- UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Support the development and submission of Risk Management Framework (RMF) Assessment and Authorization (A&A) packages. Experience providing subject matter expertise in a cyber domain, including vulnerability assessment and scanning tools, and assessing system compliance with security controls.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Work within Agile frameworks such as Scrum and Kanban, utilizing Atlassian Jira and Confluence for project management and documentation. Secure sensitive data using HashiCorp Vault and SOPS Encryption for secrets management.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Assist in Identity Access Management (IAM) program management, service delivery model and strategy planning. User identity lifecycle management solutions including operations and implementation knowledge of products (such as Saviynt, SailPoint IIQ, RSA Aveksa, CA Identity Governance.
$37,700 - $77,100 a yearFull-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
And SOAR, as well as the vulnerability management platform. Helping with the configuration, management, and tuning of Qualys for effective vulnerability management.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Our practice specialties include operational risk management, internal and external compliance, Financial Crimes prevention, Governance Risk and Compliance (GRC) capabilities, and digital fraud solutions.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge in Endpoint Protection Information, Risk Management, Information Security, Governance Information Security, Management Security, Analysis Security, Risk Management System, Security Vulnerability Assessment, Vulnerability Management, Technical Project Management ,Security Project Management, Identity Management Software, Incident Response Software, Security Information and Event Management (SIEM), Software Threat Intelligence, and Software Vulnerability Management Software.
Full-timeExpandApply NowActive JobUpdated 22 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Participate in development and continuous improvement of the following cybersecurity programs: Threat & Vulnerability Management, Insider Threat Management, Data Governance, Cloud Security, Supplier Risk Management, Security Policies, and Cybersecurity Governance & Compliance.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Privilege accounts lifecycle management solutions including operations and implementation knowledge of products (such as BeyondTrust, CyberArk, Centrify) This role is part of our Cybersecurity – Digital Identity (DI) team which assist our clients in aligning security management strategy with business goals by managing who has access to which resources and services, as well as enforcing business, privacy, and security policies.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
3+ years of information security experience including experience in one or more of the following security disciplines: information security monitoring, incident response, vulnerability management, host/network forensics, cyber-crime investigation, penetration testing, business continuity, or cyber threat intelligence.
$84,000 - $179,200Full-timeExpandApply NowActive JobUpdated 27 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Utilize subject matter knowledge in industry leading security solutions and best practices to implement one or more components of information security such as availability, integrity, confidentiality, risk management, threat identification, modeling, monitoring, incident response, access management, and business continuity.
$84,000 - $179,200 a yearFull-timeRemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
5+ years of experience with threat and vulnerability management program and operations. 5+ years of experience with threat and vulnerability management (TVM) program and operations.
Full-timeExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Ster recovery, FISMA compliance, information security architecture, information security auditing, security control assessment, threat modeling, threat management, vulnerability analysis, and vulnerability assessments.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience leading, architecting or engineering security solutions related to (not all required, but more the better): Cloud Security (Azure preferred) Endpoint Protection IDS Incident Response SIEM Vulnerability Management IAM DLP DevSecOps Network Security Firewalls.
Full-timeExpandApply NowActive JobUpdated 2 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Implement Zero Trust, Secure your Network, Cloud workloads, Hybrid Workforce, Leverage Threat Intelligence & Security Consulting. Strong understanding of Cloud Security Posture Management tools.
Full-timeExpandApply NowActive JobUpdated 1 month ago
vulnerability management threat jobs
FEATURED BLOG POSTS
What Makes a Good Boss? The Top 12 Qualities & Attributes
Think back to the best boss you’ve ever had—does someone come to mind? We hope so! Okay, now think back to the worst boss you’ve ever had. I’m sure you can conjure up a few faces.
How to Recruit and Retain Gen Z Employees
As Boomers and the oldest Gen X are exiting the workforce, younger Millennials and Gen Z are flowing in. While the younger generations seem to be completely different than the older generations, many care about some of the same things- financial security, working conditions, etc. However, due to social and cultural differences in the era that Gen Z has grown up in, they have concerns that were never even workplace topics of discussion 20 years ago.
How Does Temp to Hire Work? Benefits, Concerns, & More
Whether you’re just starting out your career or are looking for the next opportunity, the job market has never been more burgeoning with opportunities. From flexible work options and freelancing gigs to seasonal and temp-to-hire work, people today are spoiled for choice when it comes to finding engaging and fulfilling work.
Do Your Candidates Really Need a College Degree?
As a hiring manager tasked with making major decisions, it's easy to target a college degree as a way of saying yes, this candidate is qualified. I mean, how many times have we seen candidates without degrees try to squeeze their way into positions that they aren't qualified for. In fact, many hiring managers (maybe like yourself) believe that college degrees make candidates more job-ready. However, the current job market has shifted so much recently that it begs the question
Explore Your Skill and Find the Best Way to Make Money From Home
When you just can’t stomach another drive-thru coffee on your morning commute, close your navigation app on your phone and search for easy ways to make money from home instead. With a computer and some niche skills, there are countless opportunities for you to earn a living from your couch. (Okay, fine, your home office.) Below, we’ll explore 30 different ways to make money from home, as well as a few “too-good-too-be-true" warning signs to know to keep you from booking the wrong remote gig.
Structured vs Unstructured Interviews
The goal of an interview is to evaluate candidates based on their skills, personality, and knowledge. You want to choose the BEST candidate from your candidate pool, so the interview is something you can't mess up. As you begin planning your interview process, one of the major decisions you'll face is whether the interview should be a structured vs unstructured interview. So let's take a dive into the differences and sort out which circumstances warrant which interview process.
How to Describe Your Personality with Examples
Imagine you’re in an elevator with the CEO of your dream company and you get to talking. The conversation is going well and you start to imagine yourself working for their company when the CEO turns around and asks you “tell me a bit about yourself.” Would this catch you off guard or would you be able to give a clear and succinct description of who you are?