- UpvoteDownvoteShare Job
- Suggest Revision
Extensive knowledge of Microsoft Active Directory, Windows 10, PC and Mac hardware, printing, peripherals, mobile devices, remote access, systems imaging, virus/malware removal, and productivity applications (Office 365, Google Apps, Adobe, Okta, Zoom, etc.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Routinely work with vendors, project managers, technical team members, application owners, and end users to maintain and improve performance of the Windows offerings, Active Directory environments, malware and virus protection, and systems management needs.
RemoteExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Provide direct support of cyber security practices maintaining anti-malware, threat management, vulnerability management and anti-phishing technologies. Provide direct support of cyber security practices maintaining anti-malware, threat management, vulnerability management and anti-phishing technologies.
ExpandApply NowActive JobUpdated 12 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The engineer will have extensive knowledge of both LAN/WAN designs and the support process encompassing large complex network deployments; will be well-versed with network routing, routers/switches routing protocol knowledge, VPN, SDWAN/VWAN/MPLS, and VRF; and will be familiar with malware detection and blocking concepts, and route- and policy-based traffic forwarding.
Full-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Malware analytics and software reverse engineering. digital forensics to include desktop, mobile, device, or information forensics. The College of Information Sciences and Technology (IST) at The Pennsylvania State University invites applications for part-time academic lecturer positions for the 2021-22 academic year (Summer 2021, Fall 2021, and Spring 2022.
Part-timeExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Working knowledge of cyber operational security, log analysis, netflow analysis, incident response, malware analysis, computer forensics, and/or cyber-crime. Maintain situational awareness of cyber activity by reviewing DoD, Intelligence Community and open source reporting for new vulnerabilities, malware or other threats that have the potential to impact the DoDIN.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Duties include monitoring networks, hosts and endpoints for malicious activity using Security Incident and Event Management (SIEM) tools, Endpoint Detection and Response (EDR) tools, Antivirus and Malware detection tools and email security appliances.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
At least 6 years of experience conducting Cyber investigations that leverage security and infrastructure technologies (firewall logs, network security tools, malware detonation devices, proxies, IPS, or IDS.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Minimum five (05) years of experience as a Malware Analyst or a related functional area. Performs system analysis, reverse engineering, and static, dynamic, and best-practice malware analytical methodologies on Windows, Android, or UNIX-based platforms.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience and/or familiarity with the following network protection devices: Firewalls, intrusion detection and prevention systems (IDS/IPS), log analysis, malware analysis, network traffic flow and packet analysis.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Proficiency with analysis tools and protocols (e.g. Splunk, CMRS, VDP, passive DNS, Virus Total, TCP/IP, OSI, WHOIS, enumeration, threat indicators, malware analysis results, Wireshark, Arcsight, etc.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Any experience with penetration testing, malware analysis, network traffic analysis. Leidos is seeking an Artificial Intelligence (AI) Cybersecurity Researcher / Engineer to support the Department of Homeland Security (DHS) Office of the Chief Information Security Officer.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
First-level support for end-users for IT issues including workstation break/fix, error resolution, endpoint security management (e.g. antivirus and anti-malware issues). Help Desk Technician IThe Help Desk Technician L1 is responsible for all aspects of first level end-user support, including workstation, telephone, printer and computer issues.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Be a key player on our product marketing team for our Security solutions, supporting solutions including anti-malware, endpoint detection and response (EDR), managed detection and response (MDR), and email security.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Develop and deploy dashboards and reporting to meet Liberty’s needs Perform incident response activities as directed Validate suspicious events and incidents using open-source and proprietary intelligence sources Perform as an escalation point for Tier I and II Analysts, as necessary, related to alerts Standardize and Maintain Incident Response Playbooks Perform forensic analysis on workstations, malware, malicious domains, etc.
ExpandApply NowActive JobUpdated 6 days ago
malware job
FEATURED BLOG POSTS
How to Build a Supervisor Resume
Writing a great supervisor resume doesn't have to be rocket science. All you need to do is figure out what the company requires and how best to appeal to their needs. In other words, see the resume as your “key” into any organization of choice.
How to Write a Property Manager Resume
Property management experts have a variety of responsibilities, such as ensuring the safety and durability of commercial and residential buildings. During recruitment for such a position, recruiters assess your skills first-hand. This begins with how well you organize and tailor your property management resume. In other words, they can't afford to bring you onboard if your resume does not impress them.
Finally! Answers to 9 Job Search Questions You've Been Wondering About
There’s no college course on how to job search effectively. If schools offered “Job Searching: 101,” we wouldn’t have to write this article. Unfortunately, there’s nothing straightforward about a job hunt, and researching the best job searching methods is basically limited to sourcing peer advice and internet articles. Don’t worry; we’ve got your back. Here are definitive answers to the most common questions you’ve been dying to ask.
How to Successfully Make a Career Change in the New Year
The beginning of a new year is often a time for reflection and introspection. Millions of people use this time to come up with new resolutions to help them live happier and healthier lives. Pursuing our career ambitions is among the top five, right up there with exercising more and eating better.
How to Write a Chief Operating Officer Resume + Sample
Are you looking to become the Chief Operating Officer in your company of choice? Do you want to create a compelling COO resume that will earn you the job? This article is for you.
Spotting the Details to Build a Construction Project Manager Resume
So you’re ready to become a Construction Project Manager! To achieve this goal, you need to find the right role and write the best resume you can to show a prospective employer that you’re a great fit.
6 Tips to Create a Management Consulting Resume + Sample
So, you want to land a job as a management consultant? Well, here is a management consultant resume sample and some tips below. This will help you create a mind-blowing resume that will keep you in the spotlight during recruitment.