- UpvoteDownvoteShare Job
- Suggest Revision
Ability to maintain IAT Level 2 Security Certification (Security +, CySA+, CCNA Security, GICSP, GSEC, SSCP) OR IAT DoD level 3 (CASP, CCNP-Security, CISA, CISSP, GCED, GCIH) or able to obtain and maintain within 6 months of start date.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Keywords:Huntersville NC Jobs, Security Operations Center Engineer, Help Desk, Firewall, Cisco, Meraki, Palo Alto, Fortinet, WatchGuard, Microsoft 365, MFA Deployment, Switch Management, Switches, Routing, SOC, North Carolina Recruiters, Information Technology Jobs, IT Jobs, North Carolina Recruiting.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
In-depth knowledge of security technologies and concepts, including (but not limited to) NGFW, IPS, APT, Ransomware, MITRE/ATT&CK, Killchain, EDR, NDR, SIEM, SOAR, DDOS, Remote Access, SASE, identity.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Implementation of PLM/CAD interoperability strategiesInstallation and maintenance of Siemens Teamcenter enterprise server, web server & active workspace components with TC Deployment CenterPLM integration with SSO, SAML & other security protocols.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with deployment orchestration, automation, and security configuration and infrastructure management (Terraform, Jenkins, Puppet, Chef, Ansible). Candidates should possess proven record in advising on Cloud Security at the Chief Information Security Officer (CISO) and/or Senior Security Manager levels and be recognized for business as well as technical acumen.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Must have a currently active Top Secret / Top Secret SCI US Security Clearance, or have completed a Tier 5 (T5), formerly known as a Single Scope Background Investigation (SSBI) by the federal government within the past 5 years.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Candidate must possess an appropriate and current DoD Information Assurance (IA) Certification to be considered for employment; either valid CompTIA Security+ CE, Systems Security Certified Practitioner (SSCP) or Cisco Certified Network Associate (CCNA)-Security.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
5+ years of experience with CyberArk EPM global policy standards and agent package deployments " Possess scripting skills (e.g., PowerShell, Bash) to automate routine tasks, streamline processes, and integrate CyberArk EPM with other security tools and platforms.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
St. Moritz Security Services, Inc. is an Equal Opportunity Employer M/F/D/V. Your application today will assist us in getting to know you and help us line up the best communication program to get you engaged with St. Moritz.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Experience withnetwork monitoring and performance tools, security management tools, and network authentication tools (e.g., Cisco EPNM, Ciena MCP, Broadcom CAPM, Cisco ISE). Develop automated CI/CD build/deployment pipelines using Jenkins (CloudBees), Artifactory, Kubernetes (OpenShift), Docker, Ansible and Bitbucket.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Responsible for site-specific duties and tasks based on assignment, which may include customer service, loss prevention, retail security, lobby/visitor reception, service/freight elevator security, loading dock security, and/or a variety of other safety and security roles.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
L3Harris has an immediate opening for a Sr Information Systems Security Manager (ISSM) responsible for the development, deployment and execution of controls and defenses to ensure the security of company/customer technology, information systems, and system deliverables.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Conducts regular and random patrols of the interior and perimeter of the facility and identify potential safety risks, security risks and undesirable conditions. Provides customer service to our clients by carrying out safety and security procedures, site-specific policies and when appropriate, emergency response activities.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Lead the integration of security practices across the DevSecOps lifecycle, including planning, design, implementation, testing, and deployment. Explore more InfoSec / Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Senior IAM Engineer will predominantly engage in cybersecurity engineering activities for the IAM program that may include POCs, designing, implementation and operationalization of new and current IGA, PAM, SSO & MFA technologies that improves Zayo's security posture.
ExpandApply NowActive JobUpdated Today
us security deployment jobs Company: Boeing
FEATURED BLOG POSTS
How to Call Out of Work
No matter how happy we are with our jobs, there are days when we feel overwhelmed and want to call out of work. No, don't feel guilty. It's expected because we're humans, and we can't control the uncertainties of life. But the problem lies in how to call out of work without seeming uncommitted to work, especially if you seldom get work-free days.
What is Seasonal Employment?
Depending on where you are in your career, you might have first-hand experience with seasonal employment. Seasonal employment can be a great way to expand your skill set and earn extra cash while helping businesses meet seasonal increases in demand.
How to Avoid a Bad Hire
"A new employee who doesn't meet the minimum performance, quality, and culture fit standards you set when you began sourcing and recruiting. Additionally, bad hires will immediately show signs of self-interest instead of an interest in their role and the company."
How to Ask for a Letter of Recommendation
When the job board you subscribe to finally posts your dream job, you may feel like the stars have aligned. But part of securing a position that matches your career plan is ensuring you address all the application basics. You know, the resume, the cover letter, the portfolio. It seems like you've got this in the bag — until you realize they want a letter of recommendation, too!
16 Tech Jobs You can Get Without a College Degree
You might think that if you don’t have a computer science, information technology, or related degree, then there’s absolutely no way you can break into the technology field and score a high-paying tech job. But this is a misconception. There are actually tons of tech jobs out there that don’t require a college degree. Instead, employers are more interested in the skills that you can offer. So, read on to learn more about how to land tech jobs without a degree.
What Are SMART Goals?
When it comes to achieving our goals, there’s a lot of noise to work through. A study by the University of Scranton has found that only 8% of people who set New Year’s resolutions actually achieve them. Our busy lives might be one reason for this. Another, even more important reason, is our approach to goal setting. Being too vague, too ambitious or simply unclear on the timeframe can set us up for failure.
In-House vs Outsourcing Recruiting: Which is Better?
When looking at in-house vs outsourcing recruiting, it is important to nail down the benefits for each and whether those benefits outweigh the risks that follow.