- UpvoteDownvoteShare Job
- Suggest Revision
Plans and conducts assessment including but not limited to security engineering, vulnerability management, endpoint protection, web protection, external systems protection, threat hunting and penetration testing.
RemoteExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Whitepaper Authoring: Develop well-researched, insightful, and engaging whitepapers addressing various aspects of IT and cybersecurity, such as threat intelligence, incident response, risk assessment, and compliance.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Strong experience managing security information and event management (SIEM) systems, threat intelligence platforms, security automation and orchestration solutions, vulnerability management platforms, intrusion detection and prevention systems (IDS/IPS), file integrity monitoring (FIM), data loss prevention (DLP) and other network and system monitoring tools.
RemoteExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Vulnerability assessment and reporting including comprehensive understanding of Vulnerability Management methodologies and procedures, threat assessment, and remediation management.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Conduct threat hunting and/or compromise assessment engagements to identify active or dormant indicators of compromise (IoCs) using Crypsis and Palo Alto Networks’ threat hunting tools (and/or client owned hunting instrumentation where applicable.
Full-timeRemoteExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Familiarization with Title IX, Clery Act, and Threat Assessment. Current or former DCJS general and/or Special Instructor Certification. KSA's/Required Qualifications High School Diploma or General Education Diploma (GED)Certified law enforcement officer in the Commonwealth of Virginia.
$50,000 - $52,000Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
A vulnerability assessment includes development of threat data requirements, submission into the U.S. intelligence network, and integration of final threat products into RTP planning and execution for HQ AFC and its MSCs Concept Development activities, Projects, Programs, and Program Manager’s Programs of Record and Urgent Operational Needs.
ExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
In this role you will be responsible for Cyber Threat Incident Response’s regulatory engagement and response, cyber risk assessment and obligation management, and organizational risk compliance and reporting.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Respond to crisis situations, coordinate the Counseling Center's emergency and crisis-response procedures, participate in threat assessment activities, and coordinate the Counselor On-Call schedule.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of information security principles, including risk assessment and management, threat and vulnerability management, incident response and identity and access management. Knowledge of audit and assessment activities and processes such as configuration management.
ExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Allied Universal Risk Advisory and Consulting Services, North America's leading specialized risk and threat assessment, prevention, intelligence, and investigative practices provides rewarding careers that give you a sense of purpose.
Part-timeExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Founded in 2017, Coalition combines broad insurance coverage with a digital risk assessment and continuous security monitoring to help organizations protect themselves in todays hyper-connected world.
ExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Lead a team of security engineers for delivery of Cybersecurity project management, continuous diagnostics and mitigation, threat mitigation and incident response, security architecture support, critical infrastructure protection, patch management, vulnerability management, risk management, information assurance, penetration testing, cybersecurity services, and Security Assessment and Authorization (SA&A) documentation.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
7+ years of combined experience in cybersecurity monitoring, intelligence gathering, analyzing, researching, cybersecurity event evaluation and incident response, vulnerability analysis, threat analysis and risk assessment (TARA), automotive systems, embedded systems.
ExpandApply NowActive JobUpdated 5 days ago
threat assessment jobs
FEATURED BLOG POSTS
4 Ways to Make Your Job Posting More Inclusive
According to a Glassdoor survey,
How to Calculate Net Income
Understanding your finances can be daunting even if you’re good with numbers. Your net income, in particular, is a key metric for determining how well you’re doing financially and whether your current way of operating is sustainable or not.
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra:
How to Avoid a Bad Hire
"A new employee who doesn't meet the minimum performance, quality, and culture fit standards you set when you began sourcing and recruiting. Additionally, bad hires will immediately show signs of self-interest instead of an interest in their role and the company."
How to Ask for a Letter of Recommendation
When the job board you subscribe to finally posts your dream job, you may feel like the stars have aligned. But part of securing a position that matches your career plan is ensuring you address all the application basics. You know, the resume, the cover letter, the portfolio. It seems like you've got this in the bag — until you realize they want a letter of recommendation, too!
What Are SMART Goals?
When it comes to achieving our goals, there’s a lot of noise to work through. A study by the University of Scranton has found that only 8% of people who set New Year’s resolutions actually achieve them. Our busy lives might be one reason for this. Another, even more important reason, is our approach to goal setting. Being too vague, too ambitious or simply unclear on the timeframe can set us up for failure.
In-House vs Outsourcing Recruiting: Which is Better?
When looking at in-house vs outsourcing recruiting, it is important to nail down the benefits for each and whether those benefits outweigh the risks that follow.