- UpvoteDownvoteShare Job
- Suggest Revision
Traffic analysis, vulnerability analysis, cyber threat hunting, wireless scanning, end point security analysis, vulnerability analysis, network access control, network and computer forensics investigations, insider threat support, web traffic analysis, and various cybersecurity application/tools installed on (servers, workstations, to include maintenance and upkeep of the server.
Full-timeRemoteExpandApply NowActive JobUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Analysis reports are conducted daily, covering the Security Information and Event Manager (SIEM), end point security, network access control, and vulnerability scanners, threat hunt operations.
Full-timeRemoteExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
The Incident Responders support includes continuous monitoring, data to include but not limited to network and host vulnerability scanning IDS, firewall, network sensor tuning, net flow/packet capture (PCAP.
Full-timeRemoteExpandApply NowActive JobUpdated 13 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Analysis reports are produced daily covering 30 plus activities that are used to depict current network security and any anomalous activity. CERTIFICAITON(S): 8570 IAT Level II required e.g., CCNSecurity, CySA+, GICSP, GSEC, Security+CE, CND, SSCP or Higher tiered certification In addition to the above, CEH or the like e.g., Pentest+, OSCP, CSSP-IR is preferred.
Full-timeRemoteExpandApply NowActive JobUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Manage Firewall, Web Filtering, Intrusion Prevention Systems (IPS), Intrusion Detection Systems (IDS), Network Access Control (NAC), Domain Name Systems (DNS), Remote Access VPN (RVPN), Application Delivery/Load Balancing, Secure Sockets Layer (SSL) Certificate Management solutions.
$101,400 - $183,300 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Familiar with IT security/cybersecurity domains is a bonus, including but not limited to cyber engineering, Vulnerability Management, Cyber asset management, SAST/DAST, IAM (Identity Access Management), SSO, MFA, cyber threat intelligence, security operation, access control, network security, security vulnerability, insider threat, data loss protection, etc.
$120,000 - $202,500 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Familiarity with: Zero Trust Network Access (ZTNA) and Secure Access Service Edge (SASE) frameworks, Identity, Credential, and Access Management (ICAM) (OKTA), Cloud Workload Protection Platform (CWPP), Security Operations Center (SOC) Operations, Vulnerability Threat Management, and Compliance Formal Education Master of Science degree (or higher) in one of the following: computer science, electronics engineering, computer engineering, computer science, information technology, or cyber security.
Full-timeExpandApply NowActive JobUpdated 16 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Global Information Assurance Certification (GIAC) Security Essentials Certification Years of Professional Experience 10 years’ experience in Cyber Security Desired experience Risk Management Framework (RMF), Cybersecurity Framework (CSF), Federal Information Security Modernization Act (FISMA), and FedRAMP experience.
Full-timeExpandApply NowActive JobUpdated 16 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Mature Cyber Zero Trust Architecture (ZTA) capabilities to improve Vulnerability Threat Management capabilities. Extensive experience in Cyber Security Tools, network topologies, intrusion detection, Public Key Infrastructure (PKI), ZTA, and secured networks.
Full-timeExpandApply NowActive JobUpdated 16 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Applicants selected will be subject to a government security investigation and must meet eligibility requirements for access to classified information and be able to obtain a government-granted security clearance.
Full-timeExpandApply NowActive JobUpdated 16 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Security Clearance Level: Public Trust (MBI) Work with privacy data to increase Cloud application and infrastructure vulnerability scanning and reporting. Professional Certifications Certified Information Systems Security Professional (CISSP.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience in designing and implementing systems that meet agency Cyber Security policy and regulations. Extensive IT experience in all aspects of Cyber Security with a vast array of IT systems involving end user as well as enterprise level networks.
Full-timeExpandApply NowActive JobUpdated 16 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Develop architecture for integrating findings into a centralized dashboard that allows product owners direct access to team’s specific systems or cloud account findings. Assist in developing architecture for integrating findings into a centralized dashboard that allows product owners direct access to team’s specific systems or cloud account findings.
Full-timeExpandApply NowActive JobUpdated 16 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience in vulnerability management, asset management, risk management, data security, access control and governance programs. Manage initiatives across several security domains such as asset & vulnerability managements, data protection, cloud security, and governance, risk & compliance programs etc.
Full-timeExpandApply NowActive JobUpdated 29 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Access Control, Application Security, Business Continuity & Disaster Recovery Planning, Cryptography, Information Security and Risk Management, Compliance & Investigations, Operations Security, Security Architecture & Design, Telecommunications & Network Security.
Full-timeExpandApply NowActive JobUpdated 4 days ago
network security vulnerability management access control jobs Title: engineer senior software
FEATURED BLOG POSTS
How do Employers Verify Education?
At any stage in your professional journey, you may come across an employer or a recruiter who asks to verify your educational credentials. This shouldn’t come as a surprise as 30% of candidates admitted to lying on their resumes, yet 79% of them never get caught. In fact, 85% of employers in the US who conduct background checks find that candidates have lied on their resumes or job applications.
How to Be More Articulate and Speak More Clearly
Have you ever had those moments when you're talking to someone and have no idea what they are saying? The best response you can muster up is a simple head nod or blind agreeance?
How to Ask for a Higher Starting Salary
Maybe you think you’ve finally found your dream job. Everything about it is perfect, except… the salary. Unfortunately, it just isn’t where you want it to be. So, should you give up and move on? Given all the effort you’ve already invested, it’s probably wise to try and negotiate a better salary before you do.
How to Pass a Personality Test with Flying Colors
Whether you’re applying for your first job or looking to move up the career ladder, personality tests aren’t usually the first thing we think about. But surprisingly, they can have a massive impact on how our future employers perceive us. In fact, a 2017 study by the Society for Human Resource Management (SHRM) has found that 32% of U.S. employers use personality tests when hiring for senior management positions, and 28% use them for middle management positions. Personality tests are also used for hourly workers and contractors, though less frequently.
10 Practical and Effective Strategies to Persuade Anyone of Anything
Learning how to persuade people is like a key that can unlock any door. Acing the interview for the job of your dreams. Getting the best deal on a new car. Closing a sale with a skeptical customer. All of these wins require a level of persuasiveness.
A Potential TikTok Ban?!
As you may already know, there has been a lot of talk lately about the possibility of a TikTok ban. While this has not yet come to fruition, it's important to consider the implications this could have for businesses and recruiters who rely on TikTok as a platform to market their brand, recruit new talent, and connect with their audience.