- UpvoteDownvoteShare Job
- Suggest Revision
Provides security expertise in Federal Information Security Management Act (FISMA), Office of Management and Budget (OMB), National Institute of Standards and Technology (NIST) and federal government requirements to support IT Security and Privacy compliance.
Full-timeExpandApply NowActive JobUpdated 24 days ago - UpvoteDownvoteShare Job
- Suggest Revision
One or more certifications in Information Security Architecture, (e.g., Zachman, TOGAF, Information Technology (IT) service Management [ITSM]) Provides architectural strategy and subject matter expertise in a broad range of IT security disciplines, including network security, data protection, malware defenses, security analytics, identity and access management, compliance, endpoint and mobile security, third-party software-as-a-service integration, infrastructure as a service, cloud, and secure coding lifecycle.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Reporting directly to the Director of Information Technology, the IT Desktop Support Specialist has overall responsibility for supporting Cremer's network, server infrastructure, desktop support and cyber security program.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
They have also contributed their expertise to other vital national defense programs and technologies that involve survivability, cybersecurity, information technology/management, software engineering, unmanned aerial systems (UASs), and metrology/reverse engineering.
$90,000 - $100,000 a yearFull-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Maintain the company’s on-premise datacenter and IT infrastructure, which includes but is not limited to, Windows and Linux servers both physical and virtual, switch and routing systems, ethernet, fiber, wireless access points, and IP security cameras.
Full-timeExpandApply NowActive JobUpdated 21 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Since its founding in 1989, IMC has offered solutions and expertise in: IT operations and maintenance, data management, cyber security, systems and network engineering and administration, cloud/hosting services, software development, website services, software quality assurance and testing (including IV&V), and project management.
ExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Principles and methods of computer networking; Advanced installation, administration and maintenance of enterprise network device and Windows Server operating systems; Microsoft Cloud technologies (Office 365, Azure); Linux in an enterprise environment; database systems, web technologies, security standards, and technical project management processes.
Part-timeExpandApply NowActive JobUpdated 25 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Headquartered in Hawaii, Galapagos Federal Systems, LLC is an SBA Certified Native Hawaiian Organization 8(a) Small Business specializing in global information technology and offering professional solutions in IT Design & Installation, Cybersecurity Engineering & Support, Application Integration & Development, Software & Hardware Engineering, Network & Systems Management, Information Systems Security, and Business Management Services.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
IT technical certification such as Microsoft 365 Certified: Administrator Expert; Microsoft Certified: Azure Fundamentals; Microsoft Certified: Security, Compliance, and Identity Fundamentals; Microsoft Technology Associate (MTA); Certified Information Systems Security Professional (CISSP); CompTIA A+, etc.
Full-timeExpandApply NowActive JobUpdated 25 days ago - UpvoteDownvoteShare Job
- Suggest Revision
We are looking for adjunct faculty who can teach Graduate and Undergraduate courses in Information Systems and Technology (General IT, Software Development/Programming/Software Engineering Management, Data Management/Cloud Administration/Database, IT Project Management/Information Systems Management, Networking/Network Administration/Enterprise Network Management, Cybersecurity/Information Assurance/IT Security/Computer Security or Forensic Management.
Part-timeExpandApply NowActive JobUpdated 25 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Performs configuration, implementation, monitoring, problem resolution, and maintenance of firewalls, routers, switches, access points, network access control (NAC), Network Management Systems (NMS), Intrusion Detection Systems / Intrusion Prevention System (IDS/IPS), Virtual Private Networks (VPN’s), and security information and event management (SIEM) system.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
A Technology Certificate from an accredited college or trade school in information technology, computer and information research science, computer engineering, computer information systems, network architecture, network and computer systems administration, telecommunications administrations, electronic engineering technology, technology project management or closely related field AND eight years of experience in any two of the focus areas; OR.
Full-timeExpandApply NowActive JobUpdated 30 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Bachelor's degree from an accredited college or university in Computer and Information Science, Computer Engineering, Computer Systems Analysis, Information Cybersecurity and five (5) years of progressive information security experience across various information security/information technology risk management domains such as but not limited to application security, infrastructure security, identity, and access management, vulnerability and cyber threat management, security architecture, etc.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Research information technology best practices and recommend changes to the Director IT Infrastructure and the VP Information Security. Work closely with the Director IT Infrastructure and the VP Information Security to ensure the compliance of key information systems to the Information Security Program and applicable industry regulation.
Full-timeExpandApply NowActive JobUpdated 25 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience utilizing Security Information and Event Management (SIEM) systems, Endpoint Detection and Response (EDR), threat intelligence platforms, security automation and orchestration solutions, data loss prevention (DLP) and other network and system monitoring tools.
Full-timeExpandApply NowActive JobUpdated 30 days ago
network security it information technology systems management jobs Title: engineer Company: Galapagos Federal Systems Llc
FEATURED BLOG POSTS
5 Common Interview Mistakes
Everyone's interview process is unique in some form or fashion. Like most, your interview process is crafted so you can get the most information out of your candidates to increase hiring confidence and make the right hiring decisions. However, there are often small problems in interview processes that could ultimately affect the success of hiring decisions.
Structured vs Unstructured Interviews
The goal of an interview is to evaluate candidates based on their skills, personality, and knowledge. You want to choose the BEST candidate from your candidate pool, so the interview is something you can't mess up. As you begin planning your interview process, one of the major decisions you'll face is whether the interview should be a structured vs unstructured interview. So let's take a dive into the differences and sort out which circumstances warrant which interview process.
How to Describe Your Personality with Examples
Imagine you’re in an elevator with the CEO of your dream company and you get to talking. The conversation is going well and you start to imagine yourself working for their company when the CEO turns around and asks you “tell me a bit about yourself.” Would this catch you off guard or would you be able to give a clear and succinct description of who you are?
4 Ways to Make Your Job Posting More Inclusive
According to a Glassdoor survey,
How to Calculate Net Income
Understanding your finances can be daunting even if you’re good with numbers. Your net income, in particular, is a key metric for determining how well you’re doing financially and whether your current way of operating is sustainable or not.
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra:
6 Best Ways to End a Cover Letter with Examples
Including a cover letter with your resume is a great way to introduce yourself to the hiring manager, tell them why you’re the ideal fit for the role, and provide context about your personal situation. A strong cover letter will give you an advantage over other applicants. But it’s important that you structure it properly and write it powerfully so that it carries an impact. This article will discuss how to end a cover letter effectively so you catch the eye of a hiring manager and increase your odds of landing an interview. Read on to learn more.