- UpvoteDownvoteShare Job
- Suggest Revision
Familiarity with cybersecurity tools and technologies such as Anti-virus / EDR, Security Information and Event Management (SIEM), Web Proxies / Firewalls / Intrusion Prevention Systems, Data Loss Prevention (DLP), Email Security, Security Awareness Training Platforms, Privileged Identity and Access Management, Vulnerability Management, and Threat Intelligence Feeds.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Demonstrated expertise in multiple IT disciplines, including network architecture, cloud security, endpoint protection, vulnerability management, identity and access management, and incident response.
Full-timeExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Has advanced in-depth knowledge of security protocols and standards, vulnerability assessment tools, security application suites, penetration testing tools and advanced understanding of countermeasures/mitigation techniques.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Draft, review, and update Risk Management Framework (RMF) artifacts required for FISMA Compliance, including the System Security Plan, Security Categorization, Risk Assessments, Privacy Impact Assessment, Contingency Plans.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Demonstrated experience in Information Security (INFOSEC); computer security; cryptography; network security; assessment and authorization; incident response investigations; risk analysis; threat and vulnerability scanning, analysis, and management.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience performing risk assessment, threat tracking, or vulnerability management and success in evaluating and communicating severity, impact, and likelihood of a risk to a wide audience.
Full-timeExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This department is focused on the integration and automation of technologies involved in vulnerability management and assessments. The Cyber Solutions Innovation Center is seeking a Cyber Assessments Department Manager; This leader is expected to strategically shape our growing and multi-disciplinary team, driving innovation in all areas of cyber assessment technologies, leading to significant impact – with particular emphasis in the department’s two formal technical capability areas of Cyber Assessments and Security Automation & Management.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Explore more InfoSec / Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This is augmented through performing integrated and advanced cyber assessments and by the ability to prioritize assessment findings and mitigation through threat-informed decision-making.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Shall have a familiarization with log data from windows and Linux operating systems, virus protections, vulnerability analysis (Tenable), Threat management (Tanium) software use. Collects, processes, preserves, analyzes, and presents computer-related log data in support of network vulnerability mitigation and incident response.
Full-timeExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Understanding of security incident management, malware management and vulnerability management processes. Participate in security incident management and vulnerability management processes.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
10+ years Security Vulnerability Assessment and Cyber Threat Intelligence experience. 10+ years of experience supporting ITIL frameworks and concepts to include Incident Management, Change Management, Problem Management, and/or Knowledge Management.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Stay abreast of the latest security threats and vulnerabilities, integrating threat intelligence into vulnerability assessment processes to enhance analysis and prioritization of vulnerabilities.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Leveraging your significant experience in information security, cloud architecture and engineering, vulnerability management, and DevSecOps practices, you will be expected to broaden and sharpen our capability to manage the incoming security engineering needs while rapidly surfacing, driving down, and reporting on vulnerabilities across our AWS, GCP, and Azure environments.
ExpandApply NowActive JobUpdated 7 days ago
threat assessment vulnerability management jobs
FEATURED BLOG POSTS
Making the Move to Salary Transparency
The salary transparency trend continues. Last year, Colorado passed its Equal Pay Transparency Rules, which required employers to include compensation in job postings, notify employees about promotional opportunities, and record job descriptions and wage records. Soon after, states like Washington, Nevada, Maryland, and Rhode Island followed suit.
Brand Reputation 101
People's initial perception of your organization is also known as your brand reputation. Your brand rep either encourages or discourages people from engaging with your company. This means the way people view your company will affect sales and even recruiting efforts.
Recruiting in a Tight Market
As a recruiter or employer, you know how much the economy affects your recruitment and retention efforts. You aren't just in competition with companies in your industry, but you are also fighting against inflation, recession, unemployment rates, and so much more.
How to Build a Candidate Persona
A candidate persona is a semi-fictional representation of your ideal candidate. Building a candidate persona is one of the best methods employers use to ensure their sourcing, recruiting, and hiring processes are focused. Knowing exactly what you're looking for streamlines everything and helps increase hiring confidence. So here's how to create a candidate persona and how to use it.
How to Get Into The Trades: Step-by-Step Guide
Getting a trade job can be a great career move if you like variety and prefer to learn on the job instead of in an academic setting. A trade job can offer security and be a lucrative career path as the demand for skilled trade workers continues to grow.
How do Good Interviewers Prepare for Interviews?
Just like candidates take the time to research you and your company, you should take the time to prepare for the interview. Preparing for the interview doesn't just reflect well on your employer brand and create a better candidate experience. Preparation also helps prevent bad hiring decisions. Bad hiring decisions are usually a result of poor execution during the hiring process. However, going into an interview fully prepared and ready to evaluate candidates will help avoid bad hires. So, here are 6 interview preparation tips for employers.
Should I Hire for Potential Over Experience?
The workforce is shifting every day. In fact, research from the World Economic Forum (WEF) shows over half of employees around the world will need to upskill or reskill by 2025. The rapid rise of digital literacy, automation, and new technologies will quickly supersede businesses that don't train ahead of the curve. With the dire need to invest in training, it's evident that hiring someone with experience isn't that much different than hiring someone without it.