8,077 Cyber Security jobs in the United States
Cyber Security
Posted 4 days ago
Job Viewed
Job Description
As a Senior Cybersecurity Engineer at Peloton, you will be responsible for supporting the
ongoing security operations and overall security strategy at Peloton. The ideal candidate must
demonstrate in-depth knowledge of and experience in vulnerability and patch management,
networking, cloud technology, incident response and automation. This person will develop,
optimize, and operate the security tools used throughout Peloton's infrastructure and contribute
to the overall security strategy across the entire organization.
Responsibilities:
Architect, deploy, and maintain Peloton's security infrastructure
Evangelize security throughout Peloton and empower end users to do their jobs
securely without creating additional friction
Research and analyze potential new threats, attack vectors and risks and identify
mitigation efforts
Examine output from security tools and software and report on findings
Collaborate with Peloton engineering teams to define and implement remediating
controls to improve security.
Work with cyber analysts and security engineers to develop threat models,
detections, incident response playbooks, and maintain tooling to enrich security
intelligence.
Manage EDR, DNS security and vulnerability management tools.
Requirements:
5+ years experience working in a security role
You know how to identify security gaps / areas of risk and are able to effectively put
together a plan for remediation
Ability to work cross functionally between technical and business teams,
evangelizing security best practices, policies, and procedures
Effective communication skills
Demonstrated knowledge of enterprise-scale security technologies which may
include EDR, SIEM, vulnerability management, incident response, PKI, user
behavior analytics, SSO, IAM, Privileged Access Management.
Experience building reports and dashboards and obtaining data with standard SQL.
Demonstrated proficiency with scripting (Bash, Python, etc)
Experience with developing infrastructure as code (Terraform, Cloudformation)
Deep hands on security experience with cloud providers such as AWS, GCP
Experience with Google Workspaces and Amazon Workspaces
Familiarity with development processes and environment tools such as Git and Jira
Flexibility to cover US EST working hours.
Great to Have:
Cybersecurity Certifications (CISSP, CEH, Security+, etc.)
Experience with Nucleus, Splunk, Snowflake, Crowdstrike, Umbrella, Rapid 7 and
Cisco Attack Surface Management.
Cyber Security
Posted 4 days ago
Job Viewed
Job Description
Diverse Lynx LLC is an Equal Employment Opportunity employer. All qualified applicants will receive due consideration for employment without any discrimination. All applicants will be evaluated solely on the basis of their ability, competence and their proven capability to perform the functions outlined in the corresponding role. We promote and support a diverse workforce across all levels in the company.
Cyber Security
Posted 4 days ago
Job Viewed
Job Description
Cybersecurity technical lead with hands on experience in OT security/ICS is must . Must be having deep understanding of Purdue model (levels 0-5). Proficiency in industrial protocols (e.g., Modbus, OPC, PROFINET) and ICS technologies (SCADA, PLC, DCS). Strong knowledge of cybersecurity frameworks and tools (e.g., SIEM, IDS/IPS, firewalls). Relevant certifications preferred: GICSP, CISSP, ISA/IEC 62443, CCNP Security. should be open for business travel to Panama City (Florida).
Cyber Security
Posted 10 days ago
Job Viewed
Job Description
- Relevant working experience in a cybersecurity team or performing cybersecurity functions
- Experience with Anti-Virus Solutions such as Trend Micro Deep Security
- Experience with computer languages or scripting, and PowerShell
- Experience with RSA Secure ID
- Experience with Splunk
- Strong interpersonal and communication skills (written and verbal) and the ability to interact with personnel on all levels
Cyber Security
Posted 10 days ago
Job Viewed
Job Description
Job Details:
Must Have Skills (Top technical skills only) *
1. Java + Cyber Security and or IAM project delivery experience
2. Effective verbal communication.
Nice to have skills (Top only)
1. Java + Cyber Security and or IAM project delivery experience
Detailed Job Description:
Java Cyber Security and or IAM project delivery experience Effective verbal communication. Experience in Telecom Domain will be strong plus Should have good communication skills Ensure compliance to processes set by clients Ability to work in a collaborative multiapplication team environment. Experience and desire to work in a Global delivery environment
Minimum years of experience*:
8-10 years
Cyber Security
Posted 10 days ago
Job Viewed
Job Description
Duration-Contract
Location- New York, NY
9-10 Years
JD
- Risk management, Access control, Cryptography, Security architecture and design, Application and Database Security, and Key Management/Tokenization Security architecture.
- Cyber Security - GRC - Vendor Risk Assessment
- Vendor Security Assessor is responsible for ensuring Vendor security architecture and design meets firms policies, external guidelines, regulatory expectations and security controls Review the controls related to Application (SaaS), Mobile Security, API controls and Cloud Security Coordinate with internal and external stake holders to initiate, scope, plan controls assessments of new and existing vendor engagements Assess completed questionnaire and supporting documentation to validate vendor implementation of information security controls Produce detailed documentation of assessments Communicate vendor information security issues to the stakeholders, ensuring their understanding of associated risks and actions needed to remediate those risks Validate evidence before remediation plans are closed
Regards,
Pallavi Verma
Sr. Technical Recruiter | Syntricate Technologies Inc.
Direct : |
Email : | Web:
We're hiring! connect with us on LinkedIn nd visit our Jobs Portal
Minority Business Enterprise (MBE) Certified | E-Verified Corporation | Equal Employment Opportunity (EEO) Employer
This e-mail message may contain confidential or legally privileged information and is intended only for the use of the intended recipient(s). Any unauthorized disclosure, dissemination, distribution, copying or the taking of any action in reliance on the information herein is prohibited. Please notify the sender immediately by email if you have received this email by mistake and delete this e-mail from your system. You have received this email as we have your email address shared by you or from one of our data sources or from our member(s) or subscriber(s) list. If you do not want to receive any further emails or updates, please reply and request to unsubscribe .
Cyber Security
Posted 10 days ago
Job Viewed
Job Description
Cybersecurity technical lead with hands on experience in OT security/ICS is must . Must be having deep understanding of Purdue model (levels 0-5). Proficiency in industrial protocols (e.g., Modbus, OPC, PROFINET) and ICS technologies (SCADA, PLC, DCS). Strong knowledge of cybersecurity frameworks and tools (e.g., SIEM, IDS/IPS, firewalls). Relevant certifications preferred: GICSP, CISSP, ISA/IEC 62443, CCNP Security
Be The First To Know
About the latest Cyber security Jobs in United States !
Cyber Security
Posted today
Job Viewed
Job Description
Job Description
Forhyre is seeking a talented individual that will be able to provide security architecture support and interface across the program as needed. This support includes, but is not limited to, cybersecurity solutions, providing technical strategy for solutions, guidance, policy, and implementations. The successful candidate for this position is a highly motivated individual, with a strong IT security background who excels integrating, operating, and deploying security technology and solutions and interacts well with both internal teams and clients.
Note: U.S. citizens and those authorized to work in the U.S. are encouraged to apply. We are unable to sponsor at this time.
Responsibilities:
- Engineer, implement and monitor security measures for the protection of computer systems, networks and information
- Develop and implement security policies and controls to support the Cyber Security framework
- Manage the existing cyber security training program across global, multilingual business
- Assists in ensuring global Information security program meets all industry regulations, standards, and compliance requirements
- Drive adoption of infrastructure security best practices and work with Information Technology teams to ensure security standards are maintained
- Implement technology to proactively scan Information Technology environment for security breaches and suspicious activity
- Continuous improvement in the areas of Information Security technologies, techniques and processes
- Develops and maintains an effective system for the distribution of regular key performance indicator reports and dashboard
- Ability to interpret penetration test results and describe issues and fixes to non-security expert
- Responsible for leading an accurate & comprehensive status reporting to the executive steering committee
- Create and implement SOP/ process improvement initiatives to achieve outcomes that align or exceed the expectations of strategic roadmap
Skills & Experience
- Bachelor’s degree and 12+ years of experience; additional years of directly applicable experience may be accepted in lieu of a degree.
Certified Information Systems Security Professional (CISSP) - 8+ years hands-on experience designing or implementing security solutions, including all related documentation and artifacts
- Analytical ability, problem-solving skills, and ability to break down complex problems into actionable steps
- Extensive experience in design and development of enterprise security architectures. Experience must include a wide range of work in creating diagrams and documentation with all components that comprise IT systems including network topology.
- Strong knowledge and experience in secure enterprise architecture design, especially with regard to IAM, NDR, EDR, SIEM, AI/ML, and other cybersecurity tools and resultant applications
- Experience selecting effective methods, techniques, and evaluation criteria to achieve desired outcomes
- Previous experience developing architectures, strategies, strategic plans, roadmaps, and technical standards for the federal IT enterprise environment.
- Vulnerability Assessment testing and/or Penetration Testing (preferred)
- Robotic Process Automation/Intelligent Automation (preferred)
- Business case development supporting security technology solutions (preferred)
- Additional certifications demonstrating cybersecurity/technical mastery (preferred)
Cyber Security Analyst
Posted today
Job Viewed
Job Description
Title: Sr. Cyber Security Analyst
Industry: Health Care
Salary: 112-140K base + benefits
Location: Knoxville, TN - 2 days onsite
Skills; Azure, AWS, M365, Vulnerability, SIEM and EDR platforms
Duration: Direct Hire
Overview:
- Collaborate with infrastructure and application teams to ensure secure system configurations and patch management.
- Support compliance initiatives including HIPAA, HITECH, PCI-DSS, and other regulatory requirements.
- Conduct risk assessments and recommend mitigation strategies for new technologies and projects.
- Lead investigations of security breaches and coordinate incident response activities.
- Provide cybersecurity awareness training and guidance to staff across the organization.
Looking forward to hearing from you. Also send over your updated resume and best contact number.
Cyber Security Analyst
Posted today
Job Viewed
Job Description
JOB TITLE: Cyber Security Analyst
SECURITY CLEARANCE STATEMENT: This position requires a government security clearance; you must be a US Citizen for consideration.
ABOUT US:
Fathom 4 is the kind of defense services company you've always wanted to work with. and for. We strive to take care of all the people we support; our employees, our clients, our troops, and our community. We are in the people business and that principle is what drives our culture. We want to hire people for a career, not just a specific project.
If we concentrate on genuinely taking care of you, we know you will do what you can to care for the client. Fathom 4 will continue to grow if we ensure to build teams that feel the same way.
RESPONSIBILITIES:
The Cyber Security Analyst shall protect and defend US Department of Defense (DoD) information and information systems by ensuring availability, integrity, authentication, confidentiality, and non-repudiation. This includes providing for restoration of information systems by incorporating protection, detection, and reaction capabilities. This position is part of a team of government staff, Fathom 4 employees, and subcontractors assigned to execute technical and operational cybersecurity capabilities.
TYPICAL DUTIES INCLUDE:
* Analyze networks to identify vulnerabilities and reduce breaches
* Develop and implement scanning and certification plans for network control and maintenance
* Document existing and proposed information architecture to convey compliance, problems, and solutions
* Provide Information Assurance related documentation (C&A Plan, Vulnerability Management Plan, Risk Management Framework (RMF) Implementation Plan, System Security Plan, and Contingency Plan)
* Resolve incidents and breaches, mitigating problems, and informing key personnel
* Develop and maintain RMF artifacts
* Support interaction with federal government stakeholders and accrediting authorities
* Analyze a system's security posture via the use of automated tools and manual review of DoD Software Security Technical Implementation Guides (STIGs). Automated tools will include: Security Content Automation Protocol (SCAP) utilities, Nessus, and Assured Compliance Assessment Solution (ACAS)
* Work with government personnel to ensure compliance with all current IT & cybersecurity policies, including those pertaining to Cyber Asset Reduction and Security (CARS).
REQUIRED QUALIFICATIONS AND EXPERIENCE
* 3 + years of experience with DoD operational information technology environments, system and network vulnerability analysis, risk assessment and risk mitigation analysis, security test and evaluation (ST&E), contingency planning, firewall policy, ports, and protocols.
* B.S. in Computer Science, IT, Cybersecurity, or applicable Engineering discipline, with a GPA of 3.0 or better. Engineering and Science degrees must be from an ABET accredited institution to be considered valid by our government clients.
* Experience in supporting development and implementation of a Cybersecurity plan for a new operational system resulting in an Authority To Operate (ATO) decision
* Familiarity with the DoD Critical Program Protection (CPI) process
* Current Certifications allowing Cybersecurity IAT Level II access, including Security+, CISSP, etc.
* A current Windows or Linux OS related certification
* Must be a US Citizen
* Current DoD SECRET minimum security clearance and military base & facility access is critical and must be maintained throughout employment.
* Must pass a background check at hire.
* Prior military experience a HUGE plus!
* Work is performed ON-SITE in Charleston, SC, with 0-5% travel expected.
ADDITIONAL DESIRED QUALIFICATIONS AND EXPERIENCE
* Windows 10, Windows Server 2010/2016 certs
* Linux OS Variants to include, CentOS and RedHat
* Adobe suite of tools and plug-ins (Air/Flash Player/Photoshop/Premier/Reader)
* Networking protocols
* Java/C/C++/C#
* Microsoft Office
* Microsoft SQL Server
* PostgreSQL
EQUAL OPPORTUNITY EMPLOYER:
Fathom 4. LLC. is an equal opportunity employer that does not discriminate in employment. All qualified applicants will receive consideration for employment without regard to their race, color, religion, sex, age, sexual orientation, gender identity, or national origin, disability or protected veteran status.