- UpvoteDownvoteShare Job
- Suggest Revision
Strong Hands on Security Tooling and Cloud experience - Cloud Security, Vulnerability Management, Malware Detection/ Analysis, SIEM, DLP, CASB, SASE, ZTNA, Privilege Access, DAST, WAF, IPS/IDS, Firewall, Email Security.
$190,000 - $250,000 a yearFull-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Previous Experience with several technical security disciplines such as System Information Event Management systems (SIEM), vulnerability management or security hardening (Required.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
The successful candidate will have experience with SIEM tool(s), EDR, Email Security, Vulnerability Management, and PCI. Operational experience in information security tools including SIEM (Splunk preferred), EDR tools (CrowdStrike preferred), Email Security tools (Proofpoint preferred.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Security tools: Microsoft 365 E5 Suite, Tenable/Nessus vulnerability management, a SIEM, Logmonitor. Management tools: Intune, Configuration Manager, Citrix. Ensuring the stability, availability, performance and security of the enterprise network; including, but not limited to, internal/external network security, vulnerability scanning, patching and remediation, software/firmware updates, server class operating systems, managing cloud services and other duties as assigned.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Configure, manage and administer Information Security technologies and platforms, such as Web and Email Security, SIEM, IDS/IPS, Endpoint Security, Firewalls, Web Content filters/proxies, Multi-Factor Authentication, Data Loss Prevention and Vulnerability scanners.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of design, implementation, and maintenance of: security incident and event management (SIEM), firewalls, Active Directory, group policy, vulnerability scanning, encryption, IDS/IPS, web filtering, LDAP, multi-factor authentication, data loss prevention, anti-virus, email filtering, exploits and hacker techniques, cybersecurity threat hunting, and network and operating system security principles.
$44.64 - $52.45 an hourExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Provide architecture-level design and implementation support by building, operating, and developing or maintaining a Splunk log management, threat, and vulnerability management infrastructure using Security Information and Event Management (SIEM) tooling and best practices.
Full-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Security Information and Event Management (SIEM) As the Manager of Cybersecurity (Vulnerability and Application Security), you will play a key role in ensuring the security and integrity of our digital assets and IT systems.
$147,900 - $184,900 a yearFull-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience building vulnerability scanning, endpoint security, network security, and SIEM/SOAR solutions in federal or large commercial enterprise environments. Strong knowledge and hands-on experience in secure enterprise architecture engineering and related operational support, with specializations in various combinations of tools and technologies within the following subset: Firewall/VPN, ACAS, HBSS, C2C, IAM, NDR, EDR, SIEM/SOAR, AI/ML, or other cybersecurity tools and resultant applications.
Full-timeExpandApply NowActive JobUpdated 2 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Integrate and configure security tools, such as SIEM (Security Information and Event Management) systems, intrusion detection systems, and vulnerability scanners, for continuous monitoring and threat detection.
ExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Proficiency in security technologies such as SIEM (Security Information and Event Management) systems and endpoint protection solutions Experience with security monitoring tools, log analysis, and incident response procedures in Azure environments.
RemoteExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Expert knowledge of identity management, IDS, SEM/SIEM, WAF. Install and maintain security management and monitoring tools in corporate and production environments, including vulnerability scanning, SEIM, IDS, etc.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Executes threat intelligence reports, threat, vulnerability, and incident management processes to help ensure cybersecurity risks and threats are proactively identified and addressed to maintain the protection of information and information systems.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
In course of regular job duties, the selected candidate will gain exposure to many different enterprise-grade security technologies, which perform critical functions such as vulnerability scanning, malware detection, network intrusion prevention, firewall blocking, enterprise-wide incident response, and security information and event management (SIEM.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Experience in one or more of the following technologies preferred: endpoint detection and response (EDR), vulnerability scanners, static and dynamic source-code analysis, SIEM, privileged access management (PAM), network technologies, cloud hosting platforms, IoT search engines, OSINT tools, etc.
ExpandApply NowActive JobUpdated 3 days ago
siem vulnerability management jobs
FEATURED BLOG POSTS
5 Common Interview Mistakes
Everyone's interview process is unique in some form or fashion. Like most, your interview process is crafted so you can get the most information out of your candidates to increase hiring confidence and make the right hiring decisions. However, there are often small problems in interview processes that could ultimately affect the success of hiring decisions.
Job Rejection Email Response with Examples
Glassdoor estimates that, on average, there are about 250 applicants for every job vacancy out there. If you’ve ever applied for a job, the odds are that you’ve received the dreaded job rejection email.
Structured vs Unstructured Interviews
The goal of an interview is to evaluate candidates based on their skills, personality, and knowledge. You want to choose the BEST candidate from your candidate pool, so the interview is something you can't mess up. As you begin planning your interview process, one of the major decisions you'll face is whether the interview should be a structured vs unstructured interview. So let's take a dive into the differences and sort out which circumstances warrant which interview process.
How to Describe Your Personality with Examples
Imagine you’re in an elevator with the CEO of your dream company and you get to talking. The conversation is going well and you start to imagine yourself working for their company when the CEO turns around and asks you “tell me a bit about yourself.” Would this catch you off guard or would you be able to give a clear and succinct description of who you are?
4 Ways to Make Your Job Posting More Inclusive
According to a Glassdoor survey,
How to Calculate Net Income
Understanding your finances can be daunting even if you’re good with numbers. Your net income, in particular, is a key metric for determining how well you’re doing financially and whether your current way of operating is sustainable or not.
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra: