- UpvoteDownvoteShare Job
- Suggest Revision
Qualified candidates should have experience leading a network security environment, such as a Security Operations Center (SOC), Computer Emergency Response Team (CERT), Computer Incident Response Team (CIRT), Computer Incident Response Center (CIRC) or Cyber Security Incident Response Center (CSIRC.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Information Technology, Financial Services, Cybersecurity, Computer Software, Internet, Information Technology and Services, Computer & Network Security, Cloud Security, Security & Investigations, Data Protection.
RemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
In addition to a basic core of computer engineering topics, the ECE faculty and students are engaged in several thrust areas such as hardware security, advanced networking, Internet of Things (IoT), and Quantum Computing.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Collaborates with cyber security contractor, operations and accreditation teams on execution of design, engineering, upgrade and integration activities Job Requirements Required: Bachelor's or higher in Cyber Security, Computer Science, Computer Engineering, or other relevant engineering or IT security field, or related equivalent additional experience.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Digital Multimedia, IT Security, Nursing, Robotics, Sonography, Mechanical Engineering Technology (Advance Manufacturing) and dozens of other career programs produce potential employees each year.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Its faculty have pioneered advances in areas including programming languages, hardware design, algorithms, databases, security and privacy, bioinformatics and biomedical science, quantum computing, and artificial intelligence and machine learning.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
We are searching broadly across the Information Science/Systems/Technology spectrum, such as in the areas of human-centered computing (HCC), human-computer interaction (HCI), serious/educational gaming, virtual/augmented reality (VR/AR), security, accessibility, health informatics, computer-supported cooperative work (CSCW), and social computing.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Bachelor's Degree in Information Security, Computer Science, Digital Forensics, Cyber Security OR equivalent years of professional experience OR equivalent military experience to meet job requirements and expectations.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Artificial intelligence, including computer vision, natural language processing, human language technologies, multimodal sense-making, and other AI/ML based systems. Industrial security, including supply chain illumination and risk assessment.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Familiarity with one or more of the following: RSA Security Analytics (NetWitness), Symantec Bluecoat, CyberArk, ForeScout CounterAct, McAfee ePO, FireEye, Cisco FirePower (SourceFire), RedSeal, SecureSphere Imperva, Tenable Nessus, Splunk, Cloud technologies, Splunk Cloud, DevSecOps processes.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
A bachelor’s degree in computer science, engineering, information technology, cyber security, or related field. Researches and maintains proficiency in tools, techniques, countermeasures, and trends in computer network vulnerabilities, data hiding and network security and encryption.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
BS degree in Computer Science, Cyber Security, Information Technology (or related discipline); Graduate degree in Information Assurance (or related discipline) or equivalent formal training and experience in Information Security.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Senior Computer User Support Specialist. Galapagos Federal Systems, LLC is looking for a Senior Computer Support Specialist to provide support to the Chemical Biological Center IT Mission Support Center (ITMSC.
ExpandApply NowActive JobUpdated Today
computer security jobs
FEATURED BLOG POSTS
In-House vs Outsourcing Recruiting: Which is Better?
When looking at in-house vs outsourcing recruiting, it is important to nail down the benefits for each and whether those benefits outweigh the risks that follow.
How to Write a Short Bio
First impressions can be tricky. When meeting someone in person, it’s likely you have an elevator speech. These short, practiced introductions can help you share more about who you are, what you do for work and other facts about you. While this works well in a live, in-person context, there are many cases where professionals “meet” someone via written form - like social media, a resume, or published work. In these cases, your bio works as your first impression. So, here’s a step-by-step guide on how to write a short bio.
How to Conduct a Performance Review (With Examples)
In a world where the smallest mistake can cost your business tens of thousands in lost revenue, your talent is key to keeping your edge on the market and driving growth. However, managing a workforce of any size can be a challenge. Employees come with their own particular skill set, ambitions and flaws. So, it can be difficult to uncover their individual drivers. Not to mention the challenges brought on by the hybrid and remote working models where in-person interactions have become few and far between.
How to Recruit Passive Candidates
Learning to recruit passive candidates is a different ballgame than recruiting active ones. While an active candidate is someone who is currently looking for a new job, a passive candidate tends to be the opposite. Passive candidates are either already working or not looking to work. So, instead of these candidates coming to you, you'll have to find them and reach out to them first.
How to Effectively Recruit Employees
Today, hiring and retaining talent looks much different than it did only two or three years ago. Financial instability and the strain on our mental health brought on by the pandemic has made everyone more wary and selective of their workplace and employer. Whereas in the past people might have prioritized promotions and financial reward, today they look at other factors such as workplace flexibility, personal fulfillment and values alignment.
How Many Hours is Part-Time vs. Full-Time Work?
Growing up you watched your parents shuffle to and from the office, held hostage to their 9 to 5. If jammed-packed schedules and deadlines sound frightening, you might consider pivoting your search to part-time jobs. In fact, even employers have shifted their preference, selecting more people open to the idea of flexible working hours.
How to Make a Job Offer More Competitive
Money alone makes it hard to attract and retain top-notch candidates, especially when you are competing with larger businesses and corporations in your industry. So, instead of focusing on money, figure out how to make a job offer more competitive when you can't offer more money.