8,077 Cyber Security jobs in the United States

Cyber Security

94537 Fremont, California Info Way Solutions

Posted 4 days ago

Job Viewed

Tap Again To Close

Job Description

As a Senior Cybersecurity Engineer at Peloton, you will be responsible for supporting the
ongoing security operations and overall security strategy at Peloton. The ideal candidate must
demonstrate in-depth knowledge of and experience in vulnerability and patch management,
networking, cloud technology, incident response and automation. This person will develop,
optimize, and operate the security tools used throughout Peloton's infrastructure and contribute
to the overall security strategy across the entire organization.
Responsibilities:
Architect, deploy, and maintain Peloton's security infrastructure
Evangelize security throughout Peloton and empower end users to do their jobs
securely without creating additional friction
Research and analyze potential new threats, attack vectors and risks and identify
mitigation efforts
Examine output from security tools and software and report on findings
Collaborate with Peloton engineering teams to define and implement remediating
controls to improve security.
Work with cyber analysts and security engineers to develop threat models,
detections, incident response playbooks, and maintain tooling to enrich security
intelligence.
Manage EDR, DNS security and vulnerability management tools.
Requirements:
5+ years experience working in a security role
You know how to identify security gaps / areas of risk and are able to effectively put
together a plan for remediation
Ability to work cross functionally between technical and business teams,
evangelizing security best practices, policies, and procedures
Effective communication skills
Demonstrated knowledge of enterprise-scale security technologies which may
include EDR, SIEM, vulnerability management, incident response, PKI, user
behavior analytics, SSO, IAM, Privileged Access Management.
Experience building reports and dashboards and obtaining data with standard SQL.
Demonstrated proficiency with scripting (Bash, Python, etc)
Experience with developing infrastructure as code (Terraform, Cloudformation)
Deep hands on security experience with cloud providers such as AWS, GCP
Experience with Google Workspaces and Amazon Workspaces
Familiarity with development processes and environment tools such as Git and Jira
Flexibility to cover US EST working hours.
Great to Have:
Cybersecurity Certifications (CISSP, CEH, Security+, etc.)
Experience with Nucleus, Splunk, Snowflake, Crowdstrike, Umbrella, Rapid 7 and
Cisco Attack Surface Management.

View Now

Cyber Security

60008 Rolling Meadows, Illinois Diverse Lynx

Posted 4 days ago

Job Viewed

Tap Again To Close

Job Description

Diverse Lynx LLC is an Equal Employment Opportunity employer. All qualified applicants will receive due consideration for employment without any discrimination. All applicants will be evaluated solely on the basis of their ability, competence and their proven capability to perform the functions outlined in the corresponding role. We promote and support a diverse workforce across all levels in the company.

View Now

Cyber Security

77246 Houston, Texas Diverse Lynx

Posted 4 days ago

Job Viewed

Tap Again To Close

Job Description

Cybersecurity technical lead with hands on experience in OT security/ICS is must . Must be having deep understanding of Purdue model (levels 0-5). Proficiency in industrial protocols (e.g., Modbus, OPC, PROFINET) and ICS technologies (SCADA, PLC, DCS). Strong knowledge of cybersecurity frameworks and tools (e.g., SIEM, IDS/IPS, firewalls). Relevant certifications preferred: GICSP, CISSP, ISA/IEC 62443, CCNP Security. should be open for business travel to Panama City (Florida).

View Now

Cyber Security

10261 New York, New York Diverse Lynx

Posted 10 days ago

Job Viewed

Tap Again To Close

Job Description

Must Have
  • Relevant working experience in a cybersecurity team or performing cybersecurity functions
Nice To Have
  • Experience with Anti-Virus Solutions such as Trend Micro Deep Security
  • Experience with computer languages or scripting, and PowerShell
  • Experience with RSA Secure ID
  • Experience with Splunk
  • Strong interpersonal and communication skills (written and verbal) and the ability to interact with personnel on all levels
View Now

Cyber Security

75080 Blue Ridge, Texas eTeam

Posted 10 days ago

Job Viewed

Tap Again To Close

Job Description

Job Details:
Must Have Skills (Top technical skills only) *
1. Java + Cyber Security and or IAM project delivery experience
2. Effective verbal communication.

Nice to have skills (Top only)
1. Java + Cyber Security and or IAM project delivery experience

Detailed Job Description:
Java Cyber Security and or IAM project delivery experience Effective verbal communication. Experience in Telecom Domain will be strong plus Should have good communication skills Ensure compliance to processes set by clients Ability to work in a collaborative multiapplication team environment. Experience and desire to work in a Global delivery environment

Minimum years of experience*:
8-10 years

View Now

Cyber Security

10261 New York, New York Syntricate Technologies

Posted 10 days ago

Job Viewed

Tap Again To Close

Job Description

Position-Cyber Security
Duration-Contract
Location- New York, NY
9-10 Years

JD
  • Risk management, Access control, Cryptography, Security architecture and design, Application and Database Security, and Key Management/Tokenization Security architecture.
  • Cyber Security - GRC - Vendor Risk Assessment
  • Vendor Security Assessor is responsible for ensuring Vendor security architecture and design meets firms policies, external guidelines, regulatory expectations and security controls Review the controls related to Application (SaaS), Mobile Security, API controls and Cloud Security Coordinate with internal and external stake holders to initiate, scope, plan controls assessments of new and existing vendor engagements Assess completed questionnaire and supporting documentation to validate vendor implementation of information security controls Produce detailed documentation of assessments Communicate vendor information security issues to the stakeholders, ensuring their understanding of associated risks and actions needed to remediate those risks Validate evidence before remediation plans are closed


Regards,
Pallavi Verma
Sr. Technical Recruiter | Syntricate Technologies Inc.
Direct : |
Email : | Web:

We're hiring! connect with us on LinkedIn nd visit our Jobs Portal

Minority Business Enterprise (MBE) Certified | E-Verified Corporation | Equal Employment Opportunity (EEO) Employer

This e-mail message may contain confidential or legally privileged information and is intended only for the use of the intended recipient(s). Any unauthorized disclosure, dissemination, distribution, copying or the taking of any action in reliance on the information herein is prohibited. Please notify the sender immediately by email if you have received this email by mistake and delete this e-mail from your system. You have received this email as we have your email address shared by you or from one of our data sources or from our member(s) or subscriber(s) list. If you do not want to receive any further emails or updates, please reply and request to unsubscribe .
View Now

Cyber Security

07390 Jersey City, New Jersey Diverse Lynx

Posted 10 days ago

Job Viewed

Tap Again To Close

Job Description

Cybersecurity technical lead with hands on experience in OT security/ICS is must . Must be having deep understanding of Purdue model (levels 0-5). Proficiency in industrial protocols (e.g., Modbus, OPC, PROFINET) and ICS technologies (SCADA, PLC, DCS). Strong knowledge of cybersecurity frameworks and tools (e.g., SIEM, IDS/IPS, firewalls). Relevant certifications preferred: GICSP, CISSP, ISA/IEC 62443, CCNP Security

View Now
Be The First To Know

About the latest Cyber security Jobs in United States !

Cyber Security

Forhyre

Posted today

Job Viewed

Tap Again To Close

Job Description

Job Description

Job Description

Forhyre is seeking a talented individual that will be able to provide security architecture support and interface across the program as needed. This support includes, but is not limited to, cybersecurity solutions, providing technical strategy for solutions, guidance, policy, and implementations. The successful candidate for this position is a highly motivated individual, with a strong IT security background who excels integrating, operating, and deploying security technology and solutions and interacts well with both internal teams and clients.

Note: U.S. citizens and those authorized to work in the U.S. are encouraged to apply. We are unable to sponsor at this time.


Responsibilities:

  • Engineer, implement and monitor security measures for the protection of computer systems, networks and information
  • Develop and implement security policies and controls to support the Cyber Security framework
  • Manage the existing cyber security training program across global, multilingual business
  • Assists in ensuring global Information security program meets all industry regulations, standards, and compliance requirements
  • Drive adoption of infrastructure security best practices and work with Information Technology teams to ensure security standards are maintained
  • Implement technology to proactively scan Information Technology environment for security breaches and suspicious activity
  • Continuous improvement in the areas of Information Security technologies, techniques and processes
  • Develops and maintains an effective system for the distribution of regular key performance indicator reports and dashboard
  • Ability to interpret penetration test results and describe issues and fixes to non-security expert
  • Responsible for leading an accurate & comprehensive status reporting to the executive steering committee
  • Create and implement SOP/ process improvement initiatives to achieve outcomes that align or exceed the expectations of strategic roadmap

Skills & Experience

  • Bachelor’s degree and 12+ years of experience; additional years of directly applicable experience may be accepted in lieu of a degree.
    Certified Information Systems Security Professional (CISSP)
  • 8+ years hands-on experience designing or implementing security solutions, including all related documentation and artifacts
  • Analytical ability, problem-solving skills, and ability to break down complex problems into actionable steps
  • Extensive experience in design and development of enterprise security architectures. Experience must include a wide range of work in creating diagrams and documentation with all components that comprise IT systems including network topology.
  • Strong knowledge and experience in secure enterprise architecture design, especially with regard to IAM, NDR, EDR, SIEM, AI/ML, and other cybersecurity tools and resultant applications
  • Experience selecting effective methods, techniques, and evaluation criteria to achieve desired outcomes
  • Previous experience developing architectures, strategies, strategic plans, roadmaps, and technical standards for the federal IT enterprise environment.
  • Vulnerability Assessment testing and/or Penetration Testing (preferred)
  • Robotic Process Automation/Intelligent Automation (preferred)
  • Business case development supporting security technology solutions (preferred)
  • Additional certifications demonstrating cybersecurity/technical mastery (preferred)

View Now

Cyber Security Analyst

37955 Knoxville, Tennessee Prestige Staffing

Posted today

Job Viewed

Tap Again To Close

Job Description

Title: Sr. Cyber Security Analyst

Industry: Health Care

Salary: 112-140K base + benefits

Location: Knoxville, TN - 2 days onsite

Skills; Azure, AWS, M365, Vulnerability, SIEM and EDR platforms

Duration: Direct Hire

Overview:

  1. Collaborate with infrastructure and application teams to ensure secure system configurations and patch management.
  2. Support compliance initiatives including HIPAA, HITECH, PCI-DSS, and other regulatory requirements.
  3. Conduct risk assessments and recommend mitigation strategies for new technologies and projects.
  4. Lead investigations of security breaches and coordinate incident response activities.
  5. Provide cybersecurity awareness training and guidance to staff across the organization.


Looking forward to hearing from you. Also send over your updated resume and best contact number.

View Now

Cyber Security Analyst

29408 Rincon, Georgia Fathom 4

Posted today

Job Viewed

Tap Again To Close

Job Description



JOB TITLE: Cyber Security Analyst

SECURITY CLEARANCE STATEMENT: This position requires a government security clearance; you must be a US Citizen for consideration.

ABOUT US:

Fathom 4 is the kind of defense services company you've always wanted to work with. and for. We strive to take care of all the people we support; our employees, our clients, our troops, and our community. We are in the people business and that principle is what drives our culture. We want to hire people for a career, not just a specific project.

If we concentrate on genuinely taking care of you, we know you will do what you can to care for the client. Fathom 4 will continue to grow if we ensure to build teams that feel the same way.

RESPONSIBILITIES:

The Cyber Security Analyst shall protect and defend US Department of Defense (DoD) information and information systems by ensuring availability, integrity, authentication, confidentiality, and non-repudiation. This includes providing for restoration of information systems by incorporating protection, detection, and reaction capabilities. This position is part of a team of government staff, Fathom 4 employees, and subcontractors assigned to execute technical and operational cybersecurity capabilities.

TYPICAL DUTIES INCLUDE:

* Analyze networks to identify vulnerabilities and reduce breaches

* Develop and implement scanning and certification plans for network control and maintenance

* Document existing and proposed information architecture to convey compliance, problems, and solutions

* Provide Information Assurance related documentation (C&A Plan, Vulnerability Management Plan, Risk Management Framework (RMF) Implementation Plan, System Security Plan, and Contingency Plan)

* Resolve incidents and breaches, mitigating problems, and informing key personnel

* Develop and maintain RMF artifacts

* Support interaction with federal government stakeholders and accrediting authorities

* Analyze a system's security posture via the use of automated tools and manual review of DoD Software Security Technical Implementation Guides (STIGs). Automated tools will include: Security Content Automation Protocol (SCAP) utilities, Nessus, and Assured Compliance Assessment Solution (ACAS)

* Work with government personnel to ensure compliance with all current IT & cybersecurity policies, including those pertaining to Cyber Asset Reduction and Security (CARS).

REQUIRED QUALIFICATIONS AND EXPERIENCE

* 3 + years of experience with DoD operational information technology environments, system and network vulnerability analysis, risk assessment and risk mitigation analysis, security test and evaluation (ST&E), contingency planning, firewall policy, ports, and protocols.

* B.S. in Computer Science, IT, Cybersecurity, or applicable Engineering discipline, with a GPA of 3.0 or better. Engineering and Science degrees must be from an ABET accredited institution to be considered valid by our government clients.

* Experience in supporting development and implementation of a Cybersecurity plan for a new operational system resulting in an Authority To Operate (ATO) decision

* Familiarity with the DoD Critical Program Protection (CPI) process

* Current Certifications allowing Cybersecurity IAT Level II access, including Security+, CISSP, etc.

* A current Windows or Linux OS related certification

* Must be a US Citizen

* Current DoD SECRET minimum security clearance and military base & facility access is critical and must be maintained throughout employment.

* Must pass a background check at hire.

* Prior military experience a HUGE plus!

* Work is performed ON-SITE in Charleston, SC, with 0-5% travel expected.

ADDITIONAL DESIRED QUALIFICATIONS AND EXPERIENCE

* Windows 10, Windows Server 2010/2016 certs

* Linux OS Variants to include, CentOS and RedHat

* Adobe suite of tools and plug-ins (Air/Flash Player/Photoshop/Premier/Reader)

* Networking protocols

* Java/C/C++/C#

* Microsoft Office

* Microsoft SQL Server

* PostgreSQL

EQUAL OPPORTUNITY EMPLOYER:

Fathom 4. LLC. is an equal opportunity employer that does not discriminate in employment. All qualified applicants will receive consideration for employment without regard to their race, color, religion, sex, age, sexual orientation, gender identity, or national origin, disability or protected veteran status.
View Now
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Cyber Security Jobs