- UpvoteDownvoteShare Job
- Suggest Revision
Hands-on experience developing security for Microsoft 365 (native or hybrid), Azure, and AWS. Experience with security incident response and vulnerability management, including solid understanding of various techniques used to exploit identified vulnerabilities.
$149,000 - $166,000 a yearFull-timeExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Job Title/High Level Position Summary:Senior Information Security Engineer – SOX Compliance Lead is responsible for the planning, design and build of security architectures; oversees the implementation of network and computer security and ensures compliance with corporate cybersecurity policies and procedures.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with security incident response and vulnerability management, including solid understanding of various techniques used to exploit identified vulnerabilities. Ensuring regulatory compliance is aligned with industry best practices and standards, including ongoing security assessments and responses, identity and authentication services, as well as vulnerability and patch management practices.
ExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
We’re looking for an experienced cyber mission specialist like you to apply your knowledge in cyber risk management, network security monitoring tools, and cyber testing and evaluation and impact our nation’s IT infrastructure.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Leads and contribute to all Product or Network Information Security Engineering activities pertaining to CDRLs, trade studies, security requirements analysis, secure architecture development, management & compliance with security controls, design review milestones (SRR, SDR, PDR, CDR) and security test/verification activities.
Full-timeExpandApply NowActive JobUpdated 26 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This includes: establishing or utilizing existing access control mechanisms; defining and configuring the appropriate firewall settings; conducting intrusion detection and prevention; conducting vulnerability scanning; conducting anti-virus management; and conducting the necessary incidence response actions in accordance with Sponsor security policies.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The program provides a broad range of support services, which include network architecture, network design, network engineering, project management, implementation and deployment of new services, storage engineering, network O&M, network hardware life-cycle management, tracking and management of vendor support agreements, and software licenses, procurement of hardware/software, network end-user helpdesk support, and management of network security assessments and accreditations.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Strong interface with the threat and vulnerability management, network, system administrators and desktop architecture and deployment teams. Responsible for Security Administration on a variety of security systems including endpoint and server antivirus, Data Governance, SIEM, DLP, Privileged Access Management; others as deemed appropriate.
$132,389.27 - $170,280 a yearFull-timeExpandApply NowActive JobUpdated 2 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Drive our vulnerability and incident management processes to ensure compliance with security policies. Proficiency in security engineering, computer and network security, authentication, security protocols, and applied cryptography.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Implementation, administration and maintenance of IDS/IPS, URL filter, email gateway, certificate issuance and control, network management, identity access control, and other information security infrastructure and controls as necessary.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
ServiceNow)Technical network and IT skills (e.g., IP addressing, routing)Information Security Tools (e.g., firewalls, anti-virus, web filtering, email filtering)Experience with information security policies, intrusion response procedures, disaster recovery procedures, risk analysis, and significant experience administering the operations of a complex security infrastructure.
Full-timeRemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The ideal candidate will be proficient in managing network firewalls, routing, switching, and patch/vulnerability management with a strong emphasis on automation. Experience with automation tools such as Terraform, Ansible, Git, and Github are preferredIn depth experience with monitoring and diagnosing complex network, security and systems issues using tools such as Wireshark.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Senior Information Security Engineer, Cloud Vulnerability Research. Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of technology for implementing security controls, including access control, privileged access management, data security, network security, data loss prevention, Cloud security, vulnerability management, configuration management, privacy, and audits.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Minimum of 5 years of experience with any combination of the following: mobile security, threat modeling experience, secure coding, identity management and authentication, software development, cryptography, system administration and network security.
ExpandApply NowActive JobUpdated 9 days ago
network security vulnerability management jobs Title: engineer senior information security
FEATURED BLOG POSTS
Growing Discontent: Employees Wouldn't Wish Their Jobs on Their Worst Enemy
The start of a new year, and most people are already busy setting personal and professional goals. What’s on the top of the list for a growing number of working people is making an exit from the job they currently have. Why?
How to Gracefully Quit a Job You Just Started
You’ve just started learning the ropes at your new job, and you've gotten to know your colleagues. But you’re already thinking about quitting. Maybe you were deciding between to job offers and realized that you’ve made the wrong choice. Or, a change in your personal circumstances means that you have to quit.
How to Professionally Reschedule a Job Interview Without Destroying Your Chances
You’ve practiced answering common interview questions and refined your “greatest weakness.’ Nothing can stop you until BAM! The flu hits your household. Or you ran over a nail and popped a tire en route to the interview. When you need to pivot, there’s a good, better, and best way to reschedule a job interview. Here’s how to do it professionally, so you can nail the gig when the timing is right.
What is a W-9 and How to Fill One Out
When you began working for yourself, you probably didn’t account for the tax reporting work that will fall on your shoulders each year. If you’re a freelancer, independent contractor, or business owner, filing your taxes is not as simple as uploading your W-2 form into some online tax preparation software. Most self-employed people need to complete a W-9 as a step for accurately reporting their earnings to the IRS. Below, you can learn how to fill out a W-9 and when to submit it.
Tightening the HR budget in 2023
With the state of the economy still uncertain, 2023 is expected to be approached with much anticipation. Human Resource leaders have many concerns, including how they will manage to accomplish their goals with budget belts already getting snug. Let’s look at some of the factors that the new year is projected to bring for HR and how to prioritize budgets to reach human capital objectives.
A Comprehensive Guide to Becoming a Better Conversationalist
Have you ever stood awkwardly next to someone at a party because you didn’t know what to say to them? How about at a networking event or on a first date? You're not alone if you’ve ever experienced this uncomfortable silence. Many people struggle to master the art of being a great conversationalist.
Why is Non-Verbal Communication Really Important?
In a world where words and phrases rule daily communication, you may wonder why non-verbal communication is important. Whether you realize it or not, you communicate more with nonverbal actions than you do with verbal communication. When you interact with your peers, people are reading your body language, facial expressions, voice, and many other factors that help fill in blanks that words can't fill.