- UpvoteDownvoteShare Job
- Suggest Revision
Expert knowledge in cloud architecture, DevSecOps, vulnerability management, and familiarity with regulatory frameworks such as SOC, ISO, and FedRAMP. Conduct and evaluate vulnerability assessments and penetration tests, review and improve security policies, and manage risk policies.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Working technical competency in one or more of the following supported platforms: Microsoft Windows Server, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS.
ExpandApply NowActive JobUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with vulnerability management within a collateral environment. They should also have experience in hardening endpoints to meet NIST/RMF/JSIG requirements, and be comfortable using advanced vulnerability remediation techniques.
Full-timeExpandApply NowActive JobUpdated 20 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Perform and analyze vulnerability assessments and penetration tests, review and enhance security policies, and manage risk policies. - 10+ years of operational security experience, with a focus on SaaS environments, and at least 2-5 years in security, risk management, compliance, and privacy.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Expert knowledge in using Bloomberg, and FactSet, similar investments systems and the experience to be able to apply expertise to any new investment risk management and accounting related, and order entry systems.
$177,600 a yearExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Wealth Management Advisor partners with affluent clients to identify their financial goals, analyze their financial landscape and develop recommendations that help them work towards well defined financial objectives.
$92,000ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Leverage In-depth knowledge of Data Recovery, Business Continuity Plans, critical infrastructure management, incident response, vulnerability management, and data protection to ensure Voyager's securityResponsible for IT processes and policies fulfilment, end-user communications and help documentation, fulfilment of regulatory compliance and change control.
ExpandApply NowActive JobUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with the following DoD security tools: SCAP, DISA STIG’s, Splunk, Nessus or ACAS. Tailored Management/Leadership Training. Experience with accrediting information systems utilizing DCSA Risk Management Framework (RMF) guidelines.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Primary duties of the Trash Collector include: - Operating garbage trucks - Collecting and dumping trash receptacles - Following route assignments as directed Waste Management offers an excellent benefits package that includes medical, dental, vision, life, 401(k) savings and more.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Air Force (AF) Special Access Program (SAP) Security Support Services (SSS) assists the AF cognizant security authority in oversight of enhanced National Security Objectives supporting AF SAP interests through active and integrated security operations, processes, mechanisms, and management.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Toolkits, SEIMs, Logrhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e.g. SE Linux extensions to RHEL, PitBull, AppArmor, and Sentris) , video teleconferencing/VOIP,Oracle/MS SQL database security, and Apache/IIS Web server security.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Examples include structures for space telescopes and laser communication terminals, thermal management for high energy laser systems and RF devices, and aerodynamic designs for airborne sensors, hypersonic platforms, and UAVs. To meet continuously increasing performance, size, weight, and survivabilty requirements, concepts and designs are developed with high-fidelity models, multidisciplinary simulations, environmental testing, and advanced materials.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
KEYWORDS: RMF, Risk Management Framework, ICD, Information Assurance, IA, IAO, IAT, IAM, A&A, A+, Network+, Security+, Non-classified Internet Protocol Router Network (NIPRNet), Secret Internet Protocol Router Network (SIPRNet), DISA Security Technical Implementation Guides (STIGs), CISSP, CASP.
Full-timeExpandApply NowActive JobUpdated 27 days ago - UpvoteDownvoteShare Job
- Suggest Revision
As the IT Project Manager, the employee is tasked with strategic planning for program management, resource alignment, and the monitoring, management, and control of IT Infrastructure projects.
ExpandUpdated Yesterday
vulnerability management nessus jobs in Hanscom Air Force Base, MA
FEATURED BLOG POSTS
How to Address a Cover Letter With Examples
It’s easy to get caught up in focusing on your resume – how it looks, what it says, and whether it’s going to land you a job interview. Because there is a big focus on building the perfect resume, job searchers often overlook the importance of a high-quality cover letter. Your cover letter plays a huge role in your first impression. It humanizes you and provides context for your resume.
How to Call Out of Work
No matter how happy we are with our jobs, there are days when we feel overwhelmed and want to call out of work. No, don't feel guilty. It's expected because we're humans, and we can't control the uncertainties of life. But the problem lies in how to call out of work without seeming uncommitted to work, especially if you seldom get work-free days.
What is Seasonal Employment?
Depending on where you are in your career, you might have first-hand experience with seasonal employment. Seasonal employment can be a great way to expand your skill set and earn extra cash while helping businesses meet seasonal increases in demand.
How to Avoid a Bad Hire
"A new employee who doesn't meet the minimum performance, quality, and culture fit standards you set when you began sourcing and recruiting. Additionally, bad hires will immediately show signs of self-interest instead of an interest in their role and the company."
How to Ask for a Letter of Recommendation
When the job board you subscribe to finally posts your dream job, you may feel like the stars have aligned. But part of securing a position that matches your career plan is ensuring you address all the application basics. You know, the resume, the cover letter, the portfolio. It seems like you've got this in the bag — until you realize they want a letter of recommendation, too!
What Are SMART Goals?
When it comes to achieving our goals, there’s a lot of noise to work through. A study by the University of Scranton has found that only 8% of people who set New Year’s resolutions actually achieve them. Our busy lives might be one reason for this. Another, even more important reason, is our approach to goal setting. Being too vague, too ambitious or simply unclear on the timeframe can set us up for failure.
In-House vs Outsourcing Recruiting: Which is Better?
When looking at in-house vs outsourcing recruiting, it is important to nail down the benefits for each and whether those benefits outweigh the risks that follow.