- UpvoteDownvoteShare Job
- Suggest Revision
Certification in at least one of the following within one year of hire: Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA), Offensive Security Certified Professional (OSCP), or Certified Information Systems Security Professional (CISSP.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Preferred, but not required - one or more relevant certifications such as Offensive Security Web Assessor (OSWA), Offensive Security Web Expert (OSWE), Offensive Security Certified Professional (OSCP), Burp Suite Certified Practitioner, or AWS Certified Security Specialist.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
OSCP, OSWE, GXPN, GWAPT, GPEN (preferred but not required)Strong communication skills with the ability to articulate and translate security and risk management terminology in business terms. Certifications in Security+, Network+, GISF, GSEC, CISSP, CCSP, or GPEN, Master’s degree in Computer Science, Information Technology, Engineering, Information Systems, Cybersecurity, or related area and 2 years’ experience leading information security or cybersecurity projects.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Possess an intermediate to expert level Cyber centric industry certification such as a CYSA+, CASP+, OSCP, GCIH, CISA, CISM, or CISSP.Operating System experience to include a fundamental understanding of common security best practices or industry standard baselines such as those developed by the Center for Information Security (CIS) or the Defense Information Systems Agency (DISA.
$81,250 - $146,875 a yearFull-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Possession of industry-recognized certifications pertaining to application/offensive security (OSCP, OSCE, OSWP, OSWA, OSWE, CSSLP). Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
CISSP or GSEC or SSCP or CEH or OSCP or CCSP or MS-500 or AZ-500 Other Security Certifications preferred. Security+ or CySA+ or CASP+ or PenTest+ Comptia Security Certification preferred. CISSP or GSEC or SSCP or CEH or OSCP or CCSP or MS-500 or AZ-500 Other Security Certifications preferred.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Desirable) CISSP (+ ISSAP), CCSP, CEH, OSCP, CSSLP. Preferred: CCSP, OSCP. Desirable) CISSP (+ ISSAP), CCSP, CEH, OSCP, CSSLP. Position- Information Security Analyst Remote. Information Security Analyst will partner closely and collaboratively with Enterprise Architecture (EA), Developers, Platform Owners, and other areas of the firm to help ensure Freddie Mac provides secure services and solutions.
RemoteExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Must Have: 3+ Threat models, Strong understanding of access controls and authentication mechanisms, PKI, and cryptography. Strong understanding of access controls and authentication mechanisms, PKI, and cryptography.
RemoteExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Work with the InfoSec functional teams in the development of the Information Security strategy and roadmap, including and with focus on Threat Modeling; liaison and consult with Enterprise Architecture, IT and the business for ongoing input and awareness.
RemoteExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Develop training material for how to engage the Threat Management service, make use of technologies, and interpret findings. Knowledge in one or several of the following Frontend frameworks; React, Angular, Ember, Vue.
RemoteExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Industry recognized security certification: CCSP/CISSP/GIAC/OSCP/ Industry recognized security certification: CCSP/CISSP/GIAC/OSCP/ Knowledge of Disk, file, device and database encryption, and Key management/Public Key Infrastructure (PKI), Secure information storage, Logging, monitoring, and security event management, and application programming/scripting languages (C, Java, Perl, Shell.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience in Federal Government, DOD or Law Enforcement in CND, IR or SOC roleCyber Kill Chain KnowledgeAbility to script in one more of the following computer languages Python, Bash, Visual Basic or PowershellOne of the following certs: CCNA, CCNP, CCSP, CEH, CNDA, DCITA, ECES, ECSA, ECSP, ECSS, ENSA, GCIA, GCIH, GISF, GNFA, GPPA, GWEB, LPT, OSCP, OSEE, SEI, CCISO.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
One or more of the following certifications: OSCP, CEH, GIAC, GCIH, GCFA, GREM. One or more of the following certifications: OSCP, CEH, GIAC, GCIH, GCFA, GREM. Develop expertise on the Capital One threat landscape using internal data, threat trends, and operational metrics to clearly communicate the Capital One threat landscape to senior executives, to include the Chief Information Security Officer and Chief Information Officer.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Industry certifications highly desired, such as OSCP and CISSP. The Cyber Security Engineer (WASA) Specialist requires experience in performing web application security assessments and penetration tests using security tools such as nMap, Burpsuite, SQLMap, etc., as well as being knowledgeable in testing methodologies.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
OSCP, OSWE, OSWP, CEH, CISSP, or similar industry-recognized certification is preferred. Be responsible for executing and driving security posture validation, application testing, Penetration testing and the management of vulnerabilities on systems within the client's networks.
ExpandApply NowActive JobUpdated 4 days ago
oscp job
FEATURED BLOG POSTS
How to Avoid a Bad Hire
"A new employee who doesn't meet the minimum performance, quality, and culture fit standards you set when you began sourcing and recruiting. Additionally, bad hires will immediately show signs of self-interest instead of an interest in their role and the company."
How to Ask for a Letter of Recommendation
When the job board you subscribe to finally posts your dream job, you may feel like the stars have aligned. But part of securing a position that matches your career plan is ensuring you address all the application basics. You know, the resume, the cover letter, the portfolio. It seems like you've got this in the bag — until you realize they want a letter of recommendation, too!
What Are SMART Goals?
When it comes to achieving our goals, there’s a lot of noise to work through. A study by the University of Scranton has found that only 8% of people who set New Year’s resolutions actually achieve them. Our busy lives might be one reason for this. Another, even more important reason, is our approach to goal setting. Being too vague, too ambitious or simply unclear on the timeframe can set us up for failure.
How to Conduct a Performance Review (With Examples)
In a world where the smallest mistake can cost your business tens of thousands in lost revenue, your talent is key to keeping your edge on the market and driving growth. However, managing a workforce of any size can be a challenge. Employees come with their own particular skill set, ambitions and flaws. So, it can be difficult to uncover their individual drivers. Not to mention the challenges brought on by the hybrid and remote working models where in-person interactions have become few and far between.
How to Recruit Passive Candidates
Learning to recruit passive candidates is a different ballgame than recruiting active ones. While an active candidate is someone who is currently looking for a new job, a passive candidate tends to be the opposite. Passive candidates are either already working or not looking to work. So, instead of these candidates coming to you, you'll have to find them and reach out to them first.
How Many Hours is Part-Time vs. Full-Time Work?
Growing up you watched your parents shuffle to and from the office, held hostage to their 9 to 5. If jammed-packed schedules and deadlines sound frightening, you might consider pivoting your search to part-time jobs. In fact, even employers have shifted their preference, selecting more people open to the idea of flexible working hours.
How to Make a Job Offer More Competitive
Money alone makes it hard to attract and retain top-notch candidates, especially when you are competing with larger businesses and corporations in your industry. So, instead of focusing on money, figure out how to make a job offer more competitive when you can't offer more money.