- CoStar Realty Information, Inc. (Arlington, VA)
- …network setup + Ability to examine network, server, and application logs with forensic depth to determine trends and identify security incidents, and train and ... mentor others to deepen their skills + Use security tools to audit infrastructure, detect issues and coordinate remediation of any issues + Develop and mature threat hunting practices in the CoStar enterprise + Collaborate with other teams to remediate… more
- State of Georgia (Muscogee County, GA)
- …program is designed to assist individuals in successful transition from forensic commitments back into the community. Job Description, Responsibilities, Standards, ... and Qualifications Job Description: Provide healthcare services typically performed by a physician, under the supervision of a licensed physician. Conduct complete physicals, provide treatment, and counsel clients. May, in some cases, prescribe medication. Job… more
- 7-Eleven (Irving, TX)
- …triage, playbooks, investigation, write-ups, escalations) . Cyber Threat Intelligence . Forensic analysis . Threat Hunting . Ingestion of Indicators of Compromise, ... and distribution to enforcement mechanisms . Data loss prevention . Email security . Security Orchestration and Automation . Threat research and creation of compensating controls . Act as point of contact for 7-Eleven leadership to advance partnership… more
- TekSynap (Richmond, VA)
- …+ **CFR** - CyberSec First Responder + **CHFI** - Computer Hacking Forensic Investigator + **Cloud+** **AND** + Computing Environment: Linux+, Splunk Administrator ... **AND** + DoD Approved 8570 Baseline Certification: Category IAT Level III **CASP+ CE** - CompTIA Advanced Security Practitioner (CE) + **CCNP Security** - Cisco Certified Network Professional Security + **CISA** - Certified Information Systems Auditor +… more
- TekSynap (Columbus, OH)
- …+ **CFR** - CyberSec First Responder + **CHFI** - Computer Hacking Forensic Investigator + **Cloud+** **AND** + Computing Environment: Trellix IPS manager, Check ... Point IPS Blade **AND** + DoD Approved 8570 Baseline Certification: Category IAT Level III + **CASP+ CE** - CompTIA Advanced Security Practitioner (CE) + **CCNP Security** - Cisco Certified Network Professional Security + **CISA** - Certified Information… more
- Insight Global (Dallas, TX)
- …and investment advisers. *Conduct periodic compliance testing, risk assessments, and forensic reviews to identify potential gaps or deficiencies. *Assist in the ... development and implementation of compliance policies, procedures, and controls. *Lead training sessions for employees on key compliance topics including Code of Ethics, AML, insider trading, and cybersecurity. *Implement, manage, and optimize compliance… more
- TekSynap (Columbus, OH)
- …+ **CFR** - CyberSec First Responder + **CHFI** - Computer Hacking Forensic Investigator + **Cloud+** **AND** + Computing Environment: F5 Certified Technology ... Specialist (ASM). **AND** + DoD Approved 8570 Baseline Certification: Category IAT Level III + **CASP+ CE** - CompTIA Advanced Security Practitioner (CE) + **CCNP Security** - Cisco Certified Network Professional Security + **CISA** - Certified Information… more
- Hamline University (St. Paul, MN)
- …arts college. Required courses include human osteology (with a lab), forensic anthropology, introduction to anthropology, and topics classes in biological ... anthropology. We are excited about prospective colleagues who also: + - Are committed to teaching excellence; + - Demonstrate record of supporting students from diverse backgrounds; + - Engage in and mentor students through research and in internships; + -… more
- SUNY Cortland (Cortland, NY)
- …Psychology + Applied Behavioral Analysis + Psychology in Organizations + Forensic Psychology + Counseling Psychology + Abnormal Psychology Required Qualifications: ... Appropriate level of experience and/or Master's degree. Preferred Qualifications: Terminal degree preferred. more
- MUFG (Tampa, FL)
- …such as Splunk to detect threats, correlate events, and support forensic investigations + Evaluate and remediate insecure configurations across Unix systems, ... contributing to continuous improvement of security posture + Support threat detection and file integrity monitoring initiatives, integrating tools and processes into Unix environments + Secure SSH configurations, including key management, access controls, and… more