- UpvoteDownvoteShare Job
- Suggest Revision
Cyber Security vigilantly protects Deloitte and client data. Hands-on experience with at least two of the following technologies: Unix administration, Windows Server administration, Active Directory, Windows Workstation, Routers /Switches management, Firewall Management, SANS/NAS, Web servers, IAM/AAA, IDS/HDS, System vulnerability scanning tools, application/database vulnerability scanning tools, mobile device analysis or Secure coding.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Establish a taxonomy of Indicators Of Compromise (IOCs) and share this detail with other cyber security team members, including the Security Operations Center (SOC), Cyber Security Manager, Cyber Security Analyst, Enterprise Operations Center (EOC), and other stakeholders.
RemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Architect and implement identity and access management, vulnerability management, and security operations solutions. In this role, you'll be instrumental in driving Cloud and Cyber Security initiatives, administering and implementing configurations in Azure, M365, and other cloud service providers to safeguard data and respond to security incidents.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Cyber Defense Senior Manager with report directly to the Director of Information Security and provide the vision and strategic direction for building and running new stand-alone Continuous Monitoring, Vulnerability Management, Threat Intelligence and Incident Response programs.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Schedule, coordinate, and track the remediation of open vulnerabilities for assets owned by Global Information and Cyber Security (GICS). Use ticketing system for documenting and processing requests and incidents in which Global Information and Cyber Security (GICS) are involved.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Minimum of 5 years related work experience required, including experience with cloud security engineering, cloud vulnerability management, or general cloud cyber security. If you have a deep background in cloud security engineering, cloud penetration testing, or cloud vulnerability management – and you’re ready to challenge yourself and to grow – this role is for you.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Cyber Security Engineer II. Familiarity with Anti-Virus, Firewalls, IDS/IPS, NAC, SIEM, DLP, Content Filtering/Web Proxies, Vulnerability Scanning and Forensic Evidence Acquisition.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
YEARS OF EXPERIENCE: 4-6 years of experience as an Information Security Analyst, with hands-on experience in vulnerability assessments, penetration testing, and collaboration with technical teams and stakeholders.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
In-depth knowledge of cyber security and technical domains including vulnerability management and risk management. Project Management lead for multiple cyber security technical projects including compliance and vulnerability management.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Our client is currently seeking an experienced Blue Team Lead to become part of the Department of State (DoS) Diplomatic Security Cyber Mission (DSCM) program providing leading cyber and technology security experience to enable innovative, effective and secure business processes.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Worked in the cyber security environment, Network security, and Vulnerability management. Experience administratively managing a Cybersecurity portfolio such as vulnerability management, or network security.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
As a Cyber Security Analyst at PCF Insurance, you will help a dedicated team secure one of the fastest-growing insurance brokerages in the country. This is an intermediate-level, professional role, that works as assigned with clear instruction and supervision from Cyber Security leaders to leverage designated tools and processes to monitor, investigate, and maintain PCF Insurance's IT environment.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
A solid understanding of cyber security concepts, vulnerability identification and cyber threat intelligence. Work with Security Analytical platforms, SOAR, SIEM, EDR, and other detection and incident response technologies.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Design, deploy, configure, refine, manage, analyze, audit, document, and cross-train on a range of cybersecurity systems, software, and processes, encompassing IDP, CASB, DLP, email, MDM, SIEM/SOAR, AWS security utilities, scripting, IAM, and vulnerability management.
ExpandApply NowActive JobUpdated 7 days ago
cyber security vulnerability jobs in New Orleans, LA
FEATURED BLOG POSTS
5 Common Interview Mistakes
Everyone's interview process is unique in some form or fashion. Like most, your interview process is crafted so you can get the most information out of your candidates to increase hiring confidence and make the right hiring decisions. However, there are often small problems in interview processes that could ultimately affect the success of hiring decisions.
How to Ask Someone to be a Reference + Email Templates
One part of the job-hunting process that frequently gets overlooked is putting together a list of good references. Most of the time we focus on creating the perfect resume, writing an awesome cover letter, and getting our hands on letters of recommendation. We think about what outfit we’ll wear to the job interview, how we’ll answer those tricky questions, and what our career plan looks like. But, in fact, having multiple references lined up who will speak favorably about you to a potential employer is critical to landing a job. This aspect of job searching really can’t be ignored.
Job Rejection Email Response with Examples
Glassdoor estimates that, on average, there are about 250 applicants for every job vacancy out there. If you’ve ever applied for a job, the odds are that you’ve received the dreaded job rejection email.
Structured vs Unstructured Interviews
The goal of an interview is to evaluate candidates based on their skills, personality, and knowledge. You want to choose the BEST candidate from your candidate pool, so the interview is something you can't mess up. As you begin planning your interview process, one of the major decisions you'll face is whether the interview should be a structured vs unstructured interview. So let's take a dive into the differences and sort out which circumstances warrant which interview process.
How to Describe Your Personality with Examples
Imagine you’re in an elevator with the CEO of your dream company and you get to talking. The conversation is going well and you start to imagine yourself working for their company when the CEO turns around and asks you “tell me a bit about yourself.” Would this catch you off guard or would you be able to give a clear and succinct description of who you are?
4 Ways to Make Your Job Posting More Inclusive
According to a Glassdoor survey,
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra: