- UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Senior Leader communications, report writing, staff development, FEDRAMP, DoD Certification and AccreditationCreation and the process of Operationalizing Indicators of Compromise (YARA, STIX, TAXII)Cyber Threat Management and Intelligence methodologiesPacket Analysis tools: TCP Dump, Ettercap, WiresharkHost Operating Systems: (Mastery Level) Windows, iOS, Linux, Android.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
ResponsibilitiesParticipate in vulnerability management related activities including the identification, prioritization and directing the remediation of security related vulnerabilities.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge in project management. Coalition combines comprehensive cyber insurance coverage and security services to help businesses prevent digital risk before it strikes. Coalition is the world's first Active Insurance provider designed to help prevent digital risk before it strikes.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Determines the information security approach and operating model in consultation with stakeholders and aligned with the risk management approach and compliance monitoring of non-digital risk areas.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Support the enrollment of Multifactor Authentication (MFA), Single Sign-on (SSO), and Mobile Device Management (MDM). Lead and participate in projects and production support operations focused on implementing Identity and Access Management (IAM) integrations and Role Based Access Control (RBAC) strategies and integrations.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Cyber Security Manager - Threat & Vulnerability Management page is loaded Cyber Security Manager - Threat & Vulnerability Management Apply locations Operations - Raleigh - Creedmoor Rd time type Full time posted on Posted 3 Days Ago job requisition id JR-8778 If you are motivated and believe in the credit union philosophy of "People Helping People," join our team.
Full-timeExpandApply NowActive JobUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Key areas of knowledge include access control and authorization, vulnerability management, intrusion prevention and detection, network security, encryption, endpoint protections, incident response, and risk mitigation.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Explore more InfoSec / Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Identity and Access Management (IAM) team is a specialized group focused on streamlining identity and access across our environment such that it is simplified, quick, reduces toil and decreases risk.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Working knowledge of auditing techniques and procedures, resource management and risk assessments. Take part in the management and deployment of the internal security training and compliance programs (i.e., Phishing Tests, Security Onboarding Training.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
With 35 patents in AI-driven threat detection and the most vendor references in MITRE D3FEND, organizations worldwide rely on the Vectra AI to move at the speed and scale of hybrid attackers. Pre-sales technical account management together with the Regional Sales Managers.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Supports Information Security and Cyber Threat management programs within the Bank at an advanced level of ability. Analyzes vulnerability and threat data to provide actionable intelligence for cyber defense efforts.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Solid understanding of cybersecurity processes and concepts (e.g. vulnerability management, security governance, software development, incident response, physical security, auditing and logging, micro segmentation, secure access service edges, zero trust architecture, SBOM, Secure Software Development Lifecycle, Insider Threat, Digital Supply Chain, Vendor Risk Management, PKI, penetration testing) as well as application controls and segregation of duties.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Qualys Solutions Architects are the trusted advisors to our customers, providing valuable insights and education on asset and vulnerability management, patching, threat detection & response, compliance, and cloud and application security by leveraging the world-class Qualys TruRisk Platform.
ExpandApply NowActive JobUpdated 11 days ago
vulnerability management threat jobs in Raleigh, NC
FEATURED BLOG POSTS
How Can HR Technology Help Retain Employees?
Human resources' rapid adoption of technology has led to new ways of streamlining human capital management. Based on the IEE Global Study, these technologies changed how HR handled recruitment and retention in 2022. This includes tech like
Why is Time Management Important? 10 Crucial Importances of Time Management
We’ve all been there before. What starts as a relaxing evening scroll quickly becomes a full-blown binge. You blink, and it’s midnight - throwing off your entire next day before it even starts. And at its worst, this indulgence might leave you feeling behind on things you planned to finish that night. This is why time management is important.
Minimizing Candidate Renegs During the Hiring and Onboarding Process
Candidates reneging on job offers or during the onboarding process can be a frustrating experience for any recruiter. In a talent-driven job market, it’s common for candidates to have more than one job offer to consider. It becomes a race against time to see which organization can offer the best career experience, compensation, and circumstances that secure the right employees.
10 Reasons to Be on Time at Work
Being punctual at work may not be something you’ve given much thought to, but it’s the foundation for building a successful career. All of your technical or job-specific skills will be in vain if your peers and superiors can’t trust you to show up on time and do the work. In fact, Simon Sinek once famously said that
Recruiting in a Recession: Hard Truths That Talent Acquisition Experts Must Accept
The summer had economists from around the globe embroiled in a debate about a possible recession coming in the next few years (or months). As of October 2022, the U.S. Labor Department data put the current inflation rate at 7.7%. The recent layoffs in the tech industry are just the first of what is soon to be a string of cutbacks by companies looking to save costs. For recruiters, this means freezes in hiring and fewer openings. It will also include the uphill task of finding the best candidates for them from the coming influx of recently laid-off job seekers. Now is probably a good time to brace for tough times in the next few years in the talent acquisition industry. To survive and thrive recruiting in a recession, here are some hard truths you will need to accept.
10 Importancies of Setting Realistic Goals
We’ve all heard how important it is to set professional and personal goals. Developing and establishing goals keeps us motivated and moving forward in life. But not all goals are created equal. If you’re chasing goals that are too lofty, you’ll end up disappointed when you cannot reach them. Setting goals that are achievable and measurable is the key to success.
Email Etiquette Principles - Why is it Important
Why is email etiquette important? Let's imagine you're hiring for a new role, and you’ve just received the email below.