- UpvoteDownvoteShare Job
- Suggest Revision
Participate in development and continuous improvement of the following cybersecurity programs: Threat & Vulnerability Management, Insider Threat Management, Data Governance, Cloud Security, Supplier Risk Management, Security Policies, and Cybersecurity Governance & Compliance.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
You will be an active team member in daily Security Operations which includes Incident Monitoring & Response, Web Application Firewall administration, SIEM administration, Threat Intelligence gathering, Threat Hunting, Tabletop Exercise execution, Red & Blue team engagements, and Vulnerability Management, developing hardened configurations, and improving system protection configurations.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The candidate must have foundational knowledge in endpoint security, network security, web security, data security technologies, cloud security technologies, vulnerability, and threat management.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
You will helm the Cybersecurity Engineering and Analysis teams, focusing on cultivating and advancing critical security capabilities, such as threat management, vulnerability management, data security management, and information security governance risk and compliance programs.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Must have proficient knowledge with three or more of the following technologies: Application / stateful / UTM firewalls; SIEM; DLP; Web content filtering; Web application firewalls (WAF); Vulnerability scanning and penetration testing; IPS/IDS; Security Operations Center operations; Wireless Networking; UNIX, AIX & Solaris, Linux, Windows Server Operating Systems; Endpoint and Malware.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience in Identity Access Management tools (SailPoint) is an added advantage. The UC Davis Medical Center, a world-renowned research hospital, is one of more than a dozen hospitals and shared services centers in the Sacramento region.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
We have extensive experience in the fields of cybersecurity, development, IT infrastructure, supply chain management and other professional services such as system design and continuous improvement.
ExpandApply NowActive JobUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Ten (10) or more years of professional work experience with at least eight years in Vulnerability Management, Threat Intelligence, SOC and/or Penetration Testing. Expertise with enterprise Vulnerability Management platforms such as Tenable, NetSparker, Nessus, Broadcomm Data Loss Protection, Invicti, DbProtect.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Expertise in endpoint management tools such as Intune, Airwatch, JAMF, and AutomoxSkilled in the administration of software policies, vulnerability management, and application updates to Windows 11 & MacOS devices.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
A solid grasp of secure software development practices, encompassing threat modeling, risk assessment, and vulnerability management. Proficiency in handling security tools and technologies, including web application scanners, vulnerability scanners, penetration testing tools, SIEM systems, and Certified Application Security Engineer (CASE) certification.
$96,180 - $183,480 a yearFull-timeRemoteExpandApply NowActive JobUpdated 2 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge in Endpoint Protection Information, Risk Management, Information Security, Governance Information Security, Management Security, Analysis Security, Risk Management System, Security Vulnerability Assessment, Vulnerability Management, Technical Project Management ,Security Project Management, Identity Management Software, Incident Response Software, Security Information and Event Management (SIEM), Software Threat Intelligence, and Software Vulnerability Management Software.
Full-timeExpandApply NowActive JobUpdated 22 days ago - UpvoteDownvoteShare Job
- Suggest Revision
You will play a crucial role in refining and creating processes related to the Risk Management Framework (RMF), threat/vulnerability analysis, penetration testing, and reporting exercises.
ExpandApply NowActive JobUpdated 13 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Be involved in threat hunts and purple team events that are put on to strengthen our knowledge of our environment. Graduate degree in Cybersecurity, Information Systems, Management or equivalent.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This position will have broad hands on responsibilities that include Incident response, threat/vulnerability, endpoint security, security risk/risk management, compliance and disaster recovery as well as building a small security team.
ExpandApply NowActive JobUpdated 21 days ago
vulnerability management threat jobs
FEATURED BLOG POSTS
How to Build a Supervisor Resume
Writing a great supervisor resume doesn't have to be rocket science. All you need to do is figure out what the company requires and how best to appeal to their needs. In other words, see the resume as your “key” into any organization of choice.
How to Write a Property Manager Resume
Property management experts have a variety of responsibilities, such as ensuring the safety and durability of commercial and residential buildings. During recruitment for such a position, recruiters assess your skills first-hand. This begins with how well you organize and tailor your property management resume. In other words, they can't afford to bring you onboard if your resume does not impress them.
Finally! Answers to 9 Job Search Questions You've Been Wondering About
There’s no college course on how to job search effectively. If schools offered “Job Searching: 101,” we wouldn’t have to write this article. Unfortunately, there’s nothing straightforward about a job hunt, and researching the best job searching methods is basically limited to sourcing peer advice and internet articles. Don’t worry; we’ve got your back. Here are definitive answers to the most common questions you’ve been dying to ask.
How to Successfully Make a Career Change in the New Year
The beginning of a new year is often a time for reflection and introspection. Millions of people use this time to come up with new resolutions to help them live happier and healthier lives. Pursuing our career ambitions is among the top five, right up there with exercising more and eating better.
How to Write a Chief Operating Officer Resume + Sample
Are you looking to become the Chief Operating Officer in your company of choice? Do you want to create a compelling COO resume that will earn you the job? This article is for you.
Spotting the Details to Build a Construction Project Manager Resume
So you’re ready to become a Construction Project Manager! To achieve this goal, you need to find the right role and write the best resume you can to show a prospective employer that you’re a great fit.
6 Tips to Create a Management Consulting Resume + Sample
So, you want to land a job as a management consultant? Well, here is a management consultant resume sample and some tips below. This will help you create a mind-blowing resume that will keep you in the spotlight during recruitment.