- UpvoteDownvoteShare Job
- Suggest Revision
Domain knowledge for the following cybersecurity capability areas: Application Security, Vulnerability Management, Data Security and Protection, Cloud Security, Infrastructure Security, Identity and Access Management, Cyber Threat Operations, Cybersecurity Testing.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Thorough knowledge of relevant programming languages (primarily Python, SQL), object-oriented programming principles, Big Data tools and Data Mining/Warehousing Programs (preferably Google Cloud BigQuery.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Ensures delivery of all required work items and deliverables, including system security plans or orderly removal of GDOT users/data upon contract termination. Oversees system integration, data migration, data replication/archiving, or other activities engaging GDOT IT resources.
Full-timeExpandApply NowActive JobUpdated 19 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Security Infrastructure experience (Cisco ASA & Meraki, Palo Alto, Fortinet, Zscaler) 10+ years of experience building and supporting data center environments (Cisco Data Center, Nexus, VXLAN, ASR/ISR Routers.
$150,000 a yearFull-timeExpandApply NowActive JobUpdated 25 days ago - UpvoteDownvoteShare Job
- Suggest Revision
As part of our RVO Health Security team, you will be a technical leader that executes strategic initiatives that improve our security posture and play a significant part in protecting our sensitive data.
Full-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Ability to analyze data and information with a detailed understanding of regulatory requirements, as well as security frameworks and IAM methodologies. Ability to maintain the highest standards of confidentiality, integrity, and personal accountability when working with sensitive & restricted data.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Use Crowdstrike falcon to perform threat hunting, incident response, and malware analysis, as well as to automate and optimize security processes. To be successful in this role, you should have extensive experience with Crowdstrike falcon, including automation and tuning, as well as experience running vulnerability assessments with Qualys and monitoring, evaluating and tuning alerts in Rapid7 SIEM. You should have a solid understanding of security frameworks, standards, and regulations, such as NIST, ISO, SOC2.
Full-timeExpandApply NowActive JobUpdated 24 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Work with the project team, team leaders, project delivery leads, and client stakeholders to create stand-out Accenture Master Data Governance offerings and SAP Digital Core. Minimum of 2 end-to-end SAP Master Data Governance implementations.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Solid experience implementing data lineage, data quality and data observability for big data workflows. Proficiency in data engineering tools and technologies - SQL, Python, Spark, DBT, Airflow, Kafka.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Hands-on experience in designing, implementing, managing large-scale data and ETL solutions with AWS IaaS and PaaS Compute, Storage, and Database services (S3, RDS, Lambda, IAM, RedShift, Glue, EMR, Kinesis, Athena.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of cloud security best practices and healthcare data privacy regulations (HIPAA, etc.) Cyber certifications such as Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP), or GIAC Penetration Tester (GPEN), CISSP, or related training.
Full-timeExpandApply NowActive JobUpdated 25 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Work with management and other personnel to identify security best practices and apply a risk-based approach to information security as a senior Subject Matter Expert covering the security aspects of Identity & Access Management services with a focus on Customer Authentication services (Single Sign-on (SSO) and multi-factor authentication (MFA.
Full-timeExpandApply NowActive JobUpdated 26 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Certified Analytics Professional (CAP), Data Science Council of America (DASCA), Principal Data Scientist (PDS), SAS Big Data Professional, Microsoft Certified Azure Data Scientist Associate, or equivalents.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Hands on working experience with at least two or more of these security technologies (e.g., Vulnerability Management, Penetration Testing, Email Security, EDR, MFA, SIEM, IPS, Firewalls.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
You will have indepth knowledge and experience in; cloud data lake house; Databricks (preferred) or Snowflake; cloud-native solutions knowledge; SQL or Python; modern DevOps approach; have written data code AND also the CI/CD pipelines.
$165,000Full-timeExpandApply NowActive JobUpdated Today
big data national security jobs Company: Accenture in Atlanta, GA
FEATURED BLOG POSTS
Structured vs Unstructured Interviews
The goal of an interview is to evaluate candidates based on their skills, personality, and knowledge. You want to choose the BEST candidate from your candidate pool, so the interview is something you can't mess up. As you begin planning your interview process, one of the major decisions you'll face is whether the interview should be a structured vs unstructured interview. So let's take a dive into the differences and sort out which circumstances warrant which interview process.
How to Describe Your Personality with Examples
Imagine you’re in an elevator with the CEO of your dream company and you get to talking. The conversation is going well and you start to imagine yourself working for their company when the CEO turns around and asks you “tell me a bit about yourself.” Would this catch you off guard or would you be able to give a clear and succinct description of who you are?
4 Ways to Make Your Job Posting More Inclusive
According to a Glassdoor survey,
How to Calculate Net Income
Understanding your finances can be daunting even if you’re good with numbers. Your net income, in particular, is a key metric for determining how well you’re doing financially and whether your current way of operating is sustainable or not.
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra:
6 Best Ways to End a Cover Letter with Examples
Including a cover letter with your resume is a great way to introduce yourself to the hiring manager, tell them why you’re the ideal fit for the role, and provide context about your personal situation. A strong cover letter will give you an advantage over other applicants. But it’s important that you structure it properly and write it powerfully so that it carries an impact. This article will discuss how to end a cover letter effectively so you catch the eye of a hiring manager and increase your odds of landing an interview. Read on to learn more.
How to Write a Follow-Up Email for a Job Application?
Most times, we have to do more than submit a "sugar-coated" resume to land our dream jobs. Going the extra mile to follow up on your job application can increase your chances of employment. Additionally, it may even help you get confirmation sooner on whether you are seriously being considered for the job or not.