- UpvoteDownvoteShare Job
- Suggest Revision
Interface with other teams in Information Security (e.g. network operations, Cyber Fusion Center (CFC. Industry certifications in cyber forensics and incident response, such as GIAC Cloud Security Essentials Certification (GCLD), GIAC Cloud Threat Detection (GCTD), GIAC Cloud Security Automation (GCSA), GIAC Cloud Forensics Responder (GCFR), Certified Forensic Computer Examiner (CFCE), GIAC Certified Forensic Examiner (GCFE), GIAC Certified Forensic Analyst (GCFA), GIAC Certified Incident Handler (GCIH), GIAC Reverse Engineering Malware (GREM), and other related credentials.
$95 an hourExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Sr Principal Cyber Security Network Engineer is a member of the Information Security group, combining expertise in Security Architecture, Engineering, and Operations.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Job Duties: Provide crucial intelligence and network support that safeguards the cyber domain. These certifications include: CompTIA A+ CompTIA Network+ CompTIA Security+ Certified Ethical Hacker (CEH) Certified Information Systems Security Professional (CISSP) CISCO Certified Networking Associate (CCNA) About U.S. Army: Army Recruiting Ohio is a small portion of a larger whole.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Virtual Cyber Security Sales Engineer Location: United States (Virtual with Travel Throughout the US) Company Overview: Our Client is a leading provider of cutting-edge cybersecurity solutions to protect businesses from evolving digital threats.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
RCAs are responsible for providing advisory support concerning computer (network and infrastructure) analysis to enable Adversarial Cyber and/or Electronic Warfare Operations to support an evolving DoD Red Team. Additionally, RCAs act as subject matter experts on variety of complex topics related to varied cyber threats.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
CACI is seeking a Cyber Security Analyst for the DISA GSM-O II program to support Cyber Operations for our customers at Fort Meade, MD. GSM-O II provides network operations and cyber defense support to the Defense Information Systems Agency (DISA) in support of the DoD and COCOM. This position provides 24x7 cybersecurity monitoring services for the Department of Defense network.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Position SummaryThe Network Security Analyst is responsible for safeguarding university networks and systems from cyber threats. The Network Security Analyst will meet deadlines set for assigned projects, provide effective customer service to campus users regarding network connectivity and participate in cross-functional teams to support university goals and objectives related to administration of the campus network.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
We are excited to be seeking a Security & Network Systems Specialist I to join our team in Kenai. DUTIES AND RESPONSIBILITIES: Installs, configures, maintains, and optimizes technology security architecture & network equipment (firewall, switches, routers, etc.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Corporate Cyber Security Intern will work closely with configuring removable media (USBs, hard drives, CDs, DVDs) rules. The Corporate Cyber Security Intern will review ongoing cybersecurity incidents, alerts, investigations, and requests.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Industry certifications in cyber security, such as Security+, CySA+, Certified Ethical Hacker (CEH), GIAC Security Essentials (GSEC), Cisco Certified Network Associate (CCNA), GIAC Certified Intrusion Analyst (GCIA), GIAC Certified Incident Handler (GCIH.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This includes performing real-time cyber threat intelligence analysis, correlating actionable security events, performing network traffic analysis using raw packet data, and participating in the coordination of resources during the incident response process.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Attend cleared expert threat briefings; have oversight of security program design, incident response plans, cyber risk assessments, and attack surface assessments; investigate security breaches, perform red, blue, purple, ethical hacking, orchestrate vulnerability assessment, develop security protocols, conduct tabletop exercises, and breach readiness reviews.
$170,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The candidate should have at minimum ONE of the following certifications: · CompTIA Cyber Security Analyst (CySA+) · CompTIA Linux Network Professional (CLNP) · CompTIA Pentest+ The U.S. Department of Homeland Security (DHS), Customs and Border Protection (CBP) Security Operations Center (SOC) is a U.S. Government program responsible to prevent, identify, contain and eradicate cyber threats to CBP networks through monitoring, intrusion detection and protective security services to CBP information systems including local area networks/wide area networks (LAN/WAN), commercial Internet connection, public facing.
$183,300 a yearFull-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Job Specific Qualifications Required Qualifications: • Bachelor’s degree and 4 years of relevant cyber security experience • In lieu of a degree 8 years of cyber experience • Technical experience includes: information / data / network / computer security design, administration and/or assessment.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Provide documentation of all steps followed and all the activities within those steps during the Implementation to FEPOC. Should be someone who has performed multiple PIM Implementations at large organizations using CyberArk. Essential Functions: 20% Assists with day-to-day support of security solutions.
ExpandApply NowActive JobUpdated Today
network support cyber security jobs Title: specialist network security
FEATURED BLOG POSTS
What is Career Cushioning?
Is your organization prepared for “career cushioning”?
Growing Discontent: Employees Wouldn't Wish Their Jobs on Their Worst Enemy
The start of a new year, and most people are already busy setting personal and professional goals. What’s on the top of the list for a growing number of working people is making an exit from the job they currently have. Why?
How to Gracefully Quit a Job You Just Started
You’ve just started learning the ropes at your new job, and you've gotten to know your colleagues. But you’re already thinking about quitting. Maybe you were deciding between to job offers and realized that you’ve made the wrong choice. Or, a change in your personal circumstances means that you have to quit.
Why is Non-Verbal Communication Really Important?
In a world where words and phrases rule daily communication, you may wonder why non-verbal communication is important. Whether you realize it or not, you communicate more with nonverbal actions than you do with verbal communication. When you interact with your peers, people are reading your body language, facial expressions, voice, and many other factors that help fill in blanks that words can't fill.
Making Hybrid Work More Efficient
Covid was a catalyst for change in the work environment. Keeping people safe and helathy was the initial goal for employers, but the unintended result was the considerable demand in remote work. Now, onsite work has been dramatically altered to remote work, which is now transforming into a combination of the two: hybrid work.
How Can HR Technology Help Retain Employees?
Human resources' rapid adoption of technology has led to new ways of streamlining human capital management. Based on the IEE Global Study, these technologies changed how HR handled recruitment and retention in 2022. This includes tech like
Why is Time Management Important? 10 Crucial Importances of Time Management
We’ve all been there before. What starts as a relaxing evening scroll quickly becomes a full-blown binge. You blink, and it’s midnight - throwing off your entire next day before it even starts. And at its worst, this indulgence might leave you feeling behind on things you planned to finish that night. This is why time management is important.