- UpvoteDownvoteShare Job
- Suggest Revision
Mindpoint Group, LLC has an exciting opportunity to join the Cyber Threat Hunt team for MPGSOC, our Security Operations Center service offering. Experience with operational security, including security operations center (SOC), EDR/XDR, incident response, malware analysis, or IDS and IPS analyses.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Asset management, ServiceNow, software life cycle, Hardware, ITIL, Configuration, business systems analysis, information security, compliance, Business requirements, Requirements gathering, Business analysis, Requirement gathering, User stories, UAT testing, user acceptance testing, configuration management, process owner, FFIEC, Info Sec, software configuration management, CMDB, workflow, Inventory management, banking, governance.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
CISSP, Relevant GIAC Cert, SSCP, CISM, CCSP, CEH, CPT, CWSP, CCNP Security, CCIE Security or Relevant Professional certifications in Cyber Security OEMs. Educatingsales teams on Cyber Security solution selling and key technologies through 1x1 training, team training,and company training.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
The IT Analyst helps manage the provision of outsourced server operations and Infrastructure services including hardware and software asset management services for all NiSource business units.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Their responsibilities include: Installing, testing, troubleshooting, repairing or replacing cryptologic networks, physical security systems, electronic equipment, antennas, personal computers, auxiliary equipment, digital and optical interfaces, and data systems Configuring, monitoring and evaluating Information Operations (IO), Information Warfare (IW) systems and Information Assurance (IA) operations Cryptologic Technician Collection (CTR) – CTRs serve as experts in intercepting signals.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
IT audit / IT security / cyber security certifications are a plus (e.g., CISM or CISA certifications) Basic project management certification is a plus (e.g. CAPM; Prince2 Foundation level); additional certifications are a plus but not required.
Full-timeRemoteExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
A high school diploma or equivalent is required to become an Enlisted Sailor in the cryptology field in the Navy. Those seeking a Cryptologic Technician position must be U.S. citizens who can meet eligibility requirements for a Top Secret/Sensitive Compartmented Information security clearance.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
This role reports under the Operations/DevOps function within Cyber Security Threat Management. Requires experience providing top-tier support for 3 or more of the information security technology areas: 1) Access Control, 2) Application Security, 3) Business Continuity and Disaster Recovery Planning, 4) Cryptography, 5) Information Security and Risk Management 6) Legal, Regulations, 7) Compliance and Investigations, 8) Operations Security, 9) Physical (Environmental) Security, 10) Security Architecture and Design, 11) Telecommunications and Network Security.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
As a CT, you may work independently or as part of small, coordinated teams – ultimately under the supervision of Information Warfare Officers (four-year degree required) or Cyber Warfare Engineers (four-year degree required.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Each CT role works under the oversight of Cryptologic Warfare Officers (four-year degree required) or Cyber Warfare Engineers (four-year degree required) – and potentially both. Cryptologic Technician Interpretive (CTI) – CTIs serve as experts in linguistics (including Arabic, Chinese, Korean, Persian-Farsi, Russian and Spanish) and deciphering information in other languages.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
At least one year of full-time work experience in security work, aviation screener work, or X-ray technician work. Providing frontline security protection of air travelers, airports and airplanes.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Self-motivated, proactive approach in the application of GSOC, Crisis Management, and Global Security practices. Experience supporting a crisis management, security operations, or call center equivalent preferred.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Deep functional and technical knowledge of the ServiceNow ITAM modules (Hardware Asset Management and Software Asset Management) and Configuration Management Database (CMDB.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As a Network Security Engineer, you will play a crucial role in safeguarding our network infrastructure, data, and systems against cyber threats. 7 Experience with security information and event management (SIEM) solutions.
ExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Their responsibilities include: Collecting, analyzing and exploiting foreign language communications of interest Transcribing, translating and interpreting foreign language materials Providing cultural and regional guidance in support of Navy, Joint Force, national and multinational needs Cryptologic Technician Technical (CTT) – CTTs serve as experts in airborne, shipborne and land-based radar signals.
ExpandApply NowActive JobUpdated Yesterday
asset management cyber security jobs Title: engineer in Columbus, Vienna, West Virginia
FEATURED BLOG POSTS
Why is Networking Important & How to Network Effectively
Even if you’ve worked hard to earn a degree from an impressive school, landing your dream job might still come down to who you know – otherwise known as networking. Lots of qualified candidates might apply for a job, but the person who gets it might very well be so-and-so’s sibling, friend, or kid. Sometimes the only way to get your foot in the door is to know someone.
Why Do Recruiters Ghost and What Can You Do About It?
Once you’ve finally mustered up the courage to find another job, leaning into the job hunt can feel scary and overwhelming. So, it does nothing to help your confidence when your outbox is full of unanswered follow-ups and interview requests. You thought that ghosting only happens on dating apps—so why do recruiters ghost, too? Recruiter ghosting is not an effective recruiting strategy, but sometimes it’s inevitable. How can you overcome such an unfortunate new career trend? Read on.
Internal Hiring Best Practices
Each companies hiring strategy is based on a set of rules that defines the ideal candidate. Many companies utilize internal and external hiring to ensure they have skilled, experienced workers. If you work in recruiting, maximizing your internal hiring strategies could be the key to retaining employees and simplifying your hiring process.
Why is it so Hard to Get a Job After College
For many, it was easy finding a job while in college. But after job hunting for weeks, you may wonder why it is so hard to get a job after college. After all, you’ve put a lot of time and effort into getting your degree. But don’t get discouraged. The University of Washington found that 53% of graduates are either unemployed or working a job that doesn’t require a degree. Other studies also show that landing your first job can take between 3 and 6 months. So, getting your first job takes time.
Why Leadership Is So Important in Your Career
There are plenty of baseball players worldwide, but only a select few will master the sport enough to play in the World Series. Similarly, you’ll meet hundreds of “managers” throughout your professional career. Still, only a few will cement themselves as true leaders in your mind. This is why leadership is important—the most influential leaders leave a mark. They inspire.
Making the Move to Salary Transparency
The salary transparency trend continues. Last year, Colorado passed its Equal Pay Transparency Rules, which required employers to include compensation in job postings, notify employees about promotional opportunities, and record job descriptions and wage records. Soon after, states like Washington, Nevada, Maryland, and Rhode Island followed suit.
Brand Reputation 101
People's initial perception of your organization is also known as your brand reputation. Your brand rep either encourages or discourages people from engaging with your company. This means the way people view your company will affect sales and even recruiting efforts.