Custom Protective Services in Connecticut is looking for qualified Security Officers.To maintain a safe and secure environment for customers and employees by patrolling and monitoring premises and per...
read moreWhat Do Information Security Analysts Do?.Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information.May ensure appropriate security controls are in...
read moreUtilizes information security technologies such as antivirus, IDS/IPS, SIEM, endpoint detection & response, DLP, data encryption, proxies, and network access control, as well as security policies and ...
read moreAs a Senior Network Security Engineer you will be responsible for supporting, managing, and designing the network/firewall infrastructure. Bachelor’s degree in information technology-related field of ...
read moreStrong TIER 2-3 Network Security Engineer.
Bachelor’s degree in Computer Science, Engineering, Business Administration, Math, Electrical Engineering, or a related field. Knowledgeable in network access control (NAC) systems, incident response ...
read moreStrong TIER 2-3 Network Security Engineer.
What Do Information Security Analysts Do?.Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information.May ensure appropriate security controls are in...
read moreUtilizes information security technologies such as antivirus, IDS/IPS, SIEM, endpoint detection & response, DLP, data encryption, proxies, and network access control, as well as security policies and ...
read moreAs a Senior Network Security Engineer you will be responsible for supporting, managing, and designing the network/firewall infrastructure. Bachelor’s degree in information technology-related field of ...
read moreCustom Protective Services in Connecticut is looking for qualified Security Officers.To maintain a safe and secure environment for customers and employees by patrolling and monitoring premises and per...
read moreServes as the enterprise lead for security incident response planning and execution. Oversees the investigation of all security incidents, and ensures timely reporting, resolution, and implementation ...
read moreBachelor’s degree in Computer Science, Engineering, Business Administration, Math, Electrical Engineering, or a related field. Knowledgeable in network access control (NAC) systems, incident response ...
read moreManages thorough investigations of all incidents under the jurisdiction of corporate security, or in conjunction with internal audit investigators, to include workplace violence, theft, and other inci...
read moreProficient in Incident Response and automation workflows as it relates to Security Operations. Responsible for documenting the incident life cycle, conducting handoffs, escalation, and providing suppo...
read moreMix of technical skills and strategical knowledge (50% on engineering tactics, 50% on hands-on strategy).
Develop templates, methodologies, and best practices for cyber security engineering. We call ourselves Engineering Pioneers. Principal Engineer within Cyber Security.
Network Security & Firewall Engineering.
Network Security & Firewall Engineering.
Develop templates, methodologies, and best practices for cyber security engineering. We call ourselves Engineering Pioneers. Principal Engineer within Cyber Security.
Response to Proposal (RFP) process (essential).
Participate in Cyber incident response and recovery efforts, providing subject matter expertise as needed.
Responds to incidents of fire, medical emergency, bomb threat, flooding, water discharge, elevator emergency, hazardous materials, inclement weather, and other incidents or conditions following proced...
read moreParticipate in Cyber incident response and recovery efforts, providing subject matter expertise as needed.
Chief Information Security Officer.The Chief Information Security Officer (CISO) at Princeton is responsible for developing, expanding and maturing the University information security policy and strat...
read moreChief Information Security Officer.The Chief Information Security Officer (CISO) at Princeton is responsible for developing, expanding and maturing the University information security policy and strat...
read moreMaintain daily activity reports and incident logs.
Responds to incidents of fire, medical emergency, bomb threat, flooding, water discharge, elevator emergency, hazardous materials, inclement weather, and other incidents or conditions following proced...
read moreResponds to incidents of fire, medical emergency, bomb threat, flooding, water discharge, elevator emergency, hazardous materials, inclement weather, and other incidents or conditions following proced...
read moreA strong liberal arts core forms the foundation for programs offered through TCNJ's seven schools - Arts & Communication; Business; Education; Humanities and Social Sciences; Science; Nursing, Health,...
read moreOfficers are knowledgeable of pedestrian traffic flow, recognize unusual incidents or unwarranted intrusions, and effect prompt and proper requests for assistance when required. Officers respond to in...
read moreOfficers are knowledgeable of pedestrian traffic flow, recognize unusual incidents or unwarranted intrusions, and effect prompt and proper requests for assistance when required. Officers respond to in...
read moreA strong liberal arts core forms the foundation for programs offered through TCNJ's seven schools - Arts & Communication; Business; Education; Humanities and Social Sciences; Science; Nursing, Health,...
read moreIncident Response Systems Engineer. A trusted leader in cloud, digital engineering, data, and Artificial Intelligence, the nation looks to SAIC to integrate emerging technology to modernize critical m...
read moreIncident Response Systems Engineer. A trusted leader in cloud, digital engineering, data, and Artificial Intelligence, the nation looks to SAIC to integrate emerging technology to modernize critical m...
read moreExperience leading cybersecurity risk assessments, vulnerability management, and incident response programs. Lead incident response, breach management, and regulatory reporting, ensuring adherence to ...
read moreExperience leading cybersecurity risk assessments, vulnerability management, and incident response programs. Lead incident response, breach management, and regulatory reporting, ensuring adherence to ...
read moreSeeking multiple Cyber Security/Threat Modeling Engineers to my client on their dynamic, cross-functional team dedicated to delivering cutting-edge digital business transformation solutions for our cl...
read moreSeeking multiple Cyber Security/Threat Modeling Engineers to my client on their dynamic, cross-functional team dedicated to delivering cutting-edge digital business transformation solutions for our cl...
read moreVULNERABILITY/THREAT MANAGEMENT ANALYST.Performs vulnerability assessments to identify weaknesses and countermeasures and providing timely assessment reports to key stakeholders.Conducts manual and au...
read more