Information Security Jobs in the United States
CareerBuilder Premium Subscription
Fort Cavazos, TX
network and/or enclaves within the network to include such items as: scanning, remediation, host and network intrusion detection/prevention, firewalls, proxy servers, web cache, virus programs, vulnerability . Education / Certifications: - Bachelor’s Degree in Computer Science, Cybersecurity, Computer .
CareerBuilder Premium Subscription
Fort Belvoir, VA
Implements the Defense (DOD) Risk Management Framework (RMF) and assists the Information System Security Manager (ISSM) to ensure successful implementation of associated security controls and reviews all RMF documentation packages, and system fielding, operations, or upgrade requirements. Evaluates and conducts top level system architecture design, development, integration, testing, installation, and troubleshooting efforts from a cybersecurity viewpoint to ensure integration of all required cybersecurity products and adequacy of the analyses.
CareerBuilder Premium Subscription
Washington, DC
The person preferably has hands-on experience in configuring TLS, including tasks like obtaining a certificate from a trusted CA, installing it on the system, defining cipher suites, and ensuring proper TLS handshake. The Data Encryption Analyst is responsible for collecting the required information and provide guidance to the application teams on use of secure encryption algorithms and ciphers for data-in-transit as well as data at-rest to protect sensitive information.
CareerBuilder Premium Subscription
Kenilworth, NJ
This role requires a visionary leader who can enhance operational efficiency and customer experience while implementing technological innovations that support strategic initiatives. Job Summary: The Chief Information Officer will be responsible for developing and executing UFP’s information technology strategy, ensuring that it aligns with our overarching business objectives.
TTEC
Des Moines, IA
Hands-on SOC experience investigating and responding to security events across two or more of the following: SIEM, EDR, email security, NGFW, cloud platforms, threat intelligence. Since 1982, we've helped companies build engaged, pleased, profitable customer experiences powered by our combination of humanity and technology.
TTEC
Nashville, TN
Hands-on SOC experience investigating and responding to security events across two or more of the following: SIEM, EDR, email security, NGFW, cloud platforms, threat intelligence. Since 1982, we've helped companies build engaged, pleased, profitable customer experiences powered by our combination of humanity and technology.
TTEC
Trenton, NJ
Hands-on SOC experience investigating and responding to security events across two or more of the following: SIEM, EDR, email security, NGFW, cloud platforms, threat intelligence. Since 1982, we've helped companies build engaged, pleased, profitable customer experiences powered by our combination of humanity and technology.
TTEC
Wichita, KS
Hands-on SOC experience investigating and responding to security events across two or more of the following: SIEM, EDR, email security, NGFW, cloud platforms, threat intelligence. Since 1982, we've helped companies build engaged, pleased, profitable customer experiences powered by our combination of humanity and technology.
TTEC
Omaha, NE
Hands-on SOC experience investigating and responding to security events across two or more of the following: SIEM, EDR, email security, NGFW, cloud platforms, threat intelligence. Since 1982, we've helped companies build engaged, pleased, profitable customer experiences powered by our combination of humanity and technology.