- UpvoteDownvoteShare Job
- Suggest Revision
O Vulnerability assessment and reporting including comprehensive understanding of Vulnerability Management methodologies and procedures, threat assessment, and remediation management.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Vulnerability Scanning/Assessment tool data/outputs (e.g. Tenable/Nessus), Manage vulnerability scanning and patch management processes for all unit systems in alignment with the Continuous Monitoring plan/strategy.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Analyze data from numerous sources (Splunk, Qualis, CMDB/Asset Inventory, CyberArk, Armis, ForeScout, Automated Patch Management systems, Threat and Vulnerability, Network Traffic, Governance and Standards data, Risk Assessment data, Security baselines, etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with running a vulnerability management program including risk mitigation and incident response. Working from a formal IT security plan, the team provides risk management, vulnerability management, and security strategies to the courts within the Tenth Circuit.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Implements the standard methodologies used in the RMF process and serves as the organizational SME for NIST guidelines and industry best practices for: risk assessment and management, vulnerability assessment, contingency planning, disaster recovery, configuration management, security assessments, and development of mitigation plans.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
RemoteExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Related areas of technical focus for this position include but are not limited to vulnerability assessment, hazard mitigation, community planning, natural resource management, and research and planning related to Federal agencies (FEMA, USACE, NOAA, and USFWS), state agencies, and local communities.
$102,000 - $131,000 a yearFull-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Maintain vulnerability scanning tool compliance, such as HBSS or ACAS, and patch management, such as IAVM to ensure IT staff pushes patches to all systems in an effort to maintain compliance with all applicable directives, manage system changes, and assess the security impact of those changes.
$90,000 - $200,000 a yearFull-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Security assessment: Perform advanced security assessments, vulnerability management, and penetration testing to identify and remediate complex security vulnerabilities. Security architecture: Lead the design and implementation of robust security architecture and solutions for the organization, including firewalls, security information and event management system (SIEM), and encryption technologies.
$109,000 - $172,400 a yearFull-timeRemoteExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Demonstrated experience with Tenable Security Center, Nessus for vulnerability and compliance assessment. The ideal candidate will have a cyber experience across the full spectrum of cyber operations from a mission execution perspective, to include vulnerability management, compliance management, database, and enterprise information security infrastructure.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with vulnerability assessment and analysis experience utilizing Assured Compliance Assessment Solution (ACAS) and DISA STIGs∯*∯ Develop and augment automation through scripting or programming and collaborating w/ teams for security functionality to meet cyber requirements.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Mitigating risk via security controls, vulnerability management (scanning, assessment, reporting, and mitigation verification). Support the Risk Management Framework (RMF) authorization process to include developing and maintaining artifacts for the IS Body of Evidence (BoE.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Providing configuration management (CM) recommendations for information system security software, hardware, and firmware and coordinating changes and modifications with the ISSM, Security Control Assessor (SCA), and Authorizing Official (AO.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Identify, implement and maintain cybersecurity policies and training and stay abreast of new threats that are reported via several threat assessment feeds to maintain up-to-date knowledge of cybersecurity threats and incident response best practices.
$155,000 - $195,000 a yearExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Familiarity with Risk Management Framework, NIST standards, and cybersecurity assessment tools like ACAS and DISA STIGs∯*∯ The role demands specialized skills in vulnerability assessment and analysis, including proficiency with Assured Compliance Assessment Solution (ACAS) and DISA STIGs, manual hardening, system compliance, and the capacity to craft solutions to intricate IS compliance and security issues.
Full-timeExpandApply NowActive JobUpdated 3 days ago
assessment vulnerability management jobs in Denver, CO
FEATURED BLOG POSTS
Virtual Reality Job Interviews
With the advent of desktop computers, the arduous task of scouring through weekly job classifieds became a thing of the past. The mid-1990s brought about a new era where job seekers could easily search and apply for jobs online. The introduction of AOL's Instant Messaging feature provided an even faster means for employers and candidates to communicate and schedule interviews. As smartphones became more pervasive in the early 2000s, hiring managers increasingly used phone calls for screening and interviewing candidates. Despite this trend, over 80% of interviews still took place in person.
A Potential TikTok Ban?!
As you may already know, there has been a lot of talk lately about the possibility of a TikTok ban. While this has not yet come to fruition, it's important to consider the implications this could have for businesses and recruiters who rely on TikTok as a platform to market their brand, recruit new talent, and connect with their audience.
The Effects of Workplace Racism and Sexism
One day it's a covert statement to a mother returning to work after maternity leave. Another day it's a lingering gaze at an employee enjoying a culturally rich meal. These microaggressions (or sometimes macroaggressions) can take an employee from a confident, high-performer to one that feels insecure being themselves at work. Your employees engage with people with different ideas and feel most comfortable and valued when they can work without losing their cultural, racial, and gender identity. While most employers know this, why have workplace racism and sexism often been neglected?
When Rage Applying Strikes: How to Identify Unserious Candidates
As the job market remains highly competitive, we have seen a surge in "rage applying." This is when candidates apply to multiple jobs, often without considering whether they are truly interested in the role. Rage applying goes hand-in-hand with quiet quitting. Often, employees want to entertain the thoughts and feelings of leaving their job, but they aren't necessarily serious about leaving yet. Meanwhile, other employees engaging in this trend are actually trying to find a better role. As a recruiter, it can be hard to identify who are the real applicants in a sea full of quiet quitters, but understanding rage applying and identifying red flags will certainly help.
How to Increase Job Ad Exposure
In today's competitive job market, writing quality job ads is critical for attracting top talent to your organization. While networking and candidate referrals are prime real estate for finding qualified candidates, nothing beats the tried-and-true method of writing an extraordinary job ad. But while writing a great job ad is the first step, what's more important is increasing visibility. You could have the most detailed, well-written ad on the internet, but if no one sees it, then you are wasting time (and potentially money!). Employers often believe that job boards are the root of the problem, but you can learn how to increase job ad exposure by tweaking a few steps of your recruitment process.
How to Navigate Hiring Out of State
The job market has shifted significantly in recent years. The accelerated adoption of technology has not only pushed many companies into remote working arrangements but also increased the availability of supporting tools and technologies (i.e., video conferencing and collaboration software).