- UpvoteDownvoteShare Job
- Suggest Revision
Contributes and oversees the operations and maintenance of IT infrastructure including virtualization environment (VMware), storage, email, file, multiplatform servers, computerized laboratory equipment, security and network infrastructure, backup and archival systems, disaster recovery and Internet connectivityResponsible for the management and administration of cloud-based applications.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
You can advance your career as you develop increasing expertise in networking protocols and architectures, cloud security, Internet of Things protocols, and advanced network security.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
We develop innovative solutions that are transforming the internet security business, and millions of users rely on our service for data protection and comprehensive security.
$115,500 - $165,000 a yearFull-timeExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
We work with our customers including the FAA, DOE, NASA, National Science Foundation, Transportation Security Administration, Custom and Border Protection, airports, and electric utilities to make the world safer, healthier, and more efficient.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Maintaining the security of the outside fiber plant (OSP) network, either aerial and/or underground, throughout area of responsibility by managing cable location, by locating contractors and initiating protection activities.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Part-time Security Risk Analyst (SRA) will work in a 24/7 global security operations center (GSOC); applicants must be open to working weekdays or weekends and all shifts (day, swing and grave) ; This opening is scheduled Saturday and Sunday from 6am-6pm, schedule is subject to change.
Full-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Ensure compliance with legal, regulatory, and company standards and policies, maintaining a focus on security, data protection, and risk management in all assigned activities. We are looking for a Business Analyst with a demonstrated background in IT infrastructure, particularly in the realm of building technologies such as networking, tenant internet services, Energy Management Systems (EMS), and/or property-focused IoT solutions.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Strong knowledge of network security technologies and tools, such as SIEM, IDP/IPS, Identity Management, TACACS, Network Anomaly detection, DDoS protection, forensics, and botnet detection.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Willingness to go the extra mile to get the job done within SLAs and customer commitmentsDemonstratable understanding of network connectivityDemonstratable understanding of Active Directory, Windows Servers, and ServicesSolid experience working with Internet Security and Networking Technologies such as TCP/IP, HTTP, Load balancers, Proxies and Firewalls.
Full-timeExpandApply NowActive JobUpdated 13 days ago - UpvoteDownvoteShare Job
- Suggest Revision
QUALIFICATIONS EXPERIENCE & EDUCATION: Knowledge of Enterprise Networks & Security infrastructure, Communication and internet security systems, Firewalls, Intrusion Protection Systems, Remote Access VPN, Proxy, Wireless Security, NAC, Enterprise ID Management systems, Database, computer systems, security event analysis and forensic investigations.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Deny-All-Permit by Exception (DAPE) firewalls, Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) protect all logical entrances and Defense-In-Depth firewall protection is deployed throughout the ICAN and is primarily comprised of a Windows 10 and any other Windows-based Operating System environment with Voice over Internet Protocol (VoIP) phone devices.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Qualcomm expects its employees to abide by all applicable policies and procedures, including but not limited to security and other requirements regarding protection of Company confidential information and other confidential and/or proprietary information, to the extent those requirements are permissible under applicable law.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Working knowledge of data center facilities management practices and supporting Operational Technology(OT)/Industrial Control Systems (ICS) including Building Management Systems, Distributed Antenna Systems, corporate WIFI, Precision Timing Protocol, fire protection, physical security access control systems.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Create firewalls and update virus protection software and data security systems to keep data and communications protected. Stay updated on current knowledge and understanding of security and networking best practices to offer the best solutions and protection to company systems.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Internet security technologies including DDoS and DDoS mitigation, Firewalls, TLS, VPN, DLP. Athenian Project: We created Athenian Project to ensure that state and local governments have the highest level of protection and reliability for free, so that their constituents have access to election information and voter registration.
Full-timeExpandApply NowActive JobUpdated 22 days ago
internet security protection jobs
FEATURED BLOG POSTS
5 Common Interview Mistakes
Everyone's interview process is unique in some form or fashion. Like most, your interview process is crafted so you can get the most information out of your candidates to increase hiring confidence and make the right hiring decisions. However, there are often small problems in interview processes that could ultimately affect the success of hiring decisions.
Structured vs Unstructured Interviews
The goal of an interview is to evaluate candidates based on their skills, personality, and knowledge. You want to choose the BEST candidate from your candidate pool, so the interview is something you can't mess up. As you begin planning your interview process, one of the major decisions you'll face is whether the interview should be a structured vs unstructured interview. So let's take a dive into the differences and sort out which circumstances warrant which interview process.
How to Describe Your Personality with Examples
Imagine you’re in an elevator with the CEO of your dream company and you get to talking. The conversation is going well and you start to imagine yourself working for their company when the CEO turns around and asks you “tell me a bit about yourself.” Would this catch you off guard or would you be able to give a clear and succinct description of who you are?
4 Ways to Make Your Job Posting More Inclusive
According to a Glassdoor survey,
How to Calculate Net Income
Understanding your finances can be daunting even if you’re good with numbers. Your net income, in particular, is a key metric for determining how well you’re doing financially and whether your current way of operating is sustainable or not.
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra:
6 Best Ways to End a Cover Letter with Examples
Including a cover letter with your resume is a great way to introduce yourself to the hiring manager, tell them why you’re the ideal fit for the role, and provide context about your personal situation. A strong cover letter will give you an advantage over other applicants. But it’s important that you structure it properly and write it powerfully so that it carries an impact. This article will discuss how to end a cover letter effectively so you catch the eye of a hiring manager and increase your odds of landing an interview. Read on to learn more.