- UpvoteDownvoteShare Job
- Suggest Revision
As a Cyber Security Manager, you will be responsible for strategically planning, leading, and tactically supporting the Cyber Threat Intelligence and Vulnerability Management program. Experience supporting or leading Cyber Threat Intelligence, Vulnerability Management, Application Security for large financial institutions including a national or global environment extending across multiple countries and time zones.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
GCIH, GCIA, GCFA, GCFE, ACE, EnCE, CFCE, CISSP, or similar. Knowledge in project management. Coalition combines comprehensive cyber insurance coverage and security services to help businesses prevent digital risk before it strikes.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Familiar with the CIS critical security controls and vulnerability management best practices. Lead ongoing system administration responsibilities for core Vulnerability Management systems.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Cyber Security Manager - Threat & Vulnerability Management page is loaded Cyber Security Manager - Threat & Vulnerability Management Apply locations Operations - Raleigh - Creedmoor Rd time type Full time posted on Posted 3 Days Ago job requisition id JR-8778 If you are motivated and believe in the credit union philosophy of "People Helping People," join our team.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Explore more InfoSec / Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Industry certifications preferred (CISSP, GSEC, OSCP, CEH, etc.) 5+ years of management experience leading all aspects of teams of at least five or more individual contributors. Industry certifications preferred (CISSP, GSEC, OSCP, CEH, etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Independently conducts vulnerability assessments and risk assessments with tools such as Nessus, Qualys, Metasploit, Kali and working with application and server owners to review scan results, suggest remediation actions, and track/report on progress to management.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Monitors and maintains Firewalls and corresponding management tools (FMC, ASDM), Intrusion Prevention Systems (IPS), Vulnerability Management (VM), Cisco Umbrella domain name security, ISE network Access Control, Posturing, and Profiling, IPsec VPN tunnels, AnyConnect remote users and security module, Third Party Partner Security Incident and Event Manager (SIEM), and other network and cloud security tools.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Monitors and maintains Firewalls and corresponding management tools (FMC, ASDM), Intrusion Prevention Systems (IPS), Vulnerability Management (VM), Cisco Umbrella domain name security, Client network Access Control, Posturing, and Profiling, IPsec VPN tunnels, Any Connect remote users and security module, Third Party Partner Security Incident and Event Manager (SIEM), and other network and cloud security tools.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Strong candidates must have extensive experience across the entire vulnerability management lifecycle and a solid foundation to Cyber Threat Intelligence. 3-5+ years required of combined IT and security work experience with broad exposure to Cyber Threat Intelligence and Vulnerability Management.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Relevant industry certifications such as CISSP, CISM, CCNA, Security+, GIAC, PMP, SAFe, LEAN and Six Sigma are desired. Strong understanding of key security controls, technologies (e.g. Operating Systems, Networking, Firewalls, SIEM, Security Analytics, SOAR), business processes, internal control risk management, IT controls and related standards, and Scaled Agile Framework.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of security controls, including but not limited to: vulnerability management, incident response, encryption, network, asset management, third party risk management, IAM, change management, SDLC, and privacy.
InternExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Industry certification such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA), Certified in Risk and Information Systems Control (CRISC.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA), Certified in Risk and Information Systems Control (CRISC) or other similar credentials.
ExpandApply NowActive JobUpdated Today
vulnerability management cissp jobs in Raleigh, NC
FEATURED BLOG POSTS
How To Decorate a Cubicle for Inspiration & Productivity
You know the negative reputation cubicles have – dull, dreary, gray. How can you possibly be expected to sit in one every day and be your naturally productive, enthusiastic, and upbeat self? The answer lies in decorating your cubicle so it sparks creativity and feels welcoming. While this might seem impossible given the bland canvas you have to work with, take heart because it’s totally doable!
How do Employers Verify Education?
At any stage in your professional journey, you may come across an employer or a recruiter who asks to verify your educational credentials. This shouldn’t come as a surprise as 30% of candidates admitted to lying on their resumes, yet 79% of them never get caught. In fact, 85% of employers in the US who conduct background checks find that candidates have lied on their resumes or job applications.
How to Be More Articulate and Speak More Clearly
Have you ever had those moments when you're talking to someone and have no idea what they are saying? The best response you can muster up is a simple head nod or blind agreeance?
How to Ask for a Higher Starting Salary
Maybe you think you’ve finally found your dream job. Everything about it is perfect, except… the salary. Unfortunately, it just isn’t where you want it to be. So, should you give up and move on? Given all the effort you’ve already invested, it’s probably wise to try and negotiate a better salary before you do.
How to Pass a Personality Test with Flying Colors
Whether you’re applying for your first job or looking to move up the career ladder, personality tests aren’t usually the first thing we think about. But surprisingly, they can have a massive impact on how our future employers perceive us. In fact, a 2017 study by the Society for Human Resource Management (SHRM) has found that 32% of U.S. employers use personality tests when hiring for senior management positions, and 28% use them for middle management positions. Personality tests are also used for hourly workers and contractors, though less frequently.
10 Practical and Effective Strategies to Persuade Anyone of Anything
Learning how to persuade people is like a key that can unlock any door. Acing the interview for the job of your dreams. Getting the best deal on a new car. Closing a sale with a skeptical customer. All of these wins require a level of persuasiveness.