- UpvoteDownvoteShare Job
- Suggest Revision
Transform technology into opportunity as a Network Support Technician - Intermediate with GDIT. A career in enterprise IT means connecting and enhancing the systems that matter most.
$25.29 - $42.24 an hourFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Information Systems and Technology unit of Advancement Services oversees the Advance system database operation for UC Santa Barbara. Working in conjunction with the divisional partners, including Gifts Administration and Prospect Services, Information Systems and Technology team provides full support for external relations and development.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
At least 2 years of experience in information technology (operations, software delivery, access management, microservices), information security (application security, network security, cyber security, data protection), information systems risk management, information systems auditing, or a combination.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
At least 4 years of experience in information technology (operations, software delivery, access management, microservices), information security (application security, network security, cyber security, data protection), information systems risk management, information systems auditing, or a combination.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Certifications related to or pursuing certification related to Cloud, Cyber or Technology Operations, such as Cloud provider certifications, Certified Information Systems Security Professional (CISSP), or Certified Information Security Manager (CISM.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Bachelor’s degree (preferably in IT, Cyber Security, Computer Science, Information Systems Management, Engineering, or similar field of study) or a Master's degree.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Strong analytical and troubleshooting skills - CEH, GCIH, or relevant IT technology certification - Examples of other certifications include: - CERT Certified Computer Security Incident Handler - ECC CEH (Electronic Commerce Council Certified Ethical Hacker) - GCIH (GIAC Certified Incident Handler) - GISF (GIAC Information Security Fundamentals) - CISSP (ISC2 Certified Information System Security Professional) - Additional certifications at an equivalent may also be considered.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Bachelor’s degree in computer science, Engineering, Information Technology, Cybersecurity, or a related field with 12+ years of prior relevant experience. (ISC)² Certified Information Systems Security Professional (CISSP) Certification or equivalent certification.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint.
$101,915 - $137,885 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Master's degree in computer science, computer information systems, computer information technology, computer engineering, or computer-based information systems or related field(s.
Part-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Services include ensuring compliance and accreditation with DoD collateral and multi-agency SCI/SAP regulations through execution of the Information Systems Security Manager (ISSM), compliance support and IT audit functions.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Finally, the AVC of Research Computing will participate in IT Governance structures such as the Research Computing and Data Infrastructure Committee, the IT Systems and Data Governance Committee, the Academic Senate's Committees on Information Technology and Research, and the University of California system-wide IT committees, such as the Research IT Committee.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Computer Repairs, Help Desk Support, Information Technology (IT), Remote Support, Troubleshooting Hardware. Transform technology into opportunity as an Information Technology Support Specialist with GDIT. A career in enterprise IT means connecting and enhancing the systems that matter most.
$28.69 - $38.81 an hourFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
One or more of the following domains: secure IT operations, data security, incident response, security engineering, network security, systems security, or vulnerability management.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
GDIT is looking for Network Computer Support Technician at McChord Air Force Base in Tacoma, Washington area, who hold active DOD Secret Clearance. Administer network/cyber security policies and procedures.
Full-timeExpandApply NowActive JobUpdated Today
network security it information technology systems computer science jobs Title: engineer Company: Nr Consulting
FEATURED BLOG POSTS
10 Practical and Effective Strategies to Persuade Anyone of Anything
Learning how to persuade people is like a key that can unlock any door. Acing the interview for the job of your dreams. Getting the best deal on a new car. Closing a sale with a skeptical customer. All of these wins require a level of persuasiveness.
The Effects of Workplace Racism and Sexism
One day it's a covert statement to a mother returning to work after maternity leave. Another day it's a lingering gaze at an employee enjoying a culturally rich meal. These microaggressions (or sometimes macroaggressions) can take an employee from a confident, high-performer to one that feels insecure being themselves at work. Your employees engage with people with different ideas and feel most comfortable and valued when they can work without losing their cultural, racial, and gender identity. While most employers know this, why have workplace racism and sexism often been neglected?
When Rage Applying Strikes: How to Identify Unserious Candidates
As the job market remains highly competitive, we have seen a surge in "rage applying." This is when candidates apply to multiple jobs, often without considering whether they are truly interested in the role. Rage applying goes hand-in-hand with quiet quitting. Often, employees want to entertain the thoughts and feelings of leaving their job, but they aren't necessarily serious about leaving yet. Meanwhile, other employees engaging in this trend are actually trying to find a better role. As a recruiter, it can be hard to identify who are the real applicants in a sea full of quiet quitters, but understanding rage applying and identifying red flags will certainly help.
How to Increase Job Ad Exposure
In today's competitive job market, writing quality job ads is critical for attracting top talent to your organization. While networking and candidate referrals are prime real estate for finding qualified candidates, nothing beats the tried-and-true method of writing an extraordinary job ad. But while writing a great job ad is the first step, what's more important is increasing visibility. You could have the most detailed, well-written ad on the internet, but if no one sees it, then you are wasting time (and potentially money!). Employers often believe that job boards are the root of the problem, but you can learn how to increase job ad exposure by tweaking a few steps of your recruitment process.
How to Navigate Hiring Out of State
The job market has shifted significantly in recent years. The accelerated adoption of technology has not only pushed many companies into remote working arrangements but also increased the availability of supporting tools and technologies (i.e., video conferencing and collaboration software).
Building a Candidate Pipeline Through Internships
Building a candidate pipeline through a great internship program for local college students and recent graduates at local universities is a great and cost-effective way to attract and retain top talent. By offering meaningful and impactful work experiences, regular feedback, coaching, and mentorship, you can create a positive internship experience that will make your organization a sought-after destination for future employees. This not only benefits the organization in the short-term but also in the long-term, as you'll have a pool of well-trained and experienced candidates who may be interested in full-time employment once they graduate. Furthermore, building relationships with local universities and college students can increase brand awareness and build a positive reputation for your organization in the local community.
Hiring Transparency
Transparency in hiring refers to the open and honest communication and information sharing that takes place between employers and job candidates. It encompasses all aspects of the hiring process, from posting job descriptions to providing feedback on performance during and after the interview process. In today's job market, hiring transparency has become increasingly important for both employers and candidates alike.