Experience managing enterprise security appliances and/or security monitoring software (IPSs, firewalls etc.). Genuent is hiring a Senior Information Security Analyst for our direct client located in the Houston area. SimplyHired may be compensated by these employers, helping keep SimplyHired free for jobseekers. Desktop Support:Imaging/Deployment/Troubleshooting:
Access to enterprise security tools. It's a little rough around the edges. Dice predicts salary ranges based on the job title, location, and skills listed in individual job descriptions. 3+ years working with toolings related to Cloudflare, Akamai, or for high traffic websites . Location : Remote Mode of interview : Skype/Telephonic
Imaging/Deployment/Troubleshooting
Are you a veteran who served on active duty in the Armed Forces (United States Army, Navy, Air Force, Marine Corps, or Coast Guard) for more than 90 consecutive days and received either an honorable discharge or a general discharge under honorable conditions? Yahoo! Strong Statistical Analysis skills and concepts
Copyright 1990 - 2022 Dice. Please provide a list of all valid certifications you currently hold and their validity date(s) ("See Resume" WILL delay review of your application). IT PROFESSIONAL SECURITY (CYBER SECURITY ANALYST), Print (http://agency.governmentjobs.com/houston/job_bulletin.cfm?jobID=3550965&sharedWindow=0), Job Classification: IT Professional Security (Cyber Security Analyst), Workdays & Hours: Monday Friday 8:00 a.m. 5:00 p.m.* *Subject to Change, DESCRIPTION OF DUTIES / ESSENTIAL FUNCTIONS. By signing in to your account, you agree to SimplyHired's Terms of Service and consent to our Cookie and Privacy Policy. Location: Houston, TX77063
Actual salary offered by employer may vary. If, This is potential hire after 3-6 months contract. Use of this site is subject to certain Terms and Conditions. Unlike many other salary tools that require a critical mass of reported salaries for a given combination of job title, location and experience, the Dice model can make accurate predictions on even uncommon combinations of job factors.
SimplyHired may be compensated by these employers, helping keep SimplyHired free for jobseekers. Ability to troubleshoot technical and security related issues, Experience working in a rapidly changing, high intensity environment, Avid, proactive learner and ability to work well in a team based environment, Candidate required to obtain Security+ certification during first year of employment. Preference shall be given to eligible veteran applicants provided such persons possess the qualifications necessary for competent discharge of the duties involved in the position applied for, such persons are among the most qualified candidates for the position, and all other factors in accordance with Executive Order 1-6. We are not an agent or representative of any employer. 8 character minimum with at least 1 number and 1 letter. We power our clients success and drive our consultants career growth. Associate's degree in Computer Science, Management and Information Systems (MIS), Business or a related field. (TTY 7-1-1). Azure Solution ArchitectValue Chain: EngineeringLocation: Houston, TX Experience/Requirements:Responsible for designing and building solutions that best meet the business needs and are aligned with the IT strategy and roadmaps.Experience working with major application development platforms (Azure, SalesForce)Strong background in architecture with real-world experience of architecting, designing, and delivering large IT projects.Ability to build strong relationships across the business and IT. Document computer security and emergency measures policies, procedures, and tests. If you find things we could do better, let us know at newdicesupport@dice.com or give us a call at 888-321-DICE (3423). Minimum of 2 to 5 years of prior work experience in cyber security. Description Robert Half is partnering with a Medium sized business in need of a Risk and Security Analyst. patterns in the more than Data Visualization and Analysis We will also hide the same job if it is reported by the same Employer.
Factors used in determining the salary offered include the candidate's qualifications as well as the pay rates of other employees in this classification. Field service exp: Assist the Government in coordinating NASA's response to agency-wide and/or significant cyber incidents and providing oversight for this service.
Experience with developing procedures and runbooks for a SOC. Are you willing to accept this position knowing that you will be working in an office environment on a daily basis? Ability to effectively communicate technical information to a non-technical audience. For this role, we are looking for a curious and innovative team member with a. Review business requirements and make suggestions to improving security processes. All rights reserved. Displayed here are Job Ads that match your query.
Required Skills: More than three (3) years 6 months of experience, Please select which certifications you have that are currently valid. You can manage your 'Saved' and 'Not Interested' jobs from the jobs section of your dashboard. On a daily basis, this person will use the vulnerability management tool Qualys to, Ability to deal diplomatically and effectively at all levels of the organization including both technical and non-technical, management and senior leadership., Basic experience with network monitoring and packet analysis tools. There are no major sources of discomfort, i.e., essentially normal office environment with acceptable lighting, temperature and air conditions. Interview Process: Phone/WebEx JD: Technical Skills: Bachelor's degree in engineering, Computer Sciences, or equivalent with 4-5 years' experience. Experience working with internal and external auditors and demonstrated experience in application security practices, Act as the lead in supporting network security systems and solutions such as intrusion detection systems, web security gateway, privileged access management,, Detailed understanding of common cyber security analytic frameworks and models. The candidate must have the following knowledge, skills and abilities: Knowledgeable of Cyber Kill Chain and Diamond Model of Intrusion Analysis, Knowledge of SIEM, IDS, anti-virus/anti-malware and firewall technologies. To get the most accurate prediction of the salary you might earn, The Denzel Group, an award-winning search firm, has been chosen to work with an industry leader in the Philly on, TITLE: Cyber Security Engineer Location: Texas Our client is looking for a Cyber Security Engineer to be the sole owner, Company: KARL STORZ Endoscopy-America, Inc. (KSEA) Job Code: 12365 Pay Grade: US-B18 Description KARL STORZ SE & Co. KG based, App Security Engineer opportunity - Exciting Medical Device Organization! Responsible for, People who searched for Cyber Security jobs in Houston, TX also searched for, There are open Cyber Security jobs in several cities near Houston, TX including, The top companies hiring now for Cyber Security jobs are, Copyright 20082022, Glassdoor, Inc. "Glassdoor" and logo are registered trademarks of Glassdoor, Inc, Specialist - IT Cybersecurity -2110002843- Houston, TX, Cyber Security Research and Hunting Analyst, Cyber Threat Operations and Defense Analyst, Cyber Security Detection Analyst Weekends, 3rd shift.
The City of Houston is committed to recruiting and retaining a diverse workforce and providing a work environment that is free from discrimination and harassment based upon any legally protected status or protected characteristic, including but not limited to an individual's sex, race, color, ethnicity, national origin, age, religion, disability, sexual orientation, genetic information, veteran status, gender identity, or pregnancy. Staff Cyber Security Information and Event Management (SIEM) Engineer Would you like to ensure the security of our global Job: SC19613 IT INFORMATION & SERVICES ANALYST Location: The Woodlands, TX Type: Contract Exciting opportunity! This is a. Alternatively, you can continue with your existing account on the site you originally registered on. Ability to conduct research into network/security issues and products. Experience with responding to security related incidents, incident response, conducting table top exercises. recognizing If yes, this position is subject to random drug testing and if a promotional position, candidate must pass an assignment drug test. Basic understanding of the OWASP Top 10. Confer with users to discuss issues such as computer data access needs, security violations, and programming changes. Understanding of Forecasting Techniques Role Type: ONSITE Houston downtown. Must be able to pass a criminal background check, obtain and maintain federally mandated security clearances where required. Top 5 Skills / Additional Job Posting Description Details * SimplyHired ranks Job Ads based on a combination of employer bids and relevance, such as your search terms and other activity on SimplyHired. At least 18 months of technology experience in IT security, or supporting security aspects of IT infrastructure or applications teams. Advertising Solutions Privacy Policy. 10 city holidays, plus one floating holiday, For plan details, visit http://www.houstontx.gov/hr/benefits.html. Copyright 2022 techfetch.com All Rights Reserved, Security, Cyber Security, FireWall, CCNA, Cisco, TCP/IP, Hello, This is Rasika from Ztek Consulting INC ( .
If you need special services or accommodations, call (832/393-0204). Exercises discretion and independent judgment on Information, Track and monitor progress on NERC CIP contractor activities including contractor negotiations and obtaining background checks from contractor personnel., Bachelor's degree in Data Governance, Data Management, Computer Information Systems, Business Information Systems, Computer or Data Science or related field., Bachelors or associates degree in computer science, information technology or related field is preferred. Field service experience Document security events in an Incident Management System. The job description is as follows: NJTECH is a globally managed IT service, IT consulting, and Business solutions partner.
Information security: 1 year (Preferred). Good Database Knowledge (SQL) Duration: 24-36 Months the prediction in your Dice profile. If you need login assistance or technical support call 855-524-5627. Experience performing vulnerability scanning, penetration testing, and vulnerability management. Effective T, PowerApps Developer Skills required includes: Power Platform: o PowerApps development (Canvas and Model driven) o Power Automate o Power BI o Dataverse (including, Performs threat and vulnerability assessments and provides subject matter expertise on appropriate threat mitigation approaches, Identifies intrusion activity by leveraging alert data from multiple sensors and systems and determines priority for response, Monitors, evaluates, and assist with the maintenance of assigned security systems in accordance with industry best practices to safeguard internal information systems and databases, Uses attack signatures and tactics, techniques and procedures (TTPs) to aid in threat detection and discovery, Conducts basic malware analysis of attacker tools and identifies indicators of compromise (IOC)s, Collaborates with other IT team members to develop and implement innovative strategies for monitoring and preventing attacks, Conducts research on emerging security threats, Proposes additional components and techniques that could be used to proactively detect and prevent malicious activity, Manage the SOC mailbox, and monitor and analyze the emails for threats including phishing and malware, and escalates per procedures, Participates in the investigations of information security incidents and may prepare reports on intrusions as required, Maintains an understanding of the current threats, vulnerabilities, response and mitigation strategies used to support, Logs and records all security incidents to internal ticketing system, Collects malware artifacts safely for analysis and incident investigations, Examines suspicious emails for malicious content and provide recommendations on remediation actions, Performs URL/domain analysis to identify and report any malicious indicators associated with the resource and evaluates associated risks, Provides other services as a key member of the, Security sensor policies for IDS/IPS, Firewalls, web security gateways and logging, Continuous control monitoring including baseline security configuration monitoring, Knowledge of SIEM, IDS, anti-virus/anti-malware and firewall technologies. Maintain permanent fleet cryptologic and carry-on direct support systems required in special land, sea surface and subsurface operations. For more information, see the, I want to receive the latest job alert for Cyber Security Analyst in Houston, TX, Use Facebook or Google to register on SimplyHired and create job alert, Senior / Lead Analyst, Information Security, Cyber Security Research and Hunting Analyst, Cyber Security Detection Analyst Weekends, 3rd shift, Cybersecurity Ransomware Readiness Reporting Analyst, Cyber Threat Operations and Defense Analyst, Senior Cyber Security Analyst - Bots & Blocking. If this position does not match your exact skills, perhaps you know of someone with the required skills and availability, if so, please feel free to forward this e-mail to them. Duties, functions and responsibilities of this position include: Supports cyber security initiatives through both predictive and reactive analysis, Performs threat and vulnerability assessments and provides subject matter expertise on appropriate threat mitigation approaches, Identifies intrusion activity by leveraging alert data from multiple sensors and systems and determines priority for response, Monitors, evaluates, and assist with the maintenance of assigned security systems in accordance with industry best practices to safeguard internal information systems and databases, Uses attack signatures and tactics, techniques and procedures (TTPs) to aid in threat detection and discovery, Conducts basic malware analysis of attacker tools and identifies indicators of compromise (IOC)s, Collaborates with other Cyber Division and IT team members to develop and implement innovative strategies for monitoring and preventing attacks, Conducts research on emerging security threats, Proposes additional components and techniques that could be used to proactively detect and prevent malicious activity, Manage the SOC mailbox, and monitor and analyze the emails for threats including phishing and malware, and escalates per procedures, Participates in the investigations of information security incidents and may prepare reports on intrusions as required, Maintains an understanding of the current threats, vulnerabilities, response and mitigation strategies used to support cyber security operations, Logs and records all security incidents to internal ticketing system, Collects malware artifacts safely for analysis and incident investigations, Examines suspicious emails for malicious content and provide recommendations on remediation actions, Performs URL/domain analysis to identify and report any malicious indicators associated with the resource and evaluates associated risks. Experience with analyzing system, application, security, network logging data from a SIEM to create actionable work tasks for a SOC, or other IT staff. Train users and promote security awareness to ensure system security and to improve server and network efficiency. Significant time spent using computer display, keyboard, and mouse. Dice's predictive salary model is a proprietary machine-learning algorithm. Lensa, Inc. - Lensa is a job search engine. Only online applications will be accepted for this City of Houston job and must be received by the Human Resources Department during active posting period. Coordinate implementation of computer system plan with establishment personnel and outside vendors. Monitor use of data files and regulate access to safeguard information in computer files. To offer you the best localized experience, please create a new account to apply for jobs in this region.
Proven experience in setting up complex test environments with Network and Storage Adapters. Your understanding of cyber threat as a function of human motivation, Help reverse engineer other security systems as a white hat expert. IT certifications- CEH, GICSP, Cisco CCENT/CCNA preferred. 600,000 Strong comprehension of Windows operating system, Detection and Response Do you like working on a team tasked with identifying, Monitoring, Incident Response, and Threat, assessment (PRA), training, information protection, supply chain, and patch management assessment as it pertains to the NERC CIP, for improvement and provide critical feedback and input for, security efforts. Application Note: If you select to "Sign in with LinkedIn" , you will be required to also create a candidate, Description Description This is a perfect opportunity for the right person to become a key part of a team of, Our Client, a fast growing financial services firm, is seeking a IT Data Security Analyst.
customize Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers. Position : Cloud, At Baker Hughes, we are building a Talent Community of highly talented and motivated professionals for future job roles. Your account has successfully been deleted. This job was posted on Sun Jul 10 2022 and expires on Tue Aug 09 2022. Expertise in the identification of cyber attack techniques.
Due to the high volume of applications received, the Hiring Department will contact you directly, should you be selected to advance in our recruitment process. Copyright 2008-2022, Glassdoor, Inc. "Glassdoor" and logo are registered trademarks of Glassdoor, Inc, Systems design, analysis, support and troubleshooting of responsible solutions and projects in assigned areas. We are seeking an experienced and outstanding Cyber Security Analystfor our client, If you think you have what it takes, reach us with your recent resume. This role supports 24x7 cyber threat detection and incident response. All new and rehires must pass a pre-employment drug test and are subject to a physical examination and verification of information provided.
Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures. (Check all that apply). Modify computer security files to incorporate new software, correct errors, or change individual access status. To view your detailed application status, please log-in to your online profile by visiting: http://agency.governmentjobs.com/houston/default.cfm or call (832/393-0204). Candidate required to be a U.S. Citizen or U.S. National Good understanding of windows, Linux, a, Job Title: Cloud Engineer, Platform Business & EdgeLocation: Houston, TX (hybrid average 2-3 days each week in the office, not a remote job)Description and Requirements:The Cloud Engineer works as a hands on engineer to implement cloud infrastructure using VMWare (design, configuration and deployment using the vSphere technologies vCenter, vSAN, ESXi, vNet, etc), hyperconverged infrastructure (HCI) Hyperflex or equivalent, a hands-on expert in virtualization, infrastructure and networkin, Title: .Net Developer Location: Houston, TX (50% onsite/50% remote)Length: 1 year + contract (multi-year project)Hands-on of experience with Azure DevOpsExpert in building CI/CD pipelines (YAML) and automation scripts in Azure CloudExperience in Git version controlExperience with Azure resources (resource groups, app insights, functions, jobs, etc)AzureAD authentication and, 5+ years of demonstrated experience on virtualization (VMware) design, configuration and deployment using the vSphere technologies vCenter, vSAN, ESXi, vNet, etc.5+ years of demonstrated experience on enterprise data storage and data protection solutions like SAN, NAS, SDS, Veeam, Avamar5+ years of demonstrated experience on application enabling technologies like DNS, DHCP, IPAM, BigIP/F5, HA, Load balancing, etc.5+ years of demonstrated experience on enterprise operating systems like Wi, Job Title: Desktop Support - Emerging Technologies Experience performing threat modeling and security review to assess new designs and security requirements for new technologies. Customer service We do have a position for AWS Solution Architect Please find the details below and if interested please send me your updated word format resume. Our proprietary machine-learning algorithm uses more than
600,000 This candidate, Please send updated resume with your expecting rate on C2C or 1099 or W2 all inclusive . Work with Cybersecurity, Global DTTL Infrastructure teams, and Deloitte member firms. Extensive experience in Azure cloud infra, DevOps, Networking. Hands on experience with various RAID concepts and Iperf, netperf, Medusa, Meet Grinder stress tools Familiarity with FCoE, FC, iSCSI and Boot From SAN. Monitor current reports of computer viruses to determine when to update virus protection systems. salary data points to infer how much each factor - job title, location, experience, education, and skills - will impact the salary. The city offers a competitive benefits program, including competitively priced health coverage and a defined contribution pension plan. Identify, create and implement processes, implementation, maintenance, and enforcement of privacy policies, procedures, and controls Support the execution of Information, and privacy inherent to client engagements Identify technological opportunities and evaluate the Information Security and, Jobs immediate work available paid cash daily. Please enter a valid email (email@domain.com). For more information, see the SimplyHired Privacy Policy. Displayed here are Job Ads that match your query.
Job Role : AWS Solution Architect Protect customers on a global scale and provide security guidance on existing and emerging cyber security threats.
Please share resume to discuss further. This is a Full Time. Experience in IT security, infrastructure or applications may be substituted for the education requirement on a year-for-year basis. Experience with Windows Servers, enterprise anti-virus, endpoint security, application listing technologies, SIEM, logging configurations, IDS/IPS, authentication methods, TCP/IP, packet capture and analysis, Microsoft AZURE Cloud Services. Job Roles/Responsibilitie.
IP Networking Come, transform your career with us and be a part of our high-performing team. Provides other services as a key member of the Cyber Division including but not limited to: Information security review and approval of changes to COH networks, servers and end devices in collaboration with the Infrastructure Division, Security sensor policies for IDS/IPS, Firewalls, web security gateways and logging, Continuous control monitoring including baseline security configuration monitoring. Collaborate and generate documentation for transfer knowledge with other analysts on duty to. By signing in to your account, you agree to SimplyHired's Terms of Service and consent to our Cookie and Privacy Policy. Experience in the information security field required. System-specific technical certifications may be considered a substitution for Associate's degree. You are a registered Dice member on a different regional site. We at NJTech are focused on hiring highly skilled professionals who are excited by the opportunity to make a true impact on their careers as well as on our clients' businesses. Bachelors Degree in relevant field of study or equivalent combination of education and experience required. Which best describes your completed education? Our offshore consulting plays a major role in helping clients to achieve their objectives at the highest level; ultimately creating sustainable value to customers. Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated. Which area of concentration did you obtain your degree? Our "High-Performance Business" strategy builds our expertise in technology and consulting. To manage and analyze the technical risks that come with a particular solution, the ideal candidate will be knowledgeable about state/local laws that ensure. Understanding of key supervised, unsupervised algorithms prevalent in the industry, with sound knowledge of their implementation, merits, and demerits Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs. Job Description This position will work. IT Security Engineer Continue to improve Incident Response Plan procedures and make updates as necessary to evolve the needs of. Represent customer and team interests in product, engineering, and, Articulate and persuasive communicator who can discuss, Collect, analyze, and interpret qualitative and quantitative, technical, and non-technical data in all-source intelligence analysis., To manage and analyze the technical risks that come with a particular solution, the ideal candidate will be knowledgeable about state/local laws that ensure, Proven ability to coordinate assignments within a team setting, and communicate findings in both technical and non-technical content., Discuss compliance and audit findings with management and develop action plans to address them.
Department may administer skills assessment test. This action will hide this job from your search results. This position is not a remote position. data points to make its predictions. Working Knowledge of OWASP Top 10. Discover internal security concerns and raise findings with the appropriate internal teams. Provide architectural guidance in the delivery of complex reports and, Assists the organization with monitoring/assessing security controls for IT systems, assuring a continuous state of compliance with all IT security regulations, Provide reporting of security controls and access for audits and assessments as needed. Will accept 3 or 4 year bachelors degree., Monitor emerging technologies, products, services, and other industry trends and collaborate with a wide range of stakeholders to develop a technological, Consistent record of achievement in field of expertise and has acquired deep proficiency within this specialist field through highly relevant experiences., We are looking for someone with strong technical expertise in Big Data (Azure), who is interested in joining our team to create and manage our data, 5 or more years of technical experience in the Information, You will be willing to share your knowledge by integrating in to or leading specialized cross functional investigation teams and youll provide realistic but, Technology jobs and engineering jobs include design of IT architectures, large-scale transformation, agile development, software engineering, cybersecurity, You will direct the resources of the technical team, report on progress, issues, and problem areas, as well as write and review technical documents., The successful candidate will develop a detailed understanding of the function and operation of assigned information systems and apply senior- level expertise, You will also be expected to recommend improvements to the development process based on industry best practices and leveraged experience and will have an, In the role of Service Owner, the Manager of Governance, Risk and Compliance is expected to have experience in managing third party risk management, Security, Our client is looking to bring on an experienced application, 5+ years of demonstrated experience on virtualization (VMware) design, configuration and deployment using the vSphere technologies vCenter, vSAN, ESXi, vNet, The client is bringing on this resource to develop detailed project plans and drive their execution through collaboration with internal and external, 3-5 years experience using vulnerability scanning tool Qualys or Tenable.