Join Our Team Unified Platform is looking for a Deputy of Program Operation (GG-13) to join our team and drive impactful digital solutions across a wide range of tech services, including software development, cyber, cloud, data, and artificial intelligence. In this role, you’ll oversee the complete software and digital service development lifecycle—from design to maintenance—ensuring all solutions align with mission needs. You’ll enhance mission knowledge and information flow by implementing agile, automated, and integrated systems that improve decision-making and operational efficiency. As a leader in cyber project management, you’ll guide the development and deployment of cyberspace capabilities, maintaining a strong digital infrastructure that meets mission requirements. Additionally, you’ll serve as the main liaison for teams, representing projects and fostering collaboration with critical departments, Headquarters, and other functional organizations. If you’re ready to make a difference, apply now: https://lnkd.in/gE7_T7Ru
Unified Platform’s Post
More Relevant Posts
-
Shoutout to All IT Professionals! 👏🏻🤝 - System Administrators ( You keep our networks humming and our servers purring) - Cybersecurity Experts (You protect us from the unseen threats lurking in the digital shadows) - Software Developers and Engineers (You build and maintain the applications and systems that power our work) - Data Analysts and Scientists( You transform raw data into actionable insights, helping us make informed decisions) - IT Project Managers, Directors (You orchestrate complex projects, ensuring they are completed on time and within budget. Your leadership and coordination bring our technological visions to life) - Cloud and DevOps Engineers (You enable our flexibility and scalability, ensuring that our infrastructure can grow with our needs) - IT Technical Support (You are the lifeline for employees facing technical issues. Your patience, problem-solving skills, and quick responses ensure that we can stay productive and focused on our tasks.) Thank you, IT professionals, for all that you do. Your expertise, commitment, and behind the scenes efforts are the foundation of any organization success.
To view or add a comment, sign in
-
3 reasons you should consider this role if you're an experienced DP professional: 1) Jordan is a genuine leader who cares about his team. 2) You'll be challenged and be able to grow as both a technologist and a leader. 3) Synchrony is amazing, so much so that I left and came back. 😀 Bonus Round: At a time when companies are leveraging employees back to the office because "productivity," Synchrony has doubled down on remote work and employee mental health.
We need a security leader to join our team! We are hiring a Data Protection Engineering leader responsible for: ➡️ Data Protection Strategy & Operations ➡️ DLP Policy ➡️ Tokenization ➡️ Data Discovery There is a lot to do and this role is critical for our business. We need someone who understands and can lead technology teams but also has experience with enterprise risk & governance. Any 🦄 out there? ✅ Remote with a preference near one of our hubs ✅ Salary range $150,000 - $250,000 ✅ Annual bonus target 15% ✅ Incredible company culture and flexible Friday’s ✅ Tuition & certification reimbursement LinkedIn friends, likes & re-shares appreciated! Recruiters & agencies, I sincerely appreciate all you do to match companies with candidates, but I cannot accept candidates outside of our careers site. If you think they’re a good fit, please send them this post. Thanks for understanding! Candidates, feel free to DM me, but applying through the careers site is the best way to be considered. There are no black holes here! #hiring #synchrony #dataprotection #infosec #security https://lnkd.in/eJZxGuN9
To view or add a comment, sign in
-
Program/Project management is an underrated skill, especially when you get to more senior/lead roles. Those skills have helped me tremendously to just get my head around how to start an AppSec program. Being able to clearly define a roadmap with concrete goals to achieve is invaluable. I also concur with his thoughts on development skills. I don't think you need to be a full-blown application developer, but you need to be able to do programming at some level to produce automations that will help you deal with issues at scale.
✍ ✍ Another blog article is out, link in the comments. ✍ ✍ Stuart Mitchell recently posted about the types of candidates he hasn’t placed in his security recruiting career. Unfortunately, most Security Engineering roles are *not* entry level and most hiring managers expect candidates to have experience. Last year, I talked to Chris Romeo and Robert Hurlbut about The Future of Application Security Engineers and what it will take to succeed in our industry. The were four skillsets that I look for in a Futuristic Application Security Engineer are: 1️⃣ Application Security 2️⃣ Software Development 3️⃣ Influence Skills 4️⃣ Program Management 🛡️ Application Security 🛡️ is pretty obvious, you need those baseline skills for the role. I look for folks that can threat model, run a bug bounty, talk to engineer about specific vulnerabilities, etc. 💻 Software Development 💻 is an absolute must have, I cannot scale my Product Security program as fast as the Engineering org grows, which means that I need to scale through automation. I have also embedded security engineers into development teams to drive the right security controls. For 💬 Influence 💬, on the AppSec podcast, I talked about security engineers needing to become teachers, but I have expanded my thoughts on that. Not only do they need to be teachers, they also need to be able to convince others to do the right thing as well. Their communication skills have to be good enough to speak to VPs, but also ICs on security requirements, they have to be security influencers. Lastly, 📊 Program Management 📊 is a key skill. The vast majority of the time, security engineers are not actively working on a technical debt project, but they are program managing it. They are making sure that their engineering counterparts are fixing the appropriate vulnerabilities or reducing security technical debt and they need to monitor and make sure that the projects get delivered on time. Read the blog post, I go into deeper detail on each of these four areas and my expectations for Application Security Engineers to deliver in those areas. If there is any topic you want me to talk about, leave me a note in the comments.
To view or add a comment, sign in
-
🔥𝟗𝟎 𝐝𝐚𝐲𝐬 𝐭𝐨 𝐛𝐞𝐜𝐨𝐦𝐢𝐧𝐠 𝐚 𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐏𝐫𝐨𝐟𝐞𝐬𝐬𝐢𝐨𝐧𝐚𝐥🔥 🚀Day 33 Today, I learned Cyber Security Career Paths and Essential Skills Continuing from yesterday, here’s a brief overview of the career paths in each cycle of the cybersecurity life cycle, along with essential skills: 1. Security Planning and Design - Career Paths: Security Architect, Security Consultant, Risk Manager, Security Analyst - Role: Develop strategies and design secure systems. - Skills: Strategic thinking, risk assessment, understanding of security frameworks, and strong knowledge of network and system architecture. 2. Security Construction and Implementation - Career Paths: Security Engineer, Network Security Engineer, Systems Integrator, Security Software Developer - Role: Build and deploy security solutions. - Skills: Technical proficiency in security tools, network security, systems configuration, software development, and hands-on implementation skills. 3. Security Operations and Maintenance (O&M) - Career Paths: Security Operations Center (SOC) Analyst, System Administrator, IT Support Specialist, Network Operations Center (NOC) Technician - Role: Monitor and maintain security systems. - Skills: Threat detection, incident response, system monitoring, knowledge of security information and event management (SIEM) tools, and technical troubleshooting. 4. Security Emergency Response and Defense - Career Paths: Incident Responder, Cybersecurity Analyst, Digital Forensics Expert, Threat Hunter - Role: Respond to and defend against security incidents. - Skills: Quick decision-making, forensic analysis, understanding of attack vectors, crisis management, and threat analysis. 5. Security Compliance and Management - Career Paths: Compliance Manager, IT Auditor, Governance, Risk, and Compliance (GRC) Specialist, Data Protection Officer (DPO) - Role: Ensure compliance with legal and regulatory requirements. -Skills: Knowledge of compliance standards (like GDPR, HIPAA), policy development, auditing, risk management, and attention to detail. These career paths offer diverse opportunities in cybersecurity, each requiring specific skills to protect and secure digital assets effectively. That's a wrap for today. See you tomorrow.🥳 If you missed day 31, check the comments section.👇 If you're seeing my post for the first time, I'm Francisca, a Web3 Content Marketer with a track record of proven results. I still specialize in this field and would love to work with you. Recently, I've decided to expand my skills to include cybersecurity, and today marks the 33rd day of this new journey.😊 #Cybersecurity #CareerPaths #SecuritySkills #ProfessionalGrowth #CyberDefense
To view or add a comment, sign in
-
𝗖𝘆𝗯𝗲𝗿𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗶𝘀 𝗡𝗢𝗧 𝗷𝘂𝘀𝘁 𝗮 𝗷𝗼𝗯—𝗶𝘁’𝘀 𝗮 𝗰𝗮𝗿𝗲𝗲𝗿 𝗰𝗵𝗮𝗿𝘁𝗲𝗿. 5 Roles. 5 Paths. Endless Opportunities. Cybersecurity is more than hacking—it’s about safeguarding what matters most. Here's your 𝗖𝘆𝗯𝗲𝗿 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗖𝗮𝗿𝗲𝗲𝗿 𝗖𝗵𝗮𝗿𝘁𝗲𝗿: ➡️ 𝗣𝗲𝗻𝗲𝘁𝗿𝗮𝘁𝗶𝗼𝗻 𝗧𝗲𝘀𝘁𝗲𝗿: Identify system weaknesses by simulating attacks. 𝗦𝗸𝗶𝗹𝗹𝘀: Networking, Programming, and Security Frameworks. 𝗚𝗼𝗮𝗹: Become a Senior Penetration Tester or Consultant. ➡️ 𝗦𝗢𝗖 𝗔𝗻𝗮𝗹𝘆𝘀𝘁: Monitor and respond to security incidents in real time. 𝗦𝗸𝗶𝗹𝗹𝘀: SIEM tools, Incident Handling, Network Traffic Analysis. 𝗚𝗼𝗮𝗹: Lead SOC Analyst or Incident Responder. ➡️ 𝗕𝘂𝗴 𝗕𝗼𝘂𝗻𝘁𝘆 𝗛𝘂𝗻𝘁𝗲𝗿: Ethically hack systems, report bugs, and earn rewards. 𝗦𝗸𝗶𝗹𝗹𝘀: Web Security, Reconnaissance, and OWASP Top 10. 𝗚𝗼𝗮𝗹: Become a Security Consultant or Vulnerability Analyst. ➡️ 𝗗𝗲𝘃𝗦𝗲𝗰𝗢𝗽𝘀 𝗘𝗻𝗴𝗶𝗻𝗲𝗲𝗿: Integrate security seamlessly into the DevOps pipeline. 𝗦𝗸𝗶𝗹𝗹𝘀: CI/CD Tools, Automation Scripts, Cloud Security. 𝗚𝗼𝗮𝗹: Senior DevSecOps Engineer or Architect. ➡️ 𝗗𝗙𝗜𝗥 𝗦𝗽𝗲𝗰𝗶𝗮𝗹𝗶𝘀𝘁: Investigate, analyze, and mitigate cyberattacks. 𝗦𝗸𝗶𝗹𝗹𝘀: Digital Forensics, Incident Management, Legal Knowledge. 𝗚𝗼𝗮𝗹: Senior DFIR Analyst or Cybersecurity Manager. The cybersecurity field offers endless paths to grow and make a real impact. Which cybersecurity role sparks your interest the most?
To view or add a comment, sign in
-
URGENT! 2 Day Turnaround...
URGENT TWO DAY turn around - are you a highly skilled and motivated Cyber Project Support Officer with knowledge and experience in procurement, DevOps, stakeholder management, and the Essential Eight? https://lnkd.in/gvQWg9P4
Cyber Security Support Officer - One Bright Cloud
https://onebrightcloud.com.au
To view or add a comment, sign in
-
In the heart of the Netherlands, Orbis are at the front of the most exciting Technology Projects across Cyber Security and Software Engineering. 🌐 With the top 1% of talent in unprecedented demand, we're witnessing a surge of innovation. Here, companies are not just keeping pace—they're leading the charge.🚀 For consultants, this is your golden ticket. 🎫 Imagine contributing to projects that are shaping our future, right at the epicenter of technological advancement. The opportunities are not just abundant; they're transformative. Russel Parsons & Ashwin Manjiani have an abundance of career changing contract roles, If you're ready to elevate your career and make your mark within this dynamic industry, let's talk. 🤝 Live Roles: IAM Developer - €80-€100 Per Hour - South Holland - Russel Parsons Technical IAM Consultant - OneIdentity - Netherlands - Russel Parsons Senior Network Engineer - Rotterdam - Russel Parsons Full Stack Developer - Asset Management Client - Amsterdam - Ashwin Manjiani Microservices Developer - Amsterdam - Ashwin Manjiani Lead Full Stack Engineer - Amsterdam - Ashwin Manjiani #TechInnovation #SoftwareEngineering #CareerGrowth
To view or add a comment, sign in
-
Recent CrowdStrike incident is a crucial lesson for everyone in the tech industry. It shows the importance of robust security practices during software deployment. Let's dive into the key takeaways and explore how we can apply them to strengthen our systems. First, comprehensive testing is essential. It's important to implement a variety of testing methods, including unit, integration, performance, and stress testing. Testing shouldn't stop at the code; content updates and rollback procedures should also be rigorously tested. Automation can be a lifesaver here, helping to catch issues early in the development process. Second, smart deployment strategies can make a significant difference. Staged rollouts, starting with internal testing, then moving to early adopters, and finally to general availability, help mitigate risks. Canary deployments are another effective strategy, allowing for early detection of issues. Always have a quick reversion plan ready for emergencies to minimize downtime and impact. Enhanced monitoring is another critical area. During deployments, both application and system performance should be closely monitored. Setting up alerts for unusual patterns or sudden changes can help catch issues before they escalate. Real-time monitoring tools are invaluable in this regard, providing immediate feedback and allowing for rapid response. Securing content management is also vital. Configuration updates should be treated with the same level of care as code updates, with strict validation checks in place. Using cryptographic signatures can help verify the integrity of updates, ensuring they haven't been tampered with. Separation of concerns is a fundamental principle in system design. Distinguishing between core functionality and dynamic updates helps maintain system stability. Designing systems with clear boundaries between components, such as using a microservices architecture, can isolate different functionalities and reduce the risk of widespread failures. Customer control and transparency are also important. Providing customers with options to control update deployment and offering detailed release notes and update information builds trust. Implementing feature flags gives customers more control over their experience and can help mitigate the impact of potential issues. Finally, post-incident analysis is crucial for continuous improvement. Conducting thorough reviews and sharing learnings transparently, as CrowdStrike did, fosters a culture of openness and learning. Blameless post-mortems encourage honest discussions and help identify areas for improvement without assigning blame. #SoftwareDeployment #LessonsLearned #CyberSecurity #crowdstrike #outage #microsoft #hacking #freshers #jobs #hiring
To view or add a comment, sign in
-
🚀 Join Us in Building an Advanced Incident Response Suite for OT/ICS Infrastructure! 🚀 #StealthProject Are you passionate about cybersecurity and eager to make a real impact in the field of Operational Technology (OT) and Industrial Control Systems (ICS)? We're excited to announce an incredible opportunity to join our team as we develop a comprehensive Incident Response Suite. About the Project: We are working on building an Incident Response Suite designed specifically for OT/ICS environments. This suite will cover critical areas such as: Firmware Analysis Vulnerability Management Adversary Emulation Threat Modelling Threat hunting and triage Response Capabilities Why Join Us? ---------------------------- Innovative Work: Be part of a cutting-edge project that blends open-source and commercial solutions to address real-world security challenges. Collaborative Environment: Work with a team of passionate cybersecurity professionals committed to excellence and innovation. Professional Growth: Gain hands-on experience and deepen your expertise in OT/ICS security. Impactful Contribution: Help protect critical infrastructure by developing tools and methodologies that will be used globally. Who Are We Looking For? ------------- We are seeking talented individuals with skills and experience in: Security Product development Control system operations OT/ICS Systems Firmware Analysis Vulnerability Research Threat Intelligence Incident Response How to Apply: Interested candidates are encouraged to share us sample of their work/talk and sample detection/exploit they worked on. We will review submissions and select team members based on expertise and passion for cybersecurity. Project Nature: ########### This project will be both open-source and commercial, depending on the features incorporated. This dual approach ensures we can provide robust solutions while fostering community collaboration and innovation. Join us in this exciting journey to enhance the security of OT/ICS infrastructures and make a significant impact on global cybersecurity. Monetary benefits shall be agreed as per agreement respect to role and contribution factor - fixed+ variable ! #Hiring #Cybersecurity #OTSecurity #ICSSecurity #IncidentResponse #FirmwareAnalysis #ThreatHunting #JoinOurTeam
To view or add a comment, sign in
-
Job adverts (and process), done differently, to get a different result. I love this from the team. I love customers choosing to get the result ( the hire) but also choosing to inject brand and cache into the experience. Do you need a refresh? To be clear it’s not just flashy Ads. There is a world-first process behind the scences too. 25 years of thinking “There has to be a different way”. Now being done different!! Get in touch to know more. To know how we work with managers and TA teams to get “different” Great impulse content here Shiela ⚡ Pantaleon and marketing team. ❤️
We're looking for a Cyber Solution Architect who can talk tech and business like it's nobody's business. Is this you? More details below👇🏽 ⚡ Do you juggle on-prem and cloud like a pro and love diving into the nitty-gritty of architecture? ⚡ Are you bored with the ordinary? ⚡ Fancy building something that matters? We're looking for a cyber solution architect to help us transform a university. Intrigued? DM Chris McGowan for more details. #WeAreHiring #CyberSolutionArchitect #jobs
To view or add a comment, sign in
3,997 followers
AF Veteran | Cyber - IT Enthusiast | PhD Student (Cyber Leadership) | Military Transition Mentor / Coach | Endurance Athlete | ISC2 Board Member (Alamo Chapter)
1moShawn Lafferty