- UpvoteDownvoteShare Job
- Suggest Revision
Manage the vulnerability assessment infrastructure - Tenable.io and Tenable Nessus Scanners. Experience with vulnerability management practices in AWS, GCP, or Azure. This individual should be an experienced cyber security professional with a strong understanding of how to create and lead vulnerability management programs.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Strong knowledge of vulnerability management tools (Aqua, Palo Alto Prisma, Wiz, CrowdStrike, Tenable Nessus, or Qualys preferred) With a focus on vulnerability management, container security, and other related areas, the ideal candidate will have 5+ years of experience in cloud security and a strong understanding of cloud computing concepts and technologies.
ExpandApply NowActive JobUpdated 21 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Additionally, the Information Assurance Security Specialist should be able to perform security evaluations and vulnerability assessments using the DOD Assured Compliance Assessment Solution (ACAS), Nessus vulnerability scanning tool.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Author vulnerability management guidelines, processes, policies, and standards. Manage the Vulnerability Management program as a leader and subject matter expert. Proven experience in security operations, vulnerability management, or a similar position.
ExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with vulnerability management scanners, including Qualys and Tenable Nessus. The successful candidate will help set up, operate, and manage/maintain a variety of security solutions including vulnerability management, endpoint security, security information and event management, and governance/risk/compliance.
ExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Lead, Vulnerability Management will be responsible for developing, coordinating, and streamlining the vulnerability management program at Under Armour. Continually improve awareness of the latest technology trends, mainly as they apply to vulnerability management and technologies used within the company.
ExpandUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
1 year or more of experience utilizing security relevant tools, systems, and applications in support of Risk Management Framework (RMF) to include: NESSUS, SPLUNK, ACAS, DISA STIGs, SCAP, Audit Reduction, and HBSS.
ExpandUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of vulnerability management, patching, and related management tools (e.g. BigFix, RedHat Satellite Server, Nessus) This role will also assist the team in vulnerability management, patch and compliance activities, and public cloud remediation efforts.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Security: Compliance, Information Assurance, Data Protection using industry-best practices and tooling (Crowdstrike Falcon, Tenable.io, Splunk, HashiCorp Vault signers, PKI and Certificate Management.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Network Virtualization: Akamai Global Traffic Management and Edge & Delivery Networks, Elastic Load Balancing Services, Cloud security patterns: Rehydration, landing zone, ingress/egress traffic management.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Develop strategies for large scale vulnerability remediation across the enterprise. 3+ years’ experience with server patch management systems (e.g. RedHat Satellite, BigFix) 3+ years’ experience with design and implementation of a patch management solution.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Experience supporting key cybersecurity activities including vulnerability assessments, control development, security plan documentation, penetration testing, and the Risk Management Framework (RMF.
$100,000 - $160,000 a yearExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
The contract’s support functions are IA Management, Federal Information Security Management Act (FISMA) coordination and reporting, Risk Management Framework (RMF) application, IA compliance measurements and metrics, Assessment and Authorization (A&A), Vulnerability Management, and Cyber Defense support.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Storage: Block Storage, Object Storage, Lifecycle Management and Data Replication, Backup & Recovery Best Practices. Excellent understanding of change management, testing requirements, techniques, and tools to ensure high system availability.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Vulnerability management/scanning: ACAS , Nessus, SCAP. Configure and monitor Security Information and Event Management ( SIEM ) tools. Conducts static and dynamic software analysis and software vulnerability testing.
ExpandApply NowActive JobUpdated 5 days ago
vulnerability management nessus jobs
FEATURED BLOG POSTS
10 Importancies of Setting Realistic Goals
We’ve all heard how important it is to set professional and personal goals. Developing and establishing goals keeps us motivated and moving forward in life. But not all goals are created equal. If you’re chasing goals that are too lofty, you’ll end up disappointed when you cannot reach them. Setting goals that are achievable and measurable is the key to success.
Why is Professionalism Important & How to Be Professional
You might have heard the word professionalism thrown around in the workplace, but do you know what it means? And do you know how to maintain professionalism no matter the circumstances?
Why Cover Letters Are Important & How To Write One | Job\Searcher
Most people completely waste their cover letter real estate. Your cover letter is another opportunity to speak directly about how your background and capabilities align with the opportunity you seek. It also allows you to introduce your personality a bit more than a resume does. So, why are cover letters important? Because you can stand out, big time, with a custom cover letter directed to the right person.
Hiring Again After Mass Layoffs
It's never an easy decision to let members of your staff go, but depending on the state of your business, mass layoffs may have been the only way to survive. Now that you're months into the future, you may find yourself itching to start hiring again after previous layoffs.
Into the Heart of the Ukrainian-Russian Conflict
The story of our US-Ukraine connection started when Kevin met Dave. Days away from quitting his last "real" job as a seafood plant manager, Kevin reconnected with a long-lost friend from high school. Little did he know, this long-lost friend was dating his soon-to-be business partner. After meeting Dave through their mutual connection, it didn't take long for the two to start bouncing business ideas off each other. The flow of creativity soon grew into a business partnership that has withstood the test of time.
Why Are Internships Important & How Can You Get One?
Internships are for college students or people who have just completed their degree. If you are a student or recent grad, you may be wondering how to land an internship. If you've never had one, you may even wonder if you need one. After all, didn’t you work in that call center while also doing exams? Or perhaps you’ve bartended your first year in college?
Why is Networking Important & How to Network Effectively
Even if you’ve worked hard to earn a degree from an impressive school, landing your dream job might still come down to who you know – otherwise known as networking. Lots of qualified candidates might apply for a job, but the person who gets it might very well be so-and-so’s sibling, friend, or kid. Sometimes the only way to get your foot in the door is to know someone.