management, continuous diagnostics and mitigation, threat mitigation and incident response, security architecture support, critical infrastructure protection, patch management, vulnerability management, risk management, information assurance, penetrationtesting, cybersecurity services, and Security Assessment and Authorization (SA&A) documentation. Manage Firewall, Web Filtering, Intrusion Prevention Systems (IPS), Intrusion Detection Systems (IDS … RA-VPN), Application Delivery/Load Balancing, Secure Sockets Layer (SSL) Certificate Management solutions Lead implementation of new security projects including estimation, design, development, testing and deployment and track status throughout Support operations team with cybersecurity guidance for day-to-day operations Prioritize and assign tasks to the security more »
management, continuous diagnostics and mitigation, threat mitigation and incident response, security architecture support, critical infrastructure protection, patch management, vulnerability management, risk management, information assurance, penetrationtesting, cybersecurity services, and Security Assessment and Authorization (SA&A) documentation. Manage Firewall, Web Filtering, Intrusion Prevention Systems (IPS), Intrusion Detection Systems (IDS … RA-VPN), Application Delivery/Load Balancing, Secure Sockets Layer (SSL) Certificate Management solutions Lead implementation of new security projects including estimation, design, development, testing and deployment and track status throughout Support operations team with cybersecurity guidance for day-to-day operations Prioritize and assign tasks to the security more »
management, continuous diagnostics and mitigation, threat mitigation and incident response, security architecture support, critical infrastructure protection, patch management, vulnerability management, risk management, information assurance, penetrationtesting, cybersecurity services, and Security Assessment and Authorization (SA&A) documentation. Manage Firewall, Web Filtering, Intrusion Prevention Systems (IPS), Intrusion Detection Systems (IDS … RA-VPN), Application Delivery/Load Balancing, Secure Sockets Layer (SSL) Certificate Management solutions Lead implementation of new security projects including estimation, design, development, testing and deployment and track status throughout Support operations team with cybersecurity guidance for day-to-day operations Prioritize and assign tasks to the security more »
management, continuous diagnostics and mitigation, threat mitigation and incident response, security architecture support, critical infrastructure protection, patch management, vulnerability management, risk management, information assurance, penetrationtesting, cybersecurity services, and Security Assessment and Authorization (SA&A) documentation. Manage Firewall, Web Filtering, Intrusion Prevention Systems (IPS), Intrusion Detection Systems (IDS … RA-VPN), Application Delivery/Load Balancing, Secure Sockets Layer (SSL) Certificate Management solutions Lead implementation of new security projects including estimation, design, development, testing and deployment and track status throughout Support operations team with cybersecurity guidance for day-to-day operations Prioritize and assign tasks to the security more »
management, continuous diagnostics and mitigation, threat mitigation and incident response, security architecture support, critical infrastructure protection, patch management, vulnerability management, risk management, information assurance, penetrationtesting, cybersecurity services, and Security Assessment and Authorization (SA&A) documentation. Manage Firewall, Web Filtering, Intrusion Prevention Systems (IPS), Intrusion Detection Systems (IDS … RA-VPN), Application Delivery/Load Balancing, Secure Sockets Layer (SSL) Certificate Management solutions Lead implementation of new security projects including estimation, design, development, testing and deployment and track status throughout Support operations team with cybersecurity guidance for day-to-day operations Prioritize and assign tasks to the security more »
management, continuous diagnostics and mitigation, threat mitigation and incident response, security architecture support, critical infrastructure protection, patch management, vulnerability management, risk management, information assurance, penetrationtesting, cybersecurity services, and Security Assessment and Authorization (SA&A) documentation. Manage Firewall, Web Filtering, Intrusion Prevention Systems (IPS), Intrusion Detection Systems (IDS … RA-VPN), Application Delivery/Load Balancing, Secure Sockets Layer (SSL) Certificate Management solutions Lead implementation of new security projects including estimation, design, development, testing and deployment and track status throughout Support operations team with cybersecurity guidance for day-to-day operations Prioritize and assign tasks to the security more »
management, continuous diagnostics and mitigation, threat mitigation and incident response, security architecture support, critical infrastructure protection, patch management, vulnerability management, risk management, information assurance, penetrationtesting, cybersecurity services, and Security Assessment and Authorization (SA&A) documentation. Manage Firewall, Web Filtering, Intrusion Prevention Systems (IPS), Intrusion Detection Systems (IDS … RA-VPN), Application Delivery/Load Balancing, Secure Sockets Layer (SSL) Certificate Management solutions Lead implementation of new security projects including estimation, design, development, testing and deployment and track status throughout Support operations team with cybersecurity guidance for day-to-day operations Prioritize and assign tasks to the security more »
commissioning new services. Ensure operating procedures are provided to the Infrastructure Operations function in a comprehensive and timely manner. Oversee the configuration, installation and testing of network hardware, and software; includes but not limited to routers, switches, firewalls and SD-WAN. Where necessary, support Infrastructure Operations in monitoring, collecting … business. Recommend, cost-justify and lead execution of modifications to the existing infrastructure design to improve efficiency, reliability, and performance. Participates in disaster recovery testing and rehearsals. Who You Are: Minimum 10 years of experience in infrastructure support, delivery and design. The Infrastructure Solution Architecture Manager must be a … that enable applications and data). experience to include building an enterprise architecture. Planning and supporting processes and adhering to best practices. Knowledge of penetrationtesting methodologies. Knowledge of Intrusion detection/prevention systems (IDS/IPS/WAF) and vulnerability assessment tools. Extensive switching, routing and firewall more »
and empower a team of security professionals: Guide, mentor, and inspire your team to achieve peak security awesomeness. Get technical: Analyze security logs, conduct penetrationtesting, and troubleshoot security incidents like a boss. Stay ahead of the curve: Continuously research and implement new security technologies and best practices. more »
including clustering. implement, and manage network security solutions, including firewalls, intrusion detection/prevention systems, VPNs, and secure access controls. regular security assessments and penetrationtesting to identify vulnerabilities and recommend remediation measures. network traffic for suspicious activity and respond to security incidents in a timely manner. with more »
of Azure PAAS database technologies (e.g. Azure SQL) of hardening IT infrastructure based on security audits, standards and industry best practice (e.g. vulnerability scanning, Penetrationtesting and ISO27001/17/18). more »
Azure PAAS database technologies (e.g. Azure SQL) Experience of hardening IT infrastructure based on security audits, standards and industry best practice (e.g. vulnerability scanning, Penetrationtesting and ISO27001/17/18). more »
Tacoma, Washington, United States Hybrid / WFH Options
The Pokémon Company International
drift-resiliency, private cloud network gaps, and web-facing threats. Administers Information Security policies to control access to systems. Performs cloud security audits and testing and evaluates system security configurations to ensure efficacy and compliance with policies and procedures. Oversees penetrationtesting and vulnerability assessments of applications more »
Seattle, Washington, United States Hybrid / WFH Options
The Pokémon Company International
drift-resiliency, private cloud network gaps, and web-facing threats. Administers Information Security policies to control access to systems. Performs cloud security audits and testing and evaluates system security configurations to ensure efficacy and compliance with policies and procedures. Oversees penetrationtesting and vulnerability assessments of applications more »
Redmond, Washington, United States Hybrid / WFH Options
The Pokémon Company International
drift-resiliency, private cloud network gaps, and web-facing threats. Administers Information Security policies to control access to systems. Performs cloud security audits and testing and evaluates system security configurations to ensure efficacy and compliance with policies and procedures. Oversees penetrationtesting and vulnerability assessments of applications more »
Bellevue, Washington, United States Hybrid / WFH Options
The Pokémon Company International
drift-resiliency, private cloud network gaps, and web-facing threats. Administers Information Security policies to control access to systems. Performs cloud security audits and testing and evaluates system security configurations to ensure efficacy and compliance with policies and procedures. Oversees penetrationtesting and vulnerability assessments of applications more »
Develop and Test Group Disaster Recovery Plans Maintain Information Security policies, making sure data centres and users adhere. Manage cyber security tools and regular penetration testing. Assist in the delivery of CyberEssentials+ (or similar as deemed appropriate) for group companies Verify application, data, and network security to assure confidentiality … systems, backup systems, ensuring continued system functions and maintaining data integrity and retrieval. Analyse network security events by participating in and supporting audit processes, penetrationtesting, and reviewing log reports from network systems and other systems for actionable items and remediation. Monitor and reports on the performance of more »
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Head Resourcing
and using purple team engagements to tune and validate detection tooling. Working collaboratively with IT teams to remediate vulnerabilities identified through red team engagements, penetrationtesting, and vulnerability scanning. Planning and coordination of large-scale security incident response, remediation and recovery efforts involving multiple parties and teams. Manage more »
to, DHS physical or embedded systems and facilities (e.g., heating, ventilation, and air conditioning (HVAC), telecommunications, wireless technologies) Assessing effectiveness of security controls through penetrationtesting, vulnerability scanning, or security architecture review on enterprise network or control systems assets to improve understanding of organizational or national cybersecurity risks more »
to, DHS physical or embedded systems and facilities (e.g., heating, ventilation, and air conditioning (HVAC), telecommunications, wireless technologies) Assessing effectiveness of security controls through penetrationtesting, vulnerability scanning, or security architecture review on enterprise network or control systems assets to improve understanding of organizational or national cybersecurity risks more »
to, DHS physical or embedded systems and facilities (e.g., heating, ventilation, and air conditioning (HVAC), telecommunications, wireless technologies) Assessing effectiveness of security controls through penetrationtesting, vulnerability scanning, or security architecture review on enterprise network or control systems assets to improve understanding of organizational or national cybersecurity risks more »
to, DHS physical or embedded systems and facilities (e.g., heating, ventilation, and air conditioning (HVAC), telecommunications, wireless technologies) Assessing effectiveness of security controls through penetrationtesting, vulnerability scanning, or security architecture review on enterprise network or control systems assets to improve understanding of organizational or national cybersecurity risks more »
to, DHS physical or embedded systems and facilities (e.g., heating, ventilation, and air conditioning (HVAC), telecommunications, wireless technologies) Assessing effectiveness of security controls through penetrationtesting, vulnerability scanning, or security architecture review on enterprise network or control systems assets to improve understanding of organizational or national cybersecurity risks more »
to, DHS physical or embedded systems and facilities (e.g., heating, ventilation, and air conditioning (HVAC), telecommunications, wireless technologies) Assessing effectiveness of security controls through penetrationtesting, vulnerability scanning, or security architecture review on enterprise network or control systems assets to improve understanding of organizational or national cybersecurity risks more »
to, DHS physical or embedded systems and facilities (e.g., heating, ventilation, and air conditioning (HVAC), telecommunications, wireless technologies) Assessing effectiveness of security controls through penetrationtesting, vulnerability scanning, or security architecture review on enterprise network or control systems assets to improve understanding of organizational or national cybersecurity risks more »