- UpvoteDownvoteShare Job
- Suggest Revision
Previous Experience with several technical security disciplines such as System Information Event Management systems (SIEM), vulnerability management or security hardening (Required.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Strong knowledge of cybersecurity technologies, including firewalls, intrusion detection and prevention systems, data loss prevention systems, and vulnerability management tools. Conduct risk and security assessments through vulnerability analysis, patch management and mitigation.
Full-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Understanding cybersecurity processes, vulnerability management, incident management, and/or threat management. Minimum of one or more relevant Professional Certifications preferred, such as: GCDA (GIAC Certified Detection Analyst), GMON (GIAC Continuous Monitoring Certification), GCFE (GIAC Certified Forensic Examiner), GCFA (GIAC Certified Forensic Analyst), GCIA (GIAC Certified Intrusion Analyst), GCED (GIAC Certified Enterprise Defender), GPPA (GIAC Perimeter Protection Analyst), GCCC (GIAC Critical Controls Certification), or GDAT (GIAC Defending Advanced Threats.
Full-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
CISSP, GIAC, CISSP, CEH, OSCP, or equivalent certifications a plus. 10+ years in security and/or risk assessment/management related fieldHands on experience with testing frameworks such as the PTES and OWASPApplicable knowledge of Windows client/server, Unix/Linux systems, Mac OS X, VMware/Xen, and cloud technologies such as AWS, Azure, or Google CloudIn-depth knowledge of security concepts such as cyber-attacks and techniques, threat vectors, risk management, incident management etc.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Industry recognized security certifications; CISSP: Certified Information Systems Security Professional, CISM: Certified Information Security Manager, GIAC: SANS Global Information Assurance Certification, vendor certifications such as Azure Security Engineer (AZ500), etc.
$147,900 - $184,900 a yearFull-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of threat intelligence, vulnerability management, and security incident response best practices. Threat Intelligence and Vulnerability Management. Relevant certifications such as GIAC Certified Incident Handler (GCIH) or Certified Incident Response Handler (GCFA) are preferred.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience in one or more of the following technologies preferred: endpoint detection and response (EDR), vulnerability scanners, static and dynamic source-code analysis, SIEM, privileged access management (PAM), network technologies, cloud hosting platforms, IoT search engines, OSINT tools, etc.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
5+ years of varied IT security experience to include risk management, security program governance, vulnerability management, incident response, and infrastructure support. Security certifications (CISSP, GIAC, and/or CRISC) a plus.
$140,000 - $200,000 a yearFull-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Marriott Manager, Vulnerability Management Tallahassee , Florida Apply Now Schedule Full-Time. o Vulnerability assessment and reporting including comprehensive understanding of Vulnerability Management methodologies and procedures, threat assessment, and remediation management.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
3+ years of information security experience including experience in one or more of the following security disciplines: information security monitoring, incident response, vulnerability management, host/network forensics, cyber-crime investigation, penetration testing, business continuity, or cyber threat intelligence.
$84,000 - $179,200 a yearFull-timeRemoteExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Familiarity with: Zero Trust Network Access (ZTNA) and Secure Access Service Edge (SASE) frameworks, Identity, Credential, and Access Management (ICAM) (OKTA), Cloud Workload Protection Platform (CWPP), Security Operations Center (SOC) Operations, Vulnerability Threat Management, and Compliance.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Understanding of IT security principals, technologies, best practices to include logical access control, PKI and other encryption methods, network-based and host-based IDS/IPS, security configuration baselines, auditing, vulnerability discovery, and management.
Full-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Assist with project management for global security technology and process implementations including program oversight for global penetration testing, vendor and third party risk management, data privacy and information governance implementation, and vulnerability management program delivery.
Full-timeExpandApply NowActive JobUpdated 30 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Mature Cyber Zero Trust Architecture (ZTA) capabilities to improve Vulnerability Threat Management capabilities. Risk Management Framework (RMF), Cybersecurity Framework (CSF), Federal Information Security Modernization Act (FISMA), and FedRAMP experience.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Global Information Assurance Certification (GIAC) Security Essentials Certification. Support the ZTA management team in recommending and creating technical solutions. Global Information Assurance Certification (GIAC) Security Essentials Certification.
ExpandApply NowActive JobUpdated 8 days ago
giac vulnerability management jobs
FEATURED BLOG POSTS
When Rage Applying Strikes: How to Identify Unserious Candidates
As the job market remains highly competitive, we have seen a surge in "rage applying." This is when candidates apply to multiple jobs, often without considering whether they are truly interested in the role. Rage applying goes hand-in-hand with quiet quitting. Often, employees want to entertain the thoughts and feelings of leaving their job, but they aren't necessarily serious about leaving yet. Meanwhile, other employees engaging in this trend are actually trying to find a better role. As a recruiter, it can be hard to identify who are the real applicants in a sea full of quiet quitters, but understanding rage applying and identifying red flags will certainly help.
How to Increase Job Ad Exposure
In today's competitive job market, writing quality job ads is critical for attracting top talent to your organization. While networking and candidate referrals are prime real estate for finding qualified candidates, nothing beats the tried-and-true method of writing an extraordinary job ad. But while writing a great job ad is the first step, what's more important is increasing visibility. You could have the most detailed, well-written ad on the internet, but if no one sees it, then you are wasting time (and potentially money!). Employers often believe that job boards are the root of the problem, but you can learn how to increase job ad exposure by tweaking a few steps of your recruitment process.
How to Navigate Hiring Out of State
The job market has shifted significantly in recent years. The accelerated adoption of technology has not only pushed many companies into remote working arrangements but also increased the availability of supporting tools and technologies (i.e., video conferencing and collaboration software).
Building a Candidate Pipeline Through Internships
Building a candidate pipeline through a great internship program for local college students and recent graduates at local universities is a great and cost-effective way to attract and retain top talent. By offering meaningful and impactful work experiences, regular feedback, coaching, and mentorship, you can create a positive internship experience that will make your organization a sought-after destination for future employees. This not only benefits the organization in the short-term but also in the long-term, as you'll have a pool of well-trained and experienced candidates who may be interested in full-time employment once they graduate. Furthermore, building relationships with local universities and college students can increase brand awareness and build a positive reputation for your organization in the local community.
Hiring Transparency
Transparency in hiring refers to the open and honest communication and information sharing that takes place between employers and job candidates. It encompasses all aspects of the hiring process, from posting job descriptions to providing feedback on performance during and after the interview process. In today's job market, hiring transparency has become increasingly important for both employers and candidates alike.
Recruitment strategies that are weird, but actually work
In the current candidate-driven job market, recruiters are looking for unique ways to attract talent. Some have resorted to even (dare we say it?) recruitment strategies on the border of weird and wacky. What can we learn from the unusual recruitment tactics that are being used and actually getting results? Here’s a rundown of some unique recruitment strategies that actually work.
How To Make $100K a Year – No BS Strategies & Advice
If you’re like most of us, you’d love to be wealthier. Having more money would alleviate stress. It would make it easier to pay your bills and buy nicer things. Maybe it’d allow you to spend more time with your kids and go on more vacations. You’re not alone if you wish you could somehow earn a more significant income.