- UpvoteDownvoteShare Job
- Suggest Revision
PowerPlan is looking for every opportunity to help our customers and prospects gain more value from our suite of software solutions We are looking for a top tier Security Analyst to join our team and help us protect our network and systems from cyber threats.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
1+ years of experience working with cloud based or on-prem network security products (WAF, DDoS Mitigation, IPS/IDS, NGFW, VPN, or Proxy) As a Product Owner supporting the Network Security Product Team, you will be accountable for contributing to and delivering upon the strategic agenda for our core cyber products to drive meaningful progress for our customers and our business.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Georgia Tech's faculty attracted more than $1.4 billion in research awards this past year in fields ranging from biomedical technology to artificial intelligence, energy, sustainability, semiconductors, neuroscience, and national security.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Networking/Security: Should prepare the network/firewall flows between the systems, provide documentation and work with the AWS Cloud Managed Services team. Cloud Monitoring and Optimization: Implement and manage cloud monitoring solutions to ensure the health, performance, and security of applications and infrastructure.
$60 an hourExpandApply NowActive JobUpdated 13 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Expert level knowledge and understanding of Networking Protocols & Technologies such as: Ethernet, BGP, EIGRP, OSPF, Cisco HW and SW (IOS/IOS-XR/NX-OS), Palo Alto Firewalls, Load Balancers, Security protocols, MPLS, QoS and IP Multicast.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Red team activities focus on vulnerability discovery and the development and demonstration of RF and network-based techniques to gain unauthorized access to and/or exploit information networks.
(student)ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Temporary Position Title: Cybersecurity Analyst Temporary Position Summary: The Cyber Analyst will be a technical team leader proactively identifying threats, assist in various cybersecurity tasks, including monitoring network security, conducting vulnerability assessments, and supporting incident response activities.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience working with the following: Vulnerability Scanning, SIEM, and WAF. Certified Information Systems Security Professional (CISSP) Cisco Certified Network Professional (CCNP) or Cisco Certified Security Professional (CCSP) Excellent project and time management skills Ability to function independently and as a team to implement the best practices in the area of information security infrastructure.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Deep knowledge of SRE practices, methodologies, and principles, along with a solid understanding of on prem and public cloud-based network, compute, and storage technologiesIn-depth knowledge of hybrid cloud architecture, IaaS and PaaS technologies, container orchestration platforms (e.g., Kubernetes), cloud efficiency and observability etc.
$261,500Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This role monitors the domains of security controls including, but not limited to, malware defense, network security, Internet security, security analytics, threat intelligence and defense, cybercrime, data protection, vulnerability management, and customer authentication.
$170,810 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Moderate understanding of networks, risk management, network security, digital forensics, and security operations. 2 years' experience in payment card or information security industry, all-source cyber intelligence organizations, investigating payment card, cybercrime fraud.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
The Strategy Manager, Fraud and Risk will report to the Senior Director of the Payee Identification and Network Security (PINS) team that oversees Zelis Payments' Fraud, Risk, and Identity Verification organization.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The role will also include oversight of managed services teams (e.g., security monitoring, EDR management, Network Security, DLP Monitoring, etc). Identify and remediate threats and vulnerabilities to the Bose environment, including management of vulnerabilities, policy gaps, and security findingsDevelop and test incident response strategies and communication plansProtect Bose’s network and endpointsEnhance the Threat Intelligence program to obtain relevant security threat that can be shared across various part of the organization.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Must live within a commutable distance to either our Atlanta or NY office6+ years related experience requiredMulti-cloud security experience AWS, Azure, GCPExpert level knowledge on WAF, Web Security, DDoS protection, data analytics, and Bot Management - REQUIREDWorking experience with Information Security, Network Security, and Security Monitoring and Incident Response.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Firewalls and Security: Manage and configure firewalls, including Palo Alto, to safeguard network security. Job Title: Network Operations Center (NOC) Technician. NOC Services: Act as the primary point of contact for monitoring and managing network operations, ensuring the smooth operation of our network infrastructure.
Full-timeExpandApply NowActive JobUpdated 14 days ago
network security jobs in Atlanta, NM, France
FEATURED BLOG POSTS
5 Common Interview Mistakes
Everyone's interview process is unique in some form or fashion. Like most, your interview process is crafted so you can get the most information out of your candidates to increase hiring confidence and make the right hiring decisions. However, there are often small problems in interview processes that could ultimately affect the success of hiring decisions.
How to Ask Someone to be a Reference + Email Templates
One part of the job-hunting process that frequently gets overlooked is putting together a list of good references. Most of the time we focus on creating the perfect resume, writing an awesome cover letter, and getting our hands on letters of recommendation. We think about what outfit we’ll wear to the job interview, how we’ll answer those tricky questions, and what our career plan looks like. But, in fact, having multiple references lined up who will speak favorably about you to a potential employer is critical to landing a job. This aspect of job searching really can’t be ignored.
Job Rejection Email Response with Examples
Glassdoor estimates that, on average, there are about 250 applicants for every job vacancy out there. If you’ve ever applied for a job, the odds are that you’ve received the dreaded job rejection email.
Structured vs Unstructured Interviews
The goal of an interview is to evaluate candidates based on their skills, personality, and knowledge. You want to choose the BEST candidate from your candidate pool, so the interview is something you can't mess up. As you begin planning your interview process, one of the major decisions you'll face is whether the interview should be a structured vs unstructured interview. So let's take a dive into the differences and sort out which circumstances warrant which interview process.
How to Describe Your Personality with Examples
Imagine you’re in an elevator with the CEO of your dream company and you get to talking. The conversation is going well and you start to imagine yourself working for their company when the CEO turns around and asks you “tell me a bit about yourself.” Would this catch you off guard or would you be able to give a clear and succinct description of who you are?
4 Ways to Make Your Job Posting More Inclusive
According to a Glassdoor survey,
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra: