- UpvoteDownvoteShare Job
- Suggest Revision
Manage and mature the security assessment and vulnerability management programs. This position is hands-on and includes performing security risk assessments on new and current technologies, analysis and reporting on vulnerabilities as part of the overall vulnerability management function, collaboration with Security Architecture on projects, and consulting to provide subject matter expertise.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
CISSP, GIAC, CISSP, CEH, OSCP, or equivalent certifications a plus. 10+ years in security and/or risk assessment/management related fieldHands on experience with testing frameworks such as the PTES and OWASPApplicable knowledge of Windows client/server, Unix/Linux systems, Mac OS X, VMware/Xen, and cloud technologies such as AWS, Azure, or Google CloudIn-depth knowledge of security concepts such as cyber-attacks and techniques, threat vectors, risk management, incident management etc.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Experience in one or more of the following technologies preferred: endpoint detection and response (EDR), vulnerability scanners, static and dynamic source-code analysis, SIEM, privileged access management (PAM), network technologies, cloud hosting platforms, IoT search engines, OSINT tools, etc.
ExpandUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
3-5 years of experience in vulnerability management and remediation. Solid experience in vulnerability management and remediation. Certifications such as OSCP, PNPT, eJPT are a plus.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
3+ years of information security experience including experience in one or more of the following security disciplines: information security monitoring, incident response, vulnerability management, host/network forensics, cyber-crime investigation, penetration testing, business continuity, or cyber threat intelligence.
$84,000 - $179,200 a yearFull-timeRemoteExpandApply NowActive JobUpdated 19 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Hands-on experience designing and deploying security controls across all security domains, such as access management, data protection, vulnerability management, incident response and management, application security, network security, preventive, detective, and offensive security solutions.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Extensive experience with Threat and Vulnerability Management on critical production systems. Security certifications such as CISSP, GIAC/GCFA, CCSP, GIAC, OSCP etc., and cloud security certifications such as CCSP and other public cloud certifications (Azure) are desirable.
$90,000 - $210,000 a yearFull-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Security Engineer oversees and provides direction, and development for the security assessment and vulnerability management programs. Six (6) years of direct work experience in security assessments, vulnerability management, or similar.
Full-timeExpandUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
This includes Vulnerability Management, managing a Bug Bounty Program, Penetration Testing, and Red Teaming. Knowledge in Container Image Security, Vulnerability Management, Dependency Checking, Fuzzing and License Scanning.
Full-timeExpandUpdated 22 days ago - UpvoteDownvoteShare Job
- Suggest Revision
7+ years of experience with Vulnerability Management. Holds a CISSP/OSCP certification. Research on the negative effects of a vulnerability, from minimizing the impact to altering security controls for future prevention.
Full-timeExpandUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The perfect candidate will possess extensive experience in CI/CD pipeline security, product and application architecture reviews, contextualized vulnerability management processes, and automation.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Support the application vulnerability management and mitigation approaches. Certifications in the domain of penetration testing or application security (e.g. OSCP, OSWE, GWAPT, Hundreds of thousands of developers around the globe trust Mattermost to increase their productivity by bringing together team communication, task and project management, and workflow orchestration into a unified platform for agile software development.
$150,000 - $240,000 a yearFull-timeRemoteExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Research experience in two or more of the following: threat intelligence, IAM, key management systems, data security, application security, web application and browser security, security protocols, operating system internals and hardening (e.g., Windows, Linux, OS X, Android), network security, vulnerability management, penetration testing, or applied cryptographic concepts.
$140,000 - $300,000 a yearFull-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Explore more InfoSec / Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Validate ideas and share insights with Product Management/Marketing on product direction and industry trends for security audiences. The company serves over 800 customers, including European Parliament, NASA, Nasdaq, Samsung, SAP, United States Air Force and Wealthfront, and is backed by world-class investors including Battery Ventures, Redpoint, S28 Capital, YC Continuity.
$150,000 - $240,000 a yearFull-timeRemoteExpandApply NowActive JobUpdated Today
oscp vulnerability management jobs
FEATURED BLOG POSTS
5 Common Interview Mistakes
Everyone's interview process is unique in some form or fashion. Like most, your interview process is crafted so you can get the most information out of your candidates to increase hiring confidence and make the right hiring decisions. However, there are often small problems in interview processes that could ultimately affect the success of hiring decisions.
How to Get a W2 From Previous Employers
When tax time rolls around, the last thing you want to worry about is having to track down a W-2 from your former employer. Many times you won’t have to because the IRS requires companies to send these forms to all current and former employees who have earned more than $600 in the last year. Unfortunately, there are employers who don’t do what they’re supposed to. There are even times where something else may happen that prevents the W-2 from getting where it’s supposed to go.
How to Ask Someone to be a Reference + Email Templates
One part of the job-hunting process that frequently gets overlooked is putting together a list of good references. Most of the time we focus on creating the perfect resume, writing an awesome cover letter, and getting our hands on letters of recommendation. We think about what outfit we’ll wear to the job interview, how we’ll answer those tricky questions, and what our career plan looks like. But, in fact, having multiple references lined up who will speak favorably about you to a potential employer is critical to landing a job. This aspect of job searching really can’t be ignored.
Job Rejection Email Response with Examples
Glassdoor estimates that, on average, there are about 250 applicants for every job vacancy out there. If you’ve ever applied for a job, the odds are that you’ve received the dreaded job rejection email.
Structured vs Unstructured Interviews
The goal of an interview is to evaluate candidates based on their skills, personality, and knowledge. You want to choose the BEST candidate from your candidate pool, so the interview is something you can't mess up. As you begin planning your interview process, one of the major decisions you'll face is whether the interview should be a structured vs unstructured interview. So let's take a dive into the differences and sort out which circumstances warrant which interview process.
How to Describe Your Personality with Examples
Imagine you’re in an elevator with the CEO of your dream company and you get to talking. The conversation is going well and you start to imagine yourself working for their company when the CEO turns around and asks you “tell me a bit about yourself.” Would this catch you off guard or would you be able to give a clear and succinct description of who you are?
4 Ways to Make Your Job Posting More Inclusive
According to a Glassdoor survey,