- UpvoteDownvoteShare Job
- Suggest Revision
Recommends security monitoring solutions to meet Information Assurance (IA) requirements for RMF.· Guides projects and programs through successful assessment and authorization of system components for Authority to Operate (ATO.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with security assessment tools and techniques, such as vulnerability scanning, penetration testing and threat modeling. Relevant cybersecurity certifications (e.g., CISSP, CISM, CEH) are a plus.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
10+ years in security and/or risk assessment/management related fieldHands on experience with testing frameworks such as the PTES and OWASPApplicable knowledge of Windows client/server, Unix/Linux systems, Mac OS X, VMware/Xen, and cloud technologies such as AWS, Azure, or Google CloudIn-depth knowledge of security concepts such as cyber-attacks and techniques, threat vectors, risk management, incident management etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Drive ecosystem threat modeling, risk assessment, and penetration testing and advise on proper mitigations. Industry certifications, such as Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), GIAC Security Essentials (GSEC), Certified Information Security Manager (CISM), or other.
ExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Industry certifications (CISSP, CompTIA Security +, CEH, CCSP, Microsoft certifications) will be considered a strong asset. 3-5 years of experience in vulnerability management, security assessment, security awareness, and identity access management systems.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
$140,000 - $165,000 a yearFull-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Research Support Security Analyst Work Arrangement: Requisition Number: 242020 Regular or Temporary: Regular Location: Durham, NC, US, 27710 Personnel Area: CENTRAL ADMIN MANAGEMENT CTR Date: Mar 20, 2024 POSITION SUMMARY: Duke University’s IT Security Office (ITSO) is responsible for the overall coordination, implementation, and assessment of information security at Duke University.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Certifications such as: GIAC Certified Intrusion Analyst (GCIA),GICCloud Forensics Responder(GCFR), GIAC Incident Handler (GCIH), Certified Information Systems Security Professional(CISSP), Certified Ethical Hacker(CEH), etc.
ExpandApply NowActive JobUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
5+ years of experience in software development lifecycle, large-scale computing, modeling, cyber security, anomaly detection, Security Operations Center (SOC) detection, threat analytics, security incident and event management (SIEM), information technology (IT), and operations incident responseo OR Bachelor's Degree in Statistics, Mathematics, Computer Science or related field.
$112,000 - $218,400 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
X modules: Assessment & Authorization, Continuous Monitoring, Policy Management, Risk Management, Compliance Management, Issue Management, Vendor Management, Threat Management, Business Continuity, Audit Management, GRC Platform.
Full-timeExpandApply NowActive JobUpdated 28 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Coordinate with intelligence analysts to correlate threat assessment data. Familiarity with security tools and technologies, SIEM, and experience in utilizing threat intelligence platforms.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Hands-on experience in security assessment, cloud architecture, threat modeling, and policy writing. Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA) or other similar credentials.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Vulnerability assessment and reporting including comprehensive understanding of Vulnerability Management methodologies and procedures, threat assessment, and remediation management.
ExpandApply NowActive JobUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Responsibilities include vulnerability management, scanning and remediation, patch management, and threat and vulnerability assessment. Assist in threat analysis and modeling; involving examination, analysis, documentation, and assessment of internal and external threats, electronic crime activity and information security risks to critical infrastructure systems.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Familiarity with Threat Intelligence engagement and reporting. LeverageTek is actively seeking a Cyber Security Analyst for a permanent position with its Charlotte-based customer. We work with customers across all sectors including academia, aerospace, aviation, finance, government, health care, high tech, military, not-for-profit, and more.
ExpandApply NowActive JobUpdated 12 days ago
threat assessment cissp jobs
FEATURED BLOG POSTS
How to Prepare to Be Fired - What You Need to Do
If you’re reading this, let me be the first to tell you how sorry I am. Getting fired feels crappy, disheartening, hurtful, and all the other bad, sad words. But here’s what I want you to do. First, let yourself fumble for a minute. Then, pick your head up — sometimes getting fired is a blessing in disguise. If you think termination is around the corner, we’ll teach you how to prepare to be fired and what to do next so you land somewhere even better.
How to Find a Job That Makes You Happy - 11 Concerning Facts
Do you ever feel like your life is like one of those rom-com movie scene openers? You know, the ones where the main character rolls out of bed, awakened by a casually upbeat theme song, sulks their way to the coffee pot, and then trudges toward their computer to begin yet another boring day at work?
How to Decline a Job Offer You Already Accepted
When you think about it, turning down a job offer is not the worst position you could be in. If you’ve been lucky enough to consider multiple job offers, well, then you’re lucky enough.
How to Practice Fair Chance Hiring for People With Criminal Records
Usually when you think of your dream hire, you think of someone who is respectful, trustworthy, reliable, and has sound judgment, right? As you envision your ideal candidate with these qualities, the last person you think of is someone with a criminal record.
6 Common Mistakes to Avoid When Employer Branding
Currently, job searchers are putting extra effort into researching employers. The information they find plays a major role in whether they will pursue an opportunity with you or look for jobs elsewhere. That is why it is now more important than ever to be proactive and intentional when showcasing your workforce and workplace culture. Having a well crafted employer branding strategy can help you strategize and influence your potential candidates so they see your business in the best light. But in order to do that, you should be aware of some of the most common mistakes that employers make.
What to Say When Terminating an Employee
Terminating an employee is an inevitable part of doing business. Whether you’re re-structuring your department or you’ve identified a few employees who’re not living up to your expectations, letting people go is necessary for keeping your workforce healthy and thriving.
How to Utilize Keywords for Your Job Ads
Before we give you the scoop on how to utilize keywords in job ads, it would be helpful if we defined what keywords are and why they are important. In simple terms,