- UpvoteDownvoteShare Job
- Suggest Revision
Current information security certification, including Certified Information Systems Security Professional (CISSP), PCI Internal Security Assessor (ISA), Certified Information Security Manager (CISM), or Certified Information Systems Auditor (CISA.
ExpandUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Manages security issues management as part of the Security Governance, Risk & Compliance team. Expertise in various security technologies, such as firewalls and network segmentation, IDS, vulnerability/application scanning, and penetration testing.
ExpandUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Familiar with network security, vulnerability management, identity management, API security, infrastructure, data loss prevention, incident and problem management, change management, cryptography, cloud security, configuration management, and other key areas.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Expert knowledge of at least three of the following: Computer Forensics, Endpoint Security Management, Vulnerability Management, Remote-Access, Zero Trust, Data Classification/Data Loss Prevention, SIEM management, Security Incident Event Management, Network Security, Penetration Testing, Red/Blue/Purple Team, or Software Development Life Cycle.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Mature risk and vulnerability management programs by driving security and risk assessments, vulnerability analysis, and prioritizing remediation efforts. Establish and mature Governance Risk & Compliance (GRC) and Identity & Access Management (IAM) capabilities and processes.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
CISSP, CISM, SANS GSEC, Cloud Security (CCSP, CCSK), or other information security related certification(s). Identity and Access Management Services, Privilege Management inclusive to SailPoint Identity Now.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Proficiency in information security domains, including policies and standards, risk and control assessments, access controls, regulatory compliance, technology resiliency, risk and control governance and metrics, incident management, secure systems development lifecycle, vulnerability management, and data protection.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Advanced knowledge in IT audit, information security, risk management, end point and server technologies, network management/architecture, firewall, intrusion detection and prevention systems, vulnerability/pen testing management, audit, and patch management systems.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Cyber Security Operations team provides access control for the agency's datacenter, databases, internet, public-facing applications, as well as remote and site-to-site VPNs. It also provides vulnerability management and maintains the security structure for the agency's network.
ExpandUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Marriott Manager, Vulnerability Management Helena , Montana Apply Now Schedule Full-Time. o Vulnerability assessment and reporting including comprehensive understanding of Vulnerability Management methodologies and procedures, threat assessment, and remediation management.
ExpandApply NowActive JobUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Support vulnerability assessment, penetration testing, and supply chain risk management activities. One or more relevant security certifications (CSSLP, CISSP, CISM, CEPT, CMWAPT, CPT, CEH, LPT, GWAPT, GPEN, GXPN, OSCP.
ExpandUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
The role has engineering responsibilities related to IT Security, Identity and Access Management systems, Privileged Access Management, Threat and vulnerability management, and Cloud Authentication.
ExpandApply NowActive JobUpdated 2 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Must hold one of the following certifications: CISSP, CISA, CISM, CCSP, CISSP-ISSAP, CISSP-ISSEP, CISSP-ISSMP, CFR, CCISO, GCED, GCIH, GSLC. Escalates client and project issues to management in a timely manner to inform and engage the necessary resources to address theissue.
Full-timeRemoteExpandUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Senior Information Security Analyst , you will be responsible for vulnerability management, performing NIST based risk and maturity assessments, incident response planning, and delivering security awareness training.
ExpandApply NowActive JobUpdated Today
cism vulnerability management jobs
FEATURED BLOG POSTS
How to Hire Remote Workers
Remote work used to be a thing of the future. However, with social, economic, and cultural events taking place across the country, it has now evolved into something that both job searchers AND companies are benefiting from. Remote work is multifaceted and can come in handy in a variety of situations. So, to help your small business take advantage of all of remote work's benefits, here is a short guide on how to hire remote workers.
How to Address a Cover Letter With Examples
It’s easy to get caught up in focusing on your resume – how it looks, what it says, and whether it’s going to land you a job interview. Because there is a big focus on building the perfect resume, job searchers often overlook the importance of a high-quality cover letter. Your cover letter plays a huge role in your first impression. It humanizes you and provides context for your resume.
How to Call Out of Work
No matter how happy we are with our jobs, there are days when we feel overwhelmed and want to call out of work. No, don't feel guilty. It's expected because we're humans, and we can't control the uncertainties of life. But the problem lies in how to call out of work without seeming uncommitted to work, especially if you seldom get work-free days.
What is Seasonal Employment?
Depending on where you are in your career, you might have first-hand experience with seasonal employment. Seasonal employment can be a great way to expand your skill set and earn extra cash while helping businesses meet seasonal increases in demand.
How to Avoid a Bad Hire
"A new employee who doesn't meet the minimum performance, quality, and culture fit standards you set when you began sourcing and recruiting. Additionally, bad hires will immediately show signs of self-interest instead of an interest in their role and the company."
How to Ask for a Letter of Recommendation
When the job board you subscribe to finally posts your dream job, you may feel like the stars have aligned. But part of securing a position that matches your career plan is ensuring you address all the application basics. You know, the resume, the cover letter, the portfolio. It seems like you've got this in the bag — until you realize they want a letter of recommendation, too!
What Are SMART Goals?
When it comes to achieving our goals, there’s a lot of noise to work through. A study by the University of Scranton has found that only 8% of people who set New Year’s resolutions actually achieve them. Our busy lives might be one reason for this. Another, even more important reason, is our approach to goal setting. Being too vague, too ambitious or simply unclear on the timeframe can set us up for failure.