Cyber Security AnalystSAICCharleston, SCDesired Experience:Experience in testing, maintaining, deploying, and troubleshooting HBSS (also known as McAfee ePolicy ePO) and/or ACAS (also known as Tenable Nessus) systems in a DoD environment. Full-timeEndpoint Security Analyst - Military VeteransLeidosHyattsville, MDPrior Experience deploying Endpoint Security Solutions (ESS) including Mcafee ePO, Crowdstrike. + Experience deploying, configuring, and maintaining McAfee point products such as VirusScan Enterprise, Rogue System Detection (RSD), Policy Auditor (PA), Data Loss Prevention (DLP) / Device Control Module (DCM.
Make sure to observe the job description and see how your background can align to the requirements of the role.
Advice to Management Keep up the good work and the legitimate job findings you are posting on the site!
Staff Security EngineerLanceSoft IncEnglewood, COShould possess one or more of the following certifications – CISSP, SANS GCIH, Vendor Certifications (CISO, Palo Alto, McAfee, IBM etc. Network Firewalls (Check Point, Fortinet, Palo Alto, Cisco, Juniper, McAfee, Tipping Point, etc.Senior Security EngineerEliassen GroupEnglewood, COW2 Responsibilities of the Senior Security Engineer: Oversee security infrastructure components: IPS, IDS, DLP, scanning tools identify, follow, and help remediate vulnerabilities and other security concerns Review and provide system security requirements/guidance Participate in incident response activities Mentor junior and mid-level teammates Requirements of the Senior Security Engineer: Intrusion detection/prevention (Palo Alto, TippingPoint, McAfee, Checkpoint, etc.Information Systems Security Officer (ISSO)AccentureMilton, FLExperience with MS Active Directory, Splunk, ACAS/Nessus, McAfee, Windows, Linux, AWS Security, etc. Tools include: Splunk, Nessus, McAfee. The ISSO will support the ISSM all matters related to cybersecurity for a group of cloud-based information systems, to include: RMF, ATOs, policy development and enforcement, Continuous Monitoring, configuration management, cybersecurity training, and STIGs∯*∯ In this role, the selected candidate will work with the program ISSM to communicate cyber security status and posture with government oversight to include: AO, SCAs, CISO, etc.Network Engineer / Senior SPT Network Provision EngineerLeidosHerndon, VAConfigure, maintain, and manage McAfee and Palo Alto firewall devices, + Experience with McAfee and Palo Alto firewall devices. Configure, maintain, and manage McAfee and Palo Alto firewall devices. Full-time
Transparency in hiring refers to the open and honest communication and information sharing that takes place between employers and job candidates. It encompasses all aspects of the hiring process, from posting job descriptions to providing feedback on performance during and after the interview process. In today's job market, hiring transparency has become increasingly important for both employers and candidates alike.
In the current candidate-driven job market, recruiters are looking for unique ways to attract talent. Some have resorted to even (dare we say it?) recruitment strategies on the border of weird and wacky. What can we learn from the unusual recruitment tactics that are being used and actually getting results? Here’s a rundown of some unique recruitment strategies that actually work.
If you’re like most of us, you’d love to be wealthier. Having more money would alleviate stress. It would make it easier to pay your bills and buy nicer things. Maybe it’d allow you to spend more time with your kids and go on more vacations. You’re not alone if you wish you could somehow earn a more significant income.
jobsearcher.com/blogHow to Write a Recommendation Letter for a StudentWhen a student applies for their first job or for their next academic degree, they don’t have much experience to showcase their skills and personal qualities. Hiring managers and admissions officers, therefore, often look at recommendation letters as a way to go beyond the student’s GPA and learn more about the student’s skills and personal qualities.
jobsearcher.com/blogHow to Calculate Net IncomeUnderstanding your finances can be daunting even if you’re good with numbers. Your net income, in particular, is a key metric for determining how well you’re doing financially and whether your current way of operating is sustainable or not.
jobsearcher.com/blogTo ATS or not to ATSAs hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra:
jobsearcher.com/blog6 Best Ways to End a Cover Letter with ExamplesIncluding a cover letter with your resume is a great way to introduce yourself to the hiring manager, tell them why you’re the ideal fit for the role, and provide context about your personal situation. A strong cover letter will give you an advantage over other applicants. But it’s important that you structure it properly and write it powerfully so that it carries an impact. This article will discuss how to end a cover letter effectively so you catch the eye of a hiring manager and increase your odds of landing an interview. Read on to learn more.