Interested in finding more jobs in Wallace, NC? Click Here to create a Climber profile today!
40 East Technology Work Values
Interested in finding out if you are the type of person this company is looking for? Create an account and take our patented DNA assessment now to see how you compare.
Daily Duties at 40 East Technology:
Served as Team lead for administration and maintenance of 40 East Technology’s clients. Provided status reports to IT managers on a daily basis for new network and system infrastructures.
What they like about 40 East Technology:
You highly value a work environment built on a formal structure, rules, and regulations. You do not enjoy the unpredictability of shifting priorities and deadlines that upset your routine. You require and enjoy direction, input and accountability as part of your work environment. You have a strong need to participate in making key decisions and feel left out if your superiors or co-workers do not seek your input when making decisions. You thrive on providing good customer service to both internal or external customers, and doing so makes you feel good.
Tags
Automation, IT Security, Web Application Assessment, Vulnerability Management, Active Directory, Network Security, ArcSight, Microsoft Servers, Linux, Backtrack, Red Seal, McAfee Vulnerability Manager, System installation and maintenance, Foundstone, Core Impact, CyberScope, WebInspect, Microsoft SQL Server, McAfee ePolicy Orchestrator, Policy Auditor, CIS Benchmark, STIGS, Top Secret Clearance, Virtualization, Security architecture, Systems integration., Security Analysis, Network Engineering, Process Improvement, Strategic Planning, Team Leadership and Motivation, Application Security, Vulnerability Assessment, Risk Assessment, Threat Analysis, Penetration Testing, Vmware, Esxi, Reverse Engineering
Information about 40 East Technology
Company Rank: Not Available
Average length of employment : 1 year
Average salary of employees: $100,000
These are some of the questions we asked our climbers about their experiences with 40 East Technology:
05| | ||
Were your performance expectations clearly communicated? | 0.0 |
|
Were you recognized for meeting or exceeding expectations? | 0.0 |
|
Did you feel like your personal contribution was important? | 0.0 |
|
Was your career path clearly outlined and discussed? | 0.0 |
03| | ||
I would recommend this as a place of employment. | 0.0 | |
I believe in the purpose of this organization. | 0.0 | |
I would work for this organization again. | 0.0 | |
I feel employees are fairly compensated. | 0.0 |
Climbers who worked at 40 East Technology had these interests:
Books | |
---|---|
CISSP Certification |
Fully revised for the latest release of the Certified Information Systems Security Professional exam, this comprehensive, up-to-date resource covers all 10 CISSP exam domains developed by the International Information Systems Security Certification Consor |
Magazines | |
SC Magazine |
SC Magazine arms information security professionals with the in-depth, unbiased business and technical information they need to tackle the countless security challenges they face and establish risk management and compliance postures that underpin overall |
Websites | |
InfoWorld http://www.infoworld.com |
InfoWorld is the leading technology resource for IT managers and decision makers to identify new products and strategies to modernize IT. |
TechRepublic http://www.techrepublic.com/ |
TechRepublic helps IT decision-makers identify technologies and strategies to empower workers and streamline business processes. The site delivers a unique blend of original content by IT professionals, peer-to-peer advice from the largest community of IT |
OWASP https://www.owasp.org/ |
The Open Web Application Security Project (OWASP) is a 501(c)(3) worldwide not-for-profit charitable organization focused on improving the security of software. Our mission is to make software security visible, so that individuals and organizations worldw |
SANS http://www.sans.org/ |
SANS provides intensive, immersion training designed to help you and your staff master the practical steps necessary for defending systems and networks against the most dangerous threats - the ones being actively exploited. The courses are full of importa |
