- UpvoteDownvoteShare Job
- Suggest Revision
We are looking for adjunct faculty who can teach Graduate and Undergraduate courses in Information Systems and Technology (General IT, Software Development/Programming/Software Engineering Management, Data Management/Cloud Administration/Database, IT Project Management/Information Systems Management, Networking/Network Administration/Enterprise Network Management, Cybersecurity/Information Assurance/IT Security/Computer Security or Forensic Management.
Part-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
BS, MS, or PhD degree in Computer Science, Data Science, Economics, Statistics, Computational Biology, BioInformatics, or equivalent experience. Through the Atlas, companies and governments can understand the distant origins of products well beyond their own direct suppliers; discover trading relationships and national security risks deep in their networks; measure labor and environmental impacts; identify related risks and opportunities; ensure effective compliance and enforcement with trade requirements; and collaborate to manage all of it.
$150ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Bachelor's Degree must be in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, or Software Engineering) with 5-7 years of experience.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
An Associate of Science (A.S.) or Bachelor of Science (B.S.) degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security.
ExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Establishes and documents a comprehensive set of expertise for a wide range of security technologies and processes including, but not limited to: Security Information and Event Management (SIEM); Threat Management Platform, Anti-malware prevention and analysis; vulnerability scanners; penetration testing; computer and network forensics tools and processes; secure application coding and scanning; and cyber security incident.
ExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Four-Year College Degree with completion of college courses in computer science or related field; five years of experience as a Computer Programmer Analyst III or Network Engineer II including one year as an Information Security Analyst or Engineer, also to include three years of experience in project and contract management; or any equivalent combination of experience and training which provides the required knowledge, skills and abilities.
ExpandApply NowActive JobUpdated 24 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Qualifications: - 7 years minimum experience as a System/Network Administrator or related role. -Perform on-call work as part of the rotation of technical staff to handle high priority outages, security incidents and VIP clients.
$75,000 - $85,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Delaney Computer Services seeks a highly motivated, Microsoft Certified, outgoing IT nerd who's customer-oriented and driven by solving and completing IT tasks for a Level I Desktop and Field IT Support Specialist to provide technical assistance to our clients in a Managed Service Provider (MSP) environment.
$45,000 - $57,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Computer World Services, Corporation (CWS) is seeking an exceptional candidate to serve as Cyber Security Senior - SME Defense - SME for the US Army Regional Cyber Center – Continental United States (RCC-CONUS) program responsible for performing non-personal Information Technology (IT) Services and support requirements.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
The Network Security Analyst helps to ensure organizational cyber security and data risk exposure is minimized for electronic information systems. Create security incident communications on behalf of the IT Operations Manager for distribution to IT Management and external business customers.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
We are looking for leaders in the areas of Engineering and Science who are excited about leading multidisciplinary teams and research efforts in a fast paced environment, while also help mentor and develop personnel in this problematic field that has applications in defense, law enforcement, security, disaster relief, human geography, disaster preparedness, and first response.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Faculty research interests include algorithms and theory, AI and machine learning, bioinformatics, cyber-physical systems, computer networks, computer science education, computer vision and image processing, computational topology, data science, high performance computing, human computer interaction, open-source software, robotics and remote sensing, security and privacy, and software engineering.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Improve threat awareness through continuous development and improvement of processes including network vulnerability scanning, security information event management (SIEM) system, Threat detection and response, IT governance risk and control management and assessment, IPS/IDS systems, and other applications.
ExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
NGEN-R SMIT is the largest IT services program for the Navy, by delivering the OCONUS Enterprise Network (ONE-Net); inclusive of cybersecurity services, network operations, service desk, and data transport.
$150Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Technical expert supporting vulnerability management and stakeholders for areas including system administration, network infrastructure, IT operations, and data administration; provide Subject Matter Expertise on cloud security, container security, vulnerability risk, remediation, and mitigation.
Full-timeExpandApply NowActive JobUpdated Today
computer science it network security jobs Company: Jobrialto in Castle-rock, Colorado
FEATURED BLOG POSTS
Learn How to Respond to an Interview Request With Templates
Job interviews are an inevitable part of any job search. So, handling them well is key to building a fulfilling career. Regardless of whether you’re looking at a more junior role or strive for a role as a business executive, you need to maintain your professionalism every step of the way in order to stay in the game.
How to Write an Address Correctly: Explained with Examples
It's hard to imagine a scenario where a text or phone call just won't do these days. With communication at our fingertips, you may think learning how to write an address is a superfluous skill. But it's a skill that will come in handy when you need to fill out healthcare forms, ship a package, order food delivery, or even apply for new jobs.
5 Common Interview Mistakes
Everyone's interview process is unique in some form or fashion. Like most, your interview process is crafted so you can get the most information out of your candidates to increase hiring confidence and make the right hiring decisions. However, there are often small problems in interview processes that could ultimately affect the success of hiring decisions.
How to Write a Job Description?
It might be tempting to overlook the importance of a well-written job description. After all, if you’ve posted job ads before and ended up with tons of resumes in hand, it’s easy to assume that this will always be the case, regardless of how your job ad reads. But, in reality, you really can’t take getting an influx of resumes for granted.
How to Get a W2 From Previous Employers
When tax time rolls around, the last thing you want to worry about is having to track down a W-2 from your former employer. Many times you won’t have to because the IRS requires companies to send these forms to all current and former employees who have earned more than $600 in the last year. Unfortunately, there are employers who don’t do what they’re supposed to. There are even times where something else may happen that prevents the W-2 from getting where it’s supposed to go.
How to Ask Someone to be a Reference + Email Templates
One part of the job-hunting process that frequently gets overlooked is putting together a list of good references. Most of the time we focus on creating the perfect resume, writing an awesome cover letter, and getting our hands on letters of recommendation. We think about what outfit we’ll wear to the job interview, how we’ll answer those tricky questions, and what our career plan looks like. But, in fact, having multiple references lined up who will speak favorably about you to a potential employer is critical to landing a job. This aspect of job searching really can’t be ignored.
Job Rejection Email Response with Examples
Glassdoor estimates that, on average, there are about 250 applicants for every job vacancy out there. If you’ve ever applied for a job, the odds are that you’ve received the dreaded job rejection email.