- UpvoteDownvoteShare Job
- Suggest Revision
Leidos Health Mission Solutions is seeking a Security Team Lead on a large network services opportunity supporting the National Institute of Health (NIH) in the Bethesda, MD area. Demonstrated current and significant relationships with NIH, HHS or comparable civil government executives and mid-level managers, particularly in IT operations, network and security services.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Establish and maintain network infrastructure configurations to established standards and guidelines to ensure optimal monitoring, performance, and network security posture. In-depth understanding of common network security issues and industry security best practicesHands-on experience with enterprise grade network design and management.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Social network analysis, supply chain analysis, forensic accounting, pattern of life, natural language processing, social media analysis, classification algorithms, and/or image processing; Work closely with a tight-knit team of data scientists, as well as a larger team of software developers, digital forensic experts, network engineers, senior investigators, researchers, and data analysts to design, build, and optimize a Data Science platform to produce and analyze results, disseminate findings, and contribute to publications and presentations.
Full-timeExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Employee Incentives: Tuition reimbursement, employee referral program, year round employee events and community programs, discounts on Dish Network and HughesNet. Headquartered in Englewood, Colo., and conducting business around the globe, EchoStar is a pioneer in communications technologies through its Hughes Network Systems and EchoStar Satellite Services business segments.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Cloud Security Architect must have subject matter expertise in Security Architecture and Vulnerability Management and Network Defense. We are seeking a remote Cloud Security Architect Lead to join our team supporting the Security Architecture and Vulnerability Management Support Services contract for the National Oceanic and Atmospheric Administration's (NOAA) National Environmental Satellite, Data, and Information Service (NESDIS) information systems.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Minimum of seven (7) years of Network Security experience. Lead a team of security engineers for delivery of Cybersecurity project management, continuous diagnostics and mitigation, threat mitigation and incident response, security architecture support, critical infrastructure protection, patch management, vulnerability management, risk management, information assurance, penetration testing, cybersecurity services, and Security Assessment and Authorization (SA&A) documentation.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
SD-WAN network (Palo Alto Prisma tool REQUIRED ), going through each office and going through transformational refresh. Familiar with checkpoint firewall rules - accessing via portals. SD-WAN network (Palo Alto Prisma tool REQUIRED ), going through each office and going through transformational refresh.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The U. S. Department of Homeland Security, Federal Emergency Management Agency (DHS/FEMA) Personnel Security Division requires all disaster personnel to be U.S. citizens and be able to successfully pass a background investigation.
RemoteExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience in providing IT Infrastructure and security-related tasks for Chief Information Security Officer (CISO) or Information Systems Security Officer (ISSO). The candidate will be responsible for managing a team of IT Infrastructure Engineers, IT Security Engineers, and IT Service Desk Engineers.
Full-timeExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Qualified/ Security Analyst Penetration Tester (Q/PTL) from Security University. Qualified/ Ethical Hacker Certification (Q/EH) from Security University. Certified Application Security Engineer (CASE) from EC-Council.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Appropriate licensure or certification to work Armed Security in the state of the job location is required. GardaWorld Security Services is looking for Armed Security Officers to fulfill different assignments for our clients.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
An IAT Level III certification would also be acceptable (CASP+, CCNP Security, CISA, CISSP, GCED, GCIH, CCSP). GAI's team members work side by side with government IT executives and OEM partners to solve complex business problems such as AI/ML, RPA, Cyber Security, Big Data, Data Center & Cloud.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
Full-timeExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
We are seeking a talented Mid-Level Application Security Engineer to join our dynamic team and contribute to the security posture of our software development lifecycle. Collaborate with development teams to address and remediate dynamic security findings.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Expertise in various security technologies, such as firewalls and network segmentation, IDS, vulnerability/application scanning, and penetration testing. Current information security certification, including Certified Information Systems Security Professional (CISSP), PCI Internal Security Assessor (ISA), Certified Information Security Manager (CISM), or Certified Information Systems Auditor (CISA.
ExpandApply NowActive JobUpdated 8 days ago
network security jobs Title: network manager Company: Octo Consulting Group in Rockville, MD
FEATURED BLOG POSTS
How To Answer “Why Do You Want to Be a Supervisor” in an Interview
Anyone who has worked in a supervisor role knows how challenging yet rewarding it is. But chances are if you're trying to become a supervisor, you'll be forced to answer:
What is Career Cushioning?
Is your organization prepared for “career cushioning”?
Growing Discontent: Employees Wouldn't Wish Their Jobs on Their Worst Enemy
The start of a new year, and most people are already busy setting personal and professional goals. What’s on the top of the list for a growing number of working people is making an exit from the job they currently have. Why?
How to Gracefully Quit a Job You Just Started
You’ve just started learning the ropes at your new job, and you've gotten to know your colleagues. But you’re already thinking about quitting. Maybe you were deciding between to job offers and realized that you’ve made the wrong choice. Or, a change in your personal circumstances means that you have to quit.
How to Professionally Reschedule a Job Interview Without Destroying Your Chances
You’ve practiced answering common interview questions and refined your “greatest weakness.’ Nothing can stop you until BAM! The flu hits your household. Or you ran over a nail and popped a tire en route to the interview. When you need to pivot, there’s a good, better, and best way to reschedule a job interview. Here’s how to do it professionally, so you can nail the gig when the timing is right.
What is a W-9 and How to Fill One Out
When you began working for yourself, you probably didn’t account for the tax reporting work that will fall on your shoulders each year. If you’re a freelancer, independent contractor, or business owner, filing your taxes is not as simple as uploading your W-2 form into some online tax preparation software. Most self-employed people need to complete a W-9 as a step for accurately reporting their earnings to the IRS. Below, you can learn how to fill out a W-9 and when to submit it.
A Comprehensive Guide to Becoming a Better Conversationalist
Have you ever stood awkwardly next to someone at a party because you didn’t know what to say to them? How about at a networking event or on a first date? You're not alone if you’ve ever experienced this uncomfortable silence. Many people struggle to master the art of being a great conversationalist.