- UpvoteDownvoteShare Job
- Suggest Revision
Including CEH, CySA+, GICSP, SSCP, CHFI, CFR, Cloud+, or CND Certification. Host-based Security System, Endpoint Security Suite (ESS), Splunk, Cribl, ACAS, and network. -Experience with Cloud services, including AWS, Azure, or GCP.
Full-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
They will apply their skills and experience to provide the support and expertise needed to get cloud-based applications to GSA customers and keep them compliant with Federal and GSA security requirements.
$83,600 - $125,400 a yearExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Certification as an Azure Solutions Architect, Cloud Security Certification, and/or OpenStack. Manage and Support cloud environments in accordance with company security guidelines.
RemoteExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
A track record of commitment to prior employers 5+ years total experience in a technical role such as security, network, systems, or software engineer with at least 3 years focused on IAM. 3+ years of experience engineering IAM solutions in AWS, Azure, or a large scale IdP implementation (Entra ID, Okta, Ping, etc) 3+ years of experience work with SIEM and advanced logging/correlation tools.
Full-timeExpandUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Establish and maintain Azure cloud security governance by integrating DoD security policies with Azure management tools, ensuring compliance with DoD RMF requirements. Our core competencies are (1) Systems Engineering & Integration Services; (2) Information Technology Services; (3) Information Assurance & Cyber Security Services; (4) Cloud Services; (5) Business Services and (6) Products.
ExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Implement DevSecOps principles and related technologies using PO directed tools such as Git, PowerShell, Ansible, Ansible Tower, Windows and Linux server administration, Continuous Integration/Continuous Delivery (CI/CD) pipelines, Amazon Web Services (AWS) Elastic Computing Cloud (EC2), Microsoft Azure Cloud Computing Services, cloud storage, REST (Representational State Transfer) application programming interfaces (REST APIs) and the Atlassian suite of tools (Jira, Confluence, and Bitbucket.
$80,000 - $100,000 a yearFull-timeExpandUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Must possess one of the following certifications: CASP+ CE, CCNP Security, CEH, CFR, CHFI, CISA, CISSP (or Associate), Cloud+, CND, CySA+ , GCED, GCIH, GICSP, SSCP. Must be a US citizen.
Full-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
IAT Level II Baseline Certification (e.g. CCNA Security, CySA+, GICSP, GSEC, Security+ CE, CND, SSCP) As part of this task order, Leidos will manage the commercial cloud migration and disestablishment of legacy systems, fully automate the continuous development & continuous integration environment, fourth estate consolidation, professionalize services - ITIL/DevSecOps based processes, improve the customer experience 1st call resolution, and achieve development of a service catalog for Defense Working Capital Fund (DWCF) Model.
Full-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
As a Network Engineer , you’ll be responsible for designing, implementing, and managing complex network infrastructure to ensure the security, scalability, and efficiency of our government clients' cloud-based networks, with the goal of making an impact across the federal government.
Full-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Hands-on data engineering experience building solutions to extract, load, and transform raw data in the form of several hundred, small data files and web scrapings with a variety of formats using a combination of Python scripting and AWS cloud services such as S3, Glue, Crawlers, Lambda, Step Functions, Redshift, DynamoDB, etc.
RemoteExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience in one or more cloud computing services and technologies including but not limited to: AWS/C2S, Microsoft Azure, Nutanix, VMware. Maximus is searching for a Cyber Security Engineer to join a DoD program based in Arlington, VA.
ExpandUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
The InfoSec Third Party Risk Manager manages, plans, and assesses oversight of information security controls. A variety of technologies and practices are used including cloud computing, automation, artificial intelligence and machine learning within highly collaborative Agile teams.
$144,000 - $168,000 a yearFull-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Our senior consultants provide support in Cybersecurity, Cloud Security, Application Security, DevSecOps, Network Security, Data Security, Threat and Vulnerability management, Identity and Access Management, Encryption, PKI / CLM Architecture, Technology Risk Management, GRC Solutions, IT Audit, IT Compliance, IT Controls Integration, IT Compliance, Report and Certification preparation and remediation, and Advisory services on program design, build, review, and modernization.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Public cloud architecture design / operation - AWS preferredCloud native architecting, operations, and governanceConfig-driven (IaC) deployment, and scalable configuration management and governance (policy as code)Interpret regulatory security mandates into technical security controls and implementationsContainer (cluster) based operation.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Research and create a comprehensive strategy for cloud-native security (i.e., data classification and categorization; data segmentation; server access control; resources-based access control and access control lists; user identity access management and attestation; data-at-rest encryption; data-in-transit encryption; encryption key management, logging, auditing, and anomaly detection; and role-based access control.
ExpandUpdated Yesterday
cloud security jobs in Suitland, MD
FEATURED BLOG POSTS
How to Write an Address Correctly: Explained with Examples
It's hard to imagine a scenario where a text or phone call just won't do these days. With communication at our fingertips, you may think learning how to write an address is a superfluous skill. But it's a skill that will come in handy when you need to fill out healthcare forms, ship a package, order food delivery, or even apply for new jobs.
What is Employment Participation Rate
According to economists, there are four factors of production that go into creating higher quality goods at lower prices. These are
How to Get Pay Stubs (From Previous Employee Also!)
Pay stubs are an important piece of document which shows your earnings in a given period, as well as any deductions made towards your health insurance or pension contributions. They’re also excellent for finding out how much your recent salary raise has bumped up your monthly net income.
How to Write a Job Description?
It might be tempting to overlook the importance of a well-written job description. After all, if you’ve posted job ads before and ended up with tons of resumes in hand, it’s easy to assume that this will always be the case, regardless of how your job ad reads. But, in reality, you really can’t take getting an influx of resumes for granted.
How to Get a W2 From Previous Employers
When tax time rolls around, the last thing you want to worry about is having to track down a W-2 from your former employer. Many times you won’t have to because the IRS requires companies to send these forms to all current and former employees who have earned more than $600 in the last year. Unfortunately, there are employers who don’t do what they’re supposed to. There are even times where something else may happen that prevents the W-2 from getting where it’s supposed to go.
How to Ask Someone to be a Reference + Email Templates
One part of the job-hunting process that frequently gets overlooked is putting together a list of good references. Most of the time we focus on creating the perfect resume, writing an awesome cover letter, and getting our hands on letters of recommendation. We think about what outfit we’ll wear to the job interview, how we’ll answer those tricky questions, and what our career plan looks like. But, in fact, having multiple references lined up who will speak favorably about you to a potential employer is critical to landing a job. This aspect of job searching really can’t be ignored.
Job Rejection Email Response with Examples
Glassdoor estimates that, on average, there are about 250 applicants for every job vacancy out there. If you’ve ever applied for a job, the odds are that you’ve received the dreaded job rejection email.