- UpvoteDownvoteShare Job
- Suggest Revision
Experience and knowledge with information security principles, including risk assessment and management, threat and vulnerability management, incident response, and identity and access management.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
ResponsibilitiesVice President, Threat Management & ResponseJob Description:Humana is a Fortune 50 market leader in integrated healthcare whose dream is to help people a. Our integrated model includes integrating recently acquired assets, such as Kindred at Home and onehome, with strategic partners such as heal and Dispatch and our owned care management, palliative, and other specialized programs.
Full-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Assists client in evaluating, enhancing, developing, and managing various programs including Cybersecurity, Business Continuity and Disaster Recovery, Data Protection and Privacy, Threat and Vulnerability, Security Incident Detection and Response, Identity and Access Management, Security Operation Centre and SIEM, Data Loss Prevention, Security Awareness and Training, Phishing Campaigns.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
In this role you will be responsible for overseeing the day-to-day operations of our security program, including threat detection, vulnerability management, incident response, and cloud security compliance.
ExpandUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Identifies and develops Security services portfolio product sales opportunities (SASE, DDoS Mitigation, Threat Intelligence, Professional Services, and other Security services as developed), provides product solutions, ensures customer satisfaction, and maintains positive ongoing relationships to maximize sales for the company.
ExpandUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Designing and integrating marketplace leading vulnerability management, threat management, monitoring and data protection processes and platform tools. If you're seeking a career in vulnerability management, quality assurance, or GRC tools, then Application Security at Deloitte is the offering for you.
Full-timeRemoteExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Proven experience with security controls, network protocols, cryptography, authentication, authorization and identity management. Define and develop security requirements based on business strategies, risk assessments, threat modeling, testing and existing system analysis.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This will include the engineering, implementation and management of security initiatives related to Network Security and Threat Vulnerability Management including evaluation and adoption of new systems, working with business units regarding vulnerability issues, and Palo Alto firewall engineering and administration.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of continuous monitoring, cybersecurity risk management, disaster recovery, FISMA compliance, information security architecture, information security auditing, security control assessment, threat modeling, threat management, vulnerability analysis, and vulnerability assessments.
$75,600 - $172,000 a yearExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Reports and escalates situations to the Threat Management team as appropriate. oCSO - Commissioned Security Officer Texas Private Security Level 3 (2 attempts permitted). oCSO - Commissioned Security Officer Texas Private Security Level 2 (not required if have Level 3) required within 14 Days of hire.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Familiarity with: Zero Trust Network Access (ZTNA) and Secure Access Service Edge (SASE) frameworks, Identity, Credential, and Access Management (ICAM) (OKTA), Cloud Workload Protection Platform (CWPP), Security Operations Center (SOC) Operations, Vulnerability Threat Management, and Compliance.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Serve as a trusted advisor to the Chief Information Security Officer regarding all aspects of an advanced threat management center. Mentor clients on the production of strategic, operational, tactical cyber threats, and related intelligence about threat actor groups and methodologies used.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Leverage Security Orchestration, Automation, and Response (SOAR) or Security Information and Event Management (SIEM) tools to identify threat patterns, enrich investigations, and build automation-supported workflows.
ExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Active participation in the Information and Cybersecurity, Bank Vulnerability Management, and Data Loss Prevention programs, including efforts related to vulnerability remediation planning, tracking, implementation, threat research, log analysis, end-user security education and training, and recommendations for process improvement.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Capital One is seeking a technical security product leader to deliver game-changing identity and access security solutions based on threat, data, and design thinking. Senior Manager, Cybersecurity Product Management (Cloud/IAM.
ExpandUpdated Today
threat management jobs
FEATURED BLOG POSTS
Why is Time Management Important? 10 Crucial Importances of Time Management
We’ve all been there before. What starts as a relaxing evening scroll quickly becomes a full-blown binge. You blink, and it’s midnight - throwing off your entire next day before it even starts. And at its worst, this indulgence might leave you feeling behind on things you planned to finish that night. This is why time management is important.
Minimizing Candidate Renegs During the Hiring and Onboarding Process
Candidates reneging on job offers or during the onboarding process can be a frustrating experience for any recruiter. In a talent-driven job market, it’s common for candidates to have more than one job offer to consider. It becomes a race against time to see which organization can offer the best career experience, compensation, and circumstances that secure the right employees.
10 Reasons to Be on Time at Work
Being punctual at work may not be something you’ve given much thought to, but it’s the foundation for building a successful career. All of your technical or job-specific skills will be in vain if your peers and superiors can’t trust you to show up on time and do the work. In fact, Simon Sinek once famously said that
Recruiting in a Recession: Hard Truths That Talent Acquisition Experts Must Accept
The summer had economists from around the globe embroiled in a debate about a possible recession coming in the next few years (or months). As of October 2022, the U.S. Labor Department data put the current inflation rate at 7.7%. The recent layoffs in the tech industry are just the first of what is soon to be a string of cutbacks by companies looking to save costs. For recruiters, this means freezes in hiring and fewer openings. It will also include the uphill task of finding the best candidates for them from the coming influx of recently laid-off job seekers. Now is probably a good time to brace for tough times in the next few years in the talent acquisition industry. To survive and thrive recruiting in a recession, here are some hard truths you will need to accept.
10 Importancies of Setting Realistic Goals
We’ve all heard how important it is to set professional and personal goals. Developing and establishing goals keeps us motivated and moving forward in life. But not all goals are created equal. If you’re chasing goals that are too lofty, you’ll end up disappointed when you cannot reach them. Setting goals that are achievable and measurable is the key to success.
Email Etiquette Principles - Why is it Important
Why is email etiquette important? Let's imagine you're hiring for a new role, and you’ve just received the email below.
10 Reasons HR is Important to an Organization
"Nothing we do is more important than hiring and developing people."