- UpvoteDownvoteShare Job
- Suggest Revision
This incumbent will provide support to Security Architecture, Security Engineering, Security Operations, Identity & Access Management, Threat Management, Vulnerability Management and Penetration Testing functions.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with Vulnerability Assessment and Penetration Testing. The highly-technical role will combine direct support to Cyber Threat Response Chief with Information System Security Officer (ISSO) or non-signatory Information System Security Manager (ISSM) duties.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Penetration Testing and/or Threat Assessment experience. Penetration Testing and/or Threat Assessment experience. There will be an emphasis on Network Security, Firewalls, Endpoint Protection, IPS/IDS and SIEM. But we are looking for candidates that have experience in a breadth of IT Security disciplines, and experience architecting security solutions that balance multiple perspectives.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Manages vulnerability assessments such as security audits, exploit scans, and “red team” penetration testing. Functions as a core member of an Incident Response Team in the event of system / network breeches, managing response threat nullification, recovery, impact assessment, documentation, systems remediation, and advising appropriate legal and disclosure steps.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge in performing risk and vulnerability assessment / penetration testing in ICS/OT environment, and threat hunting. 15+ years’ experience in OT and OT Security related areas in technical solution design, deployment, integration, risk assessment, solution development and pre-sales.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Strong knowledge of risk assessment methodologies and tools, including vulnerability scanning, penetration testing, and threat modeling. Provide recommendations for remediation and improvement based on risk assessment findings and best practices.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Vulnerability Assessment: Conduct regular vulnerability assessments and penetration testing to identify potential weaknesses and implement necessary security measures. Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Perform security engineering testing and analysis to include but not be limited to STIG, SCAP scans, ACAS Scans, HBSS, penetration testing, software assurance, etc. Perform threat assessment and modeling, attack surface analysis, and architecture and design reviews.
$170,000 - $176,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Fortinet Firewalls / Gateway. Assists in systems administration capacity where needed in managing on-prem servers, Azure and Office 365 tenants, and other onsite and remote systems and resources. Assists with planning, implementation, management, and optimization of network organizational structures such as Active Directory, DHCP, DNS, etc.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Skills in vulnerability assessment, penetration testing, and security incident response. Certified Ethical Hacker (CEH), Certified Information Security Manager (CISM), Offensive Security Certified Professional (OSCP) and/or other industry Certifications such as MicroSoft (MS) Power Platform, MS Power BI, Scripting languages, etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Familiarity with Penetration testing and/or Fuzz testing techniques. Monitoring the cyber threat landscape in order to rapidly identify potential threats and risk assessment.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As the Network Administrator at Sealevel Systems, you will lead the defense of the organizations systems and data while maintaining and growing our network capacity. Operational Technology / Industrial IoT / COM Express systems experience.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The DoD Red Team (NE-MAR) is one of the assessment programs within the Defense Threat Reduction Agency’s (DTRA)-Operational Nuclear Enterprise Support Directorate, Mission Assurance Department (NE-MA.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with internal penetration testing, risks assessment methodologies and security operations center experience. Skillfully analyze threat intelligence sources for applicability to the BISSELL environment with prevention and control recommendations.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Advanced knowledge of encryption, vulnerability assessment, penetration testing, cyber forensics, intrusion detection, and incident response and remediation. Maintains the computer and information security incident, damage and threat assessment programs.
ExpandApply NowActive JobUpdated 12 days ago
threat assessment penetration testing jobs
FEATURED BLOG POSTS
How to Calculate Net Income
Understanding your finances can be daunting even if you’re good with numbers. Your net income, in particular, is a key metric for determining how well you’re doing financially and whether your current way of operating is sustainable or not.
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra:
6 Best Ways to End a Cover Letter with Examples
Including a cover letter with your resume is a great way to introduce yourself to the hiring manager, tell them why you’re the ideal fit for the role, and provide context about your personal situation. A strong cover letter will give you an advantage over other applicants. But it’s important that you structure it properly and write it powerfully so that it carries an impact. This article will discuss how to end a cover letter effectively so you catch the eye of a hiring manager and increase your odds of landing an interview. Read on to learn more.
How to Write a Follow-Up Email for a Job Application?
Most times, we have to do more than submit a "sugar-coated" resume to land our dream jobs. Going the extra mile to follow up on your job application can increase your chances of employment. Additionally, it may even help you get confirmation sooner on whether you are seriously being considered for the job or not.
How to Hire Remote Workers
Remote work used to be a thing of the future. However, with social, economic, and cultural events taking place across the country, it has now evolved into something that both job searchers AND companies are benefiting from. Remote work is multifaceted and can come in handy in a variety of situations. So, to help your small business take advantage of all of remote work's benefits, here is a short guide on how to hire remote workers.
How to Address a Cover Letter With Examples
It’s easy to get caught up in focusing on your resume – how it looks, what it says, and whether it’s going to land you a job interview. Because there is a big focus on building the perfect resume, job searchers often overlook the importance of a high-quality cover letter. Your cover letter plays a huge role in your first impression. It humanizes you and provides context for your resume.
How to Call Out of Work
No matter how happy we are with our jobs, there are days when we feel overwhelmed and want to call out of work. No, don't feel guilty. It's expected because we're humans, and we can't control the uncertainties of life. But the problem lies in how to call out of work without seeming uncommitted to work, especially if you seldom get work-free days.