- UpvoteDownvoteShare Job
- Suggest Revision
Hold cloud computing certification (e.g., AWS Certified, Microsoft Azure Certified, CCSP, CompTIA Cloud+)Hold cybersecurity certification (e.g., CISSP, CISM, CompTIA Security+, GSEC.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Certification(s) such as CompTIA Security+, Certified Ethical Hacker (CEH), Certified Authorization Professional (CAP), or Cyber Threat Intelligence certifications would be advantageous.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
GIAC foundational security certifications (e.g. GISF, GSEC, etc.) Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
CISSP, CISM, SANS GSEC, Cloud Security (CCSP, CCSK), or other information security related certification(s). with our third-party managed service providers and respective professional service teams and implementing securitysolutions to assist businesses with the assessment and improvement of GPI’s security infrastructure.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Industry-recognized certifications such as CISSP, CISM, or CompTIA Security+ 1 year or more of experience utilizing security relevant tools, systems, and applications in support of Risk Management Framework (RMF) to include: NESSUS, SPLUNK, ACAS, DISA STIGs, SCAP, Audit Reduction, and HBSS.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
CompTIA Advanced Security Practitioner Continuing Education (CASP+) Continuing Education (CE) Function as a subject matter expert of IT security concepts, including vulnerability management, risk assessment, incident response, cloud security, and threat detection.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
CompTIA Security+ Certification. Experience with Enterprise Mission Assurance Support Service (eMASS), Security Technical Implementation Guides (STIGs), Security Content Automation Protocol (SCAP), Assured Compliance Assessment Solution (ACAS), Ports, Protocols and Services Matrix, Vulnerability Remediation Asset Manager (VRAM), and Host-Based Security System.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Relevant technical and industry certifications a plus such as CISSP, ISSMP, SANS, GCIA, CISM, EnCE, CEH, GCFA, GCFE, GCIH, or GSEC. Bachelor’s degree in Information Technology, Cyber Security, Computer Science, related discipline or equivalent work experience.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Licenses and Certifications One or more technical or cybersecurity certification preferred (e.g., CISSP, CISA, CISM, CCSP, CRISC, CEH, Security+, GSEC, SSCP) Explore more InfoSec / Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
A solid understanding of cyberthreats, ICS Kill Chain, MITRE ATT&CK for ICS, PERA Modeland information security in the domains of TTP’s, Threat Actors, Campaigns, and Observables. This includes security event triage, incident investigation, implementing countermeasures, and conducting incident response.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Associate's degree in a technical discipline or equivalent work experience and industry technical certifications (for example: CCNA, CCENT, MCSE, CompTIA Network+, CompTIA A+, etc.) must be able to lock/unlock security cages, operate security kiosk and print out visitor badges, operate loading dock equipment; must be able to climb and balance oneself on a ladder, must be able to stoop, kneel, crouch and crawl into tight places to access computer hardware, to conduct safety checks, to move equipment, install equipment, etc.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Hunt Team Members interact daily and provide support to the overall CSOC through a wide variety of industry leading capabilities and data sets to include Endpoint Telemetry data, Live Network Packet Capture, IDS/IPS, Security Orchestration, Automation, and Response (SOAR), Cyber Threat Emulation (CTE), and Data Analytics Platforms.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Technical expertise in 2+ security domains between endpoint security, network security, email and web security, data security, identity security, cloud , containers, Operational Technology (OT), vulnerability and configuration management, threat intelligence management, security automation, and security incident and event management (SIEM.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Juris Doctorate or LLM from an ABA accredited law school preferred; will consider candidates with relevant experience who do not have Juris Doctorate or LLM. Knowledge and/or experience with all aspects of a robust compliance program including antitrust, data privacy, anti-harassment, human rights, fraud prevention, trade.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
We are seeking a highly motivated and experienced Cyber Security Sales Representative to join SADA's world leading Google Cloud Security team. The ideal candidate will have a strong background in cyber security, with previous experience as a Chief Information Security Officer (CISO) or in a similar role, and prior sales or presales experience.
ExpandApply NowActive JobUpdated 6 days ago
gsec comptia security jobs in Greendale, WI
FEATURED BLOG POSTS
Why Cover Letters Are Important & How To Write One | Job\Searcher
Most people completely waste their cover letter real estate. Your cover letter is another opportunity to speak directly about how your background and capabilities align with the opportunity you seek. It also allows you to introduce your personality a bit more than a resume does. So, why are cover letters important? Because you can stand out, big time, with a custom cover letter directed to the right person.
Hiring Again After Mass Layoffs
It's never an easy decision to let members of your staff go, but depending on the state of your business, mass layoffs may have been the only way to survive. Now that you're months into the future, you may find yourself itching to start hiring again after previous layoffs.
Into the Heart of the Ukrainian-Russian Conflict
The story of our US-Ukraine connection started when Kevin met Dave. Days away from quitting his last "real" job as a seafood plant manager, Kevin reconnected with a long-lost friend from high school. Little did he know, this long-lost friend was dating his soon-to-be business partner. After meeting Dave through their mutual connection, it didn't take long for the two to start bouncing business ideas off each other. The flow of creativity soon grew into a business partnership that has withstood the test of time.
Why Are Internships Important & How Can You Get One?
Internships are for college students or people who have just completed their degree. If you are a student or recent grad, you may be wondering how to land an internship. If you've never had one, you may even wonder if you need one. After all, didn’t you work in that call center while also doing exams? Or perhaps you’ve bartended your first year in college?
Why is Networking Important & How to Network Effectively
Even if you’ve worked hard to earn a degree from an impressive school, landing your dream job might still come down to who you know – otherwise known as networking. Lots of qualified candidates might apply for a job, but the person who gets it might very well be so-and-so’s sibling, friend, or kid. Sometimes the only way to get your foot in the door is to know someone.
Why Do Recruiters Ghost and What Can You Do About It?
Once you’ve finally mustered up the courage to find another job, leaning into the job hunt can feel scary and overwhelming. So, it does nothing to help your confidence when your outbox is full of unanswered follow-ups and interview requests. You thought that ghosting only happens on dating apps—so why do recruiters ghost, too? Recruiter ghosting is not an effective recruiting strategy, but sometimes it’s inevitable. How can you overcome such an unfortunate new career trend? Read on.
Internal Hiring Best Practices
Each companies hiring strategy is based on a set of rules that defines the ideal candidate. Many companies utilize internal and external hiring to ensure they have skilled, experienced workers. If you work in recruiting, maximizing your internal hiring strategies could be the key to retaining employees and simplifying your hiring process.