Fulltime Information Security Analyst openings in Miami, United States on September 08, 2022

BXTI – Network Security Analyst at Blackstone

Location: Miami

Blackstone is the world’s largest alternative asset manager. We seek to create positive economic impact and long-term value for our investors, the companies we invest in, and the communities in which we work. We do this by using extraordinary people and flexible capital to help companies solve problems. Our $915 billion in assets under management include investment vehicles focused on private equity, real estate, public debt and equity, infrastructure, life sciences, growth equity, opportunistic, non-investment grade credit, real assets and secondary funds, all on a global basis. Further information is available at www.blackstone.com. Follow @blackstone on LinkedIn, Twitter, and Instagram.

Blackstone Technology & Innovations

Blackstone Technology & Innovations (BXTi) is the technology team at the core of each of Blackstone’s businesses and new growth initiatives. Serving both internal and external clients, we work to build the next generation of systems that manage risk, create efficiency and improve transparency within the firm and across our broad community of investors and portfolio companies.

BXTi is nimble and entrepreneurial – our open, iterative design processes and rapid pace of development mean that everyone on the team has the opportunity to make an impact from day one. We are problem solvers who can take projects from idea to implementation. We believe in active mentoring and developing excellence. We collaborate to find the best answers for our customers and for Blackstone. We are critical to the firm maintaining its competitive edge.

Business Unit Overview

Blackstone Technology & Innovations (BXTI) is the technology team at the core of each of Blackstone’s businesses and new growth initiatives. Serving both internal and external clients, we work to build the next generation of systems that manage risk, create efficiency and improve transparency within the firm and across our broad community of investors and portfolio companies.

BXTI is nimble and entrepreneurial – our open, iterative design processes and rapid pace of development mean that everyone on the team has the opportunity to make an impact from day one. We are problem solvers who can take projects from idea to implementation. We believe in active mentoring and developing excellence. We collaborate to find the best answers for our customers and for Blackstone. We are critical to the firm maintaining its competitive edge.

Job Title

Network Security Analyst

Job Description

The Network Security Analyst is an essential member of the global Network Security team. They will work closely with Network engineers and the outsourced COE team to ensure the safety, operation, reliability and security of Blackstone’s global network.

Responsibilities

The Network Security Analyst provides operational support & analysis for a diverse set of security events. The Security Operations Analyst will be the first point of contact with users/ peers/ vendors and will determine the type & severity of incidents and recommend appropriate actions, including escalation to senior staff.
• Provide Level 1, 2, and 3 support for day to day network security incidents and tickets.
• Working with off-shore COE Team provide oversight of Global Security network 24/365
• Implement/ change/ remove security rules as needed across proxies, firewalls and web filtering devices as needed
• Manage network security policy administration on various network security products.
• Participate in security incident response through in-depth, technical (log, forensic, malware, packet, etc.) analysis
• Collect security incident metrics & data to enable reporting to senior management

Qualifications
• 3+ years of hands-on technical experience in managing Network Security products like firewall, web proxies, DDoS mitigation solutions – knowledge of Palo Alto FW, AWS network security, and Zscaler strongly preferred
• Experience with cloud native architectures such as AWS or Azure a plus
• Possess an understanding of network protocols
• Experience using Splunk
• Have the desire to learn new technologies, share best practices, and contribute to a global infrastructure and security team
• An ability to create documentation and reporting
• Possess an understanding of security operations concepts

Have strong written and oral communication skills

The duties and responsibilities described here are not exhaustive and additional assignments, duties, or responsibilities may be required of this position. Assignments, duties, and responsibilities may be changed at any time, with or without notice, by Blackstone in its sole discretion.

Blackstone is committed to providing equal employment opportunities to all employees and applicants for employment without regard to race, color, creed, religion, sex, pregnancy, national origin, ancestry, citizenship status, age, marital or partnership status, sexual orientation, gender identity or expression, disability, genetic predisposition, veteran or military status, status as a victim of domestic violence, a sex offense or stalking, or any other class or status in accordance with applicable federal, state and local laws. This policy applies to all terms and conditions of employment, including but not limited to hiring, placement, promotion, termination, transfer, leave of absence, compensation, and training. All Blackstone employees, including but not limited to recruiting personnel and hiring managers, are required to abide by this policy.

If you need a reasonable accommodation to complete your application, please contact Human Resources at 212-583-5000 (US), +44 (0)20 7451 4000 (EMEA) or +852 3656 8600 (APAC).

Required

Depending on the position, you may be required to obtain certain securities licenses if you are in a client facing role and/or if you are engaged in the following
• Attending client meetings where you are discussing Blackstone products and/or and client questions;
• Marketing Blackstone funds to new or existing clients;
• Supervising or training securities licensed employees;
• Structuring or creating Blackstone funds/products; and
• Advising on marketing plans prepared by a sales team or developing and/or contributing information for marketing materials.

Note: The above list is not the exhaustive list of activities requiring securities licenses and there may be roles that require review on a case-by-case basis. Please speak with your Blackstone Recruiting contact with any questions.

To submit your application please complete the form below. Fields marked with a red asterisk * must be completed to be considered for employment (although some can be answered “prefer not to say”). Failure to provide this information may compromise the follow-up of your application. When you have finished click Submit at the bottom of this form.
Apply Here
For Remote BXTI – Network Security Analyst roles, visit Remote BXTI – Network Security Analyst Roles

********

CyberSecurity Operations Center IT Analyst – Remote at MUFG

Location: Miami

Do you want your voice heard and your actions to count?

Discover your opportunity with Mitsubishi UFJ Financial Group (MUFG), the 5th largest financial group in the world. Across the globe, we’re 180,000 colleagues, striving to make a difference for every client, organization, and community we serve. We stand for our values, building long-term relationships, serving society, and fostering shared and sustainable growth for a better world.

With a vision to be the world’s most trusted financial group, it’s part of our culture to put people first, listen to new and diverse ideas and collaborate toward greater innovation, speed and agility. This means investing in talent, technologies, and tools that empower you to own your career.

Join MUFG, where being inspired is expected and making a meaningful impact is rewarded.

This is a remote position. A member of our recruitment team will discuss location preferences with you in more detail.

This role can be remote in any of these States: Arizona, Texas, North Carolina, Washington, Oregon, California, Illinois, Kentucky, Georgia, New York, Connecticut, Massachusetts, New Jersey, District of Columbia, Utah, Nebraska, Minnesota, Missouri, Arkansas, Indiana, Ohio, Tennessee, Alabama, Florida, South Carolina, Virginia.

Job Summary

This role will respond to events according to documented procedures and industry best practices. Candidates should be experienced in the areas of networking, client/server technologies, and analyzing log files with the ability to identify false positive and true positive events.

Major Responsibilities

Gain knowledge of existing policies, standards, procedures, and guidelines to prevent the unauthorized use, release, modification, or destruction of data. Gain an understanding of security risks and controls.
Execute monitoring systems used to detect and report security violations.
Provide initial investigation of security incidents Provide communication and escalation throughout the incident per the operating guidelines
Communicate directly with data asset owners Perform analysis of log files Hunting for suspicious anomalous activity based on data alerts or data outputs from various tool sets
Escalating issues when necessary Maintain knowledge of industry trends and current security practices.

Qualifications

Certifications in a related security domain such as CISSP (Certified Information Systems Security Professional), GCIA (GIAC Certified Intrusion Analyst) or GSEC ( GIAC Security Essentials Certification) a plus, cyber security Bachelor’s degree preferred
Work experience in the areas of information security, IS auditing, data processing operations, systems development and/or computer programming.
Must have a minimum 2+ years of information security operations experience and 2 years’ experience working in a large complex, matrix, and global organization.
Detailed knowledge of at least two operating systems such as Windows Server and Linux and corresponding security systems.
Good oral and written communications skills.
Knowledge of basic banking concepts and theories.
The candidate should be able to exercise command scripts and execute programs to obtain the desired results.
An understanding of software productivity packages like MS Office, MS Access, and terminal emulation software.
The analyst will learn the skills required to evaluate business process and application software, which effect the integrity, functionality, and reliability of the bank’s network and systems.
The position should work toward gaining detailed knowledge of at least one operating system and corresponding security system.
Knowledge and understanding of security tools and hacking techniques is a plus.
The responsibilities extend to leading multiple security incident investigations at once. The Analyst must report all possible security incidents, potential breaches, attacks, threats, and evidence of compromise to management.
Experience in investigations and analyzing cyber security items
To effectively apply information security theories and concepts to specific circumstances. Escalate incidents, potential compromises, external threats, and attacks.
Based on experience, the analyst in this position may be on-call 24 hours per day to respond to information security related problems.

The above statements are intended to describe the general nature and level of work being performed. They are not intended to be construed as an exhaustive list of all responsibilities duties and skills required of personnel so classified.

We are proud to be an Equal Opportunity/Affirmative Action Employer and committed to leveraging the diverse backgrounds, perspectives and experience of our workforce to create opportunities for our colleagues and our business. We do not discriminate on the basis of race, color, national origin, religion, gender expression, gender identity, sex, age, ancestry, marital status, protected veteran and military status, disability, medical condition, sexual orientation, genetic information, or any other status of an individual or that individual’s associates or relatives that is protected under applicable federal, state, or local law.
Apply Here
For Remote CyberSecurity Operations Center IT Analyst – Remote roles, visit Remote CyberSecurity Operations Center IT Analyst – Remote Roles

********

Sr. Associate, Cyber Security – Privacy at KPMG

Location: Miami

Known for being a great place to work and build a career, KPMG provides audit, tax and advisory services for organizations in today’s most important industries. Our growth is driven by delivering real results for our clients. It’s also enabled by our culture, which encourages individual development, embraces an inclusive environment, rewards innovative excellence and supports our communities. With qualities like those, it’s no wonder we’re consistently ranked among the best companies to work for by Fortune Magazine, Consulting Magazine, Working Mother Magazine, Diversity Inc. and others. If you’re as passionate about your future as we are, join our team.

KPMG is currently seeking a Senior Associate, Cyber Security – Privacy Data Engineer in Technology Enablement for our Consulting practice.

Responsibilities:
• Participate with the design, implementation, maintenance, and enforcement of privacy policies, procedures, and controls
• Support the execution of Information Security and privacy inherent to client engagements
• Identify technological opportunities and evaluate the Information Security and privacy impacts on the client’s business
• Help with the execution of complex privacy engagements assessment, architecture, design, implementation, ongoing run support to understand compliance risks, identify opportunities for improvement, and remediation in line with compliance goals and business strategies
• Optimize key privacy controls across client infrastructure to preserve and improve privacy protections. Including: discovery of personal data, classification of data, data mapping, data obfuscation and automation of data subject requests.
• Work closely with client’s Data Governance teams and Application System Owners to discover data, classify data elements, and verify a catalog of data with business owners.
• Implement and automate technical and process-related privacy controls, conduct privacy impact assessments
• Perform testing, debugging of privacy platform solutions and document procedures for installation, operations, and maintenance.

Qualifications:
• A minimum of three years experience evaluating, using, designing, architecting, implementing, and maintaining various privacy technology tools (discovery, inventory, data flow management, privacy workflow management, etc)
• Bachelor’s degree from an accredited college/university or equivalent experience
• Demonstrated understanding of data structures utilized across both structured & unstructured data repositories and presenting data visualizations for complex data sets for both management and detail-oriented information consumers
• Data literacy: finding and managing data, cleansing data, manipulating data
• Basic experience with some RDBMS, such as Microsoft SQL Server, Oracle Database, PostgreSQL, MySQL/MariaDB, IBM DB2, etc.
• Basic experience and understanding of modern architectures utilizing AWS, Docker, Openshift and considerations for both on-prem and cloud architectures
• Ability and willingness to travel, work in a fast paced, results driven environment, grasp new technology, and contribute at a rapid pace

KPMG LLP (the U.S. member firm of KPMG International) offers a comprehensive compensation and benefits package. KPMG is an affirmative action-equal opportunity employer. KPMG complies with all applicable federal, state and local laws regarding recruitment and hiring. All qualified applicants are considered for employment without regard to race, color, religion, age, sex, sexual orientation, gender identity, national origin, disability, protected veteran status, or any other category protected by applicable federal, state or local laws. The attached link contains further information regarding the firm’s compliance with federal, state and local recruitment and hiring laws. No phone calls or agencies please.

At KPMG any employee, partner or contractor must be fully vaccinated or have a reasonable accommodation for COVID-19 in order to go to any KPMG office, or to work on or in association with a federal contract (unless prohibited by applicable law).
Apply Here
For Remote Sr. Associate, Cyber Security – Privacy roles, visit Remote Sr. Associate, Cyber Security – Privacy Roles

********

Cyber Security Analyst at Exeter Government Servi

Location: Miami

Job Title: SCITES – Cyber Security Analyst

Location: US SOUTHERN COMMAND Doral, Florida

Required Clearance: Minimum Secret clearance upon start and be eligible for TS/SCI clearance

Required Certification(s): DoDM 8570 CSSP Category Certification (e.g. CompTIA CySA+ or CEH)

Required Education: Bachelor’s in IT or a related technical discipline preferred or commensurate level of experience based on position level

Required Experience: Advisor 8+ Years, Senior 5+ Years, Analyst 0 – 2 Years

Position Description:

Exeter is seeking personnel to provide Cyber Security, Computer Network Defense in support of the SOUTHCOM Cyber Information Technology Enterprise Services (SCITES) Contract in Doral FL.

Primary Responsibilities:
• Incident Reporting, manages, track and report incidents to include submitting incident reports using the SharePoint Incident Reporting Portal
• Uses SIEM Q-RADAR/ArcSight for event tracking and correlation
• Develops, tests, and operates firewalls, intrusion detection systems, enterprise antivirus systems and software deployment tools
• Evaluate firewall change requests and assess organizational risk
• Safeguards network against unauthorized infiltration, modification, destruction or disclosure
• Researches, evaluates, tests, recommends, communicates and implements new security software or dev forensics; manages, performs and reports forensics analysis to government leadership
• Monitor and analyze Network IDS to identify security issues for remediation
• Manages, performs and monitors the following CND tools: PowerShell, IBM Q-RADAR, CISCO SOURCEFIRE (IDS), WIDS, ACAS,JRSS Stack: Agency FIREWALL PALO ALTO, BASE FIREWALL CISCO ASA, Tipping Point (IPS), PCAP collector, InQuest, ArcSight ESM and loggers, Lancope, Blue coat Web Proxy

Required Qualifications:
• Must be a U.S. Citizen
• Minimum Secret clearance upon start and be eligible for TS/SCI clearance
• DoDM 8570 Cyber Security Service Provider (CSSP) Category Certification (e.g. CompTIA CySA+ or CEH)
• Shift work required to support real-world or contingency operations
• Candidates must be local or willing to relocate

Desired Qualifications/Experience:
• Bachelor’s Degree in specialty field

Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status.

#clearancejobs
Apply Here
For Remote Cyber Security Analyst roles, visit Remote Cyber Security Analyst Roles

********

REMOTE Cloud Security or Cyber Security Analyst at CyberCoders

Location: Miami

If you are an experienced Cyber Security Analyst looking to join a growing firm with great culture, please read on

Top Reasons to Work with Us

Ranked in Fortunes 100 Best Companies to Work For 2021

What You Will Be Doing

In this fully remote role you will be responsible for analyzing, designing, implementing, and auditing cloud infrastructure, security solutions, and integrated technologies through a lens of security, resiliency, and scalability.

You’ll also collaborate with team members in-person and remotely. Work closely with different business functions to ensure monitoring, logging, and auditing of relevant events and assisting in automation of security controls.

What You Need for this Position

At least 3 years of experience with
• Cyber Security or Cloud Security
• AWS/Azure
• Compliance frameworks
• PowerShell or Python or JavaScript

What’s In It for You
• Salary: $100,000-$130,000
• Fully covered benefits for individual and family
• 401k Match up to 6%
• Annual Bonus
• Sabbatical program
• PTO
• Fully remote

So, if you are a REMOTE Cyber Security Analyst with experience, please apply today

Email Your Resume In Word To

Looking forward to receiving your resume through our website and going over the position with you. Clicking apply is the best way to apply, but you may also:
• Please do NOT change the email subject line in any way. You must keep the JobID: linkedin : JR19-1698578 — in the email subject line for your application to be considered.***

Jimmy Rowland – Recruiter – CyberCoders

Applicants must be authorized to work in the U.S.

CyberCoders, Inc is proud to be an Equal Opportunity Employer

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, protected veteran status, or any other characteristic protected by law.

Your Right to Work – In compliance with federal law, all persons hired will be required to verify identity and eligibility to work in the United States and to complete the required employment eligibility verification document form upon hire.
Apply Here
For Remote REMOTE Cloud Security or Cyber Security Analyst roles, visit Remote REMOTE Cloud Security or Cyber Security Analyst Roles

********

Cyber Incident Response Analyst at Exeter Government Services, LLC

Location: Miami

Job Title: SCITES Cyber Incident Response Analyst

Location: Doral FL

Required Clearance: Top Secret w/SCI Eligibility

Certifications: DoDM 8570 IAT Level II & CSSP Incident Responder Certification (e.g. CompTIA C ySA+ or CEH)

Required Education: Bachelor s in IT or a related technical discipline preferre d or commensurate level of experience based on position level

Required Experience: 8 + Years

Position Description:

Exeter is seeking the right fit to lead a team of Cyber professionals as they support the critical effort to provide Cyber Security. The cyber Incident Response Analyst will be part of a team covering (24) hours a day, seven (7) days a week, three hundred sixty five (365) days per year, incident handling capability. Selected candidates must be a proven team player with excellent oral and written communications skills. Work is performed in support of U.S. SOUTHCOM in Doral FL.

Primary Responsibilities:
• Receive, document, and report cyber security events
• Communicating best practices and risks to leadership
• Categorize incidents and implement corresponding escalation procedures
• Communicate and coordinate incident response efforts
• Analyze reports to understand threat campaign(s) techniques, lateral movements and extract indicators of compromise (IOCs)
• Access, secure and inspect local classified information processing areas

Required Qualifications:
• Top Secret w/SCI Eligibility
• DoDM 8570 IAT Level II & CSSP Incident Responder Certification (e.g. CompTIA CySA+ or CEH)
• BA/BS degree in Information Technology or related field or commensurate level of experience based on position level
• Experience commensurate with a leadership role
• Due to the nature of the support, 24/7/365 shop with all shifts covered. Must be able to support

Desired Qualifications /Experience :
• Bachelors Degree in specialty field
• Previous experience working in a network security incident response team

Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status

Clearancejobs
Apply Here
For Remote Cyber Incident Response Analyst roles, visit Remote Cyber Incident Response Analyst Roles

********

Senior SOC Analyst at eMed

Location: Miami

Job Description

The Senior SOC Analyst will work collaboratively to detect and respond to information security incidents, maintain and follow procedures for security event alerting and participate in security investigations. The Senior SOC Analyst will perform tasks including monitoring, threat intelligence research, incident response, automation and SIEM maintenance. The Senior SOC Analyst should have familiarity with the principles of cloud computing, network and endpoint security, current threat and attack trends, and have an advanced understanding of security principals such as defense in depth.

Requirements
• BSc/BA in Computer Science, Information Technology, or related Security field.
• Professional training and certifications (Security+, CYSA+, GSEC, GCIH, CISSP) is a plus.
• At least 3+ years of experience working with information systems security and related technologies.
• Thorough understanding of the OSI model and Cloud Computing technologies.
• Experience implementing, maintaining and enhancing SIEM solutions such as Splunk, SumoLogic or Azure Sentinel.
• Scripting ability in multiple languages such as Python and Powershell.
• Recent experience with incident response process creation, understanding and involvement.
• Ability to create automation when needed for maximum process efficiency.
• Recent active role in forensic investigation and incident response events and exercises.
• Great communication skills, including written deliverables, oral presentations, and the ability to facilitate crucial conversations at all levels of the organization.

Responsibilities
• Maintain, improve and mature SIEM systems to include but not limited to log ingestion, parsing, alerting creation and maintenance, dashboard creation and report generation.
• Monitor computer networks, cloud systems, and SaaS applications for security issues and investigate violations when and if one occurs.
• Work with the Information Security team to support penetration tests and enhance findings or areas of focus.
• Create aggregated vulnerability reports to distribute current security posture to stakeholders for remediation and leadership for governance.
• Research security enhancements and make recommendations to the Security team by testing and evaluating new technologies.
• Monitor and respond to emerging threats while ensuring real time security threat feeds are reviewed and implications to eMed are reviewed.
• Utilize forensic tools to properly respond to realized threats or investigation inquiries.
• Facilitate incident response activities upon confirmation of true positive alerting or reports.
• Demonstrated problem-solving and analytical skills.
• Advanced understanding of security cloud services, container and multi-tier web applications, data lakes, and database systems.
• Proficiency with a broad array of security software applications and tool such as: Extended Detection and Response (EDR), Security Information and Event Management (SIEM), Data Loss Prevention (DLP), Identity Access Management (IAM), Threat Intelligence and Vulnerability Management.
• Experience in information security policies, processes, procedures, systems, methodologies, and best practices.
• Ability to initiate and drive incident response engagements to conclusion to include lessons learned.
• Understanding of cyber security regulations: state/federal laws.
• Ability to manage ambiguity and apply problem-solving skills.
• Ability to establish and maintain internal and external relationships.
• Ability to work under pressure and demonstrated ability to meet critical deadlines.
• Ability to partner with others and lead others not reporting to you directly.
• Develop in-depth technical knowledge of Information Security principles and processes.

Benefits
• Health Care Plan (Medical, Dental & Vision)
• Retirement Plan (401k, IRA) with Company Match
• Life Insurance (Basic, Voluntary & AD&D)
• Unlimited Paid Time Off
• Short Term & Long Term Disability
• Training & Development
• Free Food & Snacks
• Wellness Resources
Apply Here
For Remote Senior SOC Analyst roles, visit Remote Senior SOC Analyst Roles

********

Associate, Transaction Advisory Services, M&A Technology & Cybersecurity (Cybersecurity Specialist) at Houlihan Lokey

Location: Miami

Business Unit:

Financial and Valuation Advisory

Industry:

TAS – Transaction Advisory Services

Houlihan Lokey (NYSE:HLI) is a global investment bank with expertise in mergers and acquisitions, capital markets, financial restructuring, and valuation. The firm serves corporations, institutions, and governments worldwide with offices in the United States, Europe, the Middle East, and the Asia-Pacific region. Independent advice and intellectual rigor are hallmarks of the firm’s commitment to client success across its advisory services. Houlihan Lokey is the No. 1 M&A advisor for the past six consecutive years in the U.S., the No. 1 global restructuring advisor for the past seven consecutive years, and the No. 1 global M&A fairness opinion advisor over the past 20 years, all based on number of transactions and according to data provided by Refinitiv.

Transaction Advisory Services

Houlihan Lokey’s Transaction Advisory Services (TAS) practice assists private equity and corporate clients with financial, IT and tax due diligence, business analytics and technical accounting matters associated with corporate mergers, divestitures and acquisitions (M&A). Drawing on Houlihan Lokey’s market leadership in middle-market M&A transactions, our due diligence experts provide candid, unbiased, and rigorous support on matters most impacting deal value, and assist investors in identifying and evaluating key value drivers and risk factors.

Job Purpose:

Our Transaction Advisory Services (TAS) Technology & Cybersecurity practice is looking to add talented technology professionals at the Analyst, Associate, and Vice President levels across Atlanta, Chicago, Dallas, Houston, Los Angeles, New York to our fast-growing team. As a professional in the group, you will be teamed with a highly talented and dedicated group of M&A Technology & Cybersecurity professionals, providing you broad exposure to different transactional issues affecting businesses within the M&A market today. We offer a unique opportunity to work in a variety of industries (e.g., High Tech, Healthcare, Financial, Industrials) on an investment banking platform, providing exposure to the broader corporate finance industry and capital markets. You will develop and extend your technical, financial, and interpersonal skills as you perform M&A technology related to the purchase and sale of private and public companies.

Responsibilities & Deliverables:
• Participate in buy-side and sell-side transaction advisory engagements
• Collaborate closely with our team of experienced M&A Technology & Cybersecurity professionals on engagement delivery, practice development, and business development / go-to-market activities
• Evaluate the Cybersecurity, Compliance and Data Privacy related performance of companies and develop plans for improvement and expense reduction in alignment with customer/industry expectations, the company’s size and sophistication, and technology ecosystem
• Validate systems with specific emphasis on network operations and cyber tactics, techniques, and procedures focused on the threat to information networks and sensitive information
• Evaluate the implementation of security mitigation techniques to protect the confidentiality, integrity, and availability of the organization’s information, information systems, and IT infrastructure and applications in accordance with policies, procedures, security techniques regulations
• Lead discussions for key cybersecurity areas, including identity management, penetration testing, application security testing, physical security, enterprise architecture, data protection, incident response and recovery
• Communicate and provide recommendations to sensitive or high-risk cybersecurity, compliance or data privacy issues (e.g., known critical vulnerabilities, recent/active security breaches, non-compliance to regulatory requirements) to technical and executive audiences
• Prepare cybersecurity, compliance and data privacy assessments of current and planned projects based on experience, research, and analysis
• Design and communicate technical architectural and operational procedure design recommendations to technical and executive stakeholders (e.g., security testing options, security protective and defensive solutions)
• Assess an organization’s IT Managed Service Providers (MSPs) and Managed Security Services Providers (MSSPs), including evaluating its history with the company, scope of services, cost drivers, and Service Level Agreements (SLAs)
• Facilitate the integration or separation of cybersecurity operations resulting from a tuck-in or carve-out transaction on behalf of the transaction’s buyer or seller
• Collaborate with other Transaction Advisory Services practices, such as Financial Due Diligence, Accounting and Financial Reporting (AFR), and Tax
• Supervise team members through training, coaching and critical review
• Create value driven reports and appropriately communicate deal-critical information

Basic Qualifications:
• COVID vaccination required, subject to applicable state and federal law
• Experience designing/building/deploying cybersecurity, compliance or data privacy solutions
• Experience working with external client facing teams on fast paced consulting engagements
• Ability to handle multiple assignments simultaneously
• Exceptional verbal and written communication skills
• Experience supporting M&A transactions with corporate or private equity clients, and managing client expectations
• Undergraduate degree from an accredited institution
• Base knowledge of security frameworks, regulations and laws, such as GDPR, CCPA/CPRA, HIPAA, HITECH, NIST Cybersecurity Framework, or PCI DSS
• Ability and desired willingness to travel

Preferred Qualifications:
• Prior M&A, IT, cybersecurity, or data privacy advisory experience
• Highly motivated with an exceptional work ethic, and a demonstrated ability and desire to work cooperatively with team members and client professionals
• Demonstrated professional achievement and client service excellence
• Solid understanding of information security, specific experience IT security frameworks, regulations and laws as it relates to ISO 27001, SSAE 18, EU GDPR, CCPA/CPRA, HIPAA, HITECH, NIST Cybersecurity Framework, PCI DSS, ITAR-DFARS-CMMC, GLBA, SOX, FERPA, COPPA, and NERC CIP
• Relevant certifications (e.g., (ISC)2, GIAC, IAPP, ISO) specific certifications may include: CISSP, CISM, CISA, GSEC, HCISPP, PCI Professional or QSA, CIPP/US, CIPP/EU
• Experience with software or application security testing, secure software design, and web application security controls, CSSLP or similar certifications a plus
• Strong understanding (hands-on experience a plus) of infrastructure security solutions (e.g., DLP, XDR, data classification and discovery, UEBA, SSO, MFA, secure remote access, secure workstation and server management practices/solutions)
• Understanding (hands-on experience a plus) of public/private cloud solutions (e.g., AWS, Azure, Google, Oracle, VMware, Hyper-V) including IaaS, PaaS, SaaS, DBaaS, and DRaaS solutions
• Ability and desired willingness to travel
• For Associates, technology consulting or similar professional with 4 to 6 years of experience performing M&A Technology advisory or similar work

We are an equal opportunity employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, gender identity, sexual orientation, protected veteran status, or any other characteristic protected by law.
Apply Here
For Remote Associate, Transaction Advisory Services, M&A Technology & Cybersecurity (Cybersecurity Specialist) roles, visit Remote Associate, Transaction Advisory Services, M&A Technology & Cybersecurity (Cybersecurity Specialist) Roles

********

Cyber and Information Security New Graduate positions at The MITRE Corporation

Location: Miami

Why choose between doing meaningful work and having a fulfilling life? At MITRE, you can have both. That’s because MITRE people are committed to tackling our nation’s toughest challenges-and we’re committed to the long-term well-being of our employees. MITRE is different from most technology companies. We are a not-for-profit corporation chartered to work for the public interest, with no commercial conflicts to influence what we do. The R&D centers we operate for the government create lasting impact in fields as diverse as cybersecurity, healthcare, aviation, defense, and enterprise transformation. We’re making a difference every day-working for a safer, healthier, and more secure nation and world. Our workplace reflects our values. We offer competitive benefits, exceptional professional development opportunities, and a culture of innovation that embraces diversity, inclusion, flexibility, collaboration, and career growth. If this sounds like the choice you want to make, then choose MITRE-and make a difference with us.

You are not applying for a specific position. Applying to this pipeline requisition will put you in a candidate pool that will be viewed by technical leaders and recruiters for opportunities across the company.

MITRE’s mission is to build a safer world: At MITRE, everything we do is in the public interest; many of the complex problems we work on are a matter of life or death, and that means keeping our nation secure, helping our people to stay healthy, promoting government stability, and leveling the playing field against nefarious cyber attacks against our nation’s critical infrastructure, national security systems, and individuals.

What will I do?

Working alongside MITRE engineers, on teams or in labs, MITRE Cybersecurity New Grads will help design, develop, and implement solutions and technologies to enhance the security and resilience of our nation’s cyber infrastructure community interests, enabling mission and operational success.

As a part of a bigger community, you will solve different kinds of problems for different government agencies (DoD, NIST, Homeland Security, FAA and CMS; to name a few), and serve community interests. This will help you understand how your solutions fit in context of real-world scenarios with a breadth of capability areas.

At MITRE, mastery comes through collaboration with a diverse team of cyber professionals who mentor and challenge you in your own pursuit of excellence. From design to operations, you will learn to apply security engineering expertise, innovative concepts, and technology solutions on a variety of projects to address every facet of our sponsor’s cyber challenges in three key strategic areas: threat-based security operations, threat-based engineering and design, and security of evolving and emerging technologies.

Why is the MITRE a good place to start your career?

You will be exposed to those with world-class expertise, innovation, and thought leadership to protect the platforms and information technology systems of our government sponsors as well as broader community interests.

What cybersecurity areas could you work at MITRE?
• Cyber Resilience
• Detection and Response
• Mobile Security
• Cloud Security
• Risk Management Frameworks
• Situational Awareness
• Threat Emulation
• Digital Forensics
• Security Automation
• Security Architectures
• Policy and Governance
• Privacy Engineering
• Cyber Operations

What else do you need to know?

That MITRE values your work-life balance by offering 21 days of paid-time off plus flexible work schedules, civic time, sabbaticals, and parental leave. In addition, you will enjoy such benefits as our generous retirement matching, education loan repayment program, educational assistance programs, the MITRE Institute, and more. For more information about our award-winning workplace, see ~~~/careers/working at MITRE.

Minimum Qualifications:
• BS in cybersecurity, computer science, computer or electrical engineering, or related fields. In some cases, high school students may be considered.
• Applicants selected for this position may be subject to a government security investigation.
• Knowledge of cyber security principles and their application
• Ability to work with others to solve challenging technical problems.

Preferred Qualifications:
• Masters or PhD in cybersecurity, computer science, computer or electrical engineering, or related fields.
• Demonstrated knowledge with a variety of security and information assurance disciplines.
• Basic knowledge of cyber security principles, tools and devices.
• Excellent communications, writing, and briefing skills
• Experience working with design recovery, software analysis, and/or reverse engineering tools
• Proficiency in one or more of the following–Java, Python, XML, HTML, C#, Objective C; Database design & development including SQL, hardware, or networking protocols.
• Have cyber related experience gained from academic study and/or related intern/coop work
• Sustained excellence in academic performance
• High level desire to help the USA solve its most critical problems
• Exhibits the characteristics of a continuous learner

Additional Information

Clearance: Hiring requisitions for some roles may require a U.S. Government Security clearance.

Benefits to include:
• 21 days paid-time off
• Flexible workplace
• Generous retirement match
• Education assistance
• MITRE Institute classes
• School loan repayment
• 40 hours paid to volunteer
• Parental leave, adoption assistance, daycare subsidies

This requisition requires the candidate to have a minimum of the following clearance(s):

This requisition requires the hired candidate to have or obtain, within one year from the date of hire, the following clearance(s):

Salary compensation range and midpoint:

$78,000 – $97,500 – $117,000 Annual

Subject to all federal and state laws, rules and regulations, MITRE requires all employees to be fully vaccinated against COVID-19. Newly hired employees must be fully vaccinated prior to their employment start date. MITRE will provide reasonable accommodation to individuals who are legally entitled to an exemption under applicable laws so long as it does not create an undue hardship for MITRE and/or does not pose a direct threat to the health or safety of the employee or others in the workplace.

MITRE is proud to be an equal opportunity employer. MITRE recruits, employs, trains, compensates, and promotes regardless of age; ancestry; color; family medical or genetic information; gender identity and expression; marital, military, or veteran status; national and ethnic origin; physical or mental disability; political affiliation; pregnancy; race; religion; sex; sexual orientation; and any other protected characteristics. For further information please visit the Equal Employment Opportunity Commission website EEO is the Law Poster (~~~) , EEO is the Law Poster-Supplement (~~~) and Pay Transparency (~~~) .

MITRE intends to maintain a website that is fully accessible to all individuals. If you are unable to search or apply for jobs and would like to request a reasonable accommodation for any part of MITRE’s employment process, please contact MITRE’s Recruiting Help Line at ~~~ or email at ~~~.

Copyright © 1997-2021, The MITRE Corporation. All rights reserved. MITRE is a registered trademark of The MITRE Corporation. Material on this site may be copied and distributed with permission only.

Benefits information may be found here (~~~)
Apply Here
For Remote Cyber and Information Security New Graduate positions roles, visit Remote Cyber and Information Security New Graduate positions Roles

********

REMOTE Cloud Security Analyst at CyberCoders

Location: Miami

If you are a Cloud Security Analyst with experience, please read on

What You Will Be Doing

You will identify, assess, and present options for meeting the functional, technical, and compliance requirements for cloud solutions. Communicate complex information in a well-organized manner through verbal, written or visual means across various internal and 3rd party teams . Collaborate with team members in-person and remotely. Work closely with different business functions to ensure monitoring, logging, and auditing of relevant events and assisting in automation of security controls.

What You Need for this Position
• At least 2 years of experience with:
• AWS/Azure
• Cloud Security
• Identity management services and processes
• Developing and documenting processes
• Experience with compliance frameworks

What’s In It for You
• Salary: $100,000-$130,000
• Fully covered benefits for individual and family
• 401k Match up to 6%
• PTO
• Fully remote

Benefits
• Vacation/PTO
• Medical
• Dental
• Vision
• 401k
• Bonus

So, if you are a Cloud Security Analyst with experience, please apply today

Colorado employees will receive paid sick leave. For additional information about available benefits, please contact Shay Watson

Email Your Resume In Word To

Looking forward to receiving your resume through our website and going over the position with you. Clicking apply is the best way to apply, but you may also:
• Please do NOT change the email subject line in any way. You must keep the JobID: linkedin : SW6-1702148 — in the email subject line for your application to be considered.***

Shay Watson – Executive Recruiter – CyberCoders

Applicants must be authorized to work in the U.S.

CyberCoders, Inc is proud to be an Equal Opportunity Employer

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, protected veteran status, or any other characteristic protected by law.

Your Right to Work – In compliance with federal law, all persons hired will be required to verify identity and eligibility to work in the United States and to complete the required employment eligibility verification document form upon hire.

CyberCoders will consider for Employment in the City of Los Angeles qualified Applicants with Criminal Histories in a manner consistent with the requirements of the Los Angeles Fair Chance Initiative for Hiring (Ban the Box) Ordinance.
Apply Here
For Remote REMOTE Cloud Security Analyst roles, visit Remote REMOTE Cloud Security Analyst Roles

********

The Tech Career Guru
We will be happy to hear your thoughts

Leave a reply

Tech Jobs Here
Logo