- UpvoteDownvoteShare Job
- Suggest Revision
Track the deployment of network security devices (to include serial numbers at the component level) consistent with defined asset management practices. Monitor network security device logs to identity and ascertain the nature of potential security violations and report security violations according to defined security response procedures.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Certified Ethical Hacker (CEH), Windows/Linux Admin, Azure Sentinel or Other Cloud SIEM, CISSP, Security+, Network+, Cisco Certified Network Professional (CCNP), Cisco Certified Security Professional (CCSP.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Advanced experience and proficiency across various aspects of IT operations (e.g., networking, virtualization, identity, security, business continuity, disaster recovery, data management, and governance.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
In course of regular job duties, the selected candidate will gain exposure to many different enterprise-grade security technologies, which perform critical functions such as vulnerability scanning, malware detection, network intrusion prevention, firewall blocking, enterprise-wide incident response, and security information and event management (SIEM.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
3+ years of related Network Security Identity Management tools engineering experience, including installing, configuring and troubleshooting experience with one or more of these tools: - SecureSphere Imperva Web Application Firewalls (WAF), Database Activity Monitoring (DAM) - RSA Security Analytics (NetWitness) - Symantec Bluecoat - Cisco FirePower (SourceFire) - Splunk.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Advanced experience and proficiency across various aspects of IT operations (e.g. networking, virtualization, identity, security, business continuity, disaster recovery, data management, governance.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Cloud Security Architect must have subject matter expertise in Security Architecture and Vulnerability Management and Network Defense. We are seeking a remote Cloud Security Specialist to join our team supporting the Security Architecture and Vulnerability Management Support Services contract for the National Oceanic and Atmospheric Administration's (NOAA) National Environmental Satellite, Data, and Information Service (NESDIS) information systems.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Lead Cloud Security Engineer will lead the Network Operations Team working in collaboration with the Information Assurance (IA)/Cybersecurity/Computer Network Defense (CND) Team to perform network operations functions in support of the security tools used in both the AWS Cloud on-premises environment information and the on-premises environment to include the security information and system event management (SIEM) system.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Background with System Administration, Network Administration Network Security, Networking Standards, Network Protocols, NIST/FISMA standards and controls, SIEM platforms and security tools, Network Hardware Configurations.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Responsibilities:Lead a team of security engineers for delivery of Cybersecurity project management, continuous diagnostics and mitigation, threat mitigation and incident response, security architecture support, critical infrastructure protection, patch management, vulnerability management, risk management, information assurance, penetration testing, cybersecurity services, and Security Assessment and Authorization (SA&A) documentation.
$101,400 - $183,300 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
You will collaborate on matters pertaining to security tools, network monitoring, endpoint data protection, identity management, vulnerability/patch management, and incident response, upholding the highest standards of security throughout our organization.
$100,000 - $115,000 a yearFull-timeRemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Significant experience with Azure DevOps Operational Framework and Azure Network, including expertise in Subscription management and Security zoning. Proven expertise in optimizing CI/CD for streamlined Kubernetes deployment and configuration using GitOps and ArgoCD.Hands-on experience in public and/or private cloud environments, including OpenStack, Kubernetes, Azure, AWS, and GCP.Extensive experience in API, Microservices, network, and security architectures, incorporating design patterns.
$115,000 - $300,500Full-timeRemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This role requires a working knowledge of security and network protocols, system and network administration, and configuration management. Educates internal and external users of security technologies to continually improve the knowledge and skill-base of the organization on how best to manage security configuration, patch management and vulnerability management within the infrastructure services.
$83,550 - $178,603Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Understanding of IT security principals, technologies, best practices to include logical access control, PKI and other encryption methods, network-based and host-based IDS/IPS, security configuration baselines, auditing, vulnerability discovery, and management.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Monitor and take action within multiple tools providing security functions such as vulnerability management (, Nessus), configuration management (, Tenable Security Center, IBM BigFix, SCCM, McAfee ePO), endpoint protection (, antivirus, ATP), intrusion detection software and hardware.
Full-timeExpandApply NowActive JobUpdated Today
network security product management jobs Title: network consultant in Washington, DC
FEATURED BLOG POSTS
Should I Hire for Potential Over Experience?
The workforce is shifting every day. In fact, research from the World Economic Forum (WEF) shows over half of employees around the world will need to upskill or reskill by 2025. The rapid rise of digital literacy, automation, and new technologies will quickly supersede businesses that don't train ahead of the curve. With the dire need to invest in training, it's evident that hiring someone with experience isn't that much different than hiring someone without it.
How to Decide Between Two Job Offers: 10 Practical Tips
It’s arguably a good predicament to have. You’ve applied to many jobs, interviewed multiple times, and now find yourself with two legit job offers. Nice! But although this is a feel-good validation of everything you have to offer, a daunting choice lies ahead. How do you decide which job will be the best fit for you?
Why Work in Sales? 9 Reasons & Tips on Answering as an Interview Question!
Working in sales can be demanding and challenging, but it can also be gratifying. Sales is an excellent career with a clear path full of excitement and potential for growth. So, if you're contemplating careers and have wondered "why work in sales?", keep reading to determine if sales is a suitable role for you.
How to Fire an Employee
So… you've finally decided to let one of your employees go. Drafting the paperwork and corresponding with HR is the easy part, but knowing how to fire an employee is where things get complicated. In fact, it is one of the most challenging conversations to have in the workplace. However, it must be done, and it must be done with poise and tact. Not only should you keep your state law in mind, but you should also consider your former employee's wellbeing.
How Long Does it Take to Hear Back from a Job?
Are you applying for your very first job? Maybe you’re anticipating your termination from your current role and want to be proactive. Either way, waiting to hear back on your job application can be stressful. If time has passed since you applied, you may wonder how long does it take to hear back from a job. Well, the answer is... it depends.
How to Respond to a Recruiter Through Email? (Tips & Examples)
Rather than wading through an endless list of open roles, wouldn’t it be nice if relevant job opportunities come to you?
How to Reject a Candidate Professionally
When deciding on how to reject a candidate, your first question may be