- UpvoteDownvoteShare Job
- Suggest Revision
A. Experience: At least one year of full-time work experience In the security Industry, aviation screening, or as an X-ray technician. Learn more about the Transportation Security Officer (TSO) role on the.
ExpandApply NowActive JobUpdated 21 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Key understanding of core Information Security Areas (ID & ACCESS Management, Threat & Vulnerability Management, Information Risk & Governance, Network and Application Architecture, Incident Response, Security Strategy, intrusion detection and response, secure software development, security architecture, security engineering, and IT compliance) in Cloud technology platforms like AWS, GCP, Azure or similar.
ExpandUpdated 28 days ago - UpvoteDownvoteShare Job
- Suggest Revision
NC DHHS - Privacy and Security Office (PSO) requiring services of an IT Security Specialist to perform application security testing, ethical hacking and vulnerability management of MES applications.
ExpandUpdated 28 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with data protection, cryptography, key management, identity, and access management (IAM), network security within SaaS, IaaS, PaaS, and other cloud environments. The Cyber Security Engineer - Threat Management is responsible for second level security event/incident response along with the collection, analysis, and dissemination of cyber threat intelligence.
ExpandUpdated 29 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Mission Statement:The Corporate Real Estate Analyst - Security Systems role reports to the America's Real Estate Lead and works with business units and corporate functions to enable business operations by providing and supporting end-to-end Physical Security Information Systems (PSIM) which includes Video Management System (VMS), Access Control System (ACS) to include visitor management.
Full-timeExpandUpdated 29 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Working at a technical level , with an understanding of SAP, its underlying Roles, Authorizations, CUA, ECC, and S4 HANA SAP Security. The Senior SAP Security Engineer for Cytiva is responsible for for establishing and maintaining the security and GRC controls our SAP ERP Ecosystem.
RemoteExpandUpdated 28 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Strong proficiency in cloud platforms such as AWS, Azure, or Google Cloud Platform, including compute, storage, networking, and security services (Our focus is GCP) and proficiency in programming languages such as Python, Java, or Scala.
$125,000 - $203,000Full-timeExpandUpdated 28 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with cyber security tools such as firewalls, intrusion prevention (IPS), web application firewalls (WAF), network access control (NAC), endpoint detection and response (EDR), eMail security, and/or data loss prevention (DLP.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Armed Security Guard provides security, installation access control, roving patrols, surveillance, monitoring and overall safeguarding to the installation and its tenants. Have two (2) years' experience in armed security, armed law enforcement, or have performed operations within the Armed Forces, civilian police or commercial security while armed within the past 10 years.
Full-timeExpandUpdated 29 days ago - UpvoteDownvoteShare Job
- Suggest Revision
THE ROLE: Sensus, a Xylem brand, seeks to hire a Software Security Java Engineer with a desire to join their Analytics team delivering Big Data applications in the Cloud. Experience with Spring boot, Spring Security and Open Source Security libraries.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Network Engineering/Architecture - Acts as the department subject matter expert in TCP/IP network connectivity, subnet segmentation, security zones, secure ports/protocols, network authentication/authorization, security tools and their applicability (WAF, IPS, Sandbox, etc.
RemoteExpandUpdated 28 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The candidate will also work to maintain and build upon existing network and domain environments, identify and drive opportunities to improve operational workflows, and create detailed documents and diagrams for information security efforts.
ExpandUpdated 28 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Ramp Services operations include passenger check-in, security screening; baggage transfers to and from aircraft, aircraft deicing, aircraft cleaning, lavatory services, and aircraft power unit hookups.
ExpandUpdated 28 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Responsibilities include but are not limited to: Manage DES Employment Security Commission claims and appeals Manage all FMLA and Leave of Absence requests Manage and submit Bureau of Labor Statistics Manage, submit, and certify yearly EEO-1 Component Reports Manage H2b Visa applications by working closely working with Agents in the United States and abroad.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Related certifications: Net+, Security+, CySA+, CASP+, GSEC, PCNSA, PCNSE, CCNA, CCNP. - Expertise in Palo Alto advanced security features, such as ThreatID. - Intermediate cybersecurity knowledge with an understanding of security fundamentals and their application in a defense-in-depth approach.
ExpandUpdated 28 days ago
security job Title: network specialist Company: Jobot in Cary, NC
FEATURED BLOG POSTS
How to Build a Candidate Persona
A candidate persona is a semi-fictional representation of your ideal candidate. Building a candidate persona is one of the best methods employers use to ensure their sourcing, recruiting, and hiring processes are focused. Knowing exactly what you're looking for streamlines everything and helps increase hiring confidence. So here's how to create a candidate persona and how to use it.
How to Write a Statement of Interest the Best Way
Your life's goal is to work for Company A. Their brand, their product, their reputation—it's safe to say you're a fan. The only problem is that their careers page never highlights the role that matches your skills and experience. It's a bummer for sure, but don't fret.
How to Fire an Employee
So… you've finally decided to let one of your employees go. Drafting the paperwork and corresponding with HR is the easy part, but knowing how to fire an employee is where things get complicated. In fact, it is one of the most challenging conversations to have in the workplace. However, it must be done, and it must be done with poise and tact. Not only should you keep your state law in mind, but you should also consider your former employee's wellbeing.
How Long Does it Take to Hear Back from a Job?
Are you applying for your very first job? Maybe you’re anticipating your termination from your current role and want to be proactive. Either way, waiting to hear back on your job application can be stressful. If time has passed since you applied, you may wonder how long does it take to hear back from a job. Well, the answer is... it depends.
How to Respond to a Recruiter Through Email? (Tips & Examples)
Rather than wading through an endless list of open roles, wouldn’t it be nice if relevant job opportunities come to you?
How to Reject a Candidate Professionally
When deciding on how to reject a candidate, your first question may be
How Does Salary Pay Work? (Compared to Hourly Pay)
At the bottom of each job advertisement, companies label a role as salaried or hourly. Both methods will get you paid (yay), but each in very different ways. So, it's essential to figure out how does salary pay work? While employees paid by the hour are paid based on how long they work, employers pay salaried employees a fixed amount.