- UpvoteDownvoteShare Job
- Suggest Revision
Experience with AWS, Microsoft Azure or Google Cloud Platform configuration and administration of security features and services (including identity and access management, networking, firewalls, encryption.
ExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with Cloud Security and (SIEM) Security Incident and Event Management Monitoring integration. Cloud Infrastructure: Virtual Machines, Azure Database, and storage technologies (Storage Accounts, SQL Server, CosmosDB), Virtual Networks, Azure Site Recovery, Traffic Manager, Azure Automation, ARM Templates, Azure Load balancer, API Gateway and Azure AD.
RemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Candidates must be referred for selection to the Border Patrol Agent position before reaching their 40th birthday in accordance with Department of Homeland Security Directive 251-03. You qualify for the GL-7 grade level if you possess one of the following: Experience: One year of specialized work experience that shows you have the skills necessary to make sound judgments and decisions; to analyze information rapidly and make prompt decisions and apply these skills in a law enforcement capacity such as training others, managing finances, code enforcement, doing compliance work, corrections, security, military, emergency responders, etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Relevant experience with GitHub actions, Terraform (Preferably on Google Cloud), Google Cloud with SDK, Kubernetes deployment automation, OpenShift deployment automation, experience in configuring Jenkins’s pipeline preferably with groovy scripting, maven in Java and spring boot application and docker with expertise on shell scripting and certificate management, knowledge of J2EE and spring boot applications with basic programming skills.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Technology Consulting - Cyber Security - Identity & Access Management (IAM) (Manager) (Multiple Positions) (1503404), Ernst & Young U.S. LLP, Raleigh, NC. Must have a Bachelors degree in Computer Science, Information Systems, Engineering, or a related field and 5 years of progressive, post-baccalaureate consulting experience in Cyber Security and/or IAM. Alternatively, will accept a Masters degree in Computer Science, Information Systems, Engineering, or a related field and 4 years of consulting experience in Cyber Securityand/ or IAM.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The solutions provided by Mainframe Hosting include: Distributed and Mainframe Systems, Middleware, Network Security, Storage and Data Protection as well as Data Center Operations. Work closely with other DIT teams to set security rules using z/OS Resource Access Control Facility (RACF) and product specific security features.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Build your career within a fast-paced, dynamic, and diverse environment that combines leading-edge technology solutions - electronic access control, video surveillance, alarm monitoring, emergency communications, robotics, drones, and other smart tech innovative solutions - with physical security solutions to safeguard our clients and our communities.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Work closely with the Security Architect, product and platform teams to engineer and implement cloud security controls with a focus on DevSecOps. Job Title: Sr. Cloud Security Engineer.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
CI tools (GitHub Actions), IaC frameworks (Terraform), and cloud deployment stacks (Kubernetes, AWS) We operate at massive scale as one of the largest cloud computing users in the world.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with security best practices and implementing security controls in a AWS cloud environment - Highly desired. Experience with cloud infrastructure, specifically Amazon Web Services (AWS) like EC2, S3, RDS, ELB, SSM, EBS AND Cloud formation.
Full-timeRemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with Power Systems, Digital IoT Software & technologies, Process controls systems (SCADA, DCS, BMS, PLCs), Substation, Microgrid, Smart Grid, OT Subsystems (HVAC/Security/Fire) Experience selling to both IT (CISO, CIO Security Architect/Manager) and OT personas (Plant Operations.
$127,649.97 - $187,219.95 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Duty Locations Locations are offered based on operational requirements, mission requirements, and critical agency hiring needs as determined by AMO. The duty location listed in a final offer letter may include any geographic location within the Southeast Border Region, Caribbean Air and Marine Branch (CAMB), Southwest Border Region, and National Air Security Operation Centers (NASOC) Unmanned Aircraft System (UAS) locations.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Experience with Terraform Cloud and Azure DevOps Experience with Jira and ServiceNow Competence in a wide range of IT skills including networking, systems administration, data protection, information security and CI/CD tooling.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Ensure that master data management processes are compliant with relevant regulations, audit controls and data security policies. As SAP Master Data Management Technical Lead, you will be responsible for leading the planning, development and implementation of (MDM) and relevant software solutions that align to the Information Technology roadmap and business strategies.
RemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Their responsibilities include: Installing, testing, troubleshooting, repairing or replacing cryptologic networks, physical security systems, electronic equipment, antennas, personal computers, auxiliary equipment, digital and optical interfaces, and data systems Configuring, monitoring and evaluating Information Operations (IO), Information Warfare (IW) systems and Information Assurance (IA) operations Cryptologic Technician Collection (CTR) – CTRs serve as experts in intercepting signals.
ExpandApply NowActive JobUpdated Today
cloud security jobs Title: devops engineer Company: Jobget in Raleigh, NC
FEATURED BLOG POSTS
How to Navigate Hiring Out of State
The job market has shifted significantly in recent years. The accelerated adoption of technology has not only pushed many companies into remote working arrangements but also increased the availability of supporting tools and technologies (i.e., video conferencing and collaboration software).
Building a Candidate Pipeline Through Internships
Building a candidate pipeline through a great internship program for local college students and recent graduates at local universities is a great and cost-effective way to attract and retain top talent. By offering meaningful and impactful work experiences, regular feedback, coaching, and mentorship, you can create a positive internship experience that will make your organization a sought-after destination for future employees. This not only benefits the organization in the short-term but also in the long-term, as you'll have a pool of well-trained and experienced candidates who may be interested in full-time employment once they graduate. Furthermore, building relationships with local universities and college students can increase brand awareness and build a positive reputation for your organization in the local community.
Hiring Transparency
Transparency in hiring refers to the open and honest communication and information sharing that takes place between employers and job candidates. It encompasses all aspects of the hiring process, from posting job descriptions to providing feedback on performance during and after the interview process. In today's job market, hiring transparency has become increasingly important for both employers and candidates alike.
Recruitment strategies that are weird, but actually work
In the current candidate-driven job market, recruiters are looking for unique ways to attract talent. Some have resorted to even (dare we say it?) recruitment strategies on the border of weird and wacky. What can we learn from the unusual recruitment tactics that are being used and actually getting results? Here’s a rundown of some unique recruitment strategies that actually work.
How To Make $100K a Year – No BS Strategies & Advice
If you’re like most of us, you’d love to be wealthier. Having more money would alleviate stress. It would make it easier to pay your bills and buy nicer things. Maybe it’d allow you to spend more time with your kids and go on more vacations. You’re not alone if you wish you could somehow earn a more significant income.
How to Write a Recommendation Letter for a Student
When a student applies for their first job or for their next academic degree, they don’t have much experience to showcase their skills and personal qualities. Hiring managers and admissions officers, therefore, often look at recommendation letters as a way to go beyond the student’s GPA and learn more about the student’s skills and personal qualities.
How To Answer “Why Do You Want to Be a Supervisor” in an Interview
Anyone who has worked in a supervisor role knows how challenging yet rewarding it is. But chances are if you're trying to become a supervisor, you'll be forced to answer: