- UpvoteDownvoteShare Job
- Suggest Revision
Professional certifications, such as CISSP, CISM, CEH, or CCNA Security, PMP, are preferred#techjobs #clearance. Experience in conducting vulnerability scanning, penetration testing, and incident response using various tools and techniques, such as Nessus, Metasploit, Wireshark, and Splunk.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Proficiency in vulnerability management tools like Nessus and Burp Suite. Relevant cybersecurity certifications (e.g., CISSP, CEH, GIAC). Implement and manage vulnerability assessments using Nessus, Burp Suite, and other security tools.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Candidate must, at a minimum, meet one of these certifications: CISSP, CCSP, CCNP, CCIE Security, CEH, RHCSA, RHCA, RHCE, MCSE, COMPTIA Security+, GCIH, GPEN, OSCP, OSCE, Azure Solutions Architect Expert.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Security certifications like CEH, CIH, OSCP, and CISSP a plus. Vulnerability Management – Nessus, Qualys, Rapid 7. Security certifications like CEH, CIH, OSCP, and CISSP a plus. Vulnerability Management – Nessus, Qualys, Rapid 7.
$108,000 - $148,000 a yearFull-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Demonstrated experience with compliance and vulnerability scanning tools (XACTA, RedSeal, Nessus, Splunk, McAfee ePO, and/or other vulnerability scanners) Board certified in relevant security programs (e.g., CISSP, CISM, CISA, CEH, NCSF, CAP.
Full-timeExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Dox Electronics Inc. is looking to add an Ethical Hacker - Security Analyst who is an expert in the use of Nessus, KALI and Metasploit, along with many other popular security software to our staff.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Relevant certifications such as CompTIA Security+, Certified Information Systems Security Professional (CISSP), or Certified Ethical Hacker (CEH) preferred. Experience installing, configuring, and maintaining tools such as Tanium, Nessus, Forescout, and Cyberark in a hybrid-cloud environment.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
GPEN, OSCP or CEH Certification. Experience with security testing tools, including Burp Suite, SQLMap, Nmap, Nessus, Metasploit, or Cobalt Strike. GPEN, OSCP or CEH Certification. Experience with security testing tools, including Burp Suite, SQLMap, Nmap, Nessus, Metasploit, or Cobalt Strike.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Must be certified in CISSP, CISM, CISA, CEH, SABSA Chartered Security Architect, or equivalent certifications. Experience in performing Vulnerability scans using Nessus, Nexpose, Qualys, etc.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
CISSP or GSEC or SSCP or CEH or OSCP or CCSP or MS-500 or AZ-500 Other Security Certifications preferred. Independently conducts vulnerability assessments and risk assessments with tools such as Nessus, Qualys, Metasploit, Kali and working with application and server owners to review scan results, suggest remediation actions, and track/report on progress to management.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
At Booz Allen, we know our people are what propel us forward, and we value relationships most of all. If this position is listed as remote or hybrid, you'll periodically work from a Booz Allen or client site facility.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
One or more of the following: IAT II, IAM II or IASAE II certifications: ISC2 CISSP, ISC2 CAP, ISC2 SSCP, ISC2 CCSP, ISC2 ISSEP, ISACA, CISM, CISA, ISC2, EC-COUNCIL CEH, CompTIA Security+, CompTIA Network.
RemoteExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Proficiency in configuration, optimization, and utilization of information security tools such as Crowdstrike or similar EDR, Cisco FTD, Palo Alto , Qualys, HP Fortify, Nessus, Kismet, Airsnort, NMAP, Wireshark, WebInspect, SNORT, Security Onion, and Nikto, Burp Suite, Kali Linux, and other web application penetration testing tools.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Certification(s): Security+, GCIH, CEH, or CYSA+ is desired. Experience analyzing and interpreting outputs of various endpoint security, vulnerability, and enumeration tools (example: Tenable Nessus, Security Center, SolarWinds, EndPoint Security Solutions, Vulnerator SCAP Compliance Checker.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Any security certs: CISSP, CISM, CISA, CEH, CySA+, Security+ or equivalent certification per DoD Directive 8570.1. Vulnerability management/scanning: ACAS , Nessus, SCAP. Any security certs: CISSP, CISM, CISA, CEH, CySA+, Security+ or equivalent certification per DoD Directive 8570.1.
ExpandApply NowActive JobUpdated 5 days ago
nessus ceh jobs
FEATURED BLOG POSTS
5 Common Interview Mistakes
Everyone's interview process is unique in some form or fashion. Like most, your interview process is crafted so you can get the most information out of your candidates to increase hiring confidence and make the right hiring decisions. However, there are often small problems in interview processes that could ultimately affect the success of hiring decisions.
Job Rejection Email Response with Examples
Glassdoor estimates that, on average, there are about 250 applicants for every job vacancy out there. If you’ve ever applied for a job, the odds are that you’ve received the dreaded job rejection email.
Structured vs Unstructured Interviews
The goal of an interview is to evaluate candidates based on their skills, personality, and knowledge. You want to choose the BEST candidate from your candidate pool, so the interview is something you can't mess up. As you begin planning your interview process, one of the major decisions you'll face is whether the interview should be a structured vs unstructured interview. So let's take a dive into the differences and sort out which circumstances warrant which interview process.
How to Describe Your Personality with Examples
Imagine you’re in an elevator with the CEO of your dream company and you get to talking. The conversation is going well and you start to imagine yourself working for their company when the CEO turns around and asks you “tell me a bit about yourself.” Would this catch you off guard or would you be able to give a clear and succinct description of who you are?
4 Ways to Make Your Job Posting More Inclusive
According to a Glassdoor survey,
How to Calculate Net Income
Understanding your finances can be daunting even if you’re good with numbers. Your net income, in particular, is a key metric for determining how well you’re doing financially and whether your current way of operating is sustainable or not.
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra: