- UpvoteDownvoteShare Job
- Suggest Revision
Develop countermeasures for network and hosts systems based on open source intelligence (OSINT) or behavioral analysis. Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
One of the following:GCIA, GCED, GCFA, GCFE, GCTI, GNFA, GCIH, ECSA, CHFI, CISSP, Security+, Network+, CEH, CND. CCE, CFC, EnCE, CFCE, GREM. Strong logical/critical thinking abilities, especially analyzing security events (windows event logs, network traffic, IDS events for malicious intent.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience using security-relevant tools and devices for security auditing, network security, host/server security, communication security, or policy management.
ExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Evolve your security operations into your proactive risk reducing superpower through the combination of MDR with Red Teams that validate every alert. By creating continuously optimized identification, detection, and resilience from today’s dynamic threat landscape, UltraViolet Cyber provides both managed and custom-tailored unified security operations solutions to the Fortune 500, Federal Government, and Commercial clients.
ExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Explore more InfoSec / Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
BS Computer Science, Cyber Security, Computer Engineering, or related degree; or HS Diploma & 10+ years of network investigations experience. - Knowledge of defense-in-depth principles and general attack stages with respect to network security architecture.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Work with System and Network Administrators to apply Security Technical Implementation Guide (STIG) settings. Bachelor's degree in Systems Security, Network Engineering, Information Technology, or related Engineering discipline and typically 3 years of relevant experience.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
6-12+ years of experience working in the areas of IT, systems administration, engineering, architecture, cyber, intelligence, information security, hunt, cyber operations, network forensics, insider threat, etc.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Hold cloud computing certification (e.g., AWS Certified, Microsoft Azure Certified, CCSP, CompTIA Cloud+)Hold cybersecurity certification (e.g., CISSP, CISM, CompTIA Security+, GSEC) This includes solution planning and engineering, defining security requirements, target architecture, interoperability and integration, system testing, Verification and Validation, Modeling and Simulation, studies and analysis, post-deployment security validation (PDSV), and project risk management.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Master’s degree in advanced computer science or relevant field, Certified Ethical Hacker (CEH), Certified Information Security Manager (CISM), Offensive Security Certified Professional (OSCP.
ExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Cyber Security Operations Specialist (Incident Response and Forensics) At Accenture Federal Services, nothing matters more than helping the US federal government make the nation stronger and safer and life better for people.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Associate Incident Response Engineer role is for experienced IT and cyber security professionals that are looking to get into digital forensics and more focused on cyber security. Participate in incident response engagements to guide clients and/or junior team members through forensic investigations, contain security incidents, and provide guidance on longer-term remediation recommendations.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Intapp’s Cybersecurity team is looking for a Principal Cloud Security Architect to work with a small, fast-paced team that supports a rapidly growing global SaaS organization. Be responsible for architecting and designing the next generation of security controls for Intapp’s SaaS products, including Zero trust architectures, Privileged Access Management (PAM), Encryption and Key Management, Client Managed Keys (CMK), Identity and Access Management (IAM), data residency, detection and response, and business continuity.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
As a DevSecOps Assurance Specialist, you will play a pivotal role in ensuring the security and compliance of the Vanguard software development lifecycle (SDLC). Gather and report metrics from application security solutions and processes to provide meaningful insights into the maturity of the DevSecOps program.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering, Network and system administration may account for some, but not all, of the experience.
ExpandApply NowActive JobUpdated 5 days ago
network security jobs Title: network specialist Company: Apex Systems in Greendale, WI
FEATURED BLOG POSTS
Explore Your Skill and Find the Best Way to Make Money From Home
When you just can’t stomach another drive-thru coffee on your morning commute, close your navigation app on your phone and search for easy ways to make money from home instead. With a computer and some niche skills, there are countless opportunities for you to earn a living from your couch. (Okay, fine, your home office.) Below, we’ll explore 30 different ways to make money from home, as well as a few “too-good-too-be-true" warning signs to know to keep you from booking the wrong remote gig.
Learn How to Respond to an Interview Request With Templates
Job interviews are an inevitable part of any job search. So, handling them well is key to building a fulfilling career. Regardless of whether you’re looking at a more junior role or strive for a role as a business executive, you need to maintain your professionalism every step of the way in order to stay in the game.
How to Write an Address Correctly: Explained with Examples
It's hard to imagine a scenario where a text or phone call just won't do these days. With communication at our fingertips, you may think learning how to write an address is a superfluous skill. But it's a skill that will come in handy when you need to fill out healthcare forms, ship a package, order food delivery, or even apply for new jobs.
What is Employment Participation Rate
According to economists, there are four factors of production that go into creating higher quality goods at lower prices. These are
How to Get Pay Stubs (From Previous Employee Also!)
Pay stubs are an important piece of document which shows your earnings in a given period, as well as any deductions made towards your health insurance or pension contributions. They’re also excellent for finding out how much your recent salary raise has bumped up your monthly net income.
How to Write a Job Description?
It might be tempting to overlook the importance of a well-written job description. After all, if you’ve posted job ads before and ended up with tons of resumes in hand, it’s easy to assume that this will always be the case, regardless of how your job ad reads. But, in reality, you really can’t take getting an influx of resumes for granted.
How to Get a W2 From Previous Employers
When tax time rolls around, the last thing you want to worry about is having to track down a W-2 from your former employer. Many times you won’t have to because the IRS requires companies to send these forms to all current and former employees who have earned more than $600 in the last year. Unfortunately, there are employers who don’t do what they’re supposed to. There are even times where something else may happen that prevents the W-2 from getting where it’s supposed to go.