- Proactive Threat Intel and Vulnerability Management: Track threat actors and associated tactics, techniques, and procedures (TTPs)
- Oversee the monitoring of security systems, logs, and alerts to detect and respond to threats.
- Investigate security alerts and incidents and take appropriate mitigation steps.
- Fix vulnerabilities and responsible for creating security incident reports.
- Perform static code analysis to analyze source code for application-s safety and security.
- Provide guidance to system and application owners to remediate identified vulnerabilities.
- Install security software such as firewalls and encryption programs.
- Continuously improve security operations processes and procedures.
- Work with Security Architect to research, evaluate and recommend new security tools, techniques, and technologies in alignment with enterprise IT security strategy.
- Provide security awareness training to program teams and recommend security enhancements.
- Provide periodic risk assessment and penetration tests.
- Ensure security of facilities, equipment, tools, data, networks, and resources throughout the program: design, development, build, test, storage, delivery, operations, and support.
- Periodically conducts a review of each system's audits and monitors corrective actions until all actions are closed.
- Provide support to plan, coordinate, and implement tactical response to improve the organization's information security posture.
- Possess working knowledge of security practices and procedures; knowledge of current security tools available; hardware/software security implementation; different communication protocols; encryption techniques/tools; familiarity with commercial products, current Internet/EC technology, and open-source methodologies.
- Stay current on cloud and cyber security technology trends.
- Ability to write and verbally communicate information security and risk-related concepts effectively to both technical and non- technical audiences.
- Must be US Citizen due to government requirements with the ability to obtain and maintain a DHS Public Trust
- Bachelors and five (5) years or more experience; Masters and three (3) years or more experience; PhD and 0 years related experience
- Strong understanding of security principles, best practices, frameworks, and technologies.
- Fundamental technical knowledge of DHCP, DNS, Active Directory, Windows and Linux OSes, firewalls, networks.
- Experience writing Windows Bash and PowerShell scripting, python, and other scripting languages.
- Good understanding of Security Development Lifecycle.
- Must have strong problem-solving and analytical skills and demonstrate poise and ability to act calmly and competently in high-pressure, high stress situations.
- Familiarity with network and host-based Intrusion Detection Systems (IDSs) and Security Incident Event Management (SIEM)
- Security certification preferred, such as (CISM, CISSP, CSSP Incident Responder Certification)
...Become a part of our caring community and help us put health first**We are seeking a dynamic and results-driven Sales Manager to lead our Agnostic Call Center Sales Team within the IFG line of business. This leader will drive performance through strategic sales planning,...
...Qualified candidates are eligible for a $5,000 sign on bonus!\n UPMC Falk Pharmacy is open between 7:30 am and 5:30 pm, Monday through Friday. This position will rotate weekly between 7:15am -3:45pm and 9:15am -5:45pm.\n We offer a competitive salary, a career ladder...
DescriptionDESCRIPTION:Onset Technologies is looking for a Kronos Techno-Functional Analyst in the NYC (Lower Manhattan area)Required Skills and Qualifications:Bachelor's degree in Computer Science, Information Systems, or Business or equivalent experience.Implementation...
...Manufacturing has been a customer-driven leader in the marine and offshore industries, delivering unwavering quality and an... ...site. # Build customer Relations Required Education & Experience: # High School Diploma, One year certificate from college or...
...Shifts: Day shift which may include different start and end times, Will rotate between clinic and hospital to perform pediatric echo and or congenital adult echo. The primary location will be a clinic setting. Will perform echoes on outpatients and inpatients. Most...