We're #hiring a new API Security Architect in Pittsburgh, Pennsylvania. Apply today or share this post with your network.
ConsultUSA’s Post
More Relevant Posts
-
Multiple Cloud and Security Certifications | Tech Translator | Problem Solver | Thought Igniter | Speaker
Sharing this out with my network, if I can help put you in touch please let me know? #securitynerd #livinlavidasecurity #cisolife #cissp #cyberseecurity #securitymanagement #informationsecurity #infosec #cybersecurity #networksecurity #infosecurity #security #cloudsecurity #rickymartinthesecurityguy #Cloud
My team is hiring! Sr. Security Solutions Architect. If you are interested or know of someone looking please reach out. Security continues to be a driving force in all conversations within IT and is our fastest growing segment here at Trace3. https://lnkd.in/gAT5x9V7
To view or add a comment, sign in
-
Worth considering and applying....
We at ColorTokens Inc., Dig Chauhan CCIE is #hiring #NetworkSecurity #Deploymentengineers Location: Bangalore Experience: 6-10 years Mandatory Skills: Network Administration / Security and Implementation Firewalls/ DNS/ DHCP/ VPN/ AD Kindly share your resume to saloni.tomar@colortokens.com or DM me. #NetworkEngineer #Networksecurityengineer #deployment #cloudsecurity #microsegmentation #zerotrust #bangalorejobs Vasu B Thejaswini AS Bindu Venkatesh Dig Chauhan CCIE Sachin Jain midhun t Avinash J
Sr Deployment Engineer at ColorTokens
colortokens.hire.trakstar.com
To view or add a comment, sign in
-
I'M #Hriring #Systems Engineer IV Location: Houston, TX – HYBRID (Local Candidates Only) Senior Level (greater than 8 yrs. exp.) Need Linkedin and Need Only one strong candidate for that role MUST HAVE SKILLS - Strong Windows Server Administration with scripting experience, DevOps Principles and Practices, Load Balancing and Firewall experience BACKGROUND - Candidate should have strong Windows Server Administration experience familiar with Application Development (or at least around deployment and hosting in a web server or windows services) and have a mindset of wanting to automate everything. The background of the roles, these positions will be maintaining our on-prem environments through patching, releasing, configuring Windows environments(familiar with AWS cloud would be a bonus) and actively involved in our Technology Lifecycle Management upgrading our infrastructure from old Operating Systems to newer Operating Systems JOB DESCRIPTION • Technical Expertise - Involves demonstrating a commitment to increasing knowledge and skills in current technical/functional area, keeping up to date on technical developments, staying informed as to industry practices, knowing how to apply relevant technical processes to appropriate business needs • The ideal candidate will have knowledge of multiple systems (operating/integration/ architecture) and programming languages/ methodologies • Thorough understanding of server and desk top based technology, utilizing network systems related to enterprise view • Must be legally authorized to work in the United States for any employer without sponsorship • Successful completion of interview required to meet job qualification • Reliable, punctual attendance is an essential function of the position Preferred Skills • Dedication - Involves demonstrating a desire to dedicate time and energy to accomplish goals, tasks, assignments, etc. Will do what it takes to get things done • Flexibility - Is open to change, enjoys the challenge of unfamiliar tasks, anticipates and adjusts to problems and roadblocks, is not thrown off when things change, can flex to future consequences and trends appropriately • Problem Solving - Uses rigorous logic and methods to solve difficult problems with effective solutions, probes all fruitful sources for answers, can see hidden problems, is excellent at honest analysis, looks beyond the obvious and doesn’t stop at the first answer • Self-Development - Is actively committed to continuously improve him/herself, understands that different situations and levels may call for different skills and approaches, knows personal strengths, weaknesses, opportunities and limits, works on compensating for weaknesses and limitations, seeks feedback, gains insights from mistakes, is open to criticism manish@adventatech.com
To view or add a comment, sign in
-
DevOps Engineer ♾️| Linux🐧|AWS ☁️| Docker 🐳 | Kubernetes ☸️ | CiCd 🚀 | Terraform 🏗️ |anSibLe⚙️ | Jenkins🧑🔧| SheLL - ScriPting 💠 | Grafana⛄ | Git & GitHub 🐙 | Prometheus ♨️ |
Latest Opportunity 🚀🚀🚀🚀🚀🔔🔔🔔🔔 #devops #devsecops #trainwithshubham #awscloud #awscommunity #devopscommunity #90daysofdevops
Recruitment Lead -Resourcing (DevOps Engineer | SRE | AWS/ AZURE Engineer | DevSecOps | DevOps Architect | Infrastructure Engineer), Data Engineer, ETL Developer, Python Developer at TEK INSPIRATIONS LLC
Requirement: #DevSecOps Engineer 12 months Remote (No MST or PST please) No H1/CPT/OPT Phone/Skype ****Need Minimum 10-12 years experience candidates**** ****Must Mortgage Industry Experience**** Candidate Must have a excellent communications • Developer background with experience in all types of application security testing • Specific to Software composition Analysis • Broad understanding of web application security, Static Security testing, cloud security, container security - tools, scan, triage, risk evaluation and remediation. • Strong familiarity of Enterprise and application level security architecture and ability to review current state architecture and recommend enhancements. • Thorough understanding and experience in identifying and mitigating application vulnerabilities publicized by #OWASP, #WASC, #CWE, #CVE etc.. • Strong knowledge on industry best practices, code review and analysis• Hands on experience with tools such as #Sonatype, #BlackDuck or #Snyk, etc. • Working knowledge of GitHub, sonarQube, AWS technology, Containers (Dockers), #Infrastructureascode (#Terraform or similar) would be preferred. #c2c #benchsalesleadsrecruiters #devsecops #devopsengineer
To view or add a comment, sign in
-
CGI is Hiring!!!! Please DM me your resume if you are interested. Role: SentinelOne Administrator Designation: SSE \ LA (Senior Systems Engineer \ Lead Analyst) Experience: 5-10 Years Job Description: 1. Hands-on experiences with SentinelOne EDR administration, Configuration, and management of solutions 2. Experience with policy tuning, customization, implementation of best practices, determine specific value driven use cases, and fully integrate the solution into the environment. 3. Understanding of MITRE ATT&CK and NIST Cyber Security Frameworks standards and requirements and ability to apply them to an enterprise environment 4. Investigating the root cause of suspicious threats and analyzing the global threats in environment and implement the preventive strategies 5. Monitor and Analyze Sentinel One EDR version compliance 6. Monitor events and alerts to understand the files, processes and applications used in the environment to allow or block them with necessary approvals from Stakeholders to avoid unwanted software executions (includes adware, unlicensed software, freeware, etc.) 7. Prepare and Update Configuration and Operational Documents 8. In-depth understanding of Windows operating systems and general knowledge of Unix, Linux operating systems 9. Incident, Service Request and Change Management 10.Quarterly review of Sentinel One EDR policies to validate and clean up unwanted or unused policies as part of policy management.
To view or add a comment, sign in
-
Immediate need for a Senior Security Ops Analyst, New Hyde Park, NY. Hybris 2 days a week. Contract to hire. No third parties. US citizens or GC's only. What we need: DevOps/Engineering/or Computer Science background Automation Scripting exp with Python/Bash/Powershell or Go Security and Incident Response experience Experience with Developing Integration Solutions Cloud Security exp with AWS or Azure SOAR (Security Orchestration Automation Response) Job Purpose The Cybersecurity Sr Engineer is responsible for a variety of objectives resulting in risk mitigation and remediation of internal & external security threats. This role performs advanced threat analysis, threat intelligence gathering & reporting, incident response activities, improves accuracy of security systems, improves existing processes, and works on Cybersecurity focused projects. Key Responsibilities Cybersecurity – Cyber Intelligence & Incident Response · Responds to and remediates email, endpoint, threat intelligence, and network-based threats; provides forensic investigation and support. · Provides after-hours support as needed for response activities. · Collaborates with cross divisional and Cybersecurity teams to continuously improve security capabilities and response to threats in the most efficient and effective manner. · Assists with projects to implement advanced technologies to prevent & identify malicious behavior within cloud environments, networks, endpoints, and email technologies. · Operates products such as SIEM, SOAR, threat intelligence platforms, advanced email protection, EDR, cloud security products, IDS/IPS, Zero Trust tooling, and other security technologies. · Implements and performs threat analysis utilizing industry standard frameworks (kill chain/diamond model) and techniques. · Proposes and helps review security plans and policies to improve environmental security. · Maintains and produces metrics, operational playbooks, process diagrams and documentation for the Cybersecurity program. · Produces and distributes operational and tactical threat intelligence reports. · Other duties may be assigned as needed to address new security threats facing the enterprise. Emerging Threats Monitoring · Obtains information and stays up to date on the latest threats and security trends in a fast and efficient way to keep enterprise environments protected. Incident Management · Assists in the investigation and resolution of security events and incidents. Skills Professional Technology Skills (the professional technology skills you need to be able to do the job) Skill Follow Apply Advise Inspire Detail Cyber Intelligence & Incident Response Ability to: · Demonstrate great teamwork and partnership with internal teams for resolution of security-based issues. · Perform security event correlation, triage, and analysis. #securityengineer
To view or add a comment, sign in
-
Job Opportunity Alert - Security Research! Curiosity is the catalyst that converts walks into path-finding missions. Are you a curious researcher who is looking for a chance to break into purple team research? Qualys is hiring security engineers for some of the most exciting products in spaces including (but not limited to) vulnerability research, threat detection & patch management. Tenets of this role: 1. Automation first 2. Deep research 3. Creative solutions 4. Edge case detection What's the work like? 0. Research new vulnerabilities ranging from RCE in webapps to overflows in windows drivers. 1. Develop Automated/Semi-automated playbooks for vulnerability detection and their remediation. 2. Conduct research to assess and create software patches and configuration changes to be applied to varied software, middleware and hardware. 3. Think ahead to avoid business outages based on the lab results. All these details are available on the job requisition page as well. If this job opportunity excites you then please, I implore you to do not just write "interested" in the comments section. Please provide some more context - maybe resume or maybe drop me a message or maybe write a bit more about how we can get in touch so we can take the conversation further. I cannot refer everyone. But I will try my best to spend some time with you and your resume to provide you best possible feedback based on my experience about how we can proceed further.
Security Engineer
qualys.wd5.myworkdayjobs.com
To view or add a comment, sign in
-
50+ applications received! I hope that hook got your attention. So, I received 50+ resumes after making this post and I think there are some common mistakes that caused me to filter out most applications. 1. Skill-set mismatch 2. Experience mismatch I understand that finding a candidate with exact match is difficult but I request you to go through the job description and try to come close to the requirements. Meet the JD somewhere in the middle. 3. Detailed personal information Please do NOT disclose your personal information like address, marital status, personal hobbies. I don’t want to be biased and no matter how much I consciously try, there will always be some level of subconscious bias in my mind. 4. Long Resumes Keep your resume short - 1 pager is perfect. 2 pager is acceptable. Don’t go beyond 2 pages please. 5. Project and Job description Explain your project by talking about WHAT you did, WHICH technology you used, and what was the IMPACT. Ex. 1. Built a console game using Unity game engine that attracted 1000 lifetime users and 100 monthly active users. 2. Created an CASE-UCO parsing library in Rust and published it via crates, has 1000+ downloads in a month. PS: I’m still hiring for my team for the same role. Please apply if you’re interested in security research.
Job Opportunity Alert - Security Research! Curiosity is the catalyst that converts walks into path-finding missions. Are you a curious researcher who is looking for a chance to break into purple team research? Qualys is hiring security engineers for some of the most exciting products in spaces including (but not limited to) vulnerability research, threat detection & patch management. Tenets of this role: 1. Automation first 2. Deep research 3. Creative solutions 4. Edge case detection What's the work like? 0. Research new vulnerabilities ranging from RCE in webapps to overflows in windows drivers. 1. Develop Automated/Semi-automated playbooks for vulnerability detection and their remediation. 2. Conduct research to assess and create software patches and configuration changes to be applied to varied software, middleware and hardware. 3. Think ahead to avoid business outages based on the lab results. All these details are available on the job requisition page as well. If this job opportunity excites you then please, I implore you to do not just write "interested" in the comments section. Please provide some more context - maybe resume or maybe drop me a message or maybe write a bit more about how we can get in touch so we can take the conversation further. I cannot refer everyone. But I will try my best to spend some time with you and your resume to provide you best possible feedback based on my experience about how we can proceed further.
Security Engineer
qualys.wd5.myworkdayjobs.com
To view or add a comment, sign in
-
For more information, you can also write to us at careers@bluegrid.io. 📥 #openroles #generalrole #bluegrid #joinus #applynow #sendyourcv #wearehiring #growingteam #devops #frontenddevelopers #backenddeveloper #soc #noc #support #engineer #developer #cloud #cybersecurity #fintech #web3 #makingadifference
To view or add a comment, sign in
-
🔹🔹 C1C Opportunity Alert 🔹🔹 1695 – Adversary Emulation Engineer #C1C #careers #hiring #jobsearch #careeropportunities #itjobs #belgiumjobs #nato #ncia #natojobs #clearance #clearancejobs #clearedjobs #cybersecurity #itsecurity #penetrationtester #mitreattackframework #python Work Type: On Site 🔎 Duties: ✅ Lead and/or be part of the Red/Purple Team during assessments ✅ Develop and execute complex adversary emulation scenarios ✅ Create custom scripts in python to simulate attack activities ✅ Utilize detections to improve the effectiveness of adversary emulation scenarios ✅ Create and use custom tools to automate and optimize the adversary emulation process ✅ Provide security design reviews to ensure compliance with company policies and directives ✅ Provide security consultancy and advice to projects, plans, and other entities ✅ Brief at both executive and technical levels on security reports and testing outcome ✅ Ensure proactive collaboration and coordination with internal and external stakeholders ✅ Ensure compliance with IT security, risk and compliance principles ✅ Responds to ad-hoc tasks given by the chain of command ✅ Embedded in the NCSC Penetration Testing and Adversary Emulation Cell located in SHAPE, Casteau, Belgium ✅ High-quality reports on the results of adversary emulation assessments as directed by Lead Engineer NCSC ✅ Provide variety of deliverables associated to any duty (described in above) 🥷🏼 Requirements: The contracted individual will have at least 3 years post-related experience Proven experience in either penetration testing, red teaming, or adversary emulation for at least 3 years Understanding of the principles of adversary emulation (red/purple teaming) Ability to develop and execute adversary emulation scenarios Understanding of tactics, techniques and procedures of threat actors based on MITRE ATT&CK Framework Ability to create and execute custom scripts to simulate attack activities Understanding of the various types of detections available (defense in depth) Knowledge of the latest security trends and best practices Ability to create and use custom tools to automate and optimize the adversary emulation process Knowledge of the principles of IT security, risk, and compliance Experience with security testing tools and methodologies, such as fuzzing, static and dynamic application security testing, and penetration testing Knowledge in system and network administration of UNIX and Windows systems Use of penetration testing tools, techniques, and recognized testing methodologies Scripting skills in Python Technical knowledge in system and network security, authentication and security protocols, cryptography, and application security Ability to evaluate risks and formulate mitigation plans Proven ability to write clear and structured technical reports including executive summary, technical findings, and remediation plan for several different audiences
To view or add a comment, sign in
-