- UpvoteDownvoteShare Job
- Suggest Revision
Host-based Security System, Endpoint Security Suite (ESS), Splunk, Cribl, ACAS, and network. resolution for all client, server, storage, and network devices. -Experience installing, configuring, or maintaining devices, applications, and security tools.
Full-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Training in one or more of the following areas: Active Directory (AD), Adobe Creative Cloud (Feature Restricted License) BeyondTrust Remote Support, Firewalls, Group Policy, IP, ITILv3, LAN, MCSA or equivalent, Microsoft Azure Cloud, Network+, SCADA Systems, SCCM, Shell Scripting, SONAR, Splunk, Virtual Desktop, VPN, VSAT, WAN, Wi-Fi Networks, Windows DNS, Windows Server.
ExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
4+ years’ experience and technical knowledge in and direct experience with security engineering, secure architecture development, system and network security, authentication and security protocols, and/or applied cryptography.
$135,500 - $212,800 a yearFull-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with Azure Security and Identity services (e.g., Security Center, Azure Active Directory, RBAC, NSGs / ASGs)Experience with Azure Networking services (e.g., VNETs, Load Balancers, Front Door, ExpressRoute, Traffic Manager, Content Delivery Network)Basic knowledge of IT security regulations and standards such as ISO Experience managing/implementing Windows Server technologies (/ preferred), Active Directory and Group Policy management.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
As an Information System Security Manager (ISSM) for TCASS, your role is integral to the security and compliance of the organization's information systems, with a particular focus on Assured Compliance Assessment Solution (ACAS), the Risk Management Framework (RMF), and Security Technical Implementation Guide (STIG) tracking.
ExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
The candidate will leverage skills and expertise by determining system vulnerabilities, monitor and assess potential threats, and ensure a network meets security qualifications. Conduct Cyber hunt missions that include, but are not limited to, examining information systems, network devices, and endpoints for indicators of compromise and network activity via a plethora of network artifacts including but not limited to network flow, packet analysis, network device logs, etc.
Full-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
The fully integrated network is comprised of PIH Health Downey Hospital, PIH Health Good Samaritan Hospital, PIH Health Whittier Hospital, 37 outpatient medical office buildings, a multispecialty medical (physician) group, home healthcare services and hospice care, as well as heart, cancer, digestive health, orthopedics, women’s health, urgent care and emergency services.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
The IT Sr. Security Engineer (Firewall Focus) is part of the BJS IT Security Engineering and Operations team that is responsible for (including but not limited) to Firewalls, Remote Access, VPN, NAC and overall network security.
ExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Career possibilities for Network Architecture, Network Engineering, Cyber Security, and Industrial Control Systems. GSOC centrally operates a state-wide fiber optic network as well as highly secure datacenters with a focus on Georgia power grid operations.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Innova Solutions has an immediate DIRECT HIRE need for an IT Network & Security Engineer to work hybrid onsite in. IT Network & Security Engineer - Direct Hire/Hybrid Onsite.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
ACTS-Aviation Security Inc. has an immediate opening for an Airport Security Guard at the Charlotte Douglas International Airport in Charlotte, North Carolina. Must be able to pass a Security Threat Assessment as administered by the Transportation Security Administration.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Formulate systems and methodologies as well as respond to security related events and assist in remediation efforts of cyber security incidents (system and/or network breaches, malware attacks.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
We have an IMMEDIATE NEED for a Cyber Security / System Health Monitoring Tool Integration SME. In this role, you will be responsible for implementing and maintaining cyber security and system health monitoring devices for the customer’s information systems and networks protecting them from potential cyber-attacks.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Have working knowledge of enclave protection technologies to include Firewalls, Network IDS/IPS systems, Host Based IDS/IPS and Security Incident and Event Management (ArcSight SIEM). Must have solid working experience in designing secure network architectures, virtualization technologies, MySQL/MSSQL database platforms, identity and access management principles, application security, encryption technologies, DNS, web applications, ADFS, Nessus.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Certifications like Azure and AWS architects, network professional, Cisco/Palo Alto, ZScaler, etc., and Network & Security Certifications like CEH, CISSP, CCSP, CISA, CISM, etc. Security, Risk and Compliance - Advise customers on best practices around access management, network setup, regulatory compliance and related areas.
ExpandApply NowActive JobUpdated 3 months ago
network security jobs Title: information security architect Company: Various U S Employers
FEATURED BLOG POSTS
Why is Networking Important & How to Network Effectively
Even if you’ve worked hard to earn a degree from an impressive school, landing your dream job might still come down to who you know – otherwise known as networking. Lots of qualified candidates might apply for a job, but the person who gets it might very well be so-and-so’s sibling, friend, or kid. Sometimes the only way to get your foot in the door is to know someone.
Why Do Recruiters Ghost and What Can You Do About It?
Once you’ve finally mustered up the courage to find another job, leaning into the job hunt can feel scary and overwhelming. So, it does nothing to help your confidence when your outbox is full of unanswered follow-ups and interview requests. You thought that ghosting only happens on dating apps—so why do recruiters ghost, too? Recruiter ghosting is not an effective recruiting strategy, but sometimes it’s inevitable. How can you overcome such an unfortunate new career trend? Read on.
Internal Hiring Best Practices
Each companies hiring strategy is based on a set of rules that defines the ideal candidate. Many companies utilize internal and external hiring to ensure they have skilled, experienced workers. If you work in recruiting, maximizing your internal hiring strategies could be the key to retaining employees and simplifying your hiring process.
Why is it so Hard to Get a Job After College
For many, it was easy finding a job while in college. But after job hunting for weeks, you may wonder why it is so hard to get a job after college. After all, you’ve put a lot of time and effort into getting your degree. But don’t get discouraged. The University of Washington found that 53% of graduates are either unemployed or working a job that doesn’t require a degree. Other studies also show that landing your first job can take between 3 and 6 months. So, getting your first job takes time.
Why Leadership Is So Important in Your Career
There are plenty of baseball players worldwide, but only a select few will master the sport enough to play in the World Series. Similarly, you’ll meet hundreds of “managers” throughout your professional career. Still, only a few will cement themselves as true leaders in your mind. This is why leadership is important—the most influential leaders leave a mark. They inspire.
Making the Move to Salary Transparency
The salary transparency trend continues. Last year, Colorado passed its Equal Pay Transparency Rules, which required employers to include compensation in job postings, notify employees about promotional opportunities, and record job descriptions and wage records. Soon after, states like Washington, Nevada, Maryland, and Rhode Island followed suit.
Brand Reputation 101
People's initial perception of your organization is also known as your brand reputation. Your brand rep either encourages or discourages people from engaging with your company. This means the way people view your company will affect sales and even recruiting efforts.