- UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
3-5 years of experience in vulnerability management, security assessment, security awareness, and identity access management systems. Familiarity with Threat Intelligence engagement and reporting.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Required QualificationsHard SkillsMastery of Security Architecture Principles: Deep understanding of defense-in-depth strategies, zero-trust models, identity and access management (IAM), threat modeling, GPDR and privacy, vulnerability assessment techniques, and secure coding practices.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Clear understanding of security processes and technologies including Threat Analysis, Threat Intelligence, Threat Hunting, Vulnerability Assessment, Security Monitoring, Compliance.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
You'll be responsible for the management of our IT security systems and applications, incident response, digital forensics, loss prevention, and eDiscovery actions, conducting risk and vulnerability assessments, and developing and implementing security controls.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
A solid grasp of secure software development practices, encompassing threat modeling, risk assessment, and vulnerability management. Proficiency in handling security tools and technologies, including web application scanners, vulnerability scanners, penetration testing tools, SIEM systems, and Certified Application Security Engineer (CASE) certification.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Demonstrated expertise in multiple IT disciplines, including network architecture, cloud security, endpoint protection, vulnerability management, identity and access management, and incident response.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
A combined minimum 6-8 years’ experience in technology and executing Cybersecurity assessments, providing guidance to business stakeholders, and interpreting and applying policies and standards, penetration testing, vulnerability management, red teaming.
ExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Ster recovery, FISMA compliance, information security architecture, information security auditing, security control assessment, threat modeling, threat management, vulnerability analysis, and vulnerability assessments.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Keywords: Cyber, security, vulnerability, STIG, RMF, Risk Management Framework, A&A, Assessment and Authorization, threat modeling, offensive, attack vector, defense-in-depth, DevSecOps, DSO, CI/CD, Pipeline, Containerization, AWS Cloud, Kubernetes, MBSE, Attack Vector, Attack Surface, Resilience, Survivability.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Expertise in threat modeling, risk assessment, and vulnerability management. Expertise in threat modeling, risk assessment, and vulnerability management. A minimum of 8+ years of experience using penetration testing tools like Burp Suite.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Specialist shall be versed in the Core Vulnerability Assessment Management Program (CVAMP) to include knowledge of the DoD Unified Facility Criteria (UFC) criterion. Graduate of all the following courses: Conventional Physical Security/Crime Prevention Course, DoD Security Engineering Planning and Standards Blast Resistant Structural Design, VAPO Vulnerability Assessment Protection Option, Entry Control Facilities / Access Control Points (ECF/ACP) is highly desirable.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
O Vulnerability assessment and reporting including comprehensive understanding of Vulnerability Management methodologies and procedures, threat assessment, and remediation management.
ExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Has advanced in-depth knowledge of security protocols and standards, vulnerability assessment tools, security application suites, penetration testing tools and advanced understanding of countermeasures/mitigation techniques.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Perform threat modeling, risk assessment, and vulnerability management to identify potential security risks and work with development teams to implement appropriate security controls.
ExpandApply NowActive JobUpdated 7 days ago
threat assessment vulnerability management jobs
FEATURED BLOG POSTS
Hiring Again After Mass Layoffs
It's never an easy decision to let members of your staff go, but depending on the state of your business, mass layoffs may have been the only way to survive. Now that you're months into the future, you may find yourself itching to start hiring again after previous layoffs.
Into the Heart of the Ukrainian-Russian Conflict
The story of our US-Ukraine connection started when Kevin met Dave. Days away from quitting his last "real" job as a seafood plant manager, Kevin reconnected with a long-lost friend from high school. Little did he know, this long-lost friend was dating his soon-to-be business partner. After meeting Dave through their mutual connection, it didn't take long for the two to start bouncing business ideas off each other. The flow of creativity soon grew into a business partnership that has withstood the test of time.
Why Are Internships Important & How Can You Get One?
Internships are for college students or people who have just completed their degree. If you are a student or recent grad, you may be wondering how to land an internship. If you've never had one, you may even wonder if you need one. After all, didn’t you work in that call center while also doing exams? Or perhaps you’ve bartended your first year in college?
Why is Networking Important & How to Network Effectively
Even if you’ve worked hard to earn a degree from an impressive school, landing your dream job might still come down to who you know – otherwise known as networking. Lots of qualified candidates might apply for a job, but the person who gets it might very well be so-and-so’s sibling, friend, or kid. Sometimes the only way to get your foot in the door is to know someone.
Why Do Recruiters Ghost and What Can You Do About It?
Once you’ve finally mustered up the courage to find another job, leaning into the job hunt can feel scary and overwhelming. So, it does nothing to help your confidence when your outbox is full of unanswered follow-ups and interview requests. You thought that ghosting only happens on dating apps—so why do recruiters ghost, too? Recruiter ghosting is not an effective recruiting strategy, but sometimes it’s inevitable. How can you overcome such an unfortunate new career trend? Read on.
Internal Hiring Best Practices
Each companies hiring strategy is based on a set of rules that defines the ideal candidate. Many companies utilize internal and external hiring to ensure they have skilled, experienced workers. If you work in recruiting, maximizing your internal hiring strategies could be the key to retaining employees and simplifying your hiring process.
Why Leadership Is So Important in Your Career
There are plenty of baseball players worldwide, but only a select few will master the sport enough to play in the World Series. Similarly, you’ll meet hundreds of “managers” throughout your professional career. Still, only a few will cement themselves as true leaders in your mind. This is why leadership is important—the most influential leaders leave a mark. They inspire.