- UpvoteDownvoteShare Job
- Suggest Revision
Experience managing SIEM, UEBA, IAM, vulnerability management, data loss prevention (DLP), threat intelligence, MITRE ATT&CK framework mapping, security orchestration automation and response (SOAR), and other network and system monitoring tools.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Knowledgeable in enterprise vulnerability management solutions. Responsible for all technical solutions supported by Information Security, to include perimeter firewalls, IDS/IPS, DLP, VPN, and vulnerability management solutions.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with Security Engineering and Architecture, Certification and Accreditation, Vulnerability Assessment, Incident Management, Vulnerability Management, Security Operations, and Policy and Program Development.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Develops and implements a comprehensive Security Operations strategy, encompassing threat monitoring, incident response, vulnerability management, and medical device product security monitoring.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Serves as subject matter expert in the area of analyzing risks while having an understanding of multiple security platforms and layers, including vulnerability management, intrusion detection/prevention, incident response, log correlation and management, operating systems, and identity and access management.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Prior experience in managed or enterprise information security services, vulnerability management, incident response, forensics, malware analysis, penetration testing, or network defense.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Assist with enforcing key security processes, including threat hunting, vulnerability management, log ingestion, security monitoring, threat analysis, and our security incident response lifecycle.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Broad experience across Information Security domains such as governance, risk & compliance, incident response, identity & access management, penetration testing, e-discovery & forensics, etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Operating and maintaining network-based vulnerability management systems to enumerate, categories and report vulnerabilities and misconfigurations on customer information systems. BreakPoint Labs is seeking a Cybersecurity Analyst to support full-spectrum cybersecurity services, including intrusion detection, incident response, and more, across a large-scale, enterprise network.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Strong understanding of Networking and Security technologies such as SIEM, IDS/IPS, vulnerability management, end-point protection, breach detection and threat intelligence. · Work closely with Technology Workflow (TX) solution sales as a technical and domain expert, with deep dive knowledge of ServiceNow’s Security Operation solutions (Security Incident Response, Threat Intelligence and Vulnerability Response.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Specialist will play a critical role in incident reporting, planning, standards compliance, platform configuration management, cyber security vulnerability tracking, and ensuring secure user access and management processes.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
10+ years of technical security experience, with 5+ years of experience leading cloud security managed services and 3+ years of operating a cyber incident response or security operations team within a large enterprise organization.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Work with Lab security team(s) to ensure security compliance and risk / vulnerability management best practices associated with identity and authentication systems including maintaining operational and configuration documentation and ensuring identity systems are audit-ready.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Responsibilities include, but are not limited to: Incident Detection and Monitoring Incident Analysis and Investigation Incident Response and Mitigation Threat Intelligence and Vulnerability Management Reporting and Documentation Required Qualifications: 1+ years of experience in Cybersecurity, Information Technology or Computer Science.
ExpandApply NowActive JobUpdated Today
incident management enterprise vulnerability jobs
FEATURED BLOG POSTS
When to Tell Your Boss You're Job Searching
The Bureau of Labor Statistics has found that individuals, on average, have 12.4 jobs throughout their working life. So regardless of where you are on the career ladder, it’s inevitable that at some point, you’ll begin looking for another job. That said, you might be wondering,
What Questions Can You Not Ask in an Interview?
It can be stressful to interview candidates to fill an open role at your company. Maybe your boss is on you to hire someone who’s absolutely perfect as soon as possible. Maybe you don’t have a ton of experience yet in conducting interviews. Whatever the case, there’s a lot to take under consideration when you’re the one in charge of interviewing. For instance, “What questions can you not ask in an interview?” may very well be running through your mind given its legal ramifications. Knowing exactly which interview questions are off-limits (and which are fine to ask) will boost your confidence as you continue to search for the ideal new hire.
How to Prepare to Be Fired - What You Need to Do
If you’re reading this, let me be the first to tell you how sorry I am. Getting fired feels crappy, disheartening, hurtful, and all the other bad, sad words. But here’s what I want you to do. First, let yourself fumble for a minute. Then, pick your head up — sometimes getting fired is a blessing in disguise. If you think termination is around the corner, we’ll teach you how to prepare to be fired and what to do next so you land somewhere even better.
How to Find a Job That Makes You Happy - 11 Concerning Facts
Do you ever feel like your life is like one of those rom-com movie scene openers? You know, the ones where the main character rolls out of bed, awakened by a casually upbeat theme song, sulks their way to the coffee pot, and then trudges toward their computer to begin yet another boring day at work?
How to Decline a Job Offer You Already Accepted
When you think about it, turning down a job offer is not the worst position you could be in. If you’ve been lucky enough to consider multiple job offers, well, then you’re lucky enough.
How to Utilize Keywords for Your Job Ads
Before we give you the scoop on how to utilize keywords in job ads, it would be helpful if we defined what keywords are and why they are important. In simple terms,
What Makes a Good Paid Time Off (PTO) Policy
The world of work has undergone some major transformation in recent years. From remote and flexible work to increased emphasis on employee benefits and wellbeing, companies nowadays have to be very intentional about their HR policies and how they approach talent acquisition.