- UpvoteDownvoteShare Job
- Suggest Revision
Working knowledge of Cloud Security Posture Management (CSPM) and Vulnerability Management Tools. In-depth technical knowledge of security engineering, network security, authentication, security risk assessments, and vulnerability management.
ExpandUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
OIS seeks an experienced Technical Writer specializing in IT and Security Vulnerability communications. Job Title: Technical Writer [Specializing in IT and Security Vulnerability] Security Vulnerability Alerts.
Full-timeRemoteExpandApply NowActive JobUpdated 13 days ago - UpvoteDownvoteShare Job
- Suggest Revision
AWS Security (GuardDuty, CloudTrail, Secrets Manager, EKS/ECR, IAM family, Config), Vulnerability management (Qualys/Nessus, Twistlock, Snyk), SIEM (SumoLogic or Splunk), Container Security, CI/CD Discipline (Helm, Terraform, Chef, Kubernetes (EKS.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Strong working knowledge of Identity and Access Management, Cryptography and Key Management, and Vulnerability Management. Strong working knowledge of Identity and Access Management, Cryptography and Key Management, and Vulnerability Management.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Test, validate, and deploy patches and security updates across all our OpenShift and OpenStack infrastructure in line with our vulnerability management SLAs. Enable infrastructure, platform, and application teams to drive a stronger security posture, by leveraging security and vulnerability management tools like Service Now and Red Hat Advanced Cluster Security (ACS.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Evaluate, deploy, and manage security tools and technologies such as firewalls, intrusion detection/prevention systems (IDS/IPS), endpoint security solutions, security information and event management (SIEM) systems, and vulnerability management tools.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
The ideal candidate will have a deep understanding of managing all aspects of information detection, incident response, vulnerability assessment, application security and compliance. The ideal candidate will have a deep understanding of managing all aspects of information detection, incident response, vulnerability assessment, application security and compliance.
Full-timeExpandUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Designing, and integrating marketplace leading vulnerability management, threat management, monitoring, and data protection processes and platform tools. Provide threat and vulnerability management to federal clients and teams.
Full-timeExpandUpdated 30 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The group of skills related to Security including designing and evaluating security systems, identifying security threats, securing computers, assessing vulnerability, etc. 5+ Years of experience in Cyber Security field as an Information Security Architect or Cloud Security Architect.
ExpandUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Assist management in expanding the current vulnerability management program including researching and implementing threat intelligence tools and scan coverage. The IT Security Senior Threat Engineer is responsible for oversight of the threat and vulnerability management processes at Stifel.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
You will be hands on in vulnerability management, EDR using Crowdstrike and tool implementation. You will be hands on in vulnerability management, EDR using Crowdstrike and tool implementation.
ExpandUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
A few responsibilities include incident response, vulnerability assessment, EDR and DLP. Experience with vulnerability management. The folks they'd be looking for to fill these roles will need to have a strong general blue team background and MUST have experience in Palo Alto firewall.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This department is focused on the integration and automation of technologies involved in vulnerability management and assessments. Broadening scope to integrate and leverage cyber threat intelligence, advanced analytics, etc., to produce higher impact results.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Provides instruction and consultation to staff on strategies to improve quality outcomes for communication and behavioral vulnerability patients (i.e., inclusive but not limited to ASD population) as well serves as a resource to the team.
Full-timeExpandApply NowActive JobUpdated 4 days ago
vulnerability job
FEATURED BLOG POSTS
How to Describe Your Personality with Examples
Imagine you’re in an elevator with the CEO of your dream company and you get to talking. The conversation is going well and you start to imagine yourself working for their company when the CEO turns around and asks you “tell me a bit about yourself.” Would this catch you off guard or would you be able to give a clear and succinct description of who you are?
4 Ways to Make Your Job Posting More Inclusive
According to a Glassdoor survey,
How to Calculate Net Income
Understanding your finances can be daunting even if you’re good with numbers. Your net income, in particular, is a key metric for determining how well you’re doing financially and whether your current way of operating is sustainable or not.
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra:
6 Best Ways to End a Cover Letter with Examples
Including a cover letter with your resume is a great way to introduce yourself to the hiring manager, tell them why you’re the ideal fit for the role, and provide context about your personal situation. A strong cover letter will give you an advantage over other applicants. But it’s important that you structure it properly and write it powerfully so that it carries an impact. This article will discuss how to end a cover letter effectively so you catch the eye of a hiring manager and increase your odds of landing an interview. Read on to learn more.
How to Write a Follow-Up Email for a Job Application?
Most times, we have to do more than submit a "sugar-coated" resume to land our dream jobs. Going the extra mile to follow up on your job application can increase your chances of employment. Additionally, it may even help you get confirmation sooner on whether you are seriously being considered for the job or not.
How to Address a Cover Letter With Examples
It’s easy to get caught up in focusing on your resume – how it looks, what it says, and whether it’s going to land you a job interview. Because there is a big focus on building the perfect resume, job searchers often overlook the importance of a high-quality cover letter. Your cover letter plays a huge role in your first impression. It humanizes you and provides context for your resume.