- UpvoteDownvoteShare Job
- Suggest Revision
O Vulnerability assessment and reporting including comprehensive understanding of Vulnerability Management methodologies and procedures, threat assessment, and remediation management.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Significant experience with the design installation and management of firewalls, including IDS/IPS integration and configuring UTM (unified threat management) features such as AV, Content filtering, IPS/IDS, etc.
RemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This includes access management, network management, data protection, password/key management, and vulnerability/threat management. Drive secure engagement and architecture including threat modeling, vulnerability and risk assessment, analysis of findings various security tooling.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Key information security functions and activities include architecture and design for NCR information security controls, developing and enforcing policies and standards, security awareness training, risk management, assessment, and testing, monitoring and metrics, incident management, threat intelligence and vulnerability management.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
In-depth knowledge of cybersecurity field such as cyber-attacks and techniques, threat vectors, risk management, incident management and able to teach others. Proficiency developing a program and leveraging threat intelligence in investigations and related decision making.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Deep understanding of security technologies and concepts including SIEM, MDR/XDR, EDR and vulnerability management. Oversee our vulnerability management & endpoint compliance program.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Strong working knowledge of Malware Analysis & Threat Intelligence, including Cyber Threat Intelligence, Malware Analysis, Forensics & Media Exploitation and identifying and extracting actionable intelligence for various storage medium.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
A track record of assessing threat and vulnerability from a business perspective as well as a technical perspective, with the ability to champion the best security architecture and solutions.
RemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
A proven track record in Cybersecurity Sales with an interest in Vulnerability Management and Cyber Threat Intelligence. Our solutions span cyber threat intelligence, vulnerability intelligence, geopolitical risk, physical security, fraud and brand protection.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Information Technology also conducts incident response, threat management, vulnerability scanning, virus management and intrusion detection and completes risk assessments. 3+ years of using Identity Access Management solutions (SailPoint preferred) preferred.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Our senior consultants provide support in Cybersecurity, Cloud Security, Application Security, DevSecOps, Network Security, Data Security, Threat and Vulnerability management, Identity and Access Management, Encryption, PKI / CLM Architecture, Technology Risk Management, GRC Solutions, IT Audit, IT Compliance, IT Controls Integration, IT Compliance, Report and Certification preparation and remediation, and Advisory services on program design, build, review, and modernization.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Collaborate with stakeholders, executives, and LOB partners to complete assessments, develop cybersecurity maturity recommendations across cybersecurity domains (governance & risk management, strategy and program management, vulnerability management, threat intelligence, security monitoring, network protection, identity and access management, business continuity / disaster recovery, incident response, security architecture, and cloud security.
Full-timeExpandApply NowActive JobUpdated 19 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Perform risk analysis (e.g., threat, vulnerability, and probability of occurrence) whenever an application or system undergoes a major change. Direct the remediation of security findings and vulnerability prioritization, with development teams, encountered during testing and implementation of new systems or changes to existing systems.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Services we typically provide include security and safety system design, threat, risk, and vulnerability assessments, security surveys, security master planning, compliance to federal security programs, independent validation and verification of integrated security system operations, management of installation and maintenance, and staff augmentation to develop and implement facility management and protection processes.
Full-timeExpandApply NowActive JobUpdated 11 days ago
vulnerability management threat jobs in Atlanta, GA
FEATURED BLOG POSTS
Internship Cover Letter Tips with Examples
Until now, college has been about learning, absorbing, and experiencing. It’s not until you become eligible for an internship that things start getting real—real-world experiences using real-life scenarios. Applying for internships takes time, and there’s no college course on “how to apply for jobs.” (We’d sign up immediately if there was, though!) But here's a spoiler alert: most internships require a cover letter. And while this may seem like a burden, it’s actually a blessing.
5 Practical Ways to Remove Bias from your Hiring Process
Many employers think their hiring process is perfect. However, research shows that the hiring processes are generally impartial and unfair, especially if you are part of certain demographics. Women, people of color, people with disabilities, or even people in lower socioeconomic status are more likely to be subject to implicit bias. As diversity and employer branding become major aspects of business, it is important that employers take the lead to identify and remove bias from the hiring process. So, here are 5 practical ways to get you started.
Tips for a Good Character Reference Letter with Examples
Hiring managers love a resume laden with relevant skills and qualifications. Hard skills specific to the role, like SEO strategy or Java programming languages, are easy to qualify using achievements or facts and figures. But how exactly can they verify personality traits, work ethic, relationship management skills, or curious nature during an interview when they barely know you?
How to Dress on the First Day of Work (Men & Women)
You did it! Out of hundreds of applicants and dozens of people interviewed, you’re the one who got a new job. Congrats! Now comes the question of how to dress on the first day of work.
Why College Students Should Work While in College?
College is a special part of our lives. It’s a time when we prepare for our dream job while creating some of the most memorable moments in life. That said, college life can also be stressful. Not only do we have to spend long hours studying, writing and researching, but we also have to deal with increased tuition fees and living expenses.
5 Ways to Measure Candidate Experience
Your candidate experience is made up of 4 essential parts
How to Stall a Job Offer Politely
You did it! After several weeks of looking for a new job and undergoing grueling interviews, you finally have a job offer. Although this may be very exciting, accepting a job offer means that you’re making a long-term commitment to your future employer. So, even if you’re eager to leave your current job, this isn’t a decision you should take lightly.