- UpvoteDownvoteShare Job
- Suggest Revision
Dominion Energy's Power Generation Business Unit seeks a Generation Network Specialist to support the Power Generation fleet (non-nuclear) with network devices, network architecture, and network communications security which are part of the SCADA and Industrial Control System (ICS) environments and ICS Cyber Security environments.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Configuration, management, and optimization of Network Intrusion Detection Systems and Host-based Intrusion Detection Systems to include fine-tuning security rule sets for tools such as Suricata, Snort, Yara, and Sigma.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of computer networking concepts and protocols, and network security methodologies. Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
These certifications include: CompTIA A+ CompTIA Network+ CompTIA Security+ Certified Ethical Hacker (CEH) Certified Information Systems Security Professional (CISSP) CISCO Certified Networking Associate (CCNA) About U.S. Army: Army Recruiting Ohio is a small portion of a larger whole.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Project Designer/Security Specialist, ICT Consulting - ( 24000054 ) Work consists of the design of access control, video surveillance, detection, alarms, structured cabling, network systems, wireless, CATV, and other technology systems.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Familiarity with network, wireless, CATV, nurse call and audiovisual design considerations. Extensive experience with access control, video surveillance, intrusion detection, duress alarms, perimeter protection, infant protection and other physical security systems design.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Stantec, is looking for an Information & Communications Technology Design Engineer specializing in Building Technology Systems with specific experience in Physical Security design. Electronic Security Systems.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Network Specialist III may have earned industry recognized certifications with Microsoft and/or CISCO. The Network Specialist may have demonstrated experience and skills in Business Process scripting.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Broad cloud security knowledge around the following domains: data protection, identity access management (IAM), incident response, logging and monitoring, and network security. Seeking a remote Cloud Security Specialist.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Data Network Systems. The Project Designer, ICT Consulting applies technical skills and knowledge to manage key project deliverables that meet project requirements and exceed client expectations.
$88,000 - $100,800 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Conduct technical administrative tasks on Windows, Macs, Linux hosts and network firewalls in support of maintaining DoD cyber security requirements and controls on the enclave. to support the Air Force SEEK EAGLE office in direct support to the Information System Security Manager (ISSM), the Information System Security Officer (ISSO), and work closely with Information Technology (IT) administrators in configuring and securing the organizations primary production system enclave.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Axient is seeking a Cybersecurity/Information Technology Specialist to support the Air Force SEEK EAGLE office in direct support to the Information System Security Manager (ISSM), the Information System Security Officer (ISSO), and work closely with Information Technology (IT) administrators in configuring and securing the organizations primary production system enclave.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Operate and maintain CLS Security controls related to SIEM, DLP, Vulnerability Management, Cyber Threat Intelligence, Endpoint Protection, Network Protection, etc. Design and integrate consistent security solutions across CLS on-premise and cloud environments for domains like Vulnerability Management, Endpoint Security, Data Security, Network Security, Identity and Access management, etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Cyber Security Specialist (Network Security) continuously identifies, tracks, shares, and supports operational IT security requirements across the Ninth Circuit, with an emphasis on network security.
ExpandApply NowActive JobUpdated Today
network security jobs Title: specialist
FEATURED BLOG POSTS
How to Prepare to Be Fired - What You Need to Do
If you’re reading this, let me be the first to tell you how sorry I am. Getting fired feels crappy, disheartening, hurtful, and all the other bad, sad words. But here’s what I want you to do. First, let yourself fumble for a minute. Then, pick your head up — sometimes getting fired is a blessing in disguise. If you think termination is around the corner, we’ll teach you how to prepare to be fired and what to do next so you land somewhere even better.
How to Find a Job That Makes You Happy - 11 Concerning Facts
Do you ever feel like your life is like one of those rom-com movie scene openers? You know, the ones where the main character rolls out of bed, awakened by a casually upbeat theme song, sulks their way to the coffee pot, and then trudges toward their computer to begin yet another boring day at work?
How to Decline a Job Offer You Already Accepted
When you think about it, turning down a job offer is not the worst position you could be in. If you’ve been lucky enough to consider multiple job offers, well, then you’re lucky enough.
How to Practice Fair Chance Hiring for People With Criminal Records
Usually when you think of your dream hire, you think of someone who is respectful, trustworthy, reliable, and has sound judgment, right? As you envision your ideal candidate with these qualities, the last person you think of is someone with a criminal record.
6 Common Mistakes to Avoid When Employer Branding
Currently, job searchers are putting extra effort into researching employers. The information they find plays a major role in whether they will pursue an opportunity with you or look for jobs elsewhere. That is why it is now more important than ever to be proactive and intentional when showcasing your workforce and workplace culture. Having a well crafted employer branding strategy can help you strategize and influence your potential candidates so they see your business in the best light. But in order to do that, you should be aware of some of the most common mistakes that employers make.
What to Say When Terminating an Employee
Terminating an employee is an inevitable part of doing business. Whether you’re re-structuring your department or you’ve identified a few employees who’re not living up to your expectations, letting people go is necessary for keeping your workforce healthy and thriving.
How to Utilize Keywords for Your Job Ads
Before we give you the scoop on how to utilize keywords in job ads, it would be helpful if we defined what keywords are and why they are important. In simple terms,