- UpvoteDownvoteShare Job
- Suggest Revision
Own key objectives and work with our partners in security architecture, vulnerability management, Lines of Business, IT, Cloud Operations, Cyber Threat Intelligence, and external vendors to design and deliver solutions to our most pressing challenges.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
You will perform cyber defense incident evaluation, including determining potential impact and identifying the vulnerability You will help maintain the security systems and solutions You will build relationships with Peers across departments through collaborative engineering operations and programs.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
You will report to the Manager of Cyber Security. This is an Incident Management / Security role that includes, framework, roadmap, program optimization, process engineering, risk remediation, and mitigation of operational risk in a high-velocity culture by introducing technology, requirements, deliverables, gaps and systems design.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Tuning and configuring cyber security tools, for example SIEM and EDR tooling. Developing cyber incident response plans, playbooks, and processes that allow security operations team to respond to incidents rapidly and effectively.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Essential Job ResponsibilitiesPerforms cyber security assessments of systems and networks within the networking environment or enclave and identifies systems that deviate from acceptable configurations, enclave policy, or local policy.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Conduct Cyber Testing related to McAfee Endpoint Security HBSS and DLP functionality using Trellix or similar tools. Proficient conducting Cyber Testing related to McAfee Endpoint Security HBSS and DLP functionality using Trellix or similar tools.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Education Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
JOB TITLE: Senior Cyber Security Specialist D9Tech is seeking a Senior Risk Management and Information Assurance Specialist with a robust background in Department of Defense (DoD) Risk Management Framework (RMF) and Information Assurance (IA) security compliance, alongside a deep familiarity with networked systems management.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
IMG is looking for a Information Security Analyst shall support cyber security for the customer various network systems in including both technical and oversight such as, but not limited to: Implementation of the Risk Management Framework.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
We work closely with agencies and industry to overcome technical and cultural hurdles to innovation, empowering them with the latest end-to-end cloud infrastructure, big data and cyber capabilities.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Led by CEO, Jim Rosenthal, BlueVoyant’s highly skilled team includes former government cyber officials with extensive frontline experience in responding to advanced cyber threats on behalf of the National Security Agency, Federal Bureau of Investigation, Unit 8200, and GCHQ, together with private sector experts.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
TexasThe Director of Cyber Security is a senior leader responsible for establishing and maintaining the enterprise cybersecurity vision, strategy, culture, and program established by the CISO to protect information assets and technologies.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 6 days ago
cyber security vulnerability jobs
FEATURED BLOG POSTS
The Roadmap to Get Into Consulting
Consulting is a dynamic and challenging career field that offers many opportunities for people who enjoy problem-solving, strategy, and innovation. Believe it or not, consulting isn't necessarily a senior-level position. You can pursue a career in consulting as a recent graduate or a mid-career professional looking to switch careers. While pursuing a consulting career can be rewarding and fulfilling, it is challenging to break into because it is so competitive.
How To Decorate a Cubicle for Inspiration & Productivity
You know the negative reputation cubicles have – dull, dreary, gray. How can you possibly be expected to sit in one every day and be your naturally productive, enthusiastic, and upbeat self? The answer lies in decorating your cubicle so it sparks creativity and feels welcoming. While this might seem impossible given the bland canvas you have to work with, take heart because it’s totally doable!
How do Employers Verify Education?
At any stage in your professional journey, you may come across an employer or a recruiter who asks to verify your educational credentials. This shouldn’t come as a surprise as 30% of candidates admitted to lying on their resumes, yet 79% of them never get caught. In fact, 85% of employers in the US who conduct background checks find that candidates have lied on their resumes or job applications.
How to Be More Articulate and Speak More Clearly
Have you ever had those moments when you're talking to someone and have no idea what they are saying? The best response you can muster up is a simple head nod or blind agreeance?
How to Ask for a Higher Starting Salary
Maybe you think you’ve finally found your dream job. Everything about it is perfect, except… the salary. Unfortunately, it just isn’t where you want it to be. So, should you give up and move on? Given all the effort you’ve already invested, it’s probably wise to try and negotiate a better salary before you do.
How to Pass a Personality Test with Flying Colors
Whether you’re applying for your first job or looking to move up the career ladder, personality tests aren’t usually the first thing we think about. But surprisingly, they can have a massive impact on how our future employers perceive us. In fact, a 2017 study by the Society for Human Resource Management (SHRM) has found that 32% of U.S. employers use personality tests when hiring for senior management positions, and 28% use them for middle management positions. Personality tests are also used for hourly workers and contractors, though less frequently.
10 Practical and Effective Strategies to Persuade Anyone of Anything
Learning how to persuade people is like a key that can unlock any door. Acing the interview for the job of your dreams. Getting the best deal on a new car. Closing a sale with a skeptical customer. All of these wins require a level of persuasiveness.