2,422 Cyber Security jobs in the United States

Cyber Security

48083 Troy, Michigan Diverse Lynx

Posted 13 days ago

Job Viewed

Tap Again To Close

Job Description

Cybersecurity technical lead with hands on experience in OT security/ICS is must . Must be having deep understanding of Purdue model (levels 0-5). Proficiency in industrial protocols (e.g., Modbus, OPC, PROFINET) and ICS technologies (SCADA, PLC, DCS). Strong knowledge of cybersecurity frameworks and tools (e.g., SIEM, IDS/IPS, firewalls). Relevant certifications preferred: GICSP, CISSP, ISA/IEC 62443, CCNP Security

View Now

Cyber Security

60008 Rolling Meadows, Illinois Diverse Lynx

Posted 22 days ago

Job Viewed

Tap Again To Close

Job Description

Diverse Lynx LLC is an Equal Employment Opportunity employer. All qualified applicants will receive due consideration for employment without any discrimination. All applicants will be evaluated solely on the basis of their ability, competence and their proven capability to perform the functions outlined in the corresponding role. We promote and support a diverse workforce across all levels in the company.

View Now

Cyber Security

94537 Fremont, California Info Way Solutions

Posted 22 days ago

Job Viewed

Tap Again To Close

Job Description

As a Senior Cybersecurity Engineer at Peloton, you will be responsible for supporting the
ongoing security operations and overall security strategy at Peloton. The ideal candidate must
demonstrate in-depth knowledge of and experience in vulnerability and patch management,
networking, cloud technology, incident response and automation. This person will develop,
optimize, and operate the security tools used throughout Peloton's infrastructure and contribute
to the overall security strategy across the entire organization.
Responsibilities:
Architect, deploy, and maintain Peloton's security infrastructure
Evangelize security throughout Peloton and empower end users to do their jobs
securely without creating additional friction
Research and analyze potential new threats, attack vectors and risks and identify
mitigation efforts
Examine output from security tools and software and report on findings
Collaborate with Peloton engineering teams to define and implement remediating
controls to improve security.
Work with cyber analysts and security engineers to develop threat models,
detections, incident response playbooks, and maintain tooling to enrich security
intelligence.
Manage EDR, DNS security and vulnerability management tools.
Requirements:
5+ years experience working in a security role
You know how to identify security gaps / areas of risk and are able to effectively put
together a plan for remediation
Ability to work cross functionally between technical and business teams,
evangelizing security best practices, policies, and procedures
Effective communication skills
Demonstrated knowledge of enterprise-scale security technologies which may
include EDR, SIEM, vulnerability management, incident response, PKI, user
behavior analytics, SSO, IAM, Privileged Access Management.
Experience building reports and dashboards and obtaining data with standard SQL.
Demonstrated proficiency with scripting (Bash, Python, etc)
Experience with developing infrastructure as code (Terraform, Cloudformation)
Deep hands on security experience with cloud providers such as AWS, GCP
Experience with Google Workspaces and Amazon Workspaces
Familiarity with development processes and environment tools such as Git and Jira
Flexibility to cover US EST working hours.
Great to Have:
Cybersecurity Certifications (CISSP, CEH, Security+, etc.)
Experience with Nucleus, Splunk, Snowflake, Crowdstrike, Umbrella, Rapid 7 and
Cisco Attack Surface Management.

View Now

Cyber Security

01581 Westborough, Massachusetts Diverse Lynx

Posted 22 days ago

Job Viewed

Tap Again To Close

Job Description

Role- Cyber Security
Location- Westborough, MA
Job Type- Contract

Participate in review of legacy vulnerabilities and provide input as to priority.• Understand existing security posture and challenges that we currently face (ATO/Stolen rewards)• Evaluate current controls (WAF, Ping Identity, Riskified) and recommend improvements.• Evaluate existing vulnerability scanning tools (Whitehat and Sonatype) against other tools being used in the industry. Recommend a first in class tool that can be used as single source of truth. • Evaluate existing penetration testing (requires working with IT Sec team) recommend testing that could augment or replace existing testing.• Stay abreast of latest 0 day or emerging threats propose mitigations.• Participate in architectural and design reviews, ensuring that security is built into the processes from the start. • Evaluate new projects and provide feedback as to the security of the new features. Meet with IT Security and compliance teams and help answer questions or concerns that they have about the new projects.

Diverse Lynx LLC is an Equal Employment Opportunity employer. All qualified applicants will receive due consideration for employment without any discrimination. All applicants will be evaluated solely on the basis of their ability, competence and their proven capability to perform the functions outlined in the corresponding role. We promote and support a diverse workforce across all levels in the company.

View Now

Cyber Security

33646 Tampa, Florida Diverse Lynx

Posted 22 days ago

Job Viewed

Tap Again To Close

Job Description

Monitor, triage, and escalate security alerts? Execute playbooks and document incidents? Collaborate with global GSOC teams and follow the MUFG GSOC operating model? Experience in financial services or regulated environments preferred? Familiarity with NIST, MITRE Telecommunication&CK, and GSOC workflows? Ability to work hybrid in USA (Tempe, or Tampa) offices preferred but willing to discuss other options (including but not limited to Tokyo)? Business Operations Transfer (BOT) models preferred? Both English and Japanese language skills as well as cultural fluency are strongly required.

View Now

Cyber Security

10261 New York, New York Syntricate Technologies

Posted 22 days ago

Job Viewed

Tap Again To Close

Job Description

Position-Cyber Security
Duration-Contract
Location- New York, NY
9-10 Years

JD
  • Risk management, Access control, Cryptography, Security architecture and design, Application and Database Security, and Key Management/Tokenization Security architecture.
  • Cyber Security - GRC - Vendor Risk Assessment
  • Vendor Security Assessor is responsible for ensuring Vendor security architecture and design meets firms policies, external guidelines, regulatory expectations and security controls Review the controls related to Application (SaaS), Mobile Security, API controls and Cloud Security Coordinate with internal and external stake holders to initiate, scope, plan controls assessments of new and existing vendor engagements Assess completed questionnaire and supporting documentation to validate vendor implementation of information security controls Produce detailed documentation of assessments Communicate vendor information security issues to the stakeholders, ensuring their understanding of associated risks and actions needed to remediate those risks Validate evidence before remediation plans are closed


Regards,
Pallavi Verma
Sr. Technical Recruiter | Syntricate Technologies Inc.
Direct : |
Email : | Web:

We're hiring! connect with us on LinkedIn nd visit our Jobs Portal

Minority Business Enterprise (MBE) Certified | E-Verified Corporation | Equal Employment Opportunity (EEO) Employer

This e-mail message may contain confidential or legally privileged information and is intended only for the use of the intended recipient(s). Any unauthorized disclosure, dissemination, distribution, copying or the taking of any action in reliance on the information herein is prohibited. Please notify the sender immediately by email if you have received this email by mistake and delete this e-mail from your system. You have received this email as we have your email address shared by you or from one of our data sources or from our member(s) or subscriber(s) list. If you do not want to receive any further emails or updates, please reply and request to unsubscribe .
View Now

Cyber Security

39574 Saucier, Mississippi Diverse Lynx

Posted 22 days ago

Job Viewed

Tap Again To Close

Job Description

  • Develop, execute and track the performance of security measures to protect information and network infrastructure and computer systems.
  • Design computer security strategy and engineer comprehensive cybersecurity architecture.
  • Identify, define and document system security requirements and recommend solutions to management.
  • Configure, troubleshoot and maintain security infrastructure software and hardware.
  • Install software that monitors systems and networks for security breaches and intrusions.
  • Monitor systems for irregular behavior and set up preventive measures.
  • Plan, develop, implement and update company's information security strategy.
  • Educate and train staff on information system security best practices.
View Now
Be The First To Know

About the latest Cyber security Jobs in United States !

Cyber Security

Los Angeles, California Forhyre

Posted today

Job Viewed

Tap Again To Close

Job Description

Job Description

Job Description

Forhyre is seeking a talented individual that will be able to provide security architecture support and interface across the program as needed. This support includes, but is not limited to, cybersecurity solutions, providing technical strategy for solutions, guidance, policy, and implementations. The successful candidate for this position is a highly motivated individual, with a strong IT security background who excels integrating, operating, and deploying security technology and solutions and interacts well with both internal teams and clients.

Note: U.S. citizens and those authorized to work in the U.S. are encouraged to apply. We are unable to sponsor at this time.


Responsibilities:

  • Engineer, implement and monitor security measures for the protection of computer systems, networks and information
  • Develop and implement security policies and controls to support the Cyber Security framework
  • Manage the existing cyber security training program across global, multilingual business
  • Assists in ensuring global Information security program meets all industry regulations, standards, and compliance requirements
  • Drive adoption of infrastructure security best practices and work with Information Technology teams to ensure security standards are maintained
  • Implement technology to proactively scan Information Technology environment for security breaches and suspicious activity
  • Continuous improvement in the areas of Information Security technologies, techniques and processes
  • Develops and maintains an effective system for the distribution of regular key performance indicator reports and dashboard
  • Ability to interpret penetration test results and describe issues and fixes to non-security expert
  • Responsible for leading an accurate & comprehensive status reporting to the executive steering committee
  • Create and implement SOP/ process improvement initiatives to achieve outcomes that align or exceed the expectations of strategic roadmap

Skills & Experience

  • Bachelor’s degree and 12+ years of experience; additional years of directly applicable experience may be accepted in lieu of a degree.
    Certified Information Systems Security Professional (CISSP)
  • 8+ years hands-on experience designing or implementing security solutions, including all related documentation and artifacts
  • Analytical ability, problem-solving skills, and ability to break down complex problems into actionable steps
  • Extensive experience in design and development of enterprise security architectures. Experience must include a wide range of work in creating diagrams and documentation with all components that comprise IT systems including network topology.
  • Strong knowledge and experience in secure enterprise architecture design, especially with regard to IAM, NDR, EDR, SIEM, AI/ML, and other cybersecurity tools and resultant applications
  • Experience selecting effective methods, techniques, and evaluation criteria to achieve desired outcomes
  • Previous experience developing architectures, strategies, strategic plans, roadmaps, and technical standards for the federal IT enterprise environment.
  • Vulnerability Assessment testing and/or Penetration Testing (preferred)
  • Robotic Process Automation/Intelligent Automation (preferred)
  • Business case development supporting security technology solutions (preferred)
  • Additional certifications demonstrating cybersecurity/technical mastery (preferred)

View Now

Cyber Security

Forhyre

Posted today

Job Viewed

Tap Again To Close

Job Description

Job Description

Job Description

Forhyre is seeking a talented individual that will be able to provide security architecture support and interface across the program as needed. This support includes, but is not limited to, cybersecurity solutions, providing technical strategy for solutions, guidance, policy, and implementations. The successful candidate for this position is a highly motivated individual, with a strong IT security background who excels integrating, operating, and deploying security technology and solutions and interacts well with both internal teams and clients.

Note: U.S. citizens and those authorized to work in the U.S. are encouraged to apply. We are unable to sponsor at this time.


Responsibilities:

  • Engineer, implement and monitor security measures for the protection of computer systems, networks and information
  • Develop and implement security policies and controls to support the Cyber Security framework
  • Manage the existing cyber security training program across global, multilingual business
  • Assists in ensuring global Information security program meets all industry regulations, standards, and compliance requirements
  • Drive adoption of infrastructure security best practices and work with Information Technology teams to ensure security standards are maintained
  • Implement technology to proactively scan Information Technology environment for security breaches and suspicious activity
  • Continuous improvement in the areas of Information Security technologies, techniques and processes
  • Develops and maintains an effective system for the distribution of regular key performance indicator reports and dashboard
  • Ability to interpret penetration test results and describe issues and fixes to non-security expert
  • Responsible for leading an accurate & comprehensive status reporting to the executive steering committee
  • Create and implement SOP/ process improvement initiatives to achieve outcomes that align or exceed the expectations of strategic roadmap

Skills & Experience

  • Bachelor’s degree and 12+ years of experience; additional years of directly applicable experience may be accepted in lieu of a degree.
    Certified Information Systems Security Professional (CISSP)
  • 8+ years hands-on experience designing or implementing security solutions, including all related documentation and artifacts
  • Analytical ability, problem-solving skills, and ability to break down complex problems into actionable steps
  • Extensive experience in design and development of enterprise security architectures. Experience must include a wide range of work in creating diagrams and documentation with all components that comprise IT systems including network topology.
  • Strong knowledge and experience in secure enterprise architecture design, especially with regard to IAM, NDR, EDR, SIEM, AI/ML, and other cybersecurity tools and resultant applications
  • Experience selecting effective methods, techniques, and evaluation criteria to achieve desired outcomes
  • Previous experience developing architectures, strategies, strategic plans, roadmaps, and technical standards for the federal IT enterprise environment.
  • Vulnerability Assessment testing and/or Penetration Testing (preferred)
  • Robotic Process Automation/Intelligent Automation (preferred)
  • Business case development supporting security technology solutions (preferred)
  • Additional certifications demonstrating cybersecurity/technical mastery (preferred)

View Now

Cyber Security Architect

22032 Fairfax, Virginia General Dynamics Information Technology

Posted today

Job Viewed

Tap Again To Close

Job Description

Req ID: RQ204666

Type of Requisition: Regular

Clearance Level Must Be Able to Obtain: Secret

Public Trust/Other Required: None

Job Family: Cyber and IT Risk Management

Skills:

Cybersecurity,Information Security,Information Technology Security

Experience:

8 + years of related experience

US Citizenship Required:

Yes

Job Description:

GDIT is the leading systems integrator in the Zero Trust Defense sector market-developing and delivering innovative solutions to government customers. Our Zero Trust business continues experiencing rapid growth, and this is an opportunity to join our team and be a part of creating Cybersecurity solutions that make a real impact.

As a Cyber Security Architect on an Enterprise Zero Trust Program for a DoD client, your responsibilities will include:

  • Develop and implement long-term cybersecurity strategies and plans, ensuring alignment with business goals and regulatory requirements.

  • Leading RMF efforts for a large distributed system in order to obtain an ATO

  • Identify, analyze, and assess security risks, developing and implementing mitigation strategies.

  • Create and enforce security policies, procedures, and guidelines to ensure compliance and maintain a secure environment.

  • Support incident response efforts, including detection, containment, eradication, and recovery, in the event of security breaches or incidents.

  • Support vulnerability assessments, penetration testing, and other security tests to identify weaknesses and vulnerabilities in systems and networks.

  • Collaborate with other IT professionals, business stakeholders, and external vendors to ensure security requirements are met.

  • Remain up to date on the latest cybersecurity threats, technologies, and best practices.

  • Provide guidance and mentoring to junior security professionals and trains employees on security best practices.

Basic Qualifications:

  • Understanding of security principles involved in Zero Trust Network Architecture and tools required to implement it

  • Understanding of how networks function, including protocols, devices, and security measures like firewalls and VLANs.

  • Knowledge of data protection methods, including encryption, pseudonymization, and data masking.

  • Understanding of risk assessment, analysis, and mitigation techniques.

  • Skills in identifying, analyzing, and responding to security incidents.

  • Ability to analyze problems, troubleshoot security issues, and develop effective solutions.

  • Capacity to learn and adapt to new technologies and evolving threats.

  • Ability to clearly explain complex technical concepts to both technical and non-technical audiences.

  • Ability to work effectively with other teams and stakeholders.

  • Detail oriented.

Required Skills/Knowledge:

  • 5-10 years of experience in IT security and IT risk management is recommended.

  • Current Secret clearance.

  • DoD 8570 IAT Level III certification.

  • Advanced IT security certifications (like CISSP, CEH, GIAC).

  • Bachelor's degree in field like Computer Science, Information Technology, or a related field.

  • Strong foundation in information security frameworks and IT risk management practices.

  • Expertise in DoD RMF Controls and how to correlate the various aspects of the systems, networks, and applications to ensure controls are closed and/or mitigated, and documented in furtherance of obtaining ATO

  • Expertise in security audits, compliance requirements, and regulatory standards.

  • Deep understanding of enterprise architecture principles and how to integrate security into the overall IT landscape.

  • Knowledge of secure coding practices, vulnerability assessment, and penetration testing.

  • Knowledge of common operating systems (Windows, Linux, Unix) and their security configurations.

  • Proficiency in various zero trust security tools and technologies, such as intrusion detection systems, data loss prevention (DLP) solutions, identity and access management (IAM) systems, firewalls, and ZTNA.

GDIT IS YOUR PLACE:

  • Full-flex work week to own your priorities at work and at home

  • 401K with company match

  • Comprehensive health and wellness packages

  • Internal mobility team dedicated to helping you own your career

  • Professional growth opportunities including paid education and certifications

  • Cutting-edge technology you can learn from

  • Rest and recharge with paid vacation and holidays

The likely salary range for this position is $119,000 - $161,000. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range.

Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. GDIT typically provides new employees with 15 days of paid leave per calendar year to be used for vacations, personal business, and illness and an additional 10 paid holidays per year. Paid leave and paid holidays are prorated based on the employee's date of hire. The GDIT Paid Family Leave program provides a total of up to 160 hours of paid leave in a rolling 12 month period for eligible employees. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most.

We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.

Join our Talent Community to stay up to date on our career opportunities and events at

Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans

View Now
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Cyber Security Jobs