- UpvoteDownvoteShare Job
- Suggest Revision
Monitor and take action within multiple tools providing security functions such as vulnerability management (, Nessus), configuration management (, Tenable Security Center, IBM BigFix, SCCM, McAfee ePO), endpoint protection (, antivirus, ATP), intrusion detection software and hardware.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
We are hiring a Patch and Vulnerability Management Support for an exciting opportunity located in Ashburn, Va. Support development and implementation of Patch & Vulnerability Management (PVM) processes for end-user devices and infrastructure systems.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Performs discovery scanning via the Vulnerability Management Platform (scheduled and ad-hoc) Populates data visualization tool (such as Tableau, Brinqa, and Hygieia) for reporting vulnerability metrics by system and owner.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Job Duties:The Vulnerability and Management Lead works directly with the Information System Security Officer (ISSO) and Information System Security Manager (ISSM), NetOps groups, Cyber Leadership, CIO leadership, Application Development and Engineering teams to to implement a Cyber Ready 365 posture.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
ResponsibilitiesResponsibilities: Oversee threat & vulnerability management, security ops, and application security teams. As the Senior Director of Cyber Security, you will oversee the three critical functions including application security, vulnerability and threat intelligence and cyber operations; setting the global strategic risk direction, maturing and building out the people and processes.
$170,000 - $210,000Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Assist in the selection, testing, implementation, documentation, operation and maintenance of various information security technologies such as authentication devices, access controls, firewalls, IDS/IPS/SIEM/EDR systems, malware detection systems, forensic and vulnerability management tools.
$120,000 - $140,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Information Security Processes: Identity and access management, privileged access management, generic ID management, threat intelligence, vulnerability management, secure coding practices, data security and encryption, phishing, forensics, mobile security, third-party, etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Administer and maintain security products (phishing training, vulnerability management, web application firewall, SIEM, IDS, (h)IPS, EDR, etc) As a Security Engineer, Vulnerability Management at RingCentral, your primary responsibilities will be to perform vulnerability scans of our systems and networks, and monitor, triage and track remediation of vulnerabilities.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Requirements include: 3+ years of experience implementing Vulnerability Management solutions , including knowledge of Tenable/Nessus vulnerability scanning tools is required. Endpoint management and best practices: McAfee AV, Carbon Black, and LogRhythm Good Project Management skills Some related Palo Alto Firewall administration (Panorama), network security, operations and management best practices preferred Understanding of network design, infrastructure, Active Directory and Group Policy Knowledge of enterprise patching / updates is a must Some related scripting skills (Python.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Cloud Security Architect must have subject matter expertise in Security Architecture and Vulnerability Management and Network Defense. We are seeking a remote Cloud Security Specialist to join our team supporting the Security Architecture and Vulnerability Management Support Services contract for the National Oceanic and Atmospheric Administration's (NOAA) National Environmental Satellite, Data, and Information Service (NESDIS) information systems.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Monitoring and tuning of the Tenable Vulnerability Management, SailPoint IdentityNow, SIEM and DLP systems. Experience with Tenable Vulnerability ManagementExperience with SailPoint IdentityNowExperience with Fortinet FirewallsSIEM Systems (pref.
Full-timeRemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Splunk)DLP SystemsService Management Tools (pref. Performs security assessments of applications and systems using penetration and vulnerability testing and risk analysis. Provide threat and vulnerability analysis as well as security advisory services.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience supporting vulnerability management, cyber threat intelligence, and fusion. Perform vulnerability/risk assessment analysis to support certification and accreditation. Experience using incident case management systems to document and report on incidents.
$93,490.53 - $116,863.16Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Information Security Engineer will manage all aspects of infrastructure systems used to manage vulnerability management tools & resources. Responsibilities also include tools support such as ACAS, providing inputs on the adequacy of security designs and architectures, participation in risk assessment, the tracking and dissemination of vulnerability assessments, and adverse cyber related activity identified through indicators.
ExpandApply NowActive JobUpdated Today
vulnerability management jobs Title: senior manager Company: Advantis Global
FEATURED BLOG POSTS
What Makes a Company a Great Place to Work
After one too many after-hours emails, you’re on the hunt for a new gig. But what makes a company a great place to work? And how will you know when you find one? Finding a motivating, safe, and productive work environment is important for our mental and physical health. If you’re financially frustrated, creatively stuck, or just plain over it, it’s time to find a healthier workplace where you can flourish.
What Makes a Good Boss? The Top 12 Qualities & Attributes
Think back to the best boss you’ve ever had—does someone come to mind? We hope so! Okay, now think back to the worst boss you’ve ever had. I’m sure you can conjure up a few faces.
How to Recruit and Retain Gen Z Employees
As Boomers and the oldest Gen X are exiting the workforce, younger Millennials and Gen Z are flowing in. While the younger generations seem to be completely different than the older generations, many care about some of the same things- financial security, working conditions, etc. However, due to social and cultural differences in the era that Gen Z has grown up in, they have concerns that were never even workplace topics of discussion 20 years ago.
How Does Temp to Hire Work? Benefits, Concerns, & More
Whether you’re just starting out your career or are looking for the next opportunity, the job market has never been more burgeoning with opportunities. From flexible work options and freelancing gigs to seasonal and temp-to-hire work, people today are spoiled for choice when it comes to finding engaging and fulfilling work.
Explore Your Skill and Find the Best Way to Make Money From Home
When you just can’t stomach another drive-thru coffee on your morning commute, close your navigation app on your phone and search for easy ways to make money from home instead. With a computer and some niche skills, there are countless opportunities for you to earn a living from your couch. (Okay, fine, your home office.) Below, we’ll explore 30 different ways to make money from home, as well as a few “too-good-too-be-true" warning signs to know to keep you from booking the wrong remote gig.
What is Employment Participation Rate
According to economists, there are four factors of production that go into creating higher quality goods at lower prices. These are
How to Get Pay Stubs (From Previous Employee Also!)
Pay stubs are an important piece of document which shows your earnings in a given period, as well as any deductions made towards your health insurance or pension contributions. They’re also excellent for finding out how much your recent salary raise has bumped up your monthly net income.