- UpvoteDownvoteShare Job
- Suggest Revision
Ability to understand information security risks associated with vulnerability and penetration testing. Information Security Certifications such as CISSP, CEH, GPEN, OCSP, RHCSA, CompTIA Security+ Linux+, GIAC, GCIH, GCFA, GCIA, GNFA, GCUX or CISA are a plus.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with multiple Information Security domains, such as Infrastructure Vulnerability, Data Loss Prevention, End User Security, Network Security, Internet Security, Application Security, Cloud Security(AWS), Identity & Access Management, etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Information Security Analyst will manage all aspects of infrastructure systems used to manage CND-SP networks & resources and will assess threats to the environment. Security certifications : CCNA Security, CySA+, SSCP, or equivalent certification.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Senior Information Security Analyst , you will be responsible for vulnerability management, performing NIST based risk and maturity assessments, incident response planning, and delivering security awareness training.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Information Security Certifications related to vulnerability management like CISSP, CISM or CRISC.– Experience in Information Security Risk Management frameworks and best practices for Vulnerability management, Risk Analysis, Reporting Metrics and Assessments.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Keywords: Tampa FL Jobs, Lead Vulnerability Management Engineer, Vulnerability Management, Cybersecurity, Rapid 7, Qualys, Tenable, Kenna, NorthStar, Brinqa, Public Cloud, CISSP, CISM, CRISC, Security Risk Management, Florida Recruiters, IT Jobs, Florida RecruitingLooking to hire for similar positions in Tampa, FL or in other cities.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Active participation in the Information and Cybersecurity, Bank Vulnerability Management, and Data Loss Prevention programs including efforts related to vulnerability remediation planning, tracking, implementation, threat research, log analysis, end-user security education and training, and recommendations for process improvement.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Job Title/High Level Position Summary:Senior Information Security Engineer – SOX Compliance Lead is responsible for the planning, design and build of security architectures; oversees the implementation of network and computer security and ensures compliance with corporate cybersecurity policies and procedures.
Full-timeRemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Works closely with Information Systems Security Manager (ISSM) to ensure annual FedRAMP and CMMC compliance. Working knowledge in the application of information security concepts, principles, and practices.
RemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This is a hands-on, highly technical position within a fast-paced environment, reporting to the Director of Information Security at our technology center of excellence in Walnut Creek, CA. We are building the Information Security Program, and you will have a great experience building a greenfield environment.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Mature risk and vulnerability management programs by driving security and risk assessments, vulnerability analysis, and prioritizing remediation efforts. 10+ years of experience in information security supporting risk management initiatives across security pillars including operations, GRC, IAM, awareness, and architecture.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Assist in the selection, testing, implementation, documentation, operation and maintenance of various information security technologies such as authentication devices, access controls, firewalls, IDS/IPS/SIEM/EDR systems, malware detection systems, forensic and vulnerability management tools.
$120,000 - $140,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As an Information Security Analyst you will assist more senior members of the team in managing day to day security operations, including Investigating & resolving alerts & reports from Endpoint Detection & Response tools (EDR, CrowdStrike), mail filtering tools (Checkpoint Harmony), and others.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Expert knowledge in cloud architecture, DevSecOps, vulnerability management, and familiarity with regulatory frameworks such as SOC, ISO, and FedRAMP. Solid background in governance, risk, and compliance, and extensive experience with security frameworks and privacy principles.
Full-timeExpandApply NowActive JobUpdated Today
vulnerability information security jobs
FEATURED BLOG POSTS
How to Hire Remote Workers
Remote work used to be a thing of the future. However, with social, economic, and cultural events taking place across the country, it has now evolved into something that both job searchers AND companies are benefiting from. Remote work is multifaceted and can come in handy in a variety of situations. So, to help your small business take advantage of all of remote work's benefits, here is a short guide on how to hire remote workers.
How to Address a Cover Letter With Examples
It’s easy to get caught up in focusing on your resume – how it looks, what it says, and whether it’s going to land you a job interview. Because there is a big focus on building the perfect resume, job searchers often overlook the importance of a high-quality cover letter. Your cover letter plays a huge role in your first impression. It humanizes you and provides context for your resume.
How to Call Out of Work
No matter how happy we are with our jobs, there are days when we feel overwhelmed and want to call out of work. No, don't feel guilty. It's expected because we're humans, and we can't control the uncertainties of life. But the problem lies in how to call out of work without seeming uncommitted to work, especially if you seldom get work-free days.
What is Seasonal Employment?
Depending on where you are in your career, you might have first-hand experience with seasonal employment. Seasonal employment can be a great way to expand your skill set and earn extra cash while helping businesses meet seasonal increases in demand.
How to Avoid a Bad Hire
"A new employee who doesn't meet the minimum performance, quality, and culture fit standards you set when you began sourcing and recruiting. Additionally, bad hires will immediately show signs of self-interest instead of an interest in their role and the company."
How to Ask for a Letter of Recommendation
When the job board you subscribe to finally posts your dream job, you may feel like the stars have aligned. But part of securing a position that matches your career plan is ensuring you address all the application basics. You know, the resume, the cover letter, the portfolio. It seems like you've got this in the bag — until you realize they want a letter of recommendation, too!
What Are SMART Goals?
When it comes to achieving our goals, there’s a lot of noise to work through. A study by the University of Scranton has found that only 8% of people who set New Year’s resolutions actually achieve them. Our busy lives might be one reason for this. Another, even more important reason, is our approach to goal setting. Being too vague, too ambitious or simply unclear on the timeframe can set us up for failure.