- UpvoteDownvoteShare Job
- Suggest Revision
Bachelors degree in field related IT or technical certifications including: CISSP, CISM, COMP TIA, CCSP, CISA, Ethical Hacking, etc. Responsible for managing vulnerability scanning tools (Tenable, Rapid7, Qualys etc.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Responsibilities include data security, application security, desktop security, vulnerability management, cybersecurity, policy management, security incident response, business continuity and disaster recovery management and oversight.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Security Operations Manager will manage key access management, technology controls, resilience, and cybersecurity efforts under the direction of Infrastructure & IT Operations and in concert with the divisional CISO. This role will help develop vulnerability and risk management processes, oversee their implementation, and analyze company databases to identify and address potential security risks and vulnerabilities.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
At least one of the following certifications or acceptable equivalent: CISA, CISSP, CISM, CBCP, CIA, CIPP, CIPM, or CFE. Wipro is a rapidly growing professional services firm offering a comprehensive set of services in three inter-related disciplines: Risk and Compliance, Identity and Access Management, and Cloud Security.
ExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
You will play a crucial role in refining and creating processes related to the Risk Management Framework (RMF), threat/vulnerability analysis, penetration testing, and reporting exercises.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
As a Lead Consultant, you will be experienced in end-to-end Vulnerability Management processes with regards to On-Prem infrastructure security, application security and cloud security. Experience of vulnerability management methodologies and tools (Qualys.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Information Security Processes: Identity and access management, privileged access management, generic ID management, threat intelligence, vulnerability management, secure coding practices, data security and encryption, phishing, forensics, mobile security, third-party, etc.
$120,000 - $160,000 a yearFull-timeExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with incident response, vulnerability scanning and reporting, data leakage prevention, security operations, identity management and Cloud security. -CISSP, CRISC, CISA, CISM, CEH or CCSP certifications a plus.
$150,000 - $175,000 a yearFull-timeExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Must have a broad understanding of security technologies including but not limited to firewalls, vulnerability and compliance management solutions, logging and security incident and event management (SIEM) , secure access service edge (SASE) endpoint security, and cloud posture management, and cloud security.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Deep Understanding and technical knowledge of threat detection/security monitoring, security incident and crisis management, threat intelligence, vulnerability and threat management and data protection.
ExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
General awareness and exposure to a diverse set of cyber security technologies, tools, and services including: anti-malware, authentication/identity management, remote access, encryption, backup/recovery, client and server firewalls, network segmentation, SIEM, Web filtering, SPAM prevention, vulnerability assessment, and forensic investigation.
ExpandApply NowActive JobUpdated 13 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Help the Cybersecurity Manager lead the day-to-day cybersecurity operations, including incident response, vulnerability management, and security monitoring. Hands-on experience with security technologies such as SIEM, IDS/IPS, firewall management, and endpoint protection.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with security tools and technologies such as SIEM, DLP, IAM, and vulnerability management solutions. Security certifications such as CISSP, CISM, or CEH are a plus. Conduct risk assessments and vulnerability scans to identify and mitigate security risks and threats.
ExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Partner with Third Party Risk Management, Vendor Management and Threat & Vulnerability Management to create resilience alignment to include information sharing, controls aggregation, risk management, data management, creation of real time data analysis and threat statistic to the Information Security Group and Operational Resilience functions.
$194,000 - $224,000 a yearFull-timeExpandApply NowActive JobUpdated 8 days ago
cism vulnerability management jobs in New York, NY
FEATURED BLOG POSTS
How Long Do Background Checks Take for Pre-Employment
Many jobs require a background check. For some companies, this is a matter of company policy. In other jobs, such as finance, childcare, and security, the government often requires background checks. While there are varying levels of intensity, for most people, a background check is nothing to worry about. In fact, the biggest question is often how long does a background check take? Here’s what job seekers and applicants need to know about background checks before they apply to new jobs.
The Best Remote Jobs: Where & How to Find Them
The Covid-19 pandemic hasn’t been easy on any of us, but if there’s one silver lining, it’s the fact that remote work has grown in popularity because of it. Companies that previously weren’t open to their employees working remotely were suddenly forced into allowing it. Since then, they've realized that much of their workforce is happier and more productive. Naturally, this has led to more remote job openings, which is great if you’re interested in this type of position. Read on to learn more about the best remote jobs and where to find them.
In-House vs Outsourcing Recruiting: Which is Better?
When looking at in-house vs outsourcing recruiting, it is important to nail down the benefits for each and whether those benefits outweigh the risks that follow.
How to Write a Short Bio
First impressions can be tricky. When meeting someone in person, it’s likely you have an elevator speech. These short, practiced introductions can help you share more about who you are, what you do for work and other facts about you. While this works well in a live, in-person context, there are many cases where professionals “meet” someone via written form - like social media, a resume, or published work. In these cases, your bio works as your first impression. So, here’s a step-by-step guide on how to write a short bio.
How to Conduct a Performance Review (With Examples)
In a world where the smallest mistake can cost your business tens of thousands in lost revenue, your talent is key to keeping your edge on the market and driving growth. However, managing a workforce of any size can be a challenge. Employees come with their own particular skill set, ambitions and flaws. So, it can be difficult to uncover their individual drivers. Not to mention the challenges brought on by the hybrid and remote working models where in-person interactions have become few and far between.
How to Effectively Recruit Employees
Today, hiring and retaining talent looks much different than it did only two or three years ago. Financial instability and the strain on our mental health brought on by the pandemic has made everyone more wary and selective of their workplace and employer. Whereas in the past people might have prioritized promotions and financial reward, today they look at other factors such as workplace flexibility, personal fulfillment and values alignment.
How Many Hours is Part-Time vs. Full-Time Work?
Growing up you watched your parents shuffle to and from the office, held hostage to their 9 to 5. If jammed-packed schedules and deadlines sound frightening, you might consider pivoting your search to part-time jobs. In fact, even employers have shifted their preference, selecting more people open to the idea of flexible working hours.