- UpvoteDownvoteShare Job
- Suggest Revision
The Digital Modernization sector within Leidos is seeking an Identity and Access Management Systems Engineer to be responsible for the upkeep, configuration, and reliable operation of computer systems in support of DISA's Compartmented Enterprise Services Office (CESO) NOC. The IdAM Systems Engineer will to contribute to the deployment and maintenance of an IdAM solution to serve as a comprehensive Identity as a Service (IDaaS) platform for CESO.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Technical expert supporting vulnerability management and stakeholders for areas including system administration, network infrastructure, IT operations, and data administration; provide Subject Matter Expertise on cloud security, container security, vulnerability risk, remediation, and mitigation.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with cloud security technologies such as identity and access management, encryption, and network security. As a OCI Network Security Architect, you will be responsible for ensuring the security of our cloud infrastructure and solutions, developing, and implementing security standards and best practices, and providing technical guidance to other security architects and engineers.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Understanding of IT security principals, technologies, best practices to include logical access control, PKI and other encryption methods, network-based and host-based IDS/IPS, security configuration baselines, auditing, vulnerability discovery, and management.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of security policies, network security, data security and security event management to adopt cloud security services. Intermediate knowledge of Azure DevOps configuration and Management, Azure Security Center, and Azure Identity Management.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Required Experience implementing DevOps practices including Infrastructure-As-Code (IAC), CI/CD, and automated testing Required Knowledge of security policies, network security, data security and security event management to adopt cloud security services Required Experience in Terraform and/or Ansible and/or Azure Gov cloud / AWS CloudFormation IaC tools.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Security: Compliance, Information Assurance, Data Protection using industry-best practices and tooling (Crowdstrike Falcon, Tenable.io, Splunk Phantom, HashiCorp Vault signers, SHA1 and SHA2 certificate management.
$150InternExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Implement and automate security controls, including identity and access management (IAM), encryption, network security, and logging, using AWS-native tools and third-party solutions.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience in AWS Cloud / GovCloud Infrastructure to include EC2, Linux/Microsoft Server, S3, Kubernetes, Cloud Security, Identity and Access Management, API Gateway, and AWS Command Line Interface (CLI.
$150ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Certified Ethical Hacker (CEH), Windows/Linux Admin, Azure Sentinel or Other Cloud SIEM, CISSP, Security+, Network+, Cisco Certified Network Professional (CCNP), Cisco Certified Security Professional (CCSP.
$150ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Be a key technical advisor consulting on leading-edge technologies and possess deep technical knowledge in the following pillars of technology: Zero Trust, SASE, ZTNA, EDR/MDR, Identity and Access Management, MicroSegmentation, Cloud technologies, and security principals (AWS, Azure, GCP.
$250ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
In business for more than 52 years, we excel in full-spectrum cyber, data collection & analytics, enterprise IT, and systems and software engineering solutions that support national and homeland security.
$150ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Configure, install and maintain security technologies such as firewalls, IDS/IPS, antivirus, endpoint protection, WAF, wireless security, and network access control.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Expression is looking for an Identity and Access Management Analyst (Oracle OIM-OAM) to join our team. Serves as an IA SME with regards to Access and Identity Management and all associated IA policies and procedures.
$150ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Being a member of the Cybersecurity Eng. & Ops Team, the Lead IT Security Engineer will be a subject matter expert (SME) for Vulnerability and Threat Management capabilities.
ExpandApply NowActive JobUpdated Yesterday
network security it cloud engineer identity and access management jobs Title: engineer cloud in Washington, DC
FEATURED BLOG POSTS
How to Prepare to Be Fired - What You Need to Do
If you’re reading this, let me be the first to tell you how sorry I am. Getting fired feels crappy, disheartening, hurtful, and all the other bad, sad words. But here’s what I want you to do. First, let yourself fumble for a minute. Then, pick your head up — sometimes getting fired is a blessing in disguise. If you think termination is around the corner, we’ll teach you how to prepare to be fired and what to do next so you land somewhere even better.
How to Find a Job That Makes You Happy - 11 Concerning Facts
Do you ever feel like your life is like one of those rom-com movie scene openers? You know, the ones where the main character rolls out of bed, awakened by a casually upbeat theme song, sulks their way to the coffee pot, and then trudges toward their computer to begin yet another boring day at work?
How to Decline a Job Offer You Already Accepted
When you think about it, turning down a job offer is not the worst position you could be in. If you’ve been lucky enough to consider multiple job offers, well, then you’re lucky enough.
How to Practice Fair Chance Hiring for People With Criminal Records
Usually when you think of your dream hire, you think of someone who is respectful, trustworthy, reliable, and has sound judgment, right? As you envision your ideal candidate with these qualities, the last person you think of is someone with a criminal record.
6 Common Mistakes to Avoid When Employer Branding
Currently, job searchers are putting extra effort into researching employers. The information they find plays a major role in whether they will pursue an opportunity with you or look for jobs elsewhere. That is why it is now more important than ever to be proactive and intentional when showcasing your workforce and workplace culture. Having a well crafted employer branding strategy can help you strategize and influence your potential candidates so they see your business in the best light. But in order to do that, you should be aware of some of the most common mistakes that employers make.
What to Say When Terminating an Employee
Terminating an employee is an inevitable part of doing business. Whether you’re re-structuring your department or you’ve identified a few employees who’re not living up to your expectations, letting people go is necessary for keeping your workforce healthy and thriving.
How to Utilize Keywords for Your Job Ads
Before we give you the scoop on how to utilize keywords in job ads, it would be helpful if we defined what keywords are and why they are important. In simple terms,