- UpvoteDownvoteShare Job
- Suggest Revision
Working knowledge of operating network vulnerability and compliance scanning software such as ACAS or Tenable NessusDemonstrate firewall, DMZ design, ACL knowledge, and IP address management.
$85,000 - $179,000Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This includes but is not limited to Network Monitoring, Preventative and Detection Controls, Forensics and Investigations, Security Awareness, Security Vulnerability Management, and Cyber Threat Intelligence activities.
$175,000 - $200,000 a yearFull-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Skydance Information Security Director is responsible for shaping company policy, advising IT Executive Staff on current and potential threats, monitoring and maintaining a proactive security posture, and rigorous testing and risk management.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Advisor support resources offered through Cetera include award-winning wealth management and advisory platforms, comprehensive broker-dealer and registered investment adviser services, practice management support and innovative technology.
$120,000 - $150,000 a yearFull-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
SpaceX designs, manufactures and launches advanced rockets and spacecraft. Today SpaceX is actively developing the technologies to make this possible, with the ultimate goal ofenabling human life on Mars.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Maintain IT asset management tracking and conduct regular asset inventory audits. Keeper Security is transforming cybersecurity for organizations around the world with next-generation privileged access management.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Subject matter expert on Application Security: Secure Software Development Lifecycle (SSDLC), threat modeling, secure coding, SAST, DAST, and vulnerability management. Ability to identify security requirements, pinpoint security threats and potential vulnerabilities, quantify threat and vulnerability criticality, and prioritize remediation methods.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
This position is on the Cyber Security team responsible for developing, operating and maintaining the Identity & Access Management (IAM) systems at Zoox. This role will be responsible for all aspects of our IAM infrastructure, which include managing and maintaining the services that encompass the identities of machines, employees, vendors, and customers.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Transportation asset management and/or risk assessment, including climate change vulnerability and resiliency assessments for the transportation system. Transit planning and related topics such as shared use mobility, first-mile last-mile connections, and transportation demand management.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
The Security Operations Manager will manage key access management, technology controls, resilience, and cybersecurity efforts under the direction of Infrastructure & IT Operations and in concert with the divisional CISO. This role will help develop vulnerability and risk management processes, oversee their implementation, and analyze company databases to identify and address potential security risks and vulnerabilities.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Design, implement, and maintain security controls, including firewalls, intrusion detection/prevention systems (IDS/IPS), endpoint protection, and security information and event management (SIEM) solutions.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Hands on experience on some of the industry standard security technologies such as Vulnerability & Application Security, SIEM, DLP, Public Cloud Security, CASB etc. Cyber Security expert level architect across at least 2-3 critical information security domains (Security Operations / Security Testing / Identity and Access Management / Security Architecture-Design.
RemoteExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerability assessment and exploitation techniques. Bachelor’s degree with a focus in computer and information sciences, engineering, mathematics, computer science, management information systems or other related disciplines.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
5+ years experience (can be concurrent) utilizing security relevant tools, systems, and applications that support Information security risk management and security continuous monitoring (e.g.: vulnerability scanning or detection tools, security system configuration audit tools, Nessus, DISA STIGs, CIS Benchmarks.
$125,000 - $175,000 a yearFull-timeExpandApply NowActive JobUpdated Today
vulnerability management jobs in Culver City, CA
FEATURED BLOG POSTS
Why Leadership Is So Important in Your Career
There are plenty of baseball players worldwide, but only a select few will master the sport enough to play in the World Series. Similarly, you’ll meet hundreds of “managers” throughout your professional career. Still, only a few will cement themselves as true leaders in your mind. This is why leadership is important—the most influential leaders leave a mark. They inspire.
Making the Move to Salary Transparency
The salary transparency trend continues. Last year, Colorado passed its Equal Pay Transparency Rules, which required employers to include compensation in job postings, notify employees about promotional opportunities, and record job descriptions and wage records. Soon after, states like Washington, Nevada, Maryland, and Rhode Island followed suit.
Brand Reputation 101
People's initial perception of your organization is also known as your brand reputation. Your brand rep either encourages or discourages people from engaging with your company. This means the way people view your company will affect sales and even recruiting efforts.
Recruiting in a Tight Market
As a recruiter or employer, you know how much the economy affects your recruitment and retention efforts. You aren't just in competition with companies in your industry, but you are also fighting against inflation, recession, unemployment rates, and so much more.
How to Build a Candidate Persona
A candidate persona is a semi-fictional representation of your ideal candidate. Building a candidate persona is one of the best methods employers use to ensure their sourcing, recruiting, and hiring processes are focused. Knowing exactly what you're looking for streamlines everything and helps increase hiring confidence. So here's how to create a candidate persona and how to use it.
How to Get Into The Trades: Step-by-Step Guide
Getting a trade job can be a great career move if you like variety and prefer to learn on the job instead of in an academic setting. A trade job can offer security and be a lucrative career path as the demand for skilled trade workers continues to grow.
How do Good Interviewers Prepare for Interviews?
Just like candidates take the time to research you and your company, you should take the time to prepare for the interview. Preparing for the interview doesn't just reflect well on your employer brand and create a better candidate experience. Preparation also helps prevent bad hiring decisions. Bad hiring decisions are usually a result of poor execution during the hiring process. However, going into an interview fully prepared and ready to evaluate candidates will help avoid bad hires. So, here are 6 interview preparation tips for employers.