- UpvoteDownvoteShare Job
- Suggest Revision
Conduct cyber risk assessment activities including threat modeling, vulnerability analysis and analysis of mitigation solutions. Penetration Testing/Blue/Red Team/CVPA/AA experience as system owner representative or test team.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
O Vulnerability assessment and reporting including comprehensive understanding of Vulnerability Management methodologies and procedures, threat assessment, and remediation management.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Minimum of 8 years of work experience in the area of Information Security dealing with auditing and compliance, creating and managing policies, vulnerability and threat assessment, as well as designing relevant systems across the unit.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
RemoteExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
5 or more years of experience with information security including threat detection/mitigation, vulnerability management, user awareness, email firewall security, identity/access management, endpoint protection, firewall/IDPS security, auditing and risk assessment, incident response, data loss prevention, and policy development.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Reviews continuous audit and vulnerability assessment data and collaborates with the threat intelligence section to prioritize and manage patch updates based on the risk and impact within the environment.
$130,000 - $140,000 a yearFull-timeRemoteExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Hands-on experience with security assessment tools and techniques (e.g., penetration testing, vulnerability scanning). 3+ years of experience in cybersecurity with a focus on threat modeling, risk assessment, and security architecture.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge in performing risk and vulnerability assessment / penetration testing in ICS/OT environment, and threat hunting. 15+ years’ experience in OT and OT Security related areas in technical solution design, deployment, integration, risk assessment, solution development and pre-sales.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Plans and conducts assessment including but not limited to security engineering, vulnerability management, endpoint protection, web protection, external systems protection, threat hunting and penetration testing.
RemoteExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Ability to communicate and collaborate with various audiences from technical analysts (e.g., malware analysts, Cyber Threat Intelligence (CTI) analysts, Incident Response. At phia, trust us to solve the complex challenges of our connected world through top-tier cyber intelligence & threat hunting.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Familiarity with Incident Response, penetration testing principles, Common Vulnerability Scoring System (CVSS), and MITRE. Advance knowledge / seek training in the field of information security management including the emerging threat actors’ techniques, tactics, and procedures (TTP.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Create and update system documents including Privacy Impact Assessment (PIA), Privacy Threshold Analysis (PTA), System of Record Notices (SORNs), Rules of Engagement, System Security Plans (SSP), Risk-Threat Pairing, Residual Risk and Risk Assessment Results Reports, Plans of Action and Milestone (POA&Ms), Artifact Documentation, Vulnerability Assessment Reports, etc.
$140,000 - $150,000 a yearFull-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Support the advancement of the Company s cyber threat and vulnerability management program to ensure consistent identification, analysis, response, and monitoring of cyber security threats, events, and vulnerabilities.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Experience with one or more of the following:o Security COTS integrationo Security Incident Event Managemento Insider Threat Monitoringo Operating System Hardeningo Vulnerability Assessment testingo Identification and Authentication schemeso Public Key Infrastructure and Identity Managemento Cross Domain Solutionso Computer Network Exploitation (CNE)o Computer Network Operations (CNO)o Malware Analysiso Reverse Software Engineeringo Security engineering.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Vulnerability Analyst performs assessments of systems and networks within the network environment or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy.
RemoteExpandApply NowActive JobUpdated 7 days ago
threat assessment vulnerability jobs
FEATURED BLOG POSTS
Structured vs Unstructured Interviews
The goal of an interview is to evaluate candidates based on their skills, personality, and knowledge. You want to choose the BEST candidate from your candidate pool, so the interview is something you can't mess up. As you begin planning your interview process, one of the major decisions you'll face is whether the interview should be a structured vs unstructured interview. So let's take a dive into the differences and sort out which circumstances warrant which interview process.
How to Describe Your Personality with Examples
Imagine you’re in an elevator with the CEO of your dream company and you get to talking. The conversation is going well and you start to imagine yourself working for their company when the CEO turns around and asks you “tell me a bit about yourself.” Would this catch you off guard or would you be able to give a clear and succinct description of who you are?
4 Ways to Make Your Job Posting More Inclusive
According to a Glassdoor survey,
How to Calculate Net Income
Understanding your finances can be daunting even if you’re good with numbers. Your net income, in particular, is a key metric for determining how well you’re doing financially and whether your current way of operating is sustainable or not.
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra:
6 Best Ways to End a Cover Letter with Examples
Including a cover letter with your resume is a great way to introduce yourself to the hiring manager, tell them why you’re the ideal fit for the role, and provide context about your personal situation. A strong cover letter will give you an advantage over other applicants. But it’s important that you structure it properly and write it powerfully so that it carries an impact. This article will discuss how to end a cover letter effectively so you catch the eye of a hiring manager and increase your odds of landing an interview. Read on to learn more.
How to Write a Follow-Up Email for a Job Application?
Most times, we have to do more than submit a "sugar-coated" resume to land our dream jobs. Going the extra mile to follow up on your job application can increase your chances of employment. Additionally, it may even help you get confirmation sooner on whether you are seriously being considered for the job or not.