- UpvoteDownvoteShare Job
- Suggest Revision
Program is named "Vanguard" and is an IT consolidation consisting of the Department's servers, mainframes, network devices, network perimeter, anti-virus engineering, public key infrastructure (PKI)/biometrics/encryption, monitoring tools, telephony, mobile computing platform, virtual environment, and enclave design/security engineering.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Understanding of IT security principals, technologies, best practices to include logical access control, PKI and other encryption methods, network-based and host-based IDS/IPS, security configuration baselines, auditing, vulnerability discovery, and management.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Support the development, implementation, and maintenance of Navy Federal's EPM Suite of applications (Hyperion Planning, Essbase, Data Relationship Management, Financial Reporting Studio and Oracle Business Intelligence.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
In-depth understanding of information security principles and best practices, including network security, cybersecurity engineering, cryptography, system security, vulnerability management, and incident response.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Expertise in discovering, analyzing, diagnosing, and reporting on malware events, files and network intrusion and vulnerability issues. The Cyber Threat Analysis Division's (DS/CTI/CTAD) Technical Analysis and Special Operations (TASO) team performs advanced cyber threat network hunting, advanced technical analyses (e.g. analysis of malicious code, network traffic, and Web log data), and forensic review of hard drives, mobile devices, and other storage media.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Four-Year College Degree with completion of college courses in computer science or related field; five years of experience as a Computer Programmer Analyst III or Network Engineer II including one year as an Information Security Analyst or Engineer, also to include three years of experience in project and contract management; or any equivalent combination of experience and training which provides the required knowledge, skills and abilities.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Advanced knowledge of security architectures, devices, proxies, firewalls, and system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code.
RemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Coordinates with Security and Installations Directorate (SI) Office of Counterintelligence (SIC), Insider Threat Office (SIII), in addition to other law enforcement and counterintelligence personnel as required to perform advanced investigation and triage of incidents.
Full-timeExpandApply NowActive JobUpdated 16 days ago - UpvoteDownvoteShare Job
- Suggest Revision
One or more of the following: CompTIA Security+, A+, Network+, Cloud+, Pentest+, CySA+ or CASP+ AND. Oracle Cloud Infrastructure Certified Architect Professional OR Oracle Cloud Infrastructure Certified Architect Associate, OR Cisco Certified Network Associate (CCNA.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Investigate and analyze all response activities related to cyber security incidents within the network environment or enclave; serve as action officer coordinating cyber security sanitization and reporting; perform incident triage to include determining scope, urgency, and potential impact and track and document incidents from initial detection through final resolution.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Publish NES remarks, baseline descriptions, and other imagery exploitation reporting in accordance with the NSG Directive 2-1 Exploitation and Reporting Structure (EARS-2) reporting guidance and/or SOM-associated data as necessitated by the assigned office’s requirements.
Full-timeExpandApply NowActive JobUpdated 21 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Some locations may be subject to the port security regulations set forth by the Transportation Security Administration and United States Coast Guard. We own and operate a diversified global network of integrated assets providing midstream logistic solutions, primarily consisting of the transportation, storage, processing, and marketing of liquid petroleum products.
InternExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Related technical experience in network security technologies such as Juniper SRX, Palo Alto Firewall, F5 Load Balancer, Cisco FTD/ASA, Gigamon, FireEye, RSA Netwitness or others (NOTE: these specific tools are listed as examples; expertise in all of these are not expected.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Assesses network topology and device configurations identifying critical security concerns and providing security best practice recommendations. 8+ years of experience and BS Computer Science, Cybersecurity, Computer Engineering or related degree; or HS Diploma and 10+ years of host or digital forensics and network forensic experience.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with investor reporting functions in a mortgage secondary marketing environment. Service the mortgage loans sold portfolio to investors through the performance of 3 critical functions: (1) remittance, (2) reporting and (3) reconciliation as mandated by GSEs' (Ginnie Mae (GNMA), Freddie Mac (FHLMC) and Fannie Mae (FNMA.
ExpandApply NowActive JobUpdated Today
network security sql reporting jobs Title: senior network security engineer in Springfield, VA
FEATURED BLOG POSTS
What Makes a Company a Great Place to Work
After one too many after-hours emails, you’re on the hunt for a new gig. But what makes a company a great place to work? And how will you know when you find one? Finding a motivating, safe, and productive work environment is important for our mental and physical health. If you’re financially frustrated, creatively stuck, or just plain over it, it’s time to find a healthier workplace where you can flourish.
What Makes a Good Boss? The Top 12 Qualities & Attributes
Think back to the best boss you’ve ever had—does someone come to mind? We hope so! Okay, now think back to the worst boss you’ve ever had. I’m sure you can conjure up a few faces.
How to Recruit and Retain Gen Z Employees
As Boomers and the oldest Gen X are exiting the workforce, younger Millennials and Gen Z are flowing in. While the younger generations seem to be completely different than the older generations, many care about some of the same things- financial security, working conditions, etc. However, due to social and cultural differences in the era that Gen Z has grown up in, they have concerns that were never even workplace topics of discussion 20 years ago.
How Does Temp to Hire Work? Benefits, Concerns, & More
Whether you’re just starting out your career or are looking for the next opportunity, the job market has never been more burgeoning with opportunities. From flexible work options and freelancing gigs to seasonal and temp-to-hire work, people today are spoiled for choice when it comes to finding engaging and fulfilling work.
Explore Your Skill and Find the Best Way to Make Money From Home
When you just can’t stomach another drive-thru coffee on your morning commute, close your navigation app on your phone and search for easy ways to make money from home instead. With a computer and some niche skills, there are countless opportunities for you to earn a living from your couch. (Okay, fine, your home office.) Below, we’ll explore 30 different ways to make money from home, as well as a few “too-good-too-be-true" warning signs to know to keep you from booking the wrong remote gig.
What is Employment Participation Rate
According to economists, there are four factors of production that go into creating higher quality goods at lower prices. These are
How to Get Pay Stubs (From Previous Employee Also!)
Pay stubs are an important piece of document which shows your earnings in a given period, as well as any deductions made towards your health insurance or pension contributions. They’re also excellent for finding out how much your recent salary raise has bumped up your monthly net income.