- UpvoteDownvoteShare Job
- Suggest Revision
Furthermore, our team monitors and ensures the compliance of CSO application to Deutsche Bank policies on technical level, you will be involved in exciting projects in our company and our worldwide business network, and you'll be responsible for transition, migration, and implementation of the cloud scanning and vulnerability management solutions.
Full-timeExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Solid familiarity with general enterprise technology with focus on security and compliance such as architecture, firewall, router, load balancer, operating systems, SEIM, IDS/IPS, HIDS, malware analysis and protection, content filtering, perimeter access controls, logical access controls, identity and access management, and data loss prevention, content filtering technologies, application firewalls, vulnerability scanners, security incident response, Identity Access Management (IAM.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
For example, graduate degrees ranging from Applied Cryptography to Network Vulnerability and Detection are now being offered through colleges and universities nationwide. In addition to interesting “on the groundwork” that cybersecurity professionals get to take-on, there is also a growing selection of highly tailored cybersecurity graduate programs that can further academic knowledge in cybersecurity as well.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of information security principles, including risk assessment and management, threat and vulnerability management, incident response and identity and access management. Knowledge of information security principles, including risk assessment and management, threat and vulnerability management, incident response and identity and access management.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Must be very proficient with the common tools associated with red teaming, penetration testing, and vulnerability assessments (Metasploit, Burp Suite, Cobalt Strike, Kali, etc. This is a highly technical role that requires broad technical knowledge and a deep understanding of threats and threat TTPs. You will lead and participate in advanced technical assessments that leverage red team, penetration testing, and vulnerability assessment tools and techniques to identify hi-risk vulnerabilities across a variety of technologies.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
ARC Group has an immediate opportunity for a Cybersecurity Risk Analyst! ARC Group is a Forbes-ranked a top 20 recruiting and executive search firm working with clients nationwide to recruit the highest quality technical resources.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Bring expertise in coastal resiliency projects and programs including vulnerability studies, beach restoration, flooding protection, and similar projects and programs. Synthesize and analyze vulnerability data to support the identification of adaptation solutions and align with competitive funding sources.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
A Certified Information Systems Security Professional (CISSP) certification (within 180 Days if converted to FTE) Bachelor's degree in an IT related field or equivalent IT, IT Infrastructure and/or Cybersecurity work experience.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Work with and manage third party service partners as needed on risk assessments, vulnerability scans, penetration testing, incident management, managed SIEM, IDS/IPS, Data Loss Prevention (DLP), and threat intelligence.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Working experience with data security, data auditing, vulnerability scanning and report generation. Job Role: PL/SQL Developer. Working experience with data security, data auditing, vulnerability scanning and report generation.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Experience analyzing data from security tools such as EDR, SIEM, Firewall/UTM logs, Vulnerability Assessment reports, Pen test reports, etc. Highly desired skill in automation of incident and vulnerability management of day to day operations.
Full-timeRemoteExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Must have experience in vulnerability scanning and providing remediation recommendations. Must possess multi-discipline experience with and have an in-depth understanding of:McAfee Application Control (SolidCore)Defense Information Systems Agency (DISA) Assured Compliance Assessment SolutionAnti-virus host-based protectionVirtual shared computing environmentsNetwork and/or security managementCommunications protocolsNetwork technologiesSecuring Microsoft (Windows 10 or newer) operating systems, Linux operating systems or mobile device operating systems.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Vulnerability Assessment ( Nessus and Qualys ) Significant experience with the installation, and use of modern EDR platforms like SentinelOne and CrowdStrike to prevent, detect, and identify Advanced Persistent Threats (APTs) that might circumvent traditional security solutions like anti-virus, firewalls, and IPS/IDS.
Full-timeRemoteExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Continuously monitoring and improving application security through vulnerability assessments and penetration testing. We are seeking a highly skilled PHP/Drupal Developer to join a Back-End project involving decoupled/headless Drupal.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Carry out endpoint testing and vulnerability scanning, and implement appropriate remediation measures to ensure a secure environment. Carry out endpoint testing and vulnerability scanning, and implement appropriate remediation measures to ensure a secure environment.
ExpandApply NowActive JobUpdated 4 days ago
vulnerability job in Jacksonville, FL
FEATURED BLOG POSTS
5 Common Interview Mistakes
Everyone's interview process is unique in some form or fashion. Like most, your interview process is crafted so you can get the most information out of your candidates to increase hiring confidence and make the right hiring decisions. However, there are often small problems in interview processes that could ultimately affect the success of hiring decisions.
Job Rejection Email Response with Examples
Glassdoor estimates that, on average, there are about 250 applicants for every job vacancy out there. If you’ve ever applied for a job, the odds are that you’ve received the dreaded job rejection email.
Structured vs Unstructured Interviews
The goal of an interview is to evaluate candidates based on their skills, personality, and knowledge. You want to choose the BEST candidate from your candidate pool, so the interview is something you can't mess up. As you begin planning your interview process, one of the major decisions you'll face is whether the interview should be a structured vs unstructured interview. So let's take a dive into the differences and sort out which circumstances warrant which interview process.
How to Describe Your Personality with Examples
Imagine you’re in an elevator with the CEO of your dream company and you get to talking. The conversation is going well and you start to imagine yourself working for their company when the CEO turns around and asks you “tell me a bit about yourself.” Would this catch you off guard or would you be able to give a clear and succinct description of who you are?
4 Ways to Make Your Job Posting More Inclusive
According to a Glassdoor survey,
How to Calculate Net Income
Understanding your finances can be daunting even if you’re good with numbers. Your net income, in particular, is a key metric for determining how well you’re doing financially and whether your current way of operating is sustainable or not.
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra: