- UpvoteDownvoteShare Job
- Suggest Revision
Familiar with security testing techniques such as network discovery, port and service identification, vulnerability scanning, network sniffing, fuzzing, penetration testing, configuration reviews, firewall rule reviews, social engineering, wireless penetration testing and password cracking.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As a key member of our cloud infrastructure and security team, you will play a crucial role to help run system and network security operations of a hybrid cloud environment.
RemoteExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Demonstrate advanced knowledge on multiple subjects among access control, network security, operating system security, email and communications security, vulnerability management, endpoint protection, application security, risk management, operational security, authentication systems, system security testing and hardening, and cloud security.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Providing security review of network and system architecture designs. + Technical knowledge in some of the following domains in a cloud or on-premise context: routing/switching, stateful or next gen firewalls (NGFW), distributed denial of service (DDoS) mitigation, web application firewalls, intrusion detection / prevention systems (IDS/IPS), network segregation, security information and event management (SIEM), Container and Orchestration technologies, Infrastructure as Code, and other threat and vulnerability management capabilities.
$386,100 a yearFull-timeExpandApply NowActive JobUpdated 16 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Fiber Technician troubleshoots using an OTDR to identify and correct problems end to end, and Network wide. Position – Network Technician. The Fiber Technician will terminate simplex & duplex jumper cord.
Full-timeExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Collaborate with other Network teams to develop network SRE solutions with a focus on production integration Conduct network analysis, configuration management and develop improvements for system software performance, availability, and reliability Provide program management assistance and contribute input to help manage project schedules, risks, and costs.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Implement control systems solutions including but not limited to Identity and Access Management (IAM), Data Loss Prevention (DLP), Anti-exploitation, Next Generation Firewalls, Intrusion Prevention Systems (IPS), Network Access Control (NAC), Public Key Infrastructure (PKI), Virtual Private Network (VPN), Malware Analysis, and Application Whitelisting.
RemoteExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Bachelor’s Degree – Information Security, Computer Information Systems, Network Security, Computer Science or a related field of study, preferred. General knowledge of system architectures and security concepts/techniques is required.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Strong understanding of cyber security technologies and strategies, including but not limited to: MITRE Telecommunication&ACK framework, attack surface management, security processes, best-practice logging/monitoring, OSINT and incident response.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience defining security monitoring rules, monitoring events, assessing risk, responding to incidents and providing security oversight related to the security features of IT tools supported by the IT operations teams; practical network and administration skills with Linux, Windows, cloud security, Active Directory, SIEM and security infrastructure (including Microsoft Sentinel and related technology stack, such as Microsoft Purview) are relevant; experience with scripting or automation.
Full-timeExpandApply NowActive JobUpdated 26 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Diagnose and correct issues with outside plant (OSP) network connectivity, including drop cabling, network interface units, patch panels, media cabinets, and Optical Network Terminals (ONTs.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Performs DNS related network security architecture, design, and integration on UNIX, Windows, Linux, or other Operating System (OS) configurations. Must be able to work shift work mid shift Active Secret Required 8570/8140 Certifications: Security CE Linux or Infoblox ITIL v3 Foundations (desired) Education: HS or GED (required) Bachelors or greater (preferred) 3 years related technical experience in Network and Transport technologies, tools, and techniques.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
An active DoD TS/SCI with Polygraph clearance or prior SCI/program eligibility Department of Defense Directive (DoDD) 8140 / 8570 Certification requirements (CompTIA Security CE or equivalent certification and an Operating System Certification Direct working experience with NISPOM, JAFAN, JSIG, DFARS and/or DoD/RMF Direct working experience with NISPOM, JAFAN, JSIG, and/or DoD/RMF guidelines Experience with handling and working with classified information.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Freedom Financial Network is seeking a Customer Experience (CX) Product Owner for the Enterprise Applications Platform Team. This role provides vision, technical leadership, and overall responsibility for the Customer Experience product development efforts within IT and the Enterprise Applications team supporting our Genesys Cloud and Verint platforms.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
JPC - 8039 - Cyber Security Analyst - Des Moines, Iowa(Remote)Des Moines, IowaDuration: Long termThe Threat Intelligence Analyst will be responsible for collecting and disseminating CTI. They will compile reports and translate the content into actionable activities for SOC analysts, threat hunters, information technology staff, leadership etcService Definition:This position supports the Iowa Department of Management Division of Information Technology DOM DoIT) Security Operations Center (SOC.
ExpandApply NowActive JobUpdated Today
network security jobs Title: network system in Des Moines, IA
FEATURED BLOG POSTS
How to Write an Address Correctly: Explained with Examples
It's hard to imagine a scenario where a text or phone call just won't do these days. With communication at our fingertips, you may think learning how to write an address is a superfluous skill. But it's a skill that will come in handy when you need to fill out healthcare forms, ship a package, order food delivery, or even apply for new jobs.
What is Employment Participation Rate
According to economists, there are four factors of production that go into creating higher quality goods at lower prices. These are
How to Get Pay Stubs (From Previous Employee Also!)
Pay stubs are an important piece of document which shows your earnings in a given period, as well as any deductions made towards your health insurance or pension contributions. They’re also excellent for finding out how much your recent salary raise has bumped up your monthly net income.
How to Write a Job Description?
It might be tempting to overlook the importance of a well-written job description. After all, if you’ve posted job ads before and ended up with tons of resumes in hand, it’s easy to assume that this will always be the case, regardless of how your job ad reads. But, in reality, you really can’t take getting an influx of resumes for granted.
How to Get a W2 From Previous Employers
When tax time rolls around, the last thing you want to worry about is having to track down a W-2 from your former employer. Many times you won’t have to because the IRS requires companies to send these forms to all current and former employees who have earned more than $600 in the last year. Unfortunately, there are employers who don’t do what they’re supposed to. There are even times where something else may happen that prevents the W-2 from getting where it’s supposed to go.
How to Ask Someone to be a Reference + Email Templates
One part of the job-hunting process that frequently gets overlooked is putting together a list of good references. Most of the time we focus on creating the perfect resume, writing an awesome cover letter, and getting our hands on letters of recommendation. We think about what outfit we’ll wear to the job interview, how we’ll answer those tricky questions, and what our career plan looks like. But, in fact, having multiple references lined up who will speak favorably about you to a potential employer is critical to landing a job. This aspect of job searching really can’t be ignored.
Job Rejection Email Response with Examples
Glassdoor estimates that, on average, there are about 250 applicants for every job vacancy out there. If you’ve ever applied for a job, the odds are that you’ve received the dreaded job rejection email.