Amplified Enterprise Productivity and Employee Satisfaction • IT End User Support • Asset Management • Network Operations Support • Contract Management
December 4
Amplified Enterprise Productivity and Employee Satisfaction • IT End User Support • Asset Management • Network Operations Support • Contract Management
• The Security Engineer II is responsible for protecting technological assets by establishing and enforcing system and network access controls • Focus on the delivery of core security improvements and operations • This will include the management of firewalls, vulnerability assessments review and remediation, encryption methodologies, systems and network security • Participates in the planning, design and build of security architectures • Engages in the implementation of network and computer security and ensures compliance with corporate cybersecurity policies and procedures • Monitors cybersecurity requirements for local area networks (LANs), wide area networks (WANs), virtual private networks (VPNs), routers, firewalls, and related network devices. • Performs security assessments of applications and systems using penetration and vulnerability testing and risk analysis • Participates in configuration and installation of firewalls and intrusion detection systems • Implements software fixes (patches) to remove system vulnerabilities • Responds immediately to cybersecurity-related incidents and assists with providing a thorough post-event analysis • Helps to investigate intrusion incidents and conducts forensic investigations • Other duties as required.
• Bachelor’s degree (B.S/B.A) from four-college or university and 2 to 5 years’ related experience and/or training; or equivalent combination of education and experience • Builds productive internal and external working relationships • Exercises judgment within defined procedures and practices to determine appropriate action • System implementation, installation, and disaster recovery planning experience • Understanding and working knowledge of various routing protocols • Familiarity with enterprise routers, switches, and web load balancers • Knowledgeable about maintaining highly available and highly secure networks
Apply NowDecember 3
As an Associate Cybersecurity Threat Analyst, analyze cyber threats and improve security monitoring processes for Florida Blue.
November 27
Softek seeks a specialist to architect security compliance solutions in cloud technology, fostering continuous improvement and training.
November 27
Kroll is seeking an Offensive Security Consultant to perform penetration tests for clients. You will help address security vulnerabilities in their systems and applications.
November 27
Help manage information security controls and programs at Cambium Assessment. Ensure compliance and security posture through audits and risk assessments.
November 18
Join Checkmarx as an Information System Security Specialist. Ensure compliance with FedRAMP and other security regulations in a remote role.