- UpvoteDownvoteShare Job
- Suggest Revision
Excellent knowledge of Microsoft M365 Defender including incident response, threat hunting and vulnerability management. Review vulnerability assessment results and threat intelligence regularly.
$100,000 - $120,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
7+ years of combined experience in cybersecurity incident response, intelligence analysis, vulnerability analysis, threat analysis and risk assessment (TARA), automotive systems and components.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Has advanced in-depth knowledge of security protocols and standards, vulnerability assessment tools, security application suites, penetration testing tools and advanced understanding of countermeasures/mitigation techniques.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The contracts support functions are: IA Management, Federal Information Security Management Act (FISMA) coordination and reporting, Risk Management Framework (RMF) application, IA compliance measurements and metrics, Assessment and Authorization (A&A), Vulnerability Management , and Cyber Defense support.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
IAST/MAST/DAST/SAST)Has advanced in-depth knowledge of security protocols and standards, vulnerability assessment tools, security application suites, penetration testing tools and advanced understanding of countermeasures/mitigation techniques.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Your expertise in risk assessment, compliance frameworks, vulnerability management and security controls will be vital in identifying and mitigating potential risks. Work with teams with varied strengths on data defense, data governance, threat and risk management, artificial intelligence, and regulatory compliance.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Provide support in due-diligence and third party risk assessment efforts. Originally known for leadership in enterprise resource planning (ERP) software, SAP has evolved to become a market leader in end-to-end business application software and related services for database, analytics, intelligent technologies, and experience management.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Collaborates with stakeholders, executives, and LOB partners to complete assessments, develop cybersecurity maturity recommendations across cybersecurity domains (governance & risk management, strategy and program management, vulnerability management, threat intelligence, security monitoring, network protection, identity and access management, business continuity / disaster recovery, incident response, security architecture, and cloud security.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Serves as a technical resource to advise on risks as it pertains to Data Loss Prevention (DLP) tools, security monitoring, identity and access management implementation, and other domains across the cybersecurity ecosystem.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Expertise in threat modeling, risk assessment, and vulnerability management. Expertise in threat modeling, risk assessment, and vulnerability management. A minimum of 10+ years of experience using penetration testing tools like Burp Suite.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Proficiency with at least three (3) or more of the following: mobile security, telecom protocols, operating systems analysis, reverse engineering, forensics, network analysis, vulnerability assessment or malware.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Strong understanding of cyber threat landscape, vulnerability management, and NIST CSF. The Sr. Cyber Security Engineer will provide strategic assessment, tactical analysis and recommendations for cyber risk reduction operations.
RemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of continuous monitoring, cyber security risk management, disaster recovery, FISMA compliance, information security architecture, information security auditing, security control assessment, threat modeling, threat management, vulnerability analysis, and vulnerability assessments.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with the Risk Management Framework (RMF) and Assessment and Authorization (A&A) activities needed to obtain and maintain an Authority to Operate (ATO) Experience with security tools and devices such as network firewalls, web proxy, intrusion prevention systems, vulnerability scanners, or penetration tools.
$58,300 - $133,000 a yearFull-timeExpandApply NowActive JobUpdated Yesterday
threat assessment vulnerability management jobs
FEATURED BLOG POSTS
2023 Quarterly Review: What’s Happening in Recruitment?
It’s that time again. It’s your quarterly review. Get excited because this is a great time to review some of the amazing accomplishments you and other pros like you have made in recruitment for 2023 thus far! Despite recruitment challenges, things are starting to balance out in the candidate market - partly because of the brilliant ideas and methods being used.
The Roadmap to Get Into Consulting
Consulting is a dynamic and challenging career field that offers many opportunities for people who enjoy problem-solving, strategy, and innovation. Believe it or not, consulting isn't necessarily a senior-level position. You can pursue a career in consulting as a recent graduate or a mid-career professional looking to switch careers. While pursuing a consulting career can be rewarding and fulfilling, it is challenging to break into because it is so competitive.
How To Decorate a Cubicle for Inspiration & Productivity
You know the negative reputation cubicles have – dull, dreary, gray. How can you possibly be expected to sit in one every day and be your naturally productive, enthusiastic, and upbeat self? The answer lies in decorating your cubicle so it sparks creativity and feels welcoming. While this might seem impossible given the bland canvas you have to work with, take heart because it’s totally doable!
How do Employers Verify Education?
At any stage in your professional journey, you may come across an employer or a recruiter who asks to verify your educational credentials. This shouldn’t come as a surprise as 30% of candidates admitted to lying on their resumes, yet 79% of them never get caught. In fact, 85% of employers in the US who conduct background checks find that candidates have lied on their resumes or job applications.
How to Ask for a Higher Starting Salary
Maybe you think you’ve finally found your dream job. Everything about it is perfect, except… the salary. Unfortunately, it just isn’t where you want it to be. So, should you give up and move on? Given all the effort you’ve already invested, it’s probably wise to try and negotiate a better salary before you do.
How to Pass a Personality Test with Flying Colors
Whether you’re applying for your first job or looking to move up the career ladder, personality tests aren’t usually the first thing we think about. But surprisingly, they can have a massive impact on how our future employers perceive us. In fact, a 2017 study by the Society for Human Resource Management (SHRM) has found that 32% of U.S. employers use personality tests when hiring for senior management positions, and 28% use them for middle management positions. Personality tests are also used for hourly workers and contractors, though less frequently.
10 Practical and Effective Strategies to Persuade Anyone of Anything
Learning how to persuade people is like a key that can unlock any door. Acing the interview for the job of your dreams. Getting the best deal on a new car. Closing a sale with a skeptical customer. All of these wins require a level of persuasiveness.