- UpvoteDownvoteShare Job
- Suggest Revision
Cyber Security Manager - Threat & Vulnerability Management page is loaded Cyber Security Manager - Threat & Vulnerability Management Apply locations Operations - Raleigh - Creedmoor Rd time type Full time posted on Posted 3 Days Ago job requisition id JR-8778 If you are motivated and believe in the credit union philosophy of "People Helping People," join our team.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As a Cyber Security Manager, you will be responsible for strategically planning, leading, and tactically supporting the Cyber Threat Intelligence and Vulnerability Management program. Experience supporting or leading Cyber Threat Intelligence, Vulnerability Management, Application Security for large financial institutions including a national or global environment extending across multiple countries and time zones.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Explore more InfoSec / Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Identity and Access Management (IAM) team is a specialized group focused on streamlining identity and access across our environment such that it is simplified, quick, reduces toil and decreases risk.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Preferred experience with Cloud security best practices such as backups, vulnerability management, NIST & HITRUST framework controls. Preferred experience with Cloud security best practices such as backups, vulnerability management, NIST & HITRUST framework controls.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Reconcile patch management, vulnerability management, and asset management systems to ensure inventory uniformity between each tool. Administer Vulnerability Management Platform & CSPM Platform.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Solid understanding of cybersecurity processes and concepts (e.g. vulnerability management, security governance, software development, incident response, physical security, auditing and logging, micro segmentation, secure access service edges, zero trust architecture, SBOM, Secure Software Development Lifecycle, Insider Threat, Digital Supply Chain, Vendor Risk Management, PKI, penetration testing) as well as application controls and segregation of duties.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Strong understanding of network security, mail flow, vulnerability management, and security principals. Provide leadership and evangelism in vulnerability management and remediation.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with the Security Information Management System (SIMS) software application. Bachelor's degree in Law Enforcement, Intelligence, Management related fields or an equivalent combination of training and experience.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Determines the information security approach and operating model in consultation with stakeholders and aligned with the risk management approach and compliance monitoring of non-digital risk areas.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Familiar with the CIS critical security controls and vulnerability management best practices. Lead ongoing system administration responsibilities for core Vulnerability Management systems.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Candidate must be good with Checkpoint, Fortinet, Cisco firewalls and Multi-Domain Security Management. Experience should include security policy development, security education, Network Penetration testing, Application vulnerability assessments, risk analysis and compliance testing.
ExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Maintain understanding of security technologies including Anti-Malware, EDR, Web Security, SIEM , IPS/IDS, Firewalls, and Threat Intelligence. Amylyx was started in 2013 by two Brown University students who had an ambitious goal: to improve the lives of people with neurodegenerative diseases by addressing the root cause.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
4 years of experience in information security in areas like VPN, DLP, MDM, Shadow IT management, endpoint protection, VDI, SCIM and Identity Mgmt (e.g. Okta). Provide help desk escalation support for IT Security tickets Triage and respond to security tickets (vulnerability remediation, incident response, legal requests) in an escalated support model with the IT Help Desk. Create IT Security Dashboarding, monitoring and alerting, with analytics reporting integrated into the quarterly IT Ops Review.
Full-timeExpandApply NowActive JobUpdated Today
vulnerability management jobs in Raleigh, NC
FEATURED BLOG POSTS
What is a W-9 and How to Fill One Out
When you began working for yourself, you probably didn’t account for the tax reporting work that will fall on your shoulders each year. If you’re a freelancer, independent contractor, or business owner, filing your taxes is not as simple as uploading your W-2 form into some online tax preparation software. Most self-employed people need to complete a W-9 as a step for accurately reporting their earnings to the IRS. Below, you can learn how to fill out a W-9 and when to submit it.
Tightening the HR budget in 2023
With the state of the economy still uncertain, 2023 is expected to be approached with much anticipation. Human Resource leaders have many concerns, including how they will manage to accomplish their goals with budget belts already getting snug. Let’s look at some of the factors that the new year is projected to bring for HR and how to prioritize budgets to reach human capital objectives.
A Comprehensive Guide to Becoming a Better Conversationalist
Have you ever stood awkwardly next to someone at a party because you didn’t know what to say to them? How about at a networking event or on a first date? You're not alone if you’ve ever experienced this uncomfortable silence. Many people struggle to master the art of being a great conversationalist.
Why is Non-Verbal Communication Really Important?
In a world where words and phrases rule daily communication, you may wonder why non-verbal communication is important. Whether you realize it or not, you communicate more with nonverbal actions than you do with verbal communication. When you interact with your peers, people are reading your body language, facial expressions, voice, and many other factors that help fill in blanks that words can't fill.
Making Hybrid Work More Efficient
Covid was a catalyst for change in the work environment. Keeping people safe and helathy was the initial goal for employers, but the unintended result was the considerable demand in remote work. Now, onsite work has been dramatically altered to remote work, which is now transforming into a combination of the two: hybrid work.
How Can HR Technology Help Retain Employees?
Human resources' rapid adoption of technology has led to new ways of streamlining human capital management. Based on the IEE Global Study, these technologies changed how HR handled recruitment and retention in 2022. This includes tech like
Why is Time Management Important? 10 Crucial Importances of Time Management
We’ve all been there before. What starts as a relaxing evening scroll quickly becomes a full-blown binge. You blink, and it’s midnight - throwing off your entire next day before it even starts. And at its worst, this indulgence might leave you feeling behind on things you planned to finish that night. This is why time management is important.