- UpvoteDownvoteShare Job
- Suggest Revision
Trusted by over 1,000 organizations worldwide and with over 30 anti-malware engines, 100+ data sanitization engines and more than 25 technology integration partners, OPSWAT is a pioneer and leader in data sanitization, vulnerability detection, multi-scanning, device compliance, and cloud access control.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Network Prevention technologies and security controls (Network Access Control (NAC), Security Information and Event Management (SIEM) and vulnerability management) Data protection technologies (End point protection w/ EDR, system backups, DLP, virus/SPAM/malware etc.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with any of the following systems/products also a plus: scripting, enterprise antivirus management, data loss prevention, malware detection, intrusion detection/prevention, penetration testing/vulnerability scanning, web application firewall.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Develops and maintains compliance procedures for all applicable CIP requirements to include vulnerability assessments, patching procedures, patch management, anti-virus and malware procedures, and other security software or firmware updates, et al.
Full-timeExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Any experience with penetration testing, malware analysis, network traffic analysis. The AI Cybersecurity Researcher / Engineer will be expected to work with a small team to develop procedures in support of DHS’ Vulnerability Management Branch.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Leads and participates in security incident investigations, which may include assisting with malware containment and incident response. Responsible for maturing the vulnerability management program.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of IDS/IPS, penetration testing, and vulnerability testing. Familiarity with DLP, anti-virus, and anti-malware systems. Technical Expertise: Provides technical and analytical guidance to project teams, recommends solutions to problems, and oversees security measures and controls, including vulnerability testing, risk analyses, audits, and incident management.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This individual is responsible for effectively and timely responding to issues with computer security vulnerabilities, phishing, malware, and forensic investigations and serves as subject matter expert (SME) specializing in host and network-based detection and prevention suites.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Have familiarity with malicious code (malware) and transmission schemes so as to perform technical analysis against target systems and networks, characterize target network capabilities and vulnerabilities, and support development of new techniques.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Requires Global Information Assurance Certification (GIAC) Certified Forensic Analyst (GCFA) certificate, or Certified Reverse Engineering Malware (GREM) certificate. GliaCell is seeking an Malware Analyst on one of our subcontracts.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
A Foot Locker Cyber Risk Specialist is responsible for driving the corporate vulnerability management program and managing risk to the organization. Must understand basic security principles with an understanding of malware, cryptography, threats and vulnerabilities, access control, and application, data, and host security.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with multiple solutions such as security orchestration, automation and response; SIEM; intrusion detection and prevention systems (IDS/IPS); threat intelligence platform; directory services; malware sandboxes; vulnerability management; IR playbooks; and endpoint/extended detection and response.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Oversee, manage and provide reporting from the Next Generation Firewalls (NGF)s, Anti-Virus, Malware, Security Information and Event Management (SIEM), Intrusion Detection / Prevention (IDS/IPS), Domain Name Services (DNS), Vulnerability scanners, and other security solutions that comprise the Security Architecture of the organization.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Professional knowledge of security products: IPS/IDS, Data Loss Prevention, Vulnerability Management, SIEM, Event Monitoring, Anti-Malware, encryption, and network topology. The Security Architect Manager is responsible for determining security requirements by evaluating business strategies and requirements; researching information security standards; conducting system security and vulnerability analyses and risk assessments; studying architecture/platform; identifying integration issues; preparing cost estimates.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Detailed understanding of Network Devices, Anti-Malware solutions, Intrusion Prevention Systems, Web Content filtering solutions, DLP Technologies, Web Application Firewalls, and SIEM Solution.
Full-timeExpandApply NowActive JobUpdated 6 days ago
malware vulnerability jobs
FEATURED BLOG POSTS
Should I Hire for Potential Over Experience?
The workforce is shifting every day. In fact, research from the World Economic Forum (WEF) shows over half of employees around the world will need to upskill or reskill by 2025. The rapid rise of digital literacy, automation, and new technologies will quickly supersede businesses that don't train ahead of the curve. With the dire need to invest in training, it's evident that hiring someone with experience isn't that much different than hiring someone without it.
How to Decide Between Two Job Offers: 10 Practical Tips
It’s arguably a good predicament to have. You’ve applied to many jobs, interviewed multiple times, and now find yourself with two legit job offers. Nice! But although this is a feel-good validation of everything you have to offer, a daunting choice lies ahead. How do you decide which job will be the best fit for you?
Why Work in Sales? 9 Reasons & Tips on Answering as an Interview Question!
Working in sales can be demanding and challenging, but it can also be gratifying. Sales is an excellent career with a clear path full of excitement and potential for growth. So, if you're contemplating careers and have wondered "why work in sales?", keep reading to determine if sales is a suitable role for you.
How to Fire an Employee
So… you've finally decided to let one of your employees go. Drafting the paperwork and corresponding with HR is the easy part, but knowing how to fire an employee is where things get complicated. In fact, it is one of the most challenging conversations to have in the workplace. However, it must be done, and it must be done with poise and tact. Not only should you keep your state law in mind, but you should also consider your former employee's wellbeing.
How Long Does it Take to Hear Back from a Job?
Are you applying for your very first job? Maybe you’re anticipating your termination from your current role and want to be proactive. Either way, waiting to hear back on your job application can be stressful. If time has passed since you applied, you may wonder how long does it take to hear back from a job. Well, the answer is... it depends.
How to Respond to a Recruiter Through Email? (Tips & Examples)
Rather than wading through an endless list of open roles, wouldn’t it be nice if relevant job opportunities come to you?
How to Reject a Candidate Professionally
When deciding on how to reject a candidate, your first question may be