- UpvoteDownvoteShare Job
- Suggest Revision
Must have a Bachelor’s degree in Business, Computer Science, Information Systems, Engineering, Mathematics, Cryptography or a related field and 2 years of consulting experience in Cyber Security and/or IAM. Experience may be gained as part of the required education, including co-op and/or internship experience.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Apogee is actively seeking a full-time Artificial Intelligence/ Machine Learning (AI/ML) Subject Matter Expert working for the Department of Homeland Security's Advanced Computing Branch supporting the Department of Homeland Security (DHS) Science and Technology Directorate within the Data Analytics Technology (DTC) in Washington, D.C. This position is fully remote.
Full-timeExpandApply NowActive JobUpdated 15 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Education: Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Degree must be in Network Engineering, Systems Engineering, Information Technology or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
We offer undergraduate programs in Software Engineering, Computer Engineering, Computer Science, Bioinformatics and Cyber Security, a postgraduate degree in Information Technology as well as a number of combined degrees with other disciplines.
$172,261 a yearFull-timeExpandApply NowActive JobUpdated 12 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience: Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering.
$136,500 a yearFull-timeExpandApply NowActive JobUpdated 12 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Education/Experience - Enrolled in a 2 Year Associates Degree in Science, Math, Engineering, Semiconductor Manufacturing, Mechanical or Electrical Technology, Automotive, Industrial, HVAC, Advanced Manufacturing, Aviation, or a related discipline, as well as Business, Computer information systems, Computer Networking/cyber security, Liberal Arts, Health Studies/Health Technology, General Studies and more with the first year of the degree nearly completed.
Full-timeExpandApply NowActive JobUpdated 17 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Our academic staff have research focus in areas including Artificial Intelligence, Biomedical Image Computing, Data and Knowledge, Embedded Systems, Networked Systems and Security, Human Centred Computing, Programming Languages and Compilers, Service Oriented Computing, Theoretical Computer Science and Trustworthy Systems.
$172,261 a yearFull-timeExpandApply NowActive JobUpdated 16 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with ubiquitous core network device (switch/router/hub) technology (hardware or core software) Education : Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security.
$198,300 a yearFull-timeExpandApply NowActive JobUpdated 18 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Strongly desired: Bachelor's degree in computer science, Cyber Security, Information Technology, Software Engineering, Information Systems, or Computer Engineering degree or degree in Mathematics or Engineering.
$70,000 a yearFull-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Up to 18 semester hours of military training/coursework in networking, computer science, or cyber topics is equivalent to an Associate degree. If not credited toward education requirements, completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered towards relevant experience requirement (i.e., 20- to 24-week courses will count as 6 months of experience; 10-14 weeks will count as 3 months of experience.
Full-timeExpandApply NowActive JobUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Education: Bachelor of Science degree in Computer Science, Computer Engineering, Electrical Engineering, Informational Technology, Information Systems, or an equivalent degree.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance and/or systems engineering, additionally, must have experience in network or system administration.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
You can advance your career as you develop increasing expertise in networking protocols and architectures, cloud security, Internet of Things protocols, and advanced network security. Sentar invests in our people - we offer a robust professional development and education assistance plan, to help our employees reach the next level Reach out to your recruiter to learn more.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Use information collected from a variety sources (e.g., intrusion detection systems, firewalls, network traffic logs, and host system logs) to identify potential vulnerabilities, respond to cyber events that occur, and defend against events that might occur.
Full-timeExpandApply NowActive JobUpdated 17 days ago
education technology computer science cyber security jobs
FEATURED BLOG POSTS
Structured vs Unstructured Interviews
The goal of an interview is to evaluate candidates based on their skills, personality, and knowledge. You want to choose the BEST candidate from your candidate pool, so the interview is something you can't mess up. As you begin planning your interview process, one of the major decisions you'll face is whether the interview should be a structured vs unstructured interview. So let's take a dive into the differences and sort out which circumstances warrant which interview process.
How to Describe Your Personality with Examples
Imagine you’re in an elevator with the CEO of your dream company and you get to talking. The conversation is going well and you start to imagine yourself working for their company when the CEO turns around and asks you “tell me a bit about yourself.” Would this catch you off guard or would you be able to give a clear and succinct description of who you are?
4 Ways to Make Your Job Posting More Inclusive
According to a Glassdoor survey,
How to Calculate Net Income
Understanding your finances can be daunting even if you’re good with numbers. Your net income, in particular, is a key metric for determining how well you’re doing financially and whether your current way of operating is sustainable or not.
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra:
6 Best Ways to End a Cover Letter with Examples
Including a cover letter with your resume is a great way to introduce yourself to the hiring manager, tell them why you’re the ideal fit for the role, and provide context about your personal situation. A strong cover letter will give you an advantage over other applicants. But it’s important that you structure it properly and write it powerfully so that it carries an impact. This article will discuss how to end a cover letter effectively so you catch the eye of a hiring manager and increase your odds of landing an interview. Read on to learn more.
How to Write a Follow-Up Email for a Job Application?
Most times, we have to do more than submit a "sugar-coated" resume to land our dream jobs. Going the extra mile to follow up on your job application can increase your chances of employment. Additionally, it may even help you get confirmation sooner on whether you are seriously being considered for the job or not.