- UpvoteDownvoteShare Job
- Suggest Revision
Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance , and/or systems engineering.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Bachelor's Degree in Computer Science/Computer Engineering, Information/Network Security, Cyber Security or related field intelligence (CTI) or a related field OR equivalent experience in lieu of degree.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
CCNA , CCNP, CCT, CompTIA Network+, CompTIA Security+, and Versa Certified SD-WAN Associate certifications. At least 3 years of experience with Vulnerability Management and patching.
$160,200 a yearExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Twelve (12) years of experience in security, systems engineering or system assessment, including recent experience within the last three (3) years in five (5) or more of the following areas: Cybersecurity principles and technology, including access/control, authorization, identification and authentication, PKI, network and enterprise security architecture is required.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Senior Cyber Security Vulnerability Management Analyst will be expected to conduct formal tests on web-based applications, networks, and other types of computer systems on a regular basis and determines/documents deviations from approved configuration standards and/or policies.
RemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Additional experience in engineering hardware and/or software, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and systems engineering, or system administration is required.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Of experience in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Five (5) years of experience in security, systems engineering or system assessment, including recent experience within the last three (3) years in the following areas: Cybersecurity principles and technology, including access/control, authorization, identification and authentication, PKI, network and enterprise security architecture is required.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience : Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with Configuration, management, and optimization of Network Intrusion Detection Systems and Host-based Intrusion Detection Systems to include fine-tuning security rule sets for tools such as Suricata, Snort, Yara, and Sigma.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Strong understanding of cyber threat actor motivations, TTPs, cyber kill chain, vulnerability threat intelligence, and MITRE ATT&CK framework. Collaborate with security operations, incident response, and IT teams to integrate threat intelligence into security processes.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Planate is a small business provider of planning, design, infrastructure management, technical consulting, engineering, and construction management services in support of the US Department of Defense (DOD) and its service (Army, Air Force, Navy, Marine Corps) missions, along with other federal agencies, all over the world.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Architect and implement change-data-capture (CDC) replication for unique disparate datasets of records into Spark ML for deduplication and graph theory entity/identity grouping Architect a scalable, automated enterprise-wide Security Event Management framework—Splunk—to collect and analyze “events.
$110,000 - $150,000 a yearFull-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The National Security Sector of Leidos has a career opportunity for a talented Quality Assurance Manager for a high performing program supporting the Cyber & Analytics Business Area in the sector.
Full-timeExpandApply NowActive JobUpdated Today
network security vulnerability management jobs Title: engineer cyber security in Maryland
FEATURED BLOG POSTS
How to Pass a Personality Test with Flying Colors
Whether you’re applying for your first job or looking to move up the career ladder, personality tests aren’t usually the first thing we think about. But surprisingly, they can have a massive impact on how our future employers perceive us. In fact, a 2017 study by the Society for Human Resource Management (SHRM) has found that 32% of U.S. employers use personality tests when hiring for senior management positions, and 28% use them for middle management positions. Personality tests are also used for hourly workers and contractors, though less frequently.
Virtual Reality Job Interviews
With the advent of desktop computers, the arduous task of scouring through weekly job classifieds became a thing of the past. The mid-1990s brought about a new era where job seekers could easily search and apply for jobs online. The introduction of AOL's Instant Messaging feature provided an even faster means for employers and candidates to communicate and schedule interviews. As smartphones became more pervasive in the early 2000s, hiring managers increasingly used phone calls for screening and interviewing candidates. Despite this trend, over 80% of interviews still took place in person.
A Potential TikTok Ban?!
As you may already know, there has been a lot of talk lately about the possibility of a TikTok ban. While this has not yet come to fruition, it's important to consider the implications this could have for businesses and recruiters who rely on TikTok as a platform to market their brand, recruit new talent, and connect with their audience.
The Effects of Workplace Racism and Sexism
One day it's a covert statement to a mother returning to work after maternity leave. Another day it's a lingering gaze at an employee enjoying a culturally rich meal. These microaggressions (or sometimes macroaggressions) can take an employee from a confident, high-performer to one that feels insecure being themselves at work. Your employees engage with people with different ideas and feel most comfortable and valued when they can work without losing their cultural, racial, and gender identity. While most employers know this, why have workplace racism and sexism often been neglected?
When Rage Applying Strikes: How to Identify Unserious Candidates
As the job market remains highly competitive, we have seen a surge in "rage applying." This is when candidates apply to multiple jobs, often without considering whether they are truly interested in the role. Rage applying goes hand-in-hand with quiet quitting. Often, employees want to entertain the thoughts and feelings of leaving their job, but they aren't necessarily serious about leaving yet. Meanwhile, other employees engaging in this trend are actually trying to find a better role. As a recruiter, it can be hard to identify who are the real applicants in a sea full of quiet quitters, but understanding rage applying and identifying red flags will certainly help.
How to Increase Job Ad Exposure
In today's competitive job market, writing quality job ads is critical for attracting top talent to your organization. While networking and candidate referrals are prime real estate for finding qualified candidates, nothing beats the tried-and-true method of writing an extraordinary job ad. But while writing a great job ad is the first step, what's more important is increasing visibility. You could have the most detailed, well-written ad on the internet, but if no one sees it, then you are wasting time (and potentially money!). Employers often believe that job boards are the root of the problem, but you can learn how to increase job ad exposure by tweaking a few steps of your recruitment process.