- UpvoteDownvoteShare Job
- Suggest Revision
Minimum of a bachelor's degree in Computer Science, Computer Information Systems, Information Security or related field experience. Have expert level knowledge in one or more of the following cybersecurity areas; security architecture, cloud security, risk management, compliance, security governance, networks, protocols, threat management, change management, vulnerability management and overall cyber security best practices.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Bachelor s degree or higher from an accredited college or university in Computer Science, Cyber Security, Information Technology, Software Engineering, Information Systems, or Computer Engineering degree; or a degree in a Mathematics or Engineering field.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
GuidePoint Security is a rapidly growing, profitable, privately-held value added reseller that focuses exclusively on Information Security. Hunt Team Members interact daily and provide support to the overall CSOC through a wide variety of industry leading capabilities and data sets to include Endpoint Telemetry data, Live Network Packet Capture, IDS/IPS, Security Orchestration, Automation, and Response (SOAR), Cyber Threat Emulation (CTE), and Data Analytics Platforms.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Help advance security operations technologies and processes through automation and integration of threat detection and protection solutions. Minimum of 3 years’ experience working with Security Operations Centers (SOCs), Incident Response teams, Cyber Threat Intelligence functions, and other members of the cyber defense mission, and awareness of security threats and defensive strategies within the critical infrastructure, including techniques, tactics, and procedures (TTPs) that threat actors utilize to attack an organization.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Coordinates with Security and Installations Directorate (SI) Office of Counterintelligence (SIC), Insider Threat Office (SIII), in addition to other law enforcement and counterintelligence personnel as required to perform advanced investigation and triage of incidents.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
LI-DRR #RSS low voltage, security systems, software house, ccure, c-cure, access management, ip camera, cctv, surveillance, security alarm, nvr, genetec, access control, video systems, exacqvision, edvrclient, omnicast, synergis, hd camera, video management, ip video, access camera, dsc, siveillance, verint, powerseries, powerg, intrusion, network video, xprotect, vms, securos, Electrical wiring, avigilon, genetec security center, onssi, lenel onguard, bosch.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Deep understanding of information security principles and best practices, including regulatory compliance requirements (e.g., GDPR, HIPAA). We are searching for a seasoned and dynamic Chief Information Officer (CIO) to spearhead the information technology strategy and operations of our full-service, turnkey real estate, architecture, engineering, design-build, and construction firm.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Job Description ECOM’s Technology Solutions Group (TSG) is seeking an exceptional Mid-Level Information & Communication Technologies (ICT) Consultant to join our ICT Team. This position is also open to a remote working situation.
$85,000 - $105,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The functional capabilities are to provide the information technology (IT) infrastructure services required to deliver timely, relevant, and accurate support of national security. Develops, documents, and provides the Government incident investigation reports which include sufficient information to document the entire lifecycle of the incident and the response, including but not limited to adversary and friendly forces activity, host and network analysis, timelines, and recommendations for corrective actions, recommendations for new Tactics, Techniques, and Procedures (TTP) and other recommendations as appropriate, within 30 days of C-IRT stand-down.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
TCS will provide innovative design, engineering, procurement, implementation, operations, sustainment, and disposal of transport and cybersecurity IT services on multiple networks and security domains, at multiple locations worldwide to support the NGA mission.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
TGI believes that the next generation of geospatial scientific and technological advances will be essential in addressing national security and promoting peace, tackling climate change, realizing true food security and sustainability, and facing global health crises.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Senior Information Security Engineer plays a crucial role in maintaining the security posture. This job description outlines the key responsibilities and qualifications for the role of an Information Security GRC Analyst.
RemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
You will work closely with Vice President & Chief Information Security Officer. A Bachelor's degree in IT related field preferred (Computer Science, Information Systems, Cyber Security.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Collaborating with cross-functional teams, including Finance, the Office of the Chief Data Officer, the Office of the General Counsel, Business Services Technology, Network Information Security, Internal Audit, and other firm functions to gather relevant data and establish data integrity for analysis.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Research, write, and coordinate news/feature articles or other communiqus, as assigned by the Chief Information Security Officer and TES leadership team. Plan and execute communications tasks as identified and assigned by the Chief Information Security Officer and TES leadership team.
Full-timeExpandApply NowActive JobUpdated Yesterday
information security jobs Title: scrum master Company: Boeing in St Louis, MO
FEATURED BLOG POSTS
5 Common Interview Mistakes
Everyone's interview process is unique in some form or fashion. Like most, your interview process is crafted so you can get the most information out of your candidates to increase hiring confidence and make the right hiring decisions. However, there are often small problems in interview processes that could ultimately affect the success of hiring decisions.
What is Employment Participation Rate
According to economists, there are four factors of production that go into creating higher quality goods at lower prices. These are
How to Get Pay Stubs (From Previous Employee Also!)
Pay stubs are an important piece of document which shows your earnings in a given period, as well as any deductions made towards your health insurance or pension contributions. They’re also excellent for finding out how much your recent salary raise has bumped up your monthly net income.
How to Write a Job Description?
It might be tempting to overlook the importance of a well-written job description. After all, if you’ve posted job ads before and ended up with tons of resumes in hand, it’s easy to assume that this will always be the case, regardless of how your job ad reads. But, in reality, you really can’t take getting an influx of resumes for granted.
How to Get a W2 From Previous Employers
When tax time rolls around, the last thing you want to worry about is having to track down a W-2 from your former employer. Many times you won’t have to because the IRS requires companies to send these forms to all current and former employees who have earned more than $600 in the last year. Unfortunately, there are employers who don’t do what they’re supposed to. There are even times where something else may happen that prevents the W-2 from getting where it’s supposed to go.
How to Ask Someone to be a Reference + Email Templates
One part of the job-hunting process that frequently gets overlooked is putting together a list of good references. Most of the time we focus on creating the perfect resume, writing an awesome cover letter, and getting our hands on letters of recommendation. We think about what outfit we’ll wear to the job interview, how we’ll answer those tricky questions, and what our career plan looks like. But, in fact, having multiple references lined up who will speak favorably about you to a potential employer is critical to landing a job. This aspect of job searching really can’t be ignored.
Job Rejection Email Response with Examples
Glassdoor estimates that, on average, there are about 250 applicants for every job vacancy out there. If you’ve ever applied for a job, the odds are that you’ve received the dreaded job rejection email.