- UpvoteDownvoteShare Job
- Suggest Revision
Manage the day-to-day activities of threat and vulnerability management, identify risk tolerances, recommend treatment plans and communicate information to the Global CISO about residual risk.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Review/maintain and lead the vulnerability management program including performing infrastructure vulnerability scanning, internal and third-party penetration testing, reviewing and validating ad-hoc reported security vulnerabilities.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Demonstrated record of accomplishment in one or more areas of cyber security subject expertise, including access and identity management, security engineering and architecture, security operations, threat and vulnerability management or cyber risk management.
$127,626 - $237,014 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
In-depth understanding of network security, encryption technologies, and threat management. Perform vulnerability assessments and penetration testing to identify security weaknesses. The ideal candidate will have a strong background in network security, system administration, and risk management.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This person will also perform vulnerability management and risk assessments to proactively secure the organization. What You will DoDevelop and maintain the organization's cyber governance framework, risk management strategy, and compliance roadmap, ensuring alignment with industry best practices and regulatory requirements (e.g., NIST, ISO, PCI DSS.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
You have passion and expertise in one or more of the following areas: risk analytics, data analytics, machine learning, SQL, Python, cloud security, network security, vulnerability management, data protection, threat intelligence & investigations, and identity & access management.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerability assessment and exploitation techniques. Bachelors degree with a focus in computer and information sciences, engineering, mathematics, computer science, management information systems or other related disciplines.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Completion of Officer Training School (OTS), Air Force Academy (AFA) or Air Force Reserve Officer Training Corps (AFROTC) These concern your background, overall health and other standards set by the Air Force, Department of Defense and federal law.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Working experience with the following technologies: Cloud native security services Static analysis CI/CD pipelines Cloud security posture management (CSPM) Cloud-native application protection platform (CNAPP) Vulnerability management Infrastructure-as-code (IaC) Privileged access/secrets management Security information and event management (SIEM.
$150,000 a yearExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Lead regular compliance audits and risk assessments including policy creation, documentation, manager training, systems / process approvals as needed to identify areas of potential compliance vulnerability and recommend corrective actions.
$81,000 - $160,000Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Experience working on Kubernetes, Istio, Terraform, Vulnerability & Patch Management, Identify and Access Management, Incident Handling and Response. Contribute towards improving internal log aggregation methods and champion Security Alerting and Monitoring for internal services & infrastructure.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The ideal candidate will possess expertise in multiple disciplines and have experience with Identity Access Management, Windows Engineering, and cyber security. Ability to design, implement, and manage Cloud IAM solutions to ensure secure access control and identity management in cloud environments.
$225,000 - $250,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Prepares and implements the emergency preparedness and response plan for the LRT system that includes planning, protocols, management, emergency response, threat and vulnerability reduction and resolution.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As a leading player in Process Mining technology, Celonis is seeking an experienced Senior Vulnerability Management Engineer to be an integral part of our world-class Security Engineering Team. This role is pivotal in safeguarding Celonis' cloud-native and on-prem infrastructure by identifying, assessing, and prioritizing vulnerabilities.
Full-timeExpandApply NowActive JobUpdated 19 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Implement, manage and consistently review security tooling such as SIEM and Vulnerability management. Vulnerability Testing: Regularly conduct vulnerability assessment and penetration testing on our IT systems.
ExpandApply NowActive JobUpdated Today
vulnerability management jobs in New York, NY
FEATURED BLOG POSTS
Collaborative Recruiting: The Key to a Better Talent Acquisition Strategy
Talent acquisition is a multi-stage process where candidates undergo various application steps before getting hired. The unfortunate reality is that it is a labor-intense system, with the hiring manager and recruiter often handling all of the work on their own. Ask any one of them, and you will hear about the overabundance of applications and the demanding task of filtering through them to find the best candidates. The quality of talent suffers under the weight of all that work on one person's hands. It's not easy, but as many companies are starting to realize, there is a better way. The future of talent acquisition lies in collaborative recruiting!
4 Talent Acquisition Trends Going Into 2023
For better or worse, a side effect of the COVID-19 pandemic was a marked shift in talent acquisition practices worldwide. With the struggle to retain talent that began in 2020, companies have had to rethink recruitment strategies. The result has been new talent acquisition trends that are well on their way to becoming commonplace. These are the practices that are going to become even more widespread going into 2023.
Why is Professionalism Important & How to Be Professional
You might have heard the word professionalism thrown around in the workplace, but do you know what it means? And do you know how to maintain professionalism no matter the circumstances?
Why Cover Letters Are Important & How To Write One | Job\Searcher
Most people completely waste their cover letter real estate. Your cover letter is another opportunity to speak directly about how your background and capabilities align with the opportunity you seek. It also allows you to introduce your personality a bit more than a resume does. So, why are cover letters important? Because you can stand out, big time, with a custom cover letter directed to the right person.
Hiring Again After Mass Layoffs
It's never an easy decision to let members of your staff go, but depending on the state of your business, mass layoffs may have been the only way to survive. Now that you're months into the future, you may find yourself itching to start hiring again after previous layoffs.
Why Are Internships Important & How Can You Get One?
Internships are for college students or people who have just completed their degree. If you are a student or recent grad, you may be wondering how to land an internship. If you've never had one, you may even wonder if you need one. After all, didn’t you work in that call center while also doing exams? Or perhaps you’ve bartended your first year in college?
Why is Networking Important & How to Network Effectively
Even if you’ve worked hard to earn a degree from an impressive school, landing your dream job might still come down to who you know – otherwise known as networking. Lots of qualified candidates might apply for a job, but the person who gets it might very well be so-and-so’s sibling, friend, or kid. Sometimes the only way to get your foot in the door is to know someone.