- UpvoteDownvoteShare Job
- Suggest Revision
Mature risk and vulnerability management programs by driving security and risk assessments, vulnerability analysis, and prioritizing remediation efforts. Establish and mature Governance Risk & Compliance (GRC) and Identity & Access Management (IAM) capabilities and processes.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of continuous monitoring, cybersecurity risk management, disaster recovery, FISMA compliance, information security architecture, information security auditing, security control assessment, threat modeling, threat management, vulnerability analysis, and vulnerability assessments.
$75,600 - $172,000 a yearExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Key information security functions and activities include architecture and design for NCR information security controls, developing and enforcing policies and standards, security awareness training, risk management, assessment, and testing, monitoring and metrics, incident management, threat intelligence and vulnerability management.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Advanced knowledge in IT audit, information security, risk management, end point and server technologies, network management/architecture, firewall, intrusion detection and prevention systems, vulnerability/pen testing management, audit, and patch management systems.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Deep understanding of security technologies and concepts including SIEM, MDR/XDR, EDR and vulnerability management. Oversee our vulnerability management & endpoint compliance program.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Ideal candidate will have comprehensive knowledge of Windows and UNIX-based system administration, network management and enterprise systems management and the ability to and maintain Linux-based operating systems as well as IDS/IPS, log management solutions and enterprise vulnerability assessment systems.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Provide leadership and direction to IT and Security Operations teams to administer security operations effectively, including monitoring, threat intelligence, incident response, vulnerability management and collaboration & intelligence sharing with New York State and other partners.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Skills: Must have proven customer service skills; ability to analyze vulnerability scans using Nessus, SecurityCenter, HBSS and ACAS (among others); computer literacy and proficiency; presentation skills; excellent oral and written communication skills; Familiarity with standards such as, NIST, DIACAP, FISMA, and working knowledge of the NISPOM, JFAN, JPAS, ICDs and Navy Information; excellent interpersonal skills; ability to manage small projects.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The successful candidate must have hands-on experience in information security technology, cloud and on-premises environments, digital marketing and CRM platforms, application security and code review, vulnerability testing, and leading enterprise level risk management programs.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Identify and configure security remediation measures consistent with STIG/SRG, Information Assurance (IA) Vulnerability Management (IAVM), test to validate, and update within all system documentation and Plan of Action and Milestones (POA&M.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Technical working knowledge of security tools and concepts including IDS/IPS; SIEM; Web Proxy; Encryption; Patch management; Vulnerability Scanning & Remediation; Forensics; Penetration Testing; DLP; Email Gateways; Anti-spam Services; MDM; Privileged Account Management; Log Analytics; Two Factor Authentication; Single Sign On.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Proficient in key areas of security such as: Vulnerability Management, Intrusion Prevention and Detection, Access Control and Authorization, Policy Enforcement, Application Security, Protocol Analysis, Firewall Management, Incident Response, Data Loss Prevention (DLP), Encryption, Two-Factor Authentication, Web filtering, and Advanced Threat Protection.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Understanding of vulnerability management, including scans and penetration testing. At least one industry related certification such as Certified Information Security Manager (CISM), Certified Information Security Auditor (CISA.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
3-5+ years Server Vulnerability Management and Server Configuration Compliance - NVD, CVSS, CVE, MITRE CWE, CIS Benchmarks, Server Controls baselines, standards, and controls. Experience managing IT vulnerability management processes, remediation, and infrastructure server patching guidance.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Understanding of one or more compliance frameworks: CIS, NIST, FFIEC, GLBA, SOX, PCI, etcExtensive experience with core vulnerability management tools (e.g. Tanium, Tenable, Rapid7, Qualys, etc.
Full-timeExpandApply NowActive JobUpdated Today
cism vulnerability management jobs
FEATURED BLOG POSTS
5 Common Interview Mistakes
Everyone's interview process is unique in some form or fashion. Like most, your interview process is crafted so you can get the most information out of your candidates to increase hiring confidence and make the right hiring decisions. However, there are often small problems in interview processes that could ultimately affect the success of hiring decisions.
How to Ask Someone to be a Reference + Email Templates
One part of the job-hunting process that frequently gets overlooked is putting together a list of good references. Most of the time we focus on creating the perfect resume, writing an awesome cover letter, and getting our hands on letters of recommendation. We think about what outfit we’ll wear to the job interview, how we’ll answer those tricky questions, and what our career plan looks like. But, in fact, having multiple references lined up who will speak favorably about you to a potential employer is critical to landing a job. This aspect of job searching really can’t be ignored.
Job Rejection Email Response with Examples
Glassdoor estimates that, on average, there are about 250 applicants for every job vacancy out there. If you’ve ever applied for a job, the odds are that you’ve received the dreaded job rejection email.
Structured vs Unstructured Interviews
The goal of an interview is to evaluate candidates based on their skills, personality, and knowledge. You want to choose the BEST candidate from your candidate pool, so the interview is something you can't mess up. As you begin planning your interview process, one of the major decisions you'll face is whether the interview should be a structured vs unstructured interview. So let's take a dive into the differences and sort out which circumstances warrant which interview process.
How to Describe Your Personality with Examples
Imagine you’re in an elevator with the CEO of your dream company and you get to talking. The conversation is going well and you start to imagine yourself working for their company when the CEO turns around and asks you “tell me a bit about yourself.” Would this catch you off guard or would you be able to give a clear and succinct description of who you are?
4 Ways to Make Your Job Posting More Inclusive
According to a Glassdoor survey,
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra: