- UpvoteDownvoteShare Job
- Suggest Revision
Certified Ethical Hacker (CEH), Windows/Linux Admin, Azure Sentinel or Other Cloud SIEM, CISSP, Security+, Network+, Cisco Certified Network Professional (CCNP), Cisco Certified Security Professional (CCSP.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience in ICS networking research especially in the application of network architecture and network security innovations to ICS/OT (e.g. SDN/SD-WAN, cloud access, Zero Trust, Industrial IoT.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Sr. Network Security Engineer This position will start 100% Onsite but could change to a hybrid role. Implement and enforce the agency's policies and procedures in network and infrastructure management, auditing, inspection, security, disaster recovery, encryption and compliance.
$55 an hourFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
One or more certifications: OCI Associate Architect, OCI Architect Professional, AWS Certifications: AWS Solutions Architect, AWS Security Specialist, Microsoft Certified: Azure Security Engineer, Associate, Microsoft Certified: Azure Solutions Architect, GCP Cloud Architect Certification, Splunk Certified Enterprise Architect, Oracle Database, Oracle Weblogic, Network Associate, Network Professional, and Network Specialist certifications.
$137,900 - $232,300 a yearFull-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Familiar with network security tools like (ExtraHop, Sentinel, CrowdStrike, and more) XOR Security, an Agile Defense Company is currently seeking a talented Senior Network Security Engineer to support Agency-level Cybersecurity Program to streamline the current Architecture and Engineering approach with a focus on roadmap planning.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
We value broad and deep technical knowledge, specifically in the fields of Windows forensics, Cloud security, security operations, incident response, network security, and emergent security intelligence.
$136,000 - $212,800 a yearFull-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Minimum of 3 years of experience in Security Engineering of DoD Network Infrastructure, Wireless Technologies (Mobile Internet of Things (IoTs), Endpoint Security, Network protocols, COMSEC and Public Key Infrastructure (PKI.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Security Control Assessor, Lead works to analyze, plan, and execute the work necessary to ensure the confidentiality, integrity and availability of the federal client's IT systems, network, and data through the planning, analysis, development, implementation, maintenance, and enhancement of information systems security programs, policies, procedures and tools.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Basic understanding of cybersecurity; risk analysis/assessment and quantification; system/network operations/security; cybersecurity tools. Certifications: CISSP, CAP, CISA, System Security Certified Practitioner (SSCP), CGRC, CISM, CASP+, CySA+, PMP, CSM, PMI-ACP.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Ensuring the rigorous application of information security/information assurance policies, principles, and practices in the delivery of network services. Monitor network infrastructure and systems using tools such as Cisco ISE, Cisco Umbrella, Cisco FMC, SSH, Microsoft Active Directory Tools and Utilities, Microsoft Intune, Kaseya, Cayosoft, RDP, and managing appliances including IDS/IPS devices, firewalls, VMware vCenter, Windows Servers, DHCP, DNS, and other tools as available or necessary.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
At least 2 years of experience in information technology (operations, software delivery, access management, microservices), information security (application security, network security, cyber security, data protection), information systems risk management, information systems auditing, or a combination.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Four-Year College Degree with completion of college courses in computer science or related field; five years of experience as a Computer Programmer Analyst III or Network Engineer II including one year as an Information Security Analyst or Engineer, also to include three years of experience in project and contract management; or any equivalent combination of experience and training which provides the required knowledge, skills and abilities.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge and experience performing network security vulnerability assessments. Lead remediation efforts when security controls are insufficient, weaknesses are identified in network security configurations, and vulnerabilities deviate from client’s security policy or federal guidelines by recommending corrective actions to mitigate identified deficiencies and developing POAMs.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Minimum of 5 years of experience in network security, with at least 3 years focused on managing Checkpoint firewall environments. Expertise in network protocols (TCP/IP, DNS, DHCP), security protocols (IPSec, SSL VPN), and firewall technologies.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Typically a minimum of five years of information security experience (red teaming, purple teaming, penetration testing, cloud security, and/or network security). Demonstrate expertise in simulating/emulating threat actor tactics, techniques, and procedures (TTPs) and reconnaissance, social engineering, cloud, web application, API, infrastructure, network, and physical security testing techniques.
RemoteExpandApply NowActive JobUpdated 9 days ago
network security jobs Title: career in Arlington, VA
FEATURED BLOG POSTS
What is a W-9 and How to Fill One Out
When you began working for yourself, you probably didn’t account for the tax reporting work that will fall on your shoulders each year. If you’re a freelancer, independent contractor, or business owner, filing your taxes is not as simple as uploading your W-2 form into some online tax preparation software. Most self-employed people need to complete a W-9 as a step for accurately reporting their earnings to the IRS. Below, you can learn how to fill out a W-9 and when to submit it.
Tightening the HR budget in 2023
With the state of the economy still uncertain, 2023 is expected to be approached with much anticipation. Human Resource leaders have many concerns, including how they will manage to accomplish their goals with budget belts already getting snug. Let’s look at some of the factors that the new year is projected to bring for HR and how to prioritize budgets to reach human capital objectives.
A Comprehensive Guide to Becoming a Better Conversationalist
Have you ever stood awkwardly next to someone at a party because you didn’t know what to say to them? How about at a networking event or on a first date? You're not alone if you’ve ever experienced this uncomfortable silence. Many people struggle to master the art of being a great conversationalist.
Why is Non-Verbal Communication Really Important?
In a world where words and phrases rule daily communication, you may wonder why non-verbal communication is important. Whether you realize it or not, you communicate more with nonverbal actions than you do with verbal communication. When you interact with your peers, people are reading your body language, facial expressions, voice, and many other factors that help fill in blanks that words can't fill.
Making Hybrid Work More Efficient
Covid was a catalyst for change in the work environment. Keeping people safe and helathy was the initial goal for employers, but the unintended result was the considerable demand in remote work. Now, onsite work has been dramatically altered to remote work, which is now transforming into a combination of the two: hybrid work.
How Can HR Technology Help Retain Employees?
Human resources' rapid adoption of technology has led to new ways of streamlining human capital management. Based on the IEE Global Study, these technologies changed how HR handled recruitment and retention in 2022. This includes tech like
Why is Time Management Important? 10 Crucial Importances of Time Management
We’ve all been there before. What starts as a relaxing evening scroll quickly becomes a full-blown binge. You blink, and it’s midnight - throwing off your entire next day before it even starts. And at its worst, this indulgence might leave you feeling behind on things you planned to finish that night. This is why time management is important.