- UpvoteDownvoteShare Job
- Suggest Revision
Experience with a wide variety of security tools such as IPS/IDS systems, firewalls, SIEM, web application firewalls, network and application vulnerability scanners (SAST, DAST, IAST), red / blue team exercises, EDR and XDR platforms, CSPM/CNAPP platforms, Amazon Web Services tools and technologies (Security Hub, Macie, Guard Duty, others), CASB platforms, PKI / HSMs, wireless technologies and platforms, NAC, secure email systems, network detection and response platforms, SOAR.
RemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Explore more InfoSec / Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge and familiarity of common security technologies such as EDR, SIEM, Vulnerability Management, IDS/IPS, DLP, and other solutions. To qualify for the role you must have Bachelor's Degree in Computer Science, Computer Engineering, Cybersecurity, Management Information Systems or related field A minimum of 5-7 years of work experience in cybersecurity Familiarity and understanding with one or more of the below: Proficiency with one or more Endpoint Detection and Response Tools (Tanium, CrowdStrike, Carbon Black, Wazuh, OSQuery, etc.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Professional security management certification, such as a Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA) or other similar credentials.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Ideal candidate will have comprehensive knowledge of Windows and UNIX-based system administration, network management and enterprise systems management and the ability to and maintain Linux-based operating systems as well as IDS/IPS, log management solutions and enterprise vulnerability assessment systems.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
Full-timeRemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Must hold one or more of the following certifications (or equivalents): Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA), and/or CompTIA Security.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with multiple Information Security domains, such as Infrastructure Vulnerability, Data Loss Prevention, End User Security, Network Security, Internet Security, Application Security, Cloud Security(AWS), Identity & Access Management, etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Internet of Things (IoT) Security and Endpoint Vulnerability Management Team is dedicated to safeguarding JPMC's connected devices and endpoints. As a Security Engineer III at JPMorgan Chase within the Cybersecurity and Technology Controls organization for Internet of Things (IoT) Security and Endpoint Vulnerability Management team, you serve as a seasoned member of a team that works to deliver software solutions that satisfy pre-defined functional and user requirements with the added dimension of preventing misuse, circumvention, and malicious behavior.
ExpandApply NowActive JobUpdated 13 days ago - UpvoteDownvoteShare Job
- Suggest Revision
O Vulnerability assessment and reporting including comprehensive understanding of Vulnerability Management methodologies and procedures, threat assessment, and remediation management.
$83,550 - $178,603 a yearFull-timeExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Preferred Skills· Experience with STIG Viewer, SCAP Compliance Checker, Vulnerator, and/or Qualys vulnerability management preferred. · Collaborate with the Security Engineering and Architecture team members on risk assessments, impact assessments, vulnerability and compliance management and security change requests to ensure system compliance, up-to-date package information, and that all system changes are being executed within the configuration control lifecycle.
ExpandApply NowActive JobUpdated 13 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Manage endpoint security and vulnerability management programs for the organization. Serve as the subject matter expert in security monitoring, incident response, and incident management.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
CISSP, GIAC, CISM, CCSP, CISA, CRISC, AWS Security, AWS Advanced Networking Specialty, or AWS Solutions Architect Certification. Principal Associate, Cyber Security Log Management Capital One You’re tenacious and driven, so the last place you want to work is some boring bank.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience in vulnerability management, penetration testing and Incident Response handling involving payment card data. One or more of the cybersecurity certifications or cloud security certifications such as CISA, CISM, CISSP, CCSP, CEH, CGRC, AWS/AZURE certs.
Full-timeExpandApply NowActive JobUpdated 24 days ago - UpvoteDownvoteShare Job
- Suggest Revision
CISSP; CISA; Certified Information Security Manager (CISM); or FITSP-A is required. OCT Consulting, LLC is an SBcertified, 8(a) small business management and technology consulting firm that provides support to Federal Government clients.
$120,000 - $140,000 a yearFull-timeExpandApply NowActive JobUpdated 5 days ago
cism vulnerability management jobs in Arlington, VA
FEATURED BLOG POSTS
What is Seasonal Employment?
Depending on where you are in your career, you might have first-hand experience with seasonal employment. Seasonal employment can be a great way to expand your skill set and earn extra cash while helping businesses meet seasonal increases in demand.
How to Avoid a Bad Hire
"A new employee who doesn't meet the minimum performance, quality, and culture fit standards you set when you began sourcing and recruiting. Additionally, bad hires will immediately show signs of self-interest instead of an interest in their role and the company."
How to Ask for a Letter of Recommendation
When the job board you subscribe to finally posts your dream job, you may feel like the stars have aligned. But part of securing a position that matches your career plan is ensuring you address all the application basics. You know, the resume, the cover letter, the portfolio. It seems like you've got this in the bag — until you realize they want a letter of recommendation, too!
What Are SMART Goals?
When it comes to achieving our goals, there’s a lot of noise to work through. A study by the University of Scranton has found that only 8% of people who set New Year’s resolutions actually achieve them. Our busy lives might be one reason for this. Another, even more important reason, is our approach to goal setting. Being too vague, too ambitious or simply unclear on the timeframe can set us up for failure.
In-House vs Outsourcing Recruiting: Which is Better?
When looking at in-house vs outsourcing recruiting, it is important to nail down the benefits for each and whether those benefits outweigh the risks that follow.
How to Ask for a Raise at Work
Here we go again; it’s time to talk money. Whether you’re one year in at a new company or approaching year five on the same team, learning how to ask for a raise should be part of your long-term career plan. These conversations are rarely fun (thanks to society, which has conditioned us to believe that money is taboo), but they are necessary if you want to, well, get paid what you’re worth. Trust us, there’s a lot of money on the table for taking. Below, we’ll discuss tips on timing, approach, and follow-up.
How to Maximize Action Verbs in Your Resume
Writing a resume that stands out takes more than using keywords and savvy formatting. It’s not just about having an impressive list of accomplishments. It’s also about how you position them using action verbs and deliberate word choice. So if you are looking for a way to craft a resume that stands out and gets calls back? Start by sprucing up your resume with captivating action verbs.