- UpvoteDownvoteShare Job
- Suggest Revision
Cyber security, network security, threat neutralization, network visualization, lateral spread response, insider threat visibility, network mapping, risk and compliance reporting, realtime alerting, cyber defense, cyber threat response, multi-tenant, IoT security, managed detection and response, mdr, incident response, managed security, MSP, cyber security solution, and security operations center.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Ensure designs are consistent with cybersecurity best practices with regard to secure configuration management, Cloud security, document management services, virtual desktop infrastructure (VDI), web and application services, mobile device management, infrastructure and network access, end-user support, authentication, and data recovery.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As a Computer Network Defense expert, you’ll be working with a team of forward thinking, innovative, and highly motivated System Administrator, Network and Security Engineers dedicated to implementing and leveraging the latest technologies to secure, protect, assess, and monitor fielded IT capabilities against a full range of internal and external threats.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Background with System Administration, Network Administration Network Security, Networking Standards, Network Protocols, NIST/FISMA standards and controls, SIEM platforms and security tools, Network Hardware Configurations.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Sr. Network Security Engineer This position will start 100% Onsite but could change to a hybrid role. Implement and enforce the agency's policies and procedures in network and infrastructure management, auditing, inspection, security, disaster recovery, encryption and compliance.
$55 an hourFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Engineering, implementing and operations of networking technologies and protocols (routing, switching), and on-prem and cloud security tools such as network proxy, firewalls (Checkpoint, Palo Alto), web application firewalls, NDR, Network Analyzers, Network Access Control, container security (Kubernetes preferred), logging and alerting with SIEM, strong authentication, IPS/IDS, VPNs, DDoS etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Working knowledge of IDS/IPS systems, EDR solutions, network infrastructure and protocols, cloud security, IAM systems, virtualization and databases. Partnerships of particular importance will include: Cyber Incident Response Team (CIRT), Threat Intelligence TI), SIEM engineering, SOAR development team, and Security Engineering, Security Architecture, GRC/Risk Management, and GRC/Compliance.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Understanding of IT security principals, technologies, best practices to include logical access control, PKI and other encryption methods, network-based and host-based IDS/IPS, security configuration baselines, auditing, vulnerability discovery, and management.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Information Security experience in two or more of the following verticals: fraud operations, threat modeling, network/application security testing, social engineering, Red Team operations, and network exploitation operations.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Demonstrated expertise in one or more of the following fields: secure software development, embedded systems security, cryptography, vulnerability assessment, endpoint security, network security, cloud security, and malware analysis.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with Intrusion Detection and Prevention Systems (IDS/IPS), Firewall and Network Log analysis, Security Information and Event Management (SEIM) tools, threat intelligence services, and malware analysis.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
In-depth understanding of information security principles and best practices, including network security, cybersecurity engineering, cryptography, system security, vulnerability management, and incident response.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
At least 2 years of experience in information technology (operations, software delivery, access management, microservices), information security (application security, network security, cyber security, data protection), information systems risk management, information systems auditing, or a combination.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
8+ years of industry experience with Endpoint, Network and System security with demonstrated experience in Vulnerability Management tools like Rapid 7, Nessus, Tripwire and Qualys. Being a member of the Cybersecurity Eng. & Ops Team, the Lead IT Security Engineer will be a subject matter expert (SME) for Vulnerability and Threat Management capabilities.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Advanced experience and proficiency across various aspects of IT operations (e.g. networking, virtualization, identity, security, business continuity, disaster recovery, data management, governance.
ExpandApply NowActive JobUpdated Today
network security jobs Title: security architect Company: Experis in Washington, DC
FEATURED BLOG POSTS
How do Employers Verify Education?
At any stage in your professional journey, you may come across an employer or a recruiter who asks to verify your educational credentials. This shouldn’t come as a surprise as 30% of candidates admitted to lying on their resumes, yet 79% of them never get caught. In fact, 85% of employers in the US who conduct background checks find that candidates have lied on their resumes or job applications.
How to Be More Articulate and Speak More Clearly
Have you ever had those moments when you're talking to someone and have no idea what they are saying? The best response you can muster up is a simple head nod or blind agreeance?
How to Ask for a Higher Starting Salary
Maybe you think you’ve finally found your dream job. Everything about it is perfect, except… the salary. Unfortunately, it just isn’t where you want it to be. So, should you give up and move on? Given all the effort you’ve already invested, it’s probably wise to try and negotiate a better salary before you do.
How to Pass a Personality Test with Flying Colors
Whether you’re applying for your first job or looking to move up the career ladder, personality tests aren’t usually the first thing we think about. But surprisingly, they can have a massive impact on how our future employers perceive us. In fact, a 2017 study by the Society for Human Resource Management (SHRM) has found that 32% of U.S. employers use personality tests when hiring for senior management positions, and 28% use them for middle management positions. Personality tests are also used for hourly workers and contractors, though less frequently.
10 Practical and Effective Strategies to Persuade Anyone of Anything
Learning how to persuade people is like a key that can unlock any door. Acing the interview for the job of your dreams. Getting the best deal on a new car. Closing a sale with a skeptical customer. All of these wins require a level of persuasiveness.
A Potential TikTok Ban?!
As you may already know, there has been a lot of talk lately about the possibility of a TikTok ban. While this has not yet come to fruition, it's important to consider the implications this could have for businesses and recruiters who rely on TikTok as a platform to market their brand, recruit new talent, and connect with their audience.