accreditation status. Ensure operational security of a FISMA High system Disaster Recovery Planning and Management Security operations expertise, including security mechanisms such as firewalls, intrusiondetection, log management, event and malicious code analysis Identity and Access Management IT Security Auditing and IT Security Architecture Cloud Technologies and Security more »
On technologies. Mobile device management: Covering 300+ deployed mobile devices, applying best practice and industry standards. Cyber security and information assurance: Managing and maintaining intrusiondetection apparatus, supporting queries/investigations and hardened configuration of IT equipment. DevSecOps and Site Reliability Engineering: Supporting enterprise software teams and their more »
cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusiondetection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of IA (confidentiality, integrity, non-repudiation, availability, and more »
cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusiondetection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of IA (confidentiality, integrity, non-repudiation, availability, and more »
cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusiondetection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of IA (confidentiality, integrity, non-repudiation, availability, and more »
cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusiondetection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of IA (confidentiality, integrity, non-repudiation, availability, and more »
cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusiondetection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of IA (confidentiality, integrity, non-repudiation, availability, and more »
cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusiondetection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of IA (confidentiality, integrity, non-repudiation, availability, and more »
cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusiondetection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of IA (confidentiality, integrity, non-repudiation, availability, and more »
cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusiondetection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of IA (confidentiality, integrity, non-repudiation, availability, and more »
cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusiondetection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of IA (confidentiality, integrity, non-repudiation, availability, and more »
cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusiondetection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of IA (confidentiality, integrity, non-repudiation, availability, and more »
and best practices. Security Architecture: develop and design the cybersecurity architecture for our automotive systems, considering secure communication protocols, access controls, authentication mechanisms, and intrusion detection. Risk Assessment: perform risk assessments to evaluate the potential impact of cybersecurity threats and develop risk mitigation strategies. Regulatory Compliance: ensure compliance with more »
change the landscape of FICO network operations.” – Senior Manager, Network Engineering. What You’ll Do Design and manage security solutions, including firewall, and network intrusiondetection systems. Manage all network hardware and equipment, including routers, switches, and UPSs. Implement and maintain all equipment, hardware, and software upgrades. Implement … operate worldwide: Credit Scoring — 150+ billion FICO Scores have been sold to date, making it the most used credit score in the world. Fraud Detection and Security — 2.6+ billion payment cards globally are protected by FICO fraud systems. Lending — 3/4 of US mortgages are approved using the more »
SOC experience and a knack for investigation Proficiency in Sentinel or Splunk SIEM Familiarity with Mitre Att&ck Framework Skilled in log analysis and intrusiondetection Detail-oriented with organizational prowess Ability to secure and maintain eSC level clearance Basic knowledge of networking and security tools Advance your more »
protocols, including TCP/IP, DNS, DHCP, VLANs, and routing protocols (e.g., OSPF, BGP). with network security technologies such as firewalls, VPNs, and intrusiondetection/prevention systems. in network monitoring and management tools (e.g., Wireshark, Nagios, Cisco Prime). If you’re interested, please apply now more »
LS1, Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Picture More Ltd
development and implementation of Azure security-related technologies An excellent understanding of infrastructure and application technologies An excellent understanding of security technologies: SIEM, firewalls, intrusiondetection/prevention systems, anti-virus software, authentication systems, log management, content filtering, etc. An excellent understanding of security approaches: ISMS, risk analysis more »
excellence. Maintain security measures to protect systems, networks, and data from unauthorised access, cyber threats, and malware, installing and maintaining firewalls, antivirus software, and intrusiondetection systems, and conducting security audits and assessments. Document and maintain accurate records of technical configurations, procedures, and troubleshooting steps. Stay current with more »
Azure, AWS) as well as Cloud based application security. • Demonstrated understanding of information security concepts, standards, practices, including but not limited to NG firewalls, intrusion prevention and detection, TCP/IP and related protocols, device monitoring and log management, event monitoring/reporting • Experience in LAN and WAN more »
Azure, AWS) as well as Cloud based application security. • Demonstrated understanding of information security concepts, standards, practices, including but not limited to NG firewalls, intrusion prevention and detection, TCP/IP and related protocols, device monitoring and log management, event monitoring/reporting • Experience in LAN and WAN more »
Azure, AWS) as well as Cloud based application security. • Demonstrated understanding of information security concepts, standards, practices, including but not limited to NG firewalls, intrusion prevention and detection, TCP/IP and related protocols, device monitoring and log management, event monitoring/reporting • Experience in LAN and WAN more »
Azure, AWS) as well as Cloud based application security. • Demonstrated understanding of information security concepts, standards, practices, including but not limited to NG firewalls, intrusion prevention and detection, TCP/IP and related protocols, device monitoring and log management, event monitoring/reporting • Experience in LAN and WAN more »
Azure, AWS) as well as Cloud based application security. • Demonstrated understanding of information security concepts, standards, practices, including but not limited to NG firewalls, intrusion prevention and detection, TCP/IP and related protocols, device monitoring and log management, event monitoring/reporting • Experience in LAN and WAN more »
Azure, AWS) as well as Cloud based application security. • Demonstrated understanding of information security concepts, standards, practices, including but not limited to NG firewalls, intrusion prevention and detection, TCP/IP and related protocols, device monitoring and log management, event monitoring/reporting • Experience in LAN and WAN more »
Azure, AWS) as well as Cloud based application security. • Demonstrated understanding of information security concepts, standards, practices, including but not limited to NG firewalls, intrusion prevention and detection, TCP/IP and related protocols, device monitoring and log management, event monitoring/reporting • Experience in LAN and WAN more »