Design, deploy, and support telecom systems including PBX, VoIP, SIP, and mobile communication networks.. Implement network security protocols and ensure regulatory compliance (e.g., FCC, GDPR).. Strong knowledge of VoIP systems (e.g., Cisco Call Manager, Asterisk, Avaya).. Familiarity with networking protocols and technologies: TCP/IP, SIP, RTP, QoS, MPLS.. Experience with cloud telephony platforms (e.g., Twilio, RingCentral, Zoom Phone).
DoD Public Key Infrastructure (PKI) Service. Network Security Incident Response and Reporting. Rack Elevation Creation and Documentation. Certified Information Security System Professional (CISSP) or Certified Information Security Manager or Cyber Security Leadership Certification (GSLC). Must have experience overseeing and managing unified communications.
Minimum of a Top Secret Clearance, with ability to obtain TS/SCI.. As a Cyber Threat Intelligence Analyst, you will be responsible for providing analysis on relevant threats to the customer environment in support of the overall defensive effort.. You will be a key component in providing additional tactical context surrounding adversarial TTPs and support to the Network Security Monitoring and Incident Response teams.. Ability to develop specific expertise, discerns patterns of complex threat actor behavior, and communicates a comprehension of current and developing Cyber threats. Experience with analytic tool, including Augury, Splunk, Elastic, TAC, Palantir, Shodan, Analyst Notebook or other threat intelligence platform preferred
The ideal candidate will have a strong background in IT sales, cybersecurity, and infrastructure solutions, coupled with a proven track record of exceeding sales targets.. 3+ years of experience in B2B sales, preferably in IT infrastructure, cybersecurity, or related fields.. Strong understanding of cybersecurity products and IT infrastructure solutions (e.g., cloud services, network security, endpoint protection, etc. Proficiency with CRM tools (e.g. HubSpot) and Microsoft Office Suite.. Industry certifications such as CISSP, CISM, or CCSP are a plus.
You will execute cybersecurity countermeasures, including server patching, firmware updates, and firewall configuration.. You will provide field service and engineering support to systems such as Video Management System, Access Control, Terminal Wide Voice Paging, Baggage Sortation Systems, Parking Revenue Control Systems, Flight Information Management System (FIMS), Common Use System Environment (CUSE), 800 MHz Trunked Radio System, and numerous other electronic systems.. You will be providing software support and troubleshooting for SQL databases, Windows and Linux applications, virtual machine clusters, network monitoring tools and unique airline applications.. Security Requirements As the successful candidate, you must pass a Transportation Security Administration (TSA) background check as well as a criminal history background check with the Federal Bureau of Investigation (FBI).. In this role, you will be required to access Port of Seattle Police Department equipment, office locations, systems and/or vehicles.
Implement and oversee cybersecurity protocols , including threat monitoring, incident response, and workforce security training. Manage cross-domain security solutions and compliance with RMF and COMSEC requirements.. Office 365 & GCC High – Hands-on management of Microsoft Office 365, GCC High environments , and related tools.. Security Focus – Familiarity with network security, RMF, cross-domain solutions, and COMSEC. Our consultants bring expertise in the Department of Defense, Intelligence Community, and federal entities , providing solutions in all-source analysis, mission support services, and IT infrastructure.
Focus: Olin Corporation is hiring an Information Security Systems Specialist to be located at the Winchester Lake City Army Ammunition Plant in Independence, MO. This role represents the Information Security department within project teams across the Modernization & Innovation organization to assess the Cybersecurity needs of new IT and OT systems which include servers, desktops, switches, SCADA, PLC, NAE, etc.. Minimum of 1 certification from the following: CompTIA Security+Systems Security Certified Practitioner (SSCP)Certified Information Systems Security Professional (CISSP)Certified Information Systems Manager (CISM)Certified Ethical Hacking (CEH)GIAC Information Security Professional (GISP). Knowledge of information security concepts and technologies such as networking, network segmentation, vulnerability scanners, firewalls, IPS\IDS, network analysis tools, data loss prevention, security event management, encryption technologies, proxies, cloud services, mobile devices, etc.. This position requires successful vetting as an Employee Possessor in accordance with Department of Justice and the Bureau of Alcohol, Tobacco, Firearms and Explosives.. The US Government does not allow non-US citizens on-site at the Lake City Army Ammunition Plant.
– Knowledge of the full stack of Microsoft desktop and server applications as well as Office 365.. – IT Certifications: Microsoft MCP or CompTIA A+.. – Knowledge of applications like A.E.C. field such as AutoCAD and Revit.. – Managed Service Provider (MSP) experience is a plus.. Keywords: Centreville VA Jobs, Network/Systems Support Specialist, Microsoft, Desktop, Server, Office 365, Azure, MAC Devices, AutoCAD, Revit, LAN, WAN, Network, Networking, Support, Technician, Virginia Recruiters, Information Technology Jobs, IT Jobs, Virginia Recruiting Looking to hire for similar positions in Centreville, VA or in other cities?
Job Highlights:A team of more than 400 professionals, Health System Information Services (HSIS) works to keep UAB Medicine’s IT systems and infrastructure running smoothly to deliver quality care to our patients.. Join our nationally ranked team at UAB Medicine, the No. 1 Best Large Employer in 2021 as ranked by Forbes magazine.. - U.S. News & World Report's Best Hospitals, #1 in Alabama- America’s No. 1 Best Large Employer, Forbes, 2021- Level I Trauma Center- NCI-Designated Comprehensive Cancer Center, Comprehensive Transplant Institute, Comprehensive Stroke CenterOur success in patient care, innovation, and education is a direct result of our supportive and inclusive culture.. Whether you are looking to start your career, fast-track your development, or diversify your skills, UAB Medicine offers avenues for advancement that other employers cannot match.. ·Working technical knowledge of current network hardware, software, protocols, and standards, including VPN/SSL VPN, Network Design, Network Security, TCP/IP, Active Directory, Routing Protocols, Windows platform, Arista Hardware, Arista Cloud Vision Cisco IOS, Cisco DNAC, Fortinet Firewalls, 802.
diploma/GED required Seven (7) years or more expert level experience with SD-WAN, network switching (capacity planning & VLANs), network routing (OSPF. EIGRP, BGP), WAN technologies (MPLS, VPLS, VPN, QoS) and network security).. required Seven (7) years or more expert level experience with logical design models (L2/L3, VPC, VDC, Datacenter Zones, Spanning tree, VFR, VTP, VLANs, physical cabling).. required Three (3) years or more experience with architectural and network support of Cloud Network Infrastructures and Managed Services on Azure and AWS. required Three (3) years or more experience with deep-inspection firewalls, intrusion and threat protection platforms, RADIUS, DNS, NTP, monitoring, and logging.. advanced required CCNP, CCNA AWS or Azure certification Travel: 1-10% Safety Sensitive Onsite visits to certain Ryder and customer accounts require the adherence of the site’s employee safety standards and protocols.. This may include some of the following: (Hard hat, steel toe shoe, eye protection DOT Regulated: No Applicants from California, Colorado, Hawaii, New Jersey, New York City, and Washington: Salary is determined based on internal equity; internal salary ranges; market data/ranges; applicant’s skills; prior relevant experience; certain degrees or certifications, etc.
Oversee all security incident investigation activities including root cause analysis, reverse engineering, digital forensics, and after-action reporting.. Manage the threat intelligence processes to include proactive monitoring of external threat intel feeds and internal security incident and event monitoring solutions to proactively identify and protect the organization against known and emerging threats.. Deploy, maintain, and monitor the enterprise technology solutions that support this function including vulnerability scanners, SIEM solutions, Anti-virus, EDR, endpoint threat management, and forensics tools.. Knowledge of digital forensics to investigate security breaches and gather evidence.. Additional Information: Location: 633 Third Avenue, NYC Reporting to The Director, Cybersecurity Operations Schedule: Fully Remote Pay Range: $162,000.00-$267,200.00 Helpful Links : #LI-POST #LI-REMOTE Closing MSK is an equal opportunity and affirmative action employer committed to diversity and inclusion in all aspects of recruiting and employment.
This position is based at the Loews Hotels & Co Business Services Center in Franklin, TN.. Located in major city centers and resort destinations from coast to coast, the Loews portfolio features one-of-a-kind properties that go beyond Four Diamond standards and embrace their “uniquely local” community to curate exciting, approachable and local travel experiences for guests.. Enhance and maintain endpoint security platforms and processes including Anti-Virus, Anti Malware, Encryption, System Hardening, EDR, MDM, Web Content Management, DNS Security, Identity Solutions SIEM and Patch Management.. Mobile device management, Cloud, security, and investigations. Knowledge of Security Technologies from Ivanti, Mobile Iron, Sentinel One, LogRhythm, Sophos, Cisco Umbrella and CyberArk
Install, configure, and maintain MySQL database instances (on-premises and cloud-based).. Monitor database performance and optimize queries, indexing, and schema design.. Implement backup, restore, and disaster recovery procedures.. Implement security best practices, including access control, encryption, and compliance (GDPR, PCI-DSS).. Automate database administration tasks using scripts (Shell, Python, SQL).
With approximately 100 million customers worldwide using products such as TurboTax, Credit Karma, QuickBooks, and Mailchimp, we believe that everyone should have the opportunity to prosper.. Hands-on experience with Palo Alto Networks firewalls and security appliances.. Experience with Infrastructure as Code (IaC) tools like Terraform or CloudFormation.. Knowledge of other cloud platforms (Azure, GCP).. Implement and manage network security solutions, including firewalls (Palo Alto Networks), secure web gateways (Zscaler), and intrusion detection/prevention systems.
These projects and activities span across Identity and Access Management, Governance Risk and Compliance, Security Architecture, Maritime Safety, Infrastructure Application and Data Security, and Threat Management.. Deep understanding and familiarity with core concepts of network security, security architecture, security operation, vulnerability management, cloud security, application security, security awareness program and threat intelligence.. Experience with security technologies and tools, including SIEM, IDS/IPS, endpoint protection, encryption, access control, firewalls, Vulnerability Management, etc.. Our portfolio of leading cruise brands includes Carnival Cruise Line, Holland America Line, Princess Cruises and Seabourn in North America; P&O Cruises, and Cunard Line in the United Kingdom; AIDA in Germany; Costa Cruises in Southern Europe; and P&O Cruises in Australia.. Carnival Corporation & plc and Carnival Cruise Line is an equal employment opportunity/affirmative action employer.
The Pen Test Vulnerability Analyst candidate will support a rigorous testing schedule in collaboration with third-party Penetration Testers in support of customer requirements.. Knowledge of computer networking concepts and protocols, and network security methodologies. Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). 2+ years experience conducting IT compliance assessments (PCI, etc.). Global Information Assurance Certification (GIAC) or EC Council Ethical Hacking Certifications preferred.
Other degrees may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics).. Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering. Pet adoption program, generous referral bonus program, fun events, and more!. Several factors influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, education, specific skills and competencies and certifications. Belay Technologies is acertified Service-Disabled Veteran-Owned Small Business located in Columbia, Maryland (Baltimore/Washington/Fort Meade area).
Help support the identity and access governance team with IAM program management assistance and privileged access management, roles and rules management, SOD management and other IAM compliance related activities.. - Saviynt, SailPoint IIQ or IDN, Oracle Identity Governance, One Identity, or other user identity lifecycle management solution products or role-based access control solutions;. - Azure AD, ForgeRock, Ping Identity, OKTA, or other single sign-on, multi-factor and federation solutions;. Must have 2 years of experience in defining or re-engineering IAM related processes, including incident management, change management, and configuration management.. Must be eligible to obtain a certification in CISSP, CISM, CISA, CIPT, CIPM, CRISC or other relevant certification within one year of hire.
You’ll report to the Senior Director of Cybersecurity Architecture, Cloud Security, and DevSecOps and be responsible for defining and socializing reference architectures, standards, and controls across technology on-premises, in the cloud, and within development processes.. At Cox, you’ll find a workplace where relationships are crafted with care and successes are celebrated with high fives.. Deep experience in 1-2 cybersecurity domains such as application security, data protection, cloud security, network security, IT risk, security operations, identity and access management, DevSecOps, etc.. At least one relevant cybersecurity certification – CISSP, CISM, CISA, etc.. With exciting investments and innovations across transportation, communications, cleantech and healthcare, our family of businesses – which includes Cox Automotive and Cox Communications – is forging a better future for us all.
Selectek has a contract-to-hire opportunity in Greenwood Village, CO for a skilled CAD Designer to join our team and provide design documentation for commercial and hospitality projects.. The successful candidate will collaborate with designers and engineers across various disciplines, including architecture, MEP, and interior design.. - Assist Project Managers with Programming efforts, creation of SDs, DDs, CDs, and Punch List assistance.. - Gain proficiency in understanding our company’s products, services, and processes across various business silos such as Access Control & Surveillance, Sound Masking, Structured Cabling, and VoIP Wired and Wireless Networking Solutions.. - Familiarity with electrical systems, Audio/Visual systems, structured cabling, networks, CCTV, access control, and intrusion detection.