- UpvoteDownvoteShare Job
- Suggest Revision
Under the general supervision of the Section Chief, Information Security GRC, this role will provide security expertise and support of the IMF's security assurance program for a) Cloud solutions and b) Financial systems.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
BS Computer Science, Cyber Security, Computer Engineering, or related degree; or HS Diploma & 5-7 years of network investigations experience. Argo Cyber Systems is seeking Cyber Network Defense Analysts (CNDA) to support this critical customer mission.
Full-timeExpandApply NowActive JobUpdated 21 days ago - UpvoteDownvoteShare Job
- Suggest Revision
BS Computer Science, Cyber Security, Computer Engineering, or related degree; or HS Diploma & 10 years of network investigations experience. We are seeking Cyber Network Defense Analysts (CNDA) to support this critical customer mission.
Full-timeExpandApply NowActive JobUpdated 18 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Certified Ethical Hacker (CEH), Windows/Linux Admin, Azure Sentinel or Other Cloud SIEM, CISSP, Security+, Network+, Cisco Certified Network Professional (CCNP), Cisco Certified Security Professional (CCSP.
Full-timeExpandApply NowActive JobUpdated 16 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Keyword Searchstring: Blue Cyber, Cyber Analysts, Cyber Operations, Cybersecurity, Network Operations, System Engineering, Security Engineer, Networking, Sec+, Security Plus, 8570, CCNP, CCIE, CISSP, CASP, CEH.
$140,000 - $165,000 a yearFull-timeExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Assist in the construction of signatures which can be implemented on cyber defense network tools in response to new or observed threats within the network environment or enclave.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As a Cyber Compliance Officer, you will support compliance through performing security services in accordance with applicable DoD and Army cybersecurity guidance and regulations. Conduct reviews of cybersecurity information papers and plans with CYBERCOM, ARCYBER, Air National Guard Cyber, National Security Agency (NSA), Federal Bureau of Investigations (FBI), Department of Justice (DOJ), and Department of Homeland Security (DHS.
$119,000 - $161,000 a yearFull-timeExpandApply NowActive JobUpdated 13 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Conduct host forensics, network forensics, and log analysis in support of incident response investigations. Utilize our technology platforms and security tools to conduct large-scale investigations and collect/examine endpoint and network-based evidence.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Cyber security business and systems subject matter management expertise in Application Security, Data Security, Data Governance, and Network Security domains.
$102,240 - $203,060 a yearFull-timeRemoteExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Update, monitor and maintain Trellix's Endpoint Security System (ESS) / Host-Based Security System (HBSS), ensuring virus definitions, patch versions, Security Technical Implementation Guides (STIGs), Cyber Tasking Orders (CTO) compliance and any other applicable directives on network servers and workstations.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Skills that get you noticed: Cisco Unified Communications Manager (CUCM), Cisco Unity Connection, MPLS WAN design, Arista switch deployment, HPn Wireless/Mist, and Palo Alto NGFWs∯*∯ *Understanding of network security principles and best practices.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
At least one of relevant industry certifications such as GCTI (Global Information Assurance Certification [GIAC] Cyber Threat Intelligence), GCFA (GIAC Certified Forensic Analyst), GNFA (GIAC Network Forensic Analyst), GIAC Security Expert (GSE), or equivalent.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
As a Senior Cyber Security Analyst at Octo, you will join an Agile development program in support of the development of a new high-priority, mission-critical application at the General Services Administration (GSA.
$83,600 - $125,400 a yearExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
One of the following: GCIA, GCED, GCFA, GCFE, GCTI, GNFA, GCIH, ECSA, CHFI, CISSP, Security+, Network+, CEH, CND. CCE, CFC, EnCE, CFCE, GREM. The Insider Threat program is a part of an advanced analytics capability of a Focused Operations program that provides comprehensive Computer Network Defense and Response support through monitoring and analysis of potential threat activity targeting the enterprise.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
You will lead a highly specialized IT and cybersecurity team of all levels charged with integrating and managing agile principles into cybersecurity, network, application monitoring, cyber threat intelligence, threat hunting, penetration testing and forensics.
ExpandApply NowActive JobUpdated Today
network support cyber security jobs Title: specialist cyber security Company: Critical Solutions in Arlington, VA
FEATURED BLOG POSTS
5 Common Interview Mistakes
Everyone's interview process is unique in some form or fashion. Like most, your interview process is crafted so you can get the most information out of your candidates to increase hiring confidence and make the right hiring decisions. However, there are often small problems in interview processes that could ultimately affect the success of hiring decisions.
Job Rejection Email Response with Examples
Glassdoor estimates that, on average, there are about 250 applicants for every job vacancy out there. If you’ve ever applied for a job, the odds are that you’ve received the dreaded job rejection email.
Structured vs Unstructured Interviews
The goal of an interview is to evaluate candidates based on their skills, personality, and knowledge. You want to choose the BEST candidate from your candidate pool, so the interview is something you can't mess up. As you begin planning your interview process, one of the major decisions you'll face is whether the interview should be a structured vs unstructured interview. So let's take a dive into the differences and sort out which circumstances warrant which interview process.
How to Describe Your Personality with Examples
Imagine you’re in an elevator with the CEO of your dream company and you get to talking. The conversation is going well and you start to imagine yourself working for their company when the CEO turns around and asks you “tell me a bit about yourself.” Would this catch you off guard or would you be able to give a clear and succinct description of who you are?
4 Ways to Make Your Job Posting More Inclusive
According to a Glassdoor survey,
How to Calculate Net Income
Understanding your finances can be daunting even if you’re good with numbers. Your net income, in particular, is a key metric for determining how well you’re doing financially and whether your current way of operating is sustainable or not.
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra: