Salaire moyen: $88 495 /annuel
Plus de statistiquesLes résultats de la recherche: 41 offres d'emploi
...persistence techniques, lateral movement, social engineering, etc.)
~ Knowledge of data encryption, VPN'S, vulnerability scanners and anti-malware products
~ Knowledge in one or more cloud specialties below would be considered an asset:
~ Cloud networking, Cloud IAM, SSO and...
Suggéré
Emploi permanent
Temps plein
Visa de travail
Lundi au vendredi
...Responsibilities
• Lead and coordinate the incident response team in
handling cybersecurity incidents, including data breaches, malware infections,
insider threats, and other security breaches.
• Conduct comprehensive digital forensics
investigations to identify the...
Suggéré
Emploi contractuel
...overall time to detect and respond.
· Work assignments involve complex issues requiring in-depth analysis of cybersecurity events, malware, network traffic, and other threat data with minimal precedent.
· Collaborate within the Cybersecurity Operations (SOC) teams to develop...
Suggéré
...the following technologies: Routing, Switching, VPN, LAN, WAN, WiFi, Network Security, Intrusion Detection, Cloud (IaaS, Saas), Anti-Malware & Sandboxing technologies. •Strong understanding in the following technologies and protocols: FIREWALL, RADIUS, PKI, IKE, IPSEC, TLS...
Suggéré
Temps plein
Le monde entier
...practices
• Experience in post-secondary education or the public sector is preferred
• Ability to perform digital forensics and malware analysis during an incident
• Deep understanding of risk management practices and cybersecurity frameworks (e.g. NIST)
• Ability to...
Suggéré
Temps plein
...Good understanding of network protocols, design, and operations
Comfortable with Web Application Firewalls, SIEM, IDS/IPS, anti-malware , vulnerability scanners solutions;
Experience with NGAV and EDR
Familiar with cloud technologies and knowledge of cloud security...
Suggéré
Temps plein
Travail occasionnel
...relational databases, firewalls, VPNs, and enterprise Anti-Virus products
~Strong knowledge of security incident management, malware management and vulnerability management processes
~Experience with web content filtering technology - policy engineering...
Suggéré
Temps plein
Travail posté
...beneficial.
• Technical knowledge in Wifi, Load Balancing and Application Delivery, Ethernet Switching, ACI, API, Two Factor Auth, Malware Sandboxes, Mail Gateways, Web Application Firewalling, Cloud (AWS, Azure, etc), SDN, NFV, Virtualization, Centralized Management, SIEM...
Suggéré
Temps plein
Le monde entier
Horaires flexibles
...precisely, both verbally and in writing
»Practical knowledge and practice with installation, operation, and troubleshooting of virus/malware/spyware removal/detection tools
» capability to develop knowledge of college business practices and software
»Flexible,...
Suggéré
Travail à distance
Horaires flexibles
$96k - $160k par année
...Sophos defends more than 500,000 organizations and more than 100 million users globally from active adversaries, ransomware, phishing, malware, and more. Sophos’ services and products connect through its cloud-based Sophos Central management console and are powered by Sophos...
Suggéré
Temps plein
Travail à distance
Zone locale
Le monde entier
...Responsibilities
• Lead and coordinate the incident response team in handling cybersecurity incidents, including data breaches, malware infections, insider threats, and other security breaches.
• Conduct comprehensive digital forensics investigations to identify the...
Suggéré
Recrutement immédiat
...access and performance issues.
~Maintain IT Assets and Licensing inventory, Patching, MDM and overall network and system security from Malware, Ransomware etc.
~Manage photocopier/printer/scanners and other various IT leases.
~Develop and monitor procedures for network and/...
Suggéré
Travail à distance
Stage en entreprise
Lundi au vendredi
...»Install and provide user support for peripheral devices and standard software applications
»Remove viruses and perform malware remediation
»Recommend best practices to users
»Use a ticketing system to document issues and resolutions
»Maintain...
Suggéré
Temps plein
Travail à distance
...routing and switching equipment
Vulnerability assessment, validation and remediation
Intrusion Detection/Prevention Systems
Anti-malware protection and management
Remote Access Systems and VPN
Identity and Access Management Systems and Directories
Security...
Suggéré
Temps plein
Travail à distance
Horaires flexibles
1 jour par semaine
...FortiSIEM, FortiSOAR, and FortiAnalyzer is desirable.
~ Knowledge of Internet threat landscape and attacker motivations (phishing, malware, APT, DoS, etc.)
~ Previous experience of at least one scripting language (e.g. Python, Groovy, Perl, Ruby, Shell scripting, etc.)....
Suggéré
Temps plein
Horaires flexibles
...more of the following areas: web applications, operating system security, cloud computing, desktop applications, networking, DLP, anti-malware, IDS/IPS, penetration & vulnerability testing.
• The ability to read and understand vulnerability bulletins and security event data...
Emploi permanent
Stage en entreprise
Recrutement immédiat
Travail le week-end
Équipe du matin
...knowledge of Information Security best-practices, methodologies, and techniques.
Experience dealing with security events related to malware, security log analysis (SIEM), EDR/MDR/NDR Tools, vulnerability and patch management, and the Incident Response (IR) process....
Temps plein
Travail à distance
Horaires flexibles
Travail le week-end
Dimanche
Équipe de jour
Samedi
...managing and monitoring endpoints in centralized AV control platform.
Maintain computer hardware and software inventory.
Troubleshoot Malware infected devices.
Assist in monitoring and maintaining local and cloud-based server platforms, local or remote store-based...
Temps plein
Travail à distance
Stage en entreprise
Zone locale
Équipe de nuit
...systems and networks.
Perform data backups and disaster recovery operations.
Monitor computer security status including anti-virus, malware, and phishing.
Develop and maintain documentation of infrastructure (hardware, software, and network applications).
M365...
Temps plein
Stage en entreprise
Zone locale
...Mimecast, or similar solutions.
- Configure and deploy advanced threat protection mechanisms, including anti-phishing, anti-spoofing, malware detection, and email encryption.
- Conduct security assessments and audits of clients' email systems to identify vulnerabilities...
Temps plein