Advanced Search


Focus Search:

penetration testing
application security
management analyst
incident response
cyber security
information security
hands on
  • Last Updated
  • Relevance
  • Urgently Hiring
All Jobs
  • All Jobs
  • Active
612,405 Jobs
VP, IT Security Operations And Controls
Sony PicturesCulver City, CA
The VP of IT Security Operations and Control is accountable for the planning, strategy, implementation, and operations of all technologies related to Endpoint security (EPP/EDR), Active Directory Services (MS ESAE), Vulnerability Management, Application Security, Identity Access Management and IT Change Control group while specifically ensuring the availability, integrity, and security for all systems worldwide.
Marcum LLPFort Lauderdale, FL
Assist with penetration testing, vendor and third party risk management, data privacy and information governance implementation, and vulnerability management program. Assist with review of system security monitoring and analysis tools, Identity and Access Management platforms, IT-GRC platforms, and DLP systems.
Full-time Grants Management Project Management?
You know the language of grants and RFPs, and how to judge if an opportunity is a good fit for an applicant.
This position is on a Forest Service unit where the incumbent serves as administrative support to one or more Grants Management Specialists.
Senior IT Security Engineer
Altice USA IncBethpage, NY
Hands on experience with the following security technologies: Cisco Identity Services Engine, SEP Anti-Virus and Anti-malware systems, Tenable vulnerability scanners, Metasploit or other application penetration testing systems, CyberArk and/or SailPoint, LogRythm, Checkpoint and/or Cisco FirePower technology, RSA SecurID, Crodwstrike.
Desktop Engineer / SCCM Specialist
Ntt DataLemont, IL
Knowledgeable and have used vulnerability management tools such as Tenable SC and is able to interpret vulnerability management output/scan results and develop remediation activities to be presented to change management and cyber teams.
Director Vulnerability Management (Remote)
RELX GroupPhiladelphia, PA
This role will primarily be focused on maturing the vulnerability management and security assurance functions within the GRC team. Hands on experience in both vulnerability management and security assurance.
Sr. Cybersecurity Specialist
Levi Strauss & CoSan Francisco, CA
Mature an emerging Threat Intelligence function by developing core foundational components to evaluate intel through the lens of cyber risk management, from initial analysis to final action. Minimum of four years or related experience in information security roles involving threat intelligence and/or vulnerability management.
Hiring Transparency

Transparency in hiring refers to the open and honest communication and information sharing that takes place between employers and job candidates. It encompasses all aspects of the hiring process, from posting job descriptions to providing feedback on performance during and after the interview process. In today's job market, hiring transparency has become increasingly important for both employers and candidates alike.

Vice President of Information Technology
Sony Pictures EntertainmentCulver City, CA
Leads SPEs Vulnerability Management, Application Security, IT Change Management, Active Directory Services, Identity Access Management, and global Endpoint management security activities in close collaboration with SPEs Information Security teams, ensuring clear and measurable security operations are executed, and a clear operation metric methodology is in place to allow consistent compliance across all areas.
Manager, Cybersecurity - Vulnerability Management, Analysis And Response
T - MobileBellevue, WA
Then come join the Cybersecurity, Trust and Protection Organization at T-Mobile as the Manager, Cybersecurity - Vulnerability Management, Analysis and Response! They coordinate Incident Response, conduct Vulnerability Assessments, install security patches, operate Intrusion Prevention Systems, correlate security related data across the enterprise, administer Firewalls and other access control points, and maintain Anti-Virus systems.
Security Architect
Cisco SystemsRaleigh, NC
Cisco's Security Visibility and Incident Command team is looking for a Security Architect focused on Vulnerability Scanning with extensive experience developing for cloud technologies such as Amazon Web Services (AWS), Google Cloud Platform (GCP), Azure and private clouds with working experience with Kubernetes and Docker and Vulnerability Scanning technologies such as Tenable, Qualys and Rumble.
Principal, Cyber Security Architect
BNY MellonAshburn, VA
Our cyber capabilities encompass the full spectrum of services from Cyber Operations (SOC, Cyber Threat Intelligence, Vulnerability Management, Cyber Incident Response, Penetration Testing & Red Teaming, Cyber Analytics & Fraud, and Insider threat) to Cyber Architecture and Engineering (Network, Platform, Cloud, and Applications Security.
Recruitment strategies that are weird, but actually work 

In the current candidate-driven job market, recruiters are looking for unique ways to attract talent. Some have resorted to even (dare we say it?) recruitment strategies on the border of weird and wacky. What can we learn from the unusual recruitment tactics that are being used and actually getting results? Here’s a rundown of some unique recruitment strategies that actually work. 

Sr. Cybersecurity Specialist
Levi StraussSan Francisco, CA
This role will be key in building and maturing LS&Co's threat intelligence, security awareness, and vulnerability management programs. Further, this position works with the broader Global Information Security (GIS) team to support cybersecurity strategy, priorities, and directives consistent with the vision of the Chief Information Security Officer (CISO) across LS&Co. globally.
ServiceNow GRC SME, Mid
Booz Allen HamiltonMcLean, VA
Lead planning, design, and integration of the Federal Civilian customer's ServiceNow Governance Risk and Compliance ( GRC ) , SecOps, and ITSM modules to improve the effectiveness and efficiency of asset, risk, and vulnerability management.
Security Architect
Cisco Systems, IncSan Jose, CA
The primary mission of SVIC is to help ensure enterprise, system, and data risk management by performing comprehensive investigations into cyber security incidents, and to assist in the prevention of such incidents by either compliance or engaging in dedicated threat assessment, mitigation planning, incident trend analysis, and security architecture review.
Security Architect
Cisco Systems, IncRaleigh, NC
This will be a hands-on role supporting the Vulnerability Management Operations Program. Strong understanding of vulnerability management and security testing practices and methodologies.
How To Make $100K a Year – No BS Strategies & Advice

If you’re like most of us, you’d love to be wealthier. Having more money would alleviate stress. It would make it easier to pay your bills and buy nicer things. Maybe it’d allow you to spend more time with your kids and go on more vacations. You’re not alone if you wish you could somehow earn a more significant income.

SOC Procedure Support Analyst - Secret Cleared
DeloitteHuntsville, AL
Bachelors degree and 2+ years of experience with workflow management, analytic capabilities, Security Information Event Management (SIEM), SOC disciplines, and vulnerability tools (Splunk, ServiceNow, VirusTotal, RiskIQ.

vulnerability management jobs

Latest Blog Posts: to Write a Recommendation Letter for a StudentWhen a student applies for their first job or for their next academic degree, they don’t have much experience to showcase their skills and personal qualities. Hiring managers and admissions officers, therefore, often look at recommendation letters as a way to go beyond the student’s GPA and learn more about the student’s skills and personal qualities. To Answer “Why Do You Want to Be a Supervisor” in an InterviewAnyone who has worked in a supervisor role knows how challenging yet rewarding it is. But chances are if you're trying to become a supervisor, you'll be forced to answer: is Career Cushioning?Is your organization prepared for “career cushioning”? in a Tight MarketAs a recruiter or employer, you know how much the economy affects your recruitment and retention efforts. You aren't just in competition with companies in your industry, but you are also fighting against inflation, recession, unemployment rates, and so much more. to Build a Candidate PersonaA candidate persona is a semi-fictional representation of your ideal candidate. Building a candidate persona is one of the best methods employers use to ensure their sourcing, recruiting, and hiring processes are focused. Knowing exactly what you're looking for streamlines everything and helps increase hiring confidence. So here's how to create a candidate persona and how to use it. to Get Into The Trades: Step-by-Step GuideGetting a trade job can be a great career move if you like variety and prefer to learn on the job instead of in an academic setting. A trade job can offer security and be a lucrative career path as the demand for skilled trade workers continues to grow. do Good Interviewers Prepare for Interviews?Just like candidates take the time to research you and your company, you should take the time to prepare for the interview. Preparing for the interview doesn't just reflect well on your employer brand and create a better candidate experience. Preparation also helps prevent bad hiring decisions. Bad hiring decisions are usually a result of poor execution during the hiring process. However, going into an interview fully prepared and ready to evaluate candidates will help avoid bad hires. So, here are 6 interview preparation tips for employers.