- UpvoteDownvoteShare Job
- Suggest Revision
The Network Security Engineer II is a mid-level IT security staff grade within the information security framework. The Network Security Engineer II will work closely with other security and operational team members to implement, maintain, and improve the security posture of the infrastructure.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Paladin has offices coast to coast across the United States and Canada, and nearly 1,600 talented and committed professionals dedicated to custom-crafting and installing technology solutions for clients requiring Integrated Security, Network Infrastructure, Audio Visual, Fiber Optics/OSP, Structured Cabling, and more.
$75,000 a yearFull-timeExpandApply NowActive JobUpdated 19 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Wireless Account Security Rep plays a crucial role in mitigating and preventing fraudulent activities on Boost Mobile member accounts by using tools and strategic questions to verify the identity of callers who are unable to verify with a frontline representative.
$21.57 an hourExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Endpoint management and best practices: McAfee AV, Carbon Black, and LogRhythm Good Project Management skills Some related Palo Alto Firewall administration (Panorama), network security, operations and management best practices preferred Understanding of network design, infrastructure, Active Directory and Group Policy Knowledge of enterprise patching / updates is a must Some related scripting skills (Python.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Deep understanding and familiarity with core concepts of network security, security architecture, security operation, vulnerability management, cloud security, application security, security awareness program and threat intelligence.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The position will require AWS knowledge and expertise, Windows and Linux server security and vulnerability management, network firewall and F5 rule creation and policy management, security compliance and standards, Zero Trust Architecture, endpoint security, access control and authentication management, and security SIEM tools.
$138,941.84 a yearFull-timeRemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Technical working knowledge of security tools and concepts including IDS/IPS; SIEM; Web Proxy; Encryption; Patch management; Vulnerability Scanning & Remediation; Forensics; Penetration Testing; DLP; Email Gateways; Anti-spam Services; MDM; Privileged Account Management; Log Analytics; Two Factor Authentication; Single Sign On.
$233,640 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Cyber security business and systems subject matter management expertise in Application Security, Data Security, Data Governance, and Network Security domains.
$212,784 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Familiarity with National Industrial Security System (NISS), Defense Information System for Security (DISS), Scattered Castles, Security information Management System (SIMS) and other security databases.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Hands-on technical experience with telecommunications and network security solutions (Firewalls, IDS/ IPS, SIEM, Vulnerability Assessment Tools), access control systems, cryptography, physical security systems, and secure SDLC methodologies.
$379,500 a yearExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This includes but is not limited to Network Monitoring, Preventative and Detection Controls, Forensics and Investigations, Security Awareness, Security Vulnerability Management, and Cyber Threat Intelligence activities.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Supports and maintains a wide variety of security processes and technologies across several functional security domains, including identity solutions (IdP, PAM, MFA), network and software firewalls (NGFW), intrusions detection/prevention systems (IDS/IPS), web and DNS filtering (SWG, CASB), end-point security solutions (NGAV/EDR), security event monitoring (SIEM) platforms, vulnerability scanning, and data loss prevention (DLP) solutions.
$152,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Group Policy (GPO): Ability to configure and manage Group Policy Objects (GPO) for Windows environments to enforce security and management policies. Data Encryption and Security Policies: Understanding of data encryption techniques, secure configurations, and policies related to device management.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Strong technical knowledge of security controls, including but not limited to access controls, encryption, network security, and vulnerability management. BILL’s Information Security department is searching for an Information Security Risk Management Director to lead the security strategy for our growing Security Risk Management function, reporting to the Deputy CISO. The ideal candidate will bring a blend of technical acumen and strategic insight, capable of effectively communicating with stakeholders and guiding team members in alignment with our security culture and business priorities.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Consult with the ICN leaders, professionals, and various Risk & Brand Protection compliance groups (Anti-Corruption, Cyber Security, CoRe Procurement, etc.) Critically review business relationship submissions in the Third Party Risk Management Gateway, the system used to clear potential business relationships within specified time frames.
$135,800 a yearFull-timeExpandApply NowActive JobUpdated Today
network security account management jobs Title: engineer sr security
FEATURED BLOG POSTS
How to Write a Follow-Up Email for a Job Application?
Most times, we have to do more than submit a "sugar-coated" resume to land our dream jobs. Going the extra mile to follow up on your job application can increase your chances of employment. Additionally, it may even help you get confirmation sooner on whether you are seriously being considered for the job or not.
16 Tech Jobs You can Get Without a College Degree
You might think that if you don’t have a computer science, information technology, or related degree, then there’s absolutely no way you can break into the technology field and score a high-paying tech job. But this is a misconception. There are actually tons of tech jobs out there that don’t require a college degree. Instead, employers are more interested in the skills that you can offer. So, read on to learn more about how to land tech jobs without a degree.
How Long Do Background Checks Take for Pre-Employment
Many jobs require a background check. For some companies, this is a matter of company policy. In other jobs, such as finance, childcare, and security, the government often requires background checks. While there are varying levels of intensity, for most people, a background check is nothing to worry about. In fact, the biggest question is often how long does a background check take? Here’s what job seekers and applicants need to know about background checks before they apply to new jobs.
The Best Remote Jobs: Where & How to Find Them
The Covid-19 pandemic hasn’t been easy on any of us, but if there’s one silver lining, it’s the fact that remote work has grown in popularity because of it. Companies that previously weren’t open to their employees working remotely were suddenly forced into allowing it. Since then, they've realized that much of their workforce is happier and more productive. Naturally, this has led to more remote job openings, which is great if you’re interested in this type of position. Read on to learn more about the best remote jobs and where to find them.
How to Write a Short Bio
First impressions can be tricky. When meeting someone in person, it’s likely you have an elevator speech. These short, practiced introductions can help you share more about who you are, what you do for work and other facts about you. While this works well in a live, in-person context, there are many cases where professionals “meet” someone via written form - like social media, a resume, or published work. In these cases, your bio works as your first impression. So, here’s a step-by-step guide on how to write a short bio.
How to Make a Job Offer More Competitive
Money alone makes it hard to attract and retain top-notch candidates, especially when you are competing with larger businesses and corporations in your industry. So, instead of focusing on money, figure out how to make a job offer more competitive when you can't offer more money.
5 Ways to Stretch Your Hiring Budget
Many businesses across the country have adjusted business operations to make it through the pandemic. After a period of hardship, many business owners, like yourself, are ready to start recruiting and rebuilding a bigger, more skilled workforce - only now you have to do it with a smaller hiring budget.