Crux For Technical Talent

Build Your Career in Cybersecurity -
YOUR WAY

01.
Contract/ fractional
Want flexibility and variety? Indicate your target areas of work and your availability, and we will match you with opportunities
You name your own bill rate. You control what you make.
02.
Contract to hire
Sometimes it makes sense both ways to 'try before you buy.' We will match you up with opportunities that allow you to get to know a company and the people before committing to a full time role
03.
Full time
Get matched with full time job opportunities via our job board and proprietary roles that we are recruiting for

How it works

Cyber River
01.
Join Crux
Abstract Art
02.
Help us get to know you
Abstract Lightbulb
03.
Access jobs custom tailored to you
Cyber City
04.
Receive ongoing career resources and guidance
Abstract Heart
05.
Find work you love
05.
Find work you love

Recent Jobs

Managing Director Americas Head of Information Security
BNP Paribas
State
New Jersey
Remote Elig.
On-site
Seniority
Executive
Domain
Cross-domain/ leadership
Salary ($K)
290.00
-
Not disclosed
350
Chief Information Security Officer
Trupanion
State
Washington
Remote Elig.
Hybrid
Seniority
Executive
Domain
Cross-domain/ leadership
Salary ($K)
200.00
-
Not disclosed
250
Deputy CISO
New Relic
State
Oregon
Remote Elig.
Hybrid
Seniority
Executive
Domain
Cross-domain/ leadership
Salary ($K)
202.00
-
Not disclosed
252
microtechnologies-squarelogo-1522088994220.png
On-site
State
South Carolina
Remote Elig.
On-site
Not disclosed
Seniority
Experienced
Domain
Governance, Risk & compliance
Salary ($K)
-
Not disclosed
Oversee and Govern

Role Summary

MicroTech is seeking a Cybersecurity and Information Assurance support Level II for the Combined Air Operations Center (CAOC) at Shaw AB, South Carolina. The CAOC team provides technical support, O&M, and system administration tasks and activities for server clients and applications. The candidate shall support management, administration and implementation of 609 ACOMS and 609 EACOMS cybersecurity Information Assurance programs to ensure confidentiality, availability, and integrity Enterprise and AOC networks, systems and information.

Company Overview

MicroTech is an award-winning Service-Disabled Veteran-Owned Small Business (SDVOSB) and experienced provider of information technology and communications. MicroTech offers a wide range of professional services focused on providing cutting-edge solutions with the customer at the forefront of every decision we make. Solving complex business challenges is our passion — we provide effective, practical solutions that can increase productivity, and decrease costs.

MicroTech has developed a well-earned reputation for best-in-class services and solutions using a repeatedly proven ISO 9001:2015 Quality Management System (QMS), ISO 20000 IT service management certification, and ITIL® management qualified business processes.

We offer great pay, amazing benefits, and our company culture is strong. MicroTech is devoted to people development and providing high achievers opportunities to grow professionally. As an employee, you are surrounded by intelligent, driven colleagues and have the benefit of a culture that is focused on bringing out the best in everyone. Our benefits include:

  • Insurance (medical, dental vision)
  • Paid Leave (15 days per year for those with less than three years of service, 20 days off for those with more than three years of service)
  • 401k Plan with Employer Matching Contribution
  • 11 Company-Paid Holidays
  • Tuition Assistance
  • Voluntary Benefit Programs
  • Corporate Discounts

MicroTech is an Equal Opportunity/ Affirmative Action employer. All qualified applicants will receive consideration for employment without regards to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, veteran status, or any other protected classes.

  • Serve as the information security subject matter expert, and implement processes and controls in support of cybersecurity programs to ensure compliance with AFI 17-130, Cybersecurity Program Management, and other governing DoD, USAF and USAFCENT directives and policy;
  • Plan, implement, upgrade and monitor security measures for the protection of communications and IT systems and information;
  • Draft, review and coordinate local IA policies, procedures and operating instructions, and provide recommendations for revisions;
  • Identify and manage cybersecurity risks; and implement controls to ensure the security and delivery of mission critical services;
  • Monitor and detect cybersecurity events; and implement appropriate response and recovery actions;
  • Manage cybersecurity incident management handling, response, escalation and reporting IAW SPIN-C and other IA applicable regulations;
  • Maintain cybersecurity posture IAW SPIN-C and applicable DoD, AF and USAFCENT directives and policy;
  • Ensure all IT hardware/software products are configured IAW with Security Technical Implementation Guidance (STIG) and other relevant security configuration and implementation guidance;
  • Ensure no unauthorized hardware/software is installed or used on Enterprise and AOC networks and systems;
  • Utilize standard software tools to perform vulnerability scans of network equipment and software; and assist network, systems and client administrators in implementing corrective actions required when vulnerabilities are detected;
  • Develop, update and maintain certification and accreditation documentation, including but not limited to DoD Risk Management Framework (RMF) artifacts, Plan of Action and Milestones (POA&Ms), waivers, and vulnerability mitigation plans;
  • Assess the impact of changes on certification and accreditation packages, and advise the government accordingly;
  • Process and coordinate system access authorization requests, software approval requests, firewall and proxy exemption requests/waivers, and other IA-related documents;
  • Ensure IA-related documentation is current and accessible to authorized individuals;
  • Research security issues affecting network/systems hardware and software, and provide recommended solutions;
  • Ensure unit and individuals are in compliance with USAFCENT ACCC IA standards and guidance; and promote information security awareness;
  • Assist with the sensitive and/or classified hard drive and removable media tracking, sanitization and destruction;
  • Assist with the operation, management and administration of unit Communications Security (COMSEC) and Emissions Security (EMSEC), and Operations Security (OPSEC) programs, as required;
  • Perform technical support and O&M activities
  • Attend and participate in cybersecurity and CM meetings, as required;
  • Develop and submit a Cybersecurity Monthly Status Report
  • Develop and submit IA advisories and ad-hoc reports, as required by the government.

Required Qualifications

  • Bachelor's degree in Computer Science or related field, and 5+ years’ work experience; AND
  • DoDM 8140 Information Assurance Management (IAM) Level 3 (CISSP, GLSC or CISM) certification
  • Active Secret Clearance required

NA

No items found.
1656681489088.jpeg
On-site
State
Texas
Remote Elig.
On-site
Not disclosed
Seniority
Experienced
Domain
Cloud security
Salary ($K)
-
Not disclosed
Securely Provision

Summary

With your experience as a security engineer, you belong among the elite talents in your industry. Join a vital team at one of the world's most renowned financial institutions.

As a Cybersecurity Architect III - AWS Cloud at JPMorgan Chase within the Corporate Sector - Cybersecurity and Tech Controls - GT Enterprise Product Security team, you serve as a seasoned member of a team that works to deliver high-quality cybersecurity architecture solutions for various software applications and platforms. Collaborate with cross-functional teams of architects to implement technology solutions and communicate risk and mitigation options using best practices in support of the firm’s business objectives.

Company Overview

NA

  • Performs analysis and reports against security risks to protect data, applications, and infrastructure using modern tools
  • Conducts reviews on existing security controls with minimal oversight
  • Identifies gaps in network architecture as defined by Senior Security Architects and creates detailed documentation of threats and mitigations for small software applications with few to no missing security threats
  • Builds an agile environment that follows methodologies in continuous integration and delivery, application resiliency, and security
  • Evaluate current and emerging technology trends to recommend best practices and solutions for future state architecture
  • Develops secure and high quality production code in reviewing and debugging code, written by others
  • Adds to team culture of diversity, equity, inclusion, and respect

Required qualifications, capabilities, and skills

  • Formal training or certification on security engineering concepts and 3+ years of applied experience
  • Experience creating cybersecurity solutions based on existing security parameters
  • Ability to evaluate current cybersecurity technologies to recommend ways to optimize architecture
  • Hands-on practical experience in system design, application development, testing, and operational stability​
  • Experience developing security engineering solutions, along with design and implementation of cloud security solutions on AWS, Azure, or GCP for best technical practices
  • Proficient in coding in one or more languages (e.g. Python, Shell Scripting, Automation Tools, Terraform, etc.)
  • Strong working knowledge of information and network security, IT risk management, and architectural concepts and patterns
  • Overall knowledge of the Software Development Life Cycle​
  • Demonstrated knowledge of software applications and technical processes within a technical discipline (e.g., public cloud, artificial intelligence, machine learning, mobile, etc.)
  • Experience with effectively communicating with senior business leaders

Preferred qualifications, capabilities, and skills

  • Strong exposure to cloud technologies
  • Attains and has proficient skills in at least one of the following certifications:
  • AWS Solutions Architect
  • AWS Security
  • CISSP / CCSP
  • Hashicorp Terraform Associate
  • Any Azure / GCP Architect or Security Certification

NA

No items found.
1615316208803.jpeg
On-site
State
Remote
Remote Elig.
On-site
Not disclosed
Seniority
Experienced
Domain
Network Security
Salary ($K)
95
-
159
Not disclosed
Protect and Defend
95

At DICK’S Sporting Goods, we believe in how positively sports can change lives. On our team, everyone plays a critical role in creating confidence and excitement by personally equipping all athletes to achieve their dreams. We are committed to creating an inclusive and diverse workforce, reflecting the communities we serve.

If you are ready to make a difference as part of the world’s greatest sports team, apply to join our team today!

OVERVIEW:

The Manager, Cybersecurity Engineering - Edge Security/Bot Mitigation will drive strategic support, engineering, and operations of critical cybersecurity technologies covering edge security and bot mitigation to assure the security posture of the organization’s e-commerce and mobile channels as a security liaison to business and technology stakeholders. This role requires the ability to translate the technology risk requirements and constraints of the business into technical control requirements and specifications, as well as develop metrics for ongoing performance measurement and reporting. The role coordinates the technology organization's technical activities to consult and assure the security posture of the organization via edge security and bot mitigation infrastructure while providing regular status and service-level reports to management.

An individual with a strong technical background is required, as well as an ability to work with the technology organization and business management to align priorities and plans with key business objectives. The role will be involved in technology planning initiatives to ensure that security measures are incorporated into strategic technology plans and that service expectations are clearly defined. The role will also be responsible for working with business and technology stakeholders to balance real-world risks with business drivers such as speed, agility, flexibility and performance. Expertise in leading project teams and developing and managing projects is essential for success in this role. As well as the ability to prioritize work efforts — balancing operational tasks with longer-term strategic security efforts. Other project management tasks will include resource balancing within the team, resource asks from other teams, task prioritizing, and project reporting. Vendor relationship management — ensuring that service levels and vendor obligations are met — is also an important aspect of the position.

The role is also responsible for managing highly technical staff as they work to accomplish company and personal development goals and must, therefore, have proven leadership skills. Documentation and presentation skills, analytical and critical thinking skills, and the ability to identify needs and take initiative are key requirements of the position. Technology personnel responsible for managing technical security infrastructure may report directly to the role or may report to other areas of Technology with their security-related activities coordinated by the role.

  • Strategy and People Leadership: Work with the Cybersecurity and Digital Trust Team to develop a security program and security projects that address identified risks and business security requirements. Manage the process of gathering, analyzing, and assessing the current and future threat landscape to provide a realistic overview of risks and threats in the enterprise environment. Develop budget projections based on short- and long-term goals and objectives. Monitor and report on compliance with security policies, as well as the enforcement of policies within the technology department. Propose changes to existing policies and procedures to ensure operating efficiency and regulatory compliance. Lead a team of information security professionals, hire and train new staff, conduct performance reviews, and provide leadership and coaching, including technical and personal development programs for team members.
  • Security Liaison: Assist resource owners and technology staff in understanding and responding to security audit failures reported by auditors. Provide security communication and awareness for audiences, which may range from senior leaders to field staff. Work as a liaison with vendors and the legal and purchasing departments to establish mutually acceptable contracts and service-level agreements. Manage production issues and incidents and participate in problem and change management forums. Work with various stakeholders to identify information asset owners to classify data and systems as part of a control framework implementation. Serve as an active and consistent participant in the information security governance process. Work with the technology and business stakeholders to define metrics and reporting strategies that effectively communicate successes and progress of the security program. Provide support for legal and regulatory compliance efforts, including audit support.
  • Security Engineering: Consult with technology and security staff to ensure that security is factored into the evaluation, selection, installation and configuration of hardware, applications and software. Recommend and coordinate the implementation of technical controls to support and enforce defined security policies. Research, evaluate, design, test, recommend or plan the implementation of new or updated information security hardware or software, and analyze its impact on the existing environment; provide technical and managerial expertise for the administration of security tools. Work with the enterprise architecture team to ensure that there is a convergence of business, technical and security requirements; liaise with technology management to align existing technical installed base and skills with future architectural requirements. Develop a strong working relationship with the security engineering team to develop and implement controls and configurations aligned with security policies and legal, regulatory, and audit requirements.
  • Operational Support: Coordinate, measure and report on the technical aspects of security management. Manage outsourced vendors that provide information security functions for compliance with contracted service-level agreements. Support operational components of incident management, including detection, response and reporting. Contribute to a knowledgebase comprising a technical reference library, security advisories and alerts, information on security trends and practices. Contribute to the day-to-day activities of threat and vulnerability management, identify risk tolerances, recommend treatment plans and communicate information about residual risk. Manage security projects and provide expert guidance on security matters for other technology projects. Assist and guide the disaster recovery planning team in the selection of recovery strategies and the development, testing and maintenance of disaster recovery plans. Ensure audit trails, system logs and other monitoring data sources are reviewed periodically and are in compliance with policies and audit requirements. Design, coordinate and oversee security testing procedures to verify the security of networks and endpoint systems, and manage the remediation of identified risks.

Required Qualifications:

  • Bachelor's Degree or equivalent experience in management information systems, computer science, information security/cybersecurity
  • 3-5 years of experience in identity and access management, security threat detection and risk management, technology controls, security frameworks, DevSecOps, staff mentorship & development

Preferred Qualifications:

  • CISM
  • CISSP

Targeted Pay Range: $95,200.00 - $158,800.00. This is part of a competitive total rewards package that could include other components such as: incentive, equity and benefits. Individual pay is determined by a number of factors including experience, location, internal pay equity, and other relevant business considerations. We review all teammate pay regularly to ensure competitive and equitable pay.DICK'S Sporting Goods complies with all state paid leave requirements. We also offer a generous suite of benefits. To learn more, visit www.benefityourliferesources.com.

No items found.
Managing Director Americas Head of Information Security
BNP Paribas
State
New Jersey
Remote Elig.
On-site
Seniority
Executive
Domain
Cross-domain/ leadership
Salary ($K)
290.00
-
Not disclosed
350
Chief Information Security Officer
Trupanion
State
Washington
Remote Elig.
Hybrid
Seniority
Executive
Domain
Cross-domain/ leadership
Salary ($K)
200.00
-
Not disclosed
250
Deputy CISO
New Relic
State
Oregon
Remote Elig.
Hybrid
Seniority
Executive
Domain
Cross-domain/ leadership
Salary ($K)
202.00
-
Not disclosed
252