- UpvoteDownvoteShare Job
- Suggest Revision
Mature risk and vulnerability management programs by driving security and risk assessments, vulnerability analysis, and prioritizing remediation efforts. Establish and mature Governance Risk & Compliance (GRC) and Identity & Access Management (IAM) capabilities and processes.
ExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Evaluate key information security risks including confidentiality, integrity and availability of technology components through review of security operational processes, such as vulnerability management, penetration testing, security logging and monitoring, security incident response, and defense in depth strategies.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Proficient using Vulnerability Scanning and Management tools i.e. Nexpose, Tenable, Qualys, Prisma Cloud, Aqua, Kenna Security. Expertise managing vulnerability assessment and management activities for Cloud environments i.e. Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP.
ExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
At least one of the following certifications or acceptable equivalent: CISA, CISSP, CISM, CBCP, CIA, CIPP, CIPM, or CFE. Wipro is a rapidly growing professional services firm offering a comprehensive set of services in three inter-related disciplines: Risk and Compliance, Identity and Access Management, and Cloud Security.
ExpandUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Demonstrated knowledge on threat landscape, security threat and vulnerability management, and security monitoring and analytics. One or more of the following: CEH, GSEC, CISM, Comp TIA Security +, CISSP, CISA, SSCP, CASP+, OSCP.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Performs discovery scanning via the Vulnerability Management Platform (scheduled and ad-hoc) Certifications: CISSP, CISM, CISA, CEH, GCIH, GSEC, GCFA, GREM, CCENT. Populates data visualization tool (such as Tableau, Brinqa, and Hygieia) for reporting vulnerability metrics by system and owner.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Professional security management certification, such as a Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA) or other similar credentials.
ExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Marriott Manager, Vulnerability Management Helena , Montana Apply Now Schedule Full-Time. o Vulnerability assessment and reporting including comprehensive understanding of Vulnerability Management methodologies and procedures, threat assessment, and remediation management.
ExpandApply NowActive JobUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Bachelor's degree in Information Security, Computer Science, or relevant certifications (e.g., CompTIA Security+, CISSP, CISA, CISM, GRC certifications) a plus. Assist in Vendor Risk Management: Assist in evaluating and managing risks associated with third-party vendors and service providers through vendor risk assessment processes.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
3+ years experience of general Cybersecurity concepts and methods, including vulnerability management, application security, incident response, governance, risk or compliance, or security architecture.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with vulnerability management practices in AWS, GCP, or Azure. This individual should be an experienced cyber security professional with a strong understanding of how to create and lead vulnerability management programs.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Marriott Manager, Vulnerability Management Columbus , Ohio Apply Now Schedule Full-Time. Educates internal and external users of security technologies to continually improve the knowledge and skill-base of the organization on how best to manage security configuration, patch management and vulnerability management within the infrastructure services.
ExpandApply NowActive JobUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Senior Information Security Analyst , you will be responsible for vulnerability management, performing NIST based risk and maturity assessments, incident response planning, and delivering security awareness training.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Author vulnerability management guidelines, processes, policies, and standards. Manage the Vulnerability Management program as a leader and subject matter expert. Proven experience in security operations, vulnerability management, or a similar position.
ExpandUpdated Today
cism vulnerability management jobs
FEATURED BLOG POSTS
5 Common Interview Mistakes
Everyone's interview process is unique in some form or fashion. Like most, your interview process is crafted so you can get the most information out of your candidates to increase hiring confidence and make the right hiring decisions. However, there are often small problems in interview processes that could ultimately affect the success of hiring decisions.
Job Rejection Email Response with Examples
Glassdoor estimates that, on average, there are about 250 applicants for every job vacancy out there. If you’ve ever applied for a job, the odds are that you’ve received the dreaded job rejection email.
Structured vs Unstructured Interviews
The goal of an interview is to evaluate candidates based on their skills, personality, and knowledge. You want to choose the BEST candidate from your candidate pool, so the interview is something you can't mess up. As you begin planning your interview process, one of the major decisions you'll face is whether the interview should be a structured vs unstructured interview. So let's take a dive into the differences and sort out which circumstances warrant which interview process.
How to Describe Your Personality with Examples
Imagine you’re in an elevator with the CEO of your dream company and you get to talking. The conversation is going well and you start to imagine yourself working for their company when the CEO turns around and asks you “tell me a bit about yourself.” Would this catch you off guard or would you be able to give a clear and succinct description of who you are?
4 Ways to Make Your Job Posting More Inclusive
According to a Glassdoor survey,
How to Calculate Net Income
Understanding your finances can be daunting even if you’re good with numbers. Your net income, in particular, is a key metric for determining how well you’re doing financially and whether your current way of operating is sustainable or not.
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra: