- UpvoteDownvoteShare Job
- Suggest Revision
Strong Hands on Security Tooling and Cloud experience - Cloud Security, Vulnerability Management, Malware Detection/ Analysis, SIEM, DLP, CASB, SASE, ZTNA, Privilege Access, DAST, WAF, IPS/IDS, Firewall, Email Security.
$190,000 - $250,000 a yearFull-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Previous Experience with several technical security disciplines such as System Information Event Management systems (SIEM), vulnerability management or security hardening (Required.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This role centers on corporate resilience, holding accountability for evaluating clients’ crisis management, threat assessment, and physical security requirements. Independently produce high-quality corporate security and resilience deliverables such as threat, risk, and vulnerability assessments, threat intelligence briefings, corporate security and security programs, and corporate standards, policies, and procedures.
$130,000 - $160,000 a yearFull-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Other preferred certifications: CompTIA Secure Infrastructure Specialist (CSIS), Qualys Certified Specialist – Vulnerability Management. Wanted: An experienced Senior Security Engineer with demonstrated ability to bring extensive experience and training in information security management into a customer’s organization.
$106,000 - $177,000 a yearFull-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Security tools: Microsoft 365 E5 Suite, Tenable/Nessus vulnerability management, a SIEM, Logmonitor. Ensuring the stability, availability, performance and security of the enterprise network; including, but not limited to, internal/external network security, vulnerability scanning, patching and remediation, software/firmware updates, server class operating systems, managing cloud services and other duties as assigned.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Manage and mature the security assessment and vulnerability management programs. This position is hands-on and includes performing security risk assessments on new and current technologies, analysis and reporting on vulnerabilities as part of the overall vulnerability management function, collaboration with Security Architecture on projects, and consulting to provide subject matter expertise.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Understanding of multiple Information Security domains, such as Identity & Access Management, Infrastructure Vulnerability Management, Network Security, Data Loss Prevention, End User Security, etc.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
5-7 years of experience in application security and secure software development, with a strong background in secure code development, vulnerability management, and security assessments.
Full-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of design, implementation, and maintenance of: security incident and event management (SIEM), firewalls, Active Directory, group policy, vulnerability scanning, encryption, IDS/IPS, web filtering, LDAP, multi-factor authentication, data loss prevention, anti-virus, email filtering, exploits and hacker techniques, cybersecurity threat hunting, and network and operating system security principles.
$44.64 - $52.45 an hourExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Conduct risk and security assessments through vulnerability analysis, patch management and mitigation. Configure, manage and administer Information Security technologies and platforms, such as Web and Email Security, SIEM, IDS/IPS, Endpoint Security, Firewalls, Web Content filters/proxies, Multi-Factor Authentication, Data Loss Prevention and Vulnerability scanners.
Full-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Information Security Analyst IV is the information security subject matter export and a key member of the Patch Management Program, providing exploit and vulnerability analysis and the investigation and testing of exploits and building remediation following Patch Management processes.
$75,000 a yearFull-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Security Analyst is responsible for departments vulnerability management program, administers the annual cybersecurity assessments and penetration tests, and researches and reports on emerging threats to help the department take pre-emptive risk mitigation steps.
Full-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
The successful candidate will have experience with SIEM tool(s), EDR, Email Security, Vulnerability Management, and PCI. Experience securing more than one IT domain such as Workstations, servers, smartphone and tablet, application security, SAN’s, virtual servers, high-availability systems and solutions, network security, security analytics, data security, compliance management, database security, intrusion prevention/detection is preferred.
ExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Maintain vulnerability scanning tool compliance, such as HBSS or ACAS, and patch management, such as IAVM to ensure IT staff pushes patches to all systems in an effort to maintain compliance with all applicable directives, manage system changes, and assess the security impact of those changes.
Full-timeExpandApply NowActive JobUpdated 1 month ago
security management vulnerability jobs
FEATURED BLOG POSTS
5 Ways to Stretch Your Hiring Budget
Many businesses across the country have adjusted business operations to make it through the pandemic. After a period of hardship, many business owners, like yourself, are ready to start recruiting and rebuilding a bigger, more skilled workforce - only now you have to do it with a smaller hiring budget.
How to Ask for a Raise at Work
Here we go again; it’s time to talk money. Whether you’re one year in at a new company or approaching year five on the same team, learning how to ask for a raise should be part of your long-term career plan. These conversations are rarely fun (thanks to society, which has conditioned us to believe that money is taboo), but they are necessary if you want to, well, get paid what you’re worth. Trust us, there’s a lot of money on the table for taking. Below, we’ll discuss tips on timing, approach, and follow-up.
Technology in the Workplace: How to Improve your HR Function with AI
It’s safe to say that the last two years have brought fundamental changes to the way we work and do business. Companies have relied on technology in the workplace to digitize their services and build a remote-friendly infrastructure that could prepare them for the future.
How to Maximize Action Verbs in Your Resume
Writing a resume that stands out takes more than using keywords and savvy formatting. It’s not just about having an impressive list of accomplishments. It’s also about how you position them using action verbs and deliberate word choice. So if you are looking for a way to craft a resume that stands out and gets calls back? Start by sprucing up your resume with captivating action verbs.
What is Your Desired Job Title?
You’ve decided to look for a new job. So now comes the question — what is your desired job title? There are lots of considerations to think through when deciding on the right title for your next role.
4 Things to Consider When Building a Global Workforce
The rise of remote work has given employers a unique chance to rethink how they approach workforce management. This ranges from rethinking the size and design of their office space to updating their tech stack to accommodate different working styles. It has created new opportunities for companies of all sizes to expand their hiring pool and look for top talent on a global scale.
Operations Job Titles for Entry, Mid, and Senior-Level Positions
An operations team can take on many functions within a business. With wide-ranging responsibilities come wide-ranging job titles. This means that you have to be more vigilant in your job search. On one hand, the perfect job might be hidden under a title you might not expect. Meanwhile, operations titles that you’re used to looking at may mean something different at a given organization depending on their structure.