- UpvoteDownvoteShare Job
- Suggest Revision
This role centers on corporate resilience, holding accountability for evaluating clients’ crisis management, threat assessment, and physical security requirements. Independently produce high-quality corporate security and resilience deliverables such as threat, risk, and vulnerability assessments, threat intelligence briefings, corporate security and security programs, and corporate standards, policies, and procedures.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
This is a highly technical role that requires broad technical knowledge and a deep understanding of threats and threat TTPs. You will lead and participate in advanced technical assessments that leverage red team, penetration testing, and vulnerability assessment tools and techniques to identify hi-risk vulnerabilities across a variety of technologies.
$142,800 - $195,000 a yearFull-timeExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
2+ years of experience with supply chain risk management, including assessing system and component criticality, mapping supply chains, identifying critical suppliers, assessing supply chain threat and vulnerability assessment, conducting risk identification and mitigation, and monitoring mitigation effectiveness over time.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
IT Security Analyst - Cyber Security Threat Risk Assessment will conduct threat risk assessments on technology assets, specifically applications. IT Security Analyst - Cyber Security Threat Risk Assessment.
$60 - $65 an hourExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience in cybersecurity, including threat analysis, vulnerability assessment, and incident response. The ideal candidate will possess expertise in multiple disciplines and have experience with Identity Access Management, Windows Engineering, and cyber security.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Collaborate closely with the Security Operations (Sec Ops) team to align vulnerability management processes with incident response and threat detection capabilities. Lead and oversee the Enterprise Vulnerability Management program, ensuring the identification, assessment, and remediation of security vulnerabilities across CVS Health's infrastructure.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Collaborate with stakeholders, executives, and LOB partners to complete assessments, develop cybersecurity maturity recommendations across cybersecurity domains (governance & risk management, strategy and program management, vulnerability management, threat intelligence, security monitoring, network protection, identity and access management, business continuity / disaster recovery, incident response, security architecture, and cloud security.
Full-timeExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Senior Manager role sits within the Cyber Governance and Risk (G&R) organization supporting our enterprise Cyber Assessment Maturity Program (CAMP). Cyber Assessment Maturity Program (CAMP), Senior Manager.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Deputy CISO will: ●Oversee and mature Cybersecurity Centers of Excellence: Network Protection, Data Protection, Endpoint Protection, SOC Monitoring, Incident Response, Threat and Vulnerability Management, Secure System Development Lifecycle, Security Engineering, Information Security Architecture, Insider Threat Management, and Security Awareness.
$255,000 - $265,000 a yearFull-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Solid understanding of information security principles and practices, including threat and vulnerability management, incident response, and security operations. Technical skills such as network security, application security, encryption, vulnerability assessment, and incident response.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Threat detection and vulnerability assessment experience. The consultant will work onsite in support of threat detection and vulnerability assessments, data analysis and Cisco Client/Stealthwatch.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge and Capabilities:Demonstrated knowledge of various vulnerability management aspects including SBOM generation, vulnerability assessments, threat modeling, security risk assessment processes, and security patching best practices.
Full-timeRemoteExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
This incumbent will provide support to Security Architecture, Security Engineering, Security Operations, Identity & Access Management, Threat Management, Vulnerability Management and Penetration Testing functions.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
3-5 years of experience in vulnerability management, security assessment, security awareness, and identity access management systems. Familiarity with Threat Intelligence engagement and reporting.
ExpandApply NowActive JobUpdated 5 days ago
threat assessment vulnerability jobs in New York, NY
FEATURED BLOG POSTS
How Does Salary Pay Work? (Compared to Hourly Pay)
At the bottom of each job advertisement, companies label a role as salaried or hourly. Both methods will get you paid (yay), but each in very different ways. So, it's essential to figure out how does salary pay work? While employees paid by the hour are paid based on how long they work, employers pay salaried employees a fixed amount.
The Quiet Quitting Phenomenon
The term, quiet quitting, was coined in 2009, but only now is it gaining traction as young Millennials and Gen Z workers are experiencing record levels of burnout. With the pandemic and the state of the economy, young employees are feeling the pressure. So, quiet quitting comes into effect when that pressure is exasperated by work stress and no managerial support.
How Does Salary Range Work (With Examples)
What are your salary expectations? Do you know? Establishing a salary that compensates you fairly and keeps you happy at work can feel like taking a shot in the dark. And employers sure don’t make learning budgets easy!
Guide to Hiring a Teenager
Teenagers are full of life. They bring energy and adaptability that may be hard to get from older workers, but does that mean that hiring teens is beneficial? Well, it depends. As you debate whether or not you should integrate teenagers into your workforce, there are some things that you should know first.
10 Best Tips to Find a Job When Relocating
Are you planning to move? That’s great news, but now you might wonder what that means for your job. Some people are lucky – they can relocate and keep working the same position as always, just remotely. For others, however, this isn’t an option. They must search for and land a job in their soon-to-be new city. This can be intimidating, given that getting a new job even under normal circumstances can be challenging. Now you’ll have to overcome additional hurdles. This article provides valuable tips on how to find a job in another state. Because it can be done! Read on to learn how.
How to Re-apply for Your Old Job Professionally
Have you recently started a new job only to find that you miss your old one? Maybe you didn’t realize how good you had it, and now you regret leaving. Don’t worry. You’re not the first person to feel this way, and you might even be able to return to your old job if you play your cards right.
Looking for New Candidates?
Before the turn of the century, recruiters could put their "help wanted" ads in the newspaper, and applications would pour in. Since then, recruiting has turned a new page. The use of the internet and other technologies allows recruiters to broaden their candidate pool for the simple reason being