- UpvoteDownvoteShare Job
- Suggest Revision
Previous Experience with several technical security disciplines such as System Information Event Management systems (SIEM), vulnerability management or security hardening (Required.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Minimum 8 years working with cybersecurity functions of one or more of the following: vulnerability assessment and management processes, identity and access management in ICS environments, incident response and monitoring, etc.
$336,900 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Ensure operation and continuous improvement of capabilities for vulnerability management, threat management, and incident response. Oversees and manages the teams and functions for Security Operations & Engineering, Governance Risk and Compliance (GRC), Identity & Access Management, and SAP Security.
Full-timeExpandApply NowActive JobUpdated 13 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with SIEM, MDR, EDR, and vulnerability management tools (Must) Performing quality checks and assisting with workload management for junior analysts. Experience with SIEM, MDR, EDR, and vulnerability management tools (Must.
$90,000 a yearFull-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Hands on operational experience with vulnerability management scanning tools (e.g. Qualys, Rapid7, Tenable, CrowdStrike, Tanium, Defender) including the ability to deploy, configure, and run these tools.
$190,300 a yearFull-timeExpandApply NowActive JobUpdated 13 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Three (3) years of professional experience in IT/Help Desk support and asset management. Provide technical services in support of delivering cyber-secure systems and solutions including the development and submittal of Risk Management Framework (RMF) risk assessments, implementation of DoD secure system configuration and hardening, requirements identified in Defense Information Systems Agency (DISA) Security.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This program centers around vulnerability scanning of information systems and network devices using the current vulnerability management tool, Tenable Security Center and Nessus. Appropriate technical skills and in-depth knowledge of vulnerability scanning and IT infrastructure including: Experience with vulnerability management scanners (e.g. Tenable, Rapid7, Qualys, etc.
Full-timeExpandApply NowActive JobUpdated 13 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Hands on experience in security software and systems including firewalls, intrusion detection systems, anti-virus/EDR software, identity monitoring solutions, authentication platforms, log management , web-content filtering platforms, and vulnerability management systems.
Full-timeExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience leading an enterprise vulnerability management program using tools such as Rapid7, Crowdstrike Spotlight, Qualys or similar. We are looking for a Staff Security Engineer in the Enterprise Security team, primarily supporting the Corporate Security program including vulnerability management, data loss prevention, SaaS security, and corporate infrastructure security.
Full-timeExpandApply NowActive JobUpdated 29 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Familiarity with: MacOS, iOS, Android, Linux, FreshService incident management system, SentinelOne endpoint management, BeyondTrust PAM, Zscaler ZIA URL protection, Automox vulnerability management, NinjaOne remote management, UniFlow Cannon printing.
Full-timeExpandApply NowActive JobUpdated 13 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Execute response activities which may include incident response, incident management, driving remediation or threat mitigation, threat hunting and forensic analysis; carry out other security operations activities which may include identification of weakness (such as vulnerabilities / insecure configurations), reviewing/assessing security configuration change requests and driving the coverage of the security monitoring services.
Full-timeExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This position has operational and strategic responsibilites for the Information Security program and oversees the management of security operations services including (but not limited to): incident response, vulnerability management, threat hunting, and overall program development in the CHOP enterprise.
Full-timeExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Security: Platform security, Network security, Data Security, Gen AI & Model Security, Encryption, Vulnerability Management, Compliance. Become a technical expert in an area such as data lake technology, big data streaming, big data ingestion and workflows, as well as cloud platforms, automation, security, networking, or identity management.
Full-timeExpandApply NowActive JobUpdated 30 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with OT specific processes for asset management, patch & vulnerability management, remote access, privileged access, application whitelisting, backups, etc. Also, act as interface between OT and IT management during such incidents.
Full-timeExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Perform analysis of logs, events, and reporting of various data collections tools including: vulnerability monitoring via Assured Compliance Assessment System (ACAS) and related tools, Host Based Security Systems (HBSS), web content filters, Security Information and event management (SIEM), firewall systems, network devices, server devices, workstations, and intrusion detection and prevention systems (ID/PS.
Full-timeExpandApply NowActive JobUpdated 12 days ago
vulnerability management jobs in Philadelphia, PA
FEATURED BLOG POSTS
Growing Discontent: Employees Wouldn't Wish Their Jobs on Their Worst Enemy
The start of a new year, and most people are already busy setting personal and professional goals. What’s on the top of the list for a growing number of working people is making an exit from the job they currently have. Why?
How to Gracefully Quit a Job You Just Started
You’ve just started learning the ropes at your new job, and you've gotten to know your colleagues. But you’re already thinking about quitting. Maybe you were deciding between to job offers and realized that you’ve made the wrong choice. Or, a change in your personal circumstances means that you have to quit.
How to Professionally Reschedule a Job Interview Without Destroying Your Chances
You’ve practiced answering common interview questions and refined your “greatest weakness.’ Nothing can stop you until BAM! The flu hits your household. Or you ran over a nail and popped a tire en route to the interview. When you need to pivot, there’s a good, better, and best way to reschedule a job interview. Here’s how to do it professionally, so you can nail the gig when the timing is right.
What is a W-9 and How to Fill One Out
When you began working for yourself, you probably didn’t account for the tax reporting work that will fall on your shoulders each year. If you’re a freelancer, independent contractor, or business owner, filing your taxes is not as simple as uploading your W-2 form into some online tax preparation software. Most self-employed people need to complete a W-9 as a step for accurately reporting their earnings to the IRS. Below, you can learn how to fill out a W-9 and when to submit it.
Tightening the HR budget in 2023
With the state of the economy still uncertain, 2023 is expected to be approached with much anticipation. Human Resource leaders have many concerns, including how they will manage to accomplish their goals with budget belts already getting snug. Let’s look at some of the factors that the new year is projected to bring for HR and how to prioritize budgets to reach human capital objectives.
A Comprehensive Guide to Becoming a Better Conversationalist
Have you ever stood awkwardly next to someone at a party because you didn’t know what to say to them? How about at a networking event or on a first date? You're not alone if you’ve ever experienced this uncomfortable silence. Many people struggle to master the art of being a great conversationalist.
Why is Non-Verbal Communication Really Important?
In a world where words and phrases rule daily communication, you may wonder why non-verbal communication is important. Whether you realize it or not, you communicate more with nonverbal actions than you do with verbal communication. When you interact with your peers, people are reading your body language, facial expressions, voice, and many other factors that help fill in blanks that words can't fill.