- UpvoteDownvoteShare Job
- Suggest Revision
2+ years of experience in Cyber Security; preferred domains include Baseline Configuration Monitoring, Backup & Recovery, Change Management Oversight, Reuse & Disposal, NERC CIP, NIST CSF, Security Controls planning and/or auditing, security monitoring and analysis.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Work Experience 5+ years of Information Technology security experience, preferably in a medium to large organization Knowledge, Skills, & Abilities Proficient in IT Security tools such as vulnerability management, endpoint detection and response, SIEM/SOC, Email Secure Gateway, Web filtering and SSL decryption and Next-Gen firewalls.
$136,500 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience in Palo Alto, Fortinet, Checkpoint and Juniper firewall management and in network security including: Device Hardening, IDS/IPS, SIEM, Firewalls, and IPSec, vulnerability assessment and intrusion detection.
$47 an hourFull-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of NERC/CIP/NIST procedures. Standalone energy storage is rapidly transforming the North American energy markets, because it is cheaper than new natural gas plants, faster to build than fossil peakers or transmission, and able to perform diverse energy services.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Willingness to learn about security and attack frameworks such as Nation institute of Standards and Technologies (NIST) Cyber Security Framework (CSF), Cyber Kill Chain and MITRE ATT&CK. The intern will also work with the team to ensure that network security operations are maintained to be audit ready in compliance with NRC Nuclear Cyber, NERC CIP and Sarbanes-Oxley regulations.
InternExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Extensive knowledge of IT practices, vulnerability assessment, change control, business continuity, data privacy and risk assessment practices. The IT Audit Manager is responsible for developing, planning, and executing audit programs based on risk assessment results.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Your sales experience equips you to continually grow your income as you provide the needed security for times of distress and vulnerability. Benefits: Base Salary PLUS Commissions Bonus based on performance Training & development ROLE DESCRIPTION:Lindsey Kauffman - State Farm Agent is seeking a qualified and empathetic professional for the role of Life Insurance Position - State Farm Agent Team Member.
$50,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Provide vulnerability management for third-party applications. Strong Windows 10 and macOS configuration and troubleshooting experience. Package and deploy Windows and macOS applications. Provide vulnerability management for third-party applications.
$83,800 a yearFull-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Any experience in network security including: Device Hardening, IDS/IPS, SIEM, Firewalls, and IPSec, vulnerability assessment and intrusion detection is an added advantage. If this is a non-sales role, then the listed salary range reflects base salary only.
$225,500 a yearFull-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Additional experience in SIEM, VA, IPS, Cloud Security, Routing and Switching, Vulnerability Management, CASB, Python, or Automation/Orchestration is a plus. Additional experience in SIEM, VA, IPS, Cloud Security, Routing and Switching, Vulnerability Management, CASB, Python, or Automation/Orchestration is a plus.
Full-timeExpandApply NowActive JobUpdated 4 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Perform security assessments, incident analysis, vulnerability management, and system patching. The purpose of the Senior Cyber Security Analyst role is to design and implement IT security systems within our organizational Operational Technology and Distributed Control System (DCS) environment.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Leads the management and proactive improvements to HP security governance, policies and/or operations as it relates to issue resolution, vulnerability/threat analysis and/or prevention, and security research and querying relative to current issues and/or impending threats.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Familiarity with security frameworks such as NIST, ISO, and other relevant standards. Certifications such as CISSP, CISA, or CyberArk certifications can be beneficial. Strong understanding of CyberArk’s privileged access management platform and role-based access control.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Conduct regular security assessments, vulnerability scans, and penetration testing to identify and remediate weaknesses in the organization’s technology environment. The Director IT Security will work closely with the executive and IT leadership teams and other stakeholders to develop and implement a comprehensive information security program that effectively manages risk and protects the confidentiality, integrity, and availability of critical systems and data.
Full-timeExpandApply NowActive JobUpdated Today
FEATURED BLOG POSTS
How to Respond to a Recruiter Through Email? (Tips & Examples)
Rather than wading through an endless list of open roles, wouldn’t it be nice if relevant job opportunities come to you?
How to Reject a Candidate Professionally
When deciding on how to reject a candidate, your first question may be
How Does Salary Pay Work? (Compared to Hourly Pay)
At the bottom of each job advertisement, companies label a role as salaried or hourly. Both methods will get you paid (yay), but each in very different ways. So, it's essential to figure out how does salary pay work? While employees paid by the hour are paid based on how long they work, employers pay salaried employees a fixed amount.
The Quiet Quitting Phenomenon
The term, quiet quitting, was coined in 2009, but only now is it gaining traction as young Millennials and Gen Z workers are experiencing record levels of burnout. With the pandemic and the state of the economy, young employees are feeling the pressure. So, quiet quitting comes into effect when that pressure is exasperated by work stress and no managerial support.
How Does Salary Range Work (With Examples)
What are your salary expectations? Do you know? Establishing a salary that compensates you fairly and keeps you happy at work can feel like taking a shot in the dark. And employers sure don’t make learning budgets easy!
Guide to Hiring a Teenager
Teenagers are full of life. They bring energy and adaptability that may be hard to get from older workers, but does that mean that hiring teens is beneficial? Well, it depends. As you debate whether or not you should integrate teenagers into your workforce, there are some things that you should know first.
How to Re-apply for Your Old Job Professionally
Have you recently started a new job only to find that you miss your old one? Maybe you didn’t realize how good you had it, and now you regret leaving. Don’t worry. You’re not the first person to feel this way, and you might even be able to return to your old job if you play your cards right.