- UpvoteDownvoteShare Job
- Suggest Revision
Sr. Network Security Engineer This position will start 100% Onsite but could change to a hybrid role. Implement and enforce the agency's policies and procedures in network and infrastructure management, auditing, inspection, security, disaster recovery, encryption and compliance.
$55 an hourFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Holding additional network and security certifications is desired (i.e., Linux, CompTIA Network/Security +, CASP+CE, CCDE, CCNA, CISM, etc. Bachelor's Degree must be in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, or Software Engineering) with 5-7 years of experience.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience in ICS networking research especially in the application of network architecture and network security innovations to ICS/OT (e.g. SDN/SD-WAN, cloud access, Zero Trust, Industrial IoT.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As a OCI Network Security Architect, you will be responsible for ensuring the security of our cloud infrastructure and solutions, developing, and implementing security standards and best practices, and providing technical guidance to other security architects and engineers.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Assist network and systems security personnel in IA incident response, including close coordination with the Theater IAM for all IA related tasks. Plan, coordinate, and implement network security measures through manual configuration, installation of patches, or the application of scripts to protect data, software, and hardware.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Leads system and network architecture support for information and network security technologies; Develops technical security controls and secure configuration baselines for public cloud resources in AWS, Azure, and GCP.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
An Associate of Science (A.S.) or Bachelor of Science (B.S.) degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security.
ExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
KEYWORDS: RMF, Risk Management Framework, ICD, Information Assurance, IA, IAO, IAT, IAM, A&A, A+, Network+, Security+, Non-classified Internet Protocol Router Network (NIPRNet), Secret Internet Protocol Router Network (SIPRNet), DISA Security Technical Implementation Guides (STIGs), CISSP, CASP.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
One of the following certifications: CISSP, Offensive Security Certified Professional (OSCP) or GIAC Penetration Tester (GPEN) or Certified Ethical Hacker (CEH) Certification. Active and current Top Secret (TS) federal security clearance or active and current Secret federal security clearance with ability to obtain TS clearance.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Familiarity with the use and operation of security tools including Tenable Nessus and/or Security Center, IBM Guardium, HP Weblnspect, Network Mapper (NMAP), and/or similar applications.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Experience with network, security, infrastructure architecture activities and tasks on a medium to large government IT Infrastructure project with 24x7 mission support requirements.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
BS Computer Science, Cyber Security, Computer Engineering, or related degree; or HS Diploma & 7-9 years of network investigations experience. Zachary Piper Solutions (RIS) are seeking Cyber Network Defense Analysts (CNDA) to support this critical customer mission.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
You will identify, develop and close sales opportunities across the Arista product portfolio including Data Center Networking, Virtual Networking, Campus Networking, Cloud Vision (network automation & telemetry), and Cognitive Wifi in addition to Network Detection and Response and End Point Security.
$250ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Own responsibility of the relationship for all Security Vendors needed to support the stations’ operations, including contracts, budgets, invoice processing Security action plan implementation, all standard operating procedures are up to date and adhered to, and training expectations are met.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Utilize and configure cyber defense tools and technologies, including web content filters, email security, IDS/IPS, HBSS, SIEM tools, DNS security, log analysis, network monitoring, and firewalls.
$145,000 a yearExpandApply NowActive JobUpdated Today
network security jobs Title: network support in Mclean, VA
FEATURED BLOG POSTS
Why Are Internships Important & How Can You Get One?
Internships are for college students or people who have just completed their degree. If you are a student or recent grad, you may be wondering how to land an internship. If you've never had one, you may even wonder if you need one. After all, didn’t you work in that call center while also doing exams? Or perhaps you’ve bartended your first year in college?
Why is Networking Important & How to Network Effectively
Even if you’ve worked hard to earn a degree from an impressive school, landing your dream job might still come down to who you know – otherwise known as networking. Lots of qualified candidates might apply for a job, but the person who gets it might very well be so-and-so’s sibling, friend, or kid. Sometimes the only way to get your foot in the door is to know someone.
Why Do Recruiters Ghost and What Can You Do About It?
Once you’ve finally mustered up the courage to find another job, leaning into the job hunt can feel scary and overwhelming. So, it does nothing to help your confidence when your outbox is full of unanswered follow-ups and interview requests. You thought that ghosting only happens on dating apps—so why do recruiters ghost, too? Recruiter ghosting is not an effective recruiting strategy, but sometimes it’s inevitable. How can you overcome such an unfortunate new career trend? Read on.
Internal Hiring Best Practices
Each companies hiring strategy is based on a set of rules that defines the ideal candidate. Many companies utilize internal and external hiring to ensure they have skilled, experienced workers. If you work in recruiting, maximizing your internal hiring strategies could be the key to retaining employees and simplifying your hiring process.
Why is it so Hard to Get a Job After College
For many, it was easy finding a job while in college. But after job hunting for weeks, you may wonder why it is so hard to get a job after college. After all, you’ve put a lot of time and effort into getting your degree. But don’t get discouraged. The University of Washington found that 53% of graduates are either unemployed or working a job that doesn’t require a degree. Other studies also show that landing your first job can take between 3 and 6 months. So, getting your first job takes time.
Why Leadership Is So Important in Your Career
There are plenty of baseball players worldwide, but only a select few will master the sport enough to play in the World Series. Similarly, you’ll meet hundreds of “managers” throughout your professional career. Still, only a few will cement themselves as true leaders in your mind. This is why leadership is important—the most influential leaders leave a mark. They inspire.
Making the Move to Salary Transparency
The salary transparency trend continues. Last year, Colorado passed its Equal Pay Transparency Rules, which required employers to include compensation in job postings, notify employees about promotional opportunities, and record job descriptions and wage records. Soon after, states like Washington, Nevada, Maryland, and Rhode Island followed suit.