West Bend, Wisconsin, United States Hybrid / WFH Options
Delta Defense
the United States without the need for current or future sponsorship. Essential Duties and Responsibilities: Evaluate, design, and implement robust security systems. Shield our information assets (devices, networks, applications, data, users) from cyber threats and continuously fortify our security posture. Focus on reducing our attack surface and continuously improve our company security posture. Develop, modify, and implement security controls … aligned with company policies and procedures that affect cybersecurity operations. Ensure compliance with applicable industry standards, frameworks, and regulations. Work hand-in-glove with Data Engineering, Analytics, and IT Operations to weave security and data governance best practices seamlessly into the software development life cycle. Evaluate company and vendor technology infrastructure security. Participate in disaster recovery and business … CSF, CIS CSC, PCI-DSS, Cyber Defense Matrix, ISO 27001, and MITRE ATT&CK. Familiarity with a broad range of security tools and technologies including EDR, SIEM, SWG, CASB, DLP, & IDS/IPS. Preferred certifications: CCSP, CASP+, CISSP, Security+, CEH. Experience with modern network architectures and tooling to manage and support remote workforce including associates in the field (outside sales More ❯
DLP (DataLossPrevention)/DRM (Digital Rights Management) SME You Have: Daily operation, maintenance, and monitoring of DataLossPrevention (DLP) systems, preferably with one or more of the following: Varonis, Microsoft Purview, and Forcepoint Familiar with various DLP solutions, comprising Endpoint DLP, Network DLP, Discovery, and Cloud DLP, including responding to the … alerts that the tool generates. Strong understanding of Data Governance and establishing a policy-based Data Lifecycle Management (DLM) process. Ensures data is managed from creation to deletion, accessible to the right people, and supports business objectives. 3+ years of experience with security principles, approaches, and technologies and supporting DoD cybersecurity and information assurance processes Possesses excellent … pillar Experience deploying, and operating solutions that address the data pillar to include capabilities such as: data cataloging, data discovery, data tagging/labeling, DLP, DRM and access control policies Master's degree CISSP, Varonis, Microsoft Purview or Forcepoint Certification Take2 is an Equal Opportunity and Affirmative Action Employer. All qualified applicants will receive consideration More ❯
Purview Consultant to join the team and support and advise their clients on implementation and enablement of Microsoft Purview and associated M365 and Azure Technologies including end-to-end data governance, compliance, and risk management solutions. The Role You’ll be working across a variety of clients in a range of industries, whilst also collaborating closely with internal teams … across the company. Key responsibility will be leading the delivery of Microsoft Purview solutions - helping clients navigate complex data governance, compliance, and risk management requirements. You will provide strategic and technical oversight across projects, acting as both a trusted advisor and hands-on lead. You’ll support the development of team capability and overall service offerings within Microsoft Purview … goals. The Person: Hands-on experience delivering Microsoft Purview solutions across Microsoft 365 and Azure environments. A thorough understanding of Purview features, including: DataLossPrevention (DLP) Information Protection (Sensitivity Labels, encryption, etc.) Insider Risk Management eDiscovery & Communication Compliance Data Lifecycle Management & Records Management Information Barriers Ability to clearly present findings, recommendations, and technical designs to More ❯
N): Y Status (Exempt/Non-Exempt): Exempt Clearance: Top Secret/SCI Primary Responsibilities: • Analysis, documentation and development of integration, testing, operations, and maintenance of system security. • Use data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs.) to analyze events from environments to mitigate threats. • Apply defensive measures resulting from sources … for Information Assurance Vulnerability Alert (IAVA) management and scanning, McAfee HBSS, Corelight, and Cortex. • IOT discovery, monitoring, SOAR orchestration, and SIEM event correlation and analysis. • Cloud security systems for DLP, and Email and threat prevention/monitoring. • Validate remediation of IT resources managed by departmental branches. • Security incident reporting to Security Operations Center. • Administration of firewalls, Intrusion Detection System … cyber threats and vulnerabilities. • Analyze network alerts from enterprise sources determining causes of alerts. • Security reviews, gap analysis and risk mitigation in security architecture. • Intrusion Detection System/Intrusion Prevention System tools and applications. • Cloud computing deployment models in private, public, and hybrid on/off prem environment. • Information technology security principles and methods (e.g., firewalls, DMZ, encryption). More ❯
capabilities. • Work with the PM to deliver management plans including a Program Management Plan and Integrated Master Schedule, reports, technical issues, resolutions, and mitigation strategies. • Develop and maintain a DataLossPrevention Plan to minimize and protect data. This plan shall be developed utilizing current industry standards and best practices. Key Areas: 1. Microsoft 365 2. Microsoft More ❯
including knowledge of computer networks, Microsoft products including Windows operating systems, and applications, hardware and security. • Knowledge of various security technologies such as network and application firewalls, intrusion and datalossprevention and anti-virus • Knowledge of identity management, patch management and best practice. • Knowledge of security threat vectors and ways to manage them (email, web, social More ❯
full-time freelance mission for an initial duration of one year, with the possibility of extension. Start date: ASAP . Key Responsibilities: Incident Response : Handle cybersecurity incidents (malware, intrusions, data breaches), analyze phishing emails and security alerts (SIEM, EDR), and develop response procedures. SOC Engineering : Develop and optimize SIEM/EDR systems, create detection rules (MITRE ATT&CK), write … Involvement : Contribute to internal projects related to deployment, maintenance, and automation. Required Skills: Strong experience in SOC engineering, incident response, and threat hunting Proficiency with security tools: firewalls, VPN, DLP, IDS/IPS, Web Proxy, MDR/XDR Scripting skills: Python, Bash, PowerShell Solid understanding of networking protocols and operating systems Familiarity with Azure Cloud security and Zero Trust concepts More ❯
Washington, DC. Candidates must be eligible for a Public Trust clearance. Duties and Responsibilities: Provide technical hands-on support for various Security Tool engineering and Administration of SASE, EDR, DLP, Web Proxy, Email Security, IDPS, Firewall and SIEM Technologies. Create deployment/update/upgrade plan and perform work as outlined. Perform routine health checks, maintenance tasks, update, upgrade, and … writing. Must be able to use Word, PowerPoint, and SharePoint effectively. Required Skills and Experience: Three (3) or more years of experience providing hands-on technical support SASE, EDR, DLP, Web Proxy, Email Security, IDPS, Firewall and SIEM Technologies. Two (2) years of experience in administering Operation systems (Windows and Linux) One (2) or more years of experience in administering More ❯
security role ️ In-depth knowledge of network security, cryptography, firewalls, VPNs, and security protocols ️ Familiarity with cloud security solutions (AWS, Azure, GCP) and security technologies (IDS/IPS, SIEM, DLP) ️ Strong experience with risk management, threat modeling, and security architecture frameworks ️ Certifications such as CISSP, CISM, TOGAF, or equivalent are highly preferred More ❯
Security Operations Centre) or in a cyber security focused role – Ideally 2 Years Knowledge of security tools and technologies (e.g., SIEM, IDS/IPS, EDR/XDR, Email protection, DLP, SOAR, Cloud Security etc.) Knowledge of Cyber Security domains (e.g., Identity and access Management, Network Security, Incident Response etc) Understanding of security testing principles, including vulnerability scanning, risk identification, and More ❯
information security principles and best practices. Proficiency in risk management methodologies to assess and mitigate security risks. Experience with security tools and technologies (e.g. SIEM, SOAR, IDS/IPS, DLP). Knowledge of regulatory requirements and, governance and compliance frameworks. Project management skills to oversee and manage security initiatives effectively. Preferably certified as NIS 2 Lead Implementer, DORA Lead Manager More ❯
Senior DLP - Investigations page is loaded Senior DLP - Investigations Apply locations London, United Kingdom time type Full time posted on Posted 2 Days Ago job requisition id R The CISO organization protects the information assets of LSEG through managing risk, deploying effective security risk framework and ensuring regulatory compliance. This role will sit within the DataLossPrevention (DLP) Team which is part of Global Security Operations Centre. This team is responsible for ensuring that sensitive and confidential data detection and prevention controls are appropriate and in line with LSEG security policies. It is also responsible for identifying opportunities to streamline our support processes and enhancements that can be made in our systems. The candidate … of DataLossPrevention and information classification. Alongside the team, the role involves working with GSOC and other teams. The candidate will have knowledge of the DLP technologies and capabilities used in an enterprise, and increasingly cloud based environment. Key Functions of the role: Hands-on operational experience with O365, Purview, DLP security controls and tools governing More ❯
Online in a hybrid setup. Administer email gateways and Mimecast for security and compliance. Automate tasks and manage environments using Exchange PowerShell. Implement DataLossPrevention (DLP) policies. Maintain shared mailboxes, distribution lists, and email permissions. Administer OneDrive, SharePoint, and Power Platform (Power Automate, Power Apps, Power BI). Support enterprise content sharing and process automation. Manage More ❯
Online in a hybrid setup. Administer email gateways and Mimecast for security and compliance. Automate tasks and manage environments using Exchange PowerShell. Implement DataLossPrevention (DLP) policies. Maintain shared mailboxes, distribution lists, and email permissions. Administer OneDrive, SharePoint, and Power Platform (Power Automate, Power Apps, Power BI). Support enterprise content sharing and process automation. Manage More ❯
client. This analyst will play a crucial role in detecting, analyzing, and mitigating potential security risks. This work will be onsite in Huntsville, AL. Responsibilities: • Monitor & Analyze user activity data to detect anomalous behavior and potential insider threats. • Triage & Investigate alerts, documenting findings and reporting them through case management systems. • Develop & Implement countermeasures against known adversarial tactics, techniques, and … procedures (TTPs). • Collaborate with cybersecurity, counterintelligence, and law enforcement teams to refine detection strategies. • Conduct Forensic Analysis on network traffic, intrusion attempts, and datalossprevention technologies. • Support Insider Threat Programs by integrating multiple security data sources and refining detection triggers. • Provide Briefings & Reports to leadership on trends, risks, and mitigation strategies. Required Experience: • Education More ❯
client. This analyst will play a crucial role in detecting, analyzing, and mitigating potential security risks. This work will be onsite in Washington, DC. Responsibilities: • Monitor & Analyze user activity data to detect anomalous behavior and potential insider threats. • Triage & Investigate alerts, documenting findings and reporting them through case management systems. • Develop & Implement countermeasures against known adversarial tactics, techniques, and … procedures (TTPs). • Collaborate with cybersecurity, counterintelligence, and law enforcement teams to refine detection strategies. • Conduct Forensic Analysis on network traffic, intrusion attempts, and datalossprevention technologies. • Support Insider Threat Programs by integrating multiple security data sources and refining detection triggers. • Provide Briefings & Reports to leadership on trends, risks, and mitigation strategies. Required Experience: • Education More ❯
Company Description Experian is a global data and technology company, powering opportunities for people and businesses around the world. We help to redefine lending practices, uncover and prevent fraud, simplify healthcare, create marketing solutions, and gain deeper insights into the automotive market, all using our unique combination of data, analytics and software. We also assist millions of people … Investigator will lead and support efforts to enhance and expand Experian's global Insider Risk Management Program. This role is responsible for conducting thorough and objective security investigations involving data theft, espionage, misuse, sabotage, unintentional incidents, and workplace violence. The investigator must be detail-oriented, multi-task effectively, analyze and evaluate disparate data sets, and establish and maintain … a related field; advanced degree preferred. Experience in insider risk, counterintelligence, cybersecurity, or a related discipline. Hands-on experience with insider threat detection tools such as SIEM, UEBA, UAM, DLP, and other monitoring technologies. Strong understanding of insider risk frameworks, regulatory and privacy requirements, and relevant laws. Familiarity with SOC or Fusion Centre operations, including threat monitoring, intrusion detection, incident More ❯
DNS and Group Policy management Microsoft Systems Centre management, troubleshooting and packaging PKI management Additional skills: Microsoft clustering knowledge Network knowledge, including management of firewall rules and Cisco switches Datalossprevention implementations Capacity management Past experience in, and understanding of, software licensing Awareness of current trends and technologies, with the ability to formulate technical solutions Salary More ❯
DNS and Group Policy management- Microsoft Systems Centre management, troubleshooting and packaging- PKI management Additional skills: - Microsoft clustering knowledge- network knowledge, including management of firewall rules and Cisco switches- datalossprevention implementations- capacity management- past experience in, and understanding of, software licensing- awareness of current trends and technologies, with the ability to formulatetechnical solutions Salary and More ❯
Participate in discussions to make recommendations on improving SOC cyber visibility, process improvements, and reducing the incident remediation period Review all existing network event collections to determine if relevant data is present and make technical recommendations to develop or enhance alerting actions Enhance customer's ability to accomplish mission initiatives by delivering forward-thinking solutions that are not defined … experience Five years of experience in developing, implementing, and managing SIEM correlation rules and content (such as Splunk, ArcSight, Kibana, LogRhythm) Experience with writing audit log parsers for SIEM data structures such as ArcSight's CEF or Splunk's SPL Advanced knowledge of TCP/IP (Transport protocols geared to Network Engineering - Maybe change to encryption methods e.g. SSL … qualifications: Highly Preferred to have an Active SCI Splunk Enterprise Security Admin, Splunk Certified Developer certification Extensive experience with User activity monitoring (UAM) ,User Entity Behavior Analytics (UEBA) and DLP tools Expertise in developing Insider Threat trigger policies Investigate and analyze events of interest within the SIEM, document workflows, and identify process improvements in the handling and remediation of cybersecurity More ❯
log analysis. Responsibilities: • Design, test and implement secure operating systems, networks, security monitoring, and tuning. • Responsible for the management of IT security systems and applications, incident response, digital forensics, lossprevention, and eDiscovery actions, conducting risk and vulnerability assessments, and developing and implementing security controls. • Research, evaluate, and recommend new security tools, techniques, and technologies in alignment with More ❯
The Depository Trust & Clearing Corporation (DTCC)
creatively while maintaining a high level of flexibility, professionalism, and integrity. Ability to work independently and manage multiple tasks simultaneously. Experience in managing Data Protection Technologies: Endpoint & Web DLP, CASB Network Security: Secure Web Gateways, Secure Access Secure Edge (SASE), Firewalls, IDS/IPS technologies We offer top class training and development for you to be an asset in More ❯
the organization shares intellectual property (IP), as well as regulated or other protected data. Conduct or facilitate threat modelling of network services and applications that ties to the risk, data and industry drivers associated with the service or application. Establish and deliver methods and tools which provide value for the organization by reducing risk. Your Profile Essential skills/… security architecture function, e.g., SABSA, TOGAF, and the embedding of security principles within this. Good knowledge of network security techniques and technologies such as Remote Access, VPN, Firewalls, NAC, DLP, IDS/IPS, SIEM and Wireless security. Good Knowledge of information security principles and best practices and experience in managing information security risk. Familiar with information security frameworks such as More ❯
tenant merges. • Proven experience with M365 security and configuration. • Proven experience with core M365 applications and services e.g. OneDrive, Teams, Exchange, Viva, SharePoint. • Proven experience with M365 governance and data protection services including Information Protection and DLP. • Proven experience with Azure AD including on premises Active Directory. • Experience with Intune and EndPoint security and management. • Ideally background in on … Desirable: • M365 business adoption and change management • PowerApps • Unified Communications and meeting services The Person should have 10+ years’ experience in cloud or infrastructure delivery: • Migration of applications and data or experience with business process modernisation\analysis. • Experience leading delivery engagements and managing technical teams. • Excellent interpersonal skills and the ability to influence and manage a range of relationships More ❯
Cybersecurity Specialist or in a similar role within IT security ️ Strong knowledge of cybersecurity principles, threat intelligence, and security controls ️ Experience with security tools (e.g., SIEM, firewalls, EDR, VPN, DLP) and vulnerability management ️ Solid understanding of regulatory frameworks and industry standards (e.g., GDPR, NIST, ISO 27001) ️ Certifications such as CISSP, CISM, CompTIA Security+, or CEH are highly desirable Ready to More ❯