internet in order to protect our customers, their people, and their assets. i3 Cyber Threat Intelligence Analysts will also perform threat attribution research for the purposes of providing customers with finished and actionable intelligence products relevant to the safety and security of their assets and operations. The i3 Cyber Threat Intelligence Analyst is technically proficient, proactive, and is business-minded using both available open source and proprietary data sets to confidently support attribution of virtual threat actors with their actions.
Responsibilities
Requirements
Why work at RiskIQ?
At Dominion Energy we love our jobs. That’s right. Love. Every day we go to work filled with passion to be excellent, to creatively problem solve and to innovate. These are exciting days for energy companies, and Dominion Energy aims to shape the future of energy in America. We are looking at all of our work with fresh eyes, retooling everything we do, in every part of the company, to operate more sustainably and to deliver energy more reliably than ever. We are looking for interesting, independent thinkers and doers who can help shape the culture of a forward-looking company that’s proud of its rich legacy. Are you a change agent? Do you think differently? Do you want to fall in love with your job? If you answered “yes,” then read on!
At this time, Dominion Energy cannot transfer nor sponsor a work visa for this position.
This position does not offer relocation assistance.
Do you have what it takes?
This is not your typical cyber role. A cyber war is underway in the world today, with hostile nations seeking to disrupt and destroy critical infrastructure in the United States, all day, and every day. If you want to be on the front lines up against the best cyber criminals and nation state attackers in the world and prove you are better, then this is the place to be.
For our employees, this is a mission, not a job. We educate the company about cyber threats. We establish the standards for cyber security. We perform assessments to ensure proper protections are in place. We manage vulnerabilities and guide the development of defenses. It takes a high degree of skill and a commitment to that mission to be successful. Do you have what it takes?
If this description sounds like you, let’s talk!
This posting is for two positions that will be filled at the level commensurate with the successful candidates’ education, experience, knowledge, skills and abilities.
Associate Cyber Security Analyst
This entry level cyber security position, under close supervision, performs cyber security and cyber risk work, working closely with the Cyber Security Operations Center (CSOC) and other groups focused on the monitoring, analysis, and investigation of cyber security threats and events, both internal and external, that could potentially impact the security posture of the organization. Facilitates client requests to ensure critical business tasks continue uninterrupted. Performs assessments of cyber security risk and vulnerabilities, maintains security policies, and helps facilitate cyber security awareness throughout the organization. Provides updates and detailed information to management regarding the negative impact on the business caused by theft, destruction, alteration or denial of access to information and systems. May work with other staff to assess the cyber security risk on the organization's network systems, applications, and solutions based upon user requests and business needs. Applies a basic understanding of IT technologies and develops an evolving knowledge of mitigation options and risk frameworks to assess the current threat landscape and improve security.
Cyber Security Analyst
Under broad supervision, this intermediate role performs cyber security and cyber risk work, working closely with the Cyber Security Operations Center (CSOC) and other groups focused on the monitoring, analysis, and investigation of cyber security threats and events, both internal and external, that could potentially impact the security posture of the organization. Coordinates organization cyber security response activities, and maintains situational awareness of the security posture of the enterprise. Performs assessment of cyber security risk and vulnerability analysis, creates and maintains security policies, and facilitates cyber security awareness throughout the organization. Provides updates and detailed information to management regarding the negative impact on the business caused by theft, destruction, alteration or denial of access to information and systems. Evaluates the cyber security risk on the organization's network systems, applications, and solutions based upon user requests and business needs. Applies considerable understanding of IT technologies, evaluation of cyber security risks and attack vectors, and develops an evolving knowledge of mitigation options and risk frameworks to assess the current threat landscape and improve security. Consults with subject matter experts and business representatives, as needed, to provide input on cyber security decisions, the establishment of cyber security policies, and to foster security awareness.
Associate Cyber Security Analyst
Must possess 0-2 years of work experience in cyber security, or a cyber risk related role demonstrating a basic understanding regarding the identification, gathering and analysis of information, threats, etc. to investigate and mitigate security risks.
Demonstrates a general understanding of cyber security and or data system protection principles and practices. A basic understand of industrial cyber security standards and risk are desired. Demonstrated good organization and planning skills. Demonstrates a questioning attitude, with basic analytical and investigative skills. Demonstrates verbal and written communication skills, with the ability to interact effectively with others. A willingness to learn new skills and methodologies, conduct research, and learn to maintain hardware, software and network firewalls and encryption. Ability to work cooperatively in a teamed environment. Highly motivated, with the ability to work effectively under basic supervision in a fast-paced environment. Previous work experience or exposure to the security aspects governing software, communications, and network protocols is a plus.
Cyber Security Analyst
Three to five years of work experience in cyber security, or a cyber risk related role demonstrating a general knowledge in the identification, gathering and analysis of information, threats, etc. to investigate and mitigate security risks. (Note: A Master's degree will count as one year of experience. A partial year of six months or more will be rounded up to one year)
Demonstrates a working knowledge of cyber security best practices and frameworks. Possesses a solid understanding of industrial cyber security standards, frameworks and risk assess modeling. Demonstrated good organization and planning skills, to include time and project management skills. Demonstrates good analytical, troubleshooting, and problem solving skills, and has a questioning attitude. Demonstrates verbal and written communication skills, with the proven ability to present information to others. Ability to conduct research and apply, and under broad supervision, maintain hardware, software and network firewalls and encryption. Ability to work cooperatively in a teamed environment. Highly motivated, with the ability to work effectively under minimal supervision in a fastpaced environment. Previous work experience in security aspects of multiple platforms, operating systems, software, communications, and network protocols is desired.
Note: This position requires in office work. You must be willing to report to Dominion Energy's corporate headquarters in Richmond, Virginia.
The company is actively seeking United States military veterans and service members who meet the qualifications outlined below.
Bachelor Degree or will obtain a Bachelor's degree by December 2020. Equivalent combination of education and demonstrated related experience may be accepted in lieu of preferred level of education
Preferred Disciplines: IT Cyber Security or related specialization/track highly desirable
Other Preferred Disciplines: Information Systems, Computer Science, Computer Engineering
Other disciplines may be substituted for the preferred discipline(s) listed above.
No Testing Required
Export Control
Certain positions at Dominion Energy may involve access to information and technology subject to export controls under U.S. law. Compliance with these export controls may result in Dominion Energy limiting its consideration of certain applicants.
Other Information
We offer excellent plans and programs for employees. Employees are rewarded with a competitive salary and comprehensive benefits package which may include: health benefits with coverage for families and domestic partners, vacation, retirement plans, paid holidays, tuition reimbursement, and much more. To learn more about our benefits, click here dombenefits.com.
Dominion Energy is an equal opportunity employer and is committed to a diverse workforce. Qualified applicants will receive consideration for employment without regard to their protected veteran or disabled status.
You can experience the excitement of our company – it's the difference between taking a job and starting a career.
Associate Security Consultant - Entry Level 2021
FireEye is the intelligence-led security company. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant® consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber attacks. FireEye has over 9,000 customers across 103 countries, including more than 50 percent of the Forbes Global 2000.
Do you love the challenge of figuring out solutions to intricate technology puzzles?
Do you like to help others solve their network and information security issues?
If you answered YES, then consider a career at Mandiant as an Associate Consultant!
We have the expertise and experience in information security. This is our focus.
You’re not just a number and you won’t get lost in the shuffle.
You will be working on challenging technical projects that make an impact. You’ll be visible.
You’ll be exposed to many different environments and technologies.
You’ll learn from our best incident responders and red teamers.
We investigate breaches that make headlines (and many more that don’t), as well as break into applications and systems to identify security gaps for our clients. We find evil and solve crime, and are seeking candidates who possess the ability to think like an attacker and stay one step ahead of the game.
Find your niche among the cool projects you'll be involved with, such as:
Responsibilities:
Requirements:
Additional Qualifications:
The NYC Red Team Security Engineer reports to the Senior Manager of Information Security and is responsible for testing and validating all facets of information security controls including networks, servers and web applications. The Red Team Security Engineer carries out attacks and perform security assessments to uncover vulnerable areas of systems and applications and to test defensive security measures using common as well as unique methods and practices.
What You’ll Do
What We’ll Want You To Have
Your Career
As a Systems Engineer Intern, you will quickly ramp on Palo Alto Networks technology and will be assigned to multiple SEs. You will work together to complete critical work that supports customers in the pre-sales process. In this role, you will also work with sales on customer engagements and establish relationships with customers with the goal of helping them detect and prevent advanced cyberattacks and breaches.
Upon completion of your summer internship, you will be required to do a final presentation on your contribution to getting a successful technical sell (i.e. collect customer environment information, heat map, POC deployment, success criteria definition, recommended architecture/solution, and much more).
Our global internship program trains the next generation of cybersecurity talent across a range of specializations, from threat intelligence to information security, engineering, and marketing. Interns and recent graduates can learn about the network security industry from leading thinkers, grow their professional networks, and be part of a career-defining experience.
Our Summer Internship Program from May-August or June-September provides you:
1:1 mentorship
Fun and engaging events that inspire your intellectual curiosity
The opportunity to expand your knowledge and work on challenging projects
Connections to other recent grads, and employees across the company as well as our leaders
Your Impact
Establish yourself as a trusted team member to SE leadership and colleagues and contribute to sales wins throughout the program
Architect and propose solutions which address the identified cybersecurity problems in each customer’s unique environment
Ensure ongoing customer happiness, support, and adoption of cybersecurity solutions
Act as the customer advocate for any issues that require technical assistance and follow up with the customer until the issue is resolved
Continuous self-improvement and learning to maintain technical leadership of applicable technologies (data center, SDN, public cloud, security, networking, etc.)
Your Experience
BS in Computer Science, technical cybersecurity or networking program
Experience with systems installation, UNIX/Linux, and Windows-based systems
Experience with cloud networking services such as AWS, Azure, GCP is a plus – not required.
Understand and effectively present complex technical concepts to technical and non-technical audiences
Strong analytical skills to evaluate complex problems and a systematic approach to create solutions
Mature and effective time-management skills
Knowledge and desire to learn of modern network threats and malware, network forensics, automation tools and technologies, and endpoint security technologies
Requirements – To apply, you must be pursuing a 4-year Undergraduate Degree with a GPA of 3.0 or above, a 2-year Master’s Degree or a Doctorate degree and returning to school in the fall. You must have the authorization to work within the United States.
Our Commitment
We’re trailblazers that dream big, take risks, and challenge cybersecurity’s status quo. It’s simple: we can’t accomplish our mission without diverse teams innovating, together.
We are committed to providing reasonable accommodations for all qualified individuals with a disability. If you require assistance or accommodation due to a disability or special need, please contact us at accommodations@paloaltonetworks.com.
At Optiv, we’re on a mission to help our clients make their businesses more secure. We’re one of the fastest growing companies in a truly essential industry.
In your role at Optiv, you’ll be inspired by a team of the brightest business and technical minds in cyber security. We are passionate champions for our clients, and know from experience that the best solutions for our clients’ needs come from working hard together. As part of our team, your voice matters, and you will do important work that has impact, on people, businesses and nations. Our industry and our company move fast, and you can be sure that you will always have room to learn and grow. We’re proud of our team and the important work we do to build confidence for a more connected world.
Optiv is the leading security solutions integrator creating confidence for a more connected world. Optiv’s corporate security team is tasked with protecting company resources and client data in a dynamic industry with expanding threats. To meet the challenging needs of Optiv’s growing business, the corporate security team is expanding their information security governance and compliance program. The security compliance analyst will report directly to the Director of Governance and Compliance. This position is responsible for assisting with the collection and analysis of key performance metrics, conducting internal audits and assessments, assisting with third-party assessments and internal risk management reviews to help ensure the confidentiality, integrity, and availability of Optiv data and systems. The security compliance analyst must possess strong analytical skills, research capabilities, and an attention to detail to ensure Optiv can efficiently and effectively handle its compliance requirements. This position is highly business-facing, with frequent collaboration and interaction with all Optiv business units.
PRIMARY DUTIES AND RESPONSIBILITIES
SUPERVISORY RESPONSIBILITIES
Will not have direct reports
Education and Experience
Desired Qualifications:
#LI-CP1
Why you'll love it here:
If you are seeking a culture that supports growth, fosters success and moves the industry forward, find your place at Optiv! As a market-leading provider of cyber security solutions, Optiv has the most comprehensive ecosystem of security products and partners to deliver unparalleled services. Our rich and successful history with our clients is based on trust, serving more than 12,000 clients of varying sizes and industries, including commercial, government and education. We have the proven expertise to plan, build, and run successful security programs across Risk Management, Cyber Digital Transformation, Threat Management, Security Operations ? Managed Services and Identity and Data Management. Optiv remains committed to championing Diversity, Equality and Inclusion within our organization and throughout the industry.
With Optiv you can expect:
• Work/life balance. We offer "Recharge", a flexible, time-off program that encourages eligible employees to take the time they need to recharge
• Professional training resources, including tuition reimbursement
• Creative problem-solving and the ability to tackle unique, complex projects
• Volunteer Opportunities. "Optiv Chips In" encourages employees to volunteer and engage with their teams and communities.
• The ability and technology necessary to productively work remote/from home (where applicable).
Technology & Cybersecurity Operational Risk Management – Cybersecurity Engineer - Associate
The Cybersecurity Engineer within Operational Risk Management is responsible for the identification, monitoring, testing, and governance of cybersecurity processes and controls risks inherent in JPMorgan Chase technology environment. This position will be highly engaged with the firm-wide Cybersecurity team who provides high quality security solutions to detect and monitor for threats and vulnerabilities and manage security incidents to keep ahead of threats.
We are looking for a multi-disciplined forward-looking technologist with diverse backgrounds and experiences including in areas such as cybersecurity, big data, compliance and oversight, cloud security, cryptography, rights management, networking technologies (e.g Cisco, Bluecoat, Juniper), and data security architectures. Knowledge of emerging technical trends and cyber threats will be required.
The successful candidate will use experience and leadership skills to give guidance and best practice advice across the Cybersecurity discipline. He/she will lead significant event reviews, risk assessments, and perform monitoring of cybersecurity controls. Written and verbal communication of results of risk assessments will be provided by the Cybersecurity Engineer to management, executive directors, managing directors and stakeholders. The role requires a strong self-starter who can understand program objectives, understand mitigating cybersecurity controls using a logical to independently assess the control environment.
· Perform deep inspection of specific technologies in targeted processes or firm-wide evaluation.
· Keep abreast of current cyber trends, vulnerabilities, and emerging technologies.
· Engage with cyber teams to gain full understanding of cybersecurity and control environment.
· Perform significant event reviews.
· Independently assess technology risk management and controls across the bank
· Understand third party risks as related to specific technology area of expertise.
· Risk assessment of the impact of threats and vulnerabilities on JPMC technology portfolio.
· Coordination and key participation in the development of the evolving risk position of new technology. For each of the technology areas in focus, this person will be charged with escalating and tracking the individual risk items.
· Work with appropriate technology areas to identify potentially elevated risk concentrations globally and perform assessments of the corresponding inherent risks and mitigating controls. Recommend any adjustments required to meet JPMC policy, regulatory requirements, and industry best practices.
· Develop and perform ongoing analysis of Operational Risk loss, near miss and external events to inform RCSA results, technology assessments and scenario analysis. Investigate Operational Risk events meeting selection criteria; assist LOB OROs in determining the appropriate consideration of technology risk management and risk events.
· Participate in key portfolio governance forums.
· Provide feedback and coordination with the application risk assessment process.
· Identify risk measures and thresholds for monitoring key risk cybersecurity controls.
· BS/BA degree in computer science or equivalent experience.
· 2+ years or more proven experience in technology development, engineering or technical architecture with financial services experience
· Working knowledge and interest of current and emerging technologies
· Knowledge of Cybersecurity organization practices, operations, risk management processes, principles, architectural requirements, engineering and threats and vulnerabilities, including incident response methodologies
· Ability to collaborate with high-performing teams and individuals throughout the firm to accomplish common goals
· Demonstrated verbal and written communication skills and excellent analytical skills
· Ability to understand complex technical systems and the business processes they support and synthesize the corresponding risks and controls and recommend adjustments if required.
· Track record of collaboration and relationship building
· Proven ability to anticipate and identify risks and effective mitigants
· Excellent analytical and problem-solving skills, inquisitive nature and comfort challenging current practices
· Proven track record of taking ideas forward without supervision and challenging others, where appropriate
· Adept at developing relationships with senior business executives with a reputation for partnering across organization lines to mitigate risks
· Highly disciplined, able to work with limited supervision and make independent decisions
· Strong organizational, project management, and multi-tasking skills with demonstrated ability to manage expectations and deliver results
· High level of professionalism, self-motivation, and sense of urgencyFireEye is the leader in intelligence-led security-as-a-service. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant® consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber attacks. FireEye has over 7,500 customers across 67 countries, including more than 50 percent of the Forbes Global 2000.
Compliance Analyst Intern - Summer 2021
The Governance and Compliance team is a critical part of the larger FireEye Security team. The team is responsible for performance of internal audits and assessments, external audit coordination, policy management, business continuity management and third-party management.
As a Compliance Analyst on the Governance and Compliance team, you will use your acumen, customer service skills, and cybersecurity knowledge to assess the internal control environments within FireEye and participate in vendor management due diligence activities. You will work with a great team of professionals who will provide you the guidance and support you will need to be successful in our shared goal of supporting our internal and external customers to meet today’s complex regulatory and security requirements.
What You Will Do:
· Interact with our internal customers, internal and external auditors to identify, scope, and evaluate the effectiveness of internal controls
· Conduct vendor risk assessments
· Assist with business continuity and disaster recovery documentation and associated testing exercises
· Be responsible for documenting and tracking your work within internal web-based tools
· Develop a deep understanding of FireEye products and services
· Exemplify industry-leading customer support skills and deliver positive customer experience
Requirements:
· Bachelor’s degree in a technical field or working toward such degree, with at least 3 years of completed post-secondary education
· Experience with cyber security tools, technology and best practices
· Experience working in customer facing environment
· Experience fielding questions and requests from customers, and providing timely and comprehensive responses
Additional Qualifications:
· Demonstrated aptitude and desire to learn new technologies and services
· Ability to ramp up quickly in learning the portfolio of FireEye services and products
· Problem solver with keen attention to detail
· Excellent written and verbal communication skills
At FireEye we are committed to our #OneTeam approach combining diversity, collaboration, and excellence. All qualified applicants will receive consideration for employment without regard to race, sex, color, religion, sexual orientation, gender identity, national origin, protected veteran status, or on the basis of disability. Requests for accommodation due to disability can be sent directly to HR-Accommodations@FireEye.com.
Job Description
At Boeing, we innovate and collaborate to make the world a better place. From the seabed to outer space, you can contribute to work that matters with a company where diversity, equity and inclusion are shared values. We’re committed to fostering an environment for every teammate that’s welcoming, respectful and inclusive, with great opportunity for professional growth. Find your future with us.
Boeing Security is seeking a detail-oriented and self-motivated Mid-Level Cyber Security Specialist to support Department of Defense (DoD) and Special Access Program (SAP) activities. This position will be located in El Segundo, CA, Seal Beach, CA, or Huntington Beach, CA.
Position Responsibilities
Additional Responsibilities
This position requires an active Secret U.S. Security Clearance. (A U.S. Security Clearance that has been active in the past 24 months is considered active.)
Basic Qualifications (Required Skills/Experience):
Preferred Qualifications (Desired Skills/Experience):
Typical Education & Experience:
Education/experience typically acquired through advanced technical education (e.g. Bachelor) and typically 5 or more years' related work experience or an equivalent combination of technical education and experience (e.g. Masters with 3 years' related work experience, PhD with 1+ years' related work experience, etc.).
Relocation:
This position does not offer relocation. Candidates must live in the immediate area or relocate at their own expense.
Employee Referral:
Referral to this job is eligible for bonus.
Drug Free Workplace:
Boeing is a Drug Free Workplace where post offer applicants and employees are subject to testing for marijuana, cocaine, opioids, amphetamines, PCP, and alcohol when criteria is met as outlined in our policies.
Experience Level
Individual Contributor
Contingent Upon Program Award
No, this position is not contingent upon program award
Get our newest Cyber and IT Security jobs straight to your inbox
Get our newest Cyber and IT Security jobs straight to your inbox