- UpvoteDownvoteShare Job
- Suggest Revision
Review network and system logging standards for compliance with security frameworks for new projects. Our business reach spans satellite television service, live-streaming and on-demand programming, smart home installation services, mobile plans and products, and now we are building America’s First Smart Network.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with and advanced knowledge of cybersecurity technology domains including, SIEM, Network Security, Endpoint Security, Application Security, and Security Operations.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Security Certifications such as CompTIA Security+, Network+, etc. Join our growing security team and help build our business-enabling Detection & Response program at Ramp. This role will provide direct impact by driving security detection and response initiatives across Ramp. This will include a focus on the maturation of our security detection and alerting capabilities.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Department of Homeland Security (DHS), Network Operations Security Center (NOSC) Cyber is a US Government program responsible to prevent, identify, contain and eradicate cyber threats to DHS networks through monitoring, intrusion detection and protective security services to DHS information systems including local area networks/wide area networks (LAN/WAN), commercial Internet connection, public facing websites, wireless, mobile/cellular, cloud, security devices, servers and workstations.
$101,400 - $183,300 a yearFull-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Certification in network and/or security technologies (e.g., CCIE, CCNP, CISSP, etc.) Technical knowledge in networking (Cisco and non-Cisco) with an emphasis on software-defined networks (SDN) and leveraging spine & leaf designs, load balancing, firewalls, security design (intrusion detection and prevention), DNS, NTP, Network Tools & Management.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The fully integrated network is comprised of PIH Health Downey Hospital, PIH Health Good Samaritan Hospital, PIH Health Whittier Hospital, 37 outpatient medical office buildings, a multispecialty medical (physician) group, home healthcare services and hospice care, as well as heart, cancer, digestive health, orthopedics, women’s health, urgent care and emergency services.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Technical skills proficiency in the following areas: security information event management, network protocols (e.g. TCP/IP, UDP, IPSEC, HTTP, HTTPS, routing protocols), system administration, malware (propagation, infection, types), intermediate knowledge of network security controls and technologies (proxy, firewall, IDS/IPS, router/switch, open source information collection platforms), cryptography, Microsoft Active Directory.
$125,000 - $230,000 a yearFull-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Deliver advanced technical support, consultation and collaboration with the enterprise network, security and architecture teams including integration and dependencies with voice, video, security, compute and storage platforms including Cisco Nexus, Cisco Meraki Full stack (Firewall, switches and wireless controllers.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Help advance security operations technologies and processes through automation and integration of threat detection and protection solutions. Minimum of 3 years' experience working with Security Operations Centers (SOCs), Incident Response teams, Cyber Threat Intelligence functions, and other members of the cyber defense mission, and awareness of security threats and defensive strategies within the critical infrastructure, including techniques, tactics, and procedures (TTPs) that threat actors utilize to attack an organization.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Expert level knowledge and understanding of Networking Protocols & Technologies such as: Ethernet, BGP, EIGRP, OSPF, Cisco HW and SW (IOS/IOS-XR/NX-OS), Palo Alto Firewalls, Load Balancers, Security protocols, MPLS, QoS and IP Multicast.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience utilizing cutting-edge knowledge of computer hardware, software, and networks to conduct cybersecurity activities and tasks, including but not limited to: Wireshark NESSUS Tenable Network Security Monitoring Tools Encryption Tools Web Vulnerability Scanning Tools Penetration Testing Tools Network Intrusion Detection Tools Virus Scanning Tools Firewall Tools Managed detection services.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Usually exhibited by a person with six (6) or more years of experience at the IT Security Analyst level in relationship to systems and network security administration. Usually exhibited by a person with four (4) or more years of experience at the IT Security Analyst level in relationship to systems, network and user security administration.
ExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
At least one entry-level vendor certification (with non-entry-level preferred) in the Network Security arena (Palo Alto PCNSA/PCNSE preferred, Cisco CCNA/CCNP Security, Juniper JNCISEC/JNCIS-SEC, etc.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Work with the IT Department in the maturation and configuration of security controls including but not limited to antivirus, SIEM, IT/OT vulnerability management, and network security technologies.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The IT Spec II is responsible for monitoring and troubleshooting CDT's network security systems and implementing security controls. The IT Spec II performs risk assessments on emerging network security technologies and develops best practice solutions.
ExpandApply NowActive JobUpdated 8 days ago
network security jobs Title: network security consultant Company: National Security Agency
FEATURED BLOG POSTS
Why is Professionalism Important & How to Be Professional
You might have heard the word professionalism thrown around in the workplace, but do you know what it means? And do you know how to maintain professionalism no matter the circumstances?
Why Cover Letters Are Important & How To Write One | Job\Searcher
Most people completely waste their cover letter real estate. Your cover letter is another opportunity to speak directly about how your background and capabilities align with the opportunity you seek. It also allows you to introduce your personality a bit more than a resume does. So, why are cover letters important? Because you can stand out, big time, with a custom cover letter directed to the right person.
Hiring Again After Mass Layoffs
It's never an easy decision to let members of your staff go, but depending on the state of your business, mass layoffs may have been the only way to survive. Now that you're months into the future, you may find yourself itching to start hiring again after previous layoffs.
Into the Heart of the Ukrainian-Russian Conflict
The story of our US-Ukraine connection started when Kevin met Dave. Days away from quitting his last "real" job as a seafood plant manager, Kevin reconnected with a long-lost friend from high school. Little did he know, this long-lost friend was dating his soon-to-be business partner. After meeting Dave through their mutual connection, it didn't take long for the two to start bouncing business ideas off each other. The flow of creativity soon grew into a business partnership that has withstood the test of time.
Why Are Internships Important & How Can You Get One?
Internships are for college students or people who have just completed their degree. If you are a student or recent grad, you may be wondering how to land an internship. If you've never had one, you may even wonder if you need one. After all, didn’t you work in that call center while also doing exams? Or perhaps you’ve bartended your first year in college?
Why is Networking Important & How to Network Effectively
Even if you’ve worked hard to earn a degree from an impressive school, landing your dream job might still come down to who you know – otherwise known as networking. Lots of qualified candidates might apply for a job, but the person who gets it might very well be so-and-so’s sibling, friend, or kid. Sometimes the only way to get your foot in the door is to know someone.
Why Do Recruiters Ghost and What Can You Do About It?
Once you’ve finally mustered up the courage to find another job, leaning into the job hunt can feel scary and overwhelming. So, it does nothing to help your confidence when your outbox is full of unanswered follow-ups and interview requests. You thought that ghosting only happens on dating apps—so why do recruiters ghost, too? Recruiter ghosting is not an effective recruiting strategy, but sometimes it’s inevitable. How can you overcome such an unfortunate new career trend? Read on.