- UpvoteDownvoteShare Job
- Suggest Revision
O Vulnerability assessment and reporting including comprehensive understanding of Vulnerability Management methodologies and procedures, threat assessment, and remediation management.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
RemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Incident response, security monitoring and analysis, vulnerability management and risk assessment, threat hunting, penetration testing, cyber threat intelligence, and/or other cyber security roles.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with vulnerability management practices in AWS, GCP, or Azure. This individual should be an experienced cyber security professional with a strong understanding of how to create and lead vulnerability management programs.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Cyber Security Advanced Concepts (Vulnerability Management, Network Security/Secure Transmission Management, Data Loss Prevention, Identity Access Management, Threat Intelligence, Penetration testing, IT Risk Management.
Full-timeRemoteExpandApply NowActive JobUpdated 23 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Your responsibilities will encompass a wide spectrum of threat detection, security analysis, and incident response activities. Identify, Document, and Research Threat Intelligence Findings and Reports.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Lead assessment, development, implementation, optimization, and documentation of a comprehensive and broad set of security technologies and processes (secure software development, application security, data protection, cryptography, key management, identity and access management, network security) within SaaS, IaaS, PaaS in cloud environments.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Qualifications you need A successful Program Management Director possesses or provides the following: Required Knowledge, Skills & Abilities (KSAs): 10-15 years’ experience in data management, metadata management, data governance, or information management.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Explore more InfoSec / Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Expertise in application security, including code review, penetration testing, and vulnerability management. Develop and maintain automated security processes, including vulnerability scanning, code analysis, and security testing, to identify and remediate security vulnerabilities.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Ensures risk reductions occur for hospital acquired adverse ventilator events by working with the organization's Risk Management Staff, Infection Control Practitioner, Critical Care leadership and Respiratory Care leadership to foster improvement in ventilator care by education, measurement and intervention as findings indicate.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Possess in-depth technical knowledge of Microsoft Endpoint Configuration Manager (SCCM) & WSUS including but not limited to patching, vulnerability management, OS upgrades, application updates and device endpoint management.
ExpandApply NowActive JobUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Leverage the MITRE ATT&CK framework, monitor the threat landscape and evaluate existing data sources to identify opportunities for new EDR/SIEM content development. Implement and maintain detection capabilities across SIEM and EDR/XDR platforms (for example Splunk, Sumo Logic, QRadar, LogRhythm, Carbon Black, CrowdStrike, Tanium, etc.
RemoteExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Wealth Management Advisor partners with affluent clients to identify their financial goals, analyze their financial landscape and develop recommendations that help them work towards well defined financial objectives.
$92,000Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Kimley-Horn has an opportunity for a motivated Senior Project Manager to expand our Cultural Resources Management practice in Tallahassee, Florida! Kimley-Horn has an opportunity for a motivated Senior Project Manager to expand our Cultural Resources Management practice in Tallahassee, Florida.
ExpandApply NowActive JobUpdated 2 days ago
vulnerability management threat jobs in Tallahassee, FL
FEATURED BLOG POSTS
Why Work in Sales? 9 Reasons & Tips on Answering as an Interview Question!
Working in sales can be demanding and challenging, but it can also be gratifying. Sales is an excellent career with a clear path full of excitement and potential for growth. So, if you're contemplating careers and have wondered "why work in sales?", keep reading to determine if sales is a suitable role for you.
How to Fire an Employee
So… you've finally decided to let one of your employees go. Drafting the paperwork and corresponding with HR is the easy part, but knowing how to fire an employee is where things get complicated. In fact, it is one of the most challenging conversations to have in the workplace. However, it must be done, and it must be done with poise and tact. Not only should you keep your state law in mind, but you should also consider your former employee's wellbeing.
How Long Does it Take to Hear Back from a Job?
Are you applying for your very first job? Maybe you’re anticipating your termination from your current role and want to be proactive. Either way, waiting to hear back on your job application can be stressful. If time has passed since you applied, you may wonder how long does it take to hear back from a job. Well, the answer is... it depends.
How to Respond to a Recruiter Through Email? (Tips & Examples)
Rather than wading through an endless list of open roles, wouldn’t it be nice if relevant job opportunities come to you?
How to Reject a Candidate Professionally
When deciding on how to reject a candidate, your first question may be
How Does Salary Pay Work? (Compared to Hourly Pay)
At the bottom of each job advertisement, companies label a role as salaried or hourly. Both methods will get you paid (yay), but each in very different ways. So, it's essential to figure out how does salary pay work? While employees paid by the hour are paid based on how long they work, employers pay salaried employees a fixed amount.
The Quiet Quitting Phenomenon
The term, quiet quitting, was coined in 2009, but only now is it gaining traction as young Millennials and Gen Z workers are experiencing record levels of burnout. With the pandemic and the state of the economy, young employees are feeling the pressure. So, quiet quitting comes into effect when that pressure is exasperated by work stress and no managerial support.