- UpvoteDownvoteShare Job
- Suggest Revision
O Schedule and coordinate with the Director of Technology Services for the timely procurement of the necessary server and network hardware components. o Ensures compliance of departmental policies and procedures as established within the department, including, but not limited to, change control management policies, network security policies, systems maintenance procedural policies, disaster recovery and business continuity procedural policies and system documentation policies.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Will be called upon to provide network designs, problem determination and resolution, document methodologies, thorough knowledge of network management, develop and support security models, execute hardware and software installations, performance tuning and recovery.
Full-timeExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience utilizing cutting-edge knowledge of computer hardware, software, and networks to conduct cybersecurity activities and tasks, including but not limited to: Wireshark NESSUS Tenable Network Security Monitoring Tools Encryption Tools Web Vulnerability Scanning Tools Penetration Testing Tools Network Intrusion Detection Tools Virus Scanning Tools Firewall Tools Managed detection services.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
These systems include, transformers, PLC’s, generators, switchgear, UPS systems, STS’, ATS’ PDU’s, chilled water systems, CRAC/CRAH, wet sprinkler systems and pre-action sprinkler, network equipment, transmission media, cabling infrastructure, security hardware, and CCTV. Duties: Completion of CoreSite’s Data Center Operations Qualification Program to the tier level at which you are hired within the first nine (9) months of employment.
$80,000 - $95,000 a yearFull-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with System Administration, Network Administration Network Security, Networking Standards, Network Protocols, NIST/FISMA standards and controls, SIEM platforms and security tools, Network Hardware Configurations.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Requires a minimum of 3 years experience in a support & operations or design & engineering role in any of the following areas: access management or network security technologies, servers, networks, Network communications, telecommunications, operating systems, middleware, disaster recovery, collaboration technologies, hardware/software support or other infrastructure services role; or any combination of education and experience, which would provide an equivalent background.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Requires experience providing top-tier support for 3 or more of the information security technology areas: 1) Access Control, 2) Application Security, 3) Business Continuity and Disaster Recovery Planning, 4) Cryptography, 5) Information Security and Risk Management 6) Legal, Regulations, 7) Compliance and Investigations, 8) Operations Security, 9) Physical (Environmental) Security, 10) Security Architecture and Design, 11) Telecommunications and Network Security.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Your core focus will be cybersecurity operations, incident response, and ensuring compliance with the Federal Risk and Authorization Management Program (FedRAMP). Oversee the monitoring, detection, and analysis of potential threats and vulnerabilities in alignment with cyber security strategy and the Federal Risk Authorization Management Program (FedRAMP.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Understanding of network defense technologies, TCP/IP networking, Active Directory, cryptographic protocols, and application security is a plus. Provides system and network architecture support for information and network security technologies.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Provides trouble resolution on complex problems and leads implementations for system and network security technologies. Excellent project management, communication, and presentation skills is preferred.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
You will be responsible for infrastructure related activities (Patch management, Anti-virus solution deployment, Backup, Restore and disaster recovery, Management of our local production Active Directory, Configuration of file and print services, Initial installation, configuration and deployment of client hardware.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Primary responsibilities will be maintaining GCSS-Army network infrastructure including but not limited to routers, switches, firewalls, VPN technology, load balancing systems, and several network management solutions.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of system and network architecture and interconnectivity is a plus. Relevant certifications such as the CISSP, GCIH, or Certified Ethical Hacker (CEH) is preferred. The FedRAMP SOC Analyst will be responsible for providing the first line of defense against cyber threats.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
FedRAMP SOC Analyst. Proficiency in FedRAMP and NIST guidelines, protocols, and standards highly preferred. Experience using EDR, SIEM, SOAR and other security technologies to investigate security incidents preferred.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Support, monitor, test, and troubleshoot hardware and software Information Assurance (IA), Risk Management Framework (RMF) and Information Technology (IT) problems pertaining to the assigned unit computer and network environment.
ExpandApply NowActive JobUpdated 10 days ago
network management hardware jobs
FEATURED BLOG POSTS
How to Pass a Personality Test with Flying Colors
Whether you’re applying for your first job or looking to move up the career ladder, personality tests aren’t usually the first thing we think about. But surprisingly, they can have a massive impact on how our future employers perceive us. In fact, a 2017 study by the Society for Human Resource Management (SHRM) has found that 32% of U.S. employers use personality tests when hiring for senior management positions, and 28% use them for middle management positions. Personality tests are also used for hourly workers and contractors, though less frequently.
Virtual Reality Job Interviews
With the advent of desktop computers, the arduous task of scouring through weekly job classifieds became a thing of the past. The mid-1990s brought about a new era where job seekers could easily search and apply for jobs online. The introduction of AOL's Instant Messaging feature provided an even faster means for employers and candidates to communicate and schedule interviews. As smartphones became more pervasive in the early 2000s, hiring managers increasingly used phone calls for screening and interviewing candidates. Despite this trend, over 80% of interviews still took place in person.
A Potential TikTok Ban?!
As you may already know, there has been a lot of talk lately about the possibility of a TikTok ban. While this has not yet come to fruition, it's important to consider the implications this could have for businesses and recruiters who rely on TikTok as a platform to market their brand, recruit new talent, and connect with their audience.
The Effects of Workplace Racism and Sexism
One day it's a covert statement to a mother returning to work after maternity leave. Another day it's a lingering gaze at an employee enjoying a culturally rich meal. These microaggressions (or sometimes macroaggressions) can take an employee from a confident, high-performer to one that feels insecure being themselves at work. Your employees engage with people with different ideas and feel most comfortable and valued when they can work without losing their cultural, racial, and gender identity. While most employers know this, why have workplace racism and sexism often been neglected?
When Rage Applying Strikes: How to Identify Unserious Candidates
As the job market remains highly competitive, we have seen a surge in "rage applying." This is when candidates apply to multiple jobs, often without considering whether they are truly interested in the role. Rage applying goes hand-in-hand with quiet quitting. Often, employees want to entertain the thoughts and feelings of leaving their job, but they aren't necessarily serious about leaving yet. Meanwhile, other employees engaging in this trend are actually trying to find a better role. As a recruiter, it can be hard to identify who are the real applicants in a sea full of quiet quitters, but understanding rage applying and identifying red flags will certainly help.
How to Increase Job Ad Exposure
In today's competitive job market, writing quality job ads is critical for attracting top talent to your organization. While networking and candidate referrals are prime real estate for finding qualified candidates, nothing beats the tried-and-true method of writing an extraordinary job ad. But while writing a great job ad is the first step, what's more important is increasing visibility. You could have the most detailed, well-written ad on the internet, but if no one sees it, then you are wasting time (and potentially money!). Employers often believe that job boards are the root of the problem, but you can learn how to increase job ad exposure by tweaking a few steps of your recruitment process.