- UpvoteDownvoteShare Job
- Suggest Revision
Work consists of the design of access control, video surveillance, detection, alarms, structured cabling, network systems, wireless, CATV, and other technology systems. Familiarity with network, wireless, CATV, nurse call and audiovisual design considerations.
$88,000 - $100,800 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
We'll Trust You To: Work the weekend shift (Friday-Monday) and provide support, maintenance, and hands-on troubleshooting of our global network using proprietary and third-party platforms, from a variety of vendors (, Juniper, Cisco, Arista, and Nokia.
$120,000 - $140,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
At least one year of full-time work experience in security work, aviation screener work, or X-ray technician work. Providing frontline security protection of air travelers, airports and airplanes.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
If Private Security background, experience in Close Protection. Assigned to Military Protective Security Operations Units; specifically, Air Force OSI, Army CID, Marine Corps CID, or Navy NCIS.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Deputy Director, Network Strategies ensures that the GARE network works with racial equity practitioners to foster a culture and supportive infrastructure for sharing knowledge, building strong leaders, effective strategies and tools to build the momentum and power of a national movement of racial equity practitioners who are committed to transforming government to create a racially just and equitable society.
$115,106 - $130,208 a yearExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Safety programs will include security, everyday safety, emergency preparedness and drills, ergonomics for employees, visitors, and volunteers. Develop and execute network disaster preparedness program.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Ultimately, the outstanding armed security officers will seek to expand their self-defense and weapons training beyond the mandatory level. Armed Security Guard Responsibilities. To be successful as an Armed Security Officer, you should be able to exercise discretion regarding the use of your weapon.
$28Full-timeExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The CISO, reporting into the CTO, will lead our security organization that is responsible for our product security operations, securing the technology and products, and supporting corporate development, sales, compliance, and IT teams.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The explosion of the cloud, hybrid work, and the ever-growing threat landscape are rapidly changing the security paradigm for IT and security professionals alike. You are a thought leader, a partner to the product management team, and an ally to our customers, advocating on their behalf - and always looking for scalable solutions to their most challenging security problems.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Certifications in network security, such as CISSP, CISM, CISA, OSCP, or GSEC is highly desirable. Strong understanding of network security concepts and technologies, such as firewalls, intrusion detection systems, intrusion prevention systems, and encryption.
$149,000 - $166,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Develop and maintain documentation related to third-party risk management and customer security responses. Proven experience in third-party risk management and customer-facing security roles.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with security technologies such as VPNs, SIEM, IDS/IPS, firewalls, and vulnerability management tools. Perplexity is seeking an experienced Cloud Security Engineer. Understanding of application security principles and secure coding practices.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Government-Related: Criminal Justice/Criminology; Diplomacy/International Policy, Affairs, or Relations; National/Homeland Security; Forensics; Government/History; Intelligence Analysis; Law/Legal Studies; Political Science; Public Management; Public Policy; Security Policy.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Industry certifications such as ITIL, CompTIA Security+, or Cisco Certified Network Associate (CCNA) are desirable. Strong technical background with expertise in systems administration, network management, and IT security.
ExpandApply NowActive JobUpdated Today
network security jobs Title: manager Company: Anthem in Oakland, CA
FEATURED BLOG POSTS
5 Common Interview Mistakes
Everyone's interview process is unique in some form or fashion. Like most, your interview process is crafted so you can get the most information out of your candidates to increase hiring confidence and make the right hiring decisions. However, there are often small problems in interview processes that could ultimately affect the success of hiring decisions.
Structured vs Unstructured Interviews
The goal of an interview is to evaluate candidates based on their skills, personality, and knowledge. You want to choose the BEST candidate from your candidate pool, so the interview is something you can't mess up. As you begin planning your interview process, one of the major decisions you'll face is whether the interview should be a structured vs unstructured interview. So let's take a dive into the differences and sort out which circumstances warrant which interview process.
How to Describe Your Personality with Examples
Imagine you’re in an elevator with the CEO of your dream company and you get to talking. The conversation is going well and you start to imagine yourself working for their company when the CEO turns around and asks you “tell me a bit about yourself.” Would this catch you off guard or would you be able to give a clear and succinct description of who you are?
4 Ways to Make Your Job Posting More Inclusive
According to a Glassdoor survey,
How to Calculate Net Income
Understanding your finances can be daunting even if you’re good with numbers. Your net income, in particular, is a key metric for determining how well you’re doing financially and whether your current way of operating is sustainable or not.
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra:
6 Best Ways to End a Cover Letter with Examples
Including a cover letter with your resume is a great way to introduce yourself to the hiring manager, tell them why you’re the ideal fit for the role, and provide context about your personal situation. A strong cover letter will give you an advantage over other applicants. But it’s important that you structure it properly and write it powerfully so that it carries an impact. This article will discuss how to end a cover letter effectively so you catch the eye of a hiring manager and increase your odds of landing an interview. Read on to learn more.