- UpvoteDownvoteShare Job
- Suggest Revision
Founded in 2013, backed by KKR, Summit Partners, and NEA, and trusted by over seven thousand enterprises across the globe, this leading cybersecurity company offers a SaaS product suite that proactively fights against complex cyber security threats such as includes insider threats, industrial espionage, IoT compromises, zero-day malware, data loss, supply chain risk, and long-term infrastructure vulnerabilities.
Full-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with manual analysis of malware, phishing kits, network captures, exploits etc. Dissect and analyze malware samples, hacking tools, phishing kits, network packet captures, exploits and network infrastructure associated with adversaries to document and perform hunts for related activity.
$104,000 - $348,000 a yearFull-timeExpandApply NowActive JobUpdated 13 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Basic familiarity with networked/distributed computing environment, and concepts; for example, can remove malware from a computer, can image a laptop, and can setup printers. Support end users with virus/malware related issues and help repair systems and train end users on safe and secure IT behaviors.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
You will be working on a large new contract with a focus on the development of Analytics, Knowledge Management artifacts, Information Sharing tools, Data Transformation, and Malware Analysis. You will be working on a large new contract with a focus on the development of Analytics, Knowledge Management artifacts, Information Sharing tools, Data Transformation, and Malware Analysis.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Their duties include installing antivirus or malware protection software, responding to employee concerns or drafting documents to help employees use computer systems and coordinating with company leadership to determine new technologies that could enhance their companys computer systems.
ExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Responsible for day-to-day firewall, anti-malware, MFA, and secure email gateway monitoring and updating. Responsible for day-to-day firewall, anti-malware, MFA, and secure email gateway monitoring and updating.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Prior experience selling Endpoint security based solutions (such as malware/exploit prevention, anti-virus, whitelisting, advanced data loss protection products, cloud security solutions, data lake/log consolidation technologies, and XDR is required.
$141,500 - $194,500 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with ML/AI as it relates to security analysis, vulnerability assessment and detection, threat modeling, malware detection, binary analysis, network analytics or other security-related research.
$160,000 - $253,000 a yearFull-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Administration of Microsoft Office 365 cloud and related components as Microsoft Azure, Exchange Online, SharePoint Online, Microsoft Defender and its components (Antivirus/Malware, Software distribution, Intune or Endpoints), Microsoft Teams, Microsoft Sentinel, One Drive for Business.
ExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Design, configure, implement, troubleshoot, and maintain all security and health monitoring platforms and their associated software, such as firewalls (Security Groups), intrusion detection/intrusion prevention, anti-virus/malware (HBSS), SIEM (Splunk), Solarwinds, Nagios, native cloud services and MDM.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Present and demonstrate cyber threat defense solutions to CISOs and information security experts. Work closely with Subject Matter Experts, Technical Account Managers, and Cyber Threat Analysts who will support you in performing Proofs of Value (POVs) as you close deals.
Full-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Ensure proper server configuration and monitoring of the following security systems (Microsoft Defender for anti-virus and malware, Patch Management Server, SIEM Event Logs and audit reports) Assist the Chief Information Security Officer in preparing to review with security contractor Security Assessments and Accreditation (SA&A) of USADF Information Systems.
ExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Strong Hands on Security Tooling and Cloud experience - Cloud Security, Vulnerability Management, Malware Detection/ Analysis, SIEM, DLP, CASB, SASE, ZTNA, Privilege Access, DAST, WAF, IPS/IDS, Firewall, Email Security.
$190,000 - $250,000 a yearFull-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Current Network Security applications, services and appliances including Identity Management, Network Access Control, Application Layer Inspection, Content and Malware Filtering, Data Loss and Intrusion Prevention, zero-day threats, IPsec and SSL VPN, PKI, Two-Factor Authentication and other.
ExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience in the software/data security industry (knowledge of end-point, disaster recovery, data protection, anti-virus, malware) Experience in the software/data security industry (knowledge of end-point, disaster recovery, data protection, anti-virus, malware.
ExpandApply NowActive JobUpdated Today
malware job
FEATURED BLOG POSTS
How to Pass a Personality Test with Flying Colors
Whether you’re applying for your first job or looking to move up the career ladder, personality tests aren’t usually the first thing we think about. But surprisingly, they can have a massive impact on how our future employers perceive us. In fact, a 2017 study by the Society for Human Resource Management (SHRM) has found that 32% of U.S. employers use personality tests when hiring for senior management positions, and 28% use them for middle management positions. Personality tests are also used for hourly workers and contractors, though less frequently.
Virtual Reality Job Interviews
With the advent of desktop computers, the arduous task of scouring through weekly job classifieds became a thing of the past. The mid-1990s brought about a new era where job seekers could easily search and apply for jobs online. The introduction of AOL's Instant Messaging feature provided an even faster means for employers and candidates to communicate and schedule interviews. As smartphones became more pervasive in the early 2000s, hiring managers increasingly used phone calls for screening and interviewing candidates. Despite this trend, over 80% of interviews still took place in person.
A Potential TikTok Ban?!
As you may already know, there has been a lot of talk lately about the possibility of a TikTok ban. While this has not yet come to fruition, it's important to consider the implications this could have for businesses and recruiters who rely on TikTok as a platform to market their brand, recruit new talent, and connect with their audience.
The Effects of Workplace Racism and Sexism
One day it's a covert statement to a mother returning to work after maternity leave. Another day it's a lingering gaze at an employee enjoying a culturally rich meal. These microaggressions (or sometimes macroaggressions) can take an employee from a confident, high-performer to one that feels insecure being themselves at work. Your employees engage with people with different ideas and feel most comfortable and valued when they can work without losing their cultural, racial, and gender identity. While most employers know this, why have workplace racism and sexism often been neglected?
When Rage Applying Strikes: How to Identify Unserious Candidates
As the job market remains highly competitive, we have seen a surge in "rage applying." This is when candidates apply to multiple jobs, often without considering whether they are truly interested in the role. Rage applying goes hand-in-hand with quiet quitting. Often, employees want to entertain the thoughts and feelings of leaving their job, but they aren't necessarily serious about leaving yet. Meanwhile, other employees engaging in this trend are actually trying to find a better role. As a recruiter, it can be hard to identify who are the real applicants in a sea full of quiet quitters, but understanding rage applying and identifying red flags will certainly help.
How to Increase Job Ad Exposure
In today's competitive job market, writing quality job ads is critical for attracting top talent to your organization. While networking and candidate referrals are prime real estate for finding qualified candidates, nothing beats the tried-and-true method of writing an extraordinary job ad. But while writing a great job ad is the first step, what's more important is increasing visibility. You could have the most detailed, well-written ad on the internet, but if no one sees it, then you are wasting time (and potentially money!). Employers often believe that job boards are the root of the problem, but you can learn how to increase job ad exposure by tweaking a few steps of your recruitment process.