Tag Archive for: job’

Cyber Security Job Daily Tasks



Robins Air Force Base job fair hiring in computer science


It is hosted by 402nd Software Engineering Group from 2 p.m. to 6 p.m. Thursday, January 26.

WARNER ROBINS, Ga. — The Robins Air Force Base is looking for full-time employees in engineering and computer science.

The 402nd Software Engineering Group is calling on everyone with a bachelor’s degree in several areas to help them support the base

Sarah Martin says they’re looking for “computer scientists, computer engineers, electrical engineers, and software engineers, so if we’re looking for those qualified individuals,”

Robert Hill is a supervisor with the group and say the jobs are endless.

“We have a wide variety of jobs, a wide variety of projects, anything from ISR ground systems — that’s intelligence surveillance recognizance — to imbedded radar systems. We run the whole gamut,” says Hill

The group is responsible for creating the latest technology to assist America’s war fighters on their missions.

“It’s bigger than ourselves, it’s bigger than just the product we’re making. It’s the security of the nation and what we’re doing overseas that helps the war fighters,” Hill adds.

The work efforts are all about keeping up with the technological advancements from overseas.

“We try to stay ahead of our adversary, and all of our software engineers here, they contribute to that every single day,” he says.

Day-to-day work includes working with programs like Java and Python, and some work with artificial intelligence.

“We’re automating a lot of the stuff that used to be manual, taking a lot of the human error out of it as possible,” adds Hill.

They welcome all with bachelor’s degrees to come out.

“If you do have experience in the military, whatever branch…

Source…

The rise of deepfakes in job interviews: Why we should be concerned


By Susan Armstrong

If you’re fearful of a future where a potential employer can’t tell the difference between a real applicant and a computer-generated forgery, aka a deepfake, and offers the job to them instead of you, you have reason to be a little alarmed.

The FBI’s Internet Crime Complaint Centre (IC3) released a Public Service Announcement (PSA) warning employers and job seekers about the rising risk of deepfakes during the recruitment process.

Sure, watching startlingly accurate deepfake videos of actors like Tom Cruise can be fun, albeit a little unnerving at times.They’re so popular there’s now a TikTok account dedicated entirely to them.

There’s also the brilliantly executed Spider-man: No Way Home trailer that replaces Tom Holland’s face with the original Tobey Maguire.

And Korean television channel MBN showed how easily deepfakes could become part of everyday mainstream media by presenting viewers with a deepfake of its own news anchor, Kim Joo-Ha.

But the phenomenon is growing rapidly online and has the potential to become very harmful.

Earlier this year, Meta said it removed a deepfake video that claimed to show Ukrainian president Volodymyr Zelenskyy demanding Ukrainian forces to lay down their arms amid Russia’s invasion.

Deepfakes are applying for home office positions

Just as concerning is the harm that individuals could face from being targeted by deepfakes.

“The use of the technology to harass or harm private individuals who do not command public attention and cannot command resources necessary to refute falsehoods should be concerning,” the US Department of Homeland Security warned in a report about deepfake technology.

Now that cybercriminals are infiltrating organisations with deepfakes, this poses very damaging threats.

According to the FBI, they’re applying for working from home positions that include “information technology and computer programming, database, and software related job functions. Notably, some reported positions include access to customer PII, financial data, corporate IT databases and/or proprietary information”.

How can companies prevent it?

When you consider that more than 34 per cent of businesses around the globe are affected…

Source…

Job: IT Security Analyst at GVA Partners


An exciting opportunity exists for a highly skilled IT security engineer to join a dynamic project team. The resource shall be responsible for the following

  • Carry out procedural system maintenance on all IT systems.
  • Ensure all networks including but not limited to LAN, MAN, WAN, GAN meets the demand of the company.
  • Troubleshoot system and network problems, diagnosing and solving hardware or software faults and replace parts as required.
  • Maintain all IT system work flows.
  • Maintain and update all IT Networks.
  • Maintain and contribute to the development of IT Network.
  • Participate actively in developing, planning and implementing advance IT systems.

Other duties as assigned.

 Functions:

  • Lead cybersecurity initiatives in conjunction with Group Cybersecurity team.
  • Design and implement security controls to safeguard and monitor events for information systems, enterprise applications and data.
  • Lead the implementation of Information Security projects
  • Drive internal and external vulnerability assessment, penetration tests engagements and manage results to remediation.
  • Respond to escalated security events and drive security incident response processes to ensure timely resolution with minimal disruption.
  • Design, document, and deploy secure infrastructure solutions to enhance and evolve the security posture of the business to ensure integrity, availability and confidentiality of all critical enterprise data.
  • Provide expertise on security tools, including but not limited to firewalls, Web Application firewalls, IDS/IDP, anti-malware software
  • Liaise with stakeholders in respect of operational implementation of security policies and best practices
  • Collaborate with the Client Server Team to ensure that technical plans are practical, controls are sustainable, and implementations are managed to minimize risks and adverse impact to servers, workstations and user productivity.
  • Implement the infrastructure, configurations and processes to monitor security related events
  • Prevent data loss and service interruptions by researching new technologies that will effectively protect the enterprise network.

Supervisory/Managerial Responsibilities:

  • Ensure conformance to Cybersecurity…

Source…