- UpvoteDownvoteShare Job
- Suggest Revision
Experience in engineering, testing, configuration/tuning, administration and operational use of vulnerability management and assessment technologies such as McAfee/Trellix ePO, and Security Information and Event Management systems (i.e. Splunk.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Operate and maintain CLS Security controls related to SIEM, DLP, Vulnerability Management, Cyber Threat Intelligence, Endpoint Protection, Network Protection, etc. Design and integrate consistent security solutions across CLS on-premise and cloud environments for domains like Vulnerability Management, Endpoint Security, Data Security, Network Security, Identity and Access management, etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Strong experience managing security information and event management (SIEM) systems, threat intelligence platforms, security automation and orchestration solutions, vulnerability management platforms, intrusion detection and prevention systems (IDS/IPS), file integrity monitoring (FIM), data loss prevention (DLP) and other network and system monitoring tools.
$112,160 - $176,645 a yearFull-timeRemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Establishes and documents a comprehensive set of expertise for a wide range of security technologies and processes including, but not limited to: Security Information and Event Management (SIEM); Threat Management Platform, Anti-malware prevention and analysis; vulnerability scanners; penetration testing; computer and network forensics tools and processes; secure application coding and scanning; and cyber security incident.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Cloud Security Architect must have subject matter expertise in Security Architecture and Vulnerability Management and Network Defense. We are seeking a remote Cloud Security Specialist to join our team supporting the Security Architecture and Vulnerability Management Support Services contract for the National Oceanic and Atmospheric Administration's (NOAA) National Environmental Satellite, Data, and Information Service (NESDIS) information systems.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Oversee all aspects of cybersecurity, including threat detection, incident response, vulnerability management, and security awareness training. As the Vice President, Chief Information Security Officer (CISO) at LinkedIn, you will be responsible for leading the Information Security organization, encompassing Security Operations, Identity & Access Management, Governance Risk and Compliance, and Security Infrastructure.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
All of the duties listed support one or more of the following cybersecurity related functions; information security, SA&A, incident response, cyber security, insider threat, computer forensics, vulnerability assessment and management, network data capture, intrusion detection, log management, auditing, security incident and event management (SIEM), and penetration testing.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with network monitoring and vulnerability management tools, such as Crowdstrike Falcon, Spotlight, Humio, Lansweeper, Manage Engine or similar. Oversee the BPG USA vulnerability management and ensure timely patch management for all servers and network assets.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Please highlight experience related to: - Security technologies such as firewalls, IDS/IPS, SIEM, DLP, and endpoint protection- Security incident response, threat intelligence and detection, and vulnerability management.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience should include security project management; policy and process development; threat and vulnerability management; security awareness training; and understanding and remediating penetration tests.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Additional experience may be in one or more of the following: computer or information systems design/development/installation, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance or systems engineering.
ExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Degree must be in Network Engineering, Systems Engineering, Information Technology or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security.
ExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Monitor and analyze security events and alerts from multiple sources, including security information and event management (SIEM) software, network and host-based intrusion detection systems, firewall logs, and system logs (Windows and Unix), and databases.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Controls and processes include but are not limited to: incident response, asset inventory, vulnerability management, patch management, application security, logging and monitoring, findings governance and remediation, identity and access management, configuration management, and change management.
ExpandApply NowActive JobUpdated Today
network security vulnerability management jobs Title: engineer security Company: Remotework
FEATURED BLOG POSTS
What Questions Can You Not Ask in an Interview?
It can be stressful to interview candidates to fill an open role at your company. Maybe your boss is on you to hire someone who’s absolutely perfect as soon as possible. Maybe you don’t have a ton of experience yet in conducting interviews. Whatever the case, there’s a lot to take under consideration when you’re the one in charge of interviewing. For instance, “What questions can you not ask in an interview?” may very well be running through your mind given its legal ramifications. Knowing exactly which interview questions are off-limits (and which are fine to ask) will boost your confidence as you continue to search for the ideal new hire.
How to Prepare to Be Fired - What You Need to Do
If you’re reading this, let me be the first to tell you how sorry I am. Getting fired feels crappy, disheartening, hurtful, and all the other bad, sad words. But here’s what I want you to do. First, let yourself fumble for a minute. Then, pick your head up — sometimes getting fired is a blessing in disguise. If you think termination is around the corner, we’ll teach you how to prepare to be fired and what to do next so you land somewhere even better.
How to Find a Job That Makes You Happy - 11 Concerning Facts
Do you ever feel like your life is like one of those rom-com movie scene openers? You know, the ones where the main character rolls out of bed, awakened by a casually upbeat theme song, sulks their way to the coffee pot, and then trudges toward their computer to begin yet another boring day at work?
How to Decline a Job Offer You Already Accepted
When you think about it, turning down a job offer is not the worst position you could be in. If you’ve been lucky enough to consider multiple job offers, well, then you’re lucky enough.
How to Practice Fair Chance Hiring for People With Criminal Records
Usually when you think of your dream hire, you think of someone who is respectful, trustworthy, reliable, and has sound judgment, right? As you envision your ideal candidate with these qualities, the last person you think of is someone with a criminal record.
6 Common Mistakes to Avoid When Employer Branding
Currently, job searchers are putting extra effort into researching employers. The information they find plays a major role in whether they will pursue an opportunity with you or look for jobs elsewhere. That is why it is now more important than ever to be proactive and intentional when showcasing your workforce and workplace culture. Having a well crafted employer branding strategy can help you strategize and influence your potential candidates so they see your business in the best light. But in order to do that, you should be aware of some of the most common mistakes that employers make.
What to Say When Terminating an Employee
Terminating an employee is an inevitable part of doing business. Whether you’re re-structuring your department or you’ve identified a few employees who’re not living up to your expectations, letting people go is necessary for keeping your workforce healthy and thriving.