Activity
Mon
Wed
Fri
Sun
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
What is this?
Less
More

Memberships

BowTiedCyber Hoodies

2k members • Free

542 contributions to BowTiedCyber Hoodies
(Hybrid) Senior Cybersecurity Analyst 
Location: Roanoke, TX Job Description Looking for an energetic, hard-charging individual able to keep up in an exciting and fast-moving security operations team that is engaged in high profile security projects to enhance Fidelity’s security posture and prevent data leakage. The candidate will be immersed in an environment addressing a rapidly changing threat landscape, working with numerous security professionals. The successful candidate will analyze insider activity behaviors and patterns while also looking to implement detections across multiple platforms to identify and mitigate against insider risks within various channels. The Expertise You Have And The Skills You Bring - Knowledge of cyber security threats and incident response. - Understanding of insider threats and DLP policies a benefit but not required. - Understanding of endpoint, exchange, network & cloud technologies. - Knowledge of scripting to perform data lookups, metadata joins, and enriching data to build content categorization and identify behavioral anomalies. - Knowledge of policy-based detections using regular expression and pattern matching. - Ability to develop reporting and dashboards to provide insights on control effectiveness and behavioral patterns of insider risks. - Bachelor degree in computer science or in lieu of: - A curious mind with strong analytical skills to identify risks and problem solve. - Perform in-depth analysis to identify insider risk and data-loss-prevention (DLP) events across exfiltration channels consolidating structured and unstructured datasets. - A firm knowledge of query-based languages, ETL and data parsing techniques - Ability to manage their work across multiple environments by prioritizing and taking a results-oriented approach to tasks. - A standout colleague with flexibility required for support operations. - Must be a quick learner and adapt to new tools and technology. - Ability to deliver, implement, and perform analysis of Insider Threat detections while responding and remediating technical issues. - Unify and standardize Cybersecurity Insider Threat policies and practices across the enterprise. - Maintain high standards when it comes to documenting Insider Threat processes, detections, and implementations. - Be instrumental in technology and policy implementation, tuning and oversight of processes across all insider threat technologies executed within the firm.
0
0
(On-Site) IT Helpdesk Tier 2
Location: Phoenix, AZ What you'll be doing: - Helpdesk Support: Provide Level 2/3 IT Helpdesk support and respond to client issues, ensuring efficient resolution for Windows, macOS, and mobile devices (iOS/Android) - Manage Your Workload: Stay organized and on top of tasks to ensure timely completion. - Office 365 Administration: Manage and configure Microsoft 365 applications, including Exchange Online, SharePoint, Teams, Security & Compliance Centers, and OneDrive - Networking Management & Troubleshooting: Configure and troubleshoot network protocols like DNS, DHCP, VLANs, VPNs, and firewall rules using platforms like SonicWall, Meraki, and Unifi. - Endpoint Management: Utilize Microsoft Intune for device management, policy enforcement, and Windows Autopilot for device provisioning. - Azure Administration: Assist with tasks related to Azure Active Directory (Azure AD), Virtual Machines, Azure Networking, and cloud-based resource management - Email Security: Configure SPF, DKIM, DMARC, and other email security settings for safe and reliable email delivery across the client’s domain. - Hardware & Software Support: Troubleshoot and resolve PCs, laptops, printers, and other peripheral devices; provide support for software installations, patch management, and driver updates. - Build Client Relationships: Maintain a helpful, friendly demeanor while assisting clients. - Ticket Management & Documentation: Maintain accurate service tickets, document solutions, and ensure timely communication with clients using ITSM tools - Project Assistance: Participate in various IT projects, including on-site hardware installations, network setups, software migrations, and cloud services deployment - After-Hours Support: Occasionally participate in on-call support to resolve urgent issues. - Client Training & Education: Provide guidance and training to clients on best practices, system usage, and IT security measures. - Proactively Identify Issues: Take the initiative to spot and fix potential problems
1
0
Network+ Daily 🧠
A technician needs to view the routing table on a Windows system. Which command should they use?
Poll
2 members have voted
1
0
Network+ Daily 🧠
A network admin wants to ensure only authorized MAC addresses can connect to a switch port. What feature should be enabled?
Poll
2 members have voted
0 likes • 24h
Answer: B. Port Security Explanation: Port security restricts access based on MAC addresses to prevent unauthorized devices.
Easy Reference: Understanding Network Topologies
Level up your networking fundamentals with this easy topology breakdown!
0
0
Easy Reference: Understanding Network Topologies
1-10 of 542
Airese Kaw
6
1,055points to level up
@airese-kaw-7159
BowTiedCyber

Active 6h ago
Joined Aug 25, 2025
Powered by