- UpvoteDownvoteShare Job
- Suggest Revision
Cloud security controls: Identity and Access Management (IAM), Encryption, Network Security, Compliance, Logging and Monitoring, Vulnerability Management, Disaster Recovery and Business Continuity, Cloud Access Security Broker (CASB), and Multi-Factor Authentication (MFA.
$81,572 - $135,954 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with cloud security assessment tools, vulnerability scanning, and penetration testing techniques. Proven experience (5 years) in cloud security roles, with a strong understanding of cloud platforms and services (AWS, Azure, or GCP.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Familiarity with: Zero Trust Network Access (ZTNA) and Secure Access Service Edge (SASE) frameworks, Identity, Credential, and Access Management (ICAM) (OKTA), Cloud Workload Protection Platform (CWPP), Security Operations Center (SOC) Operations, Vulnerability Threat Management, and Compliance Formal Education Master of Science degree (or higher) in one of the following: computer science, electronics engineering, computer engineering, computer science, information technology, or cybersecurity.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of technology for implementing security controls, including access control, privileged access management, data security, network security, data loss prevention, Cloud security, vulnerability management, configuration management, privacy, and audits.
Full-timeExpandApply NowActive JobUpdated 29 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Complete network vulnerability scanning with Assured Compliance Assessment Solution (ACAS); Minimum of four years of employment experience as an IT System Administrator or Network Engineer.
$66,000 - $73,000 a yearFull-timeExpandApply NowActive JobUpdated 25 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This includes conducting Agile software engineering in a Development, Security, and Operations (DevSecOps) environment, performing Cloud architectural design, operation, and administration functions, and cyber security and Risk Management Framework (RMF) support.
Full-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of risk management processes, secure configuration management techniques, Government laws and policies, cyber threats and vulnerabilities, encryption algorithms, host/network access control mechanisms, vulnerability information dissemination sources.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
In support of Network/Cyberspace Operations mission, perform tasks including administering, operating, managing, establishing, configuring, optimizing, and monitoring networks and systems involving Infrastructure Operations, Vulnerability Management (Patch), Boundary Operations, Directory Services, Message/Collaboration Services, Monitoring Management, or Storage/Virtualization Management.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Complete documentation associated with the DoD Risk Management Framework (RMF) requirements and processes to support the Navy RMF process; Minimum Associate's Degree in Computer Science, Cyber Security, Information Technology, Software Engineering, Information Systems, or Computer Engineering.
$66,000 - $73,000 a yearFull-timeExpandApply NowActive JobUpdated 25 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Explore more InfoSec / Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
$150ExpandApply NowActive JobUpdated Yesterday
FEATURED BLOG POSTS
Tips for a Good Character Reference Letter with Examples
Hiring managers love a resume laden with relevant skills and qualifications. Hard skills specific to the role, like SEO strategy or Java programming languages, are easy to qualify using achievements or facts and figures. But how exactly can they verify personality traits, work ethic, relationship management skills, or curious nature during an interview when they barely know you?
How to Dress on the First Day of Work (Men & Women)
You did it! Out of hundreds of applicants and dozens of people interviewed, you’re the one who got a new job. Congrats! Now comes the question of how to dress on the first day of work.
Why College Students Should Work While in College?
College is a special part of our lives. It’s a time when we prepare for our dream job while creating some of the most memorable moments in life. That said, college life can also be stressful. Not only do we have to spend long hours studying, writing and researching, but we also have to deal with increased tuition fees and living expenses.
5 Ways to Measure Candidate Experience
Your candidate experience is made up of 4 essential parts
How to Stall a Job Offer Politely
You did it! After several weeks of looking for a new job and undergoing grueling interviews, you finally have a job offer. Although this may be very exciting, accepting a job offer means that you’re making a long-term commitment to your future employer. So, even if you’re eager to leave your current job, this isn’t a decision you should take lightly.
How to Get a Job in a New City - Best Tips to Follow
When your dream job posts, will you be ready? What if that dream job was in a faraway city or a different continent…would you move for it? Most of us have dreamed about what it would be like to accept a job in a new place at one time or another. But when it comes to actually making a move, it’s usually the logistical details that give us pause. The key to job searching in a different location is to have a plan.
What is a Policy of Non-Retaliation & How to Create One
Your company probably has many policies in place – anti-discrimination policies, equal opportunity policies, ethics policies, and so on. However, it is important to re-evaluate whether you have a policy that covers every situation. Say for instance one of your employees submit a complaint in good faith to their supervisor. To their surprise, they are met with retaliation, such as demotion, defamation, or even termination.