it job board logo
  • Home
  • Find IT Jobs
  • Register CV
  • Register as Employer
  • Contact us
  • Career Advice
  • Recruiting? Post a job
  • Sign in
  • Sign up
  • Home
  • Find IT Jobs
  • Register CV
  • Register as Employer
  • Contact us
  • Career Advice
Sorry, that job is no longer available. Here are some results that may be similar to the job you were looking for.

6 jobs found

Email me jobs like this
Refine Search
Current Search
sr manager security risk analyst iv
Sr Principal Solution Architect, IT Cybersecurity Operations
American Airlines Fort Worth, Texas
Intro Are you ready to explore a world of possibilities, both at work and during your time off? Join our American Airlines family, and you'll travel the world, grow your expertise and become the best version of you. As you embark on a new journey, you'll tackle challenges with flexibility and grace, learning new skills and advancing your career while having the time of your life. Feel free to enrich both your personal and work life and hop on board! Why you'll love this job As one diverse, high-performing team dedicated to technical excellence, you will focus relentlessly on delivering unrivaled digital products that drive a more reliable and profitable airline. In the Cybersecurity Operations domain you will be responsible for the cyber defense of technology assets by managing daily activities, threat detection and incident response, security tool implementation, and team development. You will be expected to balance technical oversight, and business alignment to keep the organization's digital assets safe while ensuring the team is empowered, the systems are resilient, and the entire operation runs smoothly, effectively, and proactively. Additional information about the skills needed for this position is listed in the Skills, Licenses & Certifications section below. What you'll do As noted above, this list is intended to reflect the current job but there may be additional essential functions (and certainly non-essential job functions) that are not referenced. Management will modify the job or require other tasks be performed whenever it is deemed appropriate to do so, observing, of course, any legal obligations including any collective bargaining obligations. Work closely with senior leadership, project managers, and stakeholders to align cybersecurity initiatives with corporate objectives and ensure successful project delivery. Clearly convey project risks and strategies to senior management and stakeholders, ensuring transparency and informed decision-making. Ensure adherence to cybersecurity standards and regulations, providing regular reports on security practices and compliance to stakeholders. Oversee the integration of physical security measures with cybersecurity protocols to ensure comprehensive protection and monitoring of our infrastructure. Effectively coordinate resources and manage project progress, addressing issues and risks to ensure successful delivery. Develop and implement strategies for secure communication protocols to protect sensitive data and ensure the integrity cybersecurity systems. Oversee the operations of the SOC, ensuring it is equipped with the latest tools, technologies, and processes to effectively monitor and respond to security threats. Communicate critical security operations risks, strategies, and incident statuses to executive leadership, and prepare detailed performance reports with insights on compliance, effectiveness, and KPIs. Develop and implement strategies and governance frameworks for security operations, ensuring alignment with organizational goals and regulatory compliance. Mentor a team of cybersecurity professionals within the security operations domain, fostering a culture of excellence and continuous improvement through targeted training and development opportunities. Oversee and guide the planning, execution, and delivery of cybersecurity projects and initiatives, ensuring alignment with corporate objectives. Design and execute advanced threat detection and incident response protocols, ensuring rapid identification, containment, and remediation of security incidents. All you'll need for success Minimum Qualifications- Education & Prior Job Experience Bachelor's degree in Computer Science, Computer Engineering, Technology, Information Systems (CIS/MIS), Engineering, or a related technical discipline, or equivalent experience/training. Extensive job experience in cybersecurity architecture or a related field is required, with a proven track record of designing and implementing secure IT architecture and frameworks. Demonstrated expertise in leading architectural design and strategic oversight in cybersecurity initiatives. 12+ years experience in Cybersecurity Architecture Preferred Qualifications- Education & Prior Job Experience Bachelor's degree in Information Technology, Computer Science, Cybersecurity, or a related field; advanced degree preferred. 5+ years' experience in cybersecurity architecture or related roles. Experience designing and implementing comprehensive security architectures and frameworks. Familiarity with cloud platforms (e.g., AWS, Azure, Google Cloud) and their security features. Experience with regulatory compliance and industry standards (e.g., GDPR, PCI-DSS, ISO 27001). Skills, Licenses & Certifications Relevant certifications including but not limited to Certified Information Systems Security Professional (CISSP); Certified Information Security Manager (CISM); Certified Incident Handler (GCIH); Certified Information Systems Auditor (CISA); Certified Ethical Hacker (CEH); CompTIA Security+; Certified SOC Analyst (CSA) Proficiency in security operations technologies and tools (e.g., SIEM, IDS/IPS, EDR) Expertise in incident response and handling procedures Knowledge of threat intelligence and threat hunting methodologies Understanding of network security principles and practices Familiarity with security frameworks and standards (e.g., NIST, ISO 27001) Ability to analyze security events and incidents to identify root causes and mitigation strategies Strong problem-solving skills to address security challenges and incidents Excellent written and verbal communication skills to articulate security concepts and solutions to technical and non-technical stakeholders Ability to collaborate effectively with cross-functional teams Experience in managing security operations projects, including planning, execution, and monitoring What you'll get Feel free to take advantage of all that American Airlines has to offer: Travel Perks: Ready to explore the world? You, your family and your friends can reach 365 destinations on more than 6,800 daily flights across our global network. Health Benefits: On day one, you'll have access to your health, dental, prescription and vision benefits to help you stay well. And that's just the start, we also offer virtual doctor visits, flexible spending accounts and more. Wellness Programs: We want you to be the best version of yourself - that's why our wellness programs provide you with all the right tools, resources and support you need. 401(k) Program: Available upon hire and, depending on the workgroup, employer contributions to your 401(k) program are available after one year. Additional Benefits: Other great benefits include our Employee Assistance Program, pet insurance and discounts on hotels, cars, cruises and more Feel free to be yourself at American From the team members we hire to the customers we serve, inclusion and diversity are the foundation of the dynamic workforce at American Airlines. Our 20+ Employee Business Resource Groups are focused on connecting our team members to our customers, suppliers, communities and shareholders, helping team members reach their full potential and creating an inclusive work environment to meet and exceed the needs of our diverse world. Are you ready to feel a tremendous sense of pride and satisfaction as you do your part to keep the largest airline in the world running smoothly as we care for people on life's journey? Feel free to be yourself at American.
05/19/2026
Full time
Intro Are you ready to explore a world of possibilities, both at work and during your time off? Join our American Airlines family, and you'll travel the world, grow your expertise and become the best version of you. As you embark on a new journey, you'll tackle challenges with flexibility and grace, learning new skills and advancing your career while having the time of your life. Feel free to enrich both your personal and work life and hop on board! Why you'll love this job As one diverse, high-performing team dedicated to technical excellence, you will focus relentlessly on delivering unrivaled digital products that drive a more reliable and profitable airline. In the Cybersecurity Operations domain you will be responsible for the cyber defense of technology assets by managing daily activities, threat detection and incident response, security tool implementation, and team development. You will be expected to balance technical oversight, and business alignment to keep the organization's digital assets safe while ensuring the team is empowered, the systems are resilient, and the entire operation runs smoothly, effectively, and proactively. Additional information about the skills needed for this position is listed in the Skills, Licenses & Certifications section below. What you'll do As noted above, this list is intended to reflect the current job but there may be additional essential functions (and certainly non-essential job functions) that are not referenced. Management will modify the job or require other tasks be performed whenever it is deemed appropriate to do so, observing, of course, any legal obligations including any collective bargaining obligations. Work closely with senior leadership, project managers, and stakeholders to align cybersecurity initiatives with corporate objectives and ensure successful project delivery. Clearly convey project risks and strategies to senior management and stakeholders, ensuring transparency and informed decision-making. Ensure adherence to cybersecurity standards and regulations, providing regular reports on security practices and compliance to stakeholders. Oversee the integration of physical security measures with cybersecurity protocols to ensure comprehensive protection and monitoring of our infrastructure. Effectively coordinate resources and manage project progress, addressing issues and risks to ensure successful delivery. Develop and implement strategies for secure communication protocols to protect sensitive data and ensure the integrity cybersecurity systems. Oversee the operations of the SOC, ensuring it is equipped with the latest tools, technologies, and processes to effectively monitor and respond to security threats. Communicate critical security operations risks, strategies, and incident statuses to executive leadership, and prepare detailed performance reports with insights on compliance, effectiveness, and KPIs. Develop and implement strategies and governance frameworks for security operations, ensuring alignment with organizational goals and regulatory compliance. Mentor a team of cybersecurity professionals within the security operations domain, fostering a culture of excellence and continuous improvement through targeted training and development opportunities. Oversee and guide the planning, execution, and delivery of cybersecurity projects and initiatives, ensuring alignment with corporate objectives. Design and execute advanced threat detection and incident response protocols, ensuring rapid identification, containment, and remediation of security incidents. All you'll need for success Minimum Qualifications- Education & Prior Job Experience Bachelor's degree in Computer Science, Computer Engineering, Technology, Information Systems (CIS/MIS), Engineering, or a related technical discipline, or equivalent experience/training. Extensive job experience in cybersecurity architecture or a related field is required, with a proven track record of designing and implementing secure IT architecture and frameworks. Demonstrated expertise in leading architectural design and strategic oversight in cybersecurity initiatives. 12+ years experience in Cybersecurity Architecture Preferred Qualifications- Education & Prior Job Experience Bachelor's degree in Information Technology, Computer Science, Cybersecurity, or a related field; advanced degree preferred. 5+ years' experience in cybersecurity architecture or related roles. Experience designing and implementing comprehensive security architectures and frameworks. Familiarity with cloud platforms (e.g., AWS, Azure, Google Cloud) and their security features. Experience with regulatory compliance and industry standards (e.g., GDPR, PCI-DSS, ISO 27001). Skills, Licenses & Certifications Relevant certifications including but not limited to Certified Information Systems Security Professional (CISSP); Certified Information Security Manager (CISM); Certified Incident Handler (GCIH); Certified Information Systems Auditor (CISA); Certified Ethical Hacker (CEH); CompTIA Security+; Certified SOC Analyst (CSA) Proficiency in security operations technologies and tools (e.g., SIEM, IDS/IPS, EDR) Expertise in incident response and handling procedures Knowledge of threat intelligence and threat hunting methodologies Understanding of network security principles and practices Familiarity with security frameworks and standards (e.g., NIST, ISO 27001) Ability to analyze security events and incidents to identify root causes and mitigation strategies Strong problem-solving skills to address security challenges and incidents Excellent written and verbal communication skills to articulate security concepts and solutions to technical and non-technical stakeholders Ability to collaborate effectively with cross-functional teams Experience in managing security operations projects, including planning, execution, and monitoring What you'll get Feel free to take advantage of all that American Airlines has to offer: Travel Perks: Ready to explore the world? You, your family and your friends can reach 365 destinations on more than 6,800 daily flights across our global network. Health Benefits: On day one, you'll have access to your health, dental, prescription and vision benefits to help you stay well. And that's just the start, we also offer virtual doctor visits, flexible spending accounts and more. Wellness Programs: We want you to be the best version of yourself - that's why our wellness programs provide you with all the right tools, resources and support you need. 401(k) Program: Available upon hire and, depending on the workgroup, employer contributions to your 401(k) program are available after one year. Additional Benefits: Other great benefits include our Employee Assistance Program, pet insurance and discounts on hotels, cars, cruises and more Feel free to be yourself at American From the team members we hire to the customers we serve, inclusion and diversity are the foundation of the dynamic workforce at American Airlines. Our 20+ Employee Business Resource Groups are focused on connecting our team members to our customers, suppliers, communities and shareholders, helping team members reach their full potential and creating an inclusive work environment to meet and exceed the needs of our diverse world. Are you ready to feel a tremendous sense of pride and satisfaction as you do your part to keep the largest airline in the world running smoothly as we care for people on life's journey? Feel free to be yourself at American.
Network Analyst - Networking & Operations/Information Technology - Central Services
Yosemite Community College District Modesto, California
Job Title: Network Analyst - Networking & Operations/Information Technology - Central Services Site: : Yosemite Community College District/Central Services Salary Range / Other: $7,516 to $9,591 per month- Range 50 ( Classified Salary Schedule) Appointments are hired at the first step of the range. The second step is paid after the first year of satisfactory service with subsequent steps annually thereafter to a maximum sixth step. Workplace: Central Services/Modesto Junior College; Modesto, CA 40 hours per week, 12 months per year Monday through Friday: 8:00am - 5:00pm (Some evening and weekend hours may be required) Benefits : The District currently pays for a health options for the employee and dependents. Employees may elect to pay a premium for a higher health option. Vision care and dental insurance premiums for the employee and dependents is District paid. Income protection and life insurance premiums for the employee are also District paid. The estimated cost of District provided benefits (health, dental, vision, and life) is $24,408 annually. Job Description: DEFINITIONUnder direction, performs moderately complex professional information technology duties related to network design, development, installation, analysis, testing, implementation, documentation and maintenance; participates in complex cross functional network-related projects; facilitates network interfaces with data communications and database systems; assists users with questions regarding network operations and procedures; and performs related work as assigned.DISTINGUISHING CHARACTERISTICSThis is the full working, journey-level analyst class in the Network Systems Series within the Yosemite Community College District (YCCD). Incumbents in this class perform the full range of moderately complex professional analytical duties emphasizing network design, development, installation, analysis, testing, implementation, documentation and maintenance, as well as the network troubleshooting and administration. Incumbents utilize professional knowledge of network systems and technology to make decisions and complete assignments.SUPERVISION RECEIVED AND EXERCISEDIncumbents in this class work under the direction of a manager or senior manager, receiving occasional supervision while working toward a definite objective that requires use of a wide range of procedures. Incumbents plan and/or determine specific procedures or equipment required to meet assigned objectives and solve non-routine problems, referring only unusual matters to a supervisor.An incumbent in this class does not directly lead or supervise other full-time employees, but may assign, direct and/or monitor the work of subordinate full time, part time, and/or student employees on a project or assignment basis. Minimum Qualifications: MINIMUM QUALIFICATIONS To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The knowledge and ability requirements are representative of essential duties. Reasonable accommodation may be made to enable individuals with disabilities to perform the essential functions of the position. Knowledge of: Network principles, protocols, concepts, practices and terminologies. Principles and practices pertaining to the following areas: TCP/IP, Gigabit/Fast Ethernet Switches, IOS, LAN, VLAN, WAN, HSRP, OSPF, H.323, SNMP, 802.1X and 802.11x, Wi-Fi, PIX Firewall, Cisco VPN, T1, DS3, FDDI, RADIUS, TACACS+, Network intrusion detection/prevention, Traffic Analysis, packet tracing, security implementation, network design, network performance analysis, troubleshooting and analyzing network packets using various networking tools. The use of various Cisco networking devices. Principles and methods of administering OS architectures such as Unix, Linux, Macintosh and Microsoft Server systems and their administrative requirements. Contemporary business software, including database and report writing software. Methods, techniques, and procedures of modern computer and computer programming design, development and implementation. Professional methods and techniques of network and information system troubleshooting, maintenance, development, enhancement, and testing. Ability to: Participate in the design and implementation of complex network systems using provided documentation and on-the-job effort. Prepare flow charts and documentation pertaining to design steps and logic with speed and accuracy. Analyze network needs and problems, and develop clear and logical solutions. Participate in complex information technology projects, including vendor communications and equipment procurement. Prepare documentation and operating procedures in a clear and concise manner. Communicate effectively, both orally and in writing. Establish and maintain effective working relationships with those contacted in the course of the work. Education and Experience: Education and Experience: Any combination of education, experience and/or training that would likely provide the above-required knowledge, skills and abilities is qualifying. Typical background patterns that would provide the knowledge, skills and abilities are: Education: Possession of a bachelor's degree from an accredited college or university, with major course work in computer science or a closely related field. Experience:One year performing professional information technology duties that emphasized network design, development, installation, analysis, testing, implementation, documentation and maintenance. Example of Duties: ESSENTIAL DUTIES Provides moderately complex professional support duties related to the design, implementation, maintenance and monitoring of the District's network infrastructure. Installs, configures and maintain network infrastructure devices that include, but are not limited to hardware firewalls, routers, switches, concentrators, and DNS/DHCP servers; installs and configures server and personal computer hardware, software, programs and applications as needed to support network activities. Implements approved security procedures. Analyzes network functions to identify reliability and efficiency issues; monitors servers and network equipment for response time, problem prevention, performance and resource utilization; implements actions to overcome result deviations. Assesses network security risks and implements proactive measures to maintain network integrity. Participates in complex network expansion and development projects and may serve as project coordinator on moderately complex projects; evaluates and recommends network software and hardware solutions; communicates with vendors and/or other agencies to gather information; researches options and analyzes costs/benefits issues; analyzes integration issues; determines requirements for new equipment installation; prepares reports and recommendations regarding the purchase of hardware, software and peripherals and coordinates purchasing activities as assigned. Assesses institutional needs and recommends new technologies to provide analysis and solutions needed for the District network; evaluates and recommends equipment, tools, and utilities to improve the quality of support for network services. Develops and prepares technical standards, operational procedures and system performance objectives. Participates in large-scale implementation of new processes, upgrades and equipment rollouts; helps plan and implement enterprise-wide network upgrade strategies and procedures. Performs technical administrative duties; attends meetings; serves on committees and task forces; independently responds to various inquiries and correspondence; prepares information and data requested for administrative review; maintains information system documentation; prepares reports, files, correspondence and other documents. Performs other related duties as assigned. Licenses and Certificates: Licenses and Certificates: Depending upon assignment, a valid license to drive in California may be required. Valid registration as a Cisco Certified Network Associate (CCNA) is desirable. Physical and Mental Standards: Physical and Mental Standards: Mobility: ability to sit for long periods , and move about an office; ability to occasionally stand, bend, crawl and work in tight spaces; ability to frequently reach above and below desk level. Dexterity: fine manipulation sufficient to operate a computer keyboard, make wiring connections, handle individual papers, write and take notes. Lifting: frequent lifting of papers, files, equipment and material weighing up to 25 pounds; occasional lifting of items up to 50 pounds. Visual Requirements: close vision sufficient to read files, documents, and computer screens and do close-up work; ability to adjust focus frequently. Hearing/Talking: ability to hear normal speech, speak and hear on the telephone, and speak in person. Emotional/Psychological Factors: ability to make decisions and concentrate; frequent contact with others including some public contact; frequent deadlines and time-limited assignments. Reasonable accommodation may be made to enable individuals with disabilities to perform the essential functions of the position. TYPICAL WORKING CONDITIONS . click apply for full job details
01/16/2026
Full time
Job Title: Network Analyst - Networking & Operations/Information Technology - Central Services Site: : Yosemite Community College District/Central Services Salary Range / Other: $7,516 to $9,591 per month- Range 50 ( Classified Salary Schedule) Appointments are hired at the first step of the range. The second step is paid after the first year of satisfactory service with subsequent steps annually thereafter to a maximum sixth step. Workplace: Central Services/Modesto Junior College; Modesto, CA 40 hours per week, 12 months per year Monday through Friday: 8:00am - 5:00pm (Some evening and weekend hours may be required) Benefits : The District currently pays for a health options for the employee and dependents. Employees may elect to pay a premium for a higher health option. Vision care and dental insurance premiums for the employee and dependents is District paid. Income protection and life insurance premiums for the employee are also District paid. The estimated cost of District provided benefits (health, dental, vision, and life) is $24,408 annually. Job Description: DEFINITIONUnder direction, performs moderately complex professional information technology duties related to network design, development, installation, analysis, testing, implementation, documentation and maintenance; participates in complex cross functional network-related projects; facilitates network interfaces with data communications and database systems; assists users with questions regarding network operations and procedures; and performs related work as assigned.DISTINGUISHING CHARACTERISTICSThis is the full working, journey-level analyst class in the Network Systems Series within the Yosemite Community College District (YCCD). Incumbents in this class perform the full range of moderately complex professional analytical duties emphasizing network design, development, installation, analysis, testing, implementation, documentation and maintenance, as well as the network troubleshooting and administration. Incumbents utilize professional knowledge of network systems and technology to make decisions and complete assignments.SUPERVISION RECEIVED AND EXERCISEDIncumbents in this class work under the direction of a manager or senior manager, receiving occasional supervision while working toward a definite objective that requires use of a wide range of procedures. Incumbents plan and/or determine specific procedures or equipment required to meet assigned objectives and solve non-routine problems, referring only unusual matters to a supervisor.An incumbent in this class does not directly lead or supervise other full-time employees, but may assign, direct and/or monitor the work of subordinate full time, part time, and/or student employees on a project or assignment basis. Minimum Qualifications: MINIMUM QUALIFICATIONS To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The knowledge and ability requirements are representative of essential duties. Reasonable accommodation may be made to enable individuals with disabilities to perform the essential functions of the position. Knowledge of: Network principles, protocols, concepts, practices and terminologies. Principles and practices pertaining to the following areas: TCP/IP, Gigabit/Fast Ethernet Switches, IOS, LAN, VLAN, WAN, HSRP, OSPF, H.323, SNMP, 802.1X and 802.11x, Wi-Fi, PIX Firewall, Cisco VPN, T1, DS3, FDDI, RADIUS, TACACS+, Network intrusion detection/prevention, Traffic Analysis, packet tracing, security implementation, network design, network performance analysis, troubleshooting and analyzing network packets using various networking tools. The use of various Cisco networking devices. Principles and methods of administering OS architectures such as Unix, Linux, Macintosh and Microsoft Server systems and their administrative requirements. Contemporary business software, including database and report writing software. Methods, techniques, and procedures of modern computer and computer programming design, development and implementation. Professional methods and techniques of network and information system troubleshooting, maintenance, development, enhancement, and testing. Ability to: Participate in the design and implementation of complex network systems using provided documentation and on-the-job effort. Prepare flow charts and documentation pertaining to design steps and logic with speed and accuracy. Analyze network needs and problems, and develop clear and logical solutions. Participate in complex information technology projects, including vendor communications and equipment procurement. Prepare documentation and operating procedures in a clear and concise manner. Communicate effectively, both orally and in writing. Establish and maintain effective working relationships with those contacted in the course of the work. Education and Experience: Education and Experience: Any combination of education, experience and/or training that would likely provide the above-required knowledge, skills and abilities is qualifying. Typical background patterns that would provide the knowledge, skills and abilities are: Education: Possession of a bachelor's degree from an accredited college or university, with major course work in computer science or a closely related field. Experience:One year performing professional information technology duties that emphasized network design, development, installation, analysis, testing, implementation, documentation and maintenance. Example of Duties: ESSENTIAL DUTIES Provides moderately complex professional support duties related to the design, implementation, maintenance and monitoring of the District's network infrastructure. Installs, configures and maintain network infrastructure devices that include, but are not limited to hardware firewalls, routers, switches, concentrators, and DNS/DHCP servers; installs and configures server and personal computer hardware, software, programs and applications as needed to support network activities. Implements approved security procedures. Analyzes network functions to identify reliability and efficiency issues; monitors servers and network equipment for response time, problem prevention, performance and resource utilization; implements actions to overcome result deviations. Assesses network security risks and implements proactive measures to maintain network integrity. Participates in complex network expansion and development projects and may serve as project coordinator on moderately complex projects; evaluates and recommends network software and hardware solutions; communicates with vendors and/or other agencies to gather information; researches options and analyzes costs/benefits issues; analyzes integration issues; determines requirements for new equipment installation; prepares reports and recommendations regarding the purchase of hardware, software and peripherals and coordinates purchasing activities as assigned. Assesses institutional needs and recommends new technologies to provide analysis and solutions needed for the District network; evaluates and recommends equipment, tools, and utilities to improve the quality of support for network services. Develops and prepares technical standards, operational procedures and system performance objectives. Participates in large-scale implementation of new processes, upgrades and equipment rollouts; helps plan and implement enterprise-wide network upgrade strategies and procedures. Performs technical administrative duties; attends meetings; serves on committees and task forces; independently responds to various inquiries and correspondence; prepares information and data requested for administrative review; maintains information system documentation; prepares reports, files, correspondence and other documents. Performs other related duties as assigned. Licenses and Certificates: Licenses and Certificates: Depending upon assignment, a valid license to drive in California may be required. Valid registration as a Cisco Certified Network Associate (CCNA) is desirable. Physical and Mental Standards: Physical and Mental Standards: Mobility: ability to sit for long periods , and move about an office; ability to occasionally stand, bend, crawl and work in tight spaces; ability to frequently reach above and below desk level. Dexterity: fine manipulation sufficient to operate a computer keyboard, make wiring connections, handle individual papers, write and take notes. Lifting: frequent lifting of papers, files, equipment and material weighing up to 25 pounds; occasional lifting of items up to 50 pounds. Visual Requirements: close vision sufficient to read files, documents, and computer screens and do close-up work; ability to adjust focus frequently. Hearing/Talking: ability to hear normal speech, speak and hear on the telephone, and speak in person. Emotional/Psychological Factors: ability to make decisions and concentrate; frequent contact with others including some public contact; frequent deadlines and time-limited assignments. Reasonable accommodation may be made to enable individuals with disabilities to perform the essential functions of the position. TYPICAL WORKING CONDITIONS . click apply for full job details
Cybersecurity Manager $78/hr Srinivasa Kandi
VALIANT TECHNOLOGIES LLC Richardson, Texas
Role: Cybersecurity ManagerBill Rate: $78/hour C2CLocation: Richardson,TXDuration: 12+ months/ long-term Interview Criteria: Telephonic + ZoomDirect Client Requirement Position Overview for the Cybersecurity Manager Position Overview for the Cybersecurity Manager: Oversee the implementation, management, and monitoring of enterprise security technologies, including Cisco, Microsoft, and Linux-based systems. Lead cybersecurity initiatives such as threat monitoring, incident response, risk assessments, and security audits. Develop automation scripts and manage identity and access solutions to enhance security posture. Mentor team members and oversee security compliance standards. Collaborate with various teams to ensure the organization's security measures are up-to-date and effective. Requirements for the Cybersecurity Manager: 4+ years of enterprise network experience as a cybersecurity analyst, with proven incident response and threat detection skills 2+ years of management or team leadership experience within cybersecurity 3+ years of hands-on experience managing firewalls, IDS/IPS, SIEM tools, endpoint protection, and vulnerability management platforms Strong understanding of security frameworks and compliance standards (NIST CSF, ISO 27001, HIPAA, PCI-DSS) Certifications such as Security+, SSCP, CySA+, CCNA Security, CISSP, or CISM are a plus. Note: If you are interested, please share your updated resume and suggest the best number & time to connect with you. If your resume is shortlisted, one of our IT Recruiter from my team will contact you as soon as possible Srinivasa Reddy Kandi Client Delivery Manager Valiant Technologies LLC Equal Opportunity Employer: We are an equal opportunity employer. All aspects of employment including the decision to hire, promote, discipline, or discharge, will be based on merit, competence, performance, and business needs. We do not discriminate based on race, color, religion, marital status, age, national origin, ancestry, physical or mental disability, medical condition, pregnancy, genetic information, gender, sexual orientation, gender identity or expression, national origin, citizenship/ immigration status, veteran status, or any other status protected under federal, state, or local law
01/15/2026
Role: Cybersecurity ManagerBill Rate: $78/hour C2CLocation: Richardson,TXDuration: 12+ months/ long-term Interview Criteria: Telephonic + ZoomDirect Client Requirement Position Overview for the Cybersecurity Manager Position Overview for the Cybersecurity Manager: Oversee the implementation, management, and monitoring of enterprise security technologies, including Cisco, Microsoft, and Linux-based systems. Lead cybersecurity initiatives such as threat monitoring, incident response, risk assessments, and security audits. Develop automation scripts and manage identity and access solutions to enhance security posture. Mentor team members and oversee security compliance standards. Collaborate with various teams to ensure the organization's security measures are up-to-date and effective. Requirements for the Cybersecurity Manager: 4+ years of enterprise network experience as a cybersecurity analyst, with proven incident response and threat detection skills 2+ years of management or team leadership experience within cybersecurity 3+ years of hands-on experience managing firewalls, IDS/IPS, SIEM tools, endpoint protection, and vulnerability management platforms Strong understanding of security frameworks and compliance standards (NIST CSF, ISO 27001, HIPAA, PCI-DSS) Certifications such as Security+, SSCP, CySA+, CCNA Security, CISSP, or CISM are a plus. Note: If you are interested, please share your updated resume and suggest the best number & time to connect with you. If your resume is shortlisted, one of our IT Recruiter from my team will contact you as soon as possible Srinivasa Reddy Kandi Client Delivery Manager Valiant Technologies LLC Equal Opportunity Employer: We are an equal opportunity employer. All aspects of employment including the decision to hire, promote, discipline, or discharge, will be based on merit, competence, performance, and business needs. We do not discriminate based on race, color, religion, marital status, age, national origin, ancestry, physical or mental disability, medical condition, pregnancy, genetic information, gender, sexual orientation, gender identity or expression, national origin, citizenship/ immigration status, veteran status, or any other status protected under federal, state, or local law
Senior Endpoint Management Specialist - ITS
InsideHigherEd Albany, New York
Category:: Professional Subscribe:: Department:: Information Technology Services - 02007 Locations:: Albany, NY Posted:: Sep 10, 2025 Closes:: Open Until Filled Type:: Full-time Ref. No.:: WF240297r Position ID:: 192683 About University at Albany: Established in 1844 and designated a University Center of the State University of New York in 1962, the University at Albany's broad mission of excellence in undergraduate and graduate education, research, and public service engages a diverse student body of more than 17,000 students in nine schools and colleges across three campuses. Located in Albany, New York, New York State's capital, the University is convenient to Boston, New York City, and the Adirondacks. Job Description: Information Technology Services (ITS), the central IT provider at the University at Albany, seeks applicants for a Desktop and Mobile Computing (D&MC) Senior Endpoint Management Specialist. ITS manages and supports nearly 7,000 university-owned faculty/staff, classroom, conference room, and research lab desktops and mobile devices. The D&MC Endpoint Management Specialist is a senior position that is key to continuous improvement and delivery of services in this large-scale operation. The D&MC Senior Endpoint Management Specialist is a subject matter expert in desktop and mobile computing and provides technical leadership within service teams. They address and resolve complex and non-standard requests and issues. They develop and maintain strong expertise in enterprise management applications and tools (i.e., Active Directory, MECM, AllSight, Jamf, etc.) and steer the selection and usage of each in achieving ITS' goals and adhering to ITS' principles and standards. The D&MC Senior Endpoint Management Specialist understands the importance of well-defined processes and promoting their adoption across large service teams to successfully manage the pace and volume of work required to support thousands of devices. The successful Senior Endpoint Management Specialist independently identifies process challenges and recommends and assists in implementing actionable improvements and solutions to the D&MC Manager. They monitor the flow of real-time work and act to address operational problems. Under the leadership and direction of the D&MC Manager, the Senior Endpoint Management Specialist is responsible for ensuring internal and customer-facing documentation is created, accurate, and updated regularly. They understand the value of documentation in promoting clarity and cohesion for large service teams. Primary Responsibilities: Enterprise management applications and tools (i.e., Active Directory, MECM, AllSight, Jamf, etc.) Ensure that all enterprise desktop and mobile device management applications and tools are maintained, and versions updated in a timely fashion and adhere to ITS standards, controls, security policies and procedures. Build and maintain advanced technical expertise in ITS' enterprise desktop and mobile device management applications and tools. Stay abreast of advances in the field and steer technical direction in D&MC, following ITS' architecture review protocols. Asset inventory maintenance, cyclical planning, budgeting, and related projects Develop and maintain a strong understanding of how the inventory data structure, operational processes to add/remove/update records, inventory dashboards and reports, and project workload planning all play a role in planning cyclic replacement of all D&MC assets. Regularly report on anomalies and potential problems in the asset inventories for all supported services and work to resolve. Maintain, provide reports and update replacement schedule and replacement cost fields in the asset inventories for all supported service areas to support budgeting and planning processes. Endpoints service standards, efficient operations and consistent user experiences Provide subject matter expertise, oversee and continuously evaluate hardware and software deployment and support processes, their effectiveness and recommend improvements. Determine and document the standard workstation and printer models and configurations for various use cases including fac/staff, classrooms, conference rooms, research labs; refresh standards, as needed. Oversee the internal and external documentation and maintain all approved desktop and mobile computing standards for the University. Regularly report on workstation hardware, operating systems, software, and printers at risk or outside of defined standards and work to resolve. Determine and document operating system versions used for deployments; determine and manage upgrade cycles. Provide day-to-day operational oversight of operations and service offerings Prepare technical diagrams, configuration logs, process maps, internal and external knowledge base articles, and other documentation, as needed. Provide subject matter expertise, technical support and collaborate across ITS teams and on projects to identify problems, devise creative solutions, and implement proposed recommendations. Other reasonable duties as assigned. Project Management Serve as Project Manager on D&MC projects. Actively participate, as needed, in ITS projects related to your service(s). Functional and Supervisory Relationships: Reports to: Manager of Desktop and Mobile Computing Services Supervises the following positions: None Interacts with: ITS staff; faculty and staff in academic, research, and business units; external vendors/contractors/consultants; peer institutions Job Requirements: Excellent interpersonal, oral, and written communication skills. Organize work, prioritize tasks, and manage multiple and changing priorities. Provide scheduled support and consultation outside normal business hours, including occasional evenings, holidays, or weekends, within reasonable professional obligation and expectation. Report to campus in-person on Mondays, Wednesdays, Fridays, and as needed. This position is eligible to telecommute on Tuesdays and Thursdays, following a probationary period and with supervisor approval. Requirements: Minimum Qualifications: A bachelor's degree from a college or university accredited by a U.S. Department of Education (DOE) or internationally recognized accrediting organization, or at least 6 years of full-time professional experience related to the role. Minimum of 3 years' experience building operating systems and application deployments in a large, complex environment. Minimum of 3 years' experience documenting deployment processes that can be replicated/implemented by field staff. Minimum of 3 years' experience supporting desktops and mobile devices, IT operations, or systems administration addressing and resolving issues escalated for higher level support. Applicants must demonstrate an ability to develop inclusive and equitable relationships within our diverse campus community Applicants must demonstrate an ability to support diversity, equity, access, inclusion, and belonging relative to their role Preferred Qualifications: Minimum of 3 years' experience using Microsoft Endpoint Configuration Manager (MECM); for operating system deployments, application packaging and deployment, and workstation security/patch management. Minimum of 3 years' experience using and maintaining active directory and group policy. Minimum of 3 years' experience developing and continuously maintaining technical documentation within a knowledge base repository. Experience configuring and managing a Microsoft mobile device management (MDM) system such as Microsoft Intune. Experience configuring and managing an Apple mobile device management (MDM) system such as Jamf Pro. Experience using PowerShell (or similar scripting language) to manage workstations, users, AD. Experience using and supporting workstations running Linux operating systems. Working Environment: Typical office environment Additional Information: Professional Rank and Salary Grade: Senior Programmer/Analyst, SL-4, $85,000-$95,000 Special Note: Visa sponsorship is not available for this position. If you currently need sponsorship or will need it in the future to maintain employment authorization, you do not meet eligibility requirements. Additionally, please note that UAlbany is not an E-Verify employer. The Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act, or Clery Act, mandates that all Title IV institutions, without exception, prepare, publish and distribute an Annual Security Report. This report consists of two basic parts: disclosure of the University's crime statistics for the past three years; and disclosures regarding the University's current campus security policies. The University at Albany's Annual Security Report is available in portable document format PDF by clicking this link Pursuant to NYS Labor Law 194-A, no State entity, as defined by the Law, is permitted to rely on, orally or in writing seek, request, or require in any form, that an applicant for employment provide his or her current wage, or salary history as a condition to be interviewed . click apply for full job details
01/14/2026
Full time
Category:: Professional Subscribe:: Department:: Information Technology Services - 02007 Locations:: Albany, NY Posted:: Sep 10, 2025 Closes:: Open Until Filled Type:: Full-time Ref. No.:: WF240297r Position ID:: 192683 About University at Albany: Established in 1844 and designated a University Center of the State University of New York in 1962, the University at Albany's broad mission of excellence in undergraduate and graduate education, research, and public service engages a diverse student body of more than 17,000 students in nine schools and colleges across three campuses. Located in Albany, New York, New York State's capital, the University is convenient to Boston, New York City, and the Adirondacks. Job Description: Information Technology Services (ITS), the central IT provider at the University at Albany, seeks applicants for a Desktop and Mobile Computing (D&MC) Senior Endpoint Management Specialist. ITS manages and supports nearly 7,000 university-owned faculty/staff, classroom, conference room, and research lab desktops and mobile devices. The D&MC Endpoint Management Specialist is a senior position that is key to continuous improvement and delivery of services in this large-scale operation. The D&MC Senior Endpoint Management Specialist is a subject matter expert in desktop and mobile computing and provides technical leadership within service teams. They address and resolve complex and non-standard requests and issues. They develop and maintain strong expertise in enterprise management applications and tools (i.e., Active Directory, MECM, AllSight, Jamf, etc.) and steer the selection and usage of each in achieving ITS' goals and adhering to ITS' principles and standards. The D&MC Senior Endpoint Management Specialist understands the importance of well-defined processes and promoting their adoption across large service teams to successfully manage the pace and volume of work required to support thousands of devices. The successful Senior Endpoint Management Specialist independently identifies process challenges and recommends and assists in implementing actionable improvements and solutions to the D&MC Manager. They monitor the flow of real-time work and act to address operational problems. Under the leadership and direction of the D&MC Manager, the Senior Endpoint Management Specialist is responsible for ensuring internal and customer-facing documentation is created, accurate, and updated regularly. They understand the value of documentation in promoting clarity and cohesion for large service teams. Primary Responsibilities: Enterprise management applications and tools (i.e., Active Directory, MECM, AllSight, Jamf, etc.) Ensure that all enterprise desktop and mobile device management applications and tools are maintained, and versions updated in a timely fashion and adhere to ITS standards, controls, security policies and procedures. Build and maintain advanced technical expertise in ITS' enterprise desktop and mobile device management applications and tools. Stay abreast of advances in the field and steer technical direction in D&MC, following ITS' architecture review protocols. Asset inventory maintenance, cyclical planning, budgeting, and related projects Develop and maintain a strong understanding of how the inventory data structure, operational processes to add/remove/update records, inventory dashboards and reports, and project workload planning all play a role in planning cyclic replacement of all D&MC assets. Regularly report on anomalies and potential problems in the asset inventories for all supported services and work to resolve. Maintain, provide reports and update replacement schedule and replacement cost fields in the asset inventories for all supported service areas to support budgeting and planning processes. Endpoints service standards, efficient operations and consistent user experiences Provide subject matter expertise, oversee and continuously evaluate hardware and software deployment and support processes, their effectiveness and recommend improvements. Determine and document the standard workstation and printer models and configurations for various use cases including fac/staff, classrooms, conference rooms, research labs; refresh standards, as needed. Oversee the internal and external documentation and maintain all approved desktop and mobile computing standards for the University. Regularly report on workstation hardware, operating systems, software, and printers at risk or outside of defined standards and work to resolve. Determine and document operating system versions used for deployments; determine and manage upgrade cycles. Provide day-to-day operational oversight of operations and service offerings Prepare technical diagrams, configuration logs, process maps, internal and external knowledge base articles, and other documentation, as needed. Provide subject matter expertise, technical support and collaborate across ITS teams and on projects to identify problems, devise creative solutions, and implement proposed recommendations. Other reasonable duties as assigned. Project Management Serve as Project Manager on D&MC projects. Actively participate, as needed, in ITS projects related to your service(s). Functional and Supervisory Relationships: Reports to: Manager of Desktop and Mobile Computing Services Supervises the following positions: None Interacts with: ITS staff; faculty and staff in academic, research, and business units; external vendors/contractors/consultants; peer institutions Job Requirements: Excellent interpersonal, oral, and written communication skills. Organize work, prioritize tasks, and manage multiple and changing priorities. Provide scheduled support and consultation outside normal business hours, including occasional evenings, holidays, or weekends, within reasonable professional obligation and expectation. Report to campus in-person on Mondays, Wednesdays, Fridays, and as needed. This position is eligible to telecommute on Tuesdays and Thursdays, following a probationary period and with supervisor approval. Requirements: Minimum Qualifications: A bachelor's degree from a college or university accredited by a U.S. Department of Education (DOE) or internationally recognized accrediting organization, or at least 6 years of full-time professional experience related to the role. Minimum of 3 years' experience building operating systems and application deployments in a large, complex environment. Minimum of 3 years' experience documenting deployment processes that can be replicated/implemented by field staff. Minimum of 3 years' experience supporting desktops and mobile devices, IT operations, or systems administration addressing and resolving issues escalated for higher level support. Applicants must demonstrate an ability to develop inclusive and equitable relationships within our diverse campus community Applicants must demonstrate an ability to support diversity, equity, access, inclusion, and belonging relative to their role Preferred Qualifications: Minimum of 3 years' experience using Microsoft Endpoint Configuration Manager (MECM); for operating system deployments, application packaging and deployment, and workstation security/patch management. Minimum of 3 years' experience using and maintaining active directory and group policy. Minimum of 3 years' experience developing and continuously maintaining technical documentation within a knowledge base repository. Experience configuring and managing a Microsoft mobile device management (MDM) system such as Microsoft Intune. Experience configuring and managing an Apple mobile device management (MDM) system such as Jamf Pro. Experience using PowerShell (or similar scripting language) to manage workstations, users, AD. Experience using and supporting workstations running Linux operating systems. Working Environment: Typical office environment Additional Information: Professional Rank and Salary Grade: Senior Programmer/Analyst, SL-4, $85,000-$95,000 Special Note: Visa sponsorship is not available for this position. If you currently need sponsorship or will need it in the future to maintain employment authorization, you do not meet eligibility requirements. Additionally, please note that UAlbany is not an E-Verify employer. The Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act, or Clery Act, mandates that all Title IV institutions, without exception, prepare, publish and distribute an Annual Security Report. This report consists of two basic parts: disclosure of the University's crime statistics for the past three years; and disclosures regarding the University's current campus security policies. The University at Albany's Annual Security Report is available in portable document format PDF by clicking this link Pursuant to NYS Labor Law 194-A, no State entity, as defined by the Law, is permitted to rely on, orally or in writing seek, request, or require in any form, that an applicant for employment provide his or her current wage, or salary history as a condition to be interviewed . click apply for full job details
Security Analyst / Pen Tester
Mindlance Dulles, Virginia
Hiring manager is seeking candidates with a pen testing background who knows how to test for OWASP Top 10 web application vulnerabilities and is interested in growing their skills. Responsibilities The Technical Security Analyst position is within client s IT Security group whose mission is to deliver information security solutions and services to protect client information assets, computing infrastructure, applications, and data. The Analyst will work within the vulnerability management team helping to identify and mitigate risks against client. The ideal candidate will have great interest in information security, has hands-on security engineering experience, and be able to come up with creative and unique solutions to security- related problems. The Analyst will perform technical security engineering activities including the following: Perform vulnerability scan, analysis, validation and remediation activities. Perform network and application penetration testing. Validate vulnerabilities discovered through code analysis. Classify and prioritize the risk of new vulnerabilities according to the specifics of client environment's risk level, mitigating factors, and assessment of the impacts of internal and external threats. Engineer application, system and network security solutions to meet security requirements for varied operating environments. Research and assess new threats, vulnerability security trends and security alerts, recommend remedial action. Work with customers to oversee remediation of identified security issues. Perform technical and non-technical compliance activities. Provide security subject matter expertise to client product teams including developers and system administrators. Perform security validation for configuration settings on different systems. Minimum Qualifications Bachelor s degree with a minimum of 1 year of information security work experience. A strong interest in the field of information security. Intermediate scripting, system administration or software engineering background (e.g. Python, Ruby, Javascript, Perl, or Java). Fluent in a variety of web application protocols, operating systems and networking technologies. Strong understanding of common network vulnerabilities, OS vulnerabilities (Linux, Windows and OSX), patching and attack patterns. Intermediate understanding of OWASP Top 10 vulnerabilities such as XSS, XSRF, SQL Injection, Cookie Manipulation among others. Strong analytical, problem solving and engineering skills. Good written and verbal communication skills. Solid organizational skills and strong customer service skills. Experience with parsing / analysis of large data sets (e.g. vulnerability scan results). Desired Qualifications Certified Information Systems Security Professional (CISSP). Certified Ethical Hacker (CEH) Familiarity with Enterprise Vulnerability Management tools such as Rapid 7 Nexpose, Nessus and Qualys. Familiarity with Amazon Web Services (AWS) security.
01/06/2026
Hiring manager is seeking candidates with a pen testing background who knows how to test for OWASP Top 10 web application vulnerabilities and is interested in growing their skills. Responsibilities The Technical Security Analyst position is within client s IT Security group whose mission is to deliver information security solutions and services to protect client information assets, computing infrastructure, applications, and data. The Analyst will work within the vulnerability management team helping to identify and mitigate risks against client. The ideal candidate will have great interest in information security, has hands-on security engineering experience, and be able to come up with creative and unique solutions to security- related problems. The Analyst will perform technical security engineering activities including the following: Perform vulnerability scan, analysis, validation and remediation activities. Perform network and application penetration testing. Validate vulnerabilities discovered through code analysis. Classify and prioritize the risk of new vulnerabilities according to the specifics of client environment's risk level, mitigating factors, and assessment of the impacts of internal and external threats. Engineer application, system and network security solutions to meet security requirements for varied operating environments. Research and assess new threats, vulnerability security trends and security alerts, recommend remedial action. Work with customers to oversee remediation of identified security issues. Perform technical and non-technical compliance activities. Provide security subject matter expertise to client product teams including developers and system administrators. Perform security validation for configuration settings on different systems. Minimum Qualifications Bachelor s degree with a minimum of 1 year of information security work experience. A strong interest in the field of information security. Intermediate scripting, system administration or software engineering background (e.g. Python, Ruby, Javascript, Perl, or Java). Fluent in a variety of web application protocols, operating systems and networking technologies. Strong understanding of common network vulnerabilities, OS vulnerabilities (Linux, Windows and OSX), patching and attack patterns. Intermediate understanding of OWASP Top 10 vulnerabilities such as XSS, XSRF, SQL Injection, Cookie Manipulation among others. Strong analytical, problem solving and engineering skills. Good written and verbal communication skills. Solid organizational skills and strong customer service skills. Experience with parsing / analysis of large data sets (e.g. vulnerability scan results). Desired Qualifications Certified Information Systems Security Professional (CISSP). Certified Ethical Hacker (CEH) Familiarity with Enterprise Vulnerability Management tools such as Rapid 7 Nexpose, Nessus and Qualys. Familiarity with Amazon Web Services (AWS) security.
Cyber Security Analyst $88/hr Srinivasa Reddy Kandi
VALIANT TECHNOLOGIES LLC Warren, New Jersey
Role: - Cyber Security Analyst Bill Rate: $88/hour C2C Location: Warren, NJ Duration: 12+ months/ long-term Interview Criteria: Telephonic + Skype Direct Client Requirement Job details: 1. Demonstrated experience in cyber security or related IT field. 2. Demonstrated experience with adversarial tactics, techniques, & procedures (TTPs 3. Demonstrated experience with computer attack methods and system exploitation techniques. 4. Demonstrated experience with cyber security principles for Linux, Windows, virtual platforms, networking, and Cloud. 5. Demonstrated experience with network architectures and fundamentals. 6. Demonstrated experience developing risk management methodologies. 7. Demonstrated experience analyzing test results to develop risk and threat mitigation plans. 8. Demonstrated experience with market-leading vulnerability management tools including the ability to deploy, configure, and run these tools. 9. Demonstrated experience with vulnerability concepts and prevalent vulnerability types such asSQL injection, cross-site scripting (XSS), cross-site request forgery (CSRF), path traversals, denial of service (DoS), buffer overflows, command injection, race conditions, open redirects, privilege escalation, authentication bypasses, XML External Entity (XXE) attacks and similar. 10. Demonstrated experience with privilege and high/low trust boundaries and what defines a vulnerability vs. weakness. 11. Demonstrated experience with vulnerability and risk scoring frameworks and methodologies such as CVSSv2 and CVSSv3. 12. Demonstrated experience with vulnerability repositories (NVD, CVE MITRE, and VULdb) and exploitation techniques (MITRE ATT&CK and DEFEND 13. Demonstrated experience with web application (OWASP) and OS-level vulnerability categories and documentation. 14. Demonstrated experience communicating how an attacker would exploit vulnerabilities and the types of attacks they could be used for. 15. Demonstrated experience with the general threat landscape of an IT network and how vulnerabilities and exploitation of them impact it. Note: If you are interested, please share your updated resume and suggest the best number & time to connect with you. If your resume is shortlisted, one of our ITRecruiter from my team will contact you as soon as possible Srinivasa Reddy Kandi Client Delivery Manager Valiant Technologies LLC Equal Opportunity Employer: We are an equal opportunity employer. All aspects of employment including the decision to hire, promote, discipline, or discharge, will be based on merit, competence, performance, and business needs. We do not discriminate based on race, color, religion, marital status, age, national origin, ancestry, physical or mental disability, medical condition, pregnancy, genetic information, gender, sexual orientation, gender identity or expression, national origin, citizenship/ immigration status, veteran status, or any other status protected under federal, state, or local law
12/17/2025
Role: - Cyber Security Analyst Bill Rate: $88/hour C2C Location: Warren, NJ Duration: 12+ months/ long-term Interview Criteria: Telephonic + Skype Direct Client Requirement Job details: 1. Demonstrated experience in cyber security or related IT field. 2. Demonstrated experience with adversarial tactics, techniques, & procedures (TTPs 3. Demonstrated experience with computer attack methods and system exploitation techniques. 4. Demonstrated experience with cyber security principles for Linux, Windows, virtual platforms, networking, and Cloud. 5. Demonstrated experience with network architectures and fundamentals. 6. Demonstrated experience developing risk management methodologies. 7. Demonstrated experience analyzing test results to develop risk and threat mitigation plans. 8. Demonstrated experience with market-leading vulnerability management tools including the ability to deploy, configure, and run these tools. 9. Demonstrated experience with vulnerability concepts and prevalent vulnerability types such asSQL injection, cross-site scripting (XSS), cross-site request forgery (CSRF), path traversals, denial of service (DoS), buffer overflows, command injection, race conditions, open redirects, privilege escalation, authentication bypasses, XML External Entity (XXE) attacks and similar. 10. Demonstrated experience with privilege and high/low trust boundaries and what defines a vulnerability vs. weakness. 11. Demonstrated experience with vulnerability and risk scoring frameworks and methodologies such as CVSSv2 and CVSSv3. 12. Demonstrated experience with vulnerability repositories (NVD, CVE MITRE, and VULdb) and exploitation techniques (MITRE ATT&CK and DEFEND 13. Demonstrated experience with web application (OWASP) and OS-level vulnerability categories and documentation. 14. Demonstrated experience communicating how an attacker would exploit vulnerabilities and the types of attacks they could be used for. 15. Demonstrated experience with the general threat landscape of an IT network and how vulnerabilities and exploitation of them impact it. Note: If you are interested, please share your updated resume and suggest the best number & time to connect with you. If your resume is shortlisted, one of our ITRecruiter from my team will contact you as soon as possible Srinivasa Reddy Kandi Client Delivery Manager Valiant Technologies LLC Equal Opportunity Employer: We are an equal opportunity employer. All aspects of employment including the decision to hire, promote, discipline, or discharge, will be based on merit, competence, performance, and business needs. We do not discriminate based on race, color, religion, marital status, age, national origin, ancestry, physical or mental disability, medical condition, pregnancy, genetic information, gender, sexual orientation, gender identity or expression, national origin, citizenship/ immigration status, veteran status, or any other status protected under federal, state, or local law

Modal Window

  • Home
  • Contact
  • About Us
  • FAQs
  • Terms & Conditions
  • Privacy
  • Employer
  • Post a Job
  • Search Resumes
  • Sign in
  • Job Seeker
  • Find Jobs
  • Create Resume
  • Sign in
  • IT blog
  • Facebook
  • Twitter
  • LinkedIn
  • Youtube
© 2008-2026 IT Job Board