field. Active Project Management Professional (PMP) certification. Active ISC2 Certified Information SystemsSecurity... of seven (7) years of direct project and program management experience delivering information systems or computer network...
analysis, and incident reporting. The Security Operations Center is a 24/7 environment. You will be responsible for monitoring... enterprise networks and systems, detecting events, and reporting on threats that are directed against those systems...
. Desired: CISSP - Certified Information SystemsSecurity Professional GCFA - GIAC Certified Forensic Analyst GCFE - GIAC... strategies. The CTI Lead will work closely with threat hunters, threat analysts, and an established Security Operations Center...
teams to perform in-depth analysis and investigation of high-priority cybersecurity incidents Utilize security tools... to analyze, investigate, and triage security alerts Coordinate the monitoring of our customers environments, including cloud...
applications and systems in Windows and Linux environments. * This role ensures that all systems, applications, and security events... Architect (II) CISSP - Certified Information SystemsSecurity Professional GCFA - GIAC Certified Forensic Analyst GCFE - GIAC...
Construction, LLC. is an equal opportunity employer. All qualified applicants will receive consideration for employment... job security and standard of living. The Apprenticeship Training Program starts in August each year. Personnel hired...
presence during core business hours and availability to support 24/7/365 operations as required. Manage, train, and develop... and DHS data systems. Knowledge: Understanding of DHS I&A intelligence authorities, DHS component missions, and the role...
Information SystemsSecurity Professional CISSP-ISSMP – Information SystemsSecurity Management Professional CISM – Certified... supporting information systems or computer network services. Bachelor’s degree in Computer Science, Engineering, Information...
. Apply Information SystemsSecurity principles and relevant security methodologies across the vulnerability lifecycle. Assist... Information SystemsSecurity Professional Certified Ethical Hacker (CEH) or one of the following: DoD 8570 IAT Level II or IAM...
environments. Responsibilities: Lead implementation, configuration, monitoring, and troubleshooting of securitysystems... to defend against advanced threats. Qualifications: Required: 3+ years of experience in securitysystems administration...