- UpvoteDownvoteShare Job
- Suggest Revision
Security tools: Microsoft 365 E5 Suite, Tenable/Nessus vulnerability management, a SIEM, Logmonitor. Ensuring the stability, availability, performance and security of the enterprise network; including, but not limited to, internal/external network security, vulnerability scanning, patching and remediation, software/firmware updates, server class operating systems, managing cloud services and other duties as assigned.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Subject matter expert (SME) for performing monthly internal and external vulnerability scanning; reports to Directors and CIO on any emerging threats and critical alerts/vulnerabilities. Servers/Networks: Dell servers, Netapp storage, VMware, Veeam, Zerto, Cisco, co-located data centers, Microsoft Azure IaaS and Azure AD, Active Directory, VDI/Azure Virtual Desktop.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Ensuring the stability, availability, performance and security of the firm's enterprise network; including, but not limited to, internal/external network security, vulnerability scanning, patching and remediation, software/firmware updates, server class operating systems, managing cloud services and other duties as assigned.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
These may include products and tools in various areas including: cloud native application protection platforms (CNAPP), network and application vulnerability scanning, network and application access controls; intrusion detection systems; data loss prevention, security incident and event management (SIEM), etc.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Ideal candidates will have experience with Netapp storage, VMware, Veeam, Zerto, Cisco, co-located data centers, Microsoft Azure IaaS and Azure AD, Active Directory, VDI/Azure Virtual Desktop. Management tools: Intune, Configuration Manager, Citrix.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Explore more InfoSec / Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of networking, common workstation and server platforms and protections, Linux, Active Directory, ecommerce, vulnerability management, cloud security and O365. Manage the day-to-day activities of threat and vulnerability management, identify risk tolerances, recommend treatment plans and communicate information about residual risk.
$100,000 - $110,000 a yearFull-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with any of the following systems/products also a plus: scripting, enterprise antivirus management, data loss prevention, malware detection, intrusion detection/prevention, penetration testing/vulnerability scanning, web application firewall.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Strong knowledge of IT Security (encryption, firewalls, secure systems design, vulnerability management, secure software design, credential management, proxies, WAFs, etc.) Instrument infrastructure monitoring, application performance monitoring (APM), and tracing using infrastructure monitoring tools combined with Ansible roles and Terraform providers.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Proficient in identifying security vulnerabilities across several areas of computing such as cloud, distributed applications, embedded systems, or IOT.Thorough understanding of the current revisions of NIST, ISO, and other related security frameworks especially those that apply to vulnerability management.
Full-timeRemoteExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Hearst Technology, Inc, Information Security Office seeks a Threat Hunter for their Enterprise Vulnerability and Threat Management Team. The Threat Hunter is responsible forstrengthening Hearst’s cyber security posture through research, threat simulations, threat hunting, and offensive security engagements.
$137,000 - $165,000Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerability assessment and exploitation techniques. Completion of Officer Training School (OTS), Air Force Academy (AFA) or Air Force Reserve Officer Training Corps (AFROTC.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Bachelor’s degree with a focus in computer and information sciences, engineering, mathematics, computer science, management information systems or other related disciplines. From computerized, satellite and airborne communications to postal operations and tracking systems, these irreplaceable assets play a critical role in planning missions and ensuring the effectiveness of our cyberspace capabilities.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience working with SIEM tools such as Splunk to ingest, normalize, store, and maintain data from endpoint, network, and application sourcetypes. Experience installing, configuring, and maintaining tools such as Tanium, Nessus, Forescout and Cyberark in a hybrid-cloud environment.
ExpandApply NowActive JobUpdated 3 days ago
siem vulnerability jobs in Hackensack, NJ
FEATURED BLOG POSTS
What is a Policy of Non-Retaliation & How to Create One
Your company probably has many policies in place – anti-discrimination policies, equal opportunity policies, ethics policies, and so on. However, it is important to re-evaluate whether you have a policy that covers every situation. Say for instance one of your employees submit a complaint in good faith to their supervisor. To their surprise, they are met with retaliation, such as demotion, defamation, or even termination.
How to Take Your Careers Page to the Next Level
Your careers page deserves a lot of attention. It is not just another page on your website. It is a vital tool that could enhance your recruitment outcomes. But in order to do that, you have to make sure it's fully optimized.
When to Tell Your Boss You're Job Searching
The Bureau of Labor Statistics has found that individuals, on average, have 12.4 jobs throughout their working life. So regardless of where you are on the career ladder, it’s inevitable that at some point, you’ll begin looking for another job. That said, you might be wondering,
What Questions Can You Not Ask in an Interview?
It can be stressful to interview candidates to fill an open role at your company. Maybe your boss is on you to hire someone who’s absolutely perfect as soon as possible. Maybe you don’t have a ton of experience yet in conducting interviews. Whatever the case, there’s a lot to take under consideration when you’re the one in charge of interviewing. For instance, “What questions can you not ask in an interview?” may very well be running through your mind given its legal ramifications. Knowing exactly which interview questions are off-limits (and which are fine to ask) will boost your confidence as you continue to search for the ideal new hire.
How to Prepare to Be Fired - What You Need to Do
If you’re reading this, let me be the first to tell you how sorry I am. Getting fired feels crappy, disheartening, hurtful, and all the other bad, sad words. But here’s what I want you to do. First, let yourself fumble for a minute. Then, pick your head up — sometimes getting fired is a blessing in disguise. If you think termination is around the corner, we’ll teach you how to prepare to be fired and what to do next so you land somewhere even better.
How to Find a Job That Makes You Happy - 11 Concerning Facts
Do you ever feel like your life is like one of those rom-com movie scene openers? You know, the ones where the main character rolls out of bed, awakened by a casually upbeat theme song, sulks their way to the coffee pot, and then trudges toward their computer to begin yet another boring day at work?
How to Decline a Job Offer You Already Accepted
When you think about it, turning down a job offer is not the worst position you could be in. If you’ve been lucky enough to consider multiple job offers, well, then you’re lucky enough.