- UpvoteDownvoteShare Job
- Suggest Revision
Degree must be in Network Engineering, Systems Engineering, Information Technology or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Computer Technologies Consultants (CTC) is seeking an Information Security Engineer to support our team located at the Indian Head Campus and EOD Campus of the Naval Surface Warfare Center Indian Head (NSWC IHD) in Maryland.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Axient is seeking anInformation Systems Security Engineer (ISSE) to support the Air Force SEEK EAGLE office in direct support to the Information System Security Manager (ISSM), the Information System Security Officer (ISSO), and work closely with Information Technology (IT) administrators in configuring and securing the organizations primary production system enclave.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Notice of Availability of Annual Security and Fire Safety Report: In compliance with the Jeanne Clery Disclosure of Campus Security Policy and Crime Statistics Act of 1998, and as a part of the College's commitment to safety and security on campus, Lake Washington Institute of Technology(LWTech) reports the mandated information about current campus policies concerning safety and security issues, the required statistics, and other related information for the past three (3) calendar years.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Seven (7) years of experience and a Doctorate Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensic, Cyber Security, Software Engineering, Information Assurance, or Computer Security.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Support continuous improvement processes, operational excellence and deliver world-class network security solutions for all corporate and operational technology needs, including business operations, power generation units, electric substations, system control and data acquisition (SCADA) systems, distribution automation (DA), and advanced metering infrastructure (AMI.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Performing information security management functions with any of the following solutions: secure access, email security, secure endpoint, network security, application security, or vulnerability management.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Additional industry recognized Information Technology or Information Security certifications preferred (GIAC, INE, Cisco, CompTIA, Microsoft, ISACA, etc. Minimum 2 years' experience in Information Technology, Information Security, or comparable role required.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Extensive knowledge of traditional security controls and technologies, such as Security Information and Event Management (SIEM) systems, intrusion detection/prevention systems (IDS/IPS), public key infrastructure (PKI), identity and access management (IDAM) systems, antivirus and firewalls, in addition to newer offerings such as endpoint detection and response (EDR), threat intelligence platforms, security automation and orchestration, deception technologies and application controls.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Requiring high level of experience in Information Technology Infrastructure Library (ITIL) process workflows and business analysis, this position will develop and process documentation related to GSOC and/or ITIL processes.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Network Security Tools Engineer supports the development and implementation of cyber engineering strategies, tools and techniques to enhance a system’s cyber-resiliency against existing and emerging cyber-threats.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Information Security Engineer has a thorough understanding of network defense technologies, TCP/IP networking, Active Directory, DHCP, DNS, network security monitoring tools, secure engineering principles and technical security testing.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Utilizes information security technologies such as antivirus, IDS/IPS, SIEM, endpoint detection & response, DLP, data encryption, proxies, and network access control, as well as security policies and procedures, and incident response.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Security Tools such as SonaType, Fortify, Qualys, Prisma, Splunk, CyberArk. Analyze and interpret available risk and security data from GRC, Splunk, DataDog, ServiceNow, Nexus, Qualys and similar tools to identify risk trends, risk gaps, potential controls and risks.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Lead a team of security engineers for delivery of Cybersecurity project management, continuous diagnostics and mitigation, threat mitigation and incident response, security architecture support, critical infrastructure protection, patch management, vulnerability management, risk management, information assurance, penetration testing, cybersecurity services, and Security Assessment and Authorization (SA&A) documentation.
Full-timeExpandApply NowActive JobUpdated Today
network security information technology jobs Title: network engineer intelligence
FEATURED BLOG POSTS
Tips for a Good Character Reference Letter with Examples
Hiring managers love a resume laden with relevant skills and qualifications. Hard skills specific to the role, like SEO strategy or Java programming languages, are easy to qualify using achievements or facts and figures. But how exactly can they verify personality traits, work ethic, relationship management skills, or curious nature during an interview when they barely know you?
How to Dress on the First Day of Work (Men & Women)
You did it! Out of hundreds of applicants and dozens of people interviewed, you’re the one who got a new job. Congrats! Now comes the question of how to dress on the first day of work.
Why College Students Should Work While in College?
College is a special part of our lives. It’s a time when we prepare for our dream job while creating some of the most memorable moments in life. That said, college life can also be stressful. Not only do we have to spend long hours studying, writing and researching, but we also have to deal with increased tuition fees and living expenses.
5 Ways to Measure Candidate Experience
Your candidate experience is made up of 4 essential parts
How to Stall a Job Offer Politely
You did it! After several weeks of looking for a new job and undergoing grueling interviews, you finally have a job offer. Although this may be very exciting, accepting a job offer means that you’re making a long-term commitment to your future employer. So, even if you’re eager to leave your current job, this isn’t a decision you should take lightly.
How to Get a Job in a New City - Best Tips to Follow
When your dream job posts, will you be ready? What if that dream job was in a faraway city or a different continent…would you move for it? Most of us have dreamed about what it would be like to accept a job in a new place at one time or another. But when it comes to actually making a move, it’s usually the logistical details that give us pause. The key to job searching in a different location is to have a plan.
What is a Policy of Non-Retaliation & How to Create One
Your company probably has many policies in place – anti-discrimination policies, equal opportunity policies, ethics policies, and so on. However, it is important to re-evaluate whether you have a policy that covers every situation. Say for instance one of your employees submit a complaint in good faith to their supervisor. To their surprise, they are met with retaliation, such as demotion, defamation, or even termination.