- UpvoteDownvoteShare Job
- Suggest Revision
Familiar with security testing techniques such as network discovery, port and service identification, vulnerability scanning, network sniffing, fuzzing, penetration testing, configuration reviews, firewall rule reviews, social engineering, wireless penetration testing and password cracking.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Strong understanding of cyber security technologies and strategies, including but not limited to: MITRE Telecommunication&ACK framework, attack surface management, security processes, best-practice logging/monitoring, OSINT and incident response.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Providing security review of network and system architecture designs. + Technical knowledge in some of the following domains in a cloud or on-premise context: routing/switching, stateful or next gen firewalls (NGFW), distributed denial of service (DDoS) mitigation, web application firewalls, intrusion detection / prevention systems (IDS/IPS), network segregation, security information and event management (SIEM), Container and Orchestration technologies, Infrastructure as Code, and other threat and vulnerability management capabilities.
$386,100 a yearFull-timeExpandApply NowActive JobUpdated 16 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Demonstrate advanced knowledge on multiple subjects among access control, network security, operating system security, email and communications security, vulnerability management, endpoint protection, application security, risk management, operational security, authentication systems, system security testing and hardening, and cloud security.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
An active DoD TS/SCI with Polygraph clearance or prior SCI/program eligibility Department of Defense Directive (DoDD) 8140 / 8570 Certification requirements (CompTIA Security CE or equivalent certification and an Operating System Certification Direct working experience with NISPOM, JAFAN, JSIG, DFARS and/or DoD/RMF Direct working experience with NISPOM, JAFAN, JSIG, and/or DoD/RMF guidelines Experience with handling and working with classified information.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
As a key member of our cloud infrastructure and security team, you will play a crucial role to help run system and network security operations of a hybrid cloud environment.
RemoteExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
JPC - 8039 - Cyber Security Analyst - Des Moines, Iowa(Remote)Des Moines, IowaDuration: Long termThe Threat Intelligence Analyst will be responsible for collecting and disseminating CTI. They will compile reports and translate the content into actionable activities for SOC analysts, threat hunters, information technology staff, leadership etcService Definition:This position supports the Iowa Department of Management Division of Information Technology DOM DoIT) Security Operations Center (SOC.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Certified Information Systems Security Professional (CISSP) Certification or related security certification- CEH, PCNSE, ISACA, SANS, ISC2 (CCSK, CCSP, CISSP, CISSP associate, or relevant certifications.
RemoteExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Experience defining security monitoring rules, monitoring events, assessing risk, responding to incidents and providing security oversight related to the security features of IT tools supported by the IT operations teams; practical network and administration skills with Linux, Windows, cloud security, Active Directory, SIEM and security infrastructure (including Microsoft Sentinel and related technology stack, such as Microsoft Purview) are relevant; experience with scripting or automation.
Full-timeExpandApply NowActive JobUpdated 26 days ago - UpvoteDownvoteShare Job
- Suggest Revision
You have hands-on, practical expertise developing technology strategies and roadmaps as well as architecting and implementing enterprise information security & risk system technologies related to Vulnerability Management and Data Protection as well as Governance, Risk & Compliance (GRC), including standard processes and current trends.
$185,000 a yearFull-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Additional experience in security for BW/4 HANA, C/4HANA, SRM, CRM, SCM, HR, and SAP Cloud products (including SCP, Ariba, Success Factors, Hybris, Concur) is beneficial. Minimum of 6 years of experience in leading SAP security and SAP GRC Access controls within a comprehensive SAP landscape, including development, quality assurance, sandbox, training, and production systems.
$148,000 a yearFull-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Strong understanding of cyber security technologies and strategies, including but not limited to: MITRE ATT&ACK framework, attack surface management, security processes, best-practice logging/monitoring, OSINT and incident response.
ExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
N Position Type Management JOB SUMMARY The Senior Network Security Engineer, Network Site Reliability Engineering (SRE) is the subject matter expert in designing and implementing the Network security strategy and platforms for the next-gen operations for all Marriott International (MI) networks including the Property Networks, Datacenter/Cloud Networks, and Corporate Networks.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Control the Information Environment - Ensure effective identity verification and access management, implement security controls guided by the risk assessment, ensure compliance with all applicable laws and regulations including FERPA, HIPAA, PCI-DSS and GLBA. Coordinate institutional information management and security policies.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Certified Information Systems Security Professional (CISSP), Certified Information Security Auditor (CISA), GIAC Security Essentials(GSEC), or other information security certification is preferred.
ExpandApply NowActive JobUpdated 9 days ago
security job Title: network system in Altoona, IA
FEATURED BLOG POSTS
How to Navigate Hiring Out of State
The job market has shifted significantly in recent years. The accelerated adoption of technology has not only pushed many companies into remote working arrangements but also increased the availability of supporting tools and technologies (i.e., video conferencing and collaboration software).
Building a Candidate Pipeline Through Internships
Building a candidate pipeline through a great internship program for local college students and recent graduates at local universities is a great and cost-effective way to attract and retain top talent. By offering meaningful and impactful work experiences, regular feedback, coaching, and mentorship, you can create a positive internship experience that will make your organization a sought-after destination for future employees. This not only benefits the organization in the short-term but also in the long-term, as you'll have a pool of well-trained and experienced candidates who may be interested in full-time employment once they graduate. Furthermore, building relationships with local universities and college students can increase brand awareness and build a positive reputation for your organization in the local community.
Hiring Transparency
Transparency in hiring refers to the open and honest communication and information sharing that takes place between employers and job candidates. It encompasses all aspects of the hiring process, from posting job descriptions to providing feedback on performance during and after the interview process. In today's job market, hiring transparency has become increasingly important for both employers and candidates alike.
Recruitment strategies that are weird, but actually work
In the current candidate-driven job market, recruiters are looking for unique ways to attract talent. Some have resorted to even (dare we say it?) recruitment strategies on the border of weird and wacky. What can we learn from the unusual recruitment tactics that are being used and actually getting results? Here’s a rundown of some unique recruitment strategies that actually work.
How To Make $100K a Year – No BS Strategies & Advice
If you’re like most of us, you’d love to be wealthier. Having more money would alleviate stress. It would make it easier to pay your bills and buy nicer things. Maybe it’d allow you to spend more time with your kids and go on more vacations. You’re not alone if you wish you could somehow earn a more significant income.
How to Write a Recommendation Letter for a Student
When a student applies for their first job or for their next academic degree, they don’t have much experience to showcase their skills and personal qualities. Hiring managers and admissions officers, therefore, often look at recommendation letters as a way to go beyond the student’s GPA and learn more about the student’s skills and personal qualities.
How To Answer “Why Do You Want to Be a Supervisor” in an Interview
Anyone who has worked in a supervisor role knows how challenging yet rewarding it is. But chances are if you're trying to become a supervisor, you'll be forced to answer: