- UpvoteDownvoteShare Job
- Suggest Revision
The Cyber Security Engineer will support enhancements to system security architecture and cyber security capabilities and manage multiple system security plans for development, test and production systems to support Assessment and Authorization (A&A) security requirements.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
$150ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
One or more (preferred) Cyber Security Certifications including CISSP, one or more SANS GIAC, CISM, CISA, CEH. Expertise in using various security tools and technologies, such as SIEM platforms, forensic analysis tools, network intrusion detection systems (IDS/IPS), and endpoint security solutions.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Certified Ethical Hacker (CEH), Windows/Linux Admin, Azure Sentinel or Other Cloud SIEM, CISSP, Security+, Network+, Cisco Certified Network Professional (CCNP), Cisco Certified Security Professional (CCSP.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Peraton’s DSCM program encompasses technical, engineering, data analytics, cyber security, management, operational, logistical and administrative support to aid and advise DoS Cyber & Technology Security (CTS) Directorate.
$86,000 - $138,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Leidos is seeking a Cybersecurity Policy Analyst/Subject Matter Expert to support the DHS Office of the Chief Information Security Officer, Program Management and Governance Division. Support the creation of DHS NSS SOPs and playbooks for security guidance that support NSS policy (e.g. incident response, scorecards, stakeholder training.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Cyber Security Training or Certification (ie Securty+, Network+, SPLUNK, FireEye) · Background with System Administration, Network Administration Network Security, Networking Standards, Network Protocols, NIST/FISMA standards and controls, SIEM platforms and security tools, Network Hardware Configurations.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Strong alignment with the ICS security efforts in the Cyber Infrastructure Protection Innovation Center (L540) Ability to apply knowledge of security engineering for OT/ICS/SCADA systems and application of cyber defense and resiliency approaches.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
We are seeking Cyber Network Defense Analysts (CNDA) with Cloud Forensics experience to support this critical customer mission. - Correlate forensic findings to network events in support of developing an intrusion narrative.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Industry standard certifications such as CEH Certification, Security +CE, or GIAC Cyber Threat Intelligence (GCTI). Performs cyber intelligence analysis and develop raw intelligence products derived from intelligence reporting, open-source data, and information housed in a custom, classified system based on a proprietary configuration to support investigations, operations, and intelligence production.
$150ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Conduct Cyber Open-Source Intelligence (C-OSINT) AND Social Media Intelligence (SMI/SOCMINT) exploitation, link and network analysis investigations for high intel threat clients. Relay cyber threat information to the Security Operations Center and Vulnerability Management Team to help prevent the exploitation of threats in the future.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Capability to support the following systems: ArcSight SIEM, Splunk, Novetta Cyber Analytics, FireEye MPS Suite, Snort IDS, Bro IDS, Fidelis XPS, CloudShield Trusted Cyber Solution Orchestrator, Microsoft Advanced Threat Analytics, Counterattack Active Defense.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of and experience with standard network logging formats, network management systems and network security monitoring systems, security information and event management, network packet analysis tools, and forensic analysis tools.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Have strong knowledge of security incident handling/incident response process, methods, and coordination with Regional Cyber Center-CONUS (RCC-C), Regional Network Enterprise Center (RNEC), NEC, etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Under the general supervision of the Section Chief, Information Security GRC, this role will provide security expertise and support of the IMF's security assurance program for a) Cloud solutions and b) Financial systems.
Full-timeExpandApply NowActive JobUpdated Today
network support cyber security jobs Title: specialist cyber Company: Critical Solutions in Arlington, VA
FEATURED BLOG POSTS
What is a W-9 and How to Fill One Out
When you began working for yourself, you probably didn’t account for the tax reporting work that will fall on your shoulders each year. If you’re a freelancer, independent contractor, or business owner, filing your taxes is not as simple as uploading your W-2 form into some online tax preparation software. Most self-employed people need to complete a W-9 as a step for accurately reporting their earnings to the IRS. Below, you can learn how to fill out a W-9 and when to submit it.
Tightening the HR budget in 2023
With the state of the economy still uncertain, 2023 is expected to be approached with much anticipation. Human Resource leaders have many concerns, including how they will manage to accomplish their goals with budget belts already getting snug. Let’s look at some of the factors that the new year is projected to bring for HR and how to prioritize budgets to reach human capital objectives.
A Comprehensive Guide to Becoming a Better Conversationalist
Have you ever stood awkwardly next to someone at a party because you didn’t know what to say to them? How about at a networking event or on a first date? You're not alone if you’ve ever experienced this uncomfortable silence. Many people struggle to master the art of being a great conversationalist.
Why is Non-Verbal Communication Really Important?
In a world where words and phrases rule daily communication, you may wonder why non-verbal communication is important. Whether you realize it or not, you communicate more with nonverbal actions than you do with verbal communication. When you interact with your peers, people are reading your body language, facial expressions, voice, and many other factors that help fill in blanks that words can't fill.
Making Hybrid Work More Efficient
Covid was a catalyst for change in the work environment. Keeping people safe and helathy was the initial goal for employers, but the unintended result was the considerable demand in remote work. Now, onsite work has been dramatically altered to remote work, which is now transforming into a combination of the two: hybrid work.
How Can HR Technology Help Retain Employees?
Human resources' rapid adoption of technology has led to new ways of streamlining human capital management. Based on the IEE Global Study, these technologies changed how HR handled recruitment and retention in 2022. This includes tech like
Why is Time Management Important? 10 Crucial Importances of Time Management
We’ve all been there before. What starts as a relaxing evening scroll quickly becomes a full-blown binge. You blink, and it’s midnight - throwing off your entire next day before it even starts. And at its worst, this indulgence might leave you feeling behind on things you planned to finish that night. This is why time management is important.