- TECO Energy (Ybor City, FL)
- …security. Collaborate closely with owners of security controls such as firewalls, intrusion detection systems, VPNs, etc. to ensure security policies and ... standards are followed and consistently enforced throughout the organization. Identify and mitigate security vulnerabilities, develop and enforce security policies, and respond to security incidents. **QUALIFICATIONS** **Education** **Required:** Bachelor's… more
- Stark Tech Group (Rochester, NY)
- …systems and/or protective systems such as access control, camera systems, fire alarms, and intrusion detection . What are we looking for + Associate degree in ... Mechanical Engineering/Mechanical Engineering Technology or equivalent experience. + Experience with AutoCAD, Microsoft Office suite, Adobe. + Ability to work independently and as part of a team. + Ability to organize work and pay close attention to details. +… more
- IDS International (Arlington, VA)
- …through the use of Government-furnished closed-circuit television (CCTV) systems and other intrusion detection systems (IDS). + Rove the construction site ... after-hours, per the Site Security Manager's orders, to protect the integrity of Controlled Access Areas (CAA) and its materials. Required Qualifications: + Hold an active Top Secret Clearance. + Successful completion of a DoD SE 630 (CAG course). + Minimum of… more
- Academy Sports + Outdoors (Katy, TX)
- …systems in use by Loss Prevention, including but not limited to: intrusion /fire detection , video surveillance, access control, guard tour management, case ... management, metal detection , and electronic article surveillance + Utilize all available physical security systems to effectively monitor safety and the security of… more
- TekSynap (Rockville, MD)
- …+ Security Log Configuration and Management + Network Security: firewalls, Intrusion Prevention/ Detection Systems (IPS/IDS), and Web Application Firewalls (WAFs) ... with on or more of the following technologies is strongly preferred: + Endpoint Detection and Response (EDR) solution such as Palo Atlo Cortex XDR + Forescout… more
- Nightwing (Morrisville, NC)
- …may require mitigating controls + Analyze network traffic to identify exploit or intrusion related attempts + Recommend detection mechanisms for exploit and or ... subject matter expertise on network-based attacks, network traffic analysis, and intrusion methodologies + Escalate items which require further investigation to… more
- Grant Thornton (Denver, CO)
- …etc.), and IT infrastructure / network component (domain controllers, firewalls, routers, intrusion prevention / detection solutions, etc.) + Experience with ... ACL, IDEA, QlikView, QlikSense, Tableau, Spotfire, or other analytics and visualization solutions + Ability to execute multiple engagements and completing priorities in a rapidly growing team environment + Exceptional client service, communication, analytical,… more
- RedTrace Technologies Inc (Hanscom AFB, MA)
- …is conducted to evaluate the security posture of IS by employing various intrusion /attack detection and monitoring tools (shared responsibility with ISSOs) * ... Ensure that system recovery and reconstitution processes developed and monitored to ensure that the authorization boundary can be recovered based on its availability level determination * Ensure all authorization documentation is current and accessible to… more
- Global Resource Solutions (Arlington, VA)
- …is conducted to evaluate the security posture of IS by employing various intrusion /attack detection and monitoring tools (shared responsibility with ISSOs) + ... Ensure that system recovery and reconstitution processes developed and monitored to ensure that the authorization boundary can be recovered based on its availability level determination + Ensure all authorization documentation is current and accessible to… more
- Parsons Corporation (Fort Belvoir, VA)
- …is conducted to evaluate the security posture of IS by employing various intrusion /attack detection and monitoring tools (shared responsibility with ISSOs). + ... Ensure all ISSOs receive the necessary technical and security training (eg, operating system, networking, security management) to carry out their duties. + Ensure approved procedures are used for sanitizing and releasing system components and media. + Maintain… more