- UpvoteDownvoteShare Job
- Suggest Revision
This role is ideal for a proactive, detail-oriented network security professional with a passion for the Zero Trust model. This position demands an individual with extensive experience in network security, cloud technologies, and Zero Trust principles.
$150ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Understanding of Zero Trust IT security model such as Zscaler and Palo Alto Networks Prisma access solutions. You will be an important member of the Corporate Engineering team to build a scalable network infrastructure while building automation and meeting security and compliance needs.
$70 - $80 an hourExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Establish IT security standards for network infrastructure, applications, servers, data, desktops/laptops/tablets and mobile devices. The Executive Director, Cyber Security and IT Risk Management is responsible for the security of the District's information technology resources, digital assets, user identity, and data privacy.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Stantec, is looking for an Information & Communications Technology Design Engineer specializing in Building Technology Systems with specific experience in Physical Security design. Work consists of the design of access control, video surveillance, detection, alarms, structured cabling, network systems, wireless, CATV, and other technology systems.
$88,000 - $100,800 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
IT - Sr. Cloud Security Engineer. A formal education in Information Technology, or equivalent experience in IT Security related roles is required for this position. As a Senior Cloud Security Engineer, you will play a key role in the on-going configuration and management of our Microsoft Azure Cloud security suite specifically Microsoft Defender for Cloud Apps, Azure Sentinel SIEM, Defender for Endpoint, and Defender Vulnerability Management.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
You'll be responsible for the management of our IT security systems and applications, incident response, digital forensics, loss prevention, and eDiscovery actions, conducting risk and vulnerability assessments, and developing and implementing security controls.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As an IT Support Specialist at Moveworks, youll unlock opportunities to unlock growth across the company with an eye on security. Ability to independently perform basic problem determination and root cause analysis regarding network, access, and general IT issues.
$150ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Experience with IT and/or network and system security administration, including operating system security configuration and account management best practices for UNIX, MS Windows, Red Hat Enterprise Linux, and CISCO systems.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Security Incident Response - Serve as a liaison between security functions and business units involved in incidents and conduct technical investigations in response to security-related events, partnering with the incident response team to identify root causes, vulnerabilities or non-compliance Minimum Qualifications- 2+ years of IT risk and security controls experience with knowledge of and experience with IT and security control frameworks.
$93,860 - $139,080 a yearExpandApply NowActive JobUpdated 18 days ago - UpvoteDownvoteShare Job
- Suggest Revision
In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
In-depth experience of vulnerabilities, intrusion detection systems, firewall management, network vulnerability analysis, cryptographic theory and practice, incident analysis and response, software testing and security assessment, malicious code and software exploitation techniques, continuous monitoring and event logging, cyber-crimes, computer forensics analysis and computer crime investigation.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Services include Network and System Modernization, Cyber Defensive Operations, Defensive Cyber Assessments, Defensive Cyber Infrastructure Support, Threat & Data Analytics, DoDIN Operation Support, Network Management, Systems Management, IT Lifecycle Management, IT Service Management (ITSM), Portfolio/IT Investment Management, and Theater Operations and Service Desk support.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Excellent communication (written and oral) and leadership skills YOU BRING (EXPERIENCE & QUALIFICATIONS) Preferred certification in one or more Information Security relevant areas such as, Security Professional (CISSP), Cloud Security (CCSP, CCSK) Minimum of 8 years of information security experience, with a strong background in cloud native infrastructure, network security, security applications and technologies.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Minimum of 3 years of experience in Security Engineering of DoD Network Infrastructure, Wireless Technologies (Mobile Internet of Things (IoTs), Endpoint Security, Network protocols, COMSEC and Public Key Infrastructure (PKI.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This includes, but is not limited to, Business Continuity Planning, IT Risk Assessment, Incident Response, Third Party Risk Management, and Security Awareness Training programs. Oversees the IT Risk Management program, providing program administration and maintenance to the Business Continuity Plan, IT Risk Assessment, Incident Response, Third Party Risk, and Security Awareness Training programs.
Full-timeExpandApply NowActive JobUpdated Today
network security it jobs Title: engineer network security Company: Teleworld Solutions Inc
FEATURED BLOG POSTS
How to Ask for a Letter of Recommendation
When the job board you subscribe to finally posts your dream job, you may feel like the stars have aligned. But part of securing a position that matches your career plan is ensuring you address all the application basics. You know, the resume, the cover letter, the portfolio. It seems like you've got this in the bag — until you realize they want a letter of recommendation, too!
What Are SMART Goals?
When it comes to achieving our goals, there’s a lot of noise to work through. A study by the University of Scranton has found that only 8% of people who set New Year’s resolutions actually achieve them. Our busy lives might be one reason for this. Another, even more important reason, is our approach to goal setting. Being too vague, too ambitious or simply unclear on the timeframe can set us up for failure.
In-House vs Outsourcing Recruiting: Which is Better?
When looking at in-house vs outsourcing recruiting, it is important to nail down the benefits for each and whether those benefits outweigh the risks that follow.
How to Conduct a Performance Review (With Examples)
In a world where the smallest mistake can cost your business tens of thousands in lost revenue, your talent is key to keeping your edge on the market and driving growth. However, managing a workforce of any size can be a challenge. Employees come with their own particular skill set, ambitions and flaws. So, it can be difficult to uncover their individual drivers. Not to mention the challenges brought on by the hybrid and remote working models where in-person interactions have become few and far between.
How to Recruit Passive Candidates
Learning to recruit passive candidates is a different ballgame than recruiting active ones. While an active candidate is someone who is currently looking for a new job, a passive candidate tends to be the opposite. Passive candidates are either already working or not looking to work. So, instead of these candidates coming to you, you'll have to find them and reach out to them first.
How to Effectively Recruit Employees
Today, hiring and retaining talent looks much different than it did only two or three years ago. Financial instability and the strain on our mental health brought on by the pandemic has made everyone more wary and selective of their workplace and employer. Whereas in the past people might have prioritized promotions and financial reward, today they look at other factors such as workplace flexibility, personal fulfillment and values alignment.
How Many Hours is Part-Time vs. Full-Time Work?
Growing up you watched your parents shuffle to and from the office, held hostage to their 9 to 5. If jammed-packed schedules and deadlines sound frightening, you might consider pivoting your search to part-time jobs. In fact, even employers have shifted their preference, selecting more people open to the idea of flexible working hours.