- UpvoteDownvoteShare Job
- Suggest Revision
Understanding of IT security principals, technologies, best practices to include logical access control, PKI and other encryption methods, network-based and host-based IDS/IPS, security configuration baselines, auditing, vulnerability discovery, and management.
$122,200 - $220,900 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Preferred Qualifications Vulnerability assessment and analysis experience utilizing ACAS/NESSUS and DISA STIGs. Experience with DoD implementation of the Risk Management Framework (RMF) and governing directives (NIST, CNSS, DSS, etc.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
6) Vulnerability management using Nessus, NMAP, Windows, Unix, and Linux OS (7) experience with Packet/Protocol Analysis using Opnet, Riverbed, Wireshark, and taps. Job description Job Description FAR Group headquartered in Stafford, VA., is a Service-Disabled Veteran Owned Small Business that provides federal professional services, primarily engaged in providing advanced information technology, cyber security, management systems support, as well as business and infrastructure management services.
RemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Ability or experience in evaluating scan report data from Tenable Nessus; participate in the audit, review and response phases of the Vulnerability Management (VM) life cycle. Ability to utilize remote access out-of-band management tools such as Red Hat Satellite, SSH, SCP, integrated Dell Remote Access (iDRAC), integrated Lights-Out (iLO), or KVM technologies.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with ACAS and vulnerability databases including Tenable Nessus, NVD and NIAP. Experience with Risk Management Framework (RMF) documentation, tracking, reporting. Minimum IAT Level II Certification such as Security+, CND, SSCP, GSEC, GICSP, CYSA+, CCNSecurity.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Working knowledge of security tools, e.g., Qualys and Tenable Nessus to provide real-time view of IT assets, network security events, and consolidated vulnerability and compliance data. Using various tools such as ServiceNow, Splunk, and Office Automation to perform vulnerability management duties.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience in configuration and use of cyber defense and vulnerability assessment tools such as ACAS/Nessus, Rapid7 Nexpose, etc. Uses methods such as encryption technology, vulnerability analysis and security management.
ExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Vulnerability analysis using cyber security tools (e.g., ACAS, Nessus, SCAP, SCC, eMass, STIG Viewer) Experience with cyber risk management framework engineering process. Support a wide range of security issues including architectures, firewalls, electronic data traffic, network access, event management and backup solutions.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Will conduct RMF Self-Assessment and Information Assurance Vulnerability Management (IAVM) monitoring to include assisting with dissemination, installation, Information Assurance Vulnerability Alerts (IAVA) reporting, and compliance procedures.
$75,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Vulnerability Diagnostic Tools, Like Nessus and , Tenable Information Security Standards, Applications, and Controls. – Experience working with common network monitoring and management tools (Cisco Prime, SolarWinds, WireShark, ServiceNow, etc.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Network Mapping and Vulnerability Scanning: Familiarity with network mapping, vulnerability scanning tools (e.g., ACAS, Nessus), and Security Technical Implementation Guides (STIGs) and Security Requirement Guides (SRGs.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Experience supporting key cybersecurity activities including vulnerability assessments, control development, security plan documentation, penetration testing, and the Risk Management Framework (RMF.
$100,000 - $160,000 a yearFull-timeExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with vulnerability management tools like Nessus, Rapid7 or Qualys. Clearwater Security and Compliance LLC is the leading provider of cybersecurity, risk management, and HIPAA compliance software, consulting, and managed services for the healthcare industry.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Keywords: Cyber, security, vulnerability, STIG, RMF, Risk Management Framework, A&A, Assessment and Authorization, threat modeling, offensive, attack vector, defense-in-depth, DevSecOps, DSO, CI/CD, Pipeline, Containerization, AWS Cloud, Kubernetes, MBSE, Attack Vector, Attack Surface, Resilience, Survivability.
Full-timeExpandApply NowActive JobUpdated 8 days ago
vulnerability management nessus jobs
FEATURED BLOG POSTS
5 Common Interview Mistakes
Everyone's interview process is unique in some form or fashion. Like most, your interview process is crafted so you can get the most information out of your candidates to increase hiring confidence and make the right hiring decisions. However, there are often small problems in interview processes that could ultimately affect the success of hiring decisions.
Job Rejection Email Response with Examples
Glassdoor estimates that, on average, there are about 250 applicants for every job vacancy out there. If you’ve ever applied for a job, the odds are that you’ve received the dreaded job rejection email.
Structured vs Unstructured Interviews
The goal of an interview is to evaluate candidates based on their skills, personality, and knowledge. You want to choose the BEST candidate from your candidate pool, so the interview is something you can't mess up. As you begin planning your interview process, one of the major decisions you'll face is whether the interview should be a structured vs unstructured interview. So let's take a dive into the differences and sort out which circumstances warrant which interview process.
How to Describe Your Personality with Examples
Imagine you’re in an elevator with the CEO of your dream company and you get to talking. The conversation is going well and you start to imagine yourself working for their company when the CEO turns around and asks you “tell me a bit about yourself.” Would this catch you off guard or would you be able to give a clear and succinct description of who you are?
4 Ways to Make Your Job Posting More Inclusive
According to a Glassdoor survey,
How to Calculate Net Income
Understanding your finances can be daunting even if you’re good with numbers. Your net income, in particular, is a key metric for determining how well you’re doing financially and whether your current way of operating is sustainable or not.
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra: