- UpvoteDownvoteShare Job
- Suggest Revision
Oversee the deployment, management, and maintenance of security solutions including endpoint Detection and Response (EDR), Network Detection and Response (NDR), Email Security Systems, Data Loss Prevention (DLP), Vulnerability Management Systems, Security Information and Event Management (SIEM), and Single Sign-on/Multi-Factor Authentication (SSO/MFA.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Certified CEH, GSEC, CISM, Comp TIA Security +, CISSP, CISA, SSCP, CASP+, OSCP. 12 years of experience in related field, including any combination of the following: threat modeling, secure coding, identity management and authentication, software development, cryptography, system administration and network security, cloud computing.
$185,130 a yearFull-timeRemoteExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Develop expertise on the Capital One threat landscape using internal data, threat trends, and operational metrics to clearly communicate the Capital One threat landscape to senior executives, to include the Chief Information Security Officer and Chief Information Officer.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Working experience in security technologies such as: Security information and event management (SIEM), IDS/IPS, Data Loss Prevention (DLP), Proxy, Web Application Firewall (WAF), Endpoint detection and response (EDR), Anti-Virus, Sandboxing, network- and host- based firewalls, Threat Intelligence, Penetration Testing, etc.
$141,000 a yearExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience in a technical role in the areas of Security Operations, Threat Intelligence, Penetration Testing, Red Teaming, Purple Teaming, Threat Hunting or Incident Response. Experience working with Windows security logging in either a forensic, threat hunt, incident response investigation, or red team operational security research capacity.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
POSITION SUMMARY:The Cybersecurity Engineer IV, or Cybersecurity Expert, is on a leadership tract and a senior IT security staff grade within the information security framework. ALL OTHER DUTIES AS ASSIGNEDEXPERIENCE/QUALIFICATIONS:Minimum Degree Required: Bachelor's Degree In Computer Information SystemsPreferred Degree: Master's Degree in Cyber SecurityCertificate(s) or License(s): Multiple professional certifications in IT security and/or audit acquired or obtainable within 6 months required; CISSP, CISM, CISA, GIAC, GSEC, CSSP, CCIE-Sec, CEH, PCI ISA, etc.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
AEI passionately invests in our brilliant talent by allowing for personal and professional growth through supporting clients like NASA; the National Institutes of Health and Cone Health System; the US Department of Homeland Security and US Department of Energy; and Stanford University and the California Institute of Technology.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Leading the design, build, migration, and testing of OneStream for multi-dimensional data models (dimensions, hierarchies, attributes); input template and report build; Data Integration and Extract Transform and Load (ETL) concepts; understanding of calcs (allocation, top-down spreading, currencies); and, workflow, data permissions and security.
Full-timeExpandApply NowActive JobUpdated 24 days ago - UpvoteDownvoteShare Job
- Suggest Revision
These Red team activities include Intelligence Gathering, Network/Operating System/Application Penetration Testing, Web Application Penetration Testing, Mobile Application Testing, Social Engineering, Basic Emissions/Signals Testing, Physical Security Testing, Command and Control (C2) Infrastructure Development, Cyber Defense Evasion Stealth techniques, etc.
$170,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Prior ERT, military, law enforcement or executive protection experience providing physical security, emergency response, surveillance detection, secure transportation. Crisis24 Global Protective Solutions is a dynamic security firm innovating threat assessment and public figure protection.
$31 an hourFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Keywords: Chicago IL Jobs, Network Security Engineer III, Cybersecurity, Network Engineering, Information Security, Cisco, Switches, TCP/IP, MPLS, BGP, VoIP, DHCP, DNS, Wifi, VLANs, Networking, Chicago Recruiters, Information Technology Jobs, IT Jobs, Chicago RecruitingLooking to hire for similar positions in Chicago IL or in other cities.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
10+ years of experience working in USG preferably with NSA or in a CFIUS related agency or Consulting National Security or Risk Mitigation Practice Compliance professional and/or Information Security or a related field, either in professional services or industry.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Technology Consultant - Cyber Security - Identity & Access Management (IAM) (Manager) (Multiple Positions), Ernst & Young U.S. LLP, Chicago, IL. Must have a Bachelor’s degree in Computer Science, Information Systems, Engineering, or a related field and 5 years of progressive, post-baccalaureate consulting experience in Cyber Security and/or IAM. Alternatively, will accept a Master’s degree in Computer Science, Information Systems, Engineering, or a related field and 4 years of consulting experience in Cyber Security and/ or IAM.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Capital One’s Offensive Security Purple Team reduces cyber risk by uncovering vulnerabilities and weaknesses in the enterprise cyber environment by conducting covert/overt adversary simulation and emulation.
Full-timeRemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with AWS, Microsoft Azure or Google Cloud Platform configuration and administration of security features and services (including identity and access management, networking, firewalls, encryption.
Full-timeExpandApply NowActive JobUpdated Today
security job Title: devops engineer Company: Insight Global in Chicago, IL
FEATURED BLOG POSTS
How to Ask for a Letter of Recommendation
When the job board you subscribe to finally posts your dream job, you may feel like the stars have aligned. But part of securing a position that matches your career plan is ensuring you address all the application basics. You know, the resume, the cover letter, the portfolio. It seems like you've got this in the bag — until you realize they want a letter of recommendation, too!
16 Tech Jobs You can Get Without a College Degree
You might think that if you don’t have a computer science, information technology, or related degree, then there’s absolutely no way you can break into the technology field and score a high-paying tech job. But this is a misconception. There are actually tons of tech jobs out there that don’t require a college degree. Instead, employers are more interested in the skills that you can offer. So, read on to learn more about how to land tech jobs without a degree.
What Are SMART Goals?
When it comes to achieving our goals, there’s a lot of noise to work through. A study by the University of Scranton has found that only 8% of people who set New Year’s resolutions actually achieve them. Our busy lives might be one reason for this. Another, even more important reason, is our approach to goal setting. Being too vague, too ambitious or simply unclear on the timeframe can set us up for failure.
How Long Do Background Checks Take for Pre-Employment
Many jobs require a background check. For some companies, this is a matter of company policy. In other jobs, such as finance, childcare, and security, the government often requires background checks. While there are varying levels of intensity, for most people, a background check is nothing to worry about. In fact, the biggest question is often how long does a background check take? Here’s what job seekers and applicants need to know about background checks before they apply to new jobs.
The Best Remote Jobs: Where & How to Find Them
The Covid-19 pandemic hasn’t been easy on any of us, but if there’s one silver lining, it’s the fact that remote work has grown in popularity because of it. Companies that previously weren’t open to their employees working remotely were suddenly forced into allowing it. Since then, they've realized that much of their workforce is happier and more productive. Naturally, this has led to more remote job openings, which is great if you’re interested in this type of position. Read on to learn more about the best remote jobs and where to find them.
In-House vs Outsourcing Recruiting: Which is Better?
When looking at in-house vs outsourcing recruiting, it is important to nail down the benefits for each and whether those benefits outweigh the risks that follow.
How to Write a Short Bio
First impressions can be tricky. When meeting someone in person, it’s likely you have an elevator speech. These short, practiced introductions can help you share more about who you are, what you do for work and other facts about you. While this works well in a live, in-person context, there are many cases where professionals “meet” someone via written form - like social media, a resume, or published work. In these cases, your bio works as your first impression. So, here’s a step-by-step guide on how to write a short bio.