of experience may be considered in lieu of a degree and cyber certifications. At least two years of direct experience in vulnerability assessment / management. Familiar with the management, operational, and technical aspects of IT Security in a complex environment. Experience working with industry-standard cybersecurity methodologies and … processes Advanced knowledge of TCP/IP protocols Experience configuring and implementing various technical security solutions, Substantial experience managing vulnerability / compliance scans using Nessus At least one of the following certifications: SANS GIAC: GCIA, GMON, GCDA GPEN, GEVA, GWAPT, GSNA, GISF … on Duty (EOD) is required to support this program Preferred Qualifications Previous experience working in a DHS or other federal government agency SOC / NOC / NOSC environment Familiarity or experience in Intelligence Driven Defense, Cyber Kill Chain methodology, and / or MITRE ATT more »
of experience may be considered in lieu of a degree and cyber certifications. At least two years of direct experience in vulnerability assessment / management. Familiar with the management, operational, and technical aspects of IT Security in a complex environment. Experience working with industry-standard cybersecurity methodologies and … processes Advanced knowledge of TCP/IP protocols Experience configuring and implementing various technical security solutions, Substantial experience managing vulnerability / compliance scans using Nessus At least one of the following certifications: SANS GIAC: GCIA, GMON, GCDA GPEN, GEVA, GWAPT, GSNA, GISF … on Duty (EOD) is required to support this program Preferred Qualifications Previous experience working in a DHS or other federal government agency SOC / NOC / NOSC environment Familiarity or experience in Intelligence Driven Defense, Cyber Kill Chain methodology, and / or MITRE ATT more »
of experience may be considered in lieu of a degree and cyber certifications. At least two years of direct experience in vulnerability assessment / management. Familiar with the management, operational, and technical aspects of IT Security in a complex environment. Experience working with industry-standard cybersecurity methodologies and … processes Advanced knowledge of TCP/IP protocols Experience configuring and implementing various technical security solutions, Substantial experience managing vulnerability / compliance scans using Nessus At least one of the following certifications: SANS GIAC: GCIA, GMON, GCDA GPEN, GEVA, GWAPT, GSNA, GISF … on Duty (EOD) is required to support this program Preferred Qualifications Previous experience working in a DHS or other federal government agency SOC / NOC / NOSC environment Familiarity or experience in Intelligence Driven Defense, Cyber Kill Chain methodology, and / or MITRE ATT more »
of experience may be considered in lieu of a degree and cyber certifications. At least two years of direct experience in vulnerability assessment / management. Familiar with the management, operational, and technical aspects of IT Security in a complex environment. Experience working with industry-standard cybersecurity methodologies and … processes Advanced knowledge of TCP/IP protocols Experience configuring and implementing various technical security solutions, Substantial experience managing vulnerability / compliance scans using Nessus At least one of the following certifications: SANS GIAC: GCIA, GMON, GCDA GPEN, GEVA, GWAPT, GSNA, GISF … on Duty (EOD) is required to support this program Preferred Qualifications Previous experience working in a DHS or other federal government agency SOC / NOC / NOSC environment Familiarity or experience in Intelligence Driven Defense, Cyber Kill Chain methodology, and / or MITRE ATT more »
of experience may be considered in lieu of a degree and cyber certifications. At least two years of direct experience in vulnerability assessment / management. Familiar with the management, operational, and technical aspects of IT Security in a complex environment. Experience working with industry-standard cybersecurity methodologies and … processes Advanced knowledge of TCP/IP protocols Experience configuring and implementing various technical security solutions, Substantial experience managing vulnerability / compliance scans using Nessus At least one of the following certifications: SANS GIAC: GCIA, GMON, GCDA GPEN, GEVA, GWAPT, GSNA, GISF … on Duty (EOD) is required to support this program Preferred Qualifications Previous experience working in a DHS or other federal government agency SOC / NOC / NOSC environment Familiarity or experience in Intelligence Driven Defense, Cyber Kill Chain methodology, and / or MITRE ATT more »
of experience may be considered in lieu of a degree and cyber certifications. At least two years of direct experience in vulnerability assessment / management. Familiar with the management, operational, and technical aspects of IT Security in a complex environment. Experience working with industry-standard cybersecurity methodologies and … processes Advanced knowledge of TCP/IP protocols Experience configuring and implementing various technical security solutions, Substantial experience managing vulnerability / compliance scans using Nessus At least one of the following certifications: SANS GIAC: GCIA, GMON, GCDA GPEN, GEVA, GWAPT, GSNA, GISF … on Duty (EOD) is required to support this program Preferred Qualifications Previous experience working in a DHS or other federal government agency SOC / NOC / NOSC environment Familiarity or experience in Intelligence Driven Defense, Cyber Kill Chain methodology, and / or MITRE ATT more »
of experience may be considered in lieu of a degree and cyber certifications. At least two years of direct experience in vulnerability assessment / management. Familiar with the management, operational, and technical aspects of IT Security in a complex environment. Experience working with industry-standard cybersecurity methodologies and … processes Advanced knowledge of TCP/IP protocols Experience configuring and implementing various technical security solutions, Substantial experience managing vulnerability / compliance scans using Nessus At least one of the following certifications: SANS GIAC: GCIA, GMON, GCDA GPEN, GEVA, GWAPT, GSNA, GISF … on Duty (EOD) is required to support this program Preferred Qualifications Previous experience working in a DHS or other federal government agency SOC / NOC / NOSC environment Familiarity or experience in Intelligence Driven Defense, Cyber Kill Chain methodology, and / or MITRE ATT more »
of experience may be considered in lieu of a degree and cyber certifications. At least two years of direct experience in vulnerability assessment / management. Familiar with the management, operational, and technical aspects of IT Security in a complex environment. Experience working with industry-standard cybersecurity methodologies and … processes Advanced knowledge of TCP/IP protocols Experience configuring and implementing various technical security solutions, Substantial experience managing vulnerability / compliance scans using Nessus At least one of the following certifications: SANS GIAC: GCIA, GMON, GCDA GPEN, GEVA, GWAPT, GSNA, GISF … on Duty (EOD) is required to support this program Preferred Qualifications Previous experience working in a DHS or other federal government agency SOC / NOC / NOSC environment Familiarity or experience in Intelligence Driven Defense, Cyber Kill Chain methodology, and / or MITRE ATT more »
of experience may be considered in lieu of a degree and cyber certifications. At least two years of direct experience in vulnerability assessment / management. Familiar with the management, operational, and technical aspects of IT Security in a complex environment. Experience working with industry-standard cybersecurity methodologies and … processes Advanced knowledge of TCP/IP protocols Experience configuring and implementing various technical security solutions, Substantial experience managing vulnerability / compliance scans using Nessus At least one of the following certifications: SANS GIAC: GCIA, GMON, GCDA GPEN, GEVA, GWAPT, GSNA, GISF … on Duty (EOD) is required to support this program Preferred Qualifications Previous experience working in a DHS or other federal government agency SOC / NOC / NOSC environment Familiarity or experience in Intelligence Driven Defense, Cyber Kill Chain methodology, and / or MITRE ATT more »
of experience may be considered in lieu of a degree and cyber certifications. At least two years of direct experience in vulnerability assessment / management. Familiar with the management, operational, and technical aspects of IT Security in a complex environment. Experience working with industry-standard cybersecurity methodologies and … processes Advanced knowledge of TCP/IP protocols Experience configuring and implementing various technical security solutions, Substantial experience managing vulnerability / compliance scans using Nessus At least one of the following certifications: SANS GIAC: GCIA, GMON, GCDA GPEN, GEVA, GWAPT, GSNA, GISF … on Duty (EOD) is required to support this program Preferred Qualifications Previous experience working in a DHS or other federal government agency SOC / NOC / NOSC environment Familiarity or experience in Intelligence Driven Defense, Cyber Kill Chain methodology, and / or MITRE ATT more »
of experience may be considered in lieu of a degree and cyber certifications. At least two years of direct experience in vulnerability assessment / management. Familiar with the management, operational, and technical aspects of IT Security in a complex environment. Experience working with industry-standard cybersecurity methodologies and … processes Advanced knowledge of TCP/IP protocols Experience configuring and implementing various technical security solutions, Substantial experience managing vulnerability / compliance scans using Nessus At least one of the following certifications: SANS GIAC: GCIA, GMON, GCDA GPEN, GEVA, GWAPT, GSNA, GISF … on Duty (EOD) is required to support this program Preferred Qualifications Previous experience working in a DHS or other federal government agency SOC / NOC / NOSC environment Familiarity or experience in Intelligence Driven Defense, Cyber Kill Chain methodology, and / or MITRE ATT more »
appropriate information security functionality to ensure uniform application of Agency security policy and automation to enterprise solutions. Complete self-tests and perform vulnerability / risk assessment analysis to support the Assessment and Authorization (A&A) of information systems. Provide configuration management (CM) for information system security software, hardware … Traceability Matrices (SCTMs). Train and oversee the technical work of less experience personnel. What Sets You Apart (Required) Active Top Secret / SCI with polygraph security clearance Masters Degree and 15+ years of related experience or Bachelors Degree and 19 or more years of related experience … complexity; DoD 8570 compliance with IAM Level III or IAT Level III (i.e., CISSP) Combination of practical and progressive experience as an ISSO / ISSE / ISSM Team Lead or Technical Project Lead Breadth of knowledge on IA tools and technologies (i.e., Splunk, Nessus, VPN, IDS more »
of experience may be considered in lieu of a degree and cyber certifications. At least two years of direct experience in vulnerability assessment / management. Familiar with the management, operational, and technical aspects of IT Security in a complex environment. Experience working with industry-standard cybersecurity methodologies and … processes Advanced knowledge of TCP/IP protocols Experience configuring and implementing various technical security solutions, Substantial experience managing vulnerability / compliance scans using Nessus At least one of the following certifications: SANS GIAC: GCIA, GMON, GCDA GPEN, GEVA, GWAPT, GSNA, GISF … on Duty (EOD) is required to support this program Preferred Qualifications Previous experience working in a DHS or other federal government agency SOC / NOC / NOSC environment Familiarity or experience in Intelligence Driven Defense, Cyber Kill Chain methodology, and / or MITRE ATT more »
of experience may be considered in lieu of a degree and cyber certifications. At least two years of direct experience in vulnerability assessment / management. Familiar with the management, operational, and technical aspects of IT Security in a complex environment. Experience working with industry-standard cybersecurity methodologies and … processes Advanced knowledge of TCP/IP protocols Experience configuring and implementing various technical security solutions, Substantial experience managing vulnerability / compliance scans using Nessus At least one of the following certifications: SANS GIAC: GCIA, GMON, GCDA GPEN, GEVA, GWAPT, GSNA, GISF … on Duty (EOD) is required to support this program Preferred Qualifications Previous experience working in a DHS or other federal government agency SOC / NOC / NOSC environment Familiarity or experience in Intelligence Driven Defense, Cyber Kill Chain methodology, and / or MITRE ATT more »
of experience may be considered in lieu of a degree and cyber certifications. At least two years of direct experience in vulnerability assessment / management. Familiar with the management, operational, and technical aspects of IT Security in a complex environment. Experience working with industry-standard cybersecurity methodologies and … processes Advanced knowledge of TCP/IP protocols Experience configuring and implementing various technical security solutions, Substantial experience managing vulnerability / compliance scans using Nessus At least one of the following certifications: SANS GIAC: GCIA, GMON, GCDA GPEN, GEVA, GWAPT, GSNA, GISF … on Duty (EOD) is required to support this program Preferred Qualifications Previous experience working in a DHS or other federal government agency SOC / NOC / NOSC environment Familiarity or experience in Intelligence Driven Defense, Cyber Kill Chain methodology, and / or MITRE ATT more »
of experience may be considered in lieu of a degree and cyber certifications. At least two years of direct experience in vulnerability assessment / management. Familiar with the management, operational, and technical aspects of IT Security in a complex environment. Experience working with industry-standard cybersecurity methodologies and … processes Advanced knowledge of TCP/IP protocols Experience configuring and implementing various technical security solutions, Substantial experience managing vulnerability / compliance scans using Nessus At least one of the following certifications: SANS GIAC: GCIA, GMON, GCDA GPEN, GEVA, GWAPT, GSNA, GISF … on Duty (EOD) is required to support this program Preferred Qualifications Previous experience working in a DHS or other federal government agency SOC / NOC / NOSC environment Familiarity or experience in Intelligence Driven Defense, Cyber Kill Chain methodology, and / or MITRE ATT more »
of experience may be considered in lieu of a degree and cyber certifications. At least two years of direct experience in vulnerability assessment / management. Familiar with the management, operational, and technical aspects of IT Security in a complex environment. Experience working with industry-standard cybersecurity methodologies and … processes Advanced knowledge of TCP/IP protocols Experience configuring and implementing various technical security solutions, Substantial experience managing vulnerability / compliance scans using Nessus At least one of the following certifications: SANS GIAC: GCIA, GMON, GCDA GPEN, GEVA, GWAPT, GSNA, GISF … on Duty (EOD) is required to support this program Preferred Qualifications Previous experience working in a DHS or other federal government agency SOC / NOC / NOSC environment Familiarity or experience in Intelligence Driven Defense, Cyber Kill Chain methodology, and / or MITRE ATT more »
of experience may be considered in lieu of a degree and cyber certifications. At least two years of direct experience in vulnerability assessment / management. Familiar with the management, operational, and technical aspects of IT Security in a complex environment. Experience working with industry-standard cybersecurity methodologies and … processes Advanced knowledge of TCP/IP protocols Experience configuring and implementing various technical security solutions, Substantial experience managing vulnerability / compliance scans using Nessus At least one of the following certifications: SANS GIAC: GCIA, GMON, GCDA GPEN, GEVA, GWAPT, GSNA, GISF … on Duty (EOD) is required to support this program Preferred Qualifications Previous experience working in a DHS or other federal government agency SOC / NOC / NOSC environment Familiarity or experience in Intelligence Driven Defense, Cyber Kill Chain methodology, and / or MITRE ATT more »
of experience may be considered in lieu of a degree and cyber certifications. At least two years of direct experience in vulnerability assessment / management. Familiar with the management, operational, and technical aspects of IT Security in a complex environment. Experience working with industry-standard cybersecurity methodologies and … processes Advanced knowledge of TCP/IP protocols Experience configuring and implementing various technical security solutions, Substantial experience managing vulnerability / compliance scans using Nessus At least one of the following certifications: SANS GIAC: GCIA, GMON, GCDA GPEN, GEVA, GWAPT, GSNA, GISF … on Duty (EOD) is required to support this program Preferred Qualifications Previous experience working in a DHS or other federal government agency SOC / NOC / NOSC environment Familiarity or experience in Intelligence Driven Defense, Cyber Kill Chain methodology, and / or MITRE ATT more »
Design, review and ongoing assessment of firewall, VPN, SSL, application control, Load Balancer, DNS and other network component policies. • Triage and update / resolution of tickets generated by CRM ticketing system and respond to inbound phone and electronic requests for technical assistance. • Ensure network security best practices … For: • Knowledge of network and security platforms (Palo Alto Firewalls, F5 LTM\GTM, EIP DDI, ClearPass NAC, etc.) and other security networking hardware / software tools. • Knowledge of Private Cloud based secure deployments (Azure, AWS) as well as Cloud based application security. • Demonstrated understanding of information security concepts … standards, practices, including but not limited to NG firewalls, intrusion prevention and detection, TCP/IP and related protocols, device monitoring and log management, event monitoring / reporting • Experience in LAN and WAN technologies, network design, network management etc. • Strong understanding of more »
Design, review and ongoing assessment of firewall, VPN, SSL, application control, Load Balancer, DNS and other network component policies. • Triage and update / resolution of tickets generated by CRM ticketing system and respond to inbound phone and electronic requests for technical assistance. • Ensure network security best practices … For: • Knowledge of network and security platforms (Palo Alto Firewalls, F5 LTM\GTM, EIP DDI, ClearPass NAC, etc.) and other security networking hardware / software tools. • Knowledge of Private Cloud based secure deployments (Azure, AWS) as well as Cloud based application security. • Demonstrated understanding of information security concepts … standards, practices, including but not limited to NG firewalls, intrusion prevention and detection, TCP/IP and related protocols, device monitoring and log management, event monitoring / reporting • Experience in LAN and WAN technologies, network design, network management etc. • Strong understanding of more »
Design, review and ongoing assessment of firewall, VPN, SSL, application control, Load Balancer, DNS and other network component policies. • Triage and update / resolution of tickets generated by CRM ticketing system and respond to inbound phone and electronic requests for technical assistance. • Ensure network security best practices … For: • Knowledge of network and security platforms (Palo Alto Firewalls, F5 LTM\GTM, EIP DDI, ClearPass NAC, etc.) and other security networking hardware / software tools. • Knowledge of Private Cloud based secure deployments (Azure, AWS) as well as Cloud based application security. • Demonstrated understanding of information security concepts … standards, practices, including but not limited to NG firewalls, intrusion prevention and detection, TCP/IP and related protocols, device monitoring and log management, event monitoring / reporting • Experience in LAN and WAN technologies, network design, network management etc. • Strong understanding of more »
Design, review and ongoing assessment of firewall, VPN, SSL, application control, Load Balancer, DNS and other network component policies. • Triage and update / resolution of tickets generated by CRM ticketing system and respond to inbound phone and electronic requests for technical assistance. • Ensure network security best practices … For: • Knowledge of network and security platforms (Palo Alto Firewalls, F5 LTM\GTM, EIP DDI, ClearPass NAC, etc.) and other security networking hardware / software tools. • Knowledge of Private Cloud based secure deployments (Azure, AWS) as well as Cloud based application security. • Demonstrated understanding of information security concepts … standards, practices, including but not limited to NG firewalls, intrusion prevention and detection, TCP/IP and related protocols, device monitoring and log management, event monitoring / reporting • Experience in LAN and WAN technologies, network design, network management etc. • Strong understanding of more »
Design, review and ongoing assessment of firewall, VPN, SSL, application control, Load Balancer, DNS and other network component policies. • Triage and update / resolution of tickets generated by CRM ticketing system and respond to inbound phone and electronic requests for technical assistance. • Ensure network security best practices … For: • Knowledge of network and security platforms (Palo Alto Firewalls, F5 LTM\GTM, EIP DDI, ClearPass NAC, etc.) and other security networking hardware / software tools. • Knowledge of Private Cloud based secure deployments (Azure, AWS) as well as Cloud based application security. • Demonstrated understanding of information security concepts … standards, practices, including but not limited to NG firewalls, intrusion prevention and detection, TCP/IP and related protocols, device monitoring and log management, event monitoring / reporting • Experience in LAN and WAN technologies, network design, network management etc. • Strong understanding of more »
South Carolina, United States Hybrid / WFH Options
Arrow Electronics, Inc
Design, review and ongoing assessment of firewall, VPN, SSL, application control, Load Balancer, DNS and other network component policies. • Triage and update / resolution of tickets generated by CRM ticketing system and respond to inbound phone and electronic requests for technical assistance. • Ensure network security best practices … For: • Knowledge of network and security platforms (Palo Alto Firewalls, F5 LTM\GTM, EIP DDI, ClearPass NAC, etc.) and other security networking hardware / software tools. • Knowledge of Private Cloud based secure deployments (Azure, AWS) as well as Cloud based application security. • Demonstrated understanding of information security concepts … standards, practices, including but not limited to NG firewalls, intrusion prevention and detection, TCP/IP and related protocols, device monitoring and log management, event monitoring / reporting • Experience in LAN and WAN technologies, network design, network management etc. • Strong understanding of more »