- UpvoteDownvoteShare Job
- Suggest Revision
Must meet 8570 IAT II requirements to include one of the following certifications: CCNA Security, GIC SP, GSEC, Security+ CE, SSCP, CASP CE, CCNP Security, CISA, CISSP, GCED, GCIH, CSA.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Provide support to the Information System Security Manager (ISSM) for maintaining the appropriate operational IA posture for a system, program, or enclave. Information Systems Security Officer (ISSO) Skill Level 1: TS/SCI Full Scope Polygraph.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Provides configuration management (CM) for information system security software, hardware, and firmware. Bachelor's degree in Computer Science, Information Assurance, Information System Security Engineering, or other related discipline -OR.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
You'll be the maestro behind installing, troubleshooting, and enhancing operating system software, sculpting network components, and adding layers of reliability and performance. The badge of CompTIA Security+ CE is your armor, proving your dedication to safeguarding the realms of technology.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Provide support to the Information System Security Manager (ISSM) for maintaining the appropriate operational Cybersecurity posture for a system, program, or enclave. Assist with Configuration Management (CM) for information system security software, hardware, and firmware.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Hoplite Solutions is seeking Information Systems Security Officers (ISSO) to join us on a contract being awarded in June of 2024. Provides configuration management for security-relevant information system software, hardware, and firmware.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Dezign Concepts and Triune Solutions have formed a strategic partnership aimed at sourcing skilled IT professionals for the National Security Agency (NSA). Administer and maintain product security, integration, and optimization within the AWS platform.
Full-timeExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Applicants selected may be subject to a U.S. Government security investigation and must meet eligibility requirements for access to classified information. Identity Management Specialist, Security Specialist, HUMINT Operations Specialist, Intelligence Operations Analyst, Signature Reduction Specialist.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Prepare synthesized product for customers by researching, analyzing, and reporting intelligence via appropriate reporting vehicles, in response to Intelligence Community (IC) requirements and in accordance with NSA missions of Signals Intelligence, Information Assurance and Computer Network Operations.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Be creative using information systems and information related capabilities (IRC); integrate with interagency and intelligence community (IC); develop innovative concepts to counter adversarial use of information in the Information Environment (IE), and consider significant or key cultural aspects that affect operational and tactical planning, security, and risk assessments.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Will also assist customers of the network in leveraging the security controls provided so they can rapidly deploy their applications. Provide Cloud Security Engineering input to programs throughout the lifecycle to ensure systems meet ICD-503 and Risk Management Framework (RMF) standards.
Full-timeExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
CSWOs are principally engaged in the triage of events, cyber incident handling, network analysis and threat detection, trend analysis, metric development, vulnerability information dissemination, and the DoD Cyber Security Service Provider (CSSP) methodology.
Full-timeExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Configuring firewalls, load balancing, routing, and switching to maximize network efficiency and security. Designing and implementing network solutions, topologies, and services to ensure efficiency, security, and reliability of current networks.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Mission Technologies a division of HII - Cyber Electronic Warfare and Space (CEWS) provides full-spectrum cyber, EW and space capabilities that address today's rapidly changing, multi-domain global security threats, and anticipate emerging threats.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with network security practices and technologies (e.g., firewalls, IDS/IPS). Ensure network security through the implementation of appropriate measures and protocols.
$190,000 a yearExpandApply NowActive JobUpdated Yesterday
network security jobs Title: information security architect Company: Experis in Castine, ME
FEATURED BLOG POSTS
Learn How to Respond to an Interview Request With Templates
Job interviews are an inevitable part of any job search. So, handling them well is key to building a fulfilling career. Regardless of whether you’re looking at a more junior role or strive for a role as a business executive, you need to maintain your professionalism every step of the way in order to stay in the game.
How to Write an Address Correctly: Explained with Examples
It's hard to imagine a scenario where a text or phone call just won't do these days. With communication at our fingertips, you may think learning how to write an address is a superfluous skill. But it's a skill that will come in handy when you need to fill out healthcare forms, ship a package, order food delivery, or even apply for new jobs.
How to Write a Job Description?
It might be tempting to overlook the importance of a well-written job description. After all, if you’ve posted job ads before and ended up with tons of resumes in hand, it’s easy to assume that this will always be the case, regardless of how your job ad reads. But, in reality, you really can’t take getting an influx of resumes for granted.
How to Get a W2 From Previous Employers
When tax time rolls around, the last thing you want to worry about is having to track down a W-2 from your former employer. Many times you won’t have to because the IRS requires companies to send these forms to all current and former employees who have earned more than $600 in the last year. Unfortunately, there are employers who don’t do what they’re supposed to. There are even times where something else may happen that prevents the W-2 from getting where it’s supposed to go.
Structured vs Unstructured Interviews
The goal of an interview is to evaluate candidates based on their skills, personality, and knowledge. You want to choose the BEST candidate from your candidate pool, so the interview is something you can't mess up. As you begin planning your interview process, one of the major decisions you'll face is whether the interview should be a structured vs unstructured interview. So let's take a dive into the differences and sort out which circumstances warrant which interview process.
How to Describe Your Personality with Examples
Imagine you’re in an elevator with the CEO of your dream company and you get to talking. The conversation is going well and you start to imagine yourself working for their company when the CEO turns around and asks you “tell me a bit about yourself.” Would this catch you off guard or would you be able to give a clear and succinct description of who you are?
4 Ways to Make Your Job Posting More Inclusive
According to a Glassdoor survey,