- UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
$165,000 - $221,000 a yearFull-timeExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Basic Knowledge in auditing security technologies such as firewalls, IDS, DLP, Vulnerability Scans, Windows Servers, Applications, etc. Review, audit, and monitor security compliance programs against security policies, standards, and frameworks such as PCI-DSS, NIST CSF-171, SOC1 II, etc.
ExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Familiar in different security domains such as Network Security, Application Security, Data Security, Vulnerability Management, Client and Cloud Security. One or more of these certifications: CISM, CISA, CISSP, CompTIA Security+, ITIL, CSM, CSPO.
Full-timeExpandApply NowActive JobUpdated 12 days ago - UpvoteDownvoteShare Job
- Suggest Revision
We are looking for a Product Marketing Manager with a thorough understanding of cloud -based data protection products (e.g. CASB, DLP, SSPM/DSPM), compliance frameworks (e.g. GDPR, HIPAA, PCI), and security paradigms & platforms (e.g. Zero Trust, SSE/SASE.
ExpandApply NowActive JobUpdated 12 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experienced in threat and vulnerability management, penetration testing, and SecOps (intrusion detection, security logging, malware analysis, and forensics). Experienced in threat and vulnerability management, penetration testing, and SecOps (intrusion detection, security logging, malware analysis, and forensics.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Explore more InfoSec / Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 12 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Expert knowledge in cloud architecture, DevSecOps, vulnerability management, and familiarity with regulatory frameworks such as SOC, ISO, and FedRAMP. Solid background in governance, risk, and compliance, and extensive experience with security frameworks and privacy principles.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Develop and implement vulnerability management program, including metrics that will help BSC understand its inherent and residual risk exposure. Proven experience as an Information security governance, compliance and/or risk expert and knowledge of various information security governance and control frameworks such as NIST, HITRUST and PCI-DSS, HIPAA, SOC experience is required.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Perform vulnerability management engineering tasks, including review of vulnerability scanning reports, assessment severity, triaging vulnerabilities and shepherding Jira tickets through to remediation/mitigation.
RemoteExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Deeply curious to discover elegant solutions for cyber defense capabilities including threat and vulnerability management, event monitoring, and incident response. Network Security Audits: Conduct regular security assessments, vulnerability scans, and penetration tests to identify potential weaknesses and ensure compliance with security standards.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with system management tools such as Intune and MCASExperience of NIST Cyber Security Framework (CSF) and the CIS Critical Security ControlsExperience with SIEM software and log collection facilitiesExperience in information security, malware, and infrastructure securitySkills:Excellent verbal and written communication skillsAbility to effectively communicate and develop project plans with outsourced providersAbility to function effectively in a complex rapidly changing environment.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Hands-on experience implementing ServiceNow GRC/IRM and use cases including Policy and Compliance, Vulnerability Management, Audit, Risk and Vendor Risk Management. Hands-on experience implementing ServiceNow GRC/IRM and use cases including Policy and Compliance, Vulnerability Management, Audit, Risk and Vendor Risk Management.
RemoteExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Familiarity with modern security frameworks and best practices, such as the MITRE ATT&CK framework and NIST CSF. Experience in securing, developing detections, and responding to incidents in one major public cloud infrastructure, such as Amazon Web Services (AWS) or Google Cloud Platform (GCP.
$151,020 - $209,740 a yearFull-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Creative Quality Modeling (Clickbait, Video/Image Quality, Policy violations, Malware etc. Research experience (publications) in the following areas is preferred machine learning, deep learning, NLP, computer vision, data mining, causal inference, information retrieval, game theory.
Full-timeExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
5+ years of experience in cyber security engineering (malware, antivirus, behavioral analysis, forensics) Certified Information Systems Security Professional (CISSP) or Certified Cloud Security Professional (CCSP) or AWS Certification.
RemoteExpandApply NowActive JobUpdated 6 days ago
malware vulnerability jobs in San Francisco, CA
FEATURED BLOG POSTS
16 Tech Jobs You can Get Without a College Degree
You might think that if you don’t have a computer science, information technology, or related degree, then there’s absolutely no way you can break into the technology field and score a high-paying tech job. But this is a misconception. There are actually tons of tech jobs out there that don’t require a college degree. Instead, employers are more interested in the skills that you can offer. So, read on to learn more about how to land tech jobs without a degree.
What Are SMART Goals?
When it comes to achieving our goals, there’s a lot of noise to work through. A study by the University of Scranton has found that only 8% of people who set New Year’s resolutions actually achieve them. Our busy lives might be one reason for this. Another, even more important reason, is our approach to goal setting. Being too vague, too ambitious or simply unclear on the timeframe can set us up for failure.
How Long Do Background Checks Take for Pre-Employment
Many jobs require a background check. For some companies, this is a matter of company policy. In other jobs, such as finance, childcare, and security, the government often requires background checks. While there are varying levels of intensity, for most people, a background check is nothing to worry about. In fact, the biggest question is often how long does a background check take? Here’s what job seekers and applicants need to know about background checks before they apply to new jobs.
The Best Remote Jobs: Where & How to Find Them
The Covid-19 pandemic hasn’t been easy on any of us, but if there’s one silver lining, it’s the fact that remote work has grown in popularity because of it. Companies that previously weren’t open to their employees working remotely were suddenly forced into allowing it. Since then, they've realized that much of their workforce is happier and more productive. Naturally, this has led to more remote job openings, which is great if you’re interested in this type of position. Read on to learn more about the best remote jobs and where to find them.
In-House vs Outsourcing Recruiting: Which is Better?
When looking at in-house vs outsourcing recruiting, it is important to nail down the benefits for each and whether those benefits outweigh the risks that follow.
How to Write a Short Bio
First impressions can be tricky. When meeting someone in person, it’s likely you have an elevator speech. These short, practiced introductions can help you share more about who you are, what you do for work and other facts about you. While this works well in a live, in-person context, there are many cases where professionals “meet” someone via written form - like social media, a resume, or published work. In these cases, your bio works as your first impression. So, here’s a step-by-step guide on how to write a short bio.
How to Effectively Recruit Employees
Today, hiring and retaining talent looks much different than it did only two or three years ago. Financial instability and the strain on our mental health brought on by the pandemic has made everyone more wary and selective of their workplace and employer. Whereas in the past people might have prioritized promotions and financial reward, today they look at other factors such as workplace flexibility, personal fulfillment and values alignment.