- UpvoteDownvoteShare Job
- Suggest Revision
Customers trust us to provide a portfolio of turn-key systems, products, and services — including two-way radio communications, vehicle uplift, security video and access control systems, BDA/DAS, remote monitoring, GPS tracking, SCADA, dispatch, mass notification, and point-to-point wireless networks.
Full-timeExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This position provides support for nuclear site process computers, various plant control and data acquisition systems such as the Distributed I&C System Platform (DICSP), Emergency Response Information system (ERFIS), Waste Process Computer System, Security Computer system, OSI/PI Systems, Security Event and Information Management System (SIEM), Plant Network System, Emergency Preparedness System (EPNET) and Simulator ERFIS and DICSP systems as required.
Full-timeExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with other IAM technologies (Okta, IBM Security Identity Manager, Security Access Manager) and frameworks. § Lead the design and implementation of SailPoint IGA solutions, ensuring they align with organizational security policies and industry standards.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Designing and implementing controls with Microsoft Defender suite, AWS security hub, Google Cloud Security command center, and equivalent security tools. At least one Industry-recognized cloud security certification (CCSP, CCSK, CCC-PCS, etc.
Full-timeExpandApply NowActive JobUpdated 16 days ago - UpvoteDownvoteShare Job
- Suggest Revision
One or more of the following professional certifications preferred: Certified Information Systems Security Professional (CISSP), Certified Information Security Auditor (CISA), Certified Information Security Manager (CISM), Certified in Risk and Information Systems Controls (CRISC), or Certified in Governance, Risk and Compliance (CGRC.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This position will be responsible for creating Project Approval Request (PAR) financial analysis for executive review, identifying expense impact to budget and tracking project spend based on approved PAR. We partner with multiple IT and business organizations domestically and internationally, including: Global Infrastructure Services, Engineering, Service Operations, Application Maintenance & Support, IT Risk and Security, Enterprise Architecture, and Corporate Real Estate.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of common security technologies and tools including network-based (firewall and IDS), host-based (EDR and AV), data-based (DLP and DSPM), and identity-based (PAM and IAM), gained through experience or study.
Full-timeExpandApply NowActive JobUpdated 2 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Specific components of NFRM including Transaction Processing Risk, Information Security Risk Management, IT Risk Management, Data and Record Retention, and Operational Resilience including Business Continuity and Crisis Management.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
CompTIA Network+, CCNA (or higher),CompTIA Security+, CompTIA, Linux+, CompTIA ITF, CompTIA A+, Certified Kubernetes Administrator, or LPI Linux Essentials. Detailed knowledge of common network protocols/architecture (TCP/IP, IP routing, OSI model, VLAN, etc), client/server networking environments and standard processes, managed switches, VOIP, and network security.
Full-timeRemoteExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Architecture, design, development, integration, and testing of embedded software for a network security appliances, including device management software, communication protocols, device drivers, and control plane security features.
$246,000 a yearFull-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Reporting to the EVP, Chief Transformation & Administrative Officer, the Chief Information Security Officer (CISO) is responsible for developing and implementing an information security program that includes procedures and policies designed to protect enterprise communications, systems, and assets from both internal and external threats.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Certifications like: CERT's ITPM, Network+, Security+, CISSP, CISM, CFE, CISA, CPCI, CCP, and/or Six Sigma Greenbelt or Lean certification. This role is a part of Verizon Cyber Defense’s Insider Threat Operations (ITO) team under the Chief Information Security Office (CISO.
Full-timeExpandApply NowActive JobUpdated 17 days ago - UpvoteDownvoteShare Job
- Suggest Revision
We sell the latest AI technologies from Nvidia, Supermicro, Dell, HP, Microsoft, Google, Cisco, Lenovo, Apple, VMWare, Adobe, APC, IBM, Nutanix, EMC, Pure Storage, Samsung, Intel, Eaton, and all the hottest AI and Green Data Center, Virtualization, Energy Conservation, Cloud, Storage, Security, Wireless, SD Wan, Video, Identification, solar, and battery technologies.
Full-timeExpandApply NowActive JobUpdated 2 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Skill Mandatory Proficiency Level (1-5) Snowflake Object creation and Management Yes 4 Snowflake Connectivity Yes 4 UDF, Snowpipe Yes 4 User Management & RBAC Yes 4 Workload Analysis & Optimization Yes 4 Secure views, Account level Security Yes 4 Python, Azure, Unix Shell script, JavaScript Yes 3.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Sr. Azure Cloud Infrastructure Architect will also research and advise on the latest cloud trends and best practices while collaborating with various stakeholders to ensure successful cloud adoption, security, governance, monitoring, and risk management.
$82.63 an hourFull-timeExpandApply NowActive JobUpdated 25 days ago
security job Title: specialist Company: Jobot in Apex, NC
FEATURED BLOG POSTS
Why is Professionalism Important & How to Be Professional
You might have heard the word professionalism thrown around in the workplace, but do you know what it means? And do you know how to maintain professionalism no matter the circumstances?
Why Cover Letters Are Important & How To Write One | Job\Searcher
Most people completely waste their cover letter real estate. Your cover letter is another opportunity to speak directly about how your background and capabilities align with the opportunity you seek. It also allows you to introduce your personality a bit more than a resume does. So, why are cover letters important? Because you can stand out, big time, with a custom cover letter directed to the right person.
Hiring Again After Mass Layoffs
It's never an easy decision to let members of your staff go, but depending on the state of your business, mass layoffs may have been the only way to survive. Now that you're months into the future, you may find yourself itching to start hiring again after previous layoffs.
Into the Heart of the Ukrainian-Russian Conflict
The story of our US-Ukraine connection started when Kevin met Dave. Days away from quitting his last "real" job as a seafood plant manager, Kevin reconnected with a long-lost friend from high school. Little did he know, this long-lost friend was dating his soon-to-be business partner. After meeting Dave through their mutual connection, it didn't take long for the two to start bouncing business ideas off each other. The flow of creativity soon grew into a business partnership that has withstood the test of time.
Why Are Internships Important & How Can You Get One?
Internships are for college students or people who have just completed their degree. If you are a student or recent grad, you may be wondering how to land an internship. If you've never had one, you may even wonder if you need one. After all, didn’t you work in that call center while also doing exams? Or perhaps you’ve bartended your first year in college?
Why is Networking Important & How to Network Effectively
Even if you’ve worked hard to earn a degree from an impressive school, landing your dream job might still come down to who you know – otherwise known as networking. Lots of qualified candidates might apply for a job, but the person who gets it might very well be so-and-so’s sibling, friend, or kid. Sometimes the only way to get your foot in the door is to know someone.
Why Do Recruiters Ghost and What Can You Do About It?
Once you’ve finally mustered up the courage to find another job, leaning into the job hunt can feel scary and overwhelming. So, it does nothing to help your confidence when your outbox is full of unanswered follow-ups and interview requests. You thought that ghosting only happens on dating apps—so why do recruiters ghost, too? Recruiter ghosting is not an effective recruiting strategy, but sometimes it’s inevitable. How can you overcome such an unfortunate new career trend? Read on.