- UpvoteDownvoteShare Job
- Suggest Revision
Proficiency in security tools and technologies, including SIEM, IDS/IPS, DLP, encryption, and vulnerability management. Proven experience as a Security Business Analyst with a focus on Endur or similar energy trading and risk management (ETRM) systems.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Enterprise Information Cybersecurity Analyst executes threat intelligence reports, threat, vulnerability, and incident management processes to help ensure cybersecurity risks and threats are proactively identified and addressed to maintain the protection of information and information systems.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of networking, firewalls, virtualization, IDS/IPS, SIEM, EDR, SOAR, and vulnerability management tools. Knowledge of networking, firewalls, virtualization, IDS/IPS, SIEM, EDR, SOAR, and vulnerability management tools.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Minimum 3 years of experience with security tools such as intrusion detection/prevention systems, firewalls, antivirus, SIEM, and vulnerability scanners. Conduct security assessments and vulnerability scans to identify potential weaknesses and risks.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Implement security best practices for Kubernetes clusters, including RBAC, network policies, and vulnerability management. Implement and manage Kubernetes clusters for containerized applications using SUSE Rancher and AWS.
ExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with Security Information Event Management (SIEM) tools, creating advanced co-relation rules, administration of SIEM, system hardening, and Vulnerability Assessments. Experience with design/implementation of Microsoft server 2012, 2016 networks, Active Directory implementation and support, Exchange Server/Office 365, network security concepts, sub-netting, routing, and hardware support (servers, workstations, switches, routers, and firewalls.
Full-timeExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Applying OS patches and upgrades on a regular basis in accordance to Vulnerability Management Assessment. Indotronix is seeking a Hybrid-VMWare Administrator in Houston, TX for a Job Opportunity.
ExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Relevant certifications such as CISSP, CEH, CompTIA Security+, or equivalent. We operate the world's premier fleet of work class ROVs. Additionally, we are a leader in offshore oilfield maintenance services, umbilicals, subsea hardware, and tooling.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This position focuses on the firm’s Vulnerability Disclosure Program, Control Effectiveness Testing program, and must have demonstrated experience in development of communications. This position focuses on the firm’s Vulnerability Disclosure Program, Control Effectiveness Testing program, and must have demonstrated experience in development of communications.
$81,000 - $102,000 a yearFull-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Acronis is revolutionizing cyber protection by unifying backup, disaster recovery, storage, next-generation anti-malware, and protection management into one solution. Its solutions are trusted by more than 5.5 million home users and 500,000 companies, and top-tier professional sports teams.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Design, implement, and maintain Microsoft 365 solutions tailored to clients' business needs, with a focus on the Microsoft Defender suite of products, including Defender for Endpoint, Defender for Office 365, Defender for Identity, Defender for Cloud Apps, and Defender Vulnerability Management.
ExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Expertise in configuring, operating, and troubleshooting a wide range of cybersecurity solutions, including firewalls, intrusion detection/prevention systems, SIEM, anti-malware tools, and encryption technologies.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Cloud security posture and vulnerability management expertise. Ensure global alignment with Company’s best practices for patch, posture, and vulnerability management. 5+ years of experience with threat and vulnerability management program and operations.
Full-timeExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
Full-timeExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Research and integrate tools, processes, and techniques to improve vulnerability analysis, forensics capabilities, network and data security, and threat management. Conduct research, penetration testing, application and vulnerability assessments on external-facing resources and internal assets to determine risks.
ExpandApply NowActive JobUpdated 5 days ago
malware vulnerability jobs in Houston, TX
FEATURED BLOG POSTS
How Long Does it Take to Hear Back from a Job?
Are you applying for your very first job? Maybe you’re anticipating your termination from your current role and want to be proactive. Either way, waiting to hear back on your job application can be stressful. If time has passed since you applied, you may wonder how long does it take to hear back from a job. Well, the answer is... it depends.
How to Respond to a Recruiter Through Email? (Tips & Examples)
Rather than wading through an endless list of open roles, wouldn’t it be nice if relevant job opportunities come to you?
How to Reject a Candidate Professionally
When deciding on how to reject a candidate, your first question may be
How Does Salary Pay Work? (Compared to Hourly Pay)
At the bottom of each job advertisement, companies label a role as salaried or hourly. Both methods will get you paid (yay), but each in very different ways. So, it's essential to figure out how does salary pay work? While employees paid by the hour are paid based on how long they work, employers pay salaried employees a fixed amount.
The Quiet Quitting Phenomenon
The term, quiet quitting, was coined in 2009, but only now is it gaining traction as young Millennials and Gen Z workers are experiencing record levels of burnout. With the pandemic and the state of the economy, young employees are feeling the pressure. So, quiet quitting comes into effect when that pressure is exasperated by work stress and no managerial support.
How Does Salary Range Work (With Examples)
What are your salary expectations? Do you know? Establishing a salary that compensates you fairly and keeps you happy at work can feel like taking a shot in the dark. And employers sure don’t make learning budgets easy!
Guide to Hiring a Teenager
Teenagers are full of life. They bring energy and adaptability that may be hard to get from older workers, but does that mean that hiring teens is beneficial? Well, it depends. As you debate whether or not you should integrate teenagers into your workforce, there are some things that you should know first.