- UpvoteDownvoteShare Job
- Suggest Revision
Monitors and maintains Firewalls and corresponding management tools (FMC, ASDM), Intrusion Prevention Systems (IPS), Vulnerability Management (VM), Cisco Umbrella domain name security, ISE network Access Control, Posturing, and Profiling, IPsec VPN tunnels, AnyConnect remote users and security module, Third Party Partner Security Incident and Event Manager (SIEM), and other network and cloud security tools.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Experience with offensive security tools, such as Metasploit, Nessus, Burp, Kali Linux / CommandoVM or C2 frameworks (e.g. Cobalt Strike, Brute Ratel, Sliver, Nighthawk). Offensive Security certifications (such as OSCP or OSEP), SANS certifications (such as GXPN, GPEN, GWAPT, GREM), or other training in red teaming operations are a plus.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Strategic Participation and Risk Management:o Contribute to defining the GICT Strategic Plan.o Actively participate in the GICT Leadership Team.o Work closely with the Chief Information Security Officer (CISO) to oversee security protocols and compliance.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The solutions provided by Mainframe Hosting include: Distributed and Mainframe Systems Middleware Network Security Storage and Data Protection as well as Data Center Operations. Customizing Software Work closely with other DIT teams to set security rules using z/OS Resource Access Control Facility RACF and product specific security features.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Prefer CISSP-ISAAP, SABSA, TOGAF.Industry recognized certifications demonstrating security expertise: Prefer CISSP, CCSP, CRISC, SANS/GIAC, Azure security, AWS security. The ideal candidate will have a proven history of offering technical security consultation and architectural advice on cloud security (Azure/AWS), identity and access management (IAM), privileged access management (PAM), Active Directory, data protection, logging, and other cybersecurity capabilities.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Consult with the ICN leaders, professionals, and various Risk & Brand Protection compliance groups (Anti-Corruption, Cyber Security, CoRe Procurement, etc.) Consult with the ICN leaders, professionals, and various Risk & Brand Protection compliance groups (Anti-Corruption, Cyber Security, CoRe Procurement, etc.
$66,200 - $135,800 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with Terraform Cloud and Azure DevOps Experience with Jira and ServiceNow Competence in a wide range of IT skills including networking, systems administration, data protection, information security and CI/CD tooling.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with AWS, Microsoft Azure or Google Cloud Platform configuration and administration of security features and services (including identity and access management, networking, firewalls, encryption)Background in security domain, cloud security highly preferredUnderstanding of container and container orchestration technologies such as Docker, Kubernetes, and OpenShiftAdditional InformationThe TeamThe SA is mapped to one or more Sales Specialists.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Citizenship and Immigration Services (DHSUSCIS)' in partnership with the Social Security Administration (SSA). Title IXPlease view the Notice of Non-Discrimination on the Basis of Gender or Sex and Contact Information for Title IX Coordinator at: E-VerifyThis position requires new hire employment verification to be processed through the E-Verify program administered by the Department of Homeland Security.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The abilities you acquire here can open doors to careers in various fields, including the FBI, law enforcement, ATF, US Border Patrol, State Crime Lab, law-related roles, paralegal positions, legal assistant jobs, security, corporate investigations, and investigative journalism.
Full-time/part-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with Power Systems, Digital IoT Software & technologies, Process controls systems (SCADA, DCS, BMS, PLCs), Substation, Microgrid, Smart Grid, OT Subsystems (HVAC/Security/Fire) Experience selling to both IT (CISO, CIO Security Architect/Manager) and OT personas (Plant Operations.
$110,999.97 - $162,799.95 a yearFull-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Prince Telecom offers a wide range of services that includes: residential and commercial installations, digital converter deployment, high speed modem installations, home security and automation, underground and aerial construction services and special projects such as MDU construction, drop rebuilds and audits.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
A TMC Security Operation Center (SOC) Analyst works in a fast-paced collaborative environment and is required to be adaptable, open to learning and teaching, and able to think creatively to effectively navigate the evolving threat landscape.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Principal Scientist – RF Communications Modeling and Simulation Position Requirements: The nature of work ( interactions with the intelligence community and DoD programs) requires eligibility to apply for and hold a US security clearance; selected applicants will undergo a security investigation and must meet eligibility requirements at the time of employment.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Responsibilities include partnering with business units and store operations to understand and enable business objectives with practical privacy and legal compliance guidance, help draft policies and procedures, conduct or oversee internal investigations and direct data privacy/cyber security incident response efforts and readiness.
Full-timeExpandApply NowActive JobUpdated 7 days ago
security job Title: security administrator Company: Kforce Inc in Raleigh, NC
FEATURED BLOG POSTS
Why is Professionalism Important & How to Be Professional
You might have heard the word professionalism thrown around in the workplace, but do you know what it means? And do you know how to maintain professionalism no matter the circumstances?
Why Cover Letters Are Important & How To Write One | Job\Searcher
Most people completely waste their cover letter real estate. Your cover letter is another opportunity to speak directly about how your background and capabilities align with the opportunity you seek. It also allows you to introduce your personality a bit more than a resume does. So, why are cover letters important? Because you can stand out, big time, with a custom cover letter directed to the right person.
Hiring Again After Mass Layoffs
It's never an easy decision to let members of your staff go, but depending on the state of your business, mass layoffs may have been the only way to survive. Now that you're months into the future, you may find yourself itching to start hiring again after previous layoffs.
Into the Heart of the Ukrainian-Russian Conflict
The story of our US-Ukraine connection started when Kevin met Dave. Days away from quitting his last "real" job as a seafood plant manager, Kevin reconnected with a long-lost friend from high school. Little did he know, this long-lost friend was dating his soon-to-be business partner. After meeting Dave through their mutual connection, it didn't take long for the two to start bouncing business ideas off each other. The flow of creativity soon grew into a business partnership that has withstood the test of time.
Why Are Internships Important & How Can You Get One?
Internships are for college students or people who have just completed their degree. If you are a student or recent grad, you may be wondering how to land an internship. If you've never had one, you may even wonder if you need one. After all, didn’t you work in that call center while also doing exams? Or perhaps you’ve bartended your first year in college?
Why is Networking Important & How to Network Effectively
Even if you’ve worked hard to earn a degree from an impressive school, landing your dream job might still come down to who you know – otherwise known as networking. Lots of qualified candidates might apply for a job, but the person who gets it might very well be so-and-so’s sibling, friend, or kid. Sometimes the only way to get your foot in the door is to know someone.
Why Do Recruiters Ghost and What Can You Do About It?
Once you’ve finally mustered up the courage to find another job, leaning into the job hunt can feel scary and overwhelming. So, it does nothing to help your confidence when your outbox is full of unanswered follow-ups and interview requests. You thought that ghosting only happens on dating apps—so why do recruiters ghost, too? Recruiter ghosting is not an effective recruiting strategy, but sometimes it’s inevitable. How can you overcome such an unfortunate new career trend? Read on.