- UpvoteDownvoteShare Job
- Suggest Revision
Familiarity with: Zero Trust Network Access (ZTNA) and Secure Access Service Edge (SASE) frameworks, Identity, Credential, and Access Management (ICAM) (OKTA), Cloud Workload Protection Platform (CWPP), Security Operations Center (SOC) Operations, Vulnerability Threat Management, and Compliance Formal Education Masters degree (or higher) in one of the following: computer science, electronics engineering, computer engineering, computer science, information technology, or cybersecurity.
Full-timeExpandApply NowActive JobUpdated 28 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Understanding of IT security principals, technologies, best practices to include logical access control, PKI and other encryption methods, network-based and host-based IDS/IPS, security configuration baselines, auditing, vulnerability discovery, and management.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
ResponsibilitiesUnderstand requirements relating to vulnerability assessment and design solutions accordinglyCreate SOPs and lead the Cyber Security teamPerform root cause analysis for recurring vulnerabilities being reported by various tools such as TENABLE and other NESSUS scannersReport & present weekly progress on the remediation tasks taken up to fix the vulnerabilitiesPatching for windows and Unix/Linux Servers.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Strong functional and technical knowledge of information/cyber security capabilities with deep expertise in one or more of the following areas: Encryption, Data Security, Application Security, End Point Security, Identity and Access Management, Windows/Unix/Linux Systems Security, Mainframe Security, Perimeter Security, Network Security, Mobility Security, Cloud Security, Cyber Security, Cryptography, or Authentication Systems.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience in engineering, testing, configuration/tuning, administration and operational use of vulnerability management and assessment technologies such as McAfee/Trellix ePO, and Security Information and Event Management systems (i.e. Splunk.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Relevant experience must be in one or more of the following: computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance and/or systems engineering.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Degree must be in Network Engineering, Systems Engineering, Information Technology, Computer Science, Mathematics, Data Science, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The candidate will be primarily responsible for Tier II level SOC Analyst duties with our Endpoint Security and Incident Response group with an opportunity for participating in our Vulnerability Management and Testing processes as needed to meet the operational requirements and goals of the SOC. The Information Security Office SOC located in Augusta, Maine, provides 24x7 security monitoring support, and requires the position to participate in an on-call rotation.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
In course of regular job duties, the selected candidate will gain exposure to many different enterprise-grade security technologies, which perform critical functions such as vulnerability scanning, malware detection, network intrusion prevention, firewall blocking, enterprise-wide incident response, and security information and event management (SIEM.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Improve threat awareness through continuous development and improvement of processes including network vulnerability scanning, security information event management (SIEM) system, Threat detection and response, IT governance risk and control management and assessment, IPS/IDS systems, and other applications.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
You have passion and expertise in one or more of the following areas: risk analytics, data analytics, machine learning, SQL, Python, cloud security, network security, vulnerability management, data protection, threat intelligence & investigations, and identity & access management.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of information security toolsets including anti-virus, Vulnerability Assessment, host-based or endpoint security solutions, Multi Factor Authentication (MFA), and Security Incident and Event Management (SIEM) and centralized auditing tools.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
At least 2 years of experience performing cyber security risk assessments or cyber security architecture reviews. At least 2 years of experience providing guidance and oversight of cyber security concepts.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Leidos is seeking a Cybersecurity Policy Analyst/Subject Matter Expert to support the DHS Office of the Chief Information Security Officer, Program Management and Governance Division. Analyze continuous monitoring, configuration management, vulnerability management, asset management, software management and self-reported data to identify trends and anomalies cybersecurity performance and mitigation of risks.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
In-depth understanding of information security principles and best practices, including network security, cybersecurity engineering, cryptography, system security, vulnerability management, and incident response.
ExpandApply NowActive JobUpdated Today
network security vulnerability management jobs Title: engineer cyber security Company: Pvh
FEATURED BLOG POSTS
Internship Cover Letter Tips with Examples
Until now, college has been about learning, absorbing, and experiencing. It’s not until you become eligible for an internship that things start getting real—real-world experiences using real-life scenarios. Applying for internships takes time, and there’s no college course on “how to apply for jobs.” (We’d sign up immediately if there was, though!) But here's a spoiler alert: most internships require a cover letter. And while this may seem like a burden, it’s actually a blessing.
5 Practical Ways to Remove Bias from your Hiring Process
Many employers think their hiring process is perfect. However, research shows that the hiring processes are generally impartial and unfair, especially if you are part of certain demographics. Women, people of color, people with disabilities, or even people in lower socioeconomic status are more likely to be subject to implicit bias. As diversity and employer branding become major aspects of business, it is important that employers take the lead to identify and remove bias from the hiring process. So, here are 5 practical ways to get you started.
Tips to Get Your First Job Confidently
Whether you’re a recent graduate or you still have a few exams left, you may be itching to put your polished leather shoes on and join the workforce. After all, your first job is an entryway into the professional life you’d lead for the decades to come.
Tips for a Good Character Reference Letter with Examples
Hiring managers love a resume laden with relevant skills and qualifications. Hard skills specific to the role, like SEO strategy or Java programming languages, are easy to qualify using achievements or facts and figures. But how exactly can they verify personality traits, work ethic, relationship management skills, or curious nature during an interview when they barely know you?
How to Dress on the First Day of Work (Men & Women)
You did it! Out of hundreds of applicants and dozens of people interviewed, you’re the one who got a new job. Congrats! Now comes the question of how to dress on the first day of work.
Why College Students Should Work While in College?
College is a special part of our lives. It’s a time when we prepare for our dream job while creating some of the most memorable moments in life. That said, college life can also be stressful. Not only do we have to spend long hours studying, writing and researching, but we also have to deal with increased tuition fees and living expenses.
5 Ways to Measure Candidate Experience
Your candidate experience is made up of 4 essential parts