- UpvoteDownvoteShare Job
- Suggest Revision
The Vulnerability Analysis Team, within the Threat Analysis Directorate, is a group of internet security experts focused on advancing the state of the art in vulnerability assessment and discovery, coordinated vulnerability disclosure, and software security on a national and global scale.
Part-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Get access to university resources including mindfulness programs, childcare and back-up care benefits, a monthly transit benefit on WMATA, free transportation on the Pittsburgh Regional Transit System.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Develop opportunity pursuit plans inclusive of qualification, competitive threat assessment and differentiation strategy. Develop opportunity pursuit plans inclusive of qualification, competitive threat assessment and differentiation strategy.
Full-timeRemoteExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
CMU will not sponsor or take over sponsorship of an employment visa for this opportunity. The SEI helps advance software engineering principles and practices and serves as a national resource in software engineering, computer security, and process improvement.
Full-timeExpandApply NowActive JobUpdated 29 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Provide architecture-level design and implementation support by building, operating, and developing or maintaining a Splunk log management, threat, and vulnerability management infrastructure using Security Information and Event Management (SIEM) tooling and best practices.
Full-timeExpandApply NowActive JobUpdated 29 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The SEI is a federally funded research and development center at Carnegie Mellon University. Carnegie Mellon University is an Equal Opportunity Employer/Disability/Veteran. The CERT Division of the Software Engineering Institute (SEI) is seeking applicants for the Senior Vulnerability Researcher role.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Plans and conducts assessment including but not limited to security engineering, vulnerability management, endpoint protection, web protection, external systems protection, threat hunting and penetration testing.
$298,515 a yearFull-timeRemoteExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Incident Management Automation Fraud Investigations Application Security Disaster Recovery Information Technology Vendor Management IT Strategy Software as a Service (SaaS) Security Information and Event Management (SIEM) Project Management Infrastructure Risk Assessment Digital Forensics Threat Analysis Incident Response Healthcare Information Technology (HIT) Cyber Threat Hunting (CTH) Vendor Partnerships Risk Management Security Operations Security.
RemoteExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Skills: Incident Management Automation Fraud Investigations Application Security Disaster Recovery Information Technology Vendor Management IT Strategy Software as a Service (SaaS) Security Information and Event Management (SIEM) Project Management Infrastructure Risk Assessment Digital Forensics Threat Analysis Incident Response Healthcare Information Technology (HIT) Cyber Threat Hunting (CTH) Vendor Partnerships Risk Management Security Operations Security.
RemoteExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Proven expertise in advanced penetration testing, threat emulation, vulnerability assessment, threat detection, and incident response. In-depth knowledge of security tools such as Metasploit, Burp Suite, Cobalt Strike, Nmap, Wireshark, Splunk, SIEM, IDS/IPS, EDR, and threat intelligence platforms.
$280,000 a yearFull-timeRemoteExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of planning and execution of pipeline integrity management tasks including ILI and DA, pipeline remediation, threat identification, risk assessment and records management. Knowledge of planning and execution of pipeline integrity management tasks including ILI and DA, pipeline remediation, threat identification, risk assessment and records management.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience in one or more of the following: risk assessment, threat modeling, incident and emergency response, OS hardening, vulnerability management, pentesting, offensive security or cryptographic protocols and concepts.
$366,000 a yearFull-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of various security technologies such as vulnerability assessment tools, SIEM, firewalls, proxies, network and host-based intrusion prevention, DLP, etc. Integrate and leverage threat intelligence sources & partners to maintain an understanding of emerging security threats and advanced threat actor's capabilities.
Full-timeRemoteExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Ability to meet worksite requirements including criminal background checks and TSA threat assessment evaluations. General Description: Arora Engineers, LLC., provides design and construction services for MEP, fire protection and alarms, and low voltage/special systems for aviation, transportation, educational, commercial, and institutional facilities.
Full-timeRemoteExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Generally requires three (3) plus years of technical security experience at top-tier software companies including experience with security products, threat modeling, security design, security architecture, cryptography, mobile security, and broader cloud computing technologies.
$221,169 a yearFull-timeRemoteExpandApply NowActive JobUpdated 1 month ago
threat assessment jobs in Pittsburgh, PA
FEATURED BLOG POSTS
What is Talent Mapping
Every planner and recruiter knows that each strategic process requires a pre-strategic process. This is usually just the pre-planning phase of your master plan. Because hiring and recruiting involves many aspects of business (budgets, time, employees, planning, etc.), it is important to ask yourself a few questions to evaluate what resources you have to fulfill your hiring needs. These questions include:
How to Take Your Careers Page to the Next Level
Your careers page deserves a lot of attention. It is not just another page on your website. It is a vital tool that could enhance your recruitment outcomes. But in order to do that, you have to make sure it's fully optimized.
How to Practice Fair Chance Hiring for People With Criminal Records
Usually when you think of your dream hire, you think of someone who is respectful, trustworthy, reliable, and has sound judgment, right? As you envision your ideal candidate with these qualities, the last person you think of is someone with a criminal record.
6 Common Mistakes to Avoid When Employer Branding
Currently, job searchers are putting extra effort into researching employers. The information they find plays a major role in whether they will pursue an opportunity with you or look for jobs elsewhere. That is why it is now more important than ever to be proactive and intentional when showcasing your workforce and workplace culture. Having a well crafted employer branding strategy can help you strategize and influence your potential candidates so they see your business in the best light. But in order to do that, you should be aware of some of the most common mistakes that employers make.
What to Say When Terminating an Employee
Terminating an employee is an inevitable part of doing business. Whether you’re re-structuring your department or you’ve identified a few employees who’re not living up to your expectations, letting people go is necessary for keeping your workforce healthy and thriving.
How to Utilize Keywords for Your Job Ads
Before we give you the scoop on how to utilize keywords in job ads, it would be helpful if we defined what keywords are and why they are important. In simple terms,
What Makes a Good Paid Time Off (PTO) Policy
The world of work has undergone some major transformation in recent years. From remote and flexible work to increased emphasis on employee benefits and wellbeing, companies nowadays have to be very intentional about their HR policies and how they approach talent acquisition.