- UpvoteDownvoteShare Job
- Suggest Revision
We are partnered with a cybersecurity managed service provider seeking a Microsoft Security Engineer to join their team on a full-time basis. Demonstrated design, deployment, and administration experience with various Microsoft solutions, including Azure Active Directory, Intune, Microsoft 365 Defender (AAD IPC, MDO, MDE, MDCA, MDI), and Microsoft Information Protection.
$125,000 - $175,000Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Ability to understand and execute procedures and work processed with the following: Security Information and Event Management (SIEM) administration, network intrusion detection system (IDS) administration, Active Directory and Group Policy Objects, Anti-virus administration consoles, Data Loss Prevention (DLP) systems, Microsoft Windows operating systems, Linux operating systems and advanced cyber security toolkits, malware analysis, penetration testing, and digital forensics tools.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Modern Management - Mobility and Security Solutions in any of the following: Microsoft Intune; Autopilot, Desktop Analytics, Conditional Access, identity governance, Azure Active Directory (AAD), Microsoft Cloud App Security (MCAS); Advanced Threat Analytics; Defender for O365, Microsoft Endpoint Configuration Manager.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
In a very hands-on capacity you will responsible for the support and administration of several core network security tools. Endpoint management and best practices: McAfee AV, Carbon Black, and LogRhythm Good Project Management skills Some related Palo Alto Firewall administration (Panorama), network security, operations and management best practices preferred Understanding of network design, infrastructure, Active Directory and Group Policy Knowledge of enterprise patching / updates is a must Some related scripting skills (Python.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
IT Concepts is looking for an experienced User Access Management (UAM) Analyst to support the Social Security Administration under Call Order 3 – OIS. The UAM Analyst is responsible for conducting detailed data triage on anomalous events identified by User Activity Monitoring (UAM), Data Loss Prevention (DLP), and other client network and endpoint monitoring tools.
Full-timeExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Providing walk-up support, asset management, PC compliance, and mobile devices support, TSS provides hands-on support to Deloitte employees. Management and migration to Microsoft Azure Active Directory Modern Management from legacy AD domain joined environments, including GPO translation and conversion.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The ideal candidate will have extensive, hands-on experience in several of the following: directory services, Active Directory, Microsoft Entra, role-based access control for cloud and non-cloud access management, multi-factor authentication (MFA), privileged access management, public key infrastructure (PKI), identity governance and administration (IGA), and single-sign on (SSO) solutions.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Hands on Experience on Prisma, Prisma Gateway, security policy, dns security , decryption ,file block and Tunnel ManagementGood Troubleshooting skill on Firewall issue, Global Protect, application slowness issue.
$175,000 a yearExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This technical leader provides leadership to the organization's information security programs including vulnerability management, application security, endpoint security, network security, and cloud security.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Technical knowledge and hands on experience with security and networking architecture, network security design, routers, wireless security, intrusion prevention/detection, firewall architecture, SIEM, DLP, and encryption.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Frequency of travel is about twice a month, on average - This includes occasional travel for internal events (sales kickoff, technical summit), as well as for cloud security and DevSecOps industry conferences.
$264,000 a yearFull-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Hands on experience with an IDM or IGA system (e.g. Saviynt IGA, CIDM, SailPoint) Active Directory/LDS or similar LDAP experience. IAM Analyst / Identity Access Management Analyst ( Hybrid Role.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Includes onboarding of privileged User IDs into CyberArk from Active Directory, UNIX, Linux, Windows, and zOS/RACF systems. -Strong critical thinking ability and investigative/problem solving skills., AdvancedPreferred Licenses/Certifications (not required):-CISSP Certified Information Systems Security Professional -CISM - Certified Information Security Manager -Certified Ethical Hacker (CEH) -Certified Information Systems Auditor (CISA.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Analyze, design, and support a highly complex, enterprise level Active Directory in a hybrid on-premise and cloud hosted environment. Must have hands-on experience managing and maintaining AD, GPO, ADSS, ADCS, DNS, DHCP, EntraID, AAD Connect, RBAC, Intune, Azure App Proxy, Conditional Access, Privileged Access, and Microsoft Security Stack.
$204,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Proficient in firewall management, with hands-on experience in configuration and optimization to ensure network security. This position will be the liaison between the IT Security Team and various SRE, DevOps, Network, and Operation teams and must be able to provide technical remediation details or workarounds, help track and identify asset inventory, log work tickets and exceptions, and research vulnerability findings.
Full-timeExpandApply NowActive JobUpdated Today
network security technical support hands on active directory jobs Title: engineer
FEATURED BLOG POSTS
Why Work in Sales? 9 Reasons & Tips on Answering as an Interview Question!
Working in sales can be demanding and challenging, but it can also be gratifying. Sales is an excellent career with a clear path full of excitement and potential for growth. So, if you're contemplating careers and have wondered "why work in sales?", keep reading to determine if sales is a suitable role for you.
How to Fire an Employee
So… you've finally decided to let one of your employees go. Drafting the paperwork and corresponding with HR is the easy part, but knowing how to fire an employee is where things get complicated. In fact, it is one of the most challenging conversations to have in the workplace. However, it must be done, and it must be done with poise and tact. Not only should you keep your state law in mind, but you should also consider your former employee's wellbeing.
How Long Does it Take to Hear Back from a Job?
Are you applying for your very first job? Maybe you’re anticipating your termination from your current role and want to be proactive. Either way, waiting to hear back on your job application can be stressful. If time has passed since you applied, you may wonder how long does it take to hear back from a job. Well, the answer is... it depends.
How to Respond to a Recruiter Through Email? (Tips & Examples)
Rather than wading through an endless list of open roles, wouldn’t it be nice if relevant job opportunities come to you?
How to Reject a Candidate Professionally
When deciding on how to reject a candidate, your first question may be
How Does Salary Pay Work? (Compared to Hourly Pay)
At the bottom of each job advertisement, companies label a role as salaried or hourly. Both methods will get you paid (yay), but each in very different ways. So, it's essential to figure out how does salary pay work? While employees paid by the hour are paid based on how long they work, employers pay salaried employees a fixed amount.
The Quiet Quitting Phenomenon
The term, quiet quitting, was coined in 2009, but only now is it gaining traction as young Millennials and Gen Z workers are experiencing record levels of burnout. With the pandemic and the state of the economy, young employees are feeling the pressure. So, quiet quitting comes into effect when that pressure is exasperated by work stress and no managerial support.