#hiring. Network Security Consultant Are you a highly skilled Network Security expert based in Melbourne ready to take on challenging projects within a fast-paced enterprise environment? We are looking for a Network Security Consultant with a strong technical background and hands-on experience in infrastructure and security technologies. https://lnkd.in/gdvX6dV8
Gregory Love’s Post
More Relevant Posts
-
#hiring Cyber Systems Engineer, Washington, United States, $234K, fulltime #jobs #jobseekers #careers $234K #Washingtonjobs #DistrictofColumbiajobs #ITCommunications Apply: https://lnkd.in/gmw6s4cb About PeratonPeraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can't be done by solving the most daunting challenges facing our customers. Visit to learn how we're keeping people around the world safe and secure.ResponsibilitiesMonitors, analyzes, and detects cyber events and incidents within information systems and networks under general supervision. Assists with integrated, dynamic cyber defense, coordinates and maintains security toolsets to support organizations' continuous monitoring and ongoing authorization programs. Establishes a framework by which cyber risk can be measured and quantified in the marketplace. Determines security requirements by evaluating business strategies and requirements; researching information security standards; conducting system security and vulnerability analyses and risk assessments; studying architecture/platform; identifying integration issues; preparing cost estimates. Implements security systems by specifying intrusion detection methodologies and equipment; directing equipment and software installation and calibration; preparing preventive and reactive measures; creating, transmitting, and maintaining keys; providing technical support; completing documentation. Verifies security systems by developing and implementing test scripts. Maintains security by monitoring and ensuring compliance to standards, policies, and procedures; conducting incident response analyses; developing and conducting training programs. Responsible for the design, development, implementation, and integration of a DoD IA architectures, systems, or system components for use within computing, network, and enclave environments. Ensures that the architecture and design of development and operational systems are functional and secure. This includes designs for program of record systems and special purpose processing nodes with platform IT interconnectivity.• Designs and develops new systems, applications, and solutions for enterprise-wide cyber systems and networks.• Ensures system security needs established and maintained for operations development, security requirement
https://www.jobsrmine.com/us/district-of-columbia/washington/cyber-systems-engineer/468297950
To view or add a comment, sign in
-
Hi Folks, Hope you are doing well. Please share suitable candidates for below position. Role: Senior Cyber Security Engineer Location: New Jersey (Day 1 Onsite) Duration: Long Term Experience Needed: 9+ Years Visa: Any Job Description · Provide first level response for security events including but not limited to intrusion detection, malware infections, denial of service attacks, privileged account misuse and network breaches. · Coordinate with enterprise-wide cyber defense staff to validate network alerts · Ensure cybersecurity-enabled products or other compensating security control technologies reduce identified risk to an acceptable level · Work with TVM vendor, work with various to to drive the remediation and track the process, Open CR and schedule scans & follow up scans, analyze potential exploitation scenarios, assess applicable security controls, and evaluate potential impact. · Performing security reviews and identify security gaps in security architecture resulting in recommendations for inclusion in the risk mitigation strategy · Participating in planning and recommendation of modifications or adjustments based on exercise results or system environment. · Implementing security measures assistance in disaster recovery and planning. · Utilizing OSINT to effectively detect and prevent indicators of compromise in affected systems. · Triaging according to organizational procedures to ensure that a genuine security incident is occurring. · Providing daily summary reports of network events and activity relevant to cyber defense practices · Providing timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities. · Conducting research, analysis, and correlation across a wide variety of all source data sets (indications and warnings). · Collaborating with stakeholders to resolve computer security incidents and vulnerability compliance. · Documenting and escalate incidents (including event’s history, status, and potential impact for further action) that may cause ongoing and immediate impact to the environment. · Analyzing identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information. · Monitoring and reviewing the most recent SIEM alerts to determine relevance and urgency. · Providing metrics and reports around security monitoring by designing dashboards for asset owners and management consumption · Contributing to the development and implementation of security architecture, standards, procedures and guidelines for multiple platforms · Documenting current case notes sufficient for effective shift handover, as well as reviewing current status via phone call or in person. Share profiles to ramesh@metafindsolutions.com
To view or add a comment, sign in
-
Hi Folks, Hope you are doing well. Please share suitable candidates for below position. Role: Senior Cyber Security Engineer Location: New Jersey (Day 1 Onsite) Duration: Long Term Experience Needed: 9+ Years Visa: Any Job Description · Provide first level response for security events including but not limited to intrusion detection, malware infections, denial of service attacks, privileged account misuse and network breaches. · Coordinate with enterprise-wide cyber defense staff to validate network alerts · Ensure cybersecurity-enabled products or other compensating security control technologies reduce identified risk to an acceptable level · Work with TVM vendor, work with various to to drive the remediation and track the process, Open CR and schedule scans & follow up scans, analyze potential exploitation scenarios, assess applicable security controls, and evaluate potential impact. · Performing security reviews and identify security gaps in security architecture resulting in recommendations for inclusion in the risk mitigation strategy · Participating in planning and recommendation of modifications or adjustments based on exercise results or system environment. · Implementing security measures assistance in disaster recovery and planning. · Utilizing OSINT to effectively detect and prevent indicators of compromise in affected systems. · Triaging according to organizational procedures to ensure that a genuine security incident is occurring. · Providing daily summary reports of network events and activity relevant to cyber defense practices · Providing timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities. · Conducting research, analysis, and correlation across a wide variety of all source data sets (indications and warnings). · Collaborating with stakeholders to resolve computer security incidents and vulnerability compliance. · Documenting and escalate incidents (including event’s history, status, and potential impact for further action) that may cause ongoing and immediate impact to the environment. · Analyzing identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information. · Monitoring and reviewing the most recent SIEM alerts to determine relevance and urgency. · Providing metrics and reports around security monitoring by designing dashboards for asset owners and management consumption · Contributing to the development and implementation of security architecture, standards, procedures and guidelines for multiple platforms · Documenting current case notes sufficient for effective shift handover, as well as reviewing current status via phone call or in person. Share profiles to ramesh@metafindsolutions.com
To view or add a comment, sign in
-
Ensuring the stability and security of your IT systems is paramount. Trust our expertise in providing top-notch resources for system administrators. ▶️ Network Administration ▶️ Server Management ▶️ Cyber Security #iTRS #resourcing #recruiting #backofficesolutions #itrecruitment #itresources #itjobs #resources #backoffice #jobs #itsourcing #TechTalent #system #systemadministration
To view or add a comment, sign in
-
Hello Everyone, Hope you all are doing well. Urgent Client requirement if you're interested please share your resume to vineel@harvintek.com Please Find the JD. Title : Senior Cyber Security Specialist Location : Visa :H1B , GC and USC Experience : 12+years Contract : W2 Duration : 12 Months Key Responsibilities: Develop and Implement Security Policies: Create, review, and enforce security policies, procedures, and guidelines to ensure the integrity, confidentiality, and availability of information assets. Risk Management: Identify, assess, and mitigate security risks across the organization. Conduct regular security risk assessments and audits. Incident Response: Lead the incident response team in investigating and responding to security breaches, providing detailed analysis, and implementing corrective actions. Security Architecture: Design and implement robust security architectures for on-premises and cloud-based systems, ensuring compliance with industry standards and best practices. Monitoring and Analysis: Oversee the monitoring of security systems, networks, and applications for potential security incidents. Analyze security logs and reports to identify and address vulnerabilities. Training and Awareness: Develop and deliver security training and awareness programs to educate employees about security best practices and protocols. Collaboration: Work closely with other IT and business teams to integrate security into all phases of system development and operations. Provide guidance on security-related issues and projects. Research and Development: Stay up-to-date with the latest cyber security trends, tools, and techniques. Evaluate and implement new security technologies and solutions to enhance the organization's security posture. Qualifications: Education: Bachelor's or Master's degree in Computer Science, Information Technology, Cyber Security, or a related field. Experience: Over 10 years of experience in cyber security, with a proven track record in senior or leadership roles. Certifications: Relevant certifications such as CISSP, CISM, CEH, GIAC, or similar are highly desirable. Technical Skills: In-depth knowledge of security protocols, cryptography, authentication, and security frameworks. Experience with security technologies such as firewalls, IDS/IPS, SIEM, DLP, endpoint protection, and vulnerability management tools. Proficiency in network security, cloud security, application security, and mobile security. Strong understanding of operating systems (Windows, Linux, Unix), databases, and web technologies. Analytical Skills: Excellent analytical and problem-solving skills with the ability to identify and mitigate security risks. Communication Skills: Strong written and verbal communication skills, with the ability to convey complex security concepts to technical and non-technical audiences. Leadership: Proven leadership and team management skills, with the ability to mentor and guide junior team members.
To view or add a comment, sign in
-
🔒 Experienced IT Professional Specializing in Cybersecurity & System Administration🔧 With 4 years of hands-on experience in *information security , system administration, and L1 technical support within Security Operations Centers (SOCs) , I bring a comprehensive skill set to the table. I have expertise in: - Network and System Security - Vulnerability Management and Remediation - Troubleshooting and IT Infrastructure Optimization I am proficient in using tools like SentinelOne and CrowdStrike EDR/XDR for endpoint security, along with managing Sophos and SonicWall firewalls for network protection. I have a proven track record of investigating security incidents and effectively providing solutions. With a passion for advancing my career in cybersecurity and System Administration or SOC Level 1 roles. I'm committed to continuous learning and staying ahead in the ever-evolving field of IT infrastructure and security. Let's connect if you're looking for a detail-oriented professional who is dedicated to securing your systems and networks! 🚀 #InformationSecurity #SystemAdministration #SOC #Cybersecurity #EDR #XDR #SentinelOne #CrowdStrike #Firewall #VulnerabilityManagement #ITSupport #EndpointSecurity #CyberDefense #ITInfrastructure
To view or add a comment, sign in
-
Greetings from Soft_AI, We have the following urgent requirement,please share your resume on ram@softaiusa.com urgently if you are fine with JD.. JD : *PLEASE NOTE THIS POSITION WILL ALLOW CONSULTANT TO WORK REMOTELY. HOWEVER, DUTIES WILL REQUIRE CONSULTANT TO WORK ONSITE 3 DAYS PER WEEK. THEREFORE, WILL BE CRITICAL FOR THE CONSULTANT TO BE LOCAL TO NYC AND ABLE TO TRAVEL TO OUR OFFICE WITHOUT ISSUE, AS NEEDED (AT THEIR OWN EXPENSE). One of 3 shifts a day in a 24/7 operation (*consultant needs to be flexible enough to fill any of the 3 shifts as needed): Shift 1 = 12am – 8:30am Shift 2 = 8am – 4:30pm Shift 3 = 3:30pm – 12am SUMMARY OF THE FUNCTION/ROLE: The IT Cyber Security Operations Monitoring Team is seeking consultants to perform Tier 2 SOC follow-up and remediation activity on escalated incidents. The Tier 2 level Analyst (Senior Analyst) should have the ability to respond to a wide range of escalated Incidents and follow through with incident lifecycle through completion. Some of the areas we are looking for candidates to have experience in include but are not limited to: Critical Key requirements: * Critical Thinker & Analytical Aptitude * SIEM Experience (Splunk) * Tier II SOC Incident Handling & Investigation * 24/7 Security Operation Center Experience * Threat Detection & Response Experience * Threat Detection Technologies Experience QUALIFICATIONS EXPERIENCE & EDUCATION: * Knowledge of Enterprise Networks & Security infrastructure, Communication and internet security systems, Firewalls, Intrusion Protection Systems, Remote Access VPN, Proxy, Wireless Security, NAC, Enterprise ID Management systems, Database, computer systems, security event analysis and forensic investigations. * Organizational, decision making, and communications skills. * Knowledge of network security operations with a solid understanding of the technology and attention to detail. * Creative problem-solving abilities, coupled with a desire to take on responsibility. * Strong team player with the ability to engage and promote a cohesive unit. * Ability to handle multiple tasks in a fast-paced environment and prioritize highly varied work in order to maintain required productivity levels. * Ability to communicate technical' info and ideas so others will understand. * Ability to make appropriate decisions considering the relative costs and benefits of potential actions. * Ability to apply collaborative skills and traits that create solutions and results to unexpected situations. * Bachelor’s degree in Computer Science, Cyber Security, Information Technology or related discipline OR a satisfactory equivalent with 4-6 years of Information Technology experience.Additional Skills and Information:Security Event Monitoring, Network Event monitoring, Email Header Analysis, Packet Capture inspection, Malware Triage & Analysis, SIEM (Splunk) & TIP Experience
To view or add a comment, sign in
-
#Veryurgentrole Job Details Position: Firewall Engineer Location: 100 Community Pl, Crownsville, MD 21032 (100% on site) 12+ month Interview mode: In person Minimum Qualifications: Six years of hands-on experience in Network Engineering/Architecture Five years of technical experience in architecture, design, implementation, support of firewall technologies Current Palo Alto Networks Certified Network Security Engineer (PCNSE) certification or hands-on experience implementing Palo Alto Advanced/NextGen features to include App-ID, User-ID, Content-ID, URL Filtering, Threat Prevention, WildFire, Virtual Wire, Virtual System (VSys), Global Protect, NAT Policies, Security Profiles, Inbound SSL Decryption, Outbound SSL Decryption (SSL Forward Proxy), File Blocking, and Data Filtering Hand-on experience with Palo Alto Panorama for centralized management of PANOS firewalls Self-starter, able to gather requirements, plan, execute firewall architecting and deployment efforts Able to perform gap analysis and initiate and execute architectural improvements App-ID, User-ID, Content-ID, URL Filtering, Threat Prevention, WildFire, Virtual Wire, Virtual System (VSys), Global Protect, NAT Policies, Security Profiles, Inbound SSL Decryption, Outbound SSL Decryption (SSL Forward Proxy), File Blocking, and Data Filtering Experience with network security architecture, design, and implementation best-practices i.e., Defense-in-depth architecture, knowledge of emerging Zero Trust architecture Experience with firewall architecture, design, and implementation Experience with operational and security hardening configuration for firewall solutions Experience with configuration management and change control for firewall solutions Experience with networking and switching protocols and infrastructure services, able to troubleshoot and identify DNS, DHCP, Wi-Fi protocols, NTP, SNMP, routing, switching, and firewall issues affecting connectivity of applications and services Knowledge and understanding of network infrastructure components such as Routers, Switches, IDS, IPS, NAC, VPN Gateways, Wireless APs etc. E: vishal.kushwah@tekinspirations.com #FirewallEngineer #Networkengineer #PaloAlto #PCNSE #PANOS #NextGen #AppID #UserID #ContentID #URLFiltering #ThreatPrevention, #WildFire #VirtualWire #VirtualSystem #GlobalProtect #NATPolicies #SecurityProfiles #Inbound #SSL #Decryption #OutboundSSLDecryption #FileBlocking #DataFiltering #ZeroTrust #DNS #DHCP #WiFi #protocols, #NTP #SNMP #routing #switching #IDS, #IPS, #NAC, #VPNGateways #WirelessAPs #Crownsville
To view or add a comment, sign in
-
It's that time again. I am reaching out to my network in hopes of finding my forever home!! I have had the privilege at working at some amazing companies, but all under contract positions--I am currently and deeply doing boxes on hack the box with a concentration on Active Directory exploitation/vulnerabilities. SKILLS Results-oriented IT professional with expertise in ISO 27001 compliance.Windows Active Directory knowledge in mitigation and auditing for vulnerabilities as well as managing. EXPERIENCE L3 Harris, Remote - L3 Analyst 2023 - PRESENT Managing domains & auditing user permissions across platforms Ensuring compliance with regulations & policies Technical Support to end users when needed Federal Communication Commission, FCC - Compliance Analyst 2022 - 2023 Conduct assessments and audits to ensure compliance w ISO 27001 Collaborated with cross-functional teams to develop/update policies Assisted in the development and implementation of risk management strategies to mitigate cybersecurity threats and vulnerabilities Comcast - Network Analyst Infrastructure 2021 - 2022 Ability to work collaboratively in cross-functional teams Patching/bug fixed/security updates Creating and managing domains/offering technical support Software/Application Experience Nmap-Splunk-Wireshark-SCOM-SCCM-VMware-AzureAD-Hyper V-Powershell- Expert Command Prompt-Nessus-Nikto-Burp Suite #cyber #cybersecurity #
To view or add a comment, sign in
-
Update below.
Update: Thank you for your interest in this opportunity. Due to the high volume of applications, this posting is now closed. Follow us to stay updated on future opportunities, and best of luck in your career pursuits. ——— I am happy to share that we are hiring a Cyber Ops Associate (Detection & Response Analyst) to join our Enterprise Security Operations Center (ESOC) team. This role is vital to our 24/7/365 security monitoring efforts, providing real-time detection and response to ensure the protection of our enterprise assets. Position Highlights: Location: Remote within the U.S. for qualified candidates. Shifts: 2nd Shift: Sun-Wed, 2 PM to 12 AM 3rd Shift: Wed-Sat, 10 PM to 8 AM Key Responsibilities: Monitor and analyze security events from diverse sources (SIEM, firewalls, network and host-based intrusion detection, cloud infrastructure, applications, databases, and more). Collaborate with the ESOC team to detect, analyze, and mitigate potential threats. If you have a passion for cybersecurity and thrive in a fast-paced, mission-driven environment, this could be the role for you! #cybersecurityjobs #entryleveljobs #cybersecurity #SOC #SOCAnalyst #SAIC
Cybersecurity Ops Associate
jobs.saic.com
To view or add a comment, sign in