- UpvoteDownvoteShare Job
- Suggest Revision
Required 5 years - Broad, domain level architectural understanding of: •Modern Application Architecture •Cloud Computing •DevSecOps •IT Infrastructure •Network •IT Governance •IT Security.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Understanding of cyber security and IT disciplines including networking, operating systems, authentication protocols, general enterprise network architecture, and security incident response.
RemoteExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with network modeling and programming – YANG, OpenConfig, NETCONF. Knowledge of network security design, system performance characterization and testing. Primarily focused on development and support of network fabric and systems through a combination of a deep level understanding of networking at the protocol level coupled with programming skills to support the intensive automation required to operate a production environment.
$87,000 - $178,200ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
When and where applicable, facilitate information systems security management education and training in regulatory and industry standards for all employees. Coordinate the continuous development, implementation, and updating of security and privacy policies, standards, guidelines, baselines, processes, and procedures in compliance with local, state, federal, and in-country regulations and standards for client’s information systems, applications, and data.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
In August 2020, Cisco Systems completed the acquisition of ThousandEyes, which now forms the ThousandEyes Business Unit within the Cisco Networking Business Group and is the Network Assurance solution for Cisco across the Cisco Networking Cloud and Cisco Security Cloud.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
EBG's expanded network reaches over 100 million users from participating companies and closed loop affinity and membership groups. EBG powers a robust portfolio of technology solutions and operates a network of employer and membership-based platforms reaching a captive audience, providing leading brands with incremental distribution opportunities.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Explore more InfoSec / Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
$185,800 - $255,475 a yearFull-timeExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
We have an immediate long-term opportunity with one of our prime clients for a position of Network Security Engineer to work in Austin, TX on Onsite basis. Network Security Engineer @ City of Austin, Aviation Department.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Preferred:Advanced security certification GCIH, GCIA, CISSPCertifications in SplunkWorking knowledge/experience with network systems, security principles, applications and risk and compliance initiatives such as Health Information Portability and Accountability Ace (HIPAA), HITRUST, Sarbanes-Oxley Act (SOX) and the General Data Protection Regulation (GDPR.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Possess or ability to Obtain: Certified Information Systems Security Professional (CISSP), Certified Cloud Security Professional (CCSP) certification, and/or Certified Information Systems Manager (CISM.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Trains users and promotes security awareness to ensure system security and to improve application, server, and network efficiency. Serves as a security liaison to the CPA divisions on gaining access to systems at other state agencies (i.e. Texas Workforce Commission, Texas Dept. of Transportation, Office of Attorney General, Railroad Commission, and Texas Education Agency.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Communicate with stakeholders (Regional Training Director, Portfolio operations, Security Professionals, Supervisors, Field and Corporate Training, and Clients) Deliver field training programs in accordance with local, state, and federal laws and regulations, as well as Allied Universal standards in support of Regional Trainers.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Encase, SANS, ftk, brute force, cyber, incident, response, breach, investigation, analysis, log, endpoint, detection, remediation, ransomware, dfir, malware, network, host, live box, dead box, host based, end point, digital forensics, security, RCA, Root cause analysis, forensics, DFIR, Autopsy, Xplico, SIFT, Investigative, Android, reverse, reverse engineering, malicious, app store, google, google play, mobile app.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Familiarity with: Zero Trust Network Access (ZTNA) and Secure Access Service Edge (SASE) frameworks, Identity, Credential, and Access Management (ICAM) (OKTA), Cloud Workload Protection Platform (CWPP), Security Operations Center (SOC) Operations, Vulnerability Threat Management, and Compliance Formal Education Master of Science degree (or higher) in one of the following: computer science, electronics engineering, computer engineering, computer science, information technology, or cybersecurity.
ExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Specialized experience with computers, information security, network, websites, and/or other related technical audits. Certification as a Certified Information Systems Auditor (CISA), Certified Information Systems Security Professional (CISSP), Certified in Risk and Information Systems Controls, (CRISC), Certified Public Accountant (CPA) or Certified Internal Auditor (CIA) is required.
ExpandApply NowActive JobUpdated 5 days ago
network security jobs Title: systems administrator in Austin, TX
FEATURED BLOG POSTS
Building a Candidate Pipeline Through Internships
Building a candidate pipeline through a great internship program for local college students and recent graduates at local universities is a great and cost-effective way to attract and retain top talent. By offering meaningful and impactful work experiences, regular feedback, coaching, and mentorship, you can create a positive internship experience that will make your organization a sought-after destination for future employees. This not only benefits the organization in the short-term but also in the long-term, as you'll have a pool of well-trained and experienced candidates who may be interested in full-time employment once they graduate. Furthermore, building relationships with local universities and college students can increase brand awareness and build a positive reputation for your organization in the local community.
Hiring Transparency
Transparency in hiring refers to the open and honest communication and information sharing that takes place between employers and job candidates. It encompasses all aspects of the hiring process, from posting job descriptions to providing feedback on performance during and after the interview process. In today's job market, hiring transparency has become increasingly important for both employers and candidates alike.
Recruitment strategies that are weird, but actually work
In the current candidate-driven job market, recruiters are looking for unique ways to attract talent. Some have resorted to even (dare we say it?) recruitment strategies on the border of weird and wacky. What can we learn from the unusual recruitment tactics that are being used and actually getting results? Here’s a rundown of some unique recruitment strategies that actually work.
How To Make $100K a Year – No BS Strategies & Advice
If you’re like most of us, you’d love to be wealthier. Having more money would alleviate stress. It would make it easier to pay your bills and buy nicer things. Maybe it’d allow you to spend more time with your kids and go on more vacations. You’re not alone if you wish you could somehow earn a more significant income.
How to Write a Recommendation Letter for a Student
When a student applies for their first job or for their next academic degree, they don’t have much experience to showcase their skills and personal qualities. Hiring managers and admissions officers, therefore, often look at recommendation letters as a way to go beyond the student’s GPA and learn more about the student’s skills and personal qualities.
How To Answer “Why Do You Want to Be a Supervisor” in an Interview
Anyone who has worked in a supervisor role knows how challenging yet rewarding it is. But chances are if you're trying to become a supervisor, you'll be forced to answer:
What is Career Cushioning?
Is your organization prepared for “career cushioning”?