- UpvoteDownvoteShare Job
- Suggest Revision
Security Protocols: Establishes plans and protocols to protect digital files and information systems, maintains data integrity, and manages network security. Familiarity with DLP, anti-virus, and anti-malware systems.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The candidate for this position should have experience supporting a broad-range of programs associated with overall information assurance and cyber security support; inclusive of security configuration and management services, data protection, anti-virus, malware detection and protection, host-based and endpoint security solutions, and audit and accountability services.
$81,250 - $146,875 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Trusted by over 1,000 organizations worldwide and with over 30 anti-malware engines, 100+ data sanitization engines and more than 25 technology integration partners, OPSWAT is a pioneer and leader in data sanitization, vulnerability detection, multi-scanning, device compliance, and cloud access control.
$110,000 - $136,000 a yearExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience and/or familiarity with the following network protection devices: Firewalls, intrusion detection and prevention systems (IDS/IPS), log analysis, malware analysis, network traffic flow and packet analysis.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Builds and Manages Information Security Infrastructure to include Anti-Malware, Data Loss Prevention, End-point encryption, Incident Detection and Response, Mobile Device Management Vulnerability Management tools.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
4) Current Network Security applications, services and appliances including Identity Management, Network Access Control, Application Layer Inspection, Content and Malware Filtering, Data Loss and Intrusion Prevention, zero-day threats, IPsec and SSL VPN, PKI, Two-Factor Authentication and other.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Certified Ethical Hacker (CEH), Windows/Linux Admin, Azure Sentinel or Other Cloud SIEM, CISSP, Security+, Network+, Cisco Certified Network Professional (CCNP), Cisco Certified Security Professional (CCSP.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with Security and network hardware (Cisco, Palo Alto, F5) Expertise in networking, firewalls, proxies, SIEM, anti-malware, and IDS/IPS technologies. One or more security certifications such as CISSP, CISM, or CEH is preferred.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Provide direct support of cyber security practices maintaining anti-malware, threat management, vulnerability management and anti-phishing technologies. The IT Specialist II ensures proper computer, software, and network operation so that end users can accomplish appropriate business tasks for all business units.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience and knowledge of modern network threats and malware, network forensics, automation tools and technologies, and endpoint security technologies. Prior experience selling network infrastructure-based security appliances, including but not limited to - Firewalls, SSL/IPSec VPNs, Security Proxies and Caches.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Requisition Number: 18484 Required Travel: 0 - 10% Employment Type: Full Time/Salaried/Exempt Hours Per Week: 40.00 Security Clearance: TS/SCI with Poly Level of Experience: Mid Job DescriptionMission Technologies a division of HII - Cyber Electronic Warfare and Space (CEWS) provides full-spectrum cyber, EW and space capabilities that address today’s rapidly changing, multi-domain global security threats, and anticipate emerging threats.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience deploying and customizing security tools to address threats and lower risk: vulnerability scanners, static analyzers, web application firewalls, IDS/IPS, malware analysis, network traffic flow and packet analysis, cloud security posture management (CSPM), etc.
$113,518 - $195,797 a yearFull-timeRemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
At least 6 years of experience conducting Cyber investigations that leverage security and infrastructure technologies (firewall logs, network security tools, malware detonation devices, proxies, IPS, or IDS.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Proactively hunt security threats and anomalies on the network. Respond to security alerts, utilizing open-source intelligence to enrich investigations with meaningful information.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Provides architectural strategy and subject matter expertise in a broad range of IT security disciplines, including network security, data protection, malware defenses, security analytics, identity and access management, compliance, endpoint and mobile security, third-party software-as-a-service integration, infrastructure as a service, cloud, and secure coding lifecycle.
ExpandApply NowActive JobUpdated 5 days ago
malware network security jobs
FEATURED BLOG POSTS
Minimizing Candidate Renegs During the Hiring and Onboarding Process
Candidates reneging on job offers or during the onboarding process can be a frustrating experience for any recruiter. In a talent-driven job market, it’s common for candidates to have more than one job offer to consider. It becomes a race against time to see which organization can offer the best career experience, compensation, and circumstances that secure the right employees.
10 Reasons to Be on Time at Work
Being punctual at work may not be something you’ve given much thought to, but it’s the foundation for building a successful career. All of your technical or job-specific skills will be in vain if your peers and superiors can’t trust you to show up on time and do the work. In fact, Simon Sinek once famously said that
Recruiting in a Recession: Hard Truths That Talent Acquisition Experts Must Accept
The summer had economists from around the globe embroiled in a debate about a possible recession coming in the next few years (or months). As of October 2022, the U.S. Labor Department data put the current inflation rate at 7.7%. The recent layoffs in the tech industry are just the first of what is soon to be a string of cutbacks by companies looking to save costs. For recruiters, this means freezes in hiring and fewer openings. It will also include the uphill task of finding the best candidates for them from the coming influx of recently laid-off job seekers. Now is probably a good time to brace for tough times in the next few years in the talent acquisition industry. To survive and thrive recruiting in a recession, here are some hard truths you will need to accept.
10 Importancies of Setting Realistic Goals
We’ve all heard how important it is to set professional and personal goals. Developing and establishing goals keeps us motivated and moving forward in life. But not all goals are created equal. If you’re chasing goals that are too lofty, you’ll end up disappointed when you cannot reach them. Setting goals that are achievable and measurable is the key to success.
Email Etiquette Principles - Why is it Important
Why is email etiquette important? Let's imagine you're hiring for a new role, and you’ve just received the email below.
10 Reasons HR is Important to an Organization
"Nothing we do is more important than hiring and developing people."
Collaborative Recruiting: The Key to a Better Talent Acquisition Strategy
Talent acquisition is a multi-stage process where candidates undergo various application steps before getting hired. The unfortunate reality is that it is a labor-intense system, with the hiring manager and recruiter often handling all of the work on their own. Ask any one of them, and you will hear about the overabundance of applications and the demanding task of filtering through them to find the best candidates. The quality of talent suffers under the weight of all that work on one person's hands. It's not easy, but as many companies are starting to realize, there is a better way. The future of talent acquisition lies in collaborative recruiting!