Get new jobs by email
- .... We are seeking Cyber Network Defense Analysts (CNDA) to support this critical customer... ...• Assesses network topology and device configurations identifying critical security concerns... ...• Proficiency with network analysis software (e.g. Wireshark) • Proficiency with carving...SuggestedImmediate start
- ...antitrust laws and promoting fair competition in the marketplace. The ICAM Engineer will be responsible for leading the implementation, configuration, and ongoing optimization of Okta for identity management across the organization. In this role, you will work closely with...SuggestedWork at office
- ..., while contributing to process automation, Zero Trust initiatives, and cross-team collaboration. Key Responsibilities: * Deploy, configure, and manage a wide range of security technologies, including Zscaler services (ZIA, ZPA, ZDX), EDR, DLP, secure web gateway, email...SuggestedWork at office3 days per week
- ...maintaining endpoint management solutions using Microsoft Endpoint Configuration Manager (MECM). Core Responsibilities: * Microsoft Endpoint... ...creation and deployment. * Configure, manage, and deploy software updates to required groups. * Report on software installations...SuggestedWork at office
- ...Responsibilities: • Lead advanced administration, monitoring, and maintenance of the BeyondTrust PAM platform, including complex configuration, upgrades, patching, and troubleshooting. • Oversee technical cyber activities such as account provisioning, access reviews,...SuggestedShift work
- ...Design and develop technical architectures for identity management, access management, and access governance software integrations. Document configuration and deployment processes. Familiarity with Identity Federation (SAML, OAuth, OpenID Connect, etc.) and integrating...Suggested
- ...and debugging efforts to ensure high-quality deliverables. Document development processes, system changes, and application configurations. Engage with end-users to gather requirements and provide technical support. Provide hands-on technical solutions to business...SuggestedWork experience placementWork at officeFlexible hours
- ...keep us safe. In this role you will support agents, analysts, and technology that is used to fight terrorism,... ...strategies. • Develop/engineer identity management software workflows and other COTS software configurations. • Perform Oracle, Windows, and Red Hat Enterprise...SuggestedFull timeTemporary workWork experience placementFlexible hours
- ...components, including ESM, Loggers, Smart Connectors, Indexers, Forwarders, Search Heads, and Cluster Managers Responsible for configuration and administration of ArcSight or Splunk ingestion and forwarding for new and existing applications and data Responsible for...Suggested
- ...Security mission. RESPONSIBILITIES Design, develop, and implement scalable and efficient solutions using the Elastic Stack Configure and optimize Elasticsearch clusters for performance and reliability Develop custom Logstash configurations for data ingestion,...Suggested
- ...systems, networks, and information within the Office 365 suite. • Documentation: Maintain accurate documentation for system configurations, processes, and procedures relevant to Office 365 management. • End-User Training: Provide training and support to end-users...SuggestedContract workInterim roleWork at office
- ...Develops and submits change requests and tracks completion for software upgrades and patches. -Apply OS patches and upgrades on a regular basis and upgrades administrative tools and utilities. Configures and adds new services as necessary. -Monitors system/server resources...SuggestedRemote work
- ...Integration Broker, Component Interface, and Event Mapping. Develop, configure, and enhance the PeopleSoft HR Help Desk module based on... ...guides for HRHD configurations. Collaborate with business analysts and functional teams to gather requirements and translate them...Suggested
- NewGen is seeking a Virtualization Engineer to perform the following duties. Active TS/SCI required Virtualization configuration and deployment experience (ESXi, libvirt, Procmox) Windows Active Directory Configuration Windows Exchange Configuration Networking experience...Suggested
- ...contributing to policy management, Zero Trust initiatives, process automation, and cross-team collaboration. Key Responsibilities: * Deploy, configure, and manage Zscaler services (ZIA, ZPA, ZDX) and other security technologies such as EDR, DLP, secure web gateway, email security,...SuggestedWork at office3 days per week
- ...Qualifications: * US Citizenship * BS in Data Science/Analytics, Computer Science or similar technical field * 4+ years in software or data configuration and/or data engineering * 2+ years' experience programming with JavaScript, Python and HTML/CSS/XML * High...Remote work
- ...Development and Integration projects associated with Baseline 9 configurations of the AEGIS Combat System. Educations / Professional Work... ...Experience with Navy Weapon and Combat System • Experience with Software Development and Testing The position will be located in...Work experience placementWork at office
$3,500 per month
...for a Network Forensics Cybersecurity Analyst . This position will support one of our... ...Assesses network topology and device configurations identifying critical security concerns... ...methodologies Proficiency with network analysis software (e.g. Wireshark) Proficiency with...- ...badge system wiring diagrams, including sub-components, readers, and wire routes Review design documentation and submit IV&V and configuration management documents Provide SME-level support for the submission of technical documentation related to system accreditation...Full time
- ...to S/4 HANA. The project focuses on a fit-to-standard approach, minimizing customizations and aligning with S/4 HANA's standard configuration. Key efforts include defining requirements for the upgrade and supporting business process re-engineering. Description: We are seeking...Interim roleRemote work2 days per week3 days per week
- ...for the following: Support the User Activity Monitor Software solution, executing all updates, changes, deployments... ...Ensure all coverage gaps are resolved. Help the ITP analysts with requests for new configurations, feeds, and other UAM specific updates. Support all documentation...Remote work
- ...scripts. - Deploying agents to meet scoped threshold percentages. - Verifying onboarding and reporting accuracy. - Ensuring configurations follow best practices. Required qualifications: - 3+ years of experience with Microsoft Defender for Endpoint in Microsoft...For contractors
- Job Title: Senior Cybersecurity Analyst Work Location: Alexandria, VA Position Classification: Full Time Security Clearance: Active... ...in vulnerability management, system hardening, and secure configuration. • Proven leadership in cross-functional cybersecurity...Full timeContract workFor contractorsWork at officeFlexible hours
- ...critical challenges faced by government entities, ensuring that the software systems you support are robust and effective. You will... ...and operations of software, including monitoring, alerting, configuration management, and upgrades. Deploy new products at customer sites...Flexible hours
- ...threats, compliance frameworks (FedRAMP, NIST 800-53), and agency-specific requirements Document policies, procedures, and configurations to support audits and ATO processes Support vulnerability and risk assessments of cloud-based system Bachelor’s Degree in...
- ...of US Army Intelligence and Security Command (INSCOM ). You will play a crucial role in supporting the INSCOM mission. * Install, configure, and maintain customer network infrastructure and security stack as part of a global enterprise. * Troubleshoot networking and security...Contract workLocal area
- ...experience in network authentication protocols (802.1x, RADIUS, TACACS+, MACSEC, etc.) • Must have 8 + years of experience in configuration and troubleshooting of switches and routers and with Layer 2 technology troubleshooting and configuring. • SME skill level configuring...
- ...Experience with F5 load balancers to include troubleshooting, configuring, upgrading, maintaining, and monitoring an enterprise F5 load... ...and Juniper routers and switches. Extensive experience in Software Define Networks (SDN). Broad understanding of network infrastructure...Work experience placementRemote work
- ...Provide problem and incident resolution, including dealing with software and hardware vendor technical support • Deploy and maintain... ...as required • Develop and maintain installation and configuration procedures • Collaborate with the Security team to identify...Work experience placementRemote work
- ...with other elements/functions of system design team including software architects and systems engineers, to perform system analyses,... ...Area Network (WAN) systems. Perform system-level design and configuration or products including determination of hardware, Operation System...For contractorsLocal areaShift work