- UpvoteDownvoteShare Job
- Suggest Revision
Experience performing IT control reviews in security domains including IT asset security, security engineering, network security, identity and access management, security assessment and testing, security operations, and secure development.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of a broad range of security technologies including NextGen Firewalls, DLP, NAC, IDS/IPS, Certificate Management, Identity & Access Management, Privileged Identity. Management, Multi-Factor Authentication, Mobile Device Management, Endpoint protection, SIEM, Anti-malware, Vulnerability Management, etc.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience performing IT control assessments over Mainframe, UNIX, Windows, SQL Server, Oracle DB, or a major ERP application (e.g. PeopleSoft or Lawson). CISA, CISM, CISSP or other relevant security-certification(s) (Preferred.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with application security and testing, including secure coding practices and vulnerability assessment methodologies, administering and assessing network devices and security controls, including network security management and configuration, and with Windows or Linux system administration, including managing and securing operating systems effectively.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Must have proficient knowledge with three or more of the following technologies: Application / stateful / UTM firewalls; SIEM; DLP; Web content filtering; Web application firewalls (WAF); Vulnerability scanning and penetration testing; IPS/IDS; Security Operations Center operations; Wireless Networking; UNIX, AIX & Solaris, Linux, Windows Server Operating Systems; Endpoint and Malware.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Strong understanding of the following: networking fundamentals (all OSI layers, protocols); Windows/ Linux/Unix/Mac operating systems as well as software vulnerability and exploitation techniques; commercial or open-source offensive security tools for reconnaissance, scanning, exploitation and post-exploitation (e.g. Cobalt Strike, Metasploit, Nmap, Nessus, Burp Suite.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Infrastructure Security works in collaboration with other teams within the Information Security organization, including application security, vulnerability management, network security, security operations and incident response, and security assurance.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of vulnerability management, patching, and related management tools (e.g. BigFix, RedHat Satellite Server, Nessus) Security: Compliance, Information Assurance, Data Protection using industry-best practices and tooling (Crowdstrike Falcon, Tenable.io, Splunk, HashiCorp Vault signers, PKI and Certificate Management.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
3 – 5 years information security program experience to include incident management vulnerability management, data-loss prevention, endpoint protection, security information event management (SIEM), intrusion detection systems, intrusion prevention systems, malware analysis, and network situational awareness.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Windows Certification and a Security certification (Sec+ CE, CySa+, CCNSecurity, CCNP Security, GICSP, GSEC, CND, SSCP, CASP+ CE, CISA, CISSP (or Associate), GCED, GCIH, CCSP) Working closely with the local RDT&E and SWAN group as well as the DREN and NIWC PAC teams to coordinate Group Policy Objects (GPO), and Host Based Security Server (HBSS) policies for the Government test facility’s server and workstations.
$40 - $45 an hourFull-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Leidos is seeking a talented Network Security Engineer to join our team to support a federal customer within the Federal Emergency Management Agency (FEMA), Network Operations Security Center (NOSC.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Extensive knowledge of traditional security controls and technologies, such as Security Information and Event Management (SIEM) systems, intrusion detection/prevention systems (IDS/IPS), public key infrastructure (PKI), identity and access management (IDAM) systems, antivirus and firewalls, in addition to newer offerings such as endpoint detection and response (EDR), threat intelligence platforms, security automation and orchestration, deception technologies and application controls.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Windows System Administrator 3 will be responsible for installing or upgrading Windows-based systems and servers, managing user access to the servers, and maintaining the security and stability of the network, ultimately helping to ensure the smooth running of the company's networking and server systems while maintaining a high level of security.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Analyze data from numerous sources (Splunk, Qualis, CMDB/Asset Inventory, CyberArk, Armis, ForeScout, Automated Patch Management systems, Threat and Vulnerability, Network Traffic, Governance and Standards data, Risk Assessment data, Security baselines, etc.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Interface with other teams in Information Security (e.g. network operations, cyber threat intel, vulnerability management) along with information and liability risk officers and technology management to help guide cyber security investigations and incidents.
Full-timeExpandApply NowActive JobUpdated Today
network security vulnerability management windows server jobs Title: engineer information systems security
FEATURED BLOG POSTS
How to Ask for a Letter of Recommendation
When the job board you subscribe to finally posts your dream job, you may feel like the stars have aligned. But part of securing a position that matches your career plan is ensuring you address all the application basics. You know, the resume, the cover letter, the portfolio. It seems like you've got this in the bag — until you realize they want a letter of recommendation, too!
16 Tech Jobs You can Get Without a College Degree
You might think that if you don’t have a computer science, information technology, or related degree, then there’s absolutely no way you can break into the technology field and score a high-paying tech job. But this is a misconception. There are actually tons of tech jobs out there that don’t require a college degree. Instead, employers are more interested in the skills that you can offer. So, read on to learn more about how to land tech jobs without a degree.
What Are SMART Goals?
When it comes to achieving our goals, there’s a lot of noise to work through. A study by the University of Scranton has found that only 8% of people who set New Year’s resolutions actually achieve them. Our busy lives might be one reason for this. Another, even more important reason, is our approach to goal setting. Being too vague, too ambitious or simply unclear on the timeframe can set us up for failure.
How Long Do Background Checks Take for Pre-Employment
Many jobs require a background check. For some companies, this is a matter of company policy. In other jobs, such as finance, childcare, and security, the government often requires background checks. While there are varying levels of intensity, for most people, a background check is nothing to worry about. In fact, the biggest question is often how long does a background check take? Here’s what job seekers and applicants need to know about background checks before they apply to new jobs.
The Best Remote Jobs: Where & How to Find Them
The Covid-19 pandemic hasn’t been easy on any of us, but if there’s one silver lining, it’s the fact that remote work has grown in popularity because of it. Companies that previously weren’t open to their employees working remotely were suddenly forced into allowing it. Since then, they've realized that much of their workforce is happier and more productive. Naturally, this has led to more remote job openings, which is great if you’re interested in this type of position. Read on to learn more about the best remote jobs and where to find them.
In-House vs Outsourcing Recruiting: Which is Better?
When looking at in-house vs outsourcing recruiting, it is important to nail down the benefits for each and whether those benefits outweigh the risks that follow.
How to Write a Short Bio
First impressions can be tricky. When meeting someone in person, it’s likely you have an elevator speech. These short, practiced introductions can help you share more about who you are, what you do for work and other facts about you. While this works well in a live, in-person context, there are many cases where professionals “meet” someone via written form - like social media, a resume, or published work. In these cases, your bio works as your first impression. So, here’s a step-by-step guide on how to write a short bio.