- UpvoteDownvoteShare Job
- Suggest Revision
Solid understanding of technical concepts and such as Encryption, Multi-Factor Authentication (MFA), Network Segmentation, Data Loss Prevention, Incident Response, Cloud Security, Network Security and Data Protection.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Assist network and systems security personnel in IA incident response, including close coordination with the Theater IAM for all IA related tasks. Plan, coordinate, and implement network security measures through manual configuration, installation of patches, or the application of scripts to protect data, software, and hardware.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Understanding of Pen Test methods such as Open Source Security Testing Methodology Manual (OSSTMM), Open Web Application Security Project (OWASP), Penetration Testing Execution Standard (PTES), FedRAMP Penetration Test Guide, NIST, etc.
Part-timeRemoteExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Utilize and configure cyber defense tools and technologies, including web content filters, email security, IDS/IPS, HBSS, SIEM tools, DNS security, log analysis, network monitoring, and firewalls.
$145,000 a yearExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Certified Ethical Hacker (CEH), Windows/Linux Admin, Azure Sentinel or Other Cloud SIEM, CISSP, Security+, Network+, Cisco Certified Network Professional (CCNP), Cisco Certified Security Professional (CCSP.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
These systems include, transformers, PLC's, generators, switchgear, UPS systems, STS', ATS' PDU's, chilled water systems, CRAC/CRAH, wet sprinkler systems and pre-action sprinkler, network equipment, transmission media, cabling infrastructure, security hardware, and CCTV.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
The SIA investigates incidents involving information technology (IT) assets and DIA personnel to the DIA Computer Network Defense Center (DCNDC) and Information Systems Security Managers (ISSM) for situational awareness and tracking purposes.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Network security, continuous monitoring, system auditing, and security policy development. Additional 8570 certifications such as CCNA Security, CySA+, CISSP, GICSP, GSEC, Security+ CE, CND, SSCP, AWS Cloud Certified Security (Specialty.
RemoteExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Security engineering/administration background leveraging SIEM, Network firewalls, host-based security, and security configuration. 5+ Years of experience in Cyber Security field as an Information Security Architect or Cloud Security Architect.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Cloud Security Architect (CSA) will leverage broad technical knowledge of cloud security best practices of key public cloud offerings of providers such AWS, Azure, and GCP to establish secure design patterns, to architect integrations among cloud and/or on-premises infrastructures.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Cyber Security certification such as Security+, CySA+, SSCP, ISSEP or ISSAP. Experience with deployment, configuration, and management of diverse number of security solutions and platforms such as DLP, CASB, SIEM, EDR, Firewalls, IDS/IPS, or MDM.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Our Cyber Security Data Automation Engineer will support our DHS CISA program. A security certification, such as, CompTIA Security+ Bachelor's degree in computer science, information technology, or a related field of study with a minimum of (3) three years of proven experience as a Cyber Security Data Automation Engineer or in a similar role, with a focus on implementing and maintaining cybersecurity tools.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Preferred Qualifications Certifications such as Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP), or GIAC Penetration Tester (GPEN). Proven experience as a Penetration Tester or in a similar role that involves ethical hacking, vulnerability assessments, and security audits.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Peraton is seeking an onsite Security Administrator to oversee and manage physical security compliance in accordance with the National Industrial Security Program Operating Manual (NISPOM.
$39,000 - $62,000Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Familiarity with cloud security principles and Palo Alto's cloud offerings like Prisma Cloud. Champion the integration of security considerations throughout the software development lifecycle (DevSecOps.
ExpandApply NowActive JobUpdated Today
network security jobs Title: maintenance technician i in Sterling, VA
FEATURED BLOG POSTS
How to Stall a Job Offer Politely
You did it! After several weeks of looking for a new job and undergoing grueling interviews, you finally have a job offer. Although this may be very exciting, accepting a job offer means that you’re making a long-term commitment to your future employer. So, even if you’re eager to leave your current job, this isn’t a decision you should take lightly.
What is Talent Mapping
Every planner and recruiter knows that each strategic process requires a pre-strategic process. This is usually just the pre-planning phase of your master plan. Because hiring and recruiting involves many aspects of business (budgets, time, employees, planning, etc.), it is important to ask yourself a few questions to evaluate what resources you have to fulfill your hiring needs. These questions include:
How to Take Your Careers Page to the Next Level
Your careers page deserves a lot of attention. It is not just another page on your website. It is a vital tool that could enhance your recruitment outcomes. But in order to do that, you have to make sure it's fully optimized.
How to Decline a Job Offer You Already Accepted
When you think about it, turning down a job offer is not the worst position you could be in. If you’ve been lucky enough to consider multiple job offers, well, then you’re lucky enough.
How to Practice Fair Chance Hiring for People With Criminal Records
Usually when you think of your dream hire, you think of someone who is respectful, trustworthy, reliable, and has sound judgment, right? As you envision your ideal candidate with these qualities, the last person you think of is someone with a criminal record.
6 Common Mistakes to Avoid When Employer Branding
Currently, job searchers are putting extra effort into researching employers. The information they find plays a major role in whether they will pursue an opportunity with you or look for jobs elsewhere. That is why it is now more important than ever to be proactive and intentional when showcasing your workforce and workplace culture. Having a well crafted employer branding strategy can help you strategize and influence your potential candidates so they see your business in the best light. But in order to do that, you should be aware of some of the most common mistakes that employers make.
What to Say When Terminating an Employee
Terminating an employee is an inevitable part of doing business. Whether you’re re-structuring your department or you’ve identified a few employees who’re not living up to your expectations, letting people go is necessary for keeping your workforce healthy and thriving.