- UpvoteDownvoteShare Job
- Suggest Revision
Monitoring SIEM and analyzing potential threat events using Security tools like Tenable, Crowdstrike ArcticWolf XDR solutions. Managing Entra ID User, IAM concepts within Azure Active Directory (AAD), including user and group management, conditional access policies, Enterprise app, SSO, OAuth, and Multi-Factor Authentication (MFA.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Develop Splunk Content for Cloud / API Security threat use cases (cloud, container, or orchestration misconfiguration, OWASP vulnerabilities, Injection Flaws, insecure network policies, logging & monitoring / runtime threats, CI/CD pipeline & supply chain flaws, cloud IAM roles, Account hijacking, Data exfiltration) Cloud Identity Management, privileged access escalation, Key Management threat scenarios.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Cloud security controls: Identity and Access Management (IAM), Encryption, Network Security, Compliance, Logging and Monitoring, Vulnerability Management, Disaster Recovery and Business Continuity, Cloud Access Security Broker (CASB), and Multi-Factor Authentication (MFA.
$81,572 - $135,954 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Solid IT networking understanding including TCP/IP, HTTP, HTTPS, FTP, SFTP, SSH, BGP, OSPF, Radius, TACACS, LDAP, DNS, IPAM, Operating Systems, Servers, Storage, backup, Routers, Switches, Monitoring, SD-WAN, P2P, MPLS, IPSEC, T1/PRI, Cloud Network- AWS/Azure, Network monitoring, Wireless.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
In addition to maintaining a closely integrated alliance with The George Washington University and The George Washington University Hospital (GWUH) which is separately owned and operated by Universal Health Services (UHS), the GW MFA has active referring relationships with 12 area hospitals.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Responsible for installation, configuration and troubleshooting of Microsoft based Cloud technology including (but not limited to) Office 365, Azure, Intune, Auto Pilot, Exchange Online, SharePoint, Skype for Business, MFA, Teams, Teams Voice and ADFS.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Nurse Navigator will a) support coordinated care transitions, b) provide nurse navigation and chronic care management support for identified high-risk patients, c) participate in quality improvement initiatives and proactive panel management, e) provide patient and family education on disease monitoring and treatment plans.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Secured Access and control - Okta SSO and MFA, MS Active Directory, DataSafe. Real-time log/event monitoring - DataDog, Stackdriver, Oracle Enterprise Manager, Oracle Cloud Monitoring, SolarWinds, Splunk, SumoLogic, OpenTelemetry.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Strong ID management skills: Okta, VIDM, Horizon View, Federation, users/groups management, directory integration, MFA, SSO, monitoring, automation workflows, profile management, application integration.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Implementation, Operation and/or Management of SIEM solutions Experience with common enterprise IT tools and logs (AD/AAD, IAM/MFA, CSPM, etc.) Splunk Threat Content Developer – Cloud and API Threat Detection – Remote Splunk Threat Content Developer will develop, implement, and oversee content development for Threat Detection, Threat Analysis, and Threat investigations focused on Cloud Security and API Security.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Hands-on experience with security technologies - firewalls, IDS/IPS, SIEM, antivirus, authentication (MFA) web filtering and vulnerability scanning tools. Monitoring of network uptime, availability, bandwidth utilization, configuration change monitoring and backups.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Manage and optimize cyber security tools including, network security monitoring, encryption, vulnerability scanning, vulnerability management, penetration testing, antivirus, phishing simulation, firewall, multi-factor authentication, mobile device management, and endpoint detection tools.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with cloud security assessment tools, vulnerability scanning, and penetration testing techniques. Knowledge of various technical frameworks and concepts (MITRE ATT&CK, CIS, Kill Chain, etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Awareness of Duo, Okta, OneLogin, Ping and/or other IAM/MFA tools preferred. Familiarity with Elastic, Splunk, Logic Monitor, Solarwinds and/or other SIEM and network monitoring tools preferred.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Possess a 5 year background within the last 7 years in a Cyber Security setting, adept with tools and technologies such as IDS/IPS, 2FA/MFA, SIEM, DLP, Log Correlation, SOCaaS, Incident Response, Retroactive Malware Analysis, RAW Logs, Cleanup and Restoration, and proficient in Risk & Vulnerability Management, including a comprehensive understanding of Penetration.
ExpandApply NowActive JobUpdated Today
mfa monitoring jobs
FEATURED BLOG POSTS
What is a W-9 and How to Fill One Out
When you began working for yourself, you probably didn’t account for the tax reporting work that will fall on your shoulders each year. If you’re a freelancer, independent contractor, or business owner, filing your taxes is not as simple as uploading your W-2 form into some online tax preparation software. Most self-employed people need to complete a W-9 as a step for accurately reporting their earnings to the IRS. Below, you can learn how to fill out a W-9 and when to submit it.
Tightening the HR budget in 2023
With the state of the economy still uncertain, 2023 is expected to be approached with much anticipation. Human Resource leaders have many concerns, including how they will manage to accomplish their goals with budget belts already getting snug. Let’s look at some of the factors that the new year is projected to bring for HR and how to prioritize budgets to reach human capital objectives.
A Comprehensive Guide to Becoming a Better Conversationalist
Have you ever stood awkwardly next to someone at a party because you didn’t know what to say to them? How about at a networking event or on a first date? You're not alone if you’ve ever experienced this uncomfortable silence. Many people struggle to master the art of being a great conversationalist.
Why is Non-Verbal Communication Really Important?
In a world where words and phrases rule daily communication, you may wonder why non-verbal communication is important. Whether you realize it or not, you communicate more with nonverbal actions than you do with verbal communication. When you interact with your peers, people are reading your body language, facial expressions, voice, and many other factors that help fill in blanks that words can't fill.
Making Hybrid Work More Efficient
Covid was a catalyst for change in the work environment. Keeping people safe and helathy was the initial goal for employers, but the unintended result was the considerable demand in remote work. Now, onsite work has been dramatically altered to remote work, which is now transforming into a combination of the two: hybrid work.
How Can HR Technology Help Retain Employees?
Human resources' rapid adoption of technology has led to new ways of streamlining human capital management. Based on the IEE Global Study, these technologies changed how HR handled recruitment and retention in 2022. This includes tech like
Why is Time Management Important? 10 Crucial Importances of Time Management
We’ve all been there before. What starts as a relaxing evening scroll quickly becomes a full-blown binge. You blink, and it’s midnight - throwing off your entire next day before it even starts. And at its worst, this indulgence might leave you feeling behind on things you planned to finish that night. This is why time management is important.