- UpvoteDownvoteShare Job
- Suggest Revision
Experience with centralized logging, boundary defense, Palo Alto Firewalls, system patching, role-based access control (RBAC), Identity and Access Management (IdAM), Zero-Trust Architecture, and vulnerability scanning.
ExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
3+ years of related Network Security Identity Management tools engineering experience, including installing, configuring and troubleshooting experience with one or more of these tools: SecureSphere Imperva Web Application Firewalls (WAF), Database Activity Monitoring (DAM)RSA Security Analytics (NetWitness)Symantec BluecoatCisco FirePower (SourceFire)Splunk.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Cloud Security: Nessus, NetSkope, Enterprise Security External Change Council, Identity and Assessment Management, Continuous Monitoring as a Service, McAfee, eMASS, Centrify.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
You Have: 4 years of experience with building, operating, and maintaining compliant cloud computing environments in Amazon Web Services, Microsoft Azure, or Google Cloud Platform 4 years of experience with deploying and maintaining cloud-native infrastructure services, including Azure Virtual Network, Virtual Private Clouds, Azure Firewall, Security Groups and Azure RBAC, or Identity and Access Management.
$84,600 - $193,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This includes setting up VPCs, subnets, NAT, Transit gateways, as well as implementing network ACLs, security groups, and AWS Identity and Access Management (IAM) roles and policies Experience with IaC tools such as AWS CloudFormation or Terraform to automate the setup, scaling, and management of infrastructure.
ExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
AWS Security: System Manager (Explorer and OpsCenter), CloudWatch, Config, CloudTrail, Elasticsearch (Kinesis DataStreams), GuardDuty, Inspector, Key Management Service (KMS), Security Hub, Directory Service, Identity and Access Management, Resource Access Manager, Cognito, Secrets Manager, Certificate Manager, Artifact.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Advanced experience securing network traffic via AWS API Gateway and AWS Application Load Balancers, cloud-security technologies (e.g., VPC, Security Groups) and Access Control (IAM.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Have an understanding of cloud security principles and best practices, including identity and access management, encryption, firewall configurations, and network security groups.
$150ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Demonstrated experience designing and implementing cloud-based solutions including Compute, Storage, Networking, Security, and Monitoring. – Participate in capacity planning, disaster recovery planning, and security audits.
$150ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The AWS Application Security team is on the cutting edge of many security issues for a wide variety of platforms and technologies including cloud services, Internet of things (IoT), identity and access management, mobile devices, virtualization and custom hardware, all operating at massive scale.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
The Senior Cloud Engineer discerns and furnishes system implementation requisites for network engineering and security engineering relevant to the core systems platforms of the firm.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
ENS consults for the Department of Defense (DoD) and Intelligence Community (IC) providing innovative solutions in the core competency area of Identity, Credential and Access Management (ICAM), Software Development, Cyber and Network Security, System Engineering, Program/Project Management, IT support, Solutions, and Services that yield enduring results.
ExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Familiarity with: Zero Trust Network Access (ZTNA) and Secure Access Service Edge (SASE) frameworks, Identity, Credential, and Access Management (ICAM) (OKTA), Cloud Workload Protection Platform (CWPP), Security Operations Center (SOC) Operations, Vulnerability Threat Management, and Compliance Formal Education Master of Science degree (or higher) in one of the following: computer science, electronics engineering, computer engineering, computer science, information technology, or cyber security.
Full-timeExpandApply NowActive JobUpdated 2 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Demonstrated expertise in cloud security practices, including encryption, data protection, network security, and vulnerability management. - Architect and implement identity and access management solutions to ensure proper user authentication and authorization, adhering to FedRAMP standards.
ExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
AWS Security is on the cutting edge of many security issues for a wide variety of platforms and technologies including cloud services, Internet of things (IoT), identity and access management, mobile devices, virtualization and custom hardware, all operating at massive scale.
ExpandApply NowActive JobUpdated 6 days ago
network security cloud engineer identity and access management jobs Title: engineer in Vienna, VA
FEATURED BLOG POSTS
A Potential TikTok Ban?!
As you may already know, there has been a lot of talk lately about the possibility of a TikTok ban. While this has not yet come to fruition, it's important to consider the implications this could have for businesses and recruiters who rely on TikTok as a platform to market their brand, recruit new talent, and connect with their audience.
The Effects of Workplace Racism and Sexism
One day it's a covert statement to a mother returning to work after maternity leave. Another day it's a lingering gaze at an employee enjoying a culturally rich meal. These microaggressions (or sometimes macroaggressions) can take an employee from a confident, high-performer to one that feels insecure being themselves at work. Your employees engage with people with different ideas and feel most comfortable and valued when they can work without losing their cultural, racial, and gender identity. While most employers know this, why have workplace racism and sexism often been neglected?
When Rage Applying Strikes: How to Identify Unserious Candidates
As the job market remains highly competitive, we have seen a surge in "rage applying." This is when candidates apply to multiple jobs, often without considering whether they are truly interested in the role. Rage applying goes hand-in-hand with quiet quitting. Often, employees want to entertain the thoughts and feelings of leaving their job, but they aren't necessarily serious about leaving yet. Meanwhile, other employees engaging in this trend are actually trying to find a better role. As a recruiter, it can be hard to identify who are the real applicants in a sea full of quiet quitters, but understanding rage applying and identifying red flags will certainly help.
How to Increase Job Ad Exposure
In today's competitive job market, writing quality job ads is critical for attracting top talent to your organization. While networking and candidate referrals are prime real estate for finding qualified candidates, nothing beats the tried-and-true method of writing an extraordinary job ad. But while writing a great job ad is the first step, what's more important is increasing visibility. You could have the most detailed, well-written ad on the internet, but if no one sees it, then you are wasting time (and potentially money!). Employers often believe that job boards are the root of the problem, but you can learn how to increase job ad exposure by tweaking a few steps of your recruitment process.
How to Navigate Hiring Out of State
The job market has shifted significantly in recent years. The accelerated adoption of technology has not only pushed many companies into remote working arrangements but also increased the availability of supporting tools and technologies (i.e., video conferencing and collaboration software).
Building a Candidate Pipeline Through Internships
Building a candidate pipeline through a great internship program for local college students and recent graduates at local universities is a great and cost-effective way to attract and retain top talent. By offering meaningful and impactful work experiences, regular feedback, coaching, and mentorship, you can create a positive internship experience that will make your organization a sought-after destination for future employees. This not only benefits the organization in the short-term but also in the long-term, as you'll have a pool of well-trained and experienced candidates who may be interested in full-time employment once they graduate. Furthermore, building relationships with local universities and college students can increase brand awareness and build a positive reputation for your organization in the local community.
Hiring Transparency
Transparency in hiring refers to the open and honest communication and information sharing that takes place between employers and job candidates. It encompasses all aspects of the hiring process, from posting job descriptions to providing feedback on performance during and after the interview process. In today's job market, hiring transparency has become increasingly important for both employers and candidates alike.