- UpvoteDownvoteShare Job
- Suggest Revision
Program is named "Vanguard" and is an IT consolidation consisting of the Department's servers, mainframes, network devices, network perimeter, anti-virus engineering, public key infrastructure (PKI)/biometrics/encryption, monitoring tools, telephony, mobile computing platform, virtual environment, and enclave design/security engineering.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Bachelor's Degree from an accredited University (4 years experience in lieu of degree) and/or one of the following certifications: Certified Authorization Professional (CAP) Cisco Certified Network Associate (CCNA) Routing and Switching CompTIA Security+ Certified Information Systems Security Professional (CISSP.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Assist network and systems security personnel in IA incident response, including close coordination with the Theater IAM for all IA related tasks. Plan, coordinate, and implement network security measures through manual configuration, installation of patches, or the application of scripts to protect data, software, and hardware.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Four-Year College Degree with completion of college courses in computer science or related field; five years of experience as a Computer Programmer Analyst III or Network Engineer II including one year as an Information Security Analyst or Engineer, also to include three years of experience in project and contract management; or any equivalent combination of experience and training which provides the required knowledge, skills and abilities.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
One or more of the following: cybersecurity certifications including but not limited to: Cisco Certified Network Associate-Security (CCNSecurity), Cisco Certified Network Professional-Security (CCNP-Security), Cybersecurity Specialty Certification (SCYBER); CompTIA: Cloud Plus (Cloud+), Security+ Continuing Education (CE), CompTIA Advanced Security Practitioner (CASP) Continuing Education (CE), Network+ Continuing Education (CE), Cybersecurity Analyst (CySA.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Evaluates the security controls within network systems to identify vulnerabilities and recommend actions to correct problems working either alone or as part of a team. Candidates for this position must have performed one full year of Pen Test or Security Control Assessment within the last three years in one following cloud environment (AWS, IBM, Google, Microsoft Azure, or Oracle Cloud.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
BS Computer Science, Cyber Security, Computer Engineering, or related degree; or HS Diploma & 7-9 years of network investigations experience. Zachary Piper Solutions provides HIRT remote and onsite advanced technical assistance, proactive hunting, rapid onsite incident response, and immediate investigation and resolution using host-based, network-based and cloud-based cybersecurity analysis capabilities.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Out of Band Network Management, Port Security, Comply to Connect and Zero Trust requirements. Ensure inputs link back to security controls Participating in the planning, execution, and reporting of security audits and network vulnerability assessments with minimal supervision Assisting in preparation of assessment deliverables -Security Risk Assessments input, compliance data, STIG data, etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Must have ONE of the following certifications: CASP+ CE; CCNA Cyber Ops; CCNSecurity; CCNP Security; CEH; CFR; CHFI; CISA; CISSP (or Associate); CySA+; GCED; GCFA; GCIH; SCYBER. Demonstrated knowledge utilizing native security and logging tools (M365, Azure, AWS, GCP) and planning for centralized log aggregation utilizing a variety of methods.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Security Firewall Engineer role requires extensive Palo Alto and network experience, along with extensive networking experience. A Security Firewall Engineer also focuses on both the short-term and the long-term strategy, recommends technology solutions and improvements to the network and security related environments and is also responsible for delivering clear, concise, timely communications that promote confidence in our team's ability to deliver operational excellence.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
In-depth understanding of information security principles and best practices, including network security, cybersecurity engineering, cryptography, system security, vulnerability management, and incident response.
$150RemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Certified Ethical Hacker (CEH), Windows/Linux Admin, Azure Sentinel or Other Cloud SIEM, CISSP, Security+, Network+, Cisco Certified Network Professional (CCNP), Cisco Certified Security Professional (CCSP.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
KEYWORDS: RMF, Risk Management Framework, ICD, Information Assurance, IA, IAO, IAT, IAM, A&A, A+, Network+, Security+, Non-classified Internet Protocol Router Network (NIPRNet),Secret Internet Protocol Router Network (SIPRNet), DISA Security Technical Implementation Guides (STIGs), CISSP, CASP.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Investigate and analyze all response activities related to cyber security incidents within the network environment or enclave; serve as action officer coordinating cyber security sanitization and reporting; perform incident triage to include determining scope, urgency, and potential impact and track and document incidents from initial detection through final resolution.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This includes performing real-time cyber threat intelligence analysis, correlating actionable security events, performing network traffic analysis using raw packet data, and participating in the coordination of resources during the incident response process.
$101,400 - $183,300 a yearFull-timeExpandApply NowActive JobUpdated Today
network security jobs Company: Continuum Rehab Group in Springfield, VA
FEATURED BLOG POSTS
How to Describe Your Personality with Examples
Imagine you’re in an elevator with the CEO of your dream company and you get to talking. The conversation is going well and you start to imagine yourself working for their company when the CEO turns around and asks you “tell me a bit about yourself.” Would this catch you off guard or would you be able to give a clear and succinct description of who you are?
4 Ways to Make Your Job Posting More Inclusive
According to a Glassdoor survey,
How to Calculate Net Income
Understanding your finances can be daunting even if you’re good with numbers. Your net income, in particular, is a key metric for determining how well you’re doing financially and whether your current way of operating is sustainable or not.
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra:
6 Best Ways to End a Cover Letter with Examples
Including a cover letter with your resume is a great way to introduce yourself to the hiring manager, tell them why you’re the ideal fit for the role, and provide context about your personal situation. A strong cover letter will give you an advantage over other applicants. But it’s important that you structure it properly and write it powerfully so that it carries an impact. This article will discuss how to end a cover letter effectively so you catch the eye of a hiring manager and increase your odds of landing an interview. Read on to learn more.
How to Write a Follow-Up Email for a Job Application?
Most times, we have to do more than submit a "sugar-coated" resume to land our dream jobs. Going the extra mile to follow up on your job application can increase your chances of employment. Additionally, it may even help you get confirmation sooner on whether you are seriously being considered for the job or not.
How to Address a Cover Letter With Examples
It’s easy to get caught up in focusing on your resume – how it looks, what it says, and whether it’s going to land you a job interview. Because there is a big focus on building the perfect resume, job searchers often overlook the importance of a high-quality cover letter. Your cover letter plays a huge role in your first impression. It humanizes you and provides context for your resume.