- UpvoteDownvoteShare Job
- Suggest Revision
Manage the vulnerability assessment infrastructure - Tenable.io and Tenable Nessus Scanners. Experience with vulnerability management practices in AWS, GCP, or Azure. This individual should be an experienced cyber security professional with a strong understanding of how to create and lead vulnerability management programs.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Author vulnerability management guidelines, processes, policies, and standards. Manage the Vulnerability Management program as a leader and subject matter expert. Proven experience in security operations, vulnerability management, or a similar position.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience supporting key cybersecurity activities including vulnerabilityassessments, control development, security plan documentation,penetration testing, and the Risk Management Framework (RMF.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Lead, Vulnerability Management will be responsible for developing, coordinating, and streamlining the vulnerability management program at Under Armour. Continually improve awareness of the latest technology trends, mainly as they apply to vulnerability management and technologies used within the company.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
3+ years of experience utilizing vulnerability scanning technology from companies such as Tenable or Rapid7. Advocate for policy and technological improvements across the company related to cyber security and vulnerability assessment.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Information Assurance Vulnerability Management (IAVM) and vulnerability analysis. Working knowledge of VRAM, National Institute of Standards and Technology (NIST) security controls, Risk Management Framework (RMF), DIACAP, and other Marine Corps/Navy/DoD security compliance processes.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience performing vulnerability assessments on Windows, Linux, networking and other IP devices, mobile environments, and Cloud environments. Understand, design, and develop vulnerability mitigation strategies, prioritize identified vulnerabilities, and manage risk associated with vulnerabilities.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with deployment, configuration, and maintenance of Tenable.sc, Nessus Manager, Nessus Vulnerability Scanner, Nessus Network Monitor, and RedSeal. Requisition Type: Full Time Position Status: Contingent Position Title: System Administrator Location: Arlington, VA Security Clearance:Secret Duties and Responsibilities The System Administrator supports this Transportation Security Administration Information Technology (TSA IT) Task Order (TO) by managing and administrating all physical testing platform assets, enterprise Information Assurance & Cybersecurity Division (IAD) toolsets, and vulnerability identification platforms.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with the review and creation of mitigation reports from compliance and vulnerability scanning tools (Nessus, SCAP, etc. Experience with compliance and vulnerability scanning tools (Nessus, SCAP, etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Perform vulnerability assessments by both manual and automated methods. Cyber Vulnerability Lead. Licenses/Certifications: One or more cyber security or audit certifications such as GEVA,CISM, OSCP, CASP, GIAC (or equivalent experience.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Work with the IT Department in the maturation and configuration of security controls including but not limited to antivirus, SIEM, IT/OT vulnerability management, and network security technologies.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Security tools: Microsoft 365 E5 Suite, Tenable/Nessus vulnerability management, a SIEM, Logmonitor. Management tools: Intune, Configuration Manager, Citrix. Ensuring the stability, availability, performance and security of the enterprise network; including, but not limited to, internal/external network security, vulnerability scanning, patching and remediation, software/firmware updates, server class operating systems, managing cloud services and other duties as assigned.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Assist in the selection, testing, implementation, documentation, operation and maintenance of various information security technologies such as authentication devices, access controls, firewalls, IDS/IPS/SIEM/EDR systems, malware detection systems, forensic and vulnerability management tools.
$120,000 - $140,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Ability or experience in evaluating scan report data from Tenable Nessus; participate in the audit, review and response phases of the Vulnerability Management (VM) life cycle. Ability to utilize remote access out-of-band management tools such as Red Hat Satellite, SSH, SCP, integrated Dell Remote Access (iDRAC), integrated Lights-Out (iLO), or KVM technologies.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Demonstrated expertise in cloud security practices, including encryption, data protection, network security, and vulnerability management. - Architect and implement identity and access management solutions to ensure proper user authentication and authorization, adhering to FedRAMP standards.
ExpandApply NowActive JobUpdated 2 days ago
vulnerability management nessus jobs
FEATURED BLOG POSTS
Making Hybrid Work More Efficient
Covid was a catalyst for change in the work environment. Keeping people safe and helathy was the initial goal for employers, but the unintended result was the considerable demand in remote work. Now, onsite work has been dramatically altered to remote work, which is now transforming into a combination of the two: hybrid work.
How Can HR Technology Help Retain Employees?
Human resources' rapid adoption of technology has led to new ways of streamlining human capital management. Based on the IEE Global Study, these technologies changed how HR handled recruitment and retention in 2022. This includes tech like
Why is Time Management Important? 10 Crucial Importances of Time Management
We’ve all been there before. What starts as a relaxing evening scroll quickly becomes a full-blown binge. You blink, and it’s midnight - throwing off your entire next day before it even starts. And at its worst, this indulgence might leave you feeling behind on things you planned to finish that night. This is why time management is important.
Minimizing Candidate Renegs During the Hiring and Onboarding Process
Candidates reneging on job offers or during the onboarding process can be a frustrating experience for any recruiter. In a talent-driven job market, it’s common for candidates to have more than one job offer to consider. It becomes a race against time to see which organization can offer the best career experience, compensation, and circumstances that secure the right employees.
10 Reasons to Be on Time at Work
Being punctual at work may not be something you’ve given much thought to, but it’s the foundation for building a successful career. All of your technical or job-specific skills will be in vain if your peers and superiors can’t trust you to show up on time and do the work. In fact, Simon Sinek once famously said that
10 Importancies of Setting Realistic Goals
We’ve all heard how important it is to set professional and personal goals. Developing and establishing goals keeps us motivated and moving forward in life. But not all goals are created equal. If you’re chasing goals that are too lofty, you’ll end up disappointed when you cannot reach them. Setting goals that are achievable and measurable is the key to success.
Email Etiquette Principles - Why is it Important
Why is email etiquette important? Let's imagine you're hiring for a new role, and you’ve just received the email below.