Network Security Job Vacancies

751 to 775 of 963 Network Security Jobs

Protocol Analyst with Security Clearance

Columbia, Maryland, United States
Tailored Access, LLC
Relevant experience must be in signals analysis, related to comms signals (e.g., bitstream analysis, waveform analysis, protocol analysis), network troubleshooting, network traffic characterization, and/or network security analysis. Degree in Eng, Math, Comp Sci, Phys Sci or related tech field. Level 1 - 6 years or AA + 4 years or BS + 0 years; Level More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Network Architect

Coventry, West Midlands, United Kingdom
Hybrid / WFH Options
Stott & May Professional Search Limited
Contract Opportunity: Network Security Architect - Coventry (Hybrid, 3 days on-site) ?? We're looking for an experienced Network Security Architect to join a fast-paced, enterprise environment on a 6-month contract. You'll influence key security design decisions and help shape the future network landscape. ?? Location: Coventry (Hybrid, 3 days in office) ?? Day … Rate: £500 Inside IR35 ? Duration: 6 months ?? Start: ASAP Key Responsibilities: Develop high- and low-level network security designs Research and present solution options for strategic initiatives Provide architectural governance across multiple projects Align solutions with enterprise architecture and security roadmaps Collaborate with delivery teams to ensure successful implementation Key Skills: Expertise in network architecture and … security tooling Hybrid cloud (On-Prem and Multi-Cloud) network design Strong knowledge of NAC, ZTNA, SD-WAN, and segmentation Experience with next-gen firewalls and OT network design Excellent communication and stakeholder engagement skills Apply today to make an impact on cutting-edge security architecture projects More ❯
Employment Type: Contract
Rate: £500 - £510 per day
Posted:

Network Architect

binley, midlands, united kingdom
Hybrid / WFH Options
Stott & May Professional Search Limited
Contract Opportunity: Network Security Architect - Coventry (Hybrid, 3 days on-site) ?? We're looking for an experienced Network Security Architect to join a fast-paced, enterprise environment on a 6-month contract. You'll influence key security design decisions and help shape the future network landscape. ?? Location: Coventry (Hybrid, 3 days in office) ?? Day … Rate: £500 Inside IR35 ? Duration: 6 months ?? Start: ASAP Key Responsibilities: Develop high- and low-level network security designs Research and present solution options for strategic initiatives Provide architectural governance across multiple projects Align solutions with enterprise architecture and security roadmaps Collaborate with delivery teams to ensure successful implementation Key Skills: Expertise in network architecture and … security tooling Hybrid cloud (On-Prem and Multi-Cloud) network design Strong knowledge of NAC, ZTNA, SD-WAN, and segmentation Experience with next-gen firewalls and OT network design Excellent communication and stakeholder engagement skills Apply today to make an impact on cutting-edge security architecture projects! JBRP1_UKTJ More ❯
Posted:

Network Architect

leicester, midlands, united kingdom
Hybrid / WFH Options
Stott & May Professional Search Limited
Contract Opportunity: Network Security Architect - Coventry (Hybrid, 3 days on-site) ?? We're looking for an experienced Network Security Architect to join a fast-paced, enterprise environment on a 6-month contract. You'll influence key security design decisions and help shape the future network landscape. ?? Location: Coventry (Hybrid, 3 days in office) ?? Day … Rate: £500 Inside IR35 ? Duration: 6 months ?? Start: ASAP Key Responsibilities: Develop high- and low-level network security designs Research and present solution options for strategic initiatives Provide architectural governance across multiple projects Align solutions with enterprise architecture and security roadmaps Collaborate with delivery teams to ensure successful implementation Key Skills: Expertise in network architecture and … security tooling Hybrid cloud (On-Prem and Multi-Cloud) network design Strong knowledge of NAC, ZTNA, SD-WAN, and segmentation Experience with next-gen firewalls and OT network design Excellent communication and stakeholder engagement skills Apply today to make an impact on cutting-edge security architecture projects! JBRP1_UKTJ More ❯
Posted:

Network Operations Specialist

Brussel (Stad), Brussel, Belgium
Fujitsu
EU Passport is needed to apply for this role Fujitsu is looking for a Network Operations Specialist to work on a project within the EU Institutions in Brussels . Main tasks Network automation engineer to implement solutions and integrations with technologies and platforms Network support engineer for 2nd level support and troubleshooting Firewall configuration, routers, switches Support … lifecycle management activities for network services Top 5 most important technical skills: Programming skills (REST API, ansible, python, terraform) Network virtualization (NSX-T, Kubernetes) Network security (Checkpoint) Network security (Fortinet) F5 BIG-IP LTM, F5 BIG-IP ASM (WAF) Certifications Certification in Cisco DevNet (or a comparable vendor-neutral DevOps/automation program) would … be a distinct advantage Holding a CCIE (particularly in Security) is a significant advantage Languages: English Location: Brussels Contract: Employee or Freelance - YOU DECIDE More ❯
Employment Type: Permanent
Salary: EUR Annual
Posted:

Forensic Analyst with Security Clearance

Columbia, Maryland, United States
Tailored Access, LLC
Experience must be in the design/development of computer or information systems, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, and/or systems engineering. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis course) will be considered towards the relevant experience requirement (i.e., 24-week JCAC course will … count as 6 months of experience). Degree in network/systems eng, Info Tech, or related (Gen Engineering, Comp Eng, Elec Eng, CS, Cyber Security, etc.) Level 1 - AA + 4 years or BS + 2 years; Level 2 - AA + 7 years or BS + 5 years or MS + 3 years; Level 3 - AA + More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

PROTOCOL ANALYST III (381) - MARYLAND - URGENT with Security Clearance

Maryland, United States
Cyberstrike Group
with POLY Work Arrangement: On-site Job Location: Fort Meade MD Salary: 105K -162K Background Relevant experience must be in signals analysis, including protocol analysis, and also include network troubleshooting, network traffic characterization, and/or network security analysis Requirements Bachelor's degree in engineering, mathematics, computer science, physical science, or a related technical field … degree plus 4 years of relevant experience Need deep understanding of data link layer of OSI model, also with sonet and optical net Preferred Must be able to understand network architectures More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

PROTOCOL ANALYST II (378) - HAWAII - URGENT with Security Clearance

Wahiawa, Hawaii, United States
Cyberstrike Group
SCI with POLY Work Arrangement: On-site Job Location: HI Wahiawa Salary: 65K -125K Background Relevant experience must be in signals analysis, including protocol analysis, and also include network troubleshooting, network traffic characterization, and/or network security analysis Requirements Bachelor's degree in engineering, mathematics, computer science, physical science, or a related technical field More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

PROTOCOL ANALYST II - MARYLAND -URGENT with Security Clearance

Maryland, United States
Cyberstrike Group
SCI - Full Scope Polygraph Work Arrangement: On-site Job Location: Fort Meade MD Salary: 115K Background Relevant experience must be in signals analysis, including protocol analysis Demonstrated experience in network troubleshooting, network traffic characterization, and/or network security analysis Requirements Bachelor's degree in Engineering, Mathematics, Computer Science, Physical Science, or a related technical field More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Principal Protocol Analyst with Security Clearance

Maryland, United States
FUSE Engineering
technologies. The Protocol Analyst shall possess the following capabilities: The Protocol Analyst works directly with signals analysis, preferably related to communications signals (e.g., bitstream analysis, waveform analysis, protocol analysis), network troubleshooting, network traffic characterization, and/or network security analysis. Requirements Position requires active Security Clearance with appropriate Polygraph A Bachelor's degree and More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

TS/SCI w/ Poly - Software Mission management Tool Kit Engineer with Security Clearance

Aurora, Colorado, United States
Associates Systems LLC
streamline OPIR data ingestion, scale data streams, and develop predictive analytic products • Standardize process, scalability with local teams, and monitoring and maintenance of operational metrics. • Facilitate data collection, cyber security compliance, and communication • Collaborate with cross-functional teams including data scientists, analysts, network engineers, and software engineers to understand data requirements and develop scalable data solutions • Develop, maintain … ensure the timely and accurate movement of data from source systems to data warehouses and other storage solutions • Oversee and maintain the day-to-day operation of Linux-based network servers, cloud-based environments, and virtual environments • Implement, administer, and troubleshoot security, data recovery, and network infrastructure solutions • Configure and troubleshoot hardware and software issues related to … operative systems, network devices, and custom applications • Identify, analyze, and resolve system issues • Perform routine network startup and shutdown procedures and monitor system performance • Monitor network security and implement security policies • Work with vendors and contractors to resolve outstanding issues • Develop and implement system backup and recovery policies and procedures • Ensure system and data security More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Technology Vulnerability Analyst with Security Clearance

Maryland, United States
Tailored Access, LLC
Experience must be in computer or info systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering. Network and system administration may account for some, but not all, of the experience. Completion of military training in a relevant area such as JCAC (Joint … Cyber Analysis course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered towards the relevant experience requirement (i.e., 20-24 weeks course will count as 6 months of experience, 10-14 weeks will count as 3 months of experience). Degree must be in Computer Science More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

TRIP NOC TECHNICIAN with Security Clearance

Scott AFB, Illinois, United States
RMantra Solutions Inc
Transport/IP (TRIP) NOC Technician Location: Scott AFB, IL and Hill AFB, UT. Potential for Telework: No - 100% onsite Certification: Security+ CE Currently possess an active Secret security clearance Description We have a career opening for a Network Controller at both Scott AFB, IL, and Hill AFB, UT. PROGRAM SUMMARY: Our customer, Defense Information Systems Agency (DISA … provides, operates, and assures command and control of the Defense Information System Network (DISN) services to the warfighter, national leaders and other mission and coalition partners across the department of Defense (DoD) and national security organizations. Our Network Operations Center (NOC) team provides 24 7 global DoD information network (DoDIN) operations and incident management support. We … support key missions which include: JRSS (Joint Regional Security Stack) enterprise system, which provides a centralized network suite of equipment that provides a host of network security capabilities. Enterprise SATCOM Gateway Services (ESGS), providing 24/7/365 technical and operational support to tactical customers accessing DoD Gateway facilities. Airborne Intelligence, Surveillance, Reconnaissance operations support. More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Transport/IP (TRIP) NOC Technician with Security Clearance

Scott AFB, Illinois, United States
RMantra Solutions Inc
Transport/IP (TRIP) NOC Technician Location: Scott AFB, IL and Hill AFB, UT. Potential for Telework: No - 100% onsite Certification: Security+ CE Currently possess an active Secret security clearance Description We have a career opening for a Network Controller at both Scott AFB, IL, and Hill AFB, UT. PROGRAM SUMMARY: Our customer, Defense Information Systems Agency (DISA … provides, operates, and assures command and control of the Defense Information System Network (DISN) services to the warfighter, national leaders and other mission and coalition partners across the department of Defense (DoD) and national security organizations. Our Network Operations Center (NOC) team provides 24 7 global DoD information network (DoDIN) operations and incident management support. We … support key missions which include: JRSS (Joint Regional Security Stack) enterprise system, which provides a centralized network suite of equipment that provides a host of network security capabilities. Enterprise SATCOM Gateway Services (ESGS), providing 24/7/365 technical and operational support to tactical customers accessing DoD Gateway facilities. Airborne Intelligence, Surveillance, Reconnaissance operations support. More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Infrastructure Security Manager - Banking & Finance

Edinburgh, United Kingdom
Hybrid / WFH Options
Hamilton Barnes Associates Limited
Do you want to work for a UK Bank that are going through a digital transformation? Our client is seeking a highly skilled and motivated Infrastructure Security Manager. Reporting into the head of security, You will play a leading role in ensuring the security and integrity of the infrastructure, which includes the data centers, cloud environments, networks … This is an exciting opportunity to lead vulnerability assessments, drive remediation efforts, and enforce secure builds and configurations across our estate. Key Responsibilities: Lead the implementation of Infrastructure & Cloud security strategies, policies, controls, services, metrics, and compliance. Oversee and support vulnerability management efforts across both on-premise and cloud environments. Contribute to the strategy, policy, controls, services, and metrics … related to network security, including WAF, DDoS protection, and firewalls. Experience & Skills: Primary Expertise: Vulnerability management within infrastructure environments, with proven experience leading teams. Secondary Expertise: Knowledge and experience in network security, including firewalls, micro-segmentation, DDoS protection, WAF, and NAC. Familiarity with open-source frameworks such as OWASP, CVSS, etc. Experience with security products More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security Consultant

Reading, Berkshire, United Kingdom
WeAreTechWomen
everybody for who they are and what they bring to the table, supporting one another as we continue to deliver for our customers. LI-KS1 The role of Cyber Security Consultant sits within the Cyber Security team in Three UK, which is responsible for providing subject matter expertise and guidance to business units across Three's Network and Enterprise domains to enable the business to deliver its outcomes in a secure manner, building customer trust in a reliable network which matches the best, whilst ensuring compliance to regulatory requirements, company policy and standards. In this role you will have a broad and challenging remit, you will therefore need to be flexible and agile in your … approach, switching between different security disciplines within the team as necessary. You will be engaging in the delivery of multiple business initiatives by introducing baseline and enhanced security requirements and supporting their implementation through guidance and advice. You will also be recommending security solutions and then providing design input and technical approvals, assurances, and governance of deliveries More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Network Architect

Coventry, West Midlands, United Kingdom
LA International Computer Consultants Ltd
Network Architect 6 Month contract initially Based: Hybrid - Maximum of 3 days p/w - Coventry Rate: £450 - £550 p/d (via Umbrella company) We have a great opportunity with a world leading organisation where you will be provided with all of the support and development to succeed. A progressive organisation where you can really make a difference. … We have a great opportunity for a highly experienced Network Architect to join the team. The Network Security Architect will consider the HD architecture and the culture of the organisation along with the operating model and factor this into their solution selection and design. They will challenge themselves to strive to find the right solution and not … deliver the textbook happy-path solution. Key Responsibilities: The Network Security Architect will look at the wider network security roadmap and network roadmap and look at how their solution sits within that wider architecture challenging the need and the approach taken for their solution looking for efficiencies with wider changes to consolidate technology platforms, to More ❯
Employment Type: Contract
Rate: £450 - £550 per day
Posted:

Cloud Engineer with Security Clearance

Fort Belvoir, Virginia, United States
Global Enterprise Services, LLC
SharePoint Online (SPO) and other enterprise, cloud-based or shared storage services. Work closely with Product Owners, Scrum Masters, and other team members to solve technical problems at the network, system, and application levels. Have a significant role in the evaluation and support of application architectures across platforms to ensure alignment to cloud and application modernization strategies, capabilities and … schedules utilizing DevOps and CI/CD tool sets. Work across multiple projects and systems to develop user stories, system design document, implementation plan document, and SOPs. Understanding technical security best particles and guidelines within the cloud platform. knowledge of and experience with security policies, network security, data security and security event management to … adopt cloud security services Required Qualifications Secret Clearance Minimum of a Bachelor's degree in Science, Technology, Engineering and Math (preferred) with 8 - 12 years' experience or Master's degree with 6 - 10 years of experience (additional years of directly applicable experience may be accepted in lieu of a degree). Salary More ❯
Employment Type: Permanent
Salary: USD 145,000 Annual
Posted:

Exploitation Analyst with Security Clearance

Annapolis Junction, Maryland, United States
The Swift Group
innovators. The ingenuity of our developers, engineers, cyber experts, linguists, and analysts are dedicated to empowering our clients, fulfilling The Mission, and remaining trusted leaders and advisers in national security and technology solutions. We are looking for a Exploitation Analysts (EA) to join a robust team in the following locations: Annapolis Junction, MD Augusta, GA Salt Lake City, UT … The EA will have deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments as plans are executed. Successful candidates may also have experience programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems … At least 11 years of demonstrated experience within the Department of Defense (DoD) as an Exploitation Analyst. Technical Bachelor's Degree Relevant Certifications: Sec+, Net+, CEH, JCAC course Security Clearance: A current government clearance, background investigation, and polygraph are required. The Swift Group and Subsidiaries are an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration More ❯
Employment Type: Permanent
Salary: USD 290,004 Annual
Posted:

Cloud Cybersecurity Defense Manager with Security Clearance

Fort Belvoir, Virginia, United States
Mission Services LLC (MSI)
Roles and Responsibilities: • Ability to perform log analysis and use IDS, Intrusion Prevention System (IPS), and/or other signature technologies. • Provides 1st and 2nd level troubleshooting support for security applications and appliances. • Provides threat and vulnerability analysis security advisory services. • Performs information security assessments or audits of internal networks and systems. • Serves as team leader for … Cyber Defense Analysts. • Assists in the expansion and growth of the Cloud Cybersecurity Defense Center. • Collaborate with client technical teams for issue resolution and mitigation. • Integrates information and network security solutions. • Analyzes various methods of controlling information security problems, determines the strengths and weaknesses of each method, and implements the Government chosen solution. • Identifies weak links in … information security products and determines how to mitigate the control deficiencies. Basic Qualifications: • Certified Information Systems Security Professional (CISSP) certification or equivalent experience. • Foundational Cloud Certification • ITIL v3 Foundation Certification or equivalent • DoD 8570.01 Cyberspace Workforce Qualification and Management Program/8140.01, Cybersecurity Certification Information Assurance Technical 3 (IAT Level 3) certified Certification Requirement: • CISSP Security Clearance More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

System Architect with Security Clearance

Falls Church, Virginia, United States
NasTech Global, Inc
Experience supporting military or intelligence community customers. • Experience with open source, publicly available information (PAI) data sources and/or forensic media. • Experience developing predictive algorithms. • Experience supporting cyber security or network security operations. • Familiarity with social network analysis, supply chain analysis, forensic accounting, and other analytical methodologies. Major Duties/Tasks: • Analyze and assess software More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSM 2 102-025 with Security Clearance

Hampton, Virginia, United States
IC-CAP
Information System Security Manager (ISSM) 2's primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview. Primary support will be working within Special Access Programs (SAP) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military … will provide "day-to-day" support for Collateral, Sensitive Compartmented Information (SCI) and SAP activities. Performance shall include : Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of network security … JSIG) authorization process Advise customer on Risk Management Framework (RMF) assessment and authorization issues Perform risk assessments and make recommendations to DoD agency customers Advise government program managers on security testing methodologies and processes Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSM 2 102-085 with Security Clearance

Arlington, Virginia, United States
IC-CAP
Information System Security Manager (ISSM) 2's primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military … to-day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include : Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of network security … JSIG) authorization process Advise customer on Risk Management Framework (RMF) assessment and authorization issues Perform risk assessments and make recommendations to DoD agency customers Advise government program managers on security testing methodologies and processes Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSM 2 102-022 with Security Clearance

Bedford, Massachusetts, United States
IC-CAP
Information System Security Manager (ISSM) 2's primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military … to-day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include : Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of network security … JSIG) authorization process Advise customer on Risk Management Framework (RMF) assessment and authorization issues Perform risk assessments and make recommendations to DoD agency customers Advise government program managers on security testing methodologies and processes Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSM 2 102-041 with Security Clearance

Hill Afb, Utah, United States
IC-CAP
Information System Security Manager (ISSM) 2 primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview. Primary support will be working within Special Access Programs (SAP) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military Compartment … will provide "day-to-day" support for Collateral, Sensitive Compartmented Information (SCI) and SAP activities. Duties may include : Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of network security … Program Implementation Guide (JSIG) authorization process Advise customer on RMF assessment and authorization issues Perform risk assessments and make recommendations to DoD agency customers Advise government program managers on security testing methodologies and processes Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:
Network Security
10th Percentile
£32,725
25th Percentile
£47,500
Median
£62,000
75th Percentile
£80,938
90th Percentile
£95,000