- UpvoteDownvoteShare Job
- Suggest Revision
Familiarity with Powershell scripting and use of Power BI.Hands-on experience in implementing and supporting various security platforms (firewall, proxy, DLP, SIEM, endpoint, vulnerability scanning, PKI, DoS prevention, MFA, etc.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Introductory knowledge of IT & Security concepts: Malware Analysis, Web Firewall, Scripting/coding, SIEM, Vulnerability, SAML, Cloud IaaS (AWS, GCP or Azure), Phishing, Data loss Prevention, Network Security.
InternExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge/experience in one or more of: Next Generation Firewall (NGFW), Secure Access Service Edge (SASE), Software-Defined Wide Area Networking (SD-WAN), network architecture, Extended Detection and Response (XDR), Web Application Firewall (WAF), Intrusion Prevention/Detection Systems (IPS/IDS), Security Information Event Management (SIEM.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Detailed understanding of information security systems, including firewalls, IDS/IPS, SIEM, vulnerability management, antivirus, and disk encryption. Implement, configure, and maintain firewall solutions from vendors such as Barracuda, Cisco, Fortinet, Palo Alto, and Sophos.
ExpandApply NowActive JobUpdated 13 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The majority of these projects will be primarily around Firewall solutions. With Howard Industries Inc. being our parent company (Over 4000 employees and $1 Billion in revenue) and great brands such as HP, Lenovo, Cisco, Microsoft and Epson, we have rapidly gained market share in the industry and are looking to expand our team to help us take our company into the future.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Palo Alto Networks Certified Network Security Engineer (PCNSE) Howard Technology Solutions is seeking a highly qualified Cyber Security Consulting Engineer to serve our clients in both a pre-sales and post-sales delivery capacity.
ExpandApply NowActive JobUpdated 12 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Endpoint Security, Data Security, Cryptography, Application Security, Mobile Device Security, SIEM and SOAR Integrations. Web application security, Web Application Firewall (WAF) configuration such as Akamai and Alert Logic.
Full-timeExpandApply NowActive JobUpdated 24 days ago - UpvoteDownvoteShare Job
- Suggest Revision
IAM, MFA, SSO, CASB, PAM, Visibility and Analytics, SIEM , Zero Trust. Firewall, Email and Web security, EDR and EPP solutions, NAC, MDM. Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Monitor and analyze security events and alerts from multiple sources, including security information and event management (SIEM) software, network and host-based intrusion detection systems, firewall logs, and system logs (Windows and Unix), and databases.
ExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Possesses demonstrable skills in one or more of the existing computer disciplines: ITIL Framework, Network Hardware/Software (Cisco switch/router/firewall setup and configuration), Windows desktop/server operating systems, virtualization technologies such as Terminal Server or VMWare, scripting, security administration, Microsoft Group Policy and Active Directory management, data backup strategies, mobile device management, anti-virusand malware technologies, SIEM systems, and others.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Infrastructure (server, database, network, operating system, mobile devices), or cyber security (firewall, IDS/IPS, DLP, Proxies, anti-malware, CASB, email security, remote access, security baselines, SIEM, PKI, data encryption/tokenization, or Cloud security.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Preferred designations include CISA (Certified Information Systems Auditor), CISSP (Certified Information Security Systems Professional), CISM (Certified Information Security Manager), or other relevant business designations.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Tools such as Firewall, Host and Network IDS/IPS, Anti-Virus, EDR, URL Filtering Gateways, Email Filtering Gateways, DLP tools, and SIEM tools such as Splunk etc. Utilize advanced threat models, SIEM use cases, and incident response playbooks.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of and experience with intrusion detection/prevention systems and SIEM software. GCIH, GCFE, CISSP, Security +, Network +, CEH, RHCA, RHCE, MCSA, MCP, or MCSE preferred. Led by CEO, Jim Rosenthal, BlueVoyant’s highly skilled team includes former government cyber officials with extensive frontline experience in responding to advanced cyber threats on behalf of the National Security Agency, Federal Bureau of Investigation, Unit 8200 and GCHQ, together with private sector experts.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Expert knowledge of at least three of the following: Computer Forensics, Endpoint Security Management, Vulnerability Management, Remote-Access, Zero Trust, Data Classification/Data Loss Prevention, SIEM management, Security Incident Event Management, Network Security, Penetration Testing, Red/Blue/Purple Team, or Software Development Life Cycle.
ExpandApply NowActive JobUpdated Today
siem firewall jobs
FEATURED BLOG POSTS
What is a W-9 and How to Fill One Out
When you began working for yourself, you probably didn’t account for the tax reporting work that will fall on your shoulders each year. If you’re a freelancer, independent contractor, or business owner, filing your taxes is not as simple as uploading your W-2 form into some online tax preparation software. Most self-employed people need to complete a W-9 as a step for accurately reporting their earnings to the IRS. Below, you can learn how to fill out a W-9 and when to submit it.
Tightening the HR budget in 2023
With the state of the economy still uncertain, 2023 is expected to be approached with much anticipation. Human Resource leaders have many concerns, including how they will manage to accomplish their goals with budget belts already getting snug. Let’s look at some of the factors that the new year is projected to bring for HR and how to prioritize budgets to reach human capital objectives.
A Comprehensive Guide to Becoming a Better Conversationalist
Have you ever stood awkwardly next to someone at a party because you didn’t know what to say to them? How about at a networking event or on a first date? You're not alone if you’ve ever experienced this uncomfortable silence. Many people struggle to master the art of being a great conversationalist.
Why is Non-Verbal Communication Really Important?
In a world where words and phrases rule daily communication, you may wonder why non-verbal communication is important. Whether you realize it or not, you communicate more with nonverbal actions than you do with verbal communication. When you interact with your peers, people are reading your body language, facial expressions, voice, and many other factors that help fill in blanks that words can't fill.
Making Hybrid Work More Efficient
Covid was a catalyst for change in the work environment. Keeping people safe and helathy was the initial goal for employers, but the unintended result was the considerable demand in remote work. Now, onsite work has been dramatically altered to remote work, which is now transforming into a combination of the two: hybrid work.
How Can HR Technology Help Retain Employees?
Human resources' rapid adoption of technology has led to new ways of streamlining human capital management. Based on the IEE Global Study, these technologies changed how HR handled recruitment and retention in 2022. This includes tech like
Why is Time Management Important? 10 Crucial Importances of Time Management
We’ve all been there before. What starts as a relaxing evening scroll quickly becomes a full-blown binge. You blink, and it’s midnight - throwing off your entire next day before it even starts. And at its worst, this indulgence might leave you feeling behind on things you planned to finish that night. This is why time management is important.