- UpvoteDownvoteShare Job
- Suggest Revision
Ensuring the stability, availability, performance and security of the enterprise network; including, but not limited to, internal/external network security, vulnerability scanning, patching and remediation, software/firmware updates, server class operating systems, managing cloud services and other duties as assigned.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Focus areas will include managing security requests, investigating, and responding to alerts and incident tickets, developing and maintaining security documentation, network and endpoint security management, vulnerability management, identity and access management, incident response, SIEM and log management, cloud security operations, overall security monitoring and reporting.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Demonstrable knowledge of information security technologies, networking and network and systems architecture. These services include technology strategic planning, web site development, graphic design, disaster recovery, systems development, network administration, audio/visual services, business process re-engineering, change management, program management, security administration, service desk, computer operations, telecommunications, and document management.
$150,000 - $160,000Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This individual will function as a technical and engineering subject matter expert across various Cyber Security technology areas with a focus on network, application, cloud, and enterprise security controls.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Technical knowledge in some of the following domains in a cloud or on-premise context: routing/switching, stateful or next gen firewalls (NGFW), distributed denial of service (DDoS) mitigation, web application firewalls, intrusion detection / prevention systems (IDS/IPS), network segregation, security information and event management (SIEM), Container and Orchestration technologies, Infrastructure as Code, and other threat and vulnerability management capabilities.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Ensures compliance of departmental policies and procedures as established within the department, including, but not limited to, change control management policies, network security policies, systems maintenance procedural policies, disaster recovery and business continuity procedural policies and system documentation policies.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The position of Network Security Engineer involves tasks associated with the installation, movement and maintenance of computers, routers, switches, cables, and containers of such equipment.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Ensuring all “network hardware” and all end-user hardware not managed by the Firm’s Help Desk is configured, updated, and regularly maintained for optimal security and operational uptime.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Principal Cyber Security Engineer will be responsible for conducting end to end security and threat analysis of enterprise initiatives involving new or modified technology deployments; ensuring that they incorporate Information Security best practices and guidelines into system designs.
$175,000 - $210,000 a yearFull-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Security tools: Microsoft 365 E5 Suite, Tenable/Nessus vulnerability management, a SIEM, Logmonitor. Server and Network Admin. Planning and scheduling periodic maintenance of all networking hardware and software systems, creation of and maintenance of detailed network design drawings and configuration best practices.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge and understanding in 2+ security domains (e.g., security engineering, system and network security, authentication and security protocols, cryptography, application security, incident response, access control, penetration testing) required.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Support VoIP telecom, mobile/cellular devices, LAN switching/routing, Wireless LAN infrastructure, firewall policies, data cabling (copper/fiber), end-user network issues, and network information security.
ExpandApply NowActive JobUpdated 2 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Cloud software, infrastructure, network security hardware / software, - You will focus on driving adoption and efficient use of the source-to-pay process through system optimization and proactive partner outreach along with sourcing management, contract management, and negotiation support where applicable.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
QUALIFICATIONS- Thorough understanding of TCP/IP networking, IP routing, Server Load Balancing, and Network Security architecture and core technologies such as IP, TCP, OSPF/IS-IS, BGP, MPLS, Server Load Balancers, Firewalls, ACLs, DNS, DHCP, IPAM, LDAP, NFS, etc.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Utilize project management skills to oversee the successful implementation/installation of the following: Physical Security Systems, Emergency repair to Electronic Locking Systems, Access Control, Alarm/Duress Systems, Security Management Software, Network Cameras/CCT, and Infant Protection Systems.
Full-timeExpandApply NowActive JobUpdated 1 month ago
network security jobs Title: information security architect Company: Experis in Teterboro, NJ
FEATURED BLOG POSTS
Why Do Recruiters Ghost and What Can You Do About It?
Once you’ve finally mustered up the courage to find another job, leaning into the job hunt can feel scary and overwhelming. So, it does nothing to help your confidence when your outbox is full of unanswered follow-ups and interview requests. You thought that ghosting only happens on dating apps—so why do recruiters ghost, too? Recruiter ghosting is not an effective recruiting strategy, but sometimes it’s inevitable. How can you overcome such an unfortunate new career trend? Read on.
Internal Hiring Best Practices
Each companies hiring strategy is based on a set of rules that defines the ideal candidate. Many companies utilize internal and external hiring to ensure they have skilled, experienced workers. If you work in recruiting, maximizing your internal hiring strategies could be the key to retaining employees and simplifying your hiring process.
Why is it so Hard to Get a Job After College
For many, it was easy finding a job while in college. But after job hunting for weeks, you may wonder why it is so hard to get a job after college. After all, you’ve put a lot of time and effort into getting your degree. But don’t get discouraged. The University of Washington found that 53% of graduates are either unemployed or working a job that doesn’t require a degree. Other studies also show that landing your first job can take between 3 and 6 months. So, getting your first job takes time.
Why Leadership Is So Important in Your Career
There are plenty of baseball players worldwide, but only a select few will master the sport enough to play in the World Series. Similarly, you’ll meet hundreds of “managers” throughout your professional career. Still, only a few will cement themselves as true leaders in your mind. This is why leadership is important—the most influential leaders leave a mark. They inspire.
Making the Move to Salary Transparency
The salary transparency trend continues. Last year, Colorado passed its Equal Pay Transparency Rules, which required employers to include compensation in job postings, notify employees about promotional opportunities, and record job descriptions and wage records. Soon after, states like Washington, Nevada, Maryland, and Rhode Island followed suit.
How to Build a Candidate Persona
A candidate persona is a semi-fictional representation of your ideal candidate. Building a candidate persona is one of the best methods employers use to ensure their sourcing, recruiting, and hiring processes are focused. Knowing exactly what you're looking for streamlines everything and helps increase hiring confidence. So here's how to create a candidate persona and how to use it.
How to Get Into The Trades: Step-by-Step Guide
Getting a trade job can be a great career move if you like variety and prefer to learn on the job instead of in an academic setting. A trade job can offer security and be a lucrative career path as the demand for skilled trade workers continues to grow.