- UpvoteDownvoteShare Job
- Suggest Revision
Experience with Assured Compliance Assessment Solution (ACAS/NESSUS), DISA Security Content Automation Protocol (SCAP), Host Based Security System (HBSS); Continuous Monitoring and Risk Scoring (CMRS) cybersecurity applications and tools.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Performs configuration, implementation, monitoring, problem resolution, and maintenance of firewalls, routers, switches, access points, network access control (NAC), Network Management Systems (NMS), Intrusion Detection Systems / Intrusion Prevention System (IDS/IPS), Virtual Private Networks (VPN’s), and security information and event management (SIEM) system.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with proprietary security protection/detections tools such as Firewall, Host and Network IDS/IPS, Anti-Virus, EDR, URL Filtering Gateways, Email Filtering Gateways, DLP tools, and SIEM tools such as Splunk etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Technologies utilized by the Enterprise Network Engineer Senior include: Cisco Identity Services Engine (ISE), Cisco ACL, Cisco Meraki, Cisco DNA Center, Cisco Prime, Cisco Catalyst, Cisco Nexus, Cisco Fabric Path, Cisco Firepower, Palo Alto Firewall, Panorama, IDS, IPS, Silver Peak SD-WAN Optimization, NetBrain, LiveAction, and Wireless Flex Connect.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Manage and optimize cyber security tools including, network security monitoring, encryption, vulnerability scanning, vulnerability management, penetration testing, antivirus, phishing simulation, firewall, multi-factor authentication, mobile device management, and endpoint detection tools.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Design, configure, implement, troubleshoot, and maintain all security and health monitoring platforms and their associated software, such as firewalls (Security Groups), intrusion detection/intrusion prevention, anti-virus/malware (HBSS), SIEM (Splunk), Solarwinds, Nagios, native cloud services and MDM.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Proficiency with security monitoring tools (e.g., SIEM, IDS/IPS), threat intelligence platforms, and malware analysis tools. Perform in-depth analysis of logs and alerts, leveraging security tools (e.g., SIEM, IDS/IPS) to investigate and respond to security events.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Physical security management in the areas of access control, Intrusion Detection System (IDS) monitoring and response. Huntington Ingalls Industries is looking to hire a Contractor Program Security Officer (CPSO) for programs executed out of Beavercreek, OH. The CPSO will work closely with security management and assigned program staff on all aspects of special program security.
Part-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Moderate to Advanced knowledge in the following areas: Event analysis leveraging SIEM tools, log parsing and analysis skill set, networking fundamentals, current threat landscape, malware operation and indicators, penetration techniques, DDoS mitigation techniques, IDS/IPS systems, Windows and Unix or Linux, Firewall and Proxy technology, Data Loss Prevention monitoring, scripting, analysis experience, and audit requirements (PCI, HIPPA, SOX, etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This role will be a crucial role in managing key security reporting systems, including patch, vulnerability, firewall, IDS, SIEM , NGAV, EDR, Active Directory, Data Loss Prevention monitoring, and audit log management programs.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Security Monitoring and Analysis: Define and implement comprehensive monitoring and analysis strategies, leveraging security information and event management (SIEM) solutions, intrusion detection systems (IDS), and other relevant tools, to identify security incidents, conduct investigations, and provide real-time threat intelligence.
$106,298 - $177,164 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience working with various SIEM systems, threat intelligence platforms, security automation and orchestration solutions, intrusion detection and prevention systems (IDS/IPS), file integrity monitoring (FIM), DLP and other network and system monitoring tools.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
For correlation and incident analysis purposes using a variety of IT monitoring and security event correlation technologies, including the following: SIEM, EDR, XDR, IDS, UEBA, DLP, SOAR, and related capabilities.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with security tools such as SIEM, IDS/IPS, endpoint protection, and threat intelligence platforms. Responsibilities:Manage Security Operations: Oversee all aspects of Security Operations, including monitoring, incident response, vulnerability management, and threat intelligence.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Practical knowledge of enterprise security tools (anti-malware, firewalls, IDS/IPS, email monitoring, two-factor authentication, SIEM, etc. Administer and maintain security products (web application firewall, IDS, (h)IPS, etc.
$146Full-timeExpandApply NowActive JobUpdated Today
ids monitoring jobs
FEATURED BLOG POSTS
How to Find a Job That Makes You Happy - 11 Concerning Facts
Do you ever feel like your life is like one of those rom-com movie scene openers? You know, the ones where the main character rolls out of bed, awakened by a casually upbeat theme song, sulks their way to the coffee pot, and then trudges toward their computer to begin yet another boring day at work?
How to Decline a Job Offer You Already Accepted
When you think about it, turning down a job offer is not the worst position you could be in. If you’ve been lucky enough to consider multiple job offers, well, then you’re lucky enough.
How to Practice Fair Chance Hiring for People With Criminal Records
Usually when you think of your dream hire, you think of someone who is respectful, trustworthy, reliable, and has sound judgment, right? As you envision your ideal candidate with these qualities, the last person you think of is someone with a criminal record.
6 Common Mistakes to Avoid When Employer Branding
Currently, job searchers are putting extra effort into researching employers. The information they find plays a major role in whether they will pursue an opportunity with you or look for jobs elsewhere. That is why it is now more important than ever to be proactive and intentional when showcasing your workforce and workplace culture. Having a well crafted employer branding strategy can help you strategize and influence your potential candidates so they see your business in the best light. But in order to do that, you should be aware of some of the most common mistakes that employers make.
What to Say When Terminating an Employee
Terminating an employee is an inevitable part of doing business. Whether you’re re-structuring your department or you’ve identified a few employees who’re not living up to your expectations, letting people go is necessary for keeping your workforce healthy and thriving.
How to Utilize Keywords for Your Job Ads
Before we give you the scoop on how to utilize keywords in job ads, it would be helpful if we defined what keywords are and why they are important. In simple terms,
What Makes a Good Paid Time Off (PTO) Policy
The world of work has undergone some major transformation in recent years. From remote and flexible work to increased emphasis on employee benefits and wellbeing, companies nowadays have to be very intentional about their HR policies and how they approach talent acquisition.