- UpvoteDownvoteShare Job
- Suggest Revision
Provide operations and engineering support for critical security systems and services including servers, endpoint security, computer forensics, vulnerability/penetration assessment/mitigation, and security event management.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Working knowledge of various security tools such as EPP, EDR, vulnerability management, threat intelligence, application assessment, etc., Assist the management of Information Security in technical support issues, investigations and risk assessment.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
8 years of experience with security assessment tools, vulnerability management, and penetration testing methodologies. Conduct comprehensive risk assessments, threat modeling, and vulnerability analysis to identify potential security gaps and develop mitigation strategies.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Collaborating with internal and/or external cybersecurity professionals and experts in cybersecurity risk assessment/management, automated information sharing, threat analysis, vulnerability management, and network defense/network protection to assess risk, identify vulnerabilities and implement controls as necessary.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
There are a variety of Vulnerability Assessment opportunities across the Department, including supporting several specialized programs at the DHS Office of Strategy, Policy, and Plans (PLCY), the Cybersecurity and Infrastructure Security Agency (CISA) , DHS Office of the Chief Information Officer (OCIO) , and the Federal Emergency Management Agency (FEMA.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Provide support for vital security systems and services, including servers, endpoint security, computer forensics, vulnerability and penetration assessment/mitigation, and security event management.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Demonstrated experience in Information Security (INFOSEC); computer security; cryptography; network security; assessment and authorization; incident response investigations; risk analysis; threat and vulnerability scanning, analysis, and management.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
2+ years of experience with supply chain risk management, including assessing system and component criticality, mapping supply chains, identifying critical suppliers, assessing supply chain threat and vulnerability assessment, conducting risk identification and mitigation, and monitoring mitigation effectiveness over time.
Full-timeExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
IT and Security Governance, Security Risk threat assessment and vulnerability management ideally using Qualys. Vulnerability management skills to review critical infrastructure and security vulnerabilities.
$50 - $55 an hourExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
10+ years in security and/or risk assessment/management related fieldHands on experience with testing frameworks such as the PTES and OWASPApplicable knowledge of Windows client/server, Unix/Linux systems, Mac OS X, VMware/Xen, and cloud technologies such as AWS, Azure, or Google CloudIn-depth knowledge of security concepts such as cyber-attacks and techniques, threat vectors, risk management, incident management etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Provides operations and engineering support for critical security systems and services including servers, endpoint security, computer forensics, vulnerability/penetration assessment/mitigation, and security event management.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Perform threat modeling, risk assessment, and vulnerability management to identify potential security risks and work with development teams to implement appropriate security controls.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Services we typically provide include security and safety system design, threat, risk, and vulnerability assessments, security surveys, security master planning, compliance to federal security programs, independent validation and verification of integrated security system operations, management of installation and maintenance, and staff augmentation to develop and implement facility management and protection processes.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Perform the design, planning, QA/QC, implementation, assessment, and management of access control systems, digital video surveillance systems, CCTV (Closed-circuit television), building security, building automation, and physical intrusion detection systems.
Full-timeExpandApply NowActive JobUpdated Today
threat assessment vulnerability management jobs
FEATURED BLOG POSTS
How to Call Out of Work
No matter how happy we are with our jobs, there are days when we feel overwhelmed and want to call out of work. No, don't feel guilty. It's expected because we're humans, and we can't control the uncertainties of life. But the problem lies in how to call out of work without seeming uncommitted to work, especially if you seldom get work-free days.
What is Seasonal Employment?
Depending on where you are in your career, you might have first-hand experience with seasonal employment. Seasonal employment can be a great way to expand your skill set and earn extra cash while helping businesses meet seasonal increases in demand.
How to Avoid a Bad Hire
"A new employee who doesn't meet the minimum performance, quality, and culture fit standards you set when you began sourcing and recruiting. Additionally, bad hires will immediately show signs of self-interest instead of an interest in their role and the company."
How to Ask for a Letter of Recommendation
When the job board you subscribe to finally posts your dream job, you may feel like the stars have aligned. But part of securing a position that matches your career plan is ensuring you address all the application basics. You know, the resume, the cover letter, the portfolio. It seems like you've got this in the bag — until you realize they want a letter of recommendation, too!
16 Tech Jobs You can Get Without a College Degree
You might think that if you don’t have a computer science, information technology, or related degree, then there’s absolutely no way you can break into the technology field and score a high-paying tech job. But this is a misconception. There are actually tons of tech jobs out there that don’t require a college degree. Instead, employers are more interested in the skills that you can offer. So, read on to learn more about how to land tech jobs without a degree.
What Are SMART Goals?
When it comes to achieving our goals, there’s a lot of noise to work through. A study by the University of Scranton has found that only 8% of people who set New Year’s resolutions actually achieve them. Our busy lives might be one reason for this. Another, even more important reason, is our approach to goal setting. Being too vague, too ambitious or simply unclear on the timeframe can set us up for failure.
In-House vs Outsourcing Recruiting: Which is Better?
When looking at in-house vs outsourcing recruiting, it is important to nail down the benefits for each and whether those benefits outweigh the risks that follow.