- UpvoteDownvoteShare Job
- Suggest Revision
The I.S. Security Engineer must have a basic understanding of design, implementation and operational experience with security technologies that includes, but is not limited to, IDS/IPS, Firewalls, Log Analysis, SIEM, Network Behavior Analysis tools, Antivirus, Identity Management and governance technologies, SSO and Federation technologies, RBAC and fine grained access control strategies, web application authentication processes, Network Packet Analyzers and basic malware analysis.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Demonstrated current and significant relationships with NIH, HHS or comparable civil government executives and mid-level managers, particularly in IT operations, network and security services.
$101,400 - $183,300 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Leidos Health Mission Solutions is seeking a Security Team Lead on a large network services opportunity supporting the National Institute of Health (NIH) in the Bethesda, MD area. Minimum of seven (7) years of Network Security experience.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Certified Palo Alto Networks Network Security Engineer (PCNSE) certification preferred. Monitor and analyze network traffic to identify and mitigate security threats using Palo Alto Networks firewall features such as Threat Prevention, URL Filtering, and WildFire.
Up to $100,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The company specializes in naval and maritime systems, ground combat mission command and network computing, global satellite communications and network infrastructure, avionics systems, and intelligence and security solutions.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Cyber Security Fundamentals (Familiarity with key concepts of Vulnerability Management, Network Security/Secure Transmission Management, Data Loss Prevention, Identity Access Management, Threat Intelligence, Penetration testing, IT Risk Management.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The contractor shall provide and perform a wide range of network administration/life cycle management tasks to support and sustain IT networks as directed by the Government IT Lead. The environment includes Cisco Nexus, Cisco Catalyst and NetGear switches, Type I encryption devices, servers, workstations, and peripheral devices.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with any of the following: ConnectWise, IT Glue, SolarWinds, WatchGuard, Ruckus, Veeam, Cisco Networking Products, Extreme Network Products, Ubiquiti, VMWare, Dell, Axix, 3OX and Adobe.
$42,000 - $48,000ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Client - Privacy and Security Office (PSO) requiring services of an IT Security Specialist to aid county offices in the identification of gaps through risk management, and assist in the development of mitigation strategies, and to establish the target security/infrastructure architecture.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
It would include working with all aspects of the BSD environment including the SCADA network and radio maintenance teams to ensure compliance to all mandates from the FTA, Homeland Security Department, and any other governing body Bi-State must adhere to.
$75,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience working in a large enterprise and management of a wide range of security tools such as IDS/IPS (network and host), advanced anti-malware (network and endpoint), DLP, encryption, antivirus, firewalls, identity management, NAC, etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
In addition, it may also include engineering hardware and/or software, programming, computer/network security, Computer/networking engineering and/or analysis, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Implement and enforce the agency's policies and procedures in network and infrastructure management, auditing, inspection, security, disaster recovery, encryption and compliance. Ensuring the rigorous application of information security/information assurance policies, principles, and practices in the delivery of network services.
$55 an hourFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Similar searchable job titles:· Senior Cybersecurity Analyst· Information Security Manager· Network Security Engineer· Security Operations Center (SOC) Lead· IT Security ArchitectKeywords:· Cybersecurity· Information Security· Network Security· Senior· Specialist IV Legal Disclaimer: Cherokee Federal is an equal opportunity employer.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Familiar with more advanced network concepts (e.g. LDAP, VPN, Network Firewalls, IDs, IPS, SIEM, Cloud network and security, ACL, and OSI Model. Supports IT Infrastructure and performs day-to-day operations on the campus network in support of Information Technology Network Services.
ExpandApply NowActive JobUpdated Today
network security it jobs Title: engineer security Company: Clientsolv
FEATURED BLOG POSTS
Why Are Internships Important & How Can You Get One?
Internships are for college students or people who have just completed their degree. If you are a student or recent grad, you may be wondering how to land an internship. If you've never had one, you may even wonder if you need one. After all, didn’t you work in that call center while also doing exams? Or perhaps you’ve bartended your first year in college?
Why is Networking Important & How to Network Effectively
Even if you’ve worked hard to earn a degree from an impressive school, landing your dream job might still come down to who you know – otherwise known as networking. Lots of qualified candidates might apply for a job, but the person who gets it might very well be so-and-so’s sibling, friend, or kid. Sometimes the only way to get your foot in the door is to know someone.
Why Do Recruiters Ghost and What Can You Do About It?
Once you’ve finally mustered up the courage to find another job, leaning into the job hunt can feel scary and overwhelming. So, it does nothing to help your confidence when your outbox is full of unanswered follow-ups and interview requests. You thought that ghosting only happens on dating apps—so why do recruiters ghost, too? Recruiter ghosting is not an effective recruiting strategy, but sometimes it’s inevitable. How can you overcome such an unfortunate new career trend? Read on.
Internal Hiring Best Practices
Each companies hiring strategy is based on a set of rules that defines the ideal candidate. Many companies utilize internal and external hiring to ensure they have skilled, experienced workers. If you work in recruiting, maximizing your internal hiring strategies could be the key to retaining employees and simplifying your hiring process.
Why is it so Hard to Get a Job After College
For many, it was easy finding a job while in college. But after job hunting for weeks, you may wonder why it is so hard to get a job after college. After all, you’ve put a lot of time and effort into getting your degree. But don’t get discouraged. The University of Washington found that 53% of graduates are either unemployed or working a job that doesn’t require a degree. Other studies also show that landing your first job can take between 3 and 6 months. So, getting your first job takes time.
Why Leadership Is So Important in Your Career
There are plenty of baseball players worldwide, but only a select few will master the sport enough to play in the World Series. Similarly, you’ll meet hundreds of “managers” throughout your professional career. Still, only a few will cement themselves as true leaders in your mind. This is why leadership is important—the most influential leaders leave a mark. They inspire.
Making the Move to Salary Transparency
The salary transparency trend continues. Last year, Colorado passed its Equal Pay Transparency Rules, which required employers to include compensation in job postings, notify employees about promotional opportunities, and record job descriptions and wage records. Soon after, states like Washington, Nevada, Maryland, and Rhode Island followed suit.