- UpvoteDownvoteShare Job
- Suggest Revision
Experience with Azure Services, including Machine Learning, Analytics, Databases, Azure Identity and Security Services (Active Directory, Domain Services, Defender, Key Vault, Sentinel, Security Center), Management and Governance (Landing Zone, Automation, Cost, Policy, Compliance), Migration Services, Networking (including ExpressRoute, DNS, Network Watcher, and Load Balancers), and Development (including Azure DevOps, Infrastructure-as-Code (IaC) and Azure Functions for serverless solutions.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Out of Band Network Management, Port Security, Comply to Connect and Zero Trust requirements. Firewall Auditing, Validation & Monitoring: Competency in auditing, validating, and monitoring firewall configurations to uphold network security, according to NIST, ICD, SRG, and industry guidelines.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The IMAX program of National Security Sector at Leidos currently has an opening for a. Current Top Secret/Specialized Compartmented Information Security Clearance. Develop multi-intelligence analysis and assessments that integrates existing national-level products and databases to define patterns of threat and CIED network activity and narrow the search space to conduct counter-threat operations.
$84,500 - $152,750 a yearExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Familiarity with one or more of the following: RSA Security Analytics (NetWitness), Symantec Bluecoat, CyberArk, ForeScout CounterAct, McAfee ePO, CrowdStrike, FireEye, Cisco FirePower (SourceFire), RedSeal, SecureSphere Imperva, Tenable Nessus, Splunk, PKI, chain of trust, and certificates.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
CASP, Cloud+, Network+, Security+, Linux+, CySA+, CLNP, Pentest+, A+, Server+ Hands-on experience utilizing network security tools (e.g. IDS/IPS, Full PCAP, WAF, etc) and SIEM.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Leidos National Security Sector is seeking Network Provision Engineers to join our team at client sites in Herndon, McLean, and Culpeper, VA. In this position you will leverage your knowledge of network security policy and utilize your experience with intrusion detection, network ports and protocols (DNS, DHCP, IP, TCP, etc.
Full-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Deploy, configure, and manage Acquia (CMS) and Akamai (CDN) solutions to optimize network performance, scalability, and security. Acquia, Akamai, networking, networking standards and protocols, TCP/IP, DNS, VPN, SSL, Internet technologies, deploying, managing, Acquia Cloud Platform, Acquia Site Factory, Akamai Content Delivery Network, CDN, Akamai Web Application Firewall, WAF,cloud computing platforms, AWS, Azure, containerization, Docker, Kubernetes, CMS, ACD, Acquia Certified Developer, Akamai Certified Edge Delivery Professional, ACEDP.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Familiarity with: Zero Trust Network Access (ZTNA) and Secure Access Service Edge (SASE) frameworks, Identity, Credential, and Access Management (ICAM) (OKTA), Cloud Workload Protection Platform (CWPP), Security Operations Center (SOC) Operations, Vulnerability Threat Management, and Compliance.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience in communicating (written and spoken) highly technical, multi-faceted (e.g., network, security, data, application) solutions to customers in a simple, understandable manner. As a Network Wireless Engineer for the Public Sector Federal Aviation Administration Enterprise Network Engineering Services (FENS) engineering team, you will be a on a multi-discipline team that will design, implement, and manage the implementation of wireless diversity for the FAA infrastructure architecture.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Extensive experience in Cyber Security Tools, network topologies, intrusion detection, Public Key Infrastructure (PKI), ZTA, and secured networks. Desired experience Risk Management Framework (RMF), Cybersecurity Framework (CSF), Federal Information Security Modernization Act (FISMA), and FedRAMP experience.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Design, test, and implement secure operating systems, network, security monitoring, tuning and management of IT security systems and applications, incident response, digital forensics, and loss prevention.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Principal Cloud Security Architect will direct and guide other technology teams within Crown Castle for all matters related to cloud security strategy and implementation, including Security Tools within Cloud ecosystems (Azure and AWS), Network IPS/IDS, Identity and Access Management (IAM), User Entity and Behavior Analysis (UEBA), Zero Trust, DevSecOps, Security Access and Service Edge (SASE) and Security Frameworks and Methodologies, and Threat Modeling.
$150,000 - $180,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The position requires skills in IT/networking, network/security engineering, system performance/security monitoring, cloud computing, vulnerability management/patching, and overall system troubleshooting.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Provide Category Management Strong understanding of technology across any of the following areas : 5G, IOT, Security, Contact Center, UCC, Network and IT What We re Looking For. IE. MPLS, Internet, (4G/5G, Wi-FI), software-defined networking, security, advanced communications (voice, SIP, contact center, video), customer premise equipment (CPE), field services, site services, structured cabling, data centers, cloud services, etc.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Technical competency in one of the following fields: SIGINT Collection/Analysis/Targeting, ELINT Collection/Analysis, Electronic Warfare (EW), Cryptologic Linguist, Radio Operations, Cyber Security, Network Engineering/Security, Information Technology (with degree), HAM Operations and certification.
$77,000 - $163,000Full-timeExpandApply NowActive JobUpdated Today
network security jobs in Ashburn, VA
FEATURED BLOG POSTS
How to Calculate Net Income
Understanding your finances can be daunting even if you’re good with numbers. Your net income, in particular, is a key metric for determining how well you’re doing financially and whether your current way of operating is sustainable or not.
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra:
6 Best Ways to End a Cover Letter with Examples
Including a cover letter with your resume is a great way to introduce yourself to the hiring manager, tell them why you’re the ideal fit for the role, and provide context about your personal situation. A strong cover letter will give you an advantage over other applicants. But it’s important that you structure it properly and write it powerfully so that it carries an impact. This article will discuss how to end a cover letter effectively so you catch the eye of a hiring manager and increase your odds of landing an interview. Read on to learn more.
How to Write a Follow-Up Email for a Job Application?
Most times, we have to do more than submit a "sugar-coated" resume to land our dream jobs. Going the extra mile to follow up on your job application can increase your chances of employment. Additionally, it may even help you get confirmation sooner on whether you are seriously being considered for the job or not.
How to Hire Remote Workers
Remote work used to be a thing of the future. However, with social, economic, and cultural events taking place across the country, it has now evolved into something that both job searchers AND companies are benefiting from. Remote work is multifaceted and can come in handy in a variety of situations. So, to help your small business take advantage of all of remote work's benefits, here is a short guide on how to hire remote workers.
How to Address a Cover Letter With Examples
It’s easy to get caught up in focusing on your resume – how it looks, what it says, and whether it’s going to land you a job interview. Because there is a big focus on building the perfect resume, job searchers often overlook the importance of a high-quality cover letter. Your cover letter plays a huge role in your first impression. It humanizes you and provides context for your resume.
How to Call Out of Work
No matter how happy we are with our jobs, there are days when we feel overwhelmed and want to call out of work. No, don't feel guilty. It's expected because we're humans, and we can't control the uncertainties of life. But the problem lies in how to call out of work without seeming uncommitted to work, especially if you seldom get work-free days.