- UpvoteDownvoteShare Job
- Suggest Revision
Ensure all endpoints & network devices are patched & secured IAW the latest Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIGs), Information Assurance Vulnerability Alerts (IAVAs), Time Compliance Network Orders (TCNOs), Time Compliance Technical Orders (TCTOs), Approved Products List (APL), and Local Security Guidelines as directed.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Five or more years of experience directly administering technical controls (e.g., identity and access management, malware protection, network segmentation, vulnerability management, etc.
Full-timeRemoteExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Job Title/High Level Position Summary:Senior Information Security Engineer – SOX Compliance Lead is responsible for the planning, design and build of security architectures; oversees the implementation of network and computer security and ensures compliance with corporate cybersecurity policies and procedures.
Full-timeRemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Cloud Computing, Cybersecurity, Computer Software, Internet, Information Technology and Services, Computer Networking, Computer & Network Security, Information Security, Vulnerability Management, Threat Intelligence.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
High Profile Buy-Side Firm seeks Senior Security Architect with strong Cyber Security Vulnerability Management technical programs experience. Palo Alto Firewall administration, Panorama, network security, operations and management best practices.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Work closely with the Security Control Assessor to perform IT security assessments in support of Risk Management Framework (RMF). Conduct Vulnerability Assessment of network, host, and web applications, leveraging tools such as Tenable Nessus, NMAP, Wireshark, Rapid7 Metasploit, Burp Suite, etc.
$81,500 - $142,600 a yearFull-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Keywords: Tampa FL Jobs, Lead Vulnerability Management Engineer, Vulnerability Management, Cybersecurity, Rapid 7, Qualys, Tenable, Kenna, NorthStar, Brinqa, Public Cloud, CISSP, CISM, CRISC, Security Risk Management, Florida Recruiters, IT Jobs, Florida RecruitingLooking to hire for similar positions in Tampa, FL or in other cities.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As a Security Engineer, Vulnerability Management at RingCentral, your primary responsibilities will be to perform vulnerability scans of our systems and networks, and monitor, triage and track remediation of vulnerabilities.
$100,000 - $150,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Familiarity with: Zero Trust Network Access (ZTNA) and Secure Access Service Edge (SASE) frameworks, Identity, Credential, and Access Management (ICAM) (OKTA), Cloud Workload Protection Platform (CWPP), Security Operations Center (SOC) Operations, Vulnerability Threat Management, and Compliance Formal Education Master of Science degree (or higher) in one of the following: computer science, electronics engineering, computer engineering, computer science, information technology, or cyber security.
Full-timeExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Monitor and take action within multiple tools providing security functions such as vulnerability management (, Nessus), configuration management (, Tenable Security Center, IBM BigFix, SCCM, McAfee ePO), endpoint protection (, antivirus, ATP), intrusion detection software and hardware.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Knowledgeable in network security measures, cyber hardening, and vulnerability management. Monitor the network for security threats, conduct vulnerability assessments, and analyze potential risks to proactively safeguard the system.
TemporaryExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Keywords: Dallas TX Jobs, Lead Vulnerability Management Engineer, Vulnerability Management, Cybersecurity, Rapid 7, Qualys, Tenable, Kenna, NorthStar, Bringa, Public Cloud, CISSP, CISM, CRISC, Security Risk Management, Texas Recruiters, IT Jobs, Texas RecruitingLooking to hire for similar positions in Dallas, TX or in other cities.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Hiring for ISSO Specialist, with knowledgeable in computer security principles, to include the Risk Management Framework (RMF), Security Technical Implementation Guides (STIGs), National Industrial Security Program Operating Manual (NISPOM), and Defense Security Service (DSS) Assessment and Authorization Manual (DAAPM.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Security, cyber, cyber security, IR, Incident response, engineering, engineer, implement, implemented, implementation, Crowdstrike, EDR, SIEM, Compliance, threat, threat intel, threat intelligence, Qualys, Sentinel, Cloudaware, PCI, SOC2, GRC, Linux, Vulnerability management, Azure.
$60 - $68 an hourFull-timeExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Global Information Assurance Certification (GIAC) Security Essentials Certification Years of Professional Experience 10 years’ experience in Cyber Security Desired experience Risk Management Framework (RMF), Cybersecurity Framework (CSF), Federal Information Security Modernization Act (FISMA), and FedRAMP experience.
Full-timeExpandApply NowActive JobUpdated 16 days ago
network security vulnerability management jobs Title: engineer senior information security Company: Twilio
FEATURED BLOG POSTS
Into the Heart of the Ukrainian-Russian Conflict
The story of our US-Ukraine connection started when Kevin met Dave. Days away from quitting his last "real" job as a seafood plant manager, Kevin reconnected with a long-lost friend from high school. Little did he know, this long-lost friend was dating his soon-to-be business partner. After meeting Dave through their mutual connection, it didn't take long for the two to start bouncing business ideas off each other. The flow of creativity soon grew into a business partnership that has withstood the test of time.
Why Are Internships Important & How Can You Get One?
Internships are for college students or people who have just completed their degree. If you are a student or recent grad, you may be wondering how to land an internship. If you've never had one, you may even wonder if you need one. After all, didn’t you work in that call center while also doing exams? Or perhaps you’ve bartended your first year in college?
Why is Networking Important & How to Network Effectively
Even if you’ve worked hard to earn a degree from an impressive school, landing your dream job might still come down to who you know – otherwise known as networking. Lots of qualified candidates might apply for a job, but the person who gets it might very well be so-and-so’s sibling, friend, or kid. Sometimes the only way to get your foot in the door is to know someone.
Why Do Recruiters Ghost and What Can You Do About It?
Once you’ve finally mustered up the courage to find another job, leaning into the job hunt can feel scary and overwhelming. So, it does nothing to help your confidence when your outbox is full of unanswered follow-ups and interview requests. You thought that ghosting only happens on dating apps—so why do recruiters ghost, too? Recruiter ghosting is not an effective recruiting strategy, but sometimes it’s inevitable. How can you overcome such an unfortunate new career trend? Read on.
Internal Hiring Best Practices
Each companies hiring strategy is based on a set of rules that defines the ideal candidate. Many companies utilize internal and external hiring to ensure they have skilled, experienced workers. If you work in recruiting, maximizing your internal hiring strategies could be the key to retaining employees and simplifying your hiring process.
Why is it so Hard to Get a Job After College
For many, it was easy finding a job while in college. But after job hunting for weeks, you may wonder why it is so hard to get a job after college. After all, you’ve put a lot of time and effort into getting your degree. But don’t get discouraged. The University of Washington found that 53% of graduates are either unemployed or working a job that doesn’t require a degree. Other studies also show that landing your first job can take between 3 and 6 months. So, getting your first job takes time.
Why Leadership Is So Important in Your Career
There are plenty of baseball players worldwide, but only a select few will master the sport enough to play in the World Series. Similarly, you’ll meet hundreds of “managers” throughout your professional career. Still, only a few will cement themselves as true leaders in your mind. This is why leadership is important—the most influential leaders leave a mark. They inspire.