- UpvoteDownvoteShare Job
- Suggest Revision
Security tools: Microsoft 365 E5 Suite, Tenable/Nessus vulnerability management, a SIEM, Logmonitor. Servers/Networks: Dell servers, Netapp storage, VMware, Veeam, Zerto, Cisco, co-located data centers, Microsoft Azure IaaS and Azure AD, Active Directory, VDI/Azure Virtual Desktop.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Management tools: Intune, Configuration Manager, Citrix. o Responsible for fine tuning alerting systems, such as iManage Threat Manager, Crowdstrike, Microsoft Defender for Identity and all other firm security systems.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience utilizing security products including Tripwire Enterprise, Trellix ESM, Tenable Nessus, Symantec Endpoint Protection, and Cisco FMC. DLC is seeking candidates for the role of Information Security Engineer I on the Cybersecurity Operations ("Cyber Ops") team, directly supporting NERC CIP requirements and critical infrastructure security.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Manage the vulnerability assessment infrastructure - Tenable.io and Tenable Nessus Scanners. 3+ years of experience utilizing vulnerability scanning technology from companies such as Tenable or Rapid7.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Licenses/Certifications: One or more cyber security or audit certifications such as GEVA,CISM, OSCP, CASP, GIAC (or equivalent experience) Experience with vulnerability management practices in AWS, GCP, or Azure.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Relies on extensive experience and judgment to plan and accomplish goals Job Requirements Qualifications Current TS/SCI w/CI Poly security clearance Bachelor's Degree and 12 years total experience or the equivalent combination of education, professional training, or work experience At least five (5) years of experience in system administration, specifically with ACAS platforms such as Tenable, Nessus, and Qualys.
ExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience utilizing cutting-edge knowledge of computer hardware, software, and networks to conduct cybersecurity activities and tasks, including but not limited to: Wireshark NESSUS Tenable Network Security Monitoring Tools Encryption Tools Web Vulnerability Scanning Tools Penetration Testing Tools Network Intrusion Detection Tools Virus Scanning Tools Firewall Tools Managed detection services.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with Nessus, Tenable Security Center, Amazon Cloud, Splunk, and CyberArk. Provide cybersecurity continuous monitoring support of the network(s), systems, and users using a variety of client-approved tools (including Archer GRC) and resources (for example, but not limited to the following: Assured Compliance Assessment Solution (ACAS), Nessus, Core Impact, Security Content Automation Protocol (SCAP.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge and experience in administering: Windows, Archer, ThreatConnect, FireEye, Tenable/Nessus, WebInspect, SCCM, VMWare, FreeNAS/Pure/NetApp storage, and PKI certificate management. Knowledge and experience in administering: Windows, Archer, ThreatConnect, FireEye, Tenable/Nessus, WebInspect, SCCM, VMWare, FreeNAS/Pure/NetApp storage, and PKI certificate management.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Understanding of PCI, GDPR, and SOX compliance is a plus. This individual should be an experienced cyber security professional with a strong understanding of how to create and lead vulnerability management programs.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Conduct and analyze security evaluation tools results from Tenable Nessus, Nmap, SCAP, and Wireshark. One or more of the following: IAT II, IAM II or IASAE II certifications: ISC2 CISSP, ISC2 CAP, ISC2 SSCP, ISC2 CCSP, ISC2 ISSEP, ISACA, CISM, CISA, ISC2, EC-COUNCIL CEH, CompTIA Security+, CompTIA Network.
RemoteExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience in using vulnerability management tools (Tenable, Nessus) be able to take active ownership of administration and operations. Should have good knowledge in firewalls (PA, Cisco, CheckPoint), ID/IPS, AV/EDR (CrowdStrike, SentinelOne), MS Azure, O365 Security & Compliance, AD, etc.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of eGRC applications such as RSA Archer. Develop, design, and maintain dashboards and analytics with client-provided tools and integrate with existing governance, risk, and compliance (GRC) tools to collect, refine, and prepare data for analytics and visualization.
ExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience working with security control assessment tools such as ACAS / Tenable Nessus, SCAP Compliance Checker, and eMASS. Running security scans using products like Tenable Nessus.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Author vulnerability management guidelines, processes, policies, and standards. Manage the Vulnerability Management program as a leader and subject matter expert. Proven experience in security operations, vulnerability management, or a similar position.
ExpandApply NowActive JobUpdated 6 days ago
nessus tenable jobs
FEATURED BLOG POSTS
Virtual Reality Job Interviews
With the advent of desktop computers, the arduous task of scouring through weekly job classifieds became a thing of the past. The mid-1990s brought about a new era where job seekers could easily search and apply for jobs online. The introduction of AOL's Instant Messaging feature provided an even faster means for employers and candidates to communicate and schedule interviews. As smartphones became more pervasive in the early 2000s, hiring managers increasingly used phone calls for screening and interviewing candidates. Despite this trend, over 80% of interviews still took place in person.
A Potential TikTok Ban?!
As you may already know, there has been a lot of talk lately about the possibility of a TikTok ban. While this has not yet come to fruition, it's important to consider the implications this could have for businesses and recruiters who rely on TikTok as a platform to market their brand, recruit new talent, and connect with their audience.
The Effects of Workplace Racism and Sexism
One day it's a covert statement to a mother returning to work after maternity leave. Another day it's a lingering gaze at an employee enjoying a culturally rich meal. These microaggressions (or sometimes macroaggressions) can take an employee from a confident, high-performer to one that feels insecure being themselves at work. Your employees engage with people with different ideas and feel most comfortable and valued when they can work without losing their cultural, racial, and gender identity. While most employers know this, why have workplace racism and sexism often been neglected?
When Rage Applying Strikes: How to Identify Unserious Candidates
As the job market remains highly competitive, we have seen a surge in "rage applying." This is when candidates apply to multiple jobs, often without considering whether they are truly interested in the role. Rage applying goes hand-in-hand with quiet quitting. Often, employees want to entertain the thoughts and feelings of leaving their job, but they aren't necessarily serious about leaving yet. Meanwhile, other employees engaging in this trend are actually trying to find a better role. As a recruiter, it can be hard to identify who are the real applicants in a sea full of quiet quitters, but understanding rage applying and identifying red flags will certainly help.
How to Increase Job Ad Exposure
In today's competitive job market, writing quality job ads is critical for attracting top talent to your organization. While networking and candidate referrals are prime real estate for finding qualified candidates, nothing beats the tried-and-true method of writing an extraordinary job ad. But while writing a great job ad is the first step, what's more important is increasing visibility. You could have the most detailed, well-written ad on the internet, but if no one sees it, then you are wasting time (and potentially money!). Employers often believe that job boards are the root of the problem, but you can learn how to increase job ad exposure by tweaking a few steps of your recruitment process.
How to Navigate Hiring Out of State
The job market has shifted significantly in recent years. The accelerated adoption of technology has not only pushed many companies into remote working arrangements but also increased the availability of supporting tools and technologies (i.e., video conferencing and collaboration software).
Building a Candidate Pipeline Through Internships
Building a candidate pipeline through a great internship program for local college students and recent graduates at local universities is a great and cost-effective way to attract and retain top talent. By offering meaningful and impactful work experiences, regular feedback, coaching, and mentorship, you can create a positive internship experience that will make your organization a sought-after destination for future employees. This not only benefits the organization in the short-term but also in the long-term, as you'll have a pool of well-trained and experienced candidates who may be interested in full-time employment once they graduate. Furthermore, building relationships with local universities and college students can increase brand awareness and build a positive reputation for your organization in the local community.