- UpvoteDownvoteShare Job
- Suggest Revision
Cyber Security Fundamentals (Familiarity with key concepts of Vulnerability Management, Network Security/Secure Transmission Management, Data Loss Prevention, Identity Access Management, Threat Intelligence, Penetration testing, IT Risk Management.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Expertise in data center, network, store technology, and mobility platforms, encompassing cloud, hybrid, and edge computing, network architecture, security, and mobile device management.
Full-timeExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Five (5) years of experience in security, systems engineering or system assessment, including recent experience within the last three (3) years in the following areas: Cybersecurity principles and technology, including access/control, authorization, identification and authentication, PKI, network and enterprise security architecture is required.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Partner with the Global Threat & Travel Security Lead on threat management, travel security, and protective intelligence purposes with the goal of supporting the safety and security of our people, assets, and reputation.
$52,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Job Title/High Level Position Summary:Senior Information Security Engineer – SOX Compliance Lead is responsible for the planning, design and build of security architectures; oversees the implementation of network and computer security and ensures compliance with corporate cybersecurity policies and procedures.
Full-timeRemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
IAT Level II Certification (CompTIA Security+ CE, CCNA Security Training, CySA+, GICSP, GSEC) equivalent or higher. Experience in information technology that includes areas such as desktop hardware, operating systems, office productivity software, computer networking-Local Area Network (LAN) /Wide Area Network (WAN), servers, SharePoint, virtual machines, and video teleconferencing.
Up to $89,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Responsibilities include performing risk assessments of the bank’s network, applications, and endpoint activity, propose adjustments to network topology and implementation of security controls or tools to mitigate cyber risk, ensuring that the Bank’s network and data are secure in accordance with Bank, IT, and IS Policies.
$140,000 - $160,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Proficient working with the following software: Microsoft Windows Server, Microsoft Active Directory Services, Domain Name System (DNS), BitLocker, Microsoft Windows Enterprise, Microsoft Office, Jetico BC Wipe Possess and maintain one of the following certifications: CGRC/CAP, CASP+, CCSP, Cloud+, SSCP, Security+, or GSEC. Minimum of one year of direct professional experience with DoD JSIG RMF and network management security requirements.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Certifications: Desired by not required: Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA), Certified in Risk and Information Systems Control (CRISC), CompTIA Security + or Network +, Project Management Professional (PMP), or other similar credentials.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
3 years of experience performing network and application security penetration testing and/or threat assessments. Develop security architecture strategies for the organization with the emphasis on application security, network security and identity and access management concerns.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Responsibilities:Perform regular vulnerability assessments and scanning of network, systems, and applications on both on premise and cloud environment to identify security weaknesses and potential threats using Tenable Nessus.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
You earned and maintain at least one of the following certifications:CSSP AnalystCSSP Incident ResponderGIAC Certified Intrusion Analyst (GCIA) GIAC Network Forensic Analyst (GFNA)GIAC Certified Incident Handler (GCIH)Certified Ethical Hacker (CEH) Sys Admin, Audit, Network and Security (SANS) What we do:The Department of Homeland Security (DHS) is dedicated to responding to cyber incidents and hunting proactively for malicious cyber activity.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Dynamic Routing Protocols like BGP, OSPF, EIGRP Strong knowledge in various network security technologies such as Firewall, IPS, AV, Micro-segmentation, Zero-Day attack, Cloud security group management, MFA (Multi Factor Authentication.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with security engineering concepts and practices including system and network security, authentication, protocols, cryptography, DB and application security in regulated environments (PCI-DSS, PII, GDPR, and CCPA Standards and Policies.
$112,000 - $197,000 a yearFull-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Works with highly matrixed team of IS personnel to support enterprise architecture and information security operations including, but not limited to, architecture and InfoSec principles around identity & access management models, cloud identify management providers, security information and event monitoring, and data loss prevention, perimeter (e.g. firewalls, IPS, web filtering), cloud and virtualization environments and network security (host-based firewalls, anti-virus, disk encryption.
ExpandApply NowActive JobUpdated Today
network security jobs Title: specialist Company: Conexess Group
FEATURED BLOG POSTS
Tightening the HR budget in 2023
With the state of the economy still uncertain, 2023 is expected to be approached with much anticipation. Human Resource leaders have many concerns, including how they will manage to accomplish their goals with budget belts already getting snug. Let’s look at some of the factors that the new year is projected to bring for HR and how to prioritize budgets to reach human capital objectives.
A Comprehensive Guide to Becoming a Better Conversationalist
Have you ever stood awkwardly next to someone at a party because you didn’t know what to say to them? How about at a networking event or on a first date? You're not alone if you’ve ever experienced this uncomfortable silence. Many people struggle to master the art of being a great conversationalist.
Why is Non-Verbal Communication Really Important?
In a world where words and phrases rule daily communication, you may wonder why non-verbal communication is important. Whether you realize it or not, you communicate more with nonverbal actions than you do with verbal communication. When you interact with your peers, people are reading your body language, facial expressions, voice, and many other factors that help fill in blanks that words can't fill.
Making Hybrid Work More Efficient
Covid was a catalyst for change in the work environment. Keeping people safe and helathy was the initial goal for employers, but the unintended result was the considerable demand in remote work. Now, onsite work has been dramatically altered to remote work, which is now transforming into a combination of the two: hybrid work.
How Can HR Technology Help Retain Employees?
Human resources' rapid adoption of technology has led to new ways of streamlining human capital management. Based on the IEE Global Study, these technologies changed how HR handled recruitment and retention in 2022. This includes tech like
Why is Time Management Important? 10 Crucial Importances of Time Management
We’ve all been there before. What starts as a relaxing evening scroll quickly becomes a full-blown binge. You blink, and it’s midnight - throwing off your entire next day before it even starts. And at its worst, this indulgence might leave you feeling behind on things you planned to finish that night. This is why time management is important.
Minimizing Candidate Renegs During the Hiring and Onboarding Process
Candidates reneging on job offers or during the onboarding process can be a frustrating experience for any recruiter. In a talent-driven job market, it’s common for candidates to have more than one job offer to consider. It becomes a race against time to see which organization can offer the best career experience, compensation, and circumstances that secure the right employees.