- UpvoteDownvoteShare Job
- Suggest Revision
Previous Experience with several technical security disciplines such as System Information Event Management systems (SIEM), vulnerability management or security hardening (Required.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Helps and guides the DevSecOps Engineering team towards technology initiatives such as AI/ML scanning, software-supply-chain, Unified Vulnerability Management platform, etc. This role will manage the life cycle of various inhouse and vendor DevSecOps security tools to perform SAST, Open-Source Vulnerability Scanning, Cloud application scanning, Runtime Scanning, etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Minimum 8 years working with cybersecurity functions of one or more of the following: vulnerability assessment and management processes, identity and access management in ICS environments, incident response and monitoring, etc.
$336,900 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Ensure operation and continuous improvement of capabilities for vulnerability management, threat management, and incident response. Oversees and manages the teams and functions for Security Operations & Engineering, Governance Risk and Compliance (GRC), Identity & Access Management, and SAP Security.
Full-timeExpandApply NowActive JobUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with SIEM, MDR, EDR, and vulnerability management tools (Must) Performing quality checks and assisting with workload management for junior analysts. Experience with SIEM, MDR, EDR, and vulnerability management tools (Must.
$90,000 a yearFull-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Hands on operational experience with vulnerability management scanning tools (e.g. Qualys, Rapid7, Tenable, CrowdStrike, Tanium, Defender) including the ability to deploy, configure, and run these tools.
$190,300 a yearFull-timeExpandApply NowActive JobUpdated 13 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Three (3) years of professional experience in IT/Help Desk support and asset management. Provide technical services in support of delivering cyber-secure systems and solutions including the development and submittal of Risk Management Framework (RMF) risk assessments, implementation of DoD secure system configuration and hardening, requirements identified in Defense Information Systems Agency (DISA) Security.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This program centers around vulnerability scanning of information systems and network devices using the current vulnerability management tool, Tenable Security Center and Nessus. Appropriate technical skills and in-depth knowledge of vulnerability scanning and IT infrastructure including: Experience with vulnerability management scanners (e.g. Tenable, Rapid7, Qualys, etc.
Full-timeExpandApply NowActive JobUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Hands on experience in security software and systems including firewalls, intrusion detection systems, anti-virus/EDR software, identity monitoring solutions, authentication platforms, log management , web-content filtering platforms, and vulnerability management systems.
Full-timeExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience leading an enterprise vulnerability management program using tools such as Rapid7, Crowdstrike Spotlight, Qualys or similar. We are looking for a Staff Security Engineer in the Enterprise Security team, primarily supporting the Corporate Security program including vulnerability management, data loss prevention, SaaS security, and corporate infrastructure security.
Full-timeExpandApply NowActive JobUpdated 29 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Familiarity with: MacOS, iOS, Android, Linux, FreshService incident management system, SentinelOne endpoint management, BeyondTrust PAM, Zscaler ZIA URL protection, Automox vulnerability management, NinjaOne remote management, UniFlow Cannon printing.
Full-timeExpandApply NowActive JobUpdated 13 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Execute response activities which may include incident response, incident management, driving remediation or threat mitigation, threat hunting and forensic analysis; carry out other security operations activities which may include identification of weakness (such as vulnerabilities / insecure configurations), reviewing/assessing security configuration change requests and driving the coverage of the security monitoring services.
Full-timeExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This position has operational and strategic responsibilites for the Information Security program and oversees the management of security operations services including (but not limited to): incident response, vulnerability management, threat hunting, and overall program development in the CHOP enterprise.
Full-timeExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Security: Platform security, Network security, Data Security, Gen AI & Model Security, Encryption, Vulnerability Management, Compliance. Become a technical expert in an area such as data lake technology, big data streaming, big data ingestion and workflows, as well as cloud platforms, automation, security, networking, or identity management.
Full-timeExpandApply NowActive JobUpdated 30 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with OT specific processes for asset management, patch & vulnerability management, remote access, privileged access, application whitelisting, backups, etc. Also, act as interface between OT and IT management during such incidents.
Full-timeExpandApply NowActive JobUpdated 11 days ago
vulnerability management jobs in Philadelphia, PA
FEATURED BLOG POSTS
How Long Does it Take to Hear Back from a Job?
Are you applying for your very first job? Maybe you’re anticipating your termination from your current role and want to be proactive. Either way, waiting to hear back on your job application can be stressful. If time has passed since you applied, you may wonder how long does it take to hear back from a job. Well, the answer is... it depends.
How to Respond to a Recruiter Through Email? (Tips & Examples)
Rather than wading through an endless list of open roles, wouldn’t it be nice if relevant job opportunities come to you?
How to Reject a Candidate Professionally
When deciding on how to reject a candidate, your first question may be
How Does Salary Pay Work? (Compared to Hourly Pay)
At the bottom of each job advertisement, companies label a role as salaried or hourly. Both methods will get you paid (yay), but each in very different ways. So, it's essential to figure out how does salary pay work? While employees paid by the hour are paid based on how long they work, employers pay salaried employees a fixed amount.
The Quiet Quitting Phenomenon
The term, quiet quitting, was coined in 2009, but only now is it gaining traction as young Millennials and Gen Z workers are experiencing record levels of burnout. With the pandemic and the state of the economy, young employees are feeling the pressure. So, quiet quitting comes into effect when that pressure is exasperated by work stress and no managerial support.
How Does Salary Range Work (With Examples)
What are your salary expectations? Do you know? Establishing a salary that compensates you fairly and keeps you happy at work can feel like taking a shot in the dark. And employers sure don’t make learning budgets easy!
Guide to Hiring a Teenager
Teenagers are full of life. They bring energy and adaptability that may be hard to get from older workers, but does that mean that hiring teens is beneficial? Well, it depends. As you debate whether or not you should integrate teenagers into your workforce, there are some things that you should know first.