- UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Strong understanding of security topics, including access control, network and systems hardening, threat modeling, encryption, vulnerability management, digital forensics, and incident response.
$135,000 - $155,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Deep technical understanding and exposure to SIEM, vulnerability scanning and management, DLP, incident response planning and execution, EDR, IDS/IPS, content filtering, and penetration testing.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience analyzing data from security tools such as EDR, SIEM, Firewall/UTM logs, Vulnerability Assessment reports, Pen test reports, etc. Significant experience with the installation, and use of modern EDR platforms like SentinelOne and CrowdStrike to prevent, detect, and identify Advanced Persistent Threats (APTs) that might circumvent traditional security solutions like anti-virus, firewalls, and IPS/IDS.
Full-timeRemoteExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Security-related technologies and their functions (IDS, IPS, FW, WAF, SIEM, DLP, Proxy, next gen anti-malware etc. Intermediate knowledge in system security architecture and security solutions – IDS, Splunk, data loss prevention, next generation anti-malware, etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Must have proficient knowledge with three or more of the following technologies: Application / stateful / UTM firewalls; SIEM; DLP; Web content filtering; Web application firewalls (WAF); Vulnerability scanning and penetration testing; IPS/IDS; Security Operations Center operations; Wireless Networking; UNIX, AIX & Solaris, Linux, Windows Server Operating Systems; Endpoint and Malware.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Broad knowledge of traditional security controls and technologies, such as Security Information and Event Management (SIEM) systems such as Securonix Next Gen, intrusion detection/prevention systems (IDS/IPS) such as Securonix Cloud Ingestor, public key infrastructure (PKI), antivirus and firewalls, in addition to newer offerings such as endpoint detection and response (EDR), threat intelligence platforms, security automation and orchestration, deception technologies and application controls.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Administer and maintain security products (phishing training, vulnerability management, web application firewall, SIEM, IDS, (h)IPS, EDR, etc) Familiarity with enterprise security tools (antivirus, firewalls, email monitoring, two-factor authentication, SIEM, IDS/IPS, etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience in firewall design, configuration and in network security including: Device Hardening, IDS/IPS, SIEM, Firewalls, and IPSec, vulnerability assessment and intrusion detection. Extensive knowledge of security controls and technologies, such as Security Information and Event Management (SIEM) systems, Identity and Access Management (IAM), intrusion detection/prevention systems (IDS/IPS), public key.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Strong understanding of network architecture, security technologies, and tools, including SIEM, IDS/IPS, vulnerability management, and threat intelligence platforms. Security Monitoring and Analysis: Define and implement comprehensive monitoring and analysis strategies, leveraging security information and event management (SIEM) solutions, intrusion detection systems (IDS), and other relevant tools, to identify security incidents, conduct investigations, and provide real-time threat intelligence.
$106,298 - $177,164 a yearExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As a Security Engineer, Vulnerability Management at RingCentral, your primary responsibilities will be to perform vulnerability scans of our systems and networks, and monitor, triage and track remediation of vulnerabilities.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience operating vulnerability scanning tools (Qualys, Nessus, etc) Security Engineer, Vulnerability Management : (Belmont CA, Denver CO, Dallas TX) Familiarity with vulnerability management concepts, such as CVE and CVSS.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Technologies include SIEM , vulnerability assessment, discovery, infrastructure (firewall, IPS/IDS, proxy, network capture), host-based security, PCAP, penetration testing/external assessment tools, forensics, etc.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Lead a team of security engineers for delivery of Cybersecurity project management, continuous diagnostics and mitigation, threat mitigation and incident response, security architecture support, critical infrastructure protection, patch management, vulnerability management, risk management, information assurance, penetration testing, cybersecurity services, and Security Assessment and Authorization (SA&A) documentation.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Demonstrated expertise in security tools and technologies, including SIEM, IDS/IPS, WAF, IAM and vulnerability assessment tools. Select, implement, and manage security tools such as SIEM , IDS/IPS to monitor, detect, and respond to security threats within the cloud environment.
$120,000 - $150,000 a yearExpandApply NowActive JobUpdated Today
ids vulnerability jobs
FEATURED BLOG POSTS
What is Your Desired Job Title?
You’ve decided to look for a new job. So now comes the question — what is your desired job title? There are lots of considerations to think through when deciding on the right title for your next role.
4 Things to Consider When Building a Global Workforce
The rise of remote work has given employers a unique chance to rethink how they approach workforce management. This ranges from rethinking the size and design of their office space to updating their tech stack to accommodate different working styles. It has created new opportunities for companies of all sizes to expand their hiring pool and look for top talent on a global scale.
Operations Job Titles for Entry, Mid, and Senior-Level Positions
An operations team can take on many functions within a business. With wide-ranging responsibilities come wide-ranging job titles. This means that you have to be more vigilant in your job search. On one hand, the perfect job might be hidden under a title you might not expect. Meanwhile, operations titles that you’re used to looking at may mean something different at a given organization depending on their structure.
How to Automate Your Job Search
The internet is ripe with career professionals urging you to be aggressive in your networking and application strategies to land a job. But at what expense? Your sanity? Peace of mind? Energy? Free time? When the job search gets overwhelming—as it inevitably will—leverage automation to take the most tedious tasks off your plate. Here are seven ways to do it.
How To Request Accommodations at Work (According to Someone Who’s Done It)
Doing a job for eight hours a day, five days a week is exhausting for anyone. But for those with a disability or chronic pain, it can be especially taxing—something must change. Asking for reasonable accommodations at work can feel tricky, especially if you’re new to the job. Under the Americans with Disabilities Act (ADA), physical disabilities, health conditions, and symptoms of mental health are all valid workplace accommodations. When you request accommodations, it means that your condition is impacting your ability to perform at work.
Finally! Answers to 9 Job Search Questions You've Been Wondering About
There’s no college course on how to job search effectively. If schools offered “Job Searching: 101,” we wouldn’t have to write this article. Unfortunately, there’s nothing straightforward about a job hunt, and researching the best job searching methods is basically limited to sourcing peer advice and internet articles. Don’t worry; we’ve got your back. Here are definitive answers to the most common questions you’ve been dying to ask.
How to Successfully Make a Career Change in the New Year
The beginning of a new year is often a time for reflection and introspection. Millions of people use this time to come up with new resolutions to help them live happier and healthier lives. Pursuing our career ambitions is among the top five, right up there with exercising more and eating better.