- UpvoteDownvoteShare Job
- Suggest Revision
Must hold at least one of the following certifications: CompTIA Security+, CISSP, ISACA CISA, GIAC GSEC, GIAC GSNA, GIAC GPEN, CEH, CAP, CASP+, CRISC, or CCSK. Must hold at least one of the following certifications: CompTIA Security+, CISSP, ISACA CISA, GIAC GSEC, GIAC GSNA, GIAC GPEN, CEH, CAP, CASP+, CRISC, or CCSK.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Required Education: BS Computer Science, Cybersecurity, Computer Engineering or related degree; or HS Diploma and 10+ years of host or digital forensics experience Desired Certifications: - GCFA, GCFE, EnCE, CCE, CFCE, CISSP.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
IAM II (e.g. CISSP, CISM)DESIRED: Sub-field specific certifications. For example - cloud (e.g. CCSP, AWS Solutions Architect), offensive security (e.g. OSCP, GPEN), operating systems (Microsoft/Linux administration), etc.
$150ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Highly Desired Certifications: •Certification in network or system administration is highly desired, such as CCNA, CCNP, CCIE, CISSP, MCSE, MCSA, or other related and similar certifications. Monitor network infrastructure and systems using tools such as Cisco ISE, Cisco Umbrella, Cisco FMC, SSH, Microsoft Active Directory Tools and Utilities, Microsoft Intune, Kaseya, Cayosoft, RDP, and managing appliances including IDS/IPS devices, firewalls, VMware vCenter, Windows Servers, DHCP, DNS, and other tools as available or necessary.
$45 - $50 an hourFull-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Certifications such as ICAM/Okta, ServiceNow ITOM, ITIL, CISSP, or Knowledge-Centered Service (KCS). Certifications such as ICAM/Okta, ServiceNow ITOM, ITIL, CISSP, or Knowledge-Centered Service (KCS.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with Microsoft platforms, including M365 (Exchange Online, Endpoint Manager, Configuration Manager, Intune, Purview, Autopilot, Teams, SharePoint Online, Power Platform). The CTE will be responsible for managing eDiscovery, data holds, auditing and alert policies, and compliance risks.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Leading Security Certification preferred including CISSP, CEH, or GIAC related certifications a plus. Thousands of organizations worldwide, including Barclays, Cisco, eBay, Fairfax, ING, Goldman Sachs, Microsoft, The Mayo Clinic, NASA, The New York Times, Wikipedia, and Verizon, use Elastic to power mission-critical systems.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Possess and maintain in good standings at least one of the following professional certifications: ISC2 Certified Information System Security Professional (CISSP), CompTIA A+, CompTIA Security+, GIAC Information Security Professional (GISP), ISC2 Certified Authorization Professional (CAP), Active certification number is required for validation.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
GIAC Certified Intrusions Analyst (GCIA), GIAC Certified Incident Handler (GCIH) and Certified Information Systems Security Professional (CISSP) is preferred. Possess knowledge and experience across the information security domain such as Endpoint Security, SIEM, IDS/IPS, Packet Capture Analysis, Incident Response, and Cyber Threat Intelligence.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Desirable certifications include CISSP, SSCP, CEH, CISM, GPEN, GWAPT, GSEC, OSCP, OSCE, OSWE. Desirable certifications include CISSP, SSCP, CEH, CISM, GPEN, GWAPT, GSEC, OSCP, OSCE, OSWE. Ideal candidate will have comprehensive knowledge of Windows and UNIX-based system administration, network management and enterprise systems management and the ability to and maintain Linux-based operating systems as well as IDS/IPS, log management solutions and enterprise vulnerability assessment systems.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
You earned and maintain at least one of the following certifications: GIAC Certified Forensic Analyst (GCFA) GIAC Certified Forensic Examiner (GCFE) Encase Certified Examiner (EnCE) Certified Computer Examiner (CCE) Certified Forensic Computer Examiner (CFCE) Certified Information Systems Security Professional (CISSP.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
GCFA, GCFE, EnCE, CCE, CFCE, CISSP. Other EDR Tools (Crowdstrike, Carbon Black, Etc) personnel provide front line response for digital forensics/incident response (DFIR) and proactively hunting for malicious cyber activity.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Professional certifications such as Certified Internal Auditor (CIA), Certified Information Systems Auditor (CISA), Certified in Risk and Information Systems Control (CRISC), Certified Information Systems Security Professional (CISSP), Certified PRINCE2 Practitioner.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The CTE will support all Microsoft 365 privacy/data breach incidents, forensics, eDiscovery, and/or audits. Governance and Compliance - The CTE will lead all Microsoft Information Governance and Compliance capabilities to govern data for compliance and/or regulatory requirements, including the management of agency specific Microsoft 365 information governance, records management, and data connectors (as applicable) to support data retention and deletion requirements.
$70 an hourTemporaryExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Maintained information security /cybersecurity certifications (e.g. CEH, CISSP, CISM). Hands on experience in deploying security technologies such as Next Generation Firewalls, Intrusion Prevention, log collection / management, content filtering, Wireless Access controls, Citrix NetScaler, VDI technologies, Network Access Control, identity management technologies, cloud security technologies, data encryption technologies, virtualization security, and mobile application security.
ExpandApply NowActive JobUpdated Today
cissp job in Silver Spring, MD
FEATURED BLOG POSTS
Why is Time Management Important? 10 Crucial Importances of Time Management
We’ve all been there before. What starts as a relaxing evening scroll quickly becomes a full-blown binge. You blink, and it’s midnight - throwing off your entire next day before it even starts. And at its worst, this indulgence might leave you feeling behind on things you planned to finish that night. This is why time management is important.
Minimizing Candidate Renegs During the Hiring and Onboarding Process
Candidates reneging on job offers or during the onboarding process can be a frustrating experience for any recruiter. In a talent-driven job market, it’s common for candidates to have more than one job offer to consider. It becomes a race against time to see which organization can offer the best career experience, compensation, and circumstances that secure the right employees.
10 Reasons to Be on Time at Work
Being punctual at work may not be something you’ve given much thought to, but it’s the foundation for building a successful career. All of your technical or job-specific skills will be in vain if your peers and superiors can’t trust you to show up on time and do the work. In fact, Simon Sinek once famously said that
Recruiting in a Recession: Hard Truths That Talent Acquisition Experts Must Accept
The summer had economists from around the globe embroiled in a debate about a possible recession coming in the next few years (or months). As of October 2022, the U.S. Labor Department data put the current inflation rate at 7.7%. The recent layoffs in the tech industry are just the first of what is soon to be a string of cutbacks by companies looking to save costs. For recruiters, this means freezes in hiring and fewer openings. It will also include the uphill task of finding the best candidates for them from the coming influx of recently laid-off job seekers. Now is probably a good time to brace for tough times in the next few years in the talent acquisition industry. To survive and thrive recruiting in a recession, here are some hard truths you will need to accept.
10 Importancies of Setting Realistic Goals
We’ve all heard how important it is to set professional and personal goals. Developing and establishing goals keeps us motivated and moving forward in life. But not all goals are created equal. If you’re chasing goals that are too lofty, you’ll end up disappointed when you cannot reach them. Setting goals that are achievable and measurable is the key to success.
Email Etiquette Principles - Why is it Important
Why is email etiquette important? Let's imagine you're hiring for a new role, and you’ve just received the email below.
10 Reasons HR is Important to an Organization
"Nothing we do is more important than hiring and developing people."