- UpvoteDownvoteShare Job
- Suggest Revision
Technologies include SIEM , vulnerability assessment, discovery, infrastructure (firewall, IPS/IDS, proxy, network capture), host-based security, PCAP, penetration testing/external assessment tools, forensics, etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
8 years of experience with security assessment tools, vulnerability management, and penetration testing methodologies. Conduct comprehensive risk assessments, threat modeling, and vulnerability analysis to identify potential security gaps and develop mitigation strategies.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Typical Day: Maintain current knowledge on existing security procedures, directives and technology controls including application testing, threat modeling, attack and penetration testing, data classification and data handling Work directly in traditional AppSec tools like SAST, SCA, and DAST to ensure that the tools are working properly and that findings are addressed and managed as defects.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Primary Responsibilities Operationalize the Cyber Security function by identification of critical information, threat analysis, vulnerability management, risk assessment and application of countermeasures.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Advanced knowledge of encryption, vulnerability assessment, penetration testing, cyber forensics, intrusion detection, and incident response and remediation. Maintains the computer and information security incident, damage and threat assessment programs.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with Penetration Testing, Red and Blue teaming experience is a plus. Active and passive threat hunting; assessment of current and future tools to ensure robust capabilities.
ExpandApply NowActive JobUpdated 27 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Draft, review, and update Risk Management Framework (RMF) artifacts required for FISMA Compliance, including the System Security Plan, Security Categorization, Risk Assessments, Privacy Impact Assessment, Contingency Plans.
Full-timeExpandUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge in performing risk and vulnerability assessment / penetration testing in ICS/OT environment, and threat hunting. 15+ years experience in OT and OT Security related areas in technical solution design, deployment, integration, risk assessment, solution development and pre-sales.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Conducts risk assessment and provides recommendations for application design. Creates cyber-intelligence tools / methods and performs research and analysis in order to mitigate and eliminate high level data and cyber security risks.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Proficiency in security assessment tools and techniques, including vulnerability scanning, penetration testing, and threat modeling. Participate in security audits, compliance assessments, and regulatory reviews to ensure adherence to relevant standards and regulations (e.g., GDPR, HIPAA, PCI DSS.
ExpandUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
In this role, you will learn a wide array of cyber security assessment methodologies that leverage technical knowledge and threat intelligence to assess an embedded system’s security posture, identify vulnerabilities, and develop exploits / appropriate mitigations.
InternExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience coordinating bug bounty and penetration testing engagements. Validating, triaging and driving the remediation of vulnerabilities discovered through internal testing, third-party penetration tests, or bug bounty programs.
Full-timeRemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Performs cybersecurity testing and analysis, to include Security Technical Implementation Guides (STIGs), Security Content Automation Process (SCAP) scans, Assured Compliance Assessment Solution (ACAS) scans, Host Based Security System (HBSS), penetration testing, and software assurance.
$107,850 - $179,750 a yearExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Identify unique system characteristics, interview key organizational personnel, compose requisite documentation (security categorizations, risk assessments, contingency plans, security test & evaluation reports, vulnerability assessment reports, etc.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
ICC ISSO Specialist. Establishes strict program control processes to ensure mitigation of risks and supports obtaining certification and. Leads the investigation of complex computer and information security incidents to determine extent of compromise to national security information and automated information systems.
ExpandApply NowActive JobUpdated Today
threat assessment penetration testing jobs
FEATURED BLOG POSTS
How to Navigate Hiring Out of State
The job market has shifted significantly in recent years. The accelerated adoption of technology has not only pushed many companies into remote working arrangements but also increased the availability of supporting tools and technologies (i.e., video conferencing and collaboration software).
Building a Candidate Pipeline Through Internships
Building a candidate pipeline through a great internship program for local college students and recent graduates at local universities is a great and cost-effective way to attract and retain top talent. By offering meaningful and impactful work experiences, regular feedback, coaching, and mentorship, you can create a positive internship experience that will make your organization a sought-after destination for future employees. This not only benefits the organization in the short-term but also in the long-term, as you'll have a pool of well-trained and experienced candidates who may be interested in full-time employment once they graduate. Furthermore, building relationships with local universities and college students can increase brand awareness and build a positive reputation for your organization in the local community.
Hiring Transparency
Transparency in hiring refers to the open and honest communication and information sharing that takes place between employers and job candidates. It encompasses all aspects of the hiring process, from posting job descriptions to providing feedback on performance during and after the interview process. In today's job market, hiring transparency has become increasingly important for both employers and candidates alike.
Recruitment strategies that are weird, but actually work
In the current candidate-driven job market, recruiters are looking for unique ways to attract talent. Some have resorted to even (dare we say it?) recruitment strategies on the border of weird and wacky. What can we learn from the unusual recruitment tactics that are being used and actually getting results? Here’s a rundown of some unique recruitment strategies that actually work.
How To Make $100K a Year – No BS Strategies & Advice
If you’re like most of us, you’d love to be wealthier. Having more money would alleviate stress. It would make it easier to pay your bills and buy nicer things. Maybe it’d allow you to spend more time with your kids and go on more vacations. You’re not alone if you wish you could somehow earn a more significant income.
How to Write a Recommendation Letter for a Student
When a student applies for their first job or for their next academic degree, they don’t have much experience to showcase their skills and personal qualities. Hiring managers and admissions officers, therefore, often look at recommendation letters as a way to go beyond the student’s GPA and learn more about the student’s skills and personal qualities.
How To Answer “Why Do You Want to Be a Supervisor” in an Interview
Anyone who has worked in a supervisor role knows how challenging yet rewarding it is. But chances are if you're trying to become a supervisor, you'll be forced to answer: