We are #hiring! Join our team. Follow the links below to apply today: Education Coordinator (Active Secret Clearance Required) - https://lnkd.in/eh4eXMXs Financial Analyst (Active Public Trust Clearance Required) - https://lnkd.in/eXEmuJVT Acquisition Support Specialist (Active Secret Clearance Required) - https://lnkd.in/eGaK8XdZ Cyber Security Engineer (Active TS/SCI Clearance Required) - https://lnkd.in/eV3YK3ww Systems Analyst (Active Public Trust Clearance Required) - https://lnkd.in/e7jKZ9mE Director of Pricing - https://lnkd.in/eFmwh9nP To view all our current opportunities, please visit our Careers page at https://loom.ly/Kf_njY0
Seneca Nation Group’s Post
More Relevant Posts
-
#hiring Special Agent: Cybersecurity/Technology Background, New York City, United States, $129K, fulltime #jobs #jobseekers #careers $129K #NewYorkCityjobs #NewYorkjobs #ITCommunications Apply: https://lnkd.in/gWdi95x2 HOW TO APPLY STEP 1: Click on the "Apply" button to be directed to the FBIJobs Careers website. STEP 2: Click the "Start" button to begin. You will be prompted to either Sign In to continue or to register with FBIJobs if you don't already have an account. STEP 3: Follow the step-by-step process to submit your interest. You will be guided through each step. You must complete all sections of the form AND ALL REQUIRED DOCUMENTS MUST BE ATTACHED to successfully submit your interest.1. Your resume, specifically noting relevant work experience and associated start and end dates.2. Other supporting documents: College transcripts, if qualifying based on education, or if there is a positive education requirement. Veterans: DD 214; Disabled Veterans: DD 214, SF-15 and VA letter dated 1991 or later.Please see instructions on the site for attaching documents. JOB DESCRIPTION Use your cyber and IT background to become an FBI Special Agent!FBI Special Agents apply their professional experience and unique skill sets to their work and role every day. Because technology permeates every aspect of what we do, our Agents also come from all IT backgrounds including network information, cybersecurity, computer science, digital forensics and other technical specialties. We need professionals experienced in network security, computer science and software engineering to prevent cybercrimes, data theft, ransomware and other attacks to our national security.You can expect continued specialized training once onboard and opportunities to work on some of the Bureau's most complex cases. The scope and scale of our investigations provide unique challenges unlike anything you could work on in the private sector. SALARY LEVEL $78,000.00 - $153,000.00Salary is commensurate to experience and location. DUTIES Adhere to strict standards of conduct. Undergo a rigorous background investigation, credit checks and a polygraph in order to obtain a Top Secret Sensitive Compartmented Information
To view or add a comment, sign in
-
Opportunity
We are hiring Cyber Security Monitoring analysis senior analyst and analyst For additional details: https://lnkd.in/d2-RSzVs Please apply now through filling the application through d/m URL: https://lnkd.in/dXj95tq Tax registration number: 204-899-052
To view or add a comment, sign in
-
#hiring Special Agent: Cybersecurity/Technology Background, Charlotte, United States, $129K, fulltime #jobs #jobseekers #careers $129K #Charlottejobs #NorthCarolinajobs #ITCommunications Apply: https://lnkd.in/gwZcQhZG HOW TO APPLY STEP 1: Click on the "Apply" button to be directed to the FBIJobs Careers website. STEP 2: Click the "Start" button to begin. You will be prompted to either Sign In to continue or to register with FBIJobs if you don't already have an account. STEP 3: Follow the step-by-step process to submit your interest. You will be guided through each step. You must complete all sections of the form AND ALL REQUIRED DOCUMENTS MUST BE ATTACHED to successfully submit your interest.1. Your resume, specifically noting relevant work experience and associated start and end dates.2. Other supporting documents: College transcripts, if qualifying based on education, or if there is a positive education requirement. Veterans: DD 214; Disabled Veterans: DD 214, SF-15 and VA letter dated 1991 or later.Please see instructions on the site for attaching documents. JOB DESCRIPTION Use your cyber and IT background to become an FBI Special Agent!FBI Special Agents apply their professional experience and unique skill sets to their work and role every day. Because technology permeates every aspect of what we do, our Agents also come from all IT backgrounds including network information, cybersecurity, computer science, digital forensics and other technical specialties. We need professionals experienced in network security, computer science and software engineering to prevent cybercrimes, data theft, ransomware and other attacks to our national security.You can expect continued specialized training once onboard and opportunities to work on some of the Bureau's most complex cases. The scope and scale of our investigations provide unique challenges unlike anything you could work on in the private sector. SALARY LEVEL $78,000.00 - $153,000.00Salary is commensurate to experience and location. DUTIES Adhere to strict standards of conduct. Undergo a rigorous background investigation, credit checks and a polygraph in order to obtain a Top Secret Sensitive Compartmented Information
https://www.jobsrmine.com/us/north-carolina/charlotte/special-agent-cybersecuritytechnology-background/464983795
jobsrmine.com
To view or add a comment, sign in
-
Check out what's new in this LWIS: ALPHV hacks, Ivanti woes, malicious PyPI packages, AI worms, Windows Kernel zero-day exploit, and various techniques, tools, and exploits #cybersecurity #cyberjobs #hiringnow #exploits #ai
Last Week in Security - 2024-03-04
sixgen.io
To view or add a comment, sign in
-
#hiring Penetration Tester, Washington, United States, fulltime #jobs #jobseekers #careers #Washingtonjobs #DistrictofColumbiajobs #ITCommunications Apply: https://lnkd.in/gZz6vvbq Base-2 Solutions is seeking an experienced Cyber Hunt Specialist that will perform multidiscipline penetration testing of customer systems and global networks, rapid development of domain or problem-specific tools that leverage identified vulnerabilities, and research on the latest exploitation techniques and threat vectors in support of authorized missions and test events. Qualifications Experience performing web application security assessments. Experience with TCP/IP protocols as it relates to network security. Experience with offensive tool sets including Kali Linux, Metasploit, CobaltStrike, Intercepting Proxies, etc. Experience in using network protocol analyzers and sniffers, as well as ability to decipher packet captures. Capable of conducting penetration tests on applications, systems and network utilizing proven/formal processes and industry standards. Perform penetration tests on computer systems, networks, and applications. Create new testing methods to identify vulnerabilities. Perform physical security assessments of systems, servers, and other network devices to identify areas that require physical protection. Pinpoint methods and entry points an attacker may use to exploit vulnerabilities or weaknesses. Search for weaknesses in common software, web applications and proprietary systems. Research, evaluate, document, and discuss findings with IT teams and management. Review and provide feedback for information security fixes. Establish improvements for existing security services, including hardware, software, policies, and procedures. Identify areas where improvement is needed in security education and awareness for users. Be sensitive to corporate considerations when performing testing
https://www.jobsrmine.com/us/district-of-columbia/washington/penetration-tester/467475933
jobsrmine.com
To view or add a comment, sign in
-
Innovative Transformational Leader | Multi-Industry Experience | AI & SaaS Expert | Generative AI | DevOps, AIOps, SRE & Cloud Technologies | Experienced Writer | Essayist | Digital Content Creator | Author
Last Week in Security - 2024-08-12 by Rusty Robison via SIXGEN ([Global] Virtual Desktop Infrastructure) URL: https://ift.tt/4ujbnSL We're Hiring! Immediate Open Positions: Maryland Applicants: We have openings for a Technical Writer, Red Team Operator, Red Team Operator Infrastructure Engineer, Red Team Operator Tool Developer, Systems Engineer, HPC Software Engineer, Information Systems Security Engineer, Cyber Operator Developer Analyst (CODA), Senior Data Analyst and Earned Value Management Specialist. Virginia Applicants: Available opportunities: Land and Expeditionary Warfare Specialist, Cyber Warfare Threat Analyst, and Cyber Network Operator. For more open positions visit: https://lnkd.in/dsjBaCpM Last Week in Security is a summary of the interesting cybersecurity news, techniques, tools, and exploits from the past couple weeks. This post covers 2024-07-29 to 2024-08-12. News Proofpoint Email Routing Flaw Exploited to Send Millions of Spoofed Phishing Emails - An unknown threat actor exploited a flaw in Proofpoint's email routing to send millions of spoofed phishing emails impersonating popular companies. The campaign, named EchoSpoofing, used SPF and DKIM signatures to bypass security protections. The attacker sent messages from SMTP servers on VPS, complying with authentication measures to imitate legitimate domains. Proofpoint addressed the issue by providing corrective instructions to customers and urging VPS providers and email service providers to limit spamming capabilities. The campaign was not attributed to any known threat actor, and no customer data was exposed. Improving the security of Chrome cookies on Windows - This new App-Bound Encryption feature aims to protect users from malware that steals sensitive data by encrypting data tied to app identity, making it more difficult for attackers to access. Enterprises with roaming profiles may need to adjust their configurations to support this new protection. Don’t Let Your Domain Name Become a “Sitting Duck” - Researchers have found that over a million domain names are vulnerable to cybercriminals due to authentication weaknesses at web hosting providers and registrars. This vulnerability allows cybercriminals to take over domains and use them for malicious activities like sending spam and phishing emails. This issue has been ongoing for years and still persists, with security experts urging for stricter verification measures to prevent domain takeovers. Multiple large hosting and DNS providers are still susceptible to this authentication weakness, leaving domains at risk of being hijacked for malicious purposes. Microsoft need to be transparent about customer impacting DDoS attacks - Microsoft has been experiencing customer impacting DDoS attacks that are causing network outages for Azure and Microsoft 365. Despite these incidents, Microsoft has not been transparent about what is happening. After being called out by the Associated Press, Microsoft ...
Last Week in Security - 2024-08-12 by Rusty Robison via SIXGEN ([Global] Virtual Desktop Infrastructure) URL: https://ift.tt/4ujbnSL We're Hiring! Immediate Open Positions: Maryland Applicants: We have openings for a Technical Writer, Red Team Operator, Red Team Operator Infrastructure Engineer, Red Team Operator Tool Developer, Systems Engineer, HPC Software Engineer, Information Syste...
sixgen.io
To view or add a comment, sign in
-
#hiring Computer Security Systems Specialist Level III, Washington, United States, fulltime #opentowork #jobs #jobseekers #careers #Washingtonjobs #DistrictofColumbiajobs #ITCommunications Apply: https://lnkd.in/gn6HkYZF Job Description To effectively manage Cybersecurity risk to the Office, the contractor will assist the OFR in refining and implementing the processes and methodologies to assess internal and external/third-party systems, and provide an accurate accounting and tracking for shortcomings and weaknesses. The weaknesses will be tracked, monitored and reported in Plans of Action and Milestones
https://www.jobsrmine.com/us/district-of-columbia/washington/computer-security-systems-specialist-level-iii/474639421
To view or add a comment, sign in
-
#hiring Computer Security Systems Specialist Level III, Washington, United States, fulltime #opentowork #jobs #jobseekers #careers #Washingtonjobs #DistrictofColumbiajobs #ITCommunications Apply: https://lnkd.in/gn6HkYZF Job Description To effectively manage Cybersecurity risk to the Office, the contractor will assist the OFR in refining and implementing the processes and methodologies to assess internal and external/third-party systems, and provide an accurate accounting and tracking for shortcomings and weaknesses. The weaknesses will be tracked, monitored and reported in Plans of Action and Milestones
https://www.jobsrmine.com/us/district-of-columbia/washington/computer-security-systems-specialist-level-iii/474639421
To view or add a comment, sign in
-
You will get Private investigator for background check & identity verification worldwide https://lnkd.in/gxAfPFPn I'll do almost everything you want of me. On the opposite hand, I even have specialized know-how in people-finding, OSINT, virtual forensics, cybercrime/rip-off investigations, historical past checks, and honeypots. Why you have to pick me above my rivals: I am properly above a PI as an intelligence analyst. I actually have an exceptionally technical historical past in PC technological know-how in addition to an exceptionally technical historical past in intelligence work. I'm always learning new things and honing my craft. My present situation makes this clear. I am a Cyber Security Specialist, (open-source intelligence) expert, and private investigator. I am a professional in virtual forensics, monitoring locations, and looking at any type of records worldwide. My Services: Background Checking. IP Tracking Location Research Education Financial assets Photos & Videos Hunting Any Data Occupation Website Ownership Medical history Marital status Criminal and arrest record Why work with me? Fast Delivery 5 Years of experience 24/7 Support private detective, OSINT investigation, background check, find people, social media investigation, private investigator, due diligence
Private investigator for background check & identity verification worldwide
upwork.com
To view or add a comment, sign in
2,097 followers