- UpvoteDownvoteShare Job
- Suggest Revision
Network Vulnerability Scanning (e.g. Nessus/Tenable). OS Hardening and Security: IBM i, Linux, Mac, Windows. Maintain network, server and workstation firewall protection and provide network and application scanning, security logging, and intrusion detection capabilities.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience working in Security Engineering, Threat Response, Security Operations, IT Operations, IT Compliance and/or IT Governance. Multi-Domain Proficiency: Demonstrate expertise in multiple information security domains, including but not limited to network security, application security, cloud security, and data protection.
$94,900 - $151,600 a yearExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Collect data in support of reviewing a comprehensive Threat Informed Critical Controls List (TICCL), provide written input on review of required security controls, potential vulnerability exploitation, and how MITRE ATT&CK techniques are plausibly successful based on organizational weaknesses.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
You will specialize in hardware and software reverse engineering, vulnerability research, and developing proof-of-concept offensive cyber capabilities with a focus on cyber resiliency testing of wireless products and satellite communications systems.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
You will provide insights and guidance to customers as a vCISO as well as vulnerability management, major incident response, and security monitoring improvements and be expected to demonstrate technical expertise in Audit, Assessments, Design, Implementation, Testing, Compliance and Reporting.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Examples of projects include Telemetry Refresh, OT Site Risk and Remediation, OT Asset and Vulnerability Management, and Physical Security. Within Cyber you will be delivering projects around the enhancement of Cyber Security in OT. In the non-cyber projects, you will be making sure the solutions are secure by design (Advisor role.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of continuous monitoring, cybersecurity risk management, disaster recovery, FISMA compliance, information security architecture, information security auditing, security control assessment, threat modeling, threat management, vulnerability analysis, and vulnerability assessments.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Active Top Secret security clearance with SCI eligibility. Problem-solving skills, with a passion for automation, system efficiency, and security. Familiarity with GitLab, Big Bang tools, custom Helm Charts, and security practices in development.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Senior Information Security Analyst , you will be responsible for vulnerability management, performing NIST based risk and maturity assessments, incident response planning, and delivering security awareness training.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
You will be hands on in vulnerability management, EDR using Crowdstrike and tool implementation. Are you looking for a Senior Security Manager position? You will have a major impact on the overall security posture of the company and will even get a hand in revamping their security awareness program.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with hardware security module (HSM) technology. Ability to obtain and maintain Top Secret Security Clearance. At least one technical certificationinAzure platformthat includes: security & certificate authorities/PKI.
RemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Leverage Security Orchestration, Automation, and Response (SOAR) platforms to streamline and automate incident response processes, including enrichment, containment, and remediation actions. Strong experience with security technologies, including SIEM , IDS/IPS, EDR, and network monitoring tools.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Additionally, the Information Assurance Security Specialist should be able to perform security evaluations and vulnerability assessments using the DOD Assured Compliance Assessment Solution (ACAS), Nessus vulnerability scanning tool.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of ACAS, NESSUS, SPLUNK, SCAP, POA&Ms, NIST, DIACAP, NISPOM, system audits, vulnerability scanning, and DSS and/or JSIG system security package development are highly desirable.
ExpandApply NowActive JobUpdated Today
security vulnerability jobs
FEATURED BLOG POSTS
Collaborative Recruiting: The Key to a Better Talent Acquisition Strategy
Talent acquisition is a multi-stage process where candidates undergo various application steps before getting hired. The unfortunate reality is that it is a labor-intense system, with the hiring manager and recruiter often handling all of the work on their own. Ask any one of them, and you will hear about the overabundance of applications and the demanding task of filtering through them to find the best candidates. The quality of talent suffers under the weight of all that work on one person's hands. It's not easy, but as many companies are starting to realize, there is a better way. The future of talent acquisition lies in collaborative recruiting!
4 Talent Acquisition Trends Going Into 2023
For better or worse, a side effect of the COVID-19 pandemic was a marked shift in talent acquisition practices worldwide. With the struggle to retain talent that began in 2020, companies have had to rethink recruitment strategies. The result has been new talent acquisition trends that are well on their way to becoming commonplace. These are the practices that are going to become even more widespread going into 2023.
Why is Professionalism Important & How to Be Professional
You might have heard the word professionalism thrown around in the workplace, but do you know what it means? And do you know how to maintain professionalism no matter the circumstances?
Why Cover Letters Are Important & How To Write One | Job\Searcher
Most people completely waste their cover letter real estate. Your cover letter is another opportunity to speak directly about how your background and capabilities align with the opportunity you seek. It also allows you to introduce your personality a bit more than a resume does. So, why are cover letters important? Because you can stand out, big time, with a custom cover letter directed to the right person.
Hiring Again After Mass Layoffs
It's never an easy decision to let members of your staff go, but depending on the state of your business, mass layoffs may have been the only way to survive. Now that you're months into the future, you may find yourself itching to start hiring again after previous layoffs.
Why Are Internships Important & How Can You Get One?
Internships are for college students or people who have just completed their degree. If you are a student or recent grad, you may be wondering how to land an internship. If you've never had one, you may even wonder if you need one. After all, didn’t you work in that call center while also doing exams? Or perhaps you’ve bartended your first year in college?
Why is Networking Important & How to Network Effectively
Even if you’ve worked hard to earn a degree from an impressive school, landing your dream job might still come down to who you know – otherwise known as networking. Lots of qualified candidates might apply for a job, but the person who gets it might very well be so-and-so’s sibling, friend, or kid. Sometimes the only way to get your foot in the door is to know someone.