- UpvoteDownvoteShare Job
- Suggest Revision
Functions as a technical expert for GSOC ITSM platform; manage testing and release of a full range configuration changes; Perform system patching to maintain an up-to-date and secure environment; Use the ITSM platform to support asset management, change management, network management, incident management, and contract management programs.
Full-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with Azure Security and Identity services (e.g., Security Center, Azure Active Directory, RBAC, NSGs / ASGs)Experience with Azure Networking services (e.g., VNETs, Load Balancers, Front Door, ExpressRoute, Traffic Manager, Content Delivery Network)Basic knowledge of IT security regulations and standards such as ISO Experience managing/implementing Windows Server technologies (/ preferred), Active Directory and Group Policy management.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Services include Network and System Modernization, Cyber Defensive Operations, Defensive Cyber Assessments, Defensive Cyber Infrastructure Support, Threat & Data Analytics, DoDIN Operation Support, Network Management, Systems Management, IT Lifecycle Management, IT Service Management (ITSM), Portfolio/IT Investment Management, and Theater Operations and Service Desk support.
Full-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Ensures compliance of departmental policies and procedures as established within the department, including, but not limited to, change control management policies, network security policies, systems maintenance procedural policies, disaster recovery and business continuity procedural policies and system documentation policies.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
As an Information System Security Manager (ISSM) for TCASS, your role is integral to the security and compliance of the organization's information systems, with a particular focus on Assured Compliance Assessment Solution (ACAS), the Risk Management Framework (RMF), and Security Technical Implementation Guide (STIG) tracking.
ExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
The MTC Network Engineer will serve as the ISSO for the MTC and will lead all contractor efforts in support of Risk Management Framework (RMF). The Network Engineer will perform as the overall communications architect and Information System Security Officer (ISSO) for the MTC and will coordinate with outside agencies and III Corps MTC sites.
$92,331 - $154,211 a yearFull-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Have working knowledge of enclave protection technologies to include Firewalls, Network IDS/IPS systems, Host Based IDS/IPS and Security Incident and Event Management (ArcSight SIEM.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
In this role, The Azure Security SME will develop software and recommend security controls and threat protection, managing identity and access management, defining organizational structure and policies, in Azure technologies to provide data protection, configuring network security defenses, collecting and analyzing Azure logs.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Leidos is seeking a COMSEC Specialist to support efforts for the Service, Management, Integration and Transport (SMIT) Contract; supporting the largest IT services program for the Navy. Under the SMIT Contract, the Leidos team will deliver the core backbone of the Navy-Marine Corps Intranet, including cybersecurity services, network operations, service desk, and data transport.
$81,250 - $146,875 a yearFull-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Champions the implementation of the DoD Risk Management Framework (RMF) to bolster Assessment and Authorization (A&A) across DoD network environments. · Guides the utilization of tools like eMASS (Enterprise Mission Assurance Support Service) and ACAS (Assured Compliance Assessment Solution) Security Center for A&A management, ensuring thorough analysis and system security.
Full-timeExpandApply NowActive JobUpdated 17 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with Splunk, network security, server and system security, and application security supporting event management tools, including SIEMs∯*∯ Requiring services of an IT Security Specialist to aid county offices in the identification of gaps through risk management, and assist in the development of mitigation strategies, and to establish the target security/infrastructure architecture.
Full-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Significant experience with Azure DevOps Operational Framework and Azure Network, including expertise in Subscription management and Security zoning. Experience with Azure DevOps Operational Framework and Azure Network (Subscription, Security zoning, etc.
$110,000 - $261,500 a yearFull-timeRemoteExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Designs wired and wireless local area networks (LANs), IP management, and Network security services. Demonstrate subject matter expertise in the areas of Routing, Switching, Remote access, Security Information, Event management, and Next Generation Firewalls with product specific knowledge of Cisco and Juniper Switches, and Palo Alto Networks Firewalls.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Understanding of multiple Information Security domains, such as Identity & Access Management, Infrastructure Vulnerability Management, Network Security, Data Loss Prevention, End User Security, etc.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Develops, recommends, implements and manages a variety of cloud security management policies, protocols, systems and tools, rogue wireless access point detection and Web content filters; network security policies and remote access standards guidelines; ensuring compliance with NCUA regulations.
Full-timeExpandApply NowActive JobUpdated 5 days ago
security management network jobs
FEATURED BLOG POSTS
Structured vs Unstructured Interviews
The goal of an interview is to evaluate candidates based on their skills, personality, and knowledge. You want to choose the BEST candidate from your candidate pool, so the interview is something you can't mess up. As you begin planning your interview process, one of the major decisions you'll face is whether the interview should be a structured vs unstructured interview. So let's take a dive into the differences and sort out which circumstances warrant which interview process.
How to Describe Your Personality with Examples
Imagine you’re in an elevator with the CEO of your dream company and you get to talking. The conversation is going well and you start to imagine yourself working for their company when the CEO turns around and asks you “tell me a bit about yourself.” Would this catch you off guard or would you be able to give a clear and succinct description of who you are?
4 Ways to Make Your Job Posting More Inclusive
According to a Glassdoor survey,
How to Calculate Net Income
Understanding your finances can be daunting even if you’re good with numbers. Your net income, in particular, is a key metric for determining how well you’re doing financially and whether your current way of operating is sustainable or not.
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra:
6 Best Ways to End a Cover Letter with Examples
Including a cover letter with your resume is a great way to introduce yourself to the hiring manager, tell them why you’re the ideal fit for the role, and provide context about your personal situation. A strong cover letter will give you an advantage over other applicants. But it’s important that you structure it properly and write it powerfully so that it carries an impact. This article will discuss how to end a cover letter effectively so you catch the eye of a hiring manager and increase your odds of landing an interview. Read on to learn more.
How to Write a Follow-Up Email for a Job Application?
Most times, we have to do more than submit a "sugar-coated" resume to land our dream jobs. Going the extra mile to follow up on your job application can increase your chances of employment. Additionally, it may even help you get confirmation sooner on whether you are seriously being considered for the job or not.