Join the Mission: Kubernetes Platform Engineer at Unified Platform! At Unified Platform, we’re driven by innovation, talent, and ambition to deliver war-fighting capabilities for U.S. Cyber Command. As a civilian professional, you’ll play a key role in advancing technology that makes a real-world impact. We’re seeking a full-time Kubernetes Platform Engineer (GG-2210-13) to join our mission. If you’re ready to tackle exciting challenges and contribute to something bigger than yourself, this is your opportunity! This position can close at any time. Apply now to join the team! 🔗 How to Apply: https://lnkd.in/gkK9r99f #UnifiedPlatform #Kubernetes #PlatformEngineer #TechJobs #NowHiring #USAF #DefenseTech #Innovation
Unified Platform’s Post
More Relevant Posts
-
Good morning to my network! Please register and learn how we can help with your transition into your next chapter!
Mil/Vets/Spouses - interested in IT roles? 😎 😁 ☑ Cyber Security ☑ Cloud/DevOps ☑ Workstation Support (Helpdesk/Desktop) ☑ Technical Operations (Systems & Network Skillsets) ☑ Sales (If so, don't miss this 50strong event!) Did you know TEKsystems works with TONS of employer partners to help connect strong talent to their IT talent needs? Join us to hear how TEK is working hard to connect strong military talent to strong employment pathways! RSVP: https://lnkd.in/gyuPFYet Who's joining us next Thursday?
To view or add a comment, sign in
-
Completed Threat Intelligence Tools Lab Explore different OSINT tools used to conduct security threat assessments and investigations. #cybersecurity #informationsecurity #opentowork #devops #cloud #cloudsecurity #applicationsecurity #softwaredevelopment #qa #qualityassurance #baltimore #developer #dev #cyber #Job #Recruitment #LinkedIn #Hiring #Openings #Jobvacancy #Interviewing #Jobhunters #security #fintech #startup
To view or add a comment, sign in
-
Training to help a person to grow is like the fertilizer that is key to success. Training equals education and education equals greater opportunities.
Military Spouses have been significant partners with IBM for over 15 years. IBM serves on our Board of Directors, and has guided our mission to historic heights. As such, we are so excited to fully support the programs IBM creates for our military-affiliated job seekers. Discover #SkillsBuild Red Hat digital credentials! IBM's professional development packages offer digital badges in customer service, digital marketing, coding/web development, and cybersecurity. Take the first step towards upskilling yourself by visiting https://lnkd.in/ezS3362d.
To view or add a comment, sign in
-
🚀 Completed the SOC L1 Path: Snort Challenge - The Basics in Snort Module on TryHackMe!🎉🚀 I just spent 3 hours in a live session working on the Snort Challenge. During this time, I used Snort to detect network traffic and answer specific questions as they arose. I wrote rules based on the instructions provided and identified different methods to create effective rules for FTP, HTTP, PNG, Metafiles, etc. I created custom detections and practiced triggering alerts for specific packet conditions. I explored how to utilize flags and parameters for rule optimization. detected potential threats like Log4j and MS17-010. I worked with complex PCAP files, interpreted logs, and tackled issues with syntax and configuration errors. When I hit a dead end on a specific task, I referred to write-ups for one or two questions to clarify the final steps. Each step deepened my understanding of network security as I explained my thought process throughout the session. 🎥 Watch the Full Session Replay Here: https://lnkd.in/gBwmKVha ⚠️ Note: Due to a throat issue, there will be no audio after 1:40:59. I had to stop the audio from that point, but the overall concept has already been covered. I was just solving the remaining tasks and referenced a write-up while solving one or two questions. If anyone has any doubts, feel free to ask. Sorry for the inconvenience! 🔍 Overview of Content Covered: - Introduction - Writing IDS Rules (HTTP) - Writing IDS Rules (FTP) - Writing IDS Rules (PNG) - Writing IDS Rules (Torrent Metafile) - Troubleshooting Rule Syntax Errors - Using External Rules (MS17-010) - Using External Rules (Log4j) - Conclusion 💡 Feedback Request: I’m always looking to improve my content and skills, so I’d love your constructive feedbacks Technical Accuracy: If you spotted any technical mistakes in the session, feel free to point them out so I can correct them and continue to refine my knowledge. Content Delivery: How can I improve my content delivery and make the technical concepts more engaging and easier to understand? Professional Guidance: Those working in SOC roles or Security Analysis, any tips on advancing in this field would be highly appreciated. 📈 Job Search Advice: I’m also keen to hear about what employers look for in SOC analysts to help shape my career path. 🔗 Let’s Connect and Collaborate: If you have insights to share, advice to offer, or just want to discuss the nuances of network security, feel free to drop a comment or send a message! 😊 #SOC #Snort #TryHackMe #CyberSecurity #IntrusionDetection #CareerGrowth #Feedback #SOCAnalyst #NetworkSecurity #ContentCreation
SOC L1 | Snort Challenge - The Basics | Network Security and Traffic Analysis | Tryhackme | part2
https://www.youtube.com/
To view or add a comment, sign in
-
💻 Complete! Evaluating IAM Strategy 🎯 I just finished Task 2 of the TCS Cybersecurity IAM Developer Virtual Job Simulation! After covering the fundamentals of IAM, it’s time to dive into evaluating an enterprise's IAM strategy. I leveraged GPT to streamline the initial drafts and speed up my work, allowing me to focus more on refining the solutions and ensuring they meet real-world requirements. To be honest, I used GPT to handle almost the entire solution for this task! 😅 While I explained everything in my video and made sure I understood it, I gave the entire scenario to GPT and used its responses to shape my final output. I’ve also recorded a YouTube video summarizing my learnings from this task! 📹 This part has provided valuable insights that will enhance my skills as I continue with the simulation. 🚀 https://lnkd.in/gCRAp3ks In this task, I learned: Evaluating IAM Strategy: Understanding how to assess an organization’s current IAM framework. Implementation Considerations: Key factors to consider when implementing IAM in different organizational contexts. What I did: Assessed hypothetical enterprise scenarios to determine their readiness for IAM implementation. Developed a comprehensive checklist for evaluating IAM strategies and readiness. Excited to tackle the upcoming challenges! 2 Task to go! 💪 #Cybersecurity #IAM #TechSkills #LearningJourney #TCS #YouTubeSeries #IAMStrategy
🔒 Cybersecurity - IAM Developer | Virtual Job Simulation with TCS | Part2
https://www.youtube.com/
To view or add a comment, sign in
-
I’m happy to share that I’ve obtained a new certification: Security Operations Center (SOC) from Coursera! #CISCO 👨🎓 Gain an understanding of SOC team member’s daily activities and responsibilities. 👨🎓 Identify who these bad actors are, their motives, why they attack, and what they attack. 👨🎓 Review the goals of implementing a SOC and covers the business benefits that an organization achieves by employing a SOC. 👨🎓 Introduce technical and procedural challenges in a SOC.
To view or add a comment, sign in
-
Free Ebooks for all.
IT Security |☁️Cloud/Systems/Cybersecurity Engineer👨💻| Linux🚀| WS | F5 | SOC | SIEM | AWS | OCI | WAF | VA | DFIR | BurpSuite | Wazuh | Wireshark | Threat Intelligence | Phishing Analysis | PKI |Dohatec-CA & NOC-Team
Some Useful E - Books (Updated & More Added) 💎 🔹 Security Career https://lnkd.in/gAJq7iVt 🔹 SIEM Solutions https://lnkd.in/gKu7vqMH 🔹 Security Books https://lnkd.in/gKhDtmnA 🔹 PMP https://lnkd.in/gCP63iyG 🔹 Prince 2 https://lnkd.in/gghtikFB 🔹 MAHESH CERTIFICATE https://lnkd.in/gGviGTHv 🔹 ITIL V4 https://lnkd.in/g4rmsZMM 🔹 ISO 27001 https://lnkd.in/gEmk95xC 🔹 FORENSIC INVESTIGATIONS https://lnkd.in/g-Qrjz2M 🔹 F5 LOAD BALANCER https://lnkd.in/g_uQxwsz 🔹 CYBER SECURITY BOOKS https://lnkd.in/g5RWkZ7V 🔹 CISSP https://lnkd.in/gzmiEpFX 🔹 CISM https://lnkd.in/gqy9CSsb 🔹 CISA https://lnkd.in/gjU_FmeT 🔹 CRISC https://lnkd.in/gh3BJiXj 🔹 CEH https://lnkd.in/gWAzjMb5 🔹 CCNA SECURITY https://lnkd.in/gruqYBWy 🔹 CCDA https://lnkd.in/gXa4cF-a 🔹 CMMI https://lnkd.in/gHWhEMZB 🔹 AZURE https://lnkd.in/gguvNyP6 🔹 AWS https://lnkd.in/gnWFjvDS 🔹 Firewalls https://lnkd.in/gZRGmF5M 🔹 AGILE, COBIT, TOGAF https://lnkd.in/gUiSnBDJ 🔹 CCNP and CCIE Enterprise Core ENCOR 350-401 Official Cert Guide https://lnkd.in/gJUQzyZH 🔹 CCNP entreprise Advanced Routing ENARSI 300-410 Official Cert Guide https://lnkd.in/gSU6cwTn 🔹 CCNP and CCIE Enterprise Core & CCNP Enterprise Advanced Routing Portable Command Guide https://lnkd.in/gDjKz3zT. 🔹 Artificial intelligence complete course volume 1,2,3,4&5 :sparkles https://lnkd.in/gQtszGAt 🔹 Kali Linux https://lnkd.in/gYucr8kn
SECURITY CAREER - Google Drive
drive.google.com
To view or add a comment, sign in
-
Well fam, after 20+ years, (NOT DONE YET...but maybe.....) I'm looking at moving out of military service and stepping into civilian practices. This is going to be super odd for me, to be honest. I had an interview the other day and they asked me what area of cybersecurity I specialize in...... I just started blankly for long enough that they asked if the connection froze. But to be perfectly honest with you all, Military folks work in nearly all areas. Forensic was my first real love, building the story and figuring out what events happened based on the logs and jump lists... then I worked a job, and WOW, not going to do that anymore. if you know you know. After that came server defense... but my servers kept being got by front-end shenanigans. So I jumped to Frontends and was like John Travolta meme... what's going on here? However, I became a full stack engineer and then after two years of developing applications for the US Army SWF I wondered," Making is great, and I guess I can do it, but... how can I help secure this". Gregory Brothers highlighted some areas I was ignoring and began to truly understand API interactions, thanks to Corey J. Ball and his amazing scripture ;-) After that, I think management got annoyed with me asking about security so I joined the Application Security Validation Engineers. This was a tie between SWF and NATO operations (not being shot at helped sway the odd) One of the top two was my next chapter of life has been between working at NATO with a multinational group of IT people in a warzone and being part of Army Software Factory. In each environment, I encountered issues and difficulties with understanding. However, in the Army Software Factory, there are so many more issues of, can/should we do this. Yet with our DOPE leadership of Angelica Phaneuf we were able to navigate the rough rivers of DoD cybersecurity. I say all that to say, that when asked what I bring to a company...my giggle is not disrespectful, it is elation! I just want to help the world be a better place, where can I do that? that is the place for me ;-)
To view or add a comment, sign in
3,997 followers