- UpvoteDownvoteShare Job
- Suggest Revision
The Specialist will play a critical role in incident reporting, planning, standards compliance, platform configuration management, cyber security vulnerability tracking, and ensuring secure user access and management processes.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Implement and operate Tenable - Vulnerability Management solutions across a large and diverse enterprise (600K+ users, 600+ applications, large IP-enabled footprint) Provide guidance and leadership to determine, develop, plan, test, and implement Tenable - Vulnerability Management protection and security requirements for the enterprise.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Responsibilities include, but are not limited to: Incident Detection and Monitoring Incident Analysis and Investigation Incident Response and Mitigation Threat Intelligence and Vulnerability Management Reporting and Documentation Required Qualifications: Experience in working within a Cyber Incident Response Team or Security Operations Center.
Part-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Strong knowledge of enterprise Information Security pillars (Perimeter security, Identity Management and Governance, Privileged Account Management, Compliance, Penetration testing, Encryption, Cloud Security, Incident Response, Vulnerability Management.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Information Security Program Manager will work with HR, Incident Response Team, and Enterprise Risk Management to conduct computer forensics investigations. Oversight of the SIEM, Vulnerability Scanning, and Anti-Malware systems, and other security related systems.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
In this role, you'll be responsible for maintaining and improving Well's security posture in several areas: cloud, endpoint, incident response and vulnerability management. You will work in a dynamic team, collaborating with the DevOps Team Lead and Principal Architect to build and maintain secure enterprise-wide cloud environments that meet the stringent security requirements of a HIPAA/HITECH/HITRUST environment.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Establish requirements for, and oversee operation of, an enterprise information security architecture and infrastructure that includes Security Information and Event Management, Network and Host Intrusion Detection/Prevention Systems, Vulnerability Scanning and Penetration Testing.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Providing support to investigations & incident management team on matters of information security, intrusion mitigation/detection and computer forensics. Experience with continuous monitoring and vulnerability management tools.
$117,500 - $161,600 a yearExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
PowerShell and Ansible Playbooks experience Knowledge of information security toolsets including anti–virus, Vulnerability Assessment, host–based or endpoint security solutions, Multi Factor Authentication (MFA), and Security Incident and Event Management (SIEM) and centralized auditing tools.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Familiarity with Incident Response, penetration testing principles, Common Vulnerability Scoring System (CVSS), and MITRE GIAC, CISSP or CISM certifications. As a Expert Vulnerability Analyst you will drives DFS Cybersecurity strategic Compliance/Vulnerability management decisions.
$103,000 - $174,200 a yearFull-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Participates in daily compute operations tasks such as provisioning, compute connectivity, compute allocation, incident problem management and troubleshooting of changes to enterprise infrastructure.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Qualified candidates will possess expertise in enterprise security, including detection and detection engineering, incident response, Identity and Access Management (IAM), networking and endpoint security, is desirable.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Reporting to the Chief Security Officer (CSO), the Vice President, Chief Information Security Officer (CISO) is responsible for advancing our world-wide information protection and enterprise security programs which include security operations, incident response, vulnerability management, identity management, network security, standards, procedures, governance and compliance.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Oversee Identity and Access management, cloud security, cryptography, logging and alerting, security operations, malware detection, incident response, vulnerability scanning, penetration testing, security architecture, and digital forensics.
ExpandApply NowActive JobUpdated Today
incident management enterprise vulnerability jobs
FEATURED BLOG POSTS
Growing Discontent: Employees Wouldn't Wish Their Jobs on Their Worst Enemy
The start of a new year, and most people are already busy setting personal and professional goals. What’s on the top of the list for a growing number of working people is making an exit from the job they currently have. Why?
How to Gracefully Quit a Job You Just Started
You’ve just started learning the ropes at your new job, and you've gotten to know your colleagues. But you’re already thinking about quitting. Maybe you were deciding between to job offers and realized that you’ve made the wrong choice. Or, a change in your personal circumstances means that you have to quit.
How to Professionally Reschedule a Job Interview Without Destroying Your Chances
You’ve practiced answering common interview questions and refined your “greatest weakness.’ Nothing can stop you until BAM! The flu hits your household. Or you ran over a nail and popped a tire en route to the interview. When you need to pivot, there’s a good, better, and best way to reschedule a job interview. Here’s how to do it professionally, so you can nail the gig when the timing is right.
What is a W-9 and How to Fill One Out
When you began working for yourself, you probably didn’t account for the tax reporting work that will fall on your shoulders each year. If you’re a freelancer, independent contractor, or business owner, filing your taxes is not as simple as uploading your W-2 form into some online tax preparation software. Most self-employed people need to complete a W-9 as a step for accurately reporting their earnings to the IRS. Below, you can learn how to fill out a W-9 and when to submit it.
Tightening the HR budget in 2023
With the state of the economy still uncertain, 2023 is expected to be approached with much anticipation. Human Resource leaders have many concerns, including how they will manage to accomplish their goals with budget belts already getting snug. Let’s look at some of the factors that the new year is projected to bring for HR and how to prioritize budgets to reach human capital objectives.
A Comprehensive Guide to Becoming a Better Conversationalist
Have you ever stood awkwardly next to someone at a party because you didn’t know what to say to them? How about at a networking event or on a first date? You're not alone if you’ve ever experienced this uncomfortable silence. Many people struggle to master the art of being a great conversationalist.
Why is Non-Verbal Communication Really Important?
In a world where words and phrases rule daily communication, you may wonder why non-verbal communication is important. Whether you realize it or not, you communicate more with nonverbal actions than you do with verbal communication. When you interact with your peers, people are reading your body language, facial expressions, voice, and many other factors that help fill in blanks that words can't fill.