- UpvoteDownvoteShare Job
- Suggest Revision
Partner with security engineering, observability, and vulnerability management to define logging, alerting, patching, backup, and recovery capabilities and detect, prioritize, remediate issues and threats across infrastructure assets.
Full-timeExpandApply NowActive JobUpdated 28 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Implement and operate Tenable - Vulnerability Management solutions across a large and diverse enterprise (600K+ users, 600+ applications, large IP-enabled footprint) Provide guidance and leadership to determine, develop, plan, test, and implement Tenable - Vulnerability Management protection and security requirements for the enterprise.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As a Expert Vulnerability Analyst you will drives DFS Cybersecurity strategic Compliance/Vulnerability management decisions. Principles of enterprise risk management lifecycle.
$103,000 - $174,200 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Expertise in endpoint management tools such as Intune, Airwatch, JAMF, and AutomoxSkilled in the administration of software policies, vulnerability management, and application updates to Windows 11 & MacOS devices.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Explore more InfoSec / Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Accomplished sales leader with demonstrated success in delivering revenue growth focused in services and technology to enterprise accounts within the San Francisco Bay Area. The Regional Director we’re looking for will be able to develop a multi-year account management plan and organize a cross-functional team to deliver this plan and execute new business opportunities.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Conducting vulnerability management assessments using ACAS (Tenable Nessus) and other tools including mitigation development and POA&M and documentation support. Expert experience conducting Tenable ACAS vulnerability management and reporting using Security Center, Nessus, PVS), experience with IAVM/IAVA management and reporting desired.
$86,000 - $138,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Establish requirements for, and oversee operation of, an enterprise information security architecture and infrastructure that includes Security Information and Event Management, Network and Host Intrusion Detection/Prevention Systems, Vulnerability Scanning and Penetration Testing.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience in identity access management, encompassing single sign-on, identity federation, lifecycle management, enterprise directory architecture/design, and resource provisioning.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Hands-on experience working with a wide range of cloud and mobile security technologies such as web application firewalls (WAFs), endpoint management and response tools, privileged access management tools, encryption, PKI, certificate pinning, vulnerability management, container and container orchestration security and identity and access management tools.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Understanding systems management of enterprise services such as, but not limited to, Microsoft Endpoint Configuration Manager (MECM), Intune, Azure, and Teams. Working with the city’s Chief Information Security Officer (CISO) to assist in the performance of system security audits, performing frequent scheduled desktop and mobile device security and vulnerability scans using system utilities and software programs, and remediating or assisting in the remediation of any vulnerabilities that are found.
ExpandUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Director of Information Security Risk and Operations is a key enterprise role, reporting directly to the Chief Information Security Officer, for AllianceBernstein helping advance the overall cybersecurity program for the firm, responsible for identifying, evaluating and reporting on information security risks, overseeing cyber operations, threat & vulnerability management, and 3rd party security evaluations.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Cloud Security: Proficiency in cloud security and experience with cloud service providers (e.g., AWS, Azure, Google Cloud, O365) and SaaS Data Security, knowledge of secure cloud architecture design, cloud data protection mechanisms, and cloud identity and access management (IAM.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
AND Splunk Enterprise Certified Admin (Splunk Admins) OR Tenable SC Certificate of Proficiency (ACAS Security Center Admins) Managing a SIEM (Splunk, ArcSight) or an Enterprise Tenable Security Center deployment.
ExpandApply NowActive JobUpdated Yesterday
vulnerability management enterprise jobs
FEATURED BLOG POSTS
How to Pass a Personality Test with Flying Colors
Whether you’re applying for your first job or looking to move up the career ladder, personality tests aren’t usually the first thing we think about. But surprisingly, they can have a massive impact on how our future employers perceive us. In fact, a 2017 study by the Society for Human Resource Management (SHRM) has found that 32% of U.S. employers use personality tests when hiring for senior management positions, and 28% use them for middle management positions. Personality tests are also used for hourly workers and contractors, though less frequently.
Virtual Reality Job Interviews
With the advent of desktop computers, the arduous task of scouring through weekly job classifieds became a thing of the past. The mid-1990s brought about a new era where job seekers could easily search and apply for jobs online. The introduction of AOL's Instant Messaging feature provided an even faster means for employers and candidates to communicate and schedule interviews. As smartphones became more pervasive in the early 2000s, hiring managers increasingly used phone calls for screening and interviewing candidates. Despite this trend, over 80% of interviews still took place in person.
A Potential TikTok Ban?!
As you may already know, there has been a lot of talk lately about the possibility of a TikTok ban. While this has not yet come to fruition, it's important to consider the implications this could have for businesses and recruiters who rely on TikTok as a platform to market their brand, recruit new talent, and connect with their audience.
The Effects of Workplace Racism and Sexism
One day it's a covert statement to a mother returning to work after maternity leave. Another day it's a lingering gaze at an employee enjoying a culturally rich meal. These microaggressions (or sometimes macroaggressions) can take an employee from a confident, high-performer to one that feels insecure being themselves at work. Your employees engage with people with different ideas and feel most comfortable and valued when they can work without losing their cultural, racial, and gender identity. While most employers know this, why have workplace racism and sexism often been neglected?
When Rage Applying Strikes: How to Identify Unserious Candidates
As the job market remains highly competitive, we have seen a surge in "rage applying." This is when candidates apply to multiple jobs, often without considering whether they are truly interested in the role. Rage applying goes hand-in-hand with quiet quitting. Often, employees want to entertain the thoughts and feelings of leaving their job, but they aren't necessarily serious about leaving yet. Meanwhile, other employees engaging in this trend are actually trying to find a better role. As a recruiter, it can be hard to identify who are the real applicants in a sea full of quiet quitters, but understanding rage applying and identifying red flags will certainly help.
How to Increase Job Ad Exposure
In today's competitive job market, writing quality job ads is critical for attracting top talent to your organization. While networking and candidate referrals are prime real estate for finding qualified candidates, nothing beats the tried-and-true method of writing an extraordinary job ad. But while writing a great job ad is the first step, what's more important is increasing visibility. You could have the most detailed, well-written ad on the internet, but if no one sees it, then you are wasting time (and potentially money!). Employers often believe that job boards are the root of the problem, but you can learn how to increase job ad exposure by tweaking a few steps of your recruitment process.