- UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Assisting the Cybersecurity Manager in leading day-to-day cybersecurity operations, including incident response, vulnerability management, and security monitoring. Cybersecurity Engineer, Cybersecurity, Security Measures, Network Monitoring, Risk Assessment, Security Policies, Security Audits, Incident Response, CISSP, CISM, CISA, NIST, ISO, CIS, Security Technologies, Cloud Security.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of continuous monitoring, cybersecurity risk management, disaster recovery, FISMA compliance, information security architecture, information security auditing, security control assessment, threat modeling, threat management, vulnerability analysis, and vulnerability assessments.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of ACAS, NESSUS, SPLUNK, SCAP, POA&Ms, NIST, DIACAP, NISPOM, system audits, vulnerability scanning, and RMF package development preferred. (or higher) security certification (examples: CAP, CASP CE, CCISO, HCISPP, CISM, GSLC, CISSP-Associate, or CISSP), or the ability to obtain within 6 months of hire.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Certifications: Certified Information Security Manager (CISM), Certified Ethical Hacker. The Sponsor requires subject matter expertise in technical risk analysis of enterprise and mission systems, IT systems and networks, mobile and wireless networks, cloud-based computing, network management platforms, communication protocols, scripting or programming products, configuration scripts, and IT hardware and software products in support of Sponsor’s technical risk assessment activities.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Strong understanding of cyber threat landscape, vulnerability management, and NIST CSF. Related certifications: Security+, Network+, CEH, CISM, or CISSP a plus. Ensure a world-class cyber defense program by working closely with other technical, incident management, legal, compliance, and cyber personnel to develop a deeper understanding of the intent, objectives, and activity of cyber threat actors.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Keywords: Dallas TX Jobs, Lead Vulnerability Management Engineer, Vulnerability Management, Cybersecurity, Rapid 7, Qualys, Tenable, Kenna, NorthStar, Bringa, Public Cloud, CISSP, CISM, CRISC, Security Risk Management, Texas Recruiters, IT Jobs, Texas RecruitingLooking to hire for similar positions in Dallas, TX or in other cities.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
You will provide insights and guidance to customers as a vCISO as well as vulnerability management, major incident response, and security monitoring improvements and be expected to demonstrate technical expertise in Audit, Assessments, Design, Implementation, Testing, Compliance and Reporting.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Relevant certifications (e.g., CISSP, CISM, GIAC, AWS, AZURE). Expertise with Cloud IAM Configuration, Container Orchestration, and Log Management. Develop code to automate security configuration management.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Familiarity in IT and security domains (Identity and Access Management, Configuration Management, Vulnerability Management, Incident Management, etc.) - Industry certifications such as OSCP, OSCE, OSWE, GPEN, GCIH, GWAPT, CISA, CDPSE, CISSP, CISM, CRIS or GXPN.
$112,860 - $186,200 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Explore more InfoSec / Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with vulnerability management practices in AWS, GCP, or Azure. This individual should be an experienced cyber security professional with a strong understanding of how to create and lead vulnerability management programs.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Author vulnerability management guidelines, processes, policies, and standards. Manage the Vulnerability Management program as a leader and subject matter expert. Proven experience in security operations, vulnerability management, or a similar position.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Lead, Vulnerability Management will be responsible for developing, coordinating, and streamlining the vulnerability management program at Under Armour. Continually improve awareness of the latest technology trends, mainly as they apply to vulnerability management and technologies used within the company.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Licenses/Certifications: One or more cyber security or audit certifications such as GEVA,CISM, OSCP, CASP, GIAC (or equivalent experience) Manage the vulnerability assessment infrastructure - Tenable.io and Tenable Nessus Scanners.
ExpandApply NowActive JobUpdated 3 days ago
cism vulnerability management jobs
FEATURED BLOG POSTS
How to Write a Recommendation Letter for a Student
When a student applies for their first job or for their next academic degree, they don’t have much experience to showcase their skills and personal qualities. Hiring managers and admissions officers, therefore, often look at recommendation letters as a way to go beyond the student’s GPA and learn more about the student’s skills and personal qualities.
How To Answer “Why Do You Want to Be a Supervisor” in an Interview
Anyone who has worked in a supervisor role knows how challenging yet rewarding it is. But chances are if you're trying to become a supervisor, you'll be forced to answer:
Tightening the HR budget in 2023
With the state of the economy still uncertain, 2023 is expected to be approached with much anticipation. Human Resource leaders have many concerns, including how they will manage to accomplish their goals with budget belts already getting snug. Let’s look at some of the factors that the new year is projected to bring for HR and how to prioritize budgets to reach human capital objectives.
Why is Non-Verbal Communication Really Important?
In a world where words and phrases rule daily communication, you may wonder why non-verbal communication is important. Whether you realize it or not, you communicate more with nonverbal actions than you do with verbal communication. When you interact with your peers, people are reading your body language, facial expressions, voice, and many other factors that help fill in blanks that words can't fill.
Making Hybrid Work More Efficient
Covid was a catalyst for change in the work environment. Keeping people safe and helathy was the initial goal for employers, but the unintended result was the considerable demand in remote work. Now, onsite work has been dramatically altered to remote work, which is now transforming into a combination of the two: hybrid work.
How Can HR Technology Help Retain Employees?
Human resources' rapid adoption of technology has led to new ways of streamlining human capital management. Based on the IEE Global Study, these technologies changed how HR handled recruitment and retention in 2022. This includes tech like
Why is Time Management Important? 10 Crucial Importances of Time Management
We’ve all been there before. What starts as a relaxing evening scroll quickly becomes a full-blown binge. You blink, and it’s midnight - throwing off your entire next day before it even starts. And at its worst, this indulgence might leave you feeling behind on things you planned to finish that night. This is why time management is important.