- UpvoteDownvoteShare Job
- Suggest Revision
Professional knowledge of security products: IPS/IDS, Data Loss Prevention, Vulnerability Management, SIEM, Event Monitoring, Anti-Malware, encryption, and network topology. The Security Architect Manager is responsible for determining security requirements by evaluating business strategies and requirements; researching information security standards; conducting system security and vulnerability analyses and risk assessments; studying architecture/platform; identifying integration issues; preparing cost estimates.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with multiple solutions such as security orchestration, automation and response; SIEM; intrusion detection and prevention systems (IDS/IPS); threat intelligence platform; directory services; malware sandboxes; vulnerability management; IR playbooks; and endpoint/extended detection and response.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Trusted by over 1,000 organizations worldwide and with over 30 anti-malware engines, 100+ data sanitization engines and more than 25 technology integration partners, OPSWAT is a pioneer and leader in data sanitization, vulnerability detection, multi-scanning, device compliance, and cloud access control.
ExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Demonstrable comprehension of Information Security including malware, emerging threats, attacks, and vulnerability management. The company specializes in providing solutions across Application Services and Consulting, Digital Product Engineering, Digital Workplace Services, Private Cloud Services, AI/Automation, and ServiceNow. Milestone culture is built to provide a collaborative, inclusive environment that supports employees and empowers them to reach their full potential.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Ensure discovered cyber incidents, including misuse, virus/malware, penetrations, and data spills are reported per standard operating procedure; support investigations and remediation/clean up as necessary, and provide guidance in coordination with Security management and other groups as appropriate.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of networking and technical knowledge and understanding of security concepts (e.g., Application, Web and Network Security, Identity and Access Management, Vulnerability Management, Encryption, security protocols.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
3 - 5 years information security programexperience to include incident management vulnerability management, data-loss prevention,endpoint protection, security information event management (SIEM), intrusiondetection systems, intrusion prevention systems, malware analysis, and networksituational awareness.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Understand the defensive side, blue team, Security Operations Center (SOC), and security monitoring and response (SIEM, IDS/IPS etc), as well as EDR (e.g. for bypasses), overall monitoring, detection and indicators of compromise, and creating effective red team activities to test these (e.g. developing / using malware, pivoting, escalating privileges, staying stealthy etc.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with managing, deploying and configuring TLA network/system components such as Cisco Firepower Firewalls, Intrusion Prevention Systems (IPS), Intrusion Detection System (IDS), Content Analysis Systems (CAS), Forward/Reverse Proxy, Malware Analysis Appliance, Network Probe Packet Analyzer, Vulnerability Scanner Assure Compliance Assessment Solution (ACAS), Secure Socket Layer (SSL) Visibility Appliance, and Network Taps.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experienced in threat and vulnerability management, penetration testing, and SecOps (intrusion detection, security logging, malware analysis, and forensics). Experienced in threat and vulnerability management, penetration testing, and SecOps (intrusion detection, security logging, malware analysis, and forensics.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Proficiency in security assessment tools and techniques, vulnerability scanning, and penetration testing. Familiarity with security technologies, including firewalls, intrusion detection/prevention systems, antivirus/anti-malware solutions, data loss prevention, and identity and access management systems.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Familiarity with common attack vectors, malware analysis techniques, cyber threat intelligence frameworks, and CIS benchmarks and controls. Your responsibilities will encompass the protection of our critical systems and data through threat detection, incident response, vulnerability management, and security policy implementation.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
As a Senior Associate Vulnerability Analyst, you will analyze and assess technologies and build your expertise across the compliance, vulnerability and threat landscape. Sr Associate Vulnerability Analysts at Discover contribute to the broader program roadmap.
Full-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Understanding of IDS / IPS, penetration and vulnerability testing. Experience with DLP, anti-virus and anti-malware. SSCP, CompTIA Security+ or CISM preferred. Solid knowledge with AWS cloud security tools – Guard Duty, CloudTrail, Security Hub et al.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Design, develop, implement, and test the MetaDefender Endpoint Security SDK using various programming languages in a Windows, macOS, and Linux environment. Experience with collaboration tools (e.g., Jira, Confluence.
ExpandApply NowActive JobUpdated 6 days ago
malware vulnerability jobs
FEATURED BLOG POSTS
How to Describe Your Personality with Examples
Imagine you’re in an elevator with the CEO of your dream company and you get to talking. The conversation is going well and you start to imagine yourself working for their company when the CEO turns around and asks you “tell me a bit about yourself.” Would this catch you off guard or would you be able to give a clear and succinct description of who you are?
4 Ways to Make Your Job Posting More Inclusive
According to a Glassdoor survey,
How to Calculate Net Income
Understanding your finances can be daunting even if you’re good with numbers. Your net income, in particular, is a key metric for determining how well you’re doing financially and whether your current way of operating is sustainable or not.
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra:
6 Best Ways to End a Cover Letter with Examples
Including a cover letter with your resume is a great way to introduce yourself to the hiring manager, tell them why you’re the ideal fit for the role, and provide context about your personal situation. A strong cover letter will give you an advantage over other applicants. But it’s important that you structure it properly and write it powerfully so that it carries an impact. This article will discuss how to end a cover letter effectively so you catch the eye of a hiring manager and increase your odds of landing an interview. Read on to learn more.
How to Write a Follow-Up Email for a Job Application?
Most times, we have to do more than submit a "sugar-coated" resume to land our dream jobs. Going the extra mile to follow up on your job application can increase your chances of employment. Additionally, it may even help you get confirmation sooner on whether you are seriously being considered for the job or not.
How to Address a Cover Letter With Examples
It’s easy to get caught up in focusing on your resume – how it looks, what it says, and whether it’s going to land you a job interview. Because there is a big focus on building the perfect resume, job searchers often overlook the importance of a high-quality cover letter. Your cover letter plays a huge role in your first impression. It humanizes you and provides context for your resume.