- UpvoteDownvoteShare Job
- Suggest Revision
Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP) are preferred.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
CISSP, GIAC, CISSP, CEH, OSCP, or equivalent certifications a plus. Take lead in performing security testing of applications, networks and infrastructures, including vulnerability assessments, penetration testing and manual testing techniques.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Preferred certifications include: Offensive Security Certified Professional (OSCP), Offensive Security Certified Expert (OSCE), GIAC Penetration Tester Certification (GPEN), GIAC Experienced Penetration Tester (GX-PT), GIAC Certified Red Team Professional (GRTP), GIAC Security Operations Certified (GSOC), GIAC Security Expert (GSE), etc.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
3-5 years of experience in vulnerability management and remediation. Certifications such as OSCP, PNPT, eJPT are a plus. Solid experience in vulnerability management and remediation.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
3+ years of information security experience including experience in one or more of the following security disciplines: information security monitoring, incident response, vulnerability management, host/network forensics, cyber-crime investigation, penetration testing, business continuity, or cyber threat intelligence.
$84,000 - $179,200 a yearFull-timeRemoteExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Security certifications such as CISSP, GIAC/GCFA, CCSP, GIAC, OSCP etc., and cloud security certifications such as CCSP and other public cloud certifications (Azure) are desirable. Extensive experience with Threat and Vulnerability Management on critical production systems.
$90,000 - $210,000 a yearFull-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Current information security certification (e.g., CISSP, Security +, CEH, OSCP, GCIA etc.) Experience in using Veracode, Inspector, Tenable or similar code and vulnerability scanning tools.
Full-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Hands-on experience designing and deploying security controls across all security domains, such as access management, data protection, vulnerability management, incident response and management, application security, network security, preventive, detective, and offensive security solutions.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Manage and mature the security assessment and vulnerability management programs. This position is hands-on and includes performing security risk assessments on new and current technologies, analysis and reporting on vulnerabilities as part of the overall vulnerability management function, collaboration with Security Architecture on projects, and consulting to provide subject matter expertise.
Full-timeExpandUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
This includes Vulnerability Management, managing a Bug Bounty Program, Penetration Testing, and Red Teaming. Holds a CISSP/OSCP certification. Knowledge in Container Image Security, Vulnerability Management, Dependency Checking, Fuzzing and License Scanning.
Full-timeExpandUpdated 20 days ago - UpvoteDownvoteShare Job
- Suggest Revision
7+ years of experience with Vulnerability Management. Research on the negative effects of a vulnerability, from minimizing the impact to altering security controls for future prevention.
Full-timeExpandUpdated 12 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Research experience in two or more of the following: threat intelligence, IAM, key management systems, data security, application security, web application and browser security, security protocols, operating system internals and hardening (e.g., Windows, Linux, OS X, Android), network security, vulnerability management, penetration testing, or applied cryptographic concepts.
$140,000 - $300,000 a yearFull-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Holding one or more of the following certificates is a plus: CISSP, CISA, CISM, CCSP, SSCP, OSCP, CEH, CCFA, GIAC/SANS certificates, Splunk certificates, Azure certificates, LPIC-X. Explore more InfoSec / Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
OSCP and/or OSCE. CPT, CMF, JFHQ-C or Service Cyber Component experience beneficial. The individual shall perform computer network defense (CND) incident triage, to include: Determining urgency, and potential impact; Identifying the specific vulnerability; and making recommendations that enable expeditious remediation; Perform initial, forensically sound collection of images and inspect to determine mitigation/remediation on enterprise systems; Perform real-time computer network defense (CND) incident handling (e.
Full-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Must be very proficient with the common tools associated with red teaming, penetration testing, and vulnerability assessments (Metasploit, Burp Suite, Cobalt Strike, Kali, etc. This is a highly technical role that requires broad technical knowledge and a deep understanding of threats and threat TTPs. You will lead and participate in advanced technical assessments that leverage red team, penetration testing, and vulnerability assessment tools and techniques to identify hi-risk vulnerabilities across a variety of technologies.
Full-timeExpandApply NowActive JobUpdated 3 days ago
oscp vulnerability jobs
FEATURED BLOG POSTS
How to Conduct a Performance Review (With Examples)
In a world where the smallest mistake can cost your business tens of thousands in lost revenue, your talent is key to keeping your edge on the market and driving growth. However, managing a workforce of any size can be a challenge. Employees come with their own particular skill set, ambitions and flaws. So, it can be difficult to uncover their individual drivers. Not to mention the challenges brought on by the hybrid and remote working models where in-person interactions have become few and far between.
How to Recruit Passive Candidates
Learning to recruit passive candidates is a different ballgame than recruiting active ones. While an active candidate is someone who is currently looking for a new job, a passive candidate tends to be the opposite. Passive candidates are either already working or not looking to work. So, instead of these candidates coming to you, you'll have to find them and reach out to them first.
How to Effectively Recruit Employees
Today, hiring and retaining talent looks much different than it did only two or three years ago. Financial instability and the strain on our mental health brought on by the pandemic has made everyone more wary and selective of their workplace and employer. Whereas in the past people might have prioritized promotions and financial reward, today they look at other factors such as workplace flexibility, personal fulfillment and values alignment.
How Many Hours is Part-Time vs. Full-Time Work?
Growing up you watched your parents shuffle to and from the office, held hostage to their 9 to 5. If jammed-packed schedules and deadlines sound frightening, you might consider pivoting your search to part-time jobs. In fact, even employers have shifted their preference, selecting more people open to the idea of flexible working hours.
How to Make a Job Offer More Competitive
Money alone makes it hard to attract and retain top-notch candidates, especially when you are competing with larger businesses and corporations in your industry. So, instead of focusing on money, figure out how to make a job offer more competitive when you can't offer more money.
5 Ways to Stretch Your Hiring Budget
Many businesses across the country have adjusted business operations to make it through the pandemic. After a period of hardship, many business owners, like yourself, are ready to start recruiting and rebuilding a bigger, more skilled workforce - only now you have to do it with a smaller hiring budget.
How to Ask for a Raise at Work
Here we go again; it’s time to talk money. Whether you’re one year in at a new company or approaching year five on the same team, learning how to ask for a raise should be part of your long-term career plan. These conversations are rarely fun (thanks to society, which has conditioned us to believe that money is taboo), but they are necessary if you want to, well, get paid what you’re worth. Trust us, there’s a lot of money on the table for taking. Below, we’ll discuss tips on timing, approach, and follow-up.