- UpvoteDownvoteShare Job
- Suggest Revision
Incident response coordination and threat hunting. Prior vulnerability management experience. Because even in the most complex enterprise environments, security shouldn't be a source of anxiety.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Prior experience in managed or enterprise information security services, vulnerability management, incident response, forensics, malware analysis, penetration testing, or network defense.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Collaborate closely with the Security Operations (Sec Ops) team to align vulnerability management processes with incident response and threat detection capabilities. In this role, you will be responsible for leading the Enterprise Vulnerability Management program, working closely with the Security Operations (Sec Ops) team, and ensuring compliance in our storage and data protection environments.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience in working with multiple IT risk and control domains such as identity and access management, privileged success, vulnerability management, audit logging, privacy, data loss prevention, enterprise architecture, release management and incident response.
$80,000 - $100,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Initiates protective or corrective measures, in coordination with the ISSM, when a security incident or vulnerability is discovered. Support includes assessing and continuously monitoring cybersecurity risk ensuring that legacy and new capabilities adhere to enterprise standards such as Risk Management Framework (RMF), Cybersecurity Framework (CSF), and National Institute of Standards and Technology (NIST) and per Authorization Official's Information System's Continuous Monitoring (ISCM) strategy.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Lead a team of security engineers for delivery of Cybersecurity project management, continuous diagnostics and mitigation, threat mitigation and incident response, security architecture support, critical infrastructure protection, patch management, vulnerability management, risk management, information assurance, penetration testing, cybersecurity services, and Security Assessment and Authorization (SA&A) documentation.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Demonstrated experience working with enterprise firewall, IPS/IDS, DNS, PKI, and remote access VPN solutions. Leidos Health Mission Solutions is seeking a Security Team Lead on a large network services opportunity supporting the National Institute of Health (NIH) in the Bethesda, MD area.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
In course of regular job duties, the selected candidate will gain exposure to many different enterprise-grade security technologies, which perform critical functions such as vulnerability scanning, malware detection, network intrusion prevention, firewall blocking, enterprise-wide incident response, and security information and event management (SIEM.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
You should have demonstrated experience in cyber-attack detections and of working in a similar 24/7 environments managing cases with enterprise SIEM or Incident Management systems. Experience managing cases with enterprise SIEM or Incident Management systems.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Oversee Identity and Access management, cloud security, cryptography, logging and alerting, security operations, malware detection, incident response, vulnerability scanning, penetration testing, security architecture, and digital forensics.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Expertise in secure coding practices, threat modeling, security architecture, vulnerability management, enterprise security, application security, incident management, security incident, networking, information technology operations.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Manage and allocate multi-million dollar capital and expense budgets, developing and enforcing security programs and processes related to vulnerability management, incident response, associate awareness, testing, and secure coding.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Improve and maintain cloud security solutions for monitoring, vulnerability remediation, and incident response. Design, deployment, and maintenance of enterprise Azure / AWS cyber security elements.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with IDS/IPS, SIEM, network defense tools, DLP technologies, network security architecture, and enterprise anti-virus/malware solutions. We partner across the organization to mature our Threat Management and Incident Response.
ExpandApply NowActive JobUpdated Today
incident enterprise vulnerability jobs
FEATURED BLOG POSTS
How to Find a Job That Makes You Happy - 11 Concerning Facts
Do you ever feel like your life is like one of those rom-com movie scene openers? You know, the ones where the main character rolls out of bed, awakened by a casually upbeat theme song, sulks their way to the coffee pot, and then trudges toward their computer to begin yet another boring day at work?
How to Decline a Job Offer You Already Accepted
When you think about it, turning down a job offer is not the worst position you could be in. If you’ve been lucky enough to consider multiple job offers, well, then you’re lucky enough.
How to Practice Fair Chance Hiring for People With Criminal Records
Usually when you think of your dream hire, you think of someone who is respectful, trustworthy, reliable, and has sound judgment, right? As you envision your ideal candidate with these qualities, the last person you think of is someone with a criminal record.
6 Common Mistakes to Avoid When Employer Branding
Currently, job searchers are putting extra effort into researching employers. The information they find plays a major role in whether they will pursue an opportunity with you or look for jobs elsewhere. That is why it is now more important than ever to be proactive and intentional when showcasing your workforce and workplace culture. Having a well crafted employer branding strategy can help you strategize and influence your potential candidates so they see your business in the best light. But in order to do that, you should be aware of some of the most common mistakes that employers make.
What to Say When Terminating an Employee
Terminating an employee is an inevitable part of doing business. Whether you’re re-structuring your department or you’ve identified a few employees who’re not living up to your expectations, letting people go is necessary for keeping your workforce healthy and thriving.
How to Utilize Keywords for Your Job Ads
Before we give you the scoop on how to utilize keywords in job ads, it would be helpful if we defined what keywords are and why they are important. In simple terms,
What Makes a Good Paid Time Off (PTO) Policy
The world of work has undergone some major transformation in recent years. From remote and flexible work to increased emphasis on employee benefits and wellbeing, companies nowadays have to be very intentional about their HR policies and how they approach talent acquisition.