- UpvoteDownvoteShare Job
- Suggest Revision
Familiarity with common attack vectors, malware analysis techniques, cyber threat intelligence frameworks, and CIS benchmarks and controls. Your responsibilities will encompass the protection of our critical systems and data through threat detection, incident response, vulnerability management, and security policy implementation.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Malware and exploit analysis and remote remediationAssess alerts and notifications of event activity from our SIEM platform, and intrusion detection systems by responding accordingly to the threat.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience in firewall design, configuration and in network security including: Device Hardening, IDS/IPS, SIEM, Firewalls, and IPSec, vulnerability assessment and intrusion detection. Experience with Routing, Quality of Service, Netflow, Wireless 802.11 a/b/g/n/ac/ax, virtual networks, NAT, ACL controls, Web Security/URL Filtering, IPSec, Intrusion Prevention System (IPS), Malware Prevention.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with creating, updating, and executing basic scripting – batch, PowerShell, BASH, PythonExperience with technology used to satisfy NIST requirements, such as Anti-Malware, Vulnerability scanning software, Ivanti, Splunk, or etc.
$113,100 - $203,600 a yearFull-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Attend cleared expert threat briefings; have oversight of security program design, incident response plans, cyber risk assessments, and attack surface assessments; investigate security breaches, perform red, blue, purple, ethical hacking, orchestrate vulnerability assessment, develop security protocols, conduct tabletop exercises, and breach readiness reviews.
$110,000 a yearFull-timeExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
In course of regular job duties, the selected candidate will gain exposure to many different enterprise-grade security technologies, which perform critical functions such as vulnerability scanning, malware detection, network intrusion prevention, firewall blocking, enterprise-wide incident response, and security information and event management (SIEM.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Typical tasks include performing monitoring operations; reporting cyber security events and anomalies; providing analysis and recommendations, Vulnerability Management (VM) and Malware Protection / Vulnerability Assessment and Analysis (VAA), Intrusion Analysis and Correlation Information, incident handling, mission operations transfer, exercise and assessment support.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Our expertise in vulnerability research (VR), tool development, malware analysis, reverse engineering (RE), and advanced operational capabilities allow us unparalleled ability to support our customers.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Vulnerability Researcher - Web Browser. The candidate must be familiar with the latest techniques in vulnerability research and demonstrate their ability to follow best practices. As an Implant Java Software Engineer, projects will be undertaken in small teams with close coordination with customers to develop new or enhance existing tools.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with designing SOC architectures (ie SIEM, SOAR and vulnerability management solutions). Infrastructure security: including but not limited to: network security, host security, database security, device security, VPNs & SSLs, secure file transfers, security event monitoring, malware security and cyber security.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The candidate should have in-depth knowledge of networking, security governance, risk, vulnerability management lifecycle/remediation, minimum security baselines, and the ability to apply these concepts within their work environment.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Relevant experience must be in one or more of the following: working in a security domain (e.g., cyber security, network security, information systems security, information assurance, and computer security), programming, systems architecture, vulnerability analysis, reverse engineering, malware analysis, protocol analysis, network analysis, software analysis, debugging, or security endpoint detection and response.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Assist in the selection, testing, implementation, documentation, operation and maintenance of various information security technologies such as authentication devices, access controls, firewalls, IDS/IPS/SIEM/EDR systems, malware detection systems, forensic and vulnerability management tools.
$120,000 - $140,000 a yearFull-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Cloud Security Monitoring and any of the following would be a plus: malware, incident response, endpoint detection, mobile security. Monitoring and analyzing information security vulnerability and risk profile using data and alerts generated from various systems.
Full-timeExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Information Security intern will support functions in risk management, vulnerability management, incident response, and awareness efforts in collaboration with other security teams, as well as internal and external partners across Sony. This role presents a great opportunity for the right candidate to acquire hands-on experience in all aspects of an information security program.
Full-timeExpandApply NowActive JobUpdated 7 days ago
malware vulnerability jobs
FEATURED BLOG POSTS
How to Prepare to Be Fired - What You Need to Do
If you’re reading this, let me be the first to tell you how sorry I am. Getting fired feels crappy, disheartening, hurtful, and all the other bad, sad words. But here’s what I want you to do. First, let yourself fumble for a minute. Then, pick your head up — sometimes getting fired is a blessing in disguise. If you think termination is around the corner, we’ll teach you how to prepare to be fired and what to do next so you land somewhere even better.
How to Find a Job That Makes You Happy - 11 Concerning Facts
Do you ever feel like your life is like one of those rom-com movie scene openers? You know, the ones where the main character rolls out of bed, awakened by a casually upbeat theme song, sulks their way to the coffee pot, and then trudges toward their computer to begin yet another boring day at work?
How to Decline a Job Offer You Already Accepted
When you think about it, turning down a job offer is not the worst position you could be in. If you’ve been lucky enough to consider multiple job offers, well, then you’re lucky enough.
How to Practice Fair Chance Hiring for People With Criminal Records
Usually when you think of your dream hire, you think of someone who is respectful, trustworthy, reliable, and has sound judgment, right? As you envision your ideal candidate with these qualities, the last person you think of is someone with a criminal record.
6 Common Mistakes to Avoid When Employer Branding
Currently, job searchers are putting extra effort into researching employers. The information they find plays a major role in whether they will pursue an opportunity with you or look for jobs elsewhere. That is why it is now more important than ever to be proactive and intentional when showcasing your workforce and workplace culture. Having a well crafted employer branding strategy can help you strategize and influence your potential candidates so they see your business in the best light. But in order to do that, you should be aware of some of the most common mistakes that employers make.
What to Say When Terminating an Employee
Terminating an employee is an inevitable part of doing business. Whether you’re re-structuring your department or you’ve identified a few employees who’re not living up to your expectations, letting people go is necessary for keeping your workforce healthy and thriving.
How to Utilize Keywords for Your Job Ads
Before we give you the scoop on how to utilize keywords in job ads, it would be helpful if we defined what keywords are and why they are important. In simple terms,