- UpvoteDownvoteShare Job
- Suggest Revision
An IAT II certification (CCNSecurity, CND, CySA+, GICSP, GSEC, Security+ CE, or SSCP) Certified Ethical Hacker (CEH) An IAT II certification (CCNSecurity, CND, CySA+, GICSP, GSEC, Security+ CE, or SSCP.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Relevant cybersecurity certifications or the ability to obtain certifications such as Certified Ethical Hacker (CEH), GIAC Certified Incident Handler (GCIH), CERT Certified Computer Security Incident Handler (CSIH), GIAC GSEC, or CompTIA Cybersecurity Analyst (CySA.
$58 an hourExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Certifications: CISSP, CISM, CISA, CEH, GCIH, GSEC, GCFA, GREM, CCENT. Performs discovery scanning via the Vulnerability Management Platform (scheduled and ad-hoc) Tracks via remediation management system and provides a wiki-style format to capture recommendation, analysis and facts, and links to other research.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Industry certifications in cyber security, such as Security+, CySA+, Certified Ethical Hacker (CEH), GIAC Security Essentials (GSEC), Cisco Certified Network Associate (CCNA), GIAC Certified Intrusion Analyst (GCIA), GIAC Certified Incident Handler (GCIH.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
GCFA, GCFE, EnCE, CCE, CFCE, CEH, CCNA, CCSP, CCIE, OSCP, GNFA. Team personnel provide front line response for digital forensics/incident response (DFIR) and proactively hunting for malicious cyber activity.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
8750 CSSP Incident Responder; A minimum of one certification from the following; CEH, CFR, CCNA Cyber Ops, CCNSecurity, CHFI, CySA+, GCFA, GCIH, SCYBER, PenTest+ 8750 IAT Level II: A minimum of one certification from the following; Security+CE, CySA+, GICSP, GSEC, CND, SCCP.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Certifications: Possession of industry-recognized certifications such as Security +, Cysa+ , GMON, GSEC, CISSP, CISM, CEH, GIAC, CCSP, or similar are required. Comprehensive knowledge of malware analysis, threat modeling, and vulnerability management.
$120,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Security certifications such as CompTIA Security+, CEH, CISSP, or GIAC certifications (GSEC, GCUX) are highly desirable. Overview The Cyber Security Engineer - Linux will participate in establishing and maintaining a corporate wide information security management program to ensure that information assets are adequately protected.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Technical Certifications CCNA, CompTIA A+, CSAP, CySA+, CompTIA Security+, CompTIA Network+, CHDA, CIWP, CEH, CIW, or CIW. If you have not taught in the past, we have faculty training class- for preset courses that will take 1-2 weeks with the Learning Management system, and you will be ready to teach.
Full-timeExpandApply NowActive JobUpdated 20 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Information Security Certifications such as CISSP, CEH, GPEN, OCSP, RHCSA, CompTIA Security+ Linux+, GIAC, GCIH, GCFA, GCIA, GNFA, GCUX or CISA are a plus. Responsibilities include vulnerability management, scanning and remediation, patch management, and threat and vulnerability assessment.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience in real time emergency operations, incident management, traffic management and public safety agency coordination and communications. A combination of training, experience, or education in Incident Management, Emergency Management, Transportation Management or related field desired.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Manage the organization's enterprise security tooling and systems (e.g., SaaS collaboration tooling, Identity & Access Management, Data Protection). Certifications such as CISSP, CISM, GSEC, etc.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
DoD Approved Baseline 8570 CSSP Auditor (CEH, CySA, CISA, etc.) Job Description: Own your career as a Security Incident Analyst (SIA) at GDIT. Here, you’ll have the opportunity to build strong lines of cyber defense using cutting-edge technologies.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Use Crowdstrike falcon to perform threat hunting, incident response, and malware analysis, as well as to automate and optimize security processes. Certifications such as CISSP, CISM, CEH, GCIH, GCFA, etc.
Full-timeExpandApply NowActive JobUpdated 20 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Professional certifications such as CISSP, CISM, OSCP and CEH. Develop, maintain, and support an IT Risk management program to include risk identification, measurement/prioritization, mitigation, and reporting (in partnership with the Governance Manager.
ExpandApply NowActive JobUpdated Yesterday
ceh gsec incident management tuition reimbursement jobs
FEATURED BLOG POSTS
Learn How to Respond to an Interview Request With Templates
Job interviews are an inevitable part of any job search. So, handling them well is key to building a fulfilling career. Regardless of whether you’re looking at a more junior role or strive for a role as a business executive, you need to maintain your professionalism every step of the way in order to stay in the game.
How to Get Pay Stubs (From Previous Employee Also!)
Pay stubs are an important piece of document which shows your earnings in a given period, as well as any deductions made towards your health insurance or pension contributions. They’re also excellent for finding out how much your recent salary raise has bumped up your monthly net income.
Structured vs Unstructured Interviews
The goal of an interview is to evaluate candidates based on their skills, personality, and knowledge. You want to choose the BEST candidate from your candidate pool, so the interview is something you can't mess up. As you begin planning your interview process, one of the major decisions you'll face is whether the interview should be a structured vs unstructured interview. So let's take a dive into the differences and sort out which circumstances warrant which interview process.
How to Describe Your Personality with Examples
Imagine you’re in an elevator with the CEO of your dream company and you get to talking. The conversation is going well and you start to imagine yourself working for their company when the CEO turns around and asks you “tell me a bit about yourself.” Would this catch you off guard or would you be able to give a clear and succinct description of who you are?
4 Ways to Make Your Job Posting More Inclusive
According to a Glassdoor survey,
How to Calculate Net Income
Understanding your finances can be daunting even if you’re good with numbers. Your net income, in particular, is a key metric for determining how well you’re doing financially and whether your current way of operating is sustainable or not.
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra: