- UpvoteDownvoteShare Job
- Suggest Revision
The Digital Modernization sector within Leidos is seeking an Identity and Access Management Systems Engineer to be responsible for the upkeep, configuration, and reliable operation of computer systems in support of DISA's Compartmented Enterprise Services Office (CESO) NOC. The IdAM Systems Engineer will to contribute to the deployment and maintenance of an IdAM solution to serve as a comprehensive Identity as a Service (IDaaS) platform for CESO.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
3+ years of related Network Security Identity Management tools engineering experience, including installing, configuring and troubleshooting experience with one or more of these tools: - SecureSphere Imperva Web Application Firewalls (WAF), Database Activity Monitoring (DAM) - RSA Security Analytics (NetWitness) - Symantec Bluecoat - Cisco FirePower (SourceFire) - Splunk.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Lead Cloud Security Engineer will lead the Network Operations Team working in collaboration with the Information Assurance (IA)/Cybersecurity/Computer Network Defense (CND) Team to perform network operations functions in support of the security tools used in both the AWS Cloud on-premises environment information and the on-premises environment to include the security information and system event management (SIEM) system.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Advanced experience and proficiency across various aspects of IT operations (e.g. networking, virtualization, identity, security, business continuity, disaster recovery, data management, governance.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Integrate advanced security technologies into cloud infrastructure s, including identity and access management (IAM), encryption, intrusion detection/prev ention systems, and security information and event management (SIEM.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Certified Ethical Hacker (CEH), Windows/Linux Admin, Azure Sentinel or Other Cloud SIEM, CISSP, Security+, Network+, Cisco Certified Network Professional (CCNP), Cisco Certified Security Professional (CCSP.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Implement and automate security controls, including identity and access management (IAM), encryption, network security, and logging, using AWS-native tools and third-party solutions.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Preferred Knowledge of industry regulatory and compliance requirements, including FedRAMP, PCI-DCSS, NIST, or HIPAA Knowledge of Open Security Architecture (OSA), Cloud Security Alliance (CSA) and Well Architected Frameworks Experience with Security Incident Event Management (SIEM) systems, including tuning, building queries, and integrating new data sources.
$125,000 - $130,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
7+ years of relevant experience or commensurate skills in areas such as Cloud Security, Threat and Vulnerability Management, DevSecOps, Product/Application Security, or Platform Engineering.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Understanding of IT security principals, technologies, best practices to include logical access control, PKI and other encryption methods, network-based and host-based IDS/IPS, security configuration baselines, auditing, vulnerability discovery, and management.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
At least 2 years of experience in information technology (operations, software delivery, access management, microservices), information security (application security, network security, cyber security, data protection), information systems risk management, information systems auditing, or a combination.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Program is named "Vanguard" and is an IT consolidation consisting of the Department's servers, mainframes, network devices, network perimeter, anti-virus engineering, public key infrastructure (PKI)/biometrics/encryption, monitoring tools, telephony, mobile computing platform, virtual environment, and enclave design/security engineering.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
In-depth understanding of information security principles and best practices, including network security, cybersecurity engineering, cryptography, system security, vulnerability management, and incident response.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Serve as Subject Matter Experts (SME) in Member/Customer Identity & Access Management (CIAM) and fraud prevention via multiple member-facing channels including ATM , Branch , Contact Center , Digital (Online & Mobile App.
$60 - $80 an hourExpandApply NowActive JobUpdated 20 days ago
network security it cloud engineer identity and access management jobs Title: engineer cloud in Vienna, VA
FEATURED BLOG POSTS
How to Fire an Employee
So… you've finally decided to let one of your employees go. Drafting the paperwork and corresponding with HR is the easy part, but knowing how to fire an employee is where things get complicated. In fact, it is one of the most challenging conversations to have in the workplace. However, it must be done, and it must be done with poise and tact. Not only should you keep your state law in mind, but you should also consider your former employee's wellbeing.
How Long Does it Take to Hear Back from a Job?
Are you applying for your very first job? Maybe you’re anticipating your termination from your current role and want to be proactive. Either way, waiting to hear back on your job application can be stressful. If time has passed since you applied, you may wonder how long does it take to hear back from a job. Well, the answer is... it depends.
How to Respond to a Recruiter Through Email? (Tips & Examples)
Rather than wading through an endless list of open roles, wouldn’t it be nice if relevant job opportunities come to you?
How to Reject a Candidate Professionally
When deciding on how to reject a candidate, your first question may be
How Does Salary Pay Work? (Compared to Hourly Pay)
At the bottom of each job advertisement, companies label a role as salaried or hourly. Both methods will get you paid (yay), but each in very different ways. So, it's essential to figure out how does salary pay work? While employees paid by the hour are paid based on how long they work, employers pay salaried employees a fixed amount.
The Quiet Quitting Phenomenon
The term, quiet quitting, was coined in 2009, but only now is it gaining traction as young Millennials and Gen Z workers are experiencing record levels of burnout. With the pandemic and the state of the economy, young employees are feeling the pressure. So, quiet quitting comes into effect when that pressure is exasperated by work stress and no managerial support.
How Does Salary Range Work (With Examples)
What are your salary expectations? Do you know? Establishing a salary that compensates you fairly and keeps you happy at work can feel like taking a shot in the dark. And employers sure don’t make learning budgets easy!