- UpvoteDownvoteShare Job
- Suggest Revision
Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance and/or systems engineering.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Additional experience may be in one or more of the following: computer or information systems design/development/installation, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance or systems engineering.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Seven (7) years of experience and a Doctorate Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensic, Cyber Security, Software Engineering, Information Assurance, or Computer Security.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Additionally, experience must include one or more of the following areas: computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance or systems engineering.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Relevant experience must be in one or more of the following: computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, network administration, or system administration.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Degree must be in Network Engineering, Systems Engineering, Information Technology or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Senior Information Security Engineer - SOX Compliance Lead is responsible for the planning, design and build of security architectures; oversees the implementation of network and computer security and ensures compliance with corporate cybersecurity policies and procedures.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This includes but is not limited to Network Monitoring, Preventative and Detection Controls, Forensics and Investigations, Security Awareness, Security Vulnerability Management, and Cyber Threat Intelligence activities.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Relevant experience must be in the design/development of computer information systems, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, and/or systems engineering.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
NFM’s Senior Network Security Engineer researches, analyzes and troubleshoots information systems compliance and security issues. Lead: Provide expertise on security solutions, to support Firewalls, Content Engines, Intruder Detection or Prevention Systems, Security Architecture and Vulnerability Management.
$86,260 - $138,906 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Reviewing reporting, automation, and visualization systems to provide situational awareness and making recommendations to improve vulnerability management capabilities. Information Security Analyst will manage all aspects of infrastructure systems used to manage CND-SP networks & resources and will assess threats to the environment.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Familiarity with: Zero Trust Network Access (ZTNA) and Secure Access Service Edge (SASE) frameworks, Identity, Credential, and Access Management (ICAM) (OKTA), Cloud Workload Protection Platform (CWPP), Security Operations Center (SOC) Operations, Vulnerability Threat Management, and Compliance Formal Education Masters degree (or higher) in one of the following: computer science, electronics engineering, computer engineering, computer science, information technology, or cybersecurity.
Full-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
These services include technology strategic planning, web site development, graphic design, disaster recovery, systems development, network administration, audio/visual services, business process re-engineering, change management, program management, security administration, service desk, computer operations, telecommunications, and document management.
$150,000 - $160,000Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Professional Certifications Global Information Assurance Certification (GIAC) Security Essentials Certification Years of Professional Experience 10 years of relevant experience Desired experience Risk Management Framework (RMF), Cybersecurity Framework (CSF), Federal Information Security Modernization Act (FISMA), and FedRAMP experience.
Full-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The role provides technical analysis, assessment, and recommendations in security situational awareness, operational, network, and applications systems security monitoring, and vulnerability management.
Full-timeExpandApply NowActive JobUpdated Today
network security vulnerability management information systems computer forensics jobs Title: engineer
FEATURED BLOG POSTS
16 Tech Jobs You can Get Without a College Degree
You might think that if you don’t have a computer science, information technology, or related degree, then there’s absolutely no way you can break into the technology field and score a high-paying tech job. But this is a misconception. There are actually tons of tech jobs out there that don’t require a college degree. Instead, employers are more interested in the skills that you can offer. So, read on to learn more about how to land tech jobs without a degree.
What Are SMART Goals?
When it comes to achieving our goals, there’s a lot of noise to work through. A study by the University of Scranton has found that only 8% of people who set New Year’s resolutions actually achieve them. Our busy lives might be one reason for this. Another, even more important reason, is our approach to goal setting. Being too vague, too ambitious or simply unclear on the timeframe can set us up for failure.
How Long Do Background Checks Take for Pre-Employment
Many jobs require a background check. For some companies, this is a matter of company policy. In other jobs, such as finance, childcare, and security, the government often requires background checks. While there are varying levels of intensity, for most people, a background check is nothing to worry about. In fact, the biggest question is often how long does a background check take? Here’s what job seekers and applicants need to know about background checks before they apply to new jobs.
The Best Remote Jobs: Where & How to Find Them
The Covid-19 pandemic hasn’t been easy on any of us, but if there’s one silver lining, it’s the fact that remote work has grown in popularity because of it. Companies that previously weren’t open to their employees working remotely were suddenly forced into allowing it. Since then, they've realized that much of their workforce is happier and more productive. Naturally, this has led to more remote job openings, which is great if you’re interested in this type of position. Read on to learn more about the best remote jobs and where to find them.
In-House vs Outsourcing Recruiting: Which is Better?
When looking at in-house vs outsourcing recruiting, it is important to nail down the benefits for each and whether those benefits outweigh the risks that follow.
How to Write a Short Bio
First impressions can be tricky. When meeting someone in person, it’s likely you have an elevator speech. These short, practiced introductions can help you share more about who you are, what you do for work and other facts about you. While this works well in a live, in-person context, there are many cases where professionals “meet” someone via written form - like social media, a resume, or published work. In these cases, your bio works as your first impression. So, here’s a step-by-step guide on how to write a short bio.
How to Effectively Recruit Employees
Today, hiring and retaining talent looks much different than it did only two or three years ago. Financial instability and the strain on our mental health brought on by the pandemic has made everyone more wary and selective of their workplace and employer. Whereas in the past people might have prioritized promotions and financial reward, today they look at other factors such as workplace flexibility, personal fulfillment and values alignment.