- UpvoteDownvoteShare Job
- Suggest Revision
Key target is to have large network security vendor in all countries (Palo Alto, Fortinet, Check Point, F5 etc. The Director Security Solutions, APJ will drive Tech Data’s efforts in APJ towards optimizing the mutual benefit of our vendor partnerships in the region for vendors under their purview.
ExpandApply NowActive JobUpdated 17 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The PCSA develops and maintains business, systems, and IT/OT processes to support enterprise mission needs and requirements; translates technology and environmental conditions (e.g., law and regulation) into IT/OT rules and requirements that describe baseline and target security architectures.
RemoteExpandUpdated 13 days ago - UpvoteDownvoteShare Job
- Suggest Revision
System Administrator, Junior (System Administrator - Jr LCAT) (this role is used to target Linux and VMware) Experience with installing, configuring, or maintaining devices, applications, and security tools, including Palo Alto Firewalls, Trellix ESS or former McAfee HBSS, ePO, and FireEye tools, Splunk and Cribl or ForeScout.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Ensure supported security technologies are feeding target security log platforms. Cyber Security Fundamentals (Familiarity with key concepts of Vulnerability Management, Network Security/Secure Transmission Management, Data Loss Prevention, Identity Access Management, Threat Intelligence, Penetration testing, IT Risk Management.
ExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Articulate the high-level benefits of Netskope's architecture to our target audiences (typically senior security management up to CISO and CIO). Strong security skills that would include hands-on experience with Bluecoat, Symantec, McAfee, Checkpoint, Cisco, Juniper along with other appropriate certifications (e.g. CISSP,CCSK, CCSP,CCSE, GCFW, PCNSE, JNCIS-SEC/JNCIP-ENT, GCIH, etc.
ExpandUpdated 13 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Demonstrated experience in addressing regulatory compliance for the security requirements in applicable laws and regulations, such as NERC CIP, SOX, PCI DSS, and HIPAA.Solid understanding and experience with security development lifecycle (SDL) processes for internally developed applications, including the web-based and Internet facing components.
RemoteExpandUpdated 12 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Demonstrated experience in addressing regulatory compliance for the security requirements in applicable laws and regulations, such as NERC CIP, SOX, PCI DSS, and HIPAA. Relevant security certifications (CISSP, CISM, SABSA, GIAC.
RemoteExpandUpdated 18 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience on the following systems: NGA validated point mensuration systems (SOCET-GXP with CGS), Joint Targeting Toolbox (JTT), Modernized Integrated Database (MIDB), Digital Precision Strike Suite (DPSS) Collateral Damage Estimation (DCiDE), Joint Munitions Effects Manual (JMEM) Weaponeering System (JWS), Cross domain security guard applications or solutions (ISSE-GUARD), radiant mercury imagery guard (RMIG.
Full-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Overview System Administrator, Junior (System Administrator - Jr LCAT) (this role is used to target Linux and VMware) Position Description: Collaborates to develop innovative solutions to enable secure and reliable operations of enterprise computer systems.
Full-timeExpandApply NowActive JobUpdated 15 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Internal Security Analyst will work with the larger team to support Internal Security daily operations providing front line operational and analytical support. Internal Security Analyst.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Proven hands-on experience with information security solutions such as Web Proxy, NGFW, Security Gateways, working with remote access and site to site VPN technologies, SAML/SSO, DLP, Data security and understand but also write regex expressions.
ExpandUpdated 17 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Be competent in utilizing Intelligence Data Visualization Tools (i.e. Google Earth, Palantir, and, Analyst Notebook, Target Cop) U.S Government Departments and Agencies (other than DoD) in areas such as policy formulation, acquisition, finance, drug law enforcement, security, policy formulation, and at disrupting and degrading the national security threats posed by drug trafficking, piracy, transnational organized crime, and threat finance networks reasonably related to illicit drug trafficking activities.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Principal Cyber Security Architect (PCSA) partners with IT and business teams to provide expert leadership to drive security technology and security reference architecture solutions by weighing the advantages of security technology standards, market availability of products, and risks and benefits of security technology introduction into Exelon's computing environments.
RemoteExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience in SIGINT electronics design, RF signal processing, antenna design, wave propagation, system analysis, and target acquisition. This includes the oversight of hardware aspects, signal processing methodologies, antenna development, as well as the testing, modeling, and simulation crucial for advancing airborne Intelligence, Surveillance, and Reconnaissance (ISR) SIGINT sensors.
Full-timeExpandUpdated 19 days ago
target security jobs
FEATURED BLOG POSTS
Internal Hiring Best Practices
Each companies hiring strategy is based on a set of rules that defines the ideal candidate. Many companies utilize internal and external hiring to ensure they have skilled, experienced workers. If you work in recruiting, maximizing your internal hiring strategies could be the key to retaining employees and simplifying your hiring process.
Why is it so Hard to Get a Job After College
For many, it was easy finding a job while in college. But after job hunting for weeks, you may wonder why it is so hard to get a job after college. After all, you’ve put a lot of time and effort into getting your degree. But don’t get discouraged. The University of Washington found that 53% of graduates are either unemployed or working a job that doesn’t require a degree. Other studies also show that landing your first job can take between 3 and 6 months. So, getting your first job takes time.
Why Leadership Is So Important in Your Career
There are plenty of baseball players worldwide, but only a select few will master the sport enough to play in the World Series. Similarly, you’ll meet hundreds of “managers” throughout your professional career. Still, only a few will cement themselves as true leaders in your mind. This is why leadership is important—the most influential leaders leave a mark. They inspire.
Making the Move to Salary Transparency
The salary transparency trend continues. Last year, Colorado passed its Equal Pay Transparency Rules, which required employers to include compensation in job postings, notify employees about promotional opportunities, and record job descriptions and wage records. Soon after, states like Washington, Nevada, Maryland, and Rhode Island followed suit.
Brand Reputation 101
People's initial perception of your organization is also known as your brand reputation. Your brand rep either encourages or discourages people from engaging with your company. This means the way people view your company will affect sales and even recruiting efforts.
Recruiting in a Tight Market
As a recruiter or employer, you know how much the economy affects your recruitment and retention efforts. You aren't just in competition with companies in your industry, but you are also fighting against inflation, recession, unemployment rates, and so much more.
How to Build a Candidate Persona
A candidate persona is a semi-fictional representation of your ideal candidate. Building a candidate persona is one of the best methods employers use to ensure their sourcing, recruiting, and hiring processes are focused. Knowing exactly what you're looking for streamlines everything and helps increase hiring confidence. So here's how to create a candidate persona and how to use it.