- UpvoteDownvoteShare Job
- Suggest Revision
Explore more InfoSec / Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Familiarity with operating systems (e.g. Windows or UNIX), vulnerability management tools (e.g. Nessus), configuration management tools, and other tools that support a successful cyber security program for an organization, a plus.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The candidate must have foundational knowledge in endpoint security, network security, web security, data security technologies, cloud security technologies, vulnerability, and threat management.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Our team specializes in software and hardware reverse engineering, vulnerability research, and developing proof-of-concept offensive cyber capabilities with a focus on embedded systems. Are you passionate about national security cyber challenges.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Plan and execute security scan vulnerabilities; SAP Labs, LLC seeks a Senior Project Consultant – Development at our Plano, TX location to develop and implement processes to support the successful delivery of SAP products and services involving departmental or cross-functional teams focused on the delivery of new or existing products.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Guardian Cyber Security Engineering team engineers, builds and owns a broad variety of cutting-edge security controls that fall in the domains of Network, Endpoint, Data, Identity, Cloud and Application security within the Secure CI/CD Pipeline and are deployed within SAAS, PAAS, Private and Public IAAS environments.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Offensive Security is part of the Attack Surface Management team and assists with identifying opportunities to reduce Discover’s attack surface and overall cybersecurity posture against a broad range of cyber threats and develop strategies to most effectively address the threats.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Conducting comprehensive risk assessments, threat modeling, and vulnerability analyses to proactively identify and address potential security loopholes. Design, development, and deployment of robust security architectures and strategies to fortify systems and networks against cyber threats.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Oversees all facets of Cybersecurity Risk Management including Risk Assessments, 3rd Party Vendor Security Assessments, GRC Solution Implementation, Risk Register, GRC Metrics, Vulnerability Management , Application Security, and Mergers & Acquisition Integration support.
InternExpandApply NowActive JobUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Bachelor's degree and 22+ years of experience with IT, Cyber security, Information Security, Security Threats, and the design, processes, and operation of a comprehensive information security environment or Master's degree and 10+ years experience with IT, Cyber security, information security, security threats, and the design, processes, and operation of a comprehensive information security environment.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Through the JSP Cyber Security program, JSP performs a wide variety of services and functions required to secure the information security posture for DoD services. Coordinate the review and evaluation of cyber security programs and effectiveness of implementation; identify problem areas; updates and establishes new requirements in response to new technologies and threats; and make recommendations to achieve a fully compliant IT architecture.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Mantis Security is an AWS Partner and a CMU/SEI Partner for Insider Threat Vulnerability Assessments. Mantis Security provides expertise in Application Security Testing, Information Assurance, Security Engineering, Cloud Security, DevSecOps, Cyber Data Science, Security Architecture, Cyberspace Operations, and Critical Infrastructure Security.
ExpandApply NowActive JobUpdated 13 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Provides certification and accreditation support in the development of security and contingency plans and conducts complex risk and vulnerability assessments. Develop RMF security documentation (i.e., System Security Plans (SSP), Security Control Traceability Matrix (SCTM), Incident Response Plans (IRP), Memorandums of Understanding (MOU), Interconnection Security Agreements (ISA), Risk Acceptance Memorandums, Continuous Monitoring (CONMON) Plans, Configuration Management Plans (CMP), Contingency Plans (CP), and Plan of Action and Milestones (POA&M) reports that support the Assessment and Authorization (A&A.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Senior Cyber Supply Chain Management Consultant - TS/SCI Required Logistics Management Institute With a legacy of solving the government’s most complex challenges and an outcome-driven model to execute above expectation, LMI transforms missions with solutions that define the new speed of possible.
ExpandApply NowActive JobUpdated 6 days ago
cyber security vulnerability jobs
FEATURED BLOG POSTS
How to Decide Between Two Job Offers: 10 Practical Tips
It’s arguably a good predicament to have. You’ve applied to many jobs, interviewed multiple times, and now find yourself with two legit job offers. Nice! But although this is a feel-good validation of everything you have to offer, a daunting choice lies ahead. How do you decide which job will be the best fit for you?
Why Work in Sales? 9 Reasons & Tips on Answering as an Interview Question!
Working in sales can be demanding and challenging, but it can also be gratifying. Sales is an excellent career with a clear path full of excitement and potential for growth. So, if you're contemplating careers and have wondered "why work in sales?", keep reading to determine if sales is a suitable role for you.
How to Fire an Employee
So… you've finally decided to let one of your employees go. Drafting the paperwork and corresponding with HR is the easy part, but knowing how to fire an employee is where things get complicated. In fact, it is one of the most challenging conversations to have in the workplace. However, it must be done, and it must be done with poise and tact. Not only should you keep your state law in mind, but you should also consider your former employee's wellbeing.
How Long Does it Take to Hear Back from a Job?
Are you applying for your very first job? Maybe you’re anticipating your termination from your current role and want to be proactive. Either way, waiting to hear back on your job application can be stressful. If time has passed since you applied, you may wonder how long does it take to hear back from a job. Well, the answer is... it depends.
How to Respond to a Recruiter Through Email? (Tips & Examples)
Rather than wading through an endless list of open roles, wouldn’t it be nice if relevant job opportunities come to you?
How to Reject a Candidate Professionally
When deciding on how to reject a candidate, your first question may be
How Does Salary Pay Work? (Compared to Hourly Pay)
At the bottom of each job advertisement, companies label a role as salaried or hourly. Both methods will get you paid (yay), but each in very different ways. So, it's essential to figure out how does salary pay work? While employees paid by the hour are paid based on how long they work, employers pay salaried employees a fixed amount.