- UpvoteDownvoteShare Job
- Suggest Revision
This is a highly technical role that requires broad technical knowledge and a deep understanding of threats and threat TTPs. You will lead and participate in advanced technical assessments that leverage red team, penetration testing, and vulnerability assessment tools and techniques to identify hi-risk vulnerabilities across a variety of technologies.
ExpandApply NowActive JobUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Plans and conducts assessment including but not limited to security engineering, vulnerability management, endpoint protection, web protection, external systems protection, threat hunting and penetration testing.
ExpandApply NowActive JobUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Run day to day operations including Performing AppSec Threat modeling on the DTCC application design architectures, Manual secure code review of in-house developed and advance penetration testing techniques to identify the vulnerabilities which cannot be reported by automated SAST & DAST scanners.
ExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
3-5 years of advanced Cyber Security experience required, including knowledge of security assessment and penetration testing methodology. Advanced knowledge of network monitoring, SEIM, and incident response/threat-hunting tools.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Hands-on experience with security tools and technologies, such as web application scanners, vulnerability scanners, penetration testing tools, and SIEM systems. Conduct security testing, including vulnerability scanning, penetration testing, and code review, to identify and address security weaknesses.
Full-timeExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Incident response, security monitoring and analysis, vulnerability management and risk assessment, threat hunting, penetration testing, cyber threat intelligence, and/or other cyber security roles.
ExpandUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Ideal candidates will bring a strong background in threat management, vulnerability assessment, and security testing, aiming to drive innovation and excellence in our security practices.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
We also provide customer solutions in the areas of CND, CNE, and CNO by providing our customers with assessments and solutions in Threat Mitigation, Vulnerability Exposure, Penetration Testing, Threat Hunting, and Preventing Advanced Persistent Threat.
ExpandApply NowActive JobUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Coordinates penetration testing or other 'red team' activities that might occur at/or traverse the system’s infrastructure as part of a Security Control Assessment (SCA). Reviews threat and vulnerability assessment findings to quantify and prioritize vulnerabilities in a system.
Full-timeExpandApply NowActive JobUpdated 28 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The PSC will schedule and oversee the customer's penetration testing program as well as site-initiated penetration tests scheduled and coordinated by BSCs. Assessment may include providing initial advice and escalating to the Threat Management Team.
ExpandApply NowActive JobUpdated 17 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Projects can include everything from threat assessment to risk management to penetration testing and hardening systems from attack. A summer internship with Mondelēz Digital Services (MDS) / Information Technology (IT) offers tremendous learning opportunities for students pursuing degrees in Computer Science , Information Systems, Software Engineering, Cyber Security, Data Science, Information Technology/Systems, Digital Marketing, eCommerce, Supply Chain Management, and other technology-driven areas of study.
InternExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Advanced knowledge of encryption, vulnerability assessment, penetration testing, cyber forensics, intrusion detection, and incident response and remediation. Maintains the computer and information security incident, damage and threat assessment programs.
Full-timeExpandApply NowActive JobUpdated 28 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Develop and utilize testing methodology for threat emulation and vulnerability validation. Use commercial and open source network cyber assessment tools (e.g. Core Impact, Nmap, Metasploit, and Nessus.
ExpandApply NowActive JobUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Lead in-depth security assessments of sophisticated workflows spanning multiple applications, performing and/or coordinating multiple security assessment workstreams such as threat modeling, penetration testing, DAST scanning, and code review.
ExpandApply NowActive JobUpdated Today
threat assessment penetration testing jobs
FEATURED BLOG POSTS
How to Decline a Job Offer You Already Accepted
When you think about it, turning down a job offer is not the worst position you could be in. If you’ve been lucky enough to consider multiple job offers, well, then you’re lucky enough.
How to Practice Fair Chance Hiring for People With Criminal Records
Usually when you think of your dream hire, you think of someone who is respectful, trustworthy, reliable, and has sound judgment, right? As you envision your ideal candidate with these qualities, the last person you think of is someone with a criminal record.
6 Common Mistakes to Avoid When Employer Branding
Currently, job searchers are putting extra effort into researching employers. The information they find plays a major role in whether they will pursue an opportunity with you or look for jobs elsewhere. That is why it is now more important than ever to be proactive and intentional when showcasing your workforce and workplace culture. Having a well crafted employer branding strategy can help you strategize and influence your potential candidates so they see your business in the best light. But in order to do that, you should be aware of some of the most common mistakes that employers make.
What to Say When Terminating an Employee
Terminating an employee is an inevitable part of doing business. Whether you’re re-structuring your department or you’ve identified a few employees who’re not living up to your expectations, letting people go is necessary for keeping your workforce healthy and thriving.
How to Utilize Keywords for Your Job Ads
Before we give you the scoop on how to utilize keywords in job ads, it would be helpful if we defined what keywords are and why they are important. In simple terms,
What Makes a Good Paid Time Off (PTO) Policy
The world of work has undergone some major transformation in recent years. From remote and flexible work to increased emphasis on employee benefits and wellbeing, companies nowadays have to be very intentional about their HR policies and how they approach talent acquisition.
How to Answer the Interview Question: What is Your Communication Style?
As a job searcher, you probably have so many questions about job searching. However, once you've landed an interview, your excitement takes your questions to a whole new level. What will you wear? Will you know how to answer all the questions? Have you practiced giving nice firm handshakes?