- UpvoteDownvoteShare Job
- Suggest Revision
One or more of the following certifications, Certified Ethical Hacker (CEH)/ Certified Network Defense Architect (CNDA), Advanced Certified Ethical Hacker, Cyber Security Forensic Analysis (CSFA.
$64,000 - $128,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
BizFirst is assisting our client, a federal credit union committed to serving the local community, with the search for a Network Security professional. The selected candidate will lead the development and implementation of security policies, manage IT infrastructure security, handle incident responses, and provide strategic security consultancy.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Our not-for-profit network provides a full spectrum of care with leading-edge diagnostics and treatment, outpatient health centers, physician groups and clinics, numerous outreach programs, and hospice and home care, and even our own Providence High School.
$18.3 - $27.96 an hourFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Three years minimum experience developing and producing scripted narrative or unscripted reality show formatted television programming for cable and/or network level broadcast distribution. As required by the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act, the Mt. San Antonio Community College Annual Security Report is available here: Mt. SAC Annual Security Report.
$82.49 a dayExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Ideal candidates will have prior experience in roles such as Information Systems Security Manager (ISSM) or Information Systems Security Officer (ISSO), demonstrating a deep understanding of cyber security principles and practices.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Aircraft Cabin Agent is responsible for cleaning and conducting security searches on designated aircraft according to Company, Client, and Regulatory policies, specifications, and standards.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Candidates must be referred for selection to the Border Patrol Agent position before reaching their 40th birthday in accordance with Department of Homeland Security Directive 251-03. Duty Locations Locations are offered based on operational requirements, mission requirements, and critical agency hiring needs as determined by AMO. The duty location listed in a final offer letter may include any geographic location within the Southeast Border Region, Caribbean Air and Marine Branch (CAMB), Southwest Border Region, and National Air Security Operation Centers (NASOC) Unmanned Aircraft System (UAS) locations.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The fully integrated network is comprised of PIH Health Downey Hospital, PIH Health Good Samaritan Hospital, PIH Health Whittier Hospital, 37 outpatient medical office buildings, a multispecialty medical (physician) group, home healthcare services and hospice care, as well as heart, cancer, digestive health, orthopedics, women’s health, urgent care and emergency services.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Technical working knowledge of security tools and concepts including IDS/IPS; SIEM; Web Proxy; Encryption; Patch management; Vulnerability Scanning & Remediation; Forensics; Penetration Testing; DLP; Email Gateways; Anti-spam Services; MDM; Privileged Account Management; Log Analytics; Two Factor Authentication; Single Sign On.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This role must be well versed with the advanced engineering and administration of multiprotocol (BGP, EIGRP, OSPF, ISIS) routers, multilayer switches, network security devices and network management systems.
$45 - $55 an hourExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
A solid knowledge of Information Security practices, IP network, desktop and data security management. CISSP (Certified Information Systems Security Certified Professional), SSCP (Systems Security Certified Practitioner), CISA (Certified Information Systems Auditor), CISM (Certified Information Security Management), CCNA, CCNP, MSCE.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Plans, organizes and directs the administration of the college business office and various campus auxiliary and contracted services, including the bookstore, bursar operations, mail services, campus security operations, food services, and related administrative support services; develops and implements plans and policies to facilitate and improve administrative services operations and programs.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Expertise in security measures such as firewalls, intrusion detection, and prevention systems (IDS/IPS), enhanced authentication techniques (zero-trust), network access controls, and network segmentation.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
From Armed Security officers to Mailroom Service Clerks and Fire Fighters, from Field Investigators to Site Supervisors, we all stand united to maintain order in the most critical infrastructures of our nation.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Preferred Qualifications: Master’s degree or PhD in Civil Engineering Geotechnical California GE registration 15 years or more of experience 10 years or more of relevant experience with Dam projects including inspection, rehabilitation and/or new design and construction Working knowledge of relevant building code provisions Strong commitment to ensuring safe project execution Local travel required Excellent verbal and written communication skills Security clearance a bonus.
Full-timeExpandApply NowActive JobUpdated Today
network security jobs Title: network administrator Company: Teksystems Inc in Fullerton, CA
FEATURED BLOG POSTS
Why Cover Letters Are Important & How To Write One | Job\Searcher
Most people completely waste their cover letter real estate. Your cover letter is another opportunity to speak directly about how your background and capabilities align with the opportunity you seek. It also allows you to introduce your personality a bit more than a resume does. So, why are cover letters important? Because you can stand out, big time, with a custom cover letter directed to the right person.
Hiring Again After Mass Layoffs
It's never an easy decision to let members of your staff go, but depending on the state of your business, mass layoffs may have been the only way to survive. Now that you're months into the future, you may find yourself itching to start hiring again after previous layoffs.
Into the Heart of the Ukrainian-Russian Conflict
The story of our US-Ukraine connection started when Kevin met Dave. Days away from quitting his last "real" job as a seafood plant manager, Kevin reconnected with a long-lost friend from high school. Little did he know, this long-lost friend was dating his soon-to-be business partner. After meeting Dave through their mutual connection, it didn't take long for the two to start bouncing business ideas off each other. The flow of creativity soon grew into a business partnership that has withstood the test of time.
Why Are Internships Important & How Can You Get One?
Internships are for college students or people who have just completed their degree. If you are a student or recent grad, you may be wondering how to land an internship. If you've never had one, you may even wonder if you need one. After all, didn’t you work in that call center while also doing exams? Or perhaps you’ve bartended your first year in college?
Why is Networking Important & How to Network Effectively
Even if you’ve worked hard to earn a degree from an impressive school, landing your dream job might still come down to who you know – otherwise known as networking. Lots of qualified candidates might apply for a job, but the person who gets it might very well be so-and-so’s sibling, friend, or kid. Sometimes the only way to get your foot in the door is to know someone.
Why Do Recruiters Ghost and What Can You Do About It?
Once you’ve finally mustered up the courage to find another job, leaning into the job hunt can feel scary and overwhelming. So, it does nothing to help your confidence when your outbox is full of unanswered follow-ups and interview requests. You thought that ghosting only happens on dating apps—so why do recruiters ghost, too? Recruiter ghosting is not an effective recruiting strategy, but sometimes it’s inevitable. How can you overcome such an unfortunate new career trend? Read on.
Internal Hiring Best Practices
Each companies hiring strategy is based on a set of rules that defines the ideal candidate. Many companies utilize internal and external hiring to ensure they have skilled, experienced workers. If you work in recruiting, maximizing your internal hiring strategies could be the key to retaining employees and simplifying your hiring process.