- UpvoteDownvoteShare Job
- Suggest Revision
A relevant educational degree in one of the following fields: Computer Science, Information Systems, Information Technology, Cyber Security, Statistics, Business Administration, Systems Engineering, Computation Science, Computer Engineering, Electrical Engineering, Data Analytics, Information Technology, Information Security and Assurance, Mathematics, Software Engineering, Systems Engineering, or Telecommunications.
ExpandUpdated 22 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Degree must be in Network Engineering, Systems Engineering, Information Technology or related field (e.g. General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security.
TemporaryExpandUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
8570 IAT II: CySA+ (CompTIA Cybersecurity Analyst), GICSP (Global Industrial Cyber Security Professional), GSEC (GIAC Security Essentials), Security+ CE (CompTIA Security+ Continuing Education), CND (Certified Network Defender), SSCP (Systems Security Certified Practitioner.
Full-timeExpandUpdated 22 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Certification in: Certified Ethical Hacker, Computer Hacking Forensic Investigator, CompTIA Cyber Security Analyst, CompTIA Cloud+, CompTIA Pentest+, GCHI-GIAC Certified Incident Handler, Cyber Security Incident Responder OR GIAC Response and Industrial Defense.
ExpandUpdated 22 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The candidate for this position should have experience supporting a broad-range of programs associated with overall information assurance and cyber security support; inclusive of security configuration and management services, data protection, anti-virus, malware detection and protection, host-based and endpoint security solutions, and audit and accountability services.
ExpandUpdated 22 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Must possess ONE of the following 8570 IAT-II certifications: CCNA Security CySA+ (Cybersecurity Analyst) GICSP (Global Industrial Cyber Security Professional) GSEC (GIAC Security Essentials Certification) Security+ CE SSCP (Systems Security Certified Practitioner) Must have a current Cisco Certified Networking Professional (CCNP) certification.
ExpandUpdated 22 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Provide expert research and analysis in support of expanding programs and area of responsibility as it pertains to cyber security and information technology activities. Provide expert input to the formulation of cyber security policies based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process.
Full-timeExpandUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Our solutions span cyber threat intelligence, vulnerability intelligence, geopolitical risk, physical security, fraud and brand protection. Are you an experienced Account Executive that enjoys providing intelligence solutions for cyber security to physical security teams in the law enforcement sector.
ExpandUpdated 22 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Zachary Piper Solutions is currently seeking a Cyber Security Analyst/ Engineer who will support a government contract located in Honolulu, HI. Key Words: PKI, Engineer Cyber Security, Clearance, Government, Public Key Infrastructure, Analytic, Cleared, Cloud, Windows, Policy, Roles, Roots Cas Flag Officer, DOD, HI, Government, TS, Top Secret, Hawaii, Ft Shafter.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
High School Diploma/GED Equivalent (A Bachelor’s degree in computer science, Mathematics, Information Technology, Cyber Security or related fields Highly Preferred) 5 years of experience (DoD Network, System Administration, and/or Cyber Security protocols and best practices Highly preferred.
$91,701.62 - $152,836.05 a yearFull-timeExpandUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Participate in or support incident response activities by providing expertise in vulnerability-related issues during security incidents. Industry certifications such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or Certified Ethical Hacker (CEH.
Full-timeExpandUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Amentum has an opportunity for a highly qualified Cyber Intelligence Analyst to play a pivotal role in providing actionable intelligence to support cyber operations. Provide intelligence support during cyber incident response activities, including analysis of indicators of compromise (IOCs), attribution of cyber attacks, and identification of adversary tactics, techniques, and procedures (TTPs.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
A bachelor's degree in Criminal Justice and/or Administration; Law and Society; Forensics; Public Safety and/or Administration; Homeland Security; Law Enforcement; Justice Administration; Organizational Security and Management; Criminology; Cyber Security; Social Work; Fire Science; Public Administration and/or Policy; Political Science with Superior Academic Achievement (SAA.
ExpandUpdated 22 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Since its founding in 1989, IMC has offered solutions and expertise in: IT operations and maintenance, data management, cyber security, systems and network engineering and administration, cloud/hosting services, software development, website services, software quality assurance and testing (including IV&V), and project management.
ExpandUpdated 2 months ago - UpvoteDownvoteShare Job
- Suggest Revision
The Cyber Security Analyst is responsible for all areas of IT cybersecurity and assisting the USARPAC G61 (CSPMO) in managing missions intended to preserve the ability to utilize blue cyberspace capabilities and protect data, networks, cyberspace-enabled devices, and other designated systems by defeating on-going or imminent malicious cyberspace activity.
Full-timeExpandUpdated 1 month ago
support cyber security jobs Title: specialist in Pearl Harbor, HI
FEATURED BLOG POSTS
How to Dress on the First Day of Work (Men & Women)
You did it! Out of hundreds of applicants and dozens of people interviewed, you’re the one who got a new job. Congrats! Now comes the question of how to dress on the first day of work.
Why College Students Should Work While in College?
College is a special part of our lives. It’s a time when we prepare for our dream job while creating some of the most memorable moments in life. That said, college life can also be stressful. Not only do we have to spend long hours studying, writing and researching, but we also have to deal with increased tuition fees and living expenses.
5 Ways to Measure Candidate Experience
Your candidate experience is made up of 4 essential parts
How to Stall a Job Offer Politely
You did it! After several weeks of looking for a new job and undergoing grueling interviews, you finally have a job offer. Although this may be very exciting, accepting a job offer means that you’re making a long-term commitment to your future employer. So, even if you’re eager to leave your current job, this isn’t a decision you should take lightly.
How to Get a Job in a New City - Best Tips to Follow
When your dream job posts, will you be ready? What if that dream job was in a faraway city or a different continent…would you move for it? Most of us have dreamed about what it would be like to accept a job in a new place at one time or another. But when it comes to actually making a move, it’s usually the logistical details that give us pause. The key to job searching in a different location is to have a plan.
What is a Policy of Non-Retaliation & How to Create One
Your company probably has many policies in place – anti-discrimination policies, equal opportunity policies, ethics policies, and so on. However, it is important to re-evaluate whether you have a policy that covers every situation. Say for instance one of your employees submit a complaint in good faith to their supervisor. To their surprise, they are met with retaliation, such as demotion, defamation, or even termination.
When to Tell Your Boss You're Job Searching
The Bureau of Labor Statistics has found that individuals, on average, have 12.4 jobs throughout their working life. So regardless of where you are on the career ladder, it’s inevitable that at some point, you’ll begin looking for another job. That said, you might be wondering,