Azure, AWS) as well as Cloud based application security. • Demonstrated understanding of information security concepts, standards, practices, including but not limited to NG firewalls, intrusion prevention and detection, TCP/IP and related protocols, device monitoring and log management, event monitoring/reporting • Experience in LAN and WAN more »
Azure, AWS) as well as Cloud based application security. • Demonstrated understanding of information security concepts, standards, practices, including but not limited to NG firewalls, intrusion prevention and detection, TCP/IP and related protocols, device monitoring and log management, event monitoring/reporting • Experience in LAN and WAN more »
Azure, AWS) as well as Cloud based application security. • Demonstrated understanding of information security concepts, standards, practices, including but not limited to NG firewalls, intrusion prevention and detection, TCP/IP and related protocols, device monitoring and log management, event monitoring/reporting • Experience in LAN and WAN more »
Azure, AWS) as well as Cloud based application security. • Demonstrated understanding of information security concepts, standards, practices, including but not limited to NG firewalls, intrusion prevention and detection, TCP/IP and related protocols, device monitoring and log management, event monitoring/reporting • Experience in LAN and WAN more »
North Carolina, United States Hybrid / WFH Options
Arrow Electronics, Inc
Azure, AWS) as well as Cloud based application security. • Demonstrated understanding of information security concepts, standards, practices, including but not limited to NG firewalls, intrusion prevention and detection, TCP/IP and related protocols, device monitoring and log management, event monitoring/reporting • Experience in LAN and WAN more »
looking for a Security Operations Engineer who has experience working in heavily regulated environments. Key Responsibilities: Proficiency in Information Security principles, network management, and intrusiondetection and prevention system administration Familiarity with network, application, or server management tools Hands-on experience design and migration complex projects in cloud more »
within Cyber Security. Strong knowledge of macOS, including configuration, management, and troubleshooting. Familiarity with security tools and technologies, such as antivirus software, firewalls, and intrusiondetection/prevention systems. Experience with Jamf Excellent problem-solving skills and attention to detail. Strong communication and interpersonal skills. If this role more »
excellence. Maintain security measures to protect systems, networks, and data from unauthorised access, cyber threats, and malware, installing and maintaining firewalls, antivirus software, and intrusiondetection systems, and conducting security audits and assessments. Document and maintain accurate records of technical configurations, procedures, and troubleshooting steps. Stay current with more »
is a big plus. knowledge and experience in the use of advanced information security solutions, including security software, scripts, configurations, network infrastructure and design, intrusiondetection, TCP/IP protocols, and application security features with enterprise security solutions spanning multiple business functions and geographic locations. knowledge in the more »
cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusiondetection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of IA (confidentiality, integrity, non-repudiation, availability, and more »
cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusiondetection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of IA (confidentiality, integrity, non-repudiation, availability, and more »
cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusiondetection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of IA (confidentiality, integrity, non-repudiation, availability, and more »
cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusiondetection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of IA (confidentiality, integrity, non-repudiation, availability, and more »
cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusiondetection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of IA (confidentiality, integrity, non-repudiation, availability, and more »
cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusiondetection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of IA (confidentiality, integrity, non-repudiation, availability, and more »
cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusiondetection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of IA (confidentiality, integrity, non-repudiation, availability, and more »
cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusiondetection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of IA (confidentiality, integrity, non-repudiation, availability, and more »
cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusiondetection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of IA (confidentiality, integrity, non-repudiation, availability, and more »
cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusiondetection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of IA (confidentiality, integrity, non-repudiation, availability, and more »
Linux, Microsoft, or other network related fields are a plus Experience with scripting and automation tools are a plus Knowledge of system security (e.g. intrusiondetection systems) and data backup/recovery Crypto Quantique is committed to creating a diverse environment and is proud to be an equal more »
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Hitachi Energy
solutions. Experience with scripting languages and automation technologies. Experience with port-, vulnerability-, and malware scanners, able to digest and communicate the output. Knowledge of intrusiondetection systems, security information event monitoring, application control and other Security-relevant systems is a major plus. Knowledge of or experience in DataBase more »
cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusiondetection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of IA (confidentiality, integrity, non-repudiation, availability, and more »
networking protocols and concepts including IP/TCP/UDP, NAT, DNS, NFS etc In-depth understanding of network security principles, including VPNs, firewalls, intrusiondetection systems, and access control mechanisms. Experience of network monitoring and management tools Strong knowledge of storage infrastructure, SAN, backup appliances and file more »
Rickmansworth, Hertfordshire, South East, United Kingdom
Mobilize Financial Services
networking protocols and concepts including IP/TCP/UDP, NAT, DNS, NFS etc In-depth understanding of network security principles, including VPNs, firewalls, intrusiondetection systems, and access control mechanisms. Experience of network monitoring and management tools Strong knowledge of storage infrastructure, SAN, backup appliances and file more »