- UpvoteDownvoteShare Job
- Suggest Revision
Familiar with security testing techniques such as network discovery, port and service identification, vulnerability scanning, network sniffing, fuzzing, penetration testing, configuration reviews, firewall rule reviews, social engineering, wireless penetration testing and password cracking.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As a key member of our cloud infrastructure and security team, you will play a crucial role to help run system and network security operations of a hybrid cloud environment.
RemoteExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Demonstrate advanced knowledge on multiple subjects among access control, network security, operating system security, email and communications security, vulnerability management, endpoint protection, application security, risk management, operational security, authentication systems, system security testing and hardening, and cloud security.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Providing security review of network and system architecture designs. + Technical knowledge in some of the following domains in a cloud or on-premise context: routing/switching, stateful or next gen firewalls (NGFW), distributed denial of service (DDoS) mitigation, web application firewalls, intrusion detection / prevention systems (IDS/IPS), network segregation, security information and event management (SIEM), Container and Orchestration technologies, Infrastructure as Code, and other threat and vulnerability management capabilities.
$386,100 a yearFull-timeExpandApply NowActive JobUpdated 16 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Fiber Technician troubleshoots using an OTDR to identify and correct problems end to end, and Network wide. Position – Network Technician. The Fiber Technician will terminate simplex & duplex jumper cord.
Full-timeExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Implement control systems solutions including but not limited to Identity and Access Management (IAM), Data Loss Prevention (DLP), Anti-exploitation, Next Generation Firewalls, Intrusion Prevention Systems (IPS), Network Access Control (NAC), Public Key Infrastructure (PKI), Virtual Private Network (VPN), Malware Analysis, and Application Whitelisting.
RemoteExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Collaborate with other Network teams to develop network SRE solutions with a focus on production integration Conduct network analysis, configuration management and develop improvements for system software performance, availability, and reliability Provide program management assistance and contribute input to help manage project schedules, risks, and costs.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Experience defining security monitoring rules, monitoring events, assessing risk, responding to incidents and providing security oversight related to the security features of IT tools supported by the IT operations teams; practical network and administration skills with Linux, Windows, cloud security, Active Directory, SIEM and security infrastructure (including Microsoft Sentinel and related technology stack, such as Microsoft Purview) are relevant; experience with scripting or automation.
Full-timeExpandApply NowActive JobUpdated 26 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Strong understanding of cyber security technologies and strategies, including but not limited to: MITRE Telecommunication&ACK framework, attack surface management, security processes, best-practice logging/monitoring, OSINT and incident response.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
JPC - 8039 - Cyber Security Analyst - Des Moines, Iowa(Remote)Des Moines, IowaDuration: Long termThe Threat Intelligence Analyst will be responsible for collecting and disseminating CTI. They will compile reports and translate the content into actionable activities for SOC analysts, threat hunters, information technology staff, leadership etcService Definition:This position supports the Iowa Department of Management Division of Information Technology DOM DoIT) Security Operations Center (SOC.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Freedom Financial Network is seeking a Customer Experience (CX) Product Owner for the Enterprise Applications Platform Team. This role provides vision, technical leadership, and overall responsibility for the Customer Experience product development efforts within IT and the Enterprise Applications team supporting our Genesys Cloud and Verint platforms.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
An active DoD TS/SCI with Polygraph clearance or prior SCI/program eligibility Department of Defense Directive (DoDD) 8140 / 8570 Certification requirements (CompTIA Security CE or equivalent certification and an Operating System Certification Direct working experience with NISPOM, JAFAN, JSIG, DFARS and/or DoD/RMF Direct working experience with NISPOM, JAFAN, JSIG, and/or DoD/RMF guidelines Experience with handling and working with classified information.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Additional experience in security for BW/4 HANA, C/4HANA, SRM, CRM, SCM, HR, and SAP Cloud products (including SCP, Ariba, Success Factors, Hybris, Concur) is beneficial. Minimum of 6 years of experience in leading SAP security and SAP GRC Access controls within a comprehensive SAP landscape, including development, quality assurance, sandbox, training, and production systems.
$148,000 a yearFull-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
You have hands-on, practical expertise developing technology strategies and roadmaps as well as architecting and implementing enterprise information security & risk system technologies related to Vulnerability Management and Data Protection as well as Governance, Risk & Compliance (GRC), including standard processes and current trends.
$185,000 a yearFull-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Strong understanding of cyber security technologies and strategies, including but not limited to: MITRE ATT&ACK framework, attack surface management, security processes, best-practice logging/monitoring, OSINT and incident response.
ExpandApply NowActive JobUpdated 1 month ago
network security jobs Title: system programmer in Altoona, IA
FEATURED BLOG POSTS
6 Best Ways to End a Cover Letter with Examples
Including a cover letter with your resume is a great way to introduce yourself to the hiring manager, tell them why you’re the ideal fit for the role, and provide context about your personal situation. A strong cover letter will give you an advantage over other applicants. But it’s important that you structure it properly and write it powerfully so that it carries an impact. This article will discuss how to end a cover letter effectively so you catch the eye of a hiring manager and increase your odds of landing an interview. Read on to learn more.
How to Write a Follow-Up Email for a Job Application?
Most times, we have to do more than submit a "sugar-coated" resume to land our dream jobs. Going the extra mile to follow up on your job application can increase your chances of employment. Additionally, it may even help you get confirmation sooner on whether you are seriously being considered for the job or not.
How to Hire Remote Workers
Remote work used to be a thing of the future. However, with social, economic, and cultural events taking place across the country, it has now evolved into something that both job searchers AND companies are benefiting from. Remote work is multifaceted and can come in handy in a variety of situations. So, to help your small business take advantage of all of remote work's benefits, here is a short guide on how to hire remote workers.
How to Address a Cover Letter With Examples
It’s easy to get caught up in focusing on your resume – how it looks, what it says, and whether it’s going to land you a job interview. Because there is a big focus on building the perfect resume, job searchers often overlook the importance of a high-quality cover letter. Your cover letter plays a huge role in your first impression. It humanizes you and provides context for your resume.
How to Call Out of Work
No matter how happy we are with our jobs, there are days when we feel overwhelmed and want to call out of work. No, don't feel guilty. It's expected because we're humans, and we can't control the uncertainties of life. But the problem lies in how to call out of work without seeming uncommitted to work, especially if you seldom get work-free days.
What is Seasonal Employment?
Depending on where you are in your career, you might have first-hand experience with seasonal employment. Seasonal employment can be a great way to expand your skill set and earn extra cash while helping businesses meet seasonal increases in demand.
How to Ask for a Letter of Recommendation
When the job board you subscribe to finally posts your dream job, you may feel like the stars have aligned. But part of securing a position that matches your career plan is ensuring you address all the application basics. You know, the resume, the cover letter, the portfolio. It seems like you've got this in the bag — until you realize they want a letter of recommendation, too!