- UpvoteDownvoteShare Job
- Suggest Revision
This role centers on corporate resilience, holding accountability for evaluating clients’ crisis management, threat assessment, and physical security requirements. Independently produce high-quality corporate security and resilience deliverables such as threat, risk, and vulnerability assessments, threat intelligence briefings, corporate security and security programs, and corporate standards, policies, and procedures.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Bryce Space and Technology is looking for an experienced FEMA analyst with Geospatial Information System (GIS), emerging threat identification, risk analysis, CBRN/Non CBRN Threat assessment experience to support the DHS FEMA, Office of Emerging Threats Professional and Technical Services Contract.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Responsible for interviewing organizational subject matter experts in conducting STIG, TIG, SRG, and IC policy checklists Collect data in support of reviewing a comprehensive Threat Informed Critical Controls List (TICCL), provide written input on review of required security controls, potential vulnerability exploitation, and how MITRE ATT&CK techniques are plausibly successful based on organizational weaknesses.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The National Incident Response Team (NIRT), a national service provider for the Federal Reserve System (FRS), provides effective and efficient national intrusion detection, incident response, security intelligence, threat assessment, and vulnerability assessment services for the FRS. NIRT’s mission is to play a leading role in the FRS’ efforts to protect its information systems against unauthorized use.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The contracts support functions are: IA Management, Federal Information Security Management Act (FISMA) coordination and reporting, Risk Management Framework (RMF) application, IA compliance measurements and metrics, Assessment and Authorization (A&A), Vulnerability Management , and Cyber Defense support.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Well versed in technologies like Windows servers, Microsoft Azure, Endpoint Protection, Data loss prevention (DLP), Firewalls, SIEM, Vulnerability management. Experience with assessment, implementation, optimization, and documentation of a comprehensive and broad set of security technologies and processes such as data protection, identity and access management (IAM), network security with IaaS, PaaS, and other computing environments.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Skills in vulnerability assessment, penetration testing, and security incident response. Certified Ethical Hacker (CEH), Certified Information Security Manager (CISM), Offensive Security Certified Professional (OSCP) and/or other industry Certifications such as MicroSoft (MS) Power Platform, MS Power BI, Scripting languages, etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of information security toolsets including anti-virus, Vulnerability Assessment, HIDS/ NIDS, host-based or endpoint security solutions, Multi Factor Authentication (MFA), and Security Incident and Event Management (SIEM ) and centralized auditing tools.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Proficient with the Risk Management Framework (RMF), NIST standards, and cybersecurity assessment tools such as ACAS and DISA STIGs∯*∯ Prepare documentation for assessment and authorization activities to ensure sustained Approval to Operate (ATO.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As a Senior System Administrator on the Enterprise Infrastructure Engineering team, you will interact regularly with the Network Security, Applications, SIEM/SOAR, ISSO, Vulnerability Assessment teams, and on-site technical resources to ensure both the security and on-going stability of NOAA network.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Assist with the cybersecurity vulnerability management plan and risk assessment capability; Review, assess, create, and update enclave documentation in eMASS and any Configuration Management (CM) system for the ISSM review and approval, such as Security Plan, Security Assessment Plan, Category selection checklist, control results, and POA&Ms.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The ISSM is responsible for maintaining and enforcing all Information System Security policies, standards, and directives to ensure assessment and authorization of information systems processing classified information.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Demonstrated expertise in security tools and technologies, including SIEM, IDS/IPS, WAF, IAM and vulnerability assessment tools. Relevant certifications such as AWS Certified Security - Specialty, Certified Information Systems Security Professional (CISSP), or Certified Cloud Security Professional (CCSP) are highly desirable.
$120,000 - $150,000 a yearExpandUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Explore more InfoSec / Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
$211,000 - $290,200 a yearFull-timeExpandApply NowActive JobUpdated Today
threat assessment vulnerability jobs
FEATURED BLOG POSTS
How to Practice Fair Chance Hiring for People With Criminal Records
Usually when you think of your dream hire, you think of someone who is respectful, trustworthy, reliable, and has sound judgment, right? As you envision your ideal candidate with these qualities, the last person you think of is someone with a criminal record.
6 Common Mistakes to Avoid When Employer Branding
Currently, job searchers are putting extra effort into researching employers. The information they find plays a major role in whether they will pursue an opportunity with you or look for jobs elsewhere. That is why it is now more important than ever to be proactive and intentional when showcasing your workforce and workplace culture. Having a well crafted employer branding strategy can help you strategize and influence your potential candidates so they see your business in the best light. But in order to do that, you should be aware of some of the most common mistakes that employers make.
What to Say When Terminating an Employee
Terminating an employee is an inevitable part of doing business. Whether you’re re-structuring your department or you’ve identified a few employees who’re not living up to your expectations, letting people go is necessary for keeping your workforce healthy and thriving.
How to Utilize Keywords for Your Job Ads
Before we give you the scoop on how to utilize keywords in job ads, it would be helpful if we defined what keywords are and why they are important. In simple terms,
What Makes a Good Paid Time Off (PTO) Policy
The world of work has undergone some major transformation in recent years. From remote and flexible work to increased emphasis on employee benefits and wellbeing, companies nowadays have to be very intentional about their HR policies and how they approach talent acquisition.
Internal Recruiting: Benefits and 5 Internal Recruiting Methods to Consider
Internal and external recruiting are nearly the same thing. The biggest difference is where candidates are sourced. There are instances where external recruiting may be the best option. However, when you are presented with the opportunity to recruit internally, you should take full advantage of the different internal recruiting methods. Initially you will find that the hiring process gets a little bit easier. Then you'll notice all the other benefits that internal recruiting offers.
How to Answer the Interview Question: What is Your Communication Style?
As a job searcher, you probably have so many questions about job searching. However, once you've landed an interview, your excitement takes your questions to a whole new level. What will you wear? Will you know how to answer all the questions? Have you practiced giving nice firm handshakes?