- Northrop Grumman (Englewood, CO)
- …Tech Spec, and other government requirements + Manage and maintain UL-2050 Compliant Intrusion Detection Systems (IDS) and automated Access Control Systems (ACS) ... + Perform the duties of a Top-Secret Control Officer (TSCO) as required and maintain accountability of classified materials + Other duties as assigned This position can be filled at either a Level 3 (Principal) or Level 4 (Senior Principal) . **Basic… more
- V2X (Orlando, FL)
- …maintenance and support of embedded software and hardware for security and intrusion detection systems. Responsibilities Major Job Activities: * Develop ... strategies to execute team goals. * Design, develop, and support solutions for embedded Linux and ARM systems. * Provide technical expertise and recommendations in assessing new project releases and initiatives to support and enhance our existing embedded… more
- ManTech (Fort Meade, MD)
- …manual process for new operating system rollout. + Configure host-based intrusion detection systems. + Monitor and troubleshoot/examine detected anomalies. ... + Developed automation script adding new servers to IPA replacing human error and manual process + Analyze system and security logs while responding to discovered real time events providing SOC status updates. + Engineer ansible script automating creation of… more
- CACI International (Fort Bragg, NC)
- …in configuring and utilizing network protection components (eg, Firewalls, VPNs, network intrusion detection systems). + Knowledge of network systems management ... principles, models, methods (eg, end-to-end systems performance monitoring), and tools. + Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. + Skill in… more
- Open Access Technology International, Inc. (Bloomington, MN)
- …required to perform these tasks on: switches, routers, load balancers, firewalls, intrusion detection systems, IP telephony systems, wireless network devices, ... VPN devices, and other supporting LAN/WAN infrastructure components. Candidates with extensive experience deploying, maintaining, and supporting IT infrastructure are highly encouraged to apply. The starting salary range for the role ranges from $55,000 -… more
- Academy Sports + Outdoors (Jeffersonville, GA)
- …systems in use by Loss Prevention, including but not limited to: intrusion /fire detection , video surveillance, access control, guard tour management, case ... management, metal detection , and electronic article surveillance + Utilize all available physical security systems to effectively monitor safety and the security of… more
- TekSynap (Rockville, MD)
- …+ Security Log Configuration and Management + Network Security: firewalls, Intrusion Prevention/ Detection Systems (IPS/IDS), and Web Application Firewalls (WAFs) ... with on or more of the following technologies is strongly preferred: + Endpoint Detection and Response (EDR) solution such as Palo Atlo Cortex XDR + Forescout… more
- General Dynamics Information Technology (Falls Church, VA)
- …may require mitigating controls + Analyze network traffic to identify exploit or intrusion related attempts + Recommend detection mechanisms for exploit and or ... Family:** Cyber and IT Risk Management **Skills:** Network Traffic,Threat Detection ,Threat Management **Certifications:** GIAC Certified Enterprise Defender (GCED) |… more
- Nightwing (Falls Church, VA)
- …may require mitigating controls + Analyze network traffic to identify exploit or intrusion related attempts + Recommend detection mechanisms for exploit and or ... subject matter expertise on network-based attacks, network traffic analysis, and intrusion methodologies + Escalate items which require further investigation to… more
- General Dynamics Information Technology (Bedford, MA)
- …is conducted to evaluate the security posture of IS by employing various intrusion /attack detection and monitoring tools (shared responsibility with ISSOs) + ... Ensure that system recovery and reconstitution processes developed and monitored to ensure that the authorization boundary can be recovered based on its availability level determination. + Ensure all authorization documentation is current and accessible to… more