- UpvoteDownvoteShare Job
- Suggest Revision
Design, configure, implement, troubleshoot, and maintain all security and health monitoring platforms and their associated software, such as firewalls (Security Groups), intrusion detection/intrusion prevention, anti-virus/malware (HBSS), SIEM (Splunk), Solarwinds, Nagios, native cloud services and MDM.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Background with System Administration, Network Administration Network Security, Networking Standards, Network Protocols, NIST/FISMA standards and controls, SIEM platforms and security tools, Network Hardware Configurations.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Professional security management certification is desirable, must be active/current, and v such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA), Certified Ethical Hacker (CEH), or other similar credentials.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The National Security Sector at Leidos is seeking an experienced Contractor Program Security Officer (CPSO) for a growing program to work at a Reston, VA site. FSO, CPSO or CSSO Security training/certificate(s.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Awareness and implementation of best practices related to the utilization of physical security systems, investigation techniques, effective oversight of contract security officers, and distribution center loss mitigation techniques.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Must hold at least one of the following certifications: CompTIA Security+, CISSP, ISACA CISA, GIAC GSEC, GIAC GSNA, GIAC GPEN, CEH, CAP, CASP+, CRISC, or CCSK. Knowledge of major cloud platforms (Azure/ Amazon Web Services [AWS]), virtualization, networking devices (e.g., routers and switches), web services (e.g., IIS, Apache Tomcat), network security appliances (e.g., firewalls, VPNs), databases (e.g., Microsoft SQL), and intrusion prevention/ anti-malware software.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Candidates must be referred for selection to the Border Patrol Agent position before reaching their 40th birthday in accordance with Department of Homeland Security Directive 251-03. Duty Locations Locations are offered based on operational requirements, mission requirements, and critical agency hiring needs as determined by AMO. The duty location listed in a final offer letter may include any geographic location within the Southeast Border Region, Caribbean Air and Marine Branch (CAMB), Southwest Border Region, and National Air Security Operation Centers (NASOC) Unmanned Aircraft System (UAS) locations.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Reports any security violations to the USG COMSEC Manager regardless of severity. Strictly adheres to U.S. DoD policies, National Advisory Group (NAG) 14C and 18A Doctrines, National Security Telecommunications and Information Systems Security Instruction (NSTISSI) 4000 Series, National Security Agency (NSA) COMSEC policies, and Combatant Command (COCOM) Memorandum of Agreements (MOAs.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Cloud Security Architect must have subject matter expertise in Security Architecture and Vulnerability Management and Network Defense. We are seeking a remote Cloud Security Specialist to join our team supporting the Security Architecture and Vulnerability Management Support Services contract for the National Oceanic and Atmospheric Administration's (NOAA) National Environmental Satellite, Data, and Information Service (NESDIS) information systems.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Responsibilities:Lead a team of security engineers for delivery of Cybersecurity project management, continuous diagnostics and mitigation, threat mitigation and incident response, security architecture support, critical infrastructure protection, patch management, vulnerability management, risk management, information assurance, penetration testing, cybersecurity services, and Security Assessment and Authorization (SA&A) documentation.
$101,400 - $183,300 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
ICF is growing, and we are hiring a Senior International Survey Manager to manage food security population-based surveys (PBS) around the world. ICF manages the USAID-funded Surveys for Monitoring in Resilience and Food Security (SMRFS) project as part of Feed the Future, the U.S. Government's flagship initiative to reduce global hunger and improve food security.
InternExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As part of our ongoing commitment to maintaining the highest standards of security and risk management, we are seeking experienced and talented Third-Party Risk Manager to join our Cyber Risk Management team.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
With employees in 13 states, and a 26-year partner to U.S. government agencies including the National Institutes of Health (NIH), Food and Drug Administration (FDA), Department of Homeland Security (DHS), Department of Justice (DoJ), and the Department of Commerce (DoC.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
AEI passionately invests in our brilliant talent by allowing for personal and professional growth through supporting clients like NASA; the National Institutes of Health and Cone Health System; the US Department of Homeland Security and US Department of Energy; and Stanford University and the California Institute of Technology.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As a successful graduate of the Small Business Administration's 8(a) program, we have evolved into a leading provider of expert services in our core competencies of Cyber Operations and Security, Marine Engineering and Design, Marine Services, and Business Management.
Full-timeExpandApply NowActive JobUpdated Today
security job Title: analyst Company: Vectrus in Rockville, MD
FEATURED BLOG POSTS
How to Get Pay Stubs (From Previous Employee Also!)
Pay stubs are an important piece of document which shows your earnings in a given period, as well as any deductions made towards your health insurance or pension contributions. They’re also excellent for finding out how much your recent salary raise has bumped up your monthly net income.
How to Write a Job Description?
It might be tempting to overlook the importance of a well-written job description. After all, if you’ve posted job ads before and ended up with tons of resumes in hand, it’s easy to assume that this will always be the case, regardless of how your job ad reads. But, in reality, you really can’t take getting an influx of resumes for granted.
How to Get a W2 From Previous Employers
When tax time rolls around, the last thing you want to worry about is having to track down a W-2 from your former employer. Many times you won’t have to because the IRS requires companies to send these forms to all current and former employees who have earned more than $600 in the last year. Unfortunately, there are employers who don’t do what they’re supposed to. There are even times where something else may happen that prevents the W-2 from getting where it’s supposed to go.
Structured vs Unstructured Interviews
The goal of an interview is to evaluate candidates based on their skills, personality, and knowledge. You want to choose the BEST candidate from your candidate pool, so the interview is something you can't mess up. As you begin planning your interview process, one of the major decisions you'll face is whether the interview should be a structured vs unstructured interview. So let's take a dive into the differences and sort out which circumstances warrant which interview process.
How to Describe Your Personality with Examples
Imagine you’re in an elevator with the CEO of your dream company and you get to talking. The conversation is going well and you start to imagine yourself working for their company when the CEO turns around and asks you “tell me a bit about yourself.” Would this catch you off guard or would you be able to give a clear and succinct description of who you are?
4 Ways to Make Your Job Posting More Inclusive
According to a Glassdoor survey,
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra: