- UpvoteDownvoteShare Job
- Suggest Revision
To accomplish this goal, the security team is responsible for a broad suite of security technologies that include vulnerability scanning, malware detection, log file analysis, and enterprise-wide incident response and security information and event management (SIEM) tools.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of IDS/IPS, penetration testing, and vulnerability testing. Familiarity with DLP, anti-virus, and anti-malware systems. Technical Expertise: Provides technical and analytical guidance to project teams, recommends solutions to problems, and oversees security measures and controls, including vulnerability testing, risk analyses, audits, and incident management.
ExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Configuration and knowledge of design and implementation concepts of firewall, VPN, IPS, vulnerability management platforms, and other security technologies is desirable. Maintain situational awareness of emerging cyber trends by reviewing open-source reports for recent vulnerabilities, malware, and other threats that have the potential to impact our client organizations.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Create malware detection topologies; conduct vulnerability assessments/penetration tests of information systems. Responsibilities Peraton is seeking a full-time Malware Analyst to join our USCYBERCOM team located in Fort Meade, MD. Location: On-site at Fort Meade, MD. In this role you will: Represent USCYBERCOM to provide requirements and integration support for malware analysis.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Engage in proactive security efforts by conducting threat hunting, attack and defend exercises, threat (malware, vulnerability) research, etc. Manage vulnerability scanning processes.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with multiple solutions such as security orchestration, automation and response; SIEM; intrusion detection and prevention systems (IDS/IPS); threat intelligence platform; directory services; malware sandboxes; vulnerability management; IR playbooks; and endpoint/extended detection and response.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Perform analysis by leveraging serialized threat reporting, intelligence product sharing, OSINT, and open source vulnerability information to ensure prioritized plans are developed. Proficiency with datasets, tools and protocols that support analysis (e.g. passive DNS, Virus Total, Recorded Future, TCP/IP, OSI, WHOIS, enumeration, threat indicators, malware analysis results, Wireshark, Splunk, Arcsight etc.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Provide guidance on vulnerability and malware remediation. Analyze and assist in the application of Security Technical Implementation Guides (STIGs) and Information Assurance Vulnerability Alerts (IAVAs), and Independent Validation and Verification (IV&V) Assessments.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Bachelor's degree in computer science or equivalent experienceWorking knowledge of SPF, DKIM, and DMARC.Experience running vulnerability scans and/or penetration testsUnderstanding of network security fundamentalsEnhanced knowledge of PowerShell and some working knowledge of.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Penetration methodologies, network security and design, configuration, protocols, routers, network management, systems administration, vulnerability management and firewall rules experience is preferred.
ExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Perform regular and ad-hoc vulnerability and malware scans to identify unauthorized access to SHC data systems and malicious code activity such as trojans, root kits, backdoors, bots, or malware.
$52.64 - $69.74 an hourFull-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Define policies and procedures to minimize intrusions, malware events and vulnerability issues. Act as a specialist for key stakeholders on proper security development, hardening of systems, code scanning and vulnerability assessment and management.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Vulnerability Management Analyst is responsible for support for all Cyber Security platforms including firewalls, IDS/IPS, AV and Malware Protection, URL Filtering, and Disaster Recovery technologies with a focus on vulnerability management platforms and patch management.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with cybersecurity tools and concepts, such as vulnerability management, Email security, virus/malware, Endpoint detection and response, scripting languages, etc. Help prioritize and track remediation efforts based on vulnerability severity and risk.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Malware analysis, threat detection, vulnerability management, patching, etc. This could include the following: documenting procedures, Administer security applications, system and/or security reviews, vulnerability scans, system patching, and other security related tasks.
ExpandApply NowActive JobUpdated 5 days ago
malware vulnerability jobs
FEATURED BLOG POSTS
How Long Does it Take to Hear Back from a Job?
Are you applying for your very first job? Maybe you’re anticipating your termination from your current role and want to be proactive. Either way, waiting to hear back on your job application can be stressful. If time has passed since you applied, you may wonder how long does it take to hear back from a job. Well, the answer is... it depends.
How to Respond to a Recruiter Through Email? (Tips & Examples)
Rather than wading through an endless list of open roles, wouldn’t it be nice if relevant job opportunities come to you?
How to Reject a Candidate Professionally
When deciding on how to reject a candidate, your first question may be
How Does Salary Pay Work? (Compared to Hourly Pay)
At the bottom of each job advertisement, companies label a role as salaried or hourly. Both methods will get you paid (yay), but each in very different ways. So, it's essential to figure out how does salary pay work? While employees paid by the hour are paid based on how long they work, employers pay salaried employees a fixed amount.
The Quiet Quitting Phenomenon
The term, quiet quitting, was coined in 2009, but only now is it gaining traction as young Millennials and Gen Z workers are experiencing record levels of burnout. With the pandemic and the state of the economy, young employees are feeling the pressure. So, quiet quitting comes into effect when that pressure is exasperated by work stress and no managerial support.
How Does Salary Range Work (With Examples)
What are your salary expectations? Do you know? Establishing a salary that compensates you fairly and keeps you happy at work can feel like taking a shot in the dark. And employers sure don’t make learning budgets easy!
Guide to Hiring a Teenager
Teenagers are full of life. They bring energy and adaptability that may be hard to get from older workers, but does that mean that hiring teens is beneficial? Well, it depends. As you debate whether or not you should integrate teenagers into your workforce, there are some things that you should know first.