- UpvoteDownvoteShare Job
- Suggest Revision
Monitoring and tuning of the Tenable Vulnerability Management, SailPoint IdentityNow, SIEM and DLP systems. Experience with Tenable Vulnerability ManagementExperience with SailPoint IdentityNowExperience with Fortinet FirewallsSIEM Systems (pref.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
We are seeking a remote Cloud Security Architect Lead to join our team supporting the Security Architecture and Vulnerability Management Support Services contract for the National Oceanic and Atmospheric Administration's (NOAA) National Environmental Satellite, Data, and Information Service (NESDIS) information systems.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As the Information Security Engineer (Vulnerability Management Specialist/Engineer), your responsibilities include assessing risk and running continuous vulnerability monitoring of the environment, including segments requiring FedRAMP compliance.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with Tenable Vulnerability Management. Performs security assessments of applications and systems using penetration and vulnerability testing and risk analysis. Provide threat and vulnerability analysis as well as security advisory services.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Network/IT security monitoring vulnerability scanning, SIEM, logging, and incident response and investigation. Responsibilities include capacity planning, asset management, service level agreements, high-availability, problem management, risk and security, change management, incident management, disaster recovery planning, and project management.
$85,306 - $125,451 a yearExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This includes but is not limited to Network Monitoring, Preventative and Detection Controls, Forensics and Investigations, Security Awareness, Security Vulnerability Management, and Cyber Threat Intelligence activities.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Deep technical understanding and exposure to SIEM, vulnerability scanning and management, DLP, incident response planning and execution, EDR, IDS/IPS, content filtering, and penetration testing.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Broad knowledge of traditional security controls and technologies, such as Security Information and Event Management (SIEM) systems such as Securonix Next Gen, intrusion detection/prevention systems (IDS/IPS) such as Securonix Cloud Ingestor, public key infrastructure (PKI), antivirus and firewalls, in addition to newer offerings such as endpoint detection and response (EDR), threat intelligence platforms, security automation and orchestration, deception technologies and application controls.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Analyze continuous monitoring, configuration management, vulnerability management, asset management, software management and self-reported data to identify trends and anomalies cybersecurity performance and mitigation of risks.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Areas of focus for individual engineers may vary, but potential specialties include Cloud Security, Log Management & SIEM, Continuous Monitoring, Malware Prevention, Firewalls and Intrusion Detection, Vulnerability Management, and Security Awareness.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Explore more InfoSec / Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Strong understanding of network architecture, security technologies, and tools, including SIEM, IDS/IPS, vulnerability management, and threat intelligence platforms. Security Monitoring and Analysis: Define and implement comprehensive monitoring and analysis strategies, leveraging security information and event management (SIEM) solutions, intrusion detection systems (IDS), and other relevant tools, to identify security incidents, conduct investigations, and provide real-time threat intelligence.
$106,298 - $177,164 a yearExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
5+ years of information security experience including experience in one or more of the following security disciplines: information security monitoring, incident response, vulnerability management, host/network forensics, cyber-crime investigation, penetration testing, business continuity, or cyber threat intelligence.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Design and implement secure architectures for cloud-based applications, focusing on encryption, identity management, monitoring, alerting, detection network security, and data protection.
$120,000 - $150,000 a yearExpandUpdated 2 days ago
vulnerability management monitoring jobs
FEATURED BLOG POSTS
Recruiting in a Tight Market
As a recruiter or employer, you know how much the economy affects your recruitment and retention efforts. You aren't just in competition with companies in your industry, but you are also fighting against inflation, recession, unemployment rates, and so much more.
How to Build a Candidate Persona
A candidate persona is a semi-fictional representation of your ideal candidate. Building a candidate persona is one of the best methods employers use to ensure their sourcing, recruiting, and hiring processes are focused. Knowing exactly what you're looking for streamlines everything and helps increase hiring confidence. So here's how to create a candidate persona and how to use it.
How to Get Into The Trades: Step-by-Step Guide
Getting a trade job can be a great career move if you like variety and prefer to learn on the job instead of in an academic setting. A trade job can offer security and be a lucrative career path as the demand for skilled trade workers continues to grow.
How do Good Interviewers Prepare for Interviews?
Just like candidates take the time to research you and your company, you should take the time to prepare for the interview. Preparing for the interview doesn't just reflect well on your employer brand and create a better candidate experience. Preparation also helps prevent bad hiring decisions. Bad hiring decisions are usually a result of poor execution during the hiring process. However, going into an interview fully prepared and ready to evaluate candidates will help avoid bad hires. So, here are 6 interview preparation tips for employers.
How to Get a Union Job? A Step-by-Step Guide
A union job can significantly impact your job security, pay, and employment benefits. Whether this is your first job or you have years of experience, a union job can offer much-needed protection in a labor market where employees are hired and fired at will.
Should I Hire for Potential Over Experience?
The workforce is shifting every day. In fact, research from the World Economic Forum (WEF) shows over half of employees around the world will need to upskill or reskill by 2025. The rapid rise of digital literacy, automation, and new technologies will quickly supersede businesses that don't train ahead of the curve. With the dire need to invest in training, it's evident that hiring someone with experience isn't that much different than hiring someone without it.
How to Decide Between Two Job Offers: 10 Practical Tips
It’s arguably a good predicament to have. You’ve applied to many jobs, interviewed multiple times, and now find yourself with two legit job offers. Nice! But although this is a feel-good validation of everything you have to offer, a daunting choice lies ahead. How do you decide which job will be the best fit for you?