- UpvoteDownvoteShare Job
- Suggest Revision
A relevant educational degree in one of the following fields: Computer Science, Information Systems, Information Technology, Cyber Security, Statistics, Business Administration, Systems Engineering, Computation Science, Computer Engineering, Electrical Engineering, Data Analytics, Information Technology, Information Security and Assurance, Mathematics, Software Engineering, Systems Engineering, or Telecommunications.
ExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Degree must be in Network Engineering, Systems Engineering, Information Technology or related field (e.g. General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security.
TemporaryExpandApply NowActive JobUpdated 25 days ago - UpvoteDownvoteShare Job
- Suggest Revision
8570 IAT II: CySA+ (CompTIA Cybersecurity Analyst), GICSP (Global Industrial Cyber Security Professional), GSEC (GIAC Security Essentials), Security+ CE (CompTIA Security+ Continuing Education), CND (Certified Network Defender), SSCP (Systems Security Certified Practitioner.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Certification in: Certified Ethical Hacker, Computer Hacking Forensic Investigator, CompTIA Cyber Security Analyst, CompTIA Cloud+, CompTIA Pentest+, GCHI-GIAC Certified Incident Handler, Cyber Security Incident Responder OR GIAC Response and Industrial Defense.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The candidate for this position should have experience supporting a broad-range of programs associated with overall information assurance and cyber security support; inclusive of security configuration and management services, data protection, anti-virus, malware detection and protection, host-based and endpoint security solutions, and audit and accountability services.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Must possess ONE of the following 8570 IAT-II certifications: CCNA Security CySA+ (Cybersecurity Analyst) GICSP (Global Industrial Cyber Security Professional) GSEC (GIAC Security Essentials Certification) Security+ CE SSCP (Systems Security Certified Practitioner) Must have a current Cisco Certified Networking Professional (CCNP) certification.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Provide expert research and analysis in support of expanding programs and area of responsibility as it pertains to cyber security and information technology activities. Provide expert input to the formulation of cyber security policies based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process.
Full-timeExpandApply NowActive JobUpdated 23 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Our solutions span cyber threat intelligence, vulnerability intelligence, geopolitical risk, physical security, fraud and brand protection. Are you an experienced Account Executive that enjoys providing intelligence solutions for cyber security to physical security teams in the law enforcement sector.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Zachary Piper Solutions is currently seeking a Cyber Security Analyst/ Engineer who will support a government contract located in Honolulu, HI. Key Words: PKI, Engineer Cyber Security, Clearance, Government, Public Key Infrastructure, Analytic, Cleared, Cloud, Windows, Policy, Roles, Roots Cas Flag Officer, DOD, HI, Government, TS, Top Secret, Hawaii, Ft Shafter.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
High School Diploma/GED Equivalent (A Bachelor’s degree in computer science, Mathematics, Information Technology, Cyber Security or related fields Highly Preferred) 5 years of experience (DoD Network, System Administration, and/or Cyber Security protocols and best practices Highly preferred.
$91,701.62 - $152,836.05 a yearFull-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Participate in or support incident response activities by providing expertise in vulnerability-related issues during security incidents. Industry certifications such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or Certified Ethical Hacker (CEH.
Full-timeExpandApply NowActive JobUpdated 25 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Amentum has an opportunity for a highly qualified Cyber Intelligence Analyst to play a pivotal role in providing actionable intelligence to support cyber operations. Provide intelligence support during cyber incident response activities, including analysis of indicators of compromise (IOCs), attribution of cyber attacks, and identification of adversary tactics, techniques, and procedures (TTPs.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
A bachelor's degree in Criminal Justice and/or Administration; Law and Society; Forensics; Public Safety and/or Administration; Homeland Security; Law Enforcement; Justice Administration; Organizational Security and Management; Criminology; Cyber Security; Social Work; Fire Science; Public Administration and/or Policy; Political Science with Superior Academic Achievement (SAA.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Since its founding in 1989, IMC has offered solutions and expertise in: IT operations and maintenance, data management, cyber security, systems and network engineering and administration, cloud/hosting services, software development, website services, software quality assurance and testing (including IV&V), and project management.
ExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
The Cyber Security Analyst is responsible for all areas of IT cybersecurity and assisting the USARPAC G61 (CSPMO) in managing missions intended to preserve the ability to utilize blue cyberspace capabilities and protect data, networks, cyberspace-enabled devices, and other designated systems by defeating on-going or imminent malicious cyberspace activity.
Full-timeExpandApply NowActive JobUpdated 14 days ago
support cyber security jobs Title: specialist in Pearl Harbor, HI
FEATURED BLOG POSTS
What Questions Can You Not Ask in an Interview?
It can be stressful to interview candidates to fill an open role at your company. Maybe your boss is on you to hire someone who’s absolutely perfect as soon as possible. Maybe you don’t have a ton of experience yet in conducting interviews. Whatever the case, there’s a lot to take under consideration when you’re the one in charge of interviewing. For instance, “What questions can you not ask in an interview?” may very well be running through your mind given its legal ramifications. Knowing exactly which interview questions are off-limits (and which are fine to ask) will boost your confidence as you continue to search for the ideal new hire.
How to Prepare to Be Fired - What You Need to Do
If you’re reading this, let me be the first to tell you how sorry I am. Getting fired feels crappy, disheartening, hurtful, and all the other bad, sad words. But here’s what I want you to do. First, let yourself fumble for a minute. Then, pick your head up — sometimes getting fired is a blessing in disguise. If you think termination is around the corner, we’ll teach you how to prepare to be fired and what to do next so you land somewhere even better.
How to Find a Job That Makes You Happy - 11 Concerning Facts
Do you ever feel like your life is like one of those rom-com movie scene openers? You know, the ones where the main character rolls out of bed, awakened by a casually upbeat theme song, sulks their way to the coffee pot, and then trudges toward their computer to begin yet another boring day at work?
How to Decline a Job Offer You Already Accepted
When you think about it, turning down a job offer is not the worst position you could be in. If you’ve been lucky enough to consider multiple job offers, well, then you’re lucky enough.
How to Practice Fair Chance Hiring for People With Criminal Records
Usually when you think of your dream hire, you think of someone who is respectful, trustworthy, reliable, and has sound judgment, right? As you envision your ideal candidate with these qualities, the last person you think of is someone with a criminal record.
6 Common Mistakes to Avoid When Employer Branding
Currently, job searchers are putting extra effort into researching employers. The information they find plays a major role in whether they will pursue an opportunity with you or look for jobs elsewhere. That is why it is now more important than ever to be proactive and intentional when showcasing your workforce and workplace culture. Having a well crafted employer branding strategy can help you strategize and influence your potential candidates so they see your business in the best light. But in order to do that, you should be aware of some of the most common mistakes that employers make.
What to Say When Terminating an Employee
Terminating an employee is an inevitable part of doing business. Whether you’re re-structuring your department or you’ve identified a few employees who’re not living up to your expectations, letting people go is necessary for keeping your workforce healthy and thriving.