- UpvoteDownvoteShare Job
- Suggest Revision
Understand the defensive side, blue team, Security Operations Center (SOC), and security monitoring and response (SIEM, IDS/IPS etc), as well as EDR (e.g. for bypasses), overall monitoring, detection and indicators of compromise, and creating effective red team activities to test these (e.g. developing / using malware, pivoting, escalating privileges, staying stealthy etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Utilizes and provides guidance on security related functions and solutions including, but not limited to, firewalls, intrusion detection systems, multifactor authentication systems, antivirus and malware systems, secure email gateway appliances, web filtering proxy, security information and event management (SIEM) platforms, data-loss prevention (DLP), vulnerability detection, content filtering and identity and access management.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Provide log, network, malware, and device analysis and making recommendations for remediation of security vulnerability conditions. Review threat analysis of customer networks and systems to find exploitable weaknesses and plan vulnerability remediation and protection.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Manage, maintain, and monitor security technologies such as vulnerability scanning solutions, IDS/IPS, anti- virus technologies, SIEM technologies, host forensics and malware analysis, web application firewalls and proxy solutions.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Perform web app pentestsPerform vulnerability risk assessmentPerform physical pentests and social engineering Perform cyber incident response as needed for programsEqual Opportunity Employer. 5 years of professional experience in incident detection and response, malware analysis, or cyber forensics.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Background in information security technologies (e.g. industry standard operating environments, security tools, vulnerability management, enterprise SIEM tools, penetration testing, malware detection.
$120,000 - $180,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Perform analysis by leveraging serialized threat reporting, intelligence product sharing, OSINT, and open source vulnerability information to ensure prioritized plans are developed. Proficiency with datasets, tools and protocols that support analysis (e.g. passive DNS, Virus Total, Recorded Future, TCP/IP, OSI, WHOIS, enumeration, threat indicators, malware analysis results, Wireshark, Splunk, Arcsight etc.
Full-timeExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Security technology acumen and experience including but not limited to the firewall, intrusion detection, cyber-attack tools, and defenses, encryption, certificate authority, web filtering, anti-malware, anti-phishing, identity, and access management, multi-factor authentication, security incident event management, penetration, and reporting.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Proficiency with at least three (3) or more of the following: mobile security, telecom protocols, operating systems analysis, reverse engineering, forensics, network analysis, vulnerability assessment or malware.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
5+ years of experience in performance of computer forensics, vulnerability analysis, systems engineering, or design of information systems. Experience in performing malware analysis to triage and create detection rules for use in open source detection engines.
Full-timeExpandApply NowActive JobUpdated 2 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Strong experience working with enterprise vulnerability scanning tools such as Tenable, Rapid7 or Qualys. Penetration Testing or Malware Analysis is a plus - being able to demonstrate how vulnerabilities work and how to exploit them in an understandable way for our customers.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Experience analyzing data from security tools such as EDR, SIEM, Firewall/UTM logs, Vulnerability Assessment reports, Pen test reports, etc. Antivirus / Malware endpoint protection ( SentinelOne and CrowdStrike.
RemoteExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
SASE / CASB · Vulnerability Management · Cloud infrastructure environments · Incident Response · Computer Forensics · Malware Analysis · Ability to code in. SASE / CASB · Vulnerability Management · Cloud infrastructure environments · Incident Response · Computer Forensics · Malware Analysis · Ability to code in.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Enhance the security of existing technologies including network, malware, firewalling, IPS and research to identify new technologies to ensure optimal system security. assesses the credit unions IT security footprint to determine areas of vulnerability or flawed design and address/resolve issues as position also administers controls and performs assessments to prevent security risks.
$105,000 - $112,500 a yearFull-timeExpandApply NowActive JobUpdated Yesterday
malware vulnerability jobs
FEATURED BLOG POSTS
Tightening the HR budget in 2023
With the state of the economy still uncertain, 2023 is expected to be approached with much anticipation. Human Resource leaders have many concerns, including how they will manage to accomplish their goals with budget belts already getting snug. Let’s look at some of the factors that the new year is projected to bring for HR and how to prioritize budgets to reach human capital objectives.
A Comprehensive Guide to Becoming a Better Conversationalist
Have you ever stood awkwardly next to someone at a party because you didn’t know what to say to them? How about at a networking event or on a first date? You're not alone if you’ve ever experienced this uncomfortable silence. Many people struggle to master the art of being a great conversationalist.
Why is Non-Verbal Communication Really Important?
In a world where words and phrases rule daily communication, you may wonder why non-verbal communication is important. Whether you realize it or not, you communicate more with nonverbal actions than you do with verbal communication. When you interact with your peers, people are reading your body language, facial expressions, voice, and many other factors that help fill in blanks that words can't fill.
Making Hybrid Work More Efficient
Covid was a catalyst for change in the work environment. Keeping people safe and helathy was the initial goal for employers, but the unintended result was the considerable demand in remote work. Now, onsite work has been dramatically altered to remote work, which is now transforming into a combination of the two: hybrid work.
How Can HR Technology Help Retain Employees?
Human resources' rapid adoption of technology has led to new ways of streamlining human capital management. Based on the IEE Global Study, these technologies changed how HR handled recruitment and retention in 2022. This includes tech like
Why is Time Management Important? 10 Crucial Importances of Time Management
We’ve all been there before. What starts as a relaxing evening scroll quickly becomes a full-blown binge. You blink, and it’s midnight - throwing off your entire next day before it even starts. And at its worst, this indulgence might leave you feeling behind on things you planned to finish that night. This is why time management is important.
Minimizing Candidate Renegs During the Hiring and Onboarding Process
Candidates reneging on job offers or during the onboarding process can be a frustrating experience for any recruiter. In a talent-driven job market, it’s common for candidates to have more than one job offer to consider. It becomes a race against time to see which organization can offer the best career experience, compensation, and circumstances that secure the right employees.