- UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Founded in 2013 by security and risk experts Dr. Alex Yampolskiy and Sam Kassoumeh and funded by world-class investors, SecurityScorecard’s patented rating technology is used by over 25,000 organizations for self-monitoring, third-party risk management, board reporting, and cyber insurance underwriting; making all organizations more resilient by allowing them to easily find and fix cybersecurity risks across their digital footprint.
ExpandUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Must have a broad understanding of security technologies including but not limited to firewalls, vulnerability and compliance management solutions, logging and security incident and event management (SIEM) , secure access service edge (SASE) endpoint security, and cloud posture management, and cloud security.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Responsibilities vary by function, and security operations, threat management, security incident response, security event monitoring and analysis, vulnerability management, engineering and operation of security tools and infrastructure, access, identity & account management, risk management, supply chain cyber risk management, information protection, development and maintenance of security policies, standards, and procedures, and the delivery of effective security awareness training.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Manage controls across services like Azure Active Directory, Sentinel, and Security Center, employing access protocols, network shields, data encryption, and vulnerability hunting, all while mastering the latest Azure security advancements.
ExpandUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with IaC / configuration management technologies (e.g. Terraform, Puppet) Senior level person (10+ years +) using, Cisco ASA, Sumo logic or Splunk, some vulnerability mgmt. Experience with secrets management / PKI tooling (e.g. HashiCorp Vault.
ExpandUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
In your first 30 days, you will become an integrated member of our Corporate Engineering Team. You’ll become familiar with our identity management, fleet management, and endpoint security system.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Participate in the Vulnerability Management Program by triaging findings and validating fixes (sources include bug bounty, responsible disclosure, and similar programs). Industry recognized certification (OSCP, GWAPT, GPEN or similar.
ExpandUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Solid knowledge of information security tools and techniques, including: data leakage prevention, incident response, vulnerability scanning and reporting, security operations, identity management and Cloud security.
ExpandUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This resource will be responsible for the administration of all QA related technologies, including Regression Testing, System Testing, Static Code Analysis, Code Vulnerability Scanning, Test Data Management, Performance Engineering, Defect Tracking and UAT.
ExpandUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
You will be accountable for the cybersecurity governance framework including technical compliance, assurance & audit and TPRM (third party risk management), as well as training & awareness. Conduct thorough threat modelling, risk assessments, and vulnerability analysis to identify potential security risks and develop effective mitigation strategies.
ExpandUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Expertise in one or more areas: security testing, security automation into CI/CD pipelines, vulnerability assessment, vulnerability management, incident response. · Knowledge and experience with Agile service management tools such as Service Now.
ExpandUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Approximately 20+ years of advanced professional auditing or comparable experience in a banking environment that provides exposure to progressive audit techniques, sophisticated information systems, network security, technology infrastructure, software development, project management, or a related field for which Internal Audit has a need.
ExpandUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Identity and access management - including SSO, employee remote access, third party access and device management. Strong leadership and management skills, with the ability to motivate and inspire a team.
ExpandUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
12+ years of experience preferably in a top management consulting firm or technology company with a focus on business transformation. You will have the opportunity to excel in areas of sales strategy, consultative discovery, and engagement execution including business analysis, problem solving, program management, executive communication and consensus building.
ExpandUpdated 6 days ago
vulnerability management jobs in Bethpage, NY
FEATURED BLOG POSTS
How to Take Your Careers Page to the Next Level
Your careers page deserves a lot of attention. It is not just another page on your website. It is a vital tool that could enhance your recruitment outcomes. But in order to do that, you have to make sure it's fully optimized.
When to Tell Your Boss You're Job Searching
The Bureau of Labor Statistics has found that individuals, on average, have 12.4 jobs throughout their working life. So regardless of where you are on the career ladder, it’s inevitable that at some point, you’ll begin looking for another job. That said, you might be wondering,
What Questions Can You Not Ask in an Interview?
It can be stressful to interview candidates to fill an open role at your company. Maybe your boss is on you to hire someone who’s absolutely perfect as soon as possible. Maybe you don’t have a ton of experience yet in conducting interviews. Whatever the case, there’s a lot to take under consideration when you’re the one in charge of interviewing. For instance, “What questions can you not ask in an interview?” may very well be running through your mind given its legal ramifications. Knowing exactly which interview questions are off-limits (and which are fine to ask) will boost your confidence as you continue to search for the ideal new hire.
How to Prepare to Be Fired - What You Need to Do
If you’re reading this, let me be the first to tell you how sorry I am. Getting fired feels crappy, disheartening, hurtful, and all the other bad, sad words. But here’s what I want you to do. First, let yourself fumble for a minute. Then, pick your head up — sometimes getting fired is a blessing in disguise. If you think termination is around the corner, we’ll teach you how to prepare to be fired and what to do next so you land somewhere even better.
How to Find a Job That Makes You Happy - 11 Concerning Facts
Do you ever feel like your life is like one of those rom-com movie scene openers? You know, the ones where the main character rolls out of bed, awakened by a casually upbeat theme song, sulks their way to the coffee pot, and then trudges toward their computer to begin yet another boring day at work?
How to Decline a Job Offer You Already Accepted
When you think about it, turning down a job offer is not the worst position you could be in. If you’ve been lucky enough to consider multiple job offers, well, then you’re lucky enough.
How to Practice Fair Chance Hiring for People With Criminal Records
Usually when you think of your dream hire, you think of someone who is respectful, trustworthy, reliable, and has sound judgment, right? As you envision your ideal candidate with these qualities, the last person you think of is someone with a criminal record.