- UpvoteDownvoteShare Job
- Suggest Revision
Experience in engineering, testing, configuration/tuning, administration and operational use of vulnerability management and assessment technologies such as McAfee/Trellix ePO, and Security Information and Event Management systems (i.e. Splunk.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The RealPage IT System Administrator will provide overall administration, troubleshooting, and technical support for the Company’s multiple property management software applications at the corporate and property levels.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
BS Computer Science, Cybersecurity, Computer Engineering Or Related Degree; Or HS Diploma And 10+ Years Of Host Or Digital Forensics Or Network Forensic Experience. Vulnerability scanning, assessment and monitoring tools such as Security Center, Nessus, and Endgame.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
As a Security Engineer, Vulnerability Management at RingCentral, your primary responsibilities will be to perform vulnerability scans of our systems and networks, and monitor, triage and track remediation of vulnerabilities.
$120Full-timeRemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Responsible for the execution of DevSecOps functions in the areas of user support, application installations and upgrades, system vulnerability scanning, certificate management, analysis of security monitoring outputs, coordination of remediation patching, and other strategic DevSecOps initiatives.
$127,900 - $199,900 a yearExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Understanding of IT security principals, technologies, best practices to include logical access control; PKI and other encryption methods; network-based and host-based IDS/IPS; security configuration baselines; auditing; vulnerability discovery and management.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Responsibilities: Configure and manage the integration of vulnerability scanners (including Rapid7, Qualys, Tenable, and others), SIEM, asset management systems, ticketing systems, vulnerability aggregation platforms (e.g., Brinqa, Vulcan, Nucleus, Kenna, and similar platforms), cloud-based vulnerability scanning solutions, and data center vulnerability scanning solutions.
RemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
A Bachelor's or Masters in Psychology, Behavioral Science, Computer Science (with Human-Computer Interaction focus), Human Factors, Human Computer Interaction, Anthropology, Cognitive Science, Psychology, or Design related degree.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Support direct reports in the day-to-day management of partners/vendors that range from recruiting participants, hosting qualitative research, training, and commissioning research that extends the impact of the UX Research team.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Graduate degree in psycholinguistics, linguistics, cognitive science, computer science, or a related field. Graduate-degree-level knowledge of psycholinguistics, linguistics, cognitive science, computer science, or a related field.
$99,800 - $127,000 a yearFull-timeExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
As the Senior Scientist of Computer Vision in Translational Data Science, you will be at the forefront of applying artificial intelligence (AI) to revolutionize our understanding of disease biology and the mechanisms of our therapeutic interventions.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Strong understanding of data science approaches including machine and deep learning; background in immunology, biology or oncology a plus. Continuously update knowledge on the latest scientific literature and best practices in data science.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Technically Related: Computer Science, Cybersecurity, Engineering, Human Resources, Information Technology/Systems, Journalism/Investigative Reporting, Languages/Linguistics, Logistics, Management Information Systems, Mathematics/Statistics/Data Science, Sciences (anthropology, biology, chemistry, etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Support the collection and use of data for our critical Information Assurance Vulnerability Management (IAVM) Program using various security tools (i.e. ACAS, HBSS, ADUC, Burp Suite, etc.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Yesterday
computer science administrator vulnerability management jobs Title: systems administrator
FEATURED BLOG POSTS
How to Fire an Employee
So… you've finally decided to let one of your employees go. Drafting the paperwork and corresponding with HR is the easy part, but knowing how to fire an employee is where things get complicated. In fact, it is one of the most challenging conversations to have in the workplace. However, it must be done, and it must be done with poise and tact. Not only should you keep your state law in mind, but you should also consider your former employee's wellbeing.
How Long Does it Take to Hear Back from a Job?
Are you applying for your very first job? Maybe you’re anticipating your termination from your current role and want to be proactive. Either way, waiting to hear back on your job application can be stressful. If time has passed since you applied, you may wonder how long does it take to hear back from a job. Well, the answer is... it depends.
How to Respond to a Recruiter Through Email? (Tips & Examples)
Rather than wading through an endless list of open roles, wouldn’t it be nice if relevant job opportunities come to you?
How to Reject a Candidate Professionally
When deciding on how to reject a candidate, your first question may be
How Does Salary Pay Work? (Compared to Hourly Pay)
At the bottom of each job advertisement, companies label a role as salaried or hourly. Both methods will get you paid (yay), but each in very different ways. So, it's essential to figure out how does salary pay work? While employees paid by the hour are paid based on how long they work, employers pay salaried employees a fixed amount.
5 Practical Ways to Remove Bias from your Hiring Process
Many employers think their hiring process is perfect. However, research shows that the hiring processes are generally impartial and unfair, especially if you are part of certain demographics. Women, people of color, people with disabilities, or even people in lower socioeconomic status are more likely to be subject to implicit bias. As diversity and employer branding become major aspects of business, it is important that employers take the lead to identify and remove bias from the hiring process. So, here are 5 practical ways to get you started.
Tips for a Good Character Reference Letter with Examples
Hiring managers love a resume laden with relevant skills and qualifications. Hard skills specific to the role, like SEO strategy or Java programming languages, are easy to qualify using achievements or facts and figures. But how exactly can they verify personality traits, work ethic, relationship management skills, or curious nature during an interview when they barely know you?