- UpvoteDownvoteShare Job
- Suggest Revision
Keywords: Tampa FL Jobs, Lead Vulnerability Management Engineer, Vulnerability Management, Cybersecurity, Rapid 7, Qualys, Tenable, Kenna, NorthStar, Brinqa, Public Cloud, CISSP, CISM, CRISC, Security Risk Management, Florida Recruiters, IT Jobs, Florida RecruitingLooking to hire for similar positions in Tampa, FL or in other cities.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Keywords: Dallas TX Jobs, Lead Vulnerability Management Engineer, Vulnerability Management, Cybersecurity, Rapid 7, Qualys, Tenable, Kenna, NorthStar, Bringa, Public Cloud, CISSP, CISM, CRISC, Security Risk Management, Texas Recruiters, IT Jobs, Texas RecruitingLooking to hire for similar positions in Dallas, TX or in other cities.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Being a member of the Cybersecurity Eng. & Ops Team, the Lead IT Security Engineer will be a subject matter expert (SME) for Vulnerability and Threat Management capabilities.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Technical expert supporting vulnerability management and stakeholders for areas including system administration, network infrastructure, IT operations, and data administration; provide Subject Matter Expertise on cloud security, container security, vulnerability risk, remediation, and mitigation.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Senior IT Security Advisor - Cloud Vulnerability Management. Access Control, Application Security, Business Continuity and Disaster Recovery Planning, Cryptography, Information Security and Risk Management, Legal Regulations, Compliance and Investigations, Operations Security, Physical (Environmental) Security, Security Architecture and Design, Telecommunications and Network Security.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This role will provide expertise within the Cloud Vulnerability Management and Secure Configuration Assessment program to include Cloud Security Posture Management (CSPM). + Designs & engineers comprehensive access management and network security technical solutions based on business requirements and defined technology standards; works with architecture to update technology direction & strategy.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Performs discovery scanning via the Vulnerability Management Platform (scheduled and ad-hoc) Coordinates with business, IT teams, and Technology Risk Management (TRM) to remediate compliance findings in a timely manner while addressing risk reduction objectives.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Leidos Defense has a dynamic opportunity for a Computer Network Defense (CND) Security Engineer to work at our customer site at the National Maritime Intelligence Center, Suitland, MD. In this role you will provide operations, engineering, technical and program management services to support cyber related requirements and operations.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Understanding of IT security principals, technologies, best practices to include logical access control, PKI and other encryption methods, network-based and host-based IDS/IPS, security configuration baselines, auditing, vulnerability discovery, and management.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Keywords: Chicago IL Jobs, Network Security Engineer III, Cybersecurity, Network Engineering, Information Security, Cisco, Switches, TCP/IP, MPLS, BGP, VoIP, DHCP, DNS, Wifi, VLANs, Networking, Chicago Recruiters, Information Technology Jobs, IT Jobs, Chicago RecruitingLooking to hire for similar positions in Chicago IL or in other cities.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Good working knowledge of security risk management, security governance framework and compliance (IT Security Audit / log review), technical vulnerability management (vulnerability assessment, penetration testing), application security, security technologies (system hardening, IDS/IPS, firewall), security incident response and security assessment.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Demonstrated experience applying data science methods to real-world data problems Preferred Expertise Understanding of cyber security, computer network security, security protocols, encryption, security scanning, threat and vulnerability management, Technology Risk Assessment, cybersecurity assessment, IT Controls Logistics: Local Denver resources only.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Cloud security controls: Identity and Access Management (IAM), Encryption, Network Security, Compliance, Logging and Monitoring, Vulnerability Management, Disaster Recovery and Business Continuity, Cloud Access Security Broker (CASB), and Multi-Factor Authentication (MFA.
$81,572 - $135,954 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of security protocols, such as SSL and TLS. Experience with network monitoring and vulnerability management tools, such as Crowdstrike Falcon, Spotlight, Humio, Lansweeper, Manage Engine or similar.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Have the ability to communicate and add value to IT Infrastructure, Security, Network Architectural Design, IT Security & Compliance. Have good knowledge of Firewall, Network, IT Compliance, and Project Management.
$150ExpandApply NowActive JobUpdated Today
network security it engineer vulnerability management jobs Title: engineer senior Company: Hiretalent Diversity Staffing Recruiting Firm
FEATURED BLOG POSTS
How Long Do Background Checks Take for Pre-Employment
Many jobs require a background check. For some companies, this is a matter of company policy. In other jobs, such as finance, childcare, and security, the government often requires background checks. While there are varying levels of intensity, for most people, a background check is nothing to worry about. In fact, the biggest question is often how long does a background check take? Here’s what job seekers and applicants need to know about background checks before they apply to new jobs.
The Best Remote Jobs: Where & How to Find Them
The Covid-19 pandemic hasn’t been easy on any of us, but if there’s one silver lining, it’s the fact that remote work has grown in popularity because of it. Companies that previously weren’t open to their employees working remotely were suddenly forced into allowing it. Since then, they've realized that much of their workforce is happier and more productive. Naturally, this has led to more remote job openings, which is great if you’re interested in this type of position. Read on to learn more about the best remote jobs and where to find them.
In-House vs Outsourcing Recruiting: Which is Better?
When looking at in-house vs outsourcing recruiting, it is important to nail down the benefits for each and whether those benefits outweigh the risks that follow.
How to Write a Short Bio
First impressions can be tricky. When meeting someone in person, it’s likely you have an elevator speech. These short, practiced introductions can help you share more about who you are, what you do for work and other facts about you. While this works well in a live, in-person context, there are many cases where professionals “meet” someone via written form - like social media, a resume, or published work. In these cases, your bio works as your first impression. So, here’s a step-by-step guide on how to write a short bio.
How to Conduct a Performance Review (With Examples)
In a world where the smallest mistake can cost your business tens of thousands in lost revenue, your talent is key to keeping your edge on the market and driving growth. However, managing a workforce of any size can be a challenge. Employees come with their own particular skill set, ambitions and flaws. So, it can be difficult to uncover their individual drivers. Not to mention the challenges brought on by the hybrid and remote working models where in-person interactions have become few and far between.
How to Effectively Recruit Employees
Today, hiring and retaining talent looks much different than it did only two or three years ago. Financial instability and the strain on our mental health brought on by the pandemic has made everyone more wary and selective of their workplace and employer. Whereas in the past people might have prioritized promotions and financial reward, today they look at other factors such as workplace flexibility, personal fulfillment and values alignment.
How Many Hours is Part-Time vs. Full-Time Work?
Growing up you watched your parents shuffle to and from the office, held hostage to their 9 to 5. If jammed-packed schedules and deadlines sound frightening, you might consider pivoting your search to part-time jobs. In fact, even employers have shifted their preference, selecting more people open to the idea of flexible working hours.