- UpvoteDownvoteShare Job
- Suggest Revision
Information Security Processes: Identity and access management, privileged access management, generic ID management, threat intelligence, vulnerability management, secure coding practices, data security and encryption, phishing, forensics, mobile security, third-party, etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The individual will work in concert with the operational risk management team, including the vendor risk management and business continuity management teams, to ensure close coordination, integration, transparency and awareness of information risks across all risk management programs.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
At least one of the following certifications or acceptable equivalent: CISA, CISSP, CISM, CBCP, CIA, CIPP, CIPM, or CFE. Wipro is a rapidly growing professional services firm offering a comprehensive set of services in three inter-related disciplines: Risk and Compliance, Identity and Access Management, and Cloud Security.
ExpandUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
You will play a crucial role in refining and creating processes related to the Risk Management Framework (RMF), threat/vulnerability analysis, penetration testing, and reporting exercises.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Proficiency in information security domains, including policies and standards, risk and control assessments, access controls, regulatory compliance, technology resiliency, risk and control governance and metrics, incident management, secure systems development lifecycle, vulnerability management, and data protection.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The successful candidate must have hands-on experience in information security technology, cloud and on-premises environments, digital marketing and CRM platforms, application security and code review, vulnerability testing, and leading enterprise level risk management programs.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Oversee or lead network security architecture and third-party risk management reviews. as well as at least one non-entry-level vendor-neutral certification in the Information Security arena (CISSP, CISM, GISP, etc.
ExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Security Operations Manager will manage key access management, technology controls, resilience, and cybersecurity efforts under the direction of Infrastructure & IT Operations and in concert with the divisional CISO. This role will help develop vulnerability and risk management processes, oversee their implementation, and analyze company databases to identify and address potential security risks and vulnerabilities.
ExpandUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Understanding of endpoint hardening, patch management, vulnerability remediation, incident response, disaster recovery, and business continuity. Cybersecurity certifications such as CISSP, CISM, CEH, or GSEC are a plus.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Must have a broad understanding of security technologies including but not limited to firewalls, vulnerability and compliance management solutions, logging and security incident and event management (SIEM) , secure access service edge (SASE) endpoint security, and cloud posture management, and cloud security.
ExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Solid knowledge of information security tools and techniques, including: data leakage prevention, incident response, vulnerability scanning and reporting, security operations, identity management and Cloud security.
Full-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Explore more InfoSec / Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with incident response, vulnerability scanning and reporting, data leakage prevention, security operations, identity management and Cloud security. -CISSP, CRISC, CISA, CISM, CEH or CCSP certifications a plus.
ExpandApply NowActive JobUpdated 19 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
They work to improve overall IT security capabilities and security posture, providing security processes, security assessments, security operations, and security vulnerability management services.
$118,800 - $269,800 a yearFull-timeExpandApply NowActive JobUpdated 1 month ago
cism vulnerability management jobs in New York, NY
FEATURED BLOG POSTS
How Does Salary Range Work (With Examples)
What are your salary expectations? Do you know? Establishing a salary that compensates you fairly and keeps you happy at work can feel like taking a shot in the dark. And employers sure don’t make learning budgets easy!
Guide to Hiring a Teenager
Teenagers are full of life. They bring energy and adaptability that may be hard to get from older workers, but does that mean that hiring teens is beneficial? Well, it depends. As you debate whether or not you should integrate teenagers into your workforce, there are some things that you should know first.
10 Best Tips to Find a Job When Relocating
Are you planning to move? That’s great news, but now you might wonder what that means for your job. Some people are lucky – they can relocate and keep working the same position as always, just remotely. For others, however, this isn’t an option. They must search for and land a job in their soon-to-be new city. This can be intimidating, given that getting a new job even under normal circumstances can be challenging. Now you’ll have to overcome additional hurdles. This article provides valuable tips on how to find a job in another state. Because it can be done! Read on to learn how.
How to Re-apply for Your Old Job Professionally
Have you recently started a new job only to find that you miss your old one? Maybe you didn’t realize how good you had it, and now you regret leaving. Don’t worry. You’re not the first person to feel this way, and you might even be able to return to your old job if you play your cards right.
Looking for New Candidates?
Before the turn of the century, recruiters could put their "help wanted" ads in the newspaper, and applications would pour in. Since then, recruiting has turned a new page. The use of the internet and other technologies allows recruiters to broaden their candidate pool for the simple reason being
Decline a Job Offer Professionally: When to Rescind
Your job search has finally paid off! After countless job applications, numerous emails, and several interviews, the hiring manager and other stakeholders have decided that you’re the right person for the job! All you have to do now is accept the offer and walk into the sunset, right?
Resume Job Description Samples - 8 Tips to Follow
When looking for a job, your resume becomes a crucial element. From making a great first impression to showcasing all your achievements and potential, your resume has to portray your professional story in minutes.