• Technical Support Engineer

    Robert Half Technology (Atlanta, GA)
    …Microsoft Intune for device enrollment, compliance policies, application deployment, and security across multiple platforms. * Monitor and support resources ... recurring technical issues, implement solutions, and document processes. * Enforce IT security policies and manage device compliance through tools like Intune, Azure… more
    Robert Half Technology (12/15/25)
    - Related Jobs
  • Virtual Infrastructure Engineer

    BOOZ, ALLEN & HAMILTON, INC. (San Diego, CA)
    …test, and execute upgrades and patching for VMware infrastructure to maintain security and performance. + Continuously monitor virtual infrastructure health, ... to obtain a DoD 8570.11 IAT Level II Certification such as CompTIA Security + CE, CCNA- Security , GSEC, or SSCP Certification within 30 days of hire date Nice If… more
    BOOZ, ALLEN & HAMILTON, INC. (12/06/25)
    - Related Jobs
  • Sr IT Network Solutions Mgr

    BJs Wholesale Club (Marlborough, MA)
    …network integrations. + Ensure adherence to network performance, reliability, and security standards. Operations & Troubleshooting + Monitor network performance ... LAN, WAN, WiFi, and Cloud environments. This role ensures optimal performance, security , and scalability of enterprise networks, with strong focus on Fortinet… more
    BJs Wholesale Club (12/05/25)
    - Related Jobs
  • Systems Administrator

    Robert Half Technology (Greenville, SC)
    …issues related to operating systems, networks, and applications. * Administer and monitor network security measures, including firewalls, VPNs, and intrusion ... * Manage user accounts and permissions, ensuring proper system access and security compliance. * Train end-users on IT systems and applications while promoting… more
    Robert Half Technology (12/04/25)
    - Related Jobs
  • Sr. IT Operations Specialist - Mobility

    SHI (Somerset, NJ)
    …Lead mobile device lifecycle management, including procurement, provisioning, support, and retirement. ** Security & Compliance:** - Implement and monitor mobile ... Specialist - Mobility has technical expertise in MDM platforms, mobile security , and enterprise mobility architecture, along with strong leadership and project… more
    SHI (10/28/25)
    - Related Jobs
  • Defensive Cyber Operations Analyst

    Leidos (Washington, DC)
    …anomalous activity that may be indicative of threats to the enterprise. + Monitor various security tools and applications for possible malicious activities, ... between team members. BASIC QUALIFICATIONS: + **Active DoD TS/SCI security clearance.** + **Ability to pass additional customer suitability screening(s)… more
    Leidos (10/17/25)
    - Related Jobs
  • SOC Analyst II

    Foxhole Technology, Inc (Smyrna, GA)
    …risks. + Continuously monitor malware detection software tools. + Monitor network-based security sensors for anomalies and unauthorized activities. + ... and defense agencies. A recognized leader in navigating technology and security challenges, Foxhole delivers mission-focused innovations to answer evolving and… more
    Foxhole Technology, Inc (12/19/25)
    - Related Jobs
  • M365 GCC Senior IT Administrator

    Belcan (Cincinnati, OH)
    …such as conditional access, safe links, and quarantine rules within Microsoft 365. * Monitor and analyze security logs and alerts to proactively identify risks ... execution, monitoring, and closure. * Collaborate with cloud architects and security teams to define and implement network isolation, identity management, and… more
    Belcan (12/07/25)
    - Related Jobs
  • Senior Cloud DevOps Engineer

    Oracle (San Juan, PR)
    …system performance, identify potential issues and ensure systems are running efficiently. + Monitor and maintain security measures to protect against threats and ... to manage our Critical Cloud Infrastructure deployments, Region Build Outs, Security Operations and monitoring of Data Intelligence Service applications. In this… more
    Oracle (11/25/25)
    - Related Jobs
  • Manager, Cybersecurity Operations

    Jostens (Minneapolis, MN)
    …You will also lead the incident response function, manage cybersecurity technologies, monitor and respond to cybersecurity alerts, develop security operations ... tools and services. + Govern configurations for firewalls, endpoint security , and certificate key usage. + Monitor ...endpoint security , and certificate key usage. + Monitor tool effectiveness and recommend improvements. + Collaborate with… more
    Jostens (11/19/25)
    - Related Jobs