- UpvoteDownvoteShare Job
- Suggest Revision
Experience with security architecture design, including network security, firewalls, intrusion detection/prevention, and identity/access management. Design and implement cyber security solutions, including network security, endpoint protection, and identity and access management.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The IT Security Threat Engineer I is a front-line member of the Threat and Vulnerability Management team that has responsibility for detecting potential risks to the Stifel network and assets.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Applicants for this 10-month position must have administrative experience and be qualified to provide instruction in courses such as: Network Intrusion and Penetration Testing, Fundamentals of Networking, Digital Forensics I, II, & III, etc.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge and understanding of current/future Force tactical and strategic military communications networks, as well as the architecture, protocols, security, network management, and physics underlying these systems.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Diligently install and maintain analog and IP-based CCTV systems, network video management software, access control systems, intercoms, data cabling, and related devices and equipment. Join our hardworking team and help us deliver exceptional service and solve complex physical security problems.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Perform DoD RMF Access Control security control group STIG/SRG audits on unclassified and classified Active Directory network account OUs. Perform Enhanced Trusted Agent (ETA) responsibilities for issuing and maintain PKI hardware tokens to CCDC-CBC personnel for classified systems.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Direct and/or participate in the testing phase of security controls assessments using specialized knowledge of network protocols, operating systems, architectures, equipment, services, and standards.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
14 years of IA System Architect and Engineer (IASAE) experience, to include recent experience within the last 5 years, with Defense-in-Depth principles and technology, including access/control, authorization, identification and authentication, Public Key Infrastructure (PKI), network and enterprise security architecture.
Full-timeExpandApply NowActive JobUpdated 13 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Review and advise on proposed network and system architecture plans to ensure proper system integration and system security, focusing on a diverse range of systems such as LANs, WANs, VoIP Networks, Identity and Access Management systems, and AWS cloud-based systems.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Network Security Engineer (INFOSEC) The incumbent serves as an Information Technology Specialist analyzing and defining IT systems security requirements, implementing solutions, planning and tracking projects, and coordinating inter-agency efforts in the areas of network, security, and inter-operability.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
We specialize in Cyber Security, Application Development, Network Operations, Cloud Services, and Mission-Focused Training Support. Relevant IAT LEVEL III certifications, such as Certified Information Systems Security Professional (CISSP) or Certified Information Security Manager (CISM.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Effectively design, develop, engineer, and implement access management and control network security solutions. Oversee and improve network security. Certification: CompTIA Security+ or equivalent certification required.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The selected applicant will serve as a computer network security analyst, tasked with securing a variety of systems and software suites in USCYBERCOM. The selected applicant will plan, implement, upgrade, or monitor security measures for the protection of computer networks and sensitive information.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience developing/implementing integrated security services management processes, such as assessing and auditing network penetration testing, anti-virus planning assistance, risk analysis, and incident response.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
SRG is seeking an experienced Computer Network Defense/Incident Response Engineer to join our team of Cyber Operation Analysts and Subject Matter Experts (SMEs) to support planning, coordination, synchronization, and execution of offensive and defensive cyberspace operations in support of aligned combatant command and designated sub–unified commands.
ExpandApply NowActive JobUpdated 6 days ago
network security jobs Title: security in Baltimore, MD
FEATURED BLOG POSTS
The Effects of Workplace Racism and Sexism
One day it's a covert statement to a mother returning to work after maternity leave. Another day it's a lingering gaze at an employee enjoying a culturally rich meal. These microaggressions (or sometimes macroaggressions) can take an employee from a confident, high-performer to one that feels insecure being themselves at work. Your employees engage with people with different ideas and feel most comfortable and valued when they can work without losing their cultural, racial, and gender identity. While most employers know this, why have workplace racism and sexism often been neglected?
When Rage Applying Strikes: How to Identify Unserious Candidates
As the job market remains highly competitive, we have seen a surge in "rage applying." This is when candidates apply to multiple jobs, often without considering whether they are truly interested in the role. Rage applying goes hand-in-hand with quiet quitting. Often, employees want to entertain the thoughts and feelings of leaving their job, but they aren't necessarily serious about leaving yet. Meanwhile, other employees engaging in this trend are actually trying to find a better role. As a recruiter, it can be hard to identify who are the real applicants in a sea full of quiet quitters, but understanding rage applying and identifying red flags will certainly help.
How to Increase Job Ad Exposure
In today's competitive job market, writing quality job ads is critical for attracting top talent to your organization. While networking and candidate referrals are prime real estate for finding qualified candidates, nothing beats the tried-and-true method of writing an extraordinary job ad. But while writing a great job ad is the first step, what's more important is increasing visibility. You could have the most detailed, well-written ad on the internet, but if no one sees it, then you are wasting time (and potentially money!). Employers often believe that job boards are the root of the problem, but you can learn how to increase job ad exposure by tweaking a few steps of your recruitment process.
How to Navigate Hiring Out of State
The job market has shifted significantly in recent years. The accelerated adoption of technology has not only pushed many companies into remote working arrangements but also increased the availability of supporting tools and technologies (i.e., video conferencing and collaboration software).
Building a Candidate Pipeline Through Internships
Building a candidate pipeline through a great internship program for local college students and recent graduates at local universities is a great and cost-effective way to attract and retain top talent. By offering meaningful and impactful work experiences, regular feedback, coaching, and mentorship, you can create a positive internship experience that will make your organization a sought-after destination for future employees. This not only benefits the organization in the short-term but also in the long-term, as you'll have a pool of well-trained and experienced candidates who may be interested in full-time employment once they graduate. Furthermore, building relationships with local universities and college students can increase brand awareness and build a positive reputation for your organization in the local community.
Hiring Transparency
Transparency in hiring refers to the open and honest communication and information sharing that takes place between employers and job candidates. It encompasses all aspects of the hiring process, from posting job descriptions to providing feedback on performance during and after the interview process. In today's job market, hiring transparency has become increasingly important for both employers and candidates alike.
Recruitment strategies that are weird, but actually work
In the current candidate-driven job market, recruiters are looking for unique ways to attract talent. Some have resorted to even (dare we say it?) recruitment strategies on the border of weird and wacky. What can we learn from the unusual recruitment tactics that are being used and actually getting results? Here’s a rundown of some unique recruitment strategies that actually work.