- UpvoteDownvoteShare Job
- Suggest Revision
Minimum 2 years' experience leveraging modern information security tools and tactics such as EDR, XDR, NDR, SIEM, IDS/IPS, DF/IR, Vulnerability Management required. Strong understanding of Information Security principles and tools (firewalls, intrusion detection, endpoint detection and response, digital forensics, incident response, IAM, etc.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
Full-timeExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Must have demonstrated the ability to tune the SIEM event correlation rules and logic to filter out security events associated with known and well-established network behavior, known false positives, and/or known errors.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Provide legal advice and strategic counsel on vulnerability management, application security, identity and access management, and other cyber security engineering and data protection initiatives.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Controls and processes include but are not limited to: incident response, asset inventory, vulnerability management, patch management, application security, logging and monitoring, findings governance and remediation, identity and access management, configuration management, and change management.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Security, network security, application security and vulnerability management. 6+ years working in information security and/or third-party risk management, with experience in a technical setting.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Hands-on experience with security tools, frameworks for cloud platforms (e.g., AWS, Azure, GCP), and technologies (e.g., firewalls, encryption, identity and access management, vulnerability scanning, penetration testing.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Team personnel provide front line response for digital forensics/incident response (DFIR) and proactively hunting for malicious cyber activity. Ability to author cyber investigative reports documenting digital forensics findings.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience working with Security Information Event Management (SIEM), Email Security Gateway, Continuous Monitoring, Intrusion Detection/Prevention Systems (IDS/IPS), Network Traffic Analysis, Incident Response, Endpoint Security Systems, Digital Forensics, WLAN Monitoring, Threat Hunting, Threat Modeling and Offensive Security.
$88,300 - $139,000Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Reporting directly to the Senior Manager of Security Operations and Threat Intelligence in Procore’s Cyber Fusion Center with the opportunity to be located in the Austin, TX office or work remotely from Austin, TX.
$134,800 - $185,350 a yearExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
In-depth experience with various cybersecurity techniques and principles, such as Security Operations Center and SIEM, forensics, threat hunting, penetration testing, and threat intelligence.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
8+ years of experience and BS Computer Science, Cybersecurity, Computer Engineering or related degree; or HS Diploma and 10+ years of host or digital forensics and network forensic experience.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Conduct proactive penetration testing, vulnerability assessments, and red team exercises across our digital landscape to identify and mitigate potential security threats before they become incidents.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
CALIBRE Systems Inc., an employee-owned Management Consulting and Digital Transformation Company is seeking a Vulnerability Assessment Analyst (Mid-level) that will perform assessments of systems and networks within a Government enclave and identify where those systems/networks deviate from acceptable configurations, enclave policy, or local policy.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Operate and maintain IT Security controls related to SIEM, DLP, Vulnerability Management, Cyber Threat Intelligence, Endpoint Protection, etc with an emphasis on cloud deployments and implementations.
ExpandApply NowActive JobUpdated Today
network security vulnerability management digital forensics jobs Title: engineer senior cyber security
FEATURED BLOG POSTS
Minimizing Candidate Renegs During the Hiring and Onboarding Process
Candidates reneging on job offers or during the onboarding process can be a frustrating experience for any recruiter. In a talent-driven job market, it’s common for candidates to have more than one job offer to consider. It becomes a race against time to see which organization can offer the best career experience, compensation, and circumstances that secure the right employees.
10 Reasons to Be on Time at Work
Being punctual at work may not be something you’ve given much thought to, but it’s the foundation for building a successful career. All of your technical or job-specific skills will be in vain if your peers and superiors can’t trust you to show up on time and do the work. In fact, Simon Sinek once famously said that
Recruiting in a Recession: Hard Truths That Talent Acquisition Experts Must Accept
The summer had economists from around the globe embroiled in a debate about a possible recession coming in the next few years (or months). As of October 2022, the U.S. Labor Department data put the current inflation rate at 7.7%. The recent layoffs in the tech industry are just the first of what is soon to be a string of cutbacks by companies looking to save costs. For recruiters, this means freezes in hiring and fewer openings. It will also include the uphill task of finding the best candidates for them from the coming influx of recently laid-off job seekers. Now is probably a good time to brace for tough times in the next few years in the talent acquisition industry. To survive and thrive recruiting in a recession, here are some hard truths you will need to accept.
10 Importancies of Setting Realistic Goals
We’ve all heard how important it is to set professional and personal goals. Developing and establishing goals keeps us motivated and moving forward in life. But not all goals are created equal. If you’re chasing goals that are too lofty, you’ll end up disappointed when you cannot reach them. Setting goals that are achievable and measurable is the key to success.
Email Etiquette Principles - Why is it Important
Why is email etiquette important? Let's imagine you're hiring for a new role, and you’ve just received the email below.
10 Reasons HR is Important to an Organization
"Nothing we do is more important than hiring and developing people."
Collaborative Recruiting: The Key to a Better Talent Acquisition Strategy
Talent acquisition is a multi-stage process where candidates undergo various application steps before getting hired. The unfortunate reality is that it is a labor-intense system, with the hiring manager and recruiter often handling all of the work on their own. Ask any one of them, and you will hear about the overabundance of applications and the demanding task of filtering through them to find the best candidates. The quality of talent suffers under the weight of all that work on one person's hands. It's not easy, but as many companies are starting to realize, there is a better way. The future of talent acquisition lies in collaborative recruiting!