- MUFG Bank, Ltd. (Jersey City, NJ)
- …and platform architect for ServiceNow platform and ServiceNow Vulnerability Response and Configuration Compliance Major Responsibilities Responsible for ... capabilities. Solution design, configuration/development, testing and support of ServiceNow Vulnerability Response and Configuration Compliance capabilities. Design, implement and… more
- Robinhood (Bellevue, WA)
- …seeking a strategic and technical Manager to lead our Offensive Security and Vulnerability Management programs. In this role, you'll drive our ability to proactively ... such as red teaming and penetration testing, as well as vulnerability research and agile vulnerability lifecycle management, working cross-functionally… more
- Cedar Park Group (New York, NY)
- Cedar Park Group is seeking an experienced Cyber Command Vulnerability Management Specialist for a long-term hybrid opportunity in Brooklyn, NY. If you're passionate ... 24 months Start Date: ASAP Interview Type: In-person Responsibilities: Lead vulnerability management initiatives using Rapid7 , including designing and maintaining… more
- Zetier (San Antonio, TX)
- Principal Vulnerability Researcher Zetier is seeking Principal Vulnerability Researchers to analyze and counter malicious software and develop operationally ... critical cyber capabilities. Candidates will demonstrate practical experience designing, developing, and deploying tools intersecting command and control, persistence, and networking. Required: Highly experienced with reverse engineering compiled programs… more
- Novo Nordisk Inc. (Plainsboro, NJ)
- …including monitoring of alerts, investigation of alerts, incident response, vulnerability response, threat intelligence, and digital forensics. Individuals in this ... and will also be responsible for performing technical risk and vulnerability assessments at the network, system, and application level. Some responsibilities… more
- McDonald's (Chicago, IL)
- McDonald's Cybersecurity Vulnerability Management Engineer II McDonald's growth strategy, Accelerating the Arches, encompasses all aspects of our business as the ... and every community that is home to a McDonald's restaurant. Join McDonald's Cybersecurity's Vulnerability Management (VM) team as a VM Engineer II in a role that… more
- FanDuel (New York, NY)
- …The successful candidate has a foundation in cybersecurity, automation, and vulnerability management. You will be responsible for developing and maintaining ... detection capabilities, automating security workflows, and contributing to a robust vulnerability management program. You will work with a team of security… more
- RIT Solutions, Inc. (El Segundo, CA)
- …of software projects and improve cloud-based security programs Perform vulnerability and penetration testing. Document security findings with reasonable methods ... years of experience in software security as a practitioner with exposure to vulnerability and penetration testing, threat modeling of applications, and code reviews … more
- RiVidium, Inc (Springfield, VA)
- …in the risk mitigation strategy. Perform risk analysis (eg, threat, vulnerability , and probability of occurrence) whenever an application or system undergoes ... ABILITIES: Ability to identify systemic security issues based on the analysis of vulnerability and configuration data. Ability to answer questions in a clear and… more
- JFL Consulting, LLC (Bellevue, NE)
- …on advanced network defense strategies, with a unique focus on passive vulnerability analysis: a specialized and low-impact method of identifying risks without ... Experience Level: (5+ years in cybersecurity, 2+ years in passive vulnerability analysis) Responsibilities: Ensure the safe and proper functional operation of… more
- Claroty (Washington, DC)
- …and support periodic assessments (eg, annual assessments, penetration tests, vulnerability scans). Interface with Third Party Assessment Organizations (3PAOs), ... (SSP, POA&M, SAR, SAP, etc.) and governance tools. Familiarity with vulnerability scanning tools (eg, Nessus, Qualys) and interpreting security findings. Eligibility… more
- Merck & Co. (Rahway, NJ)
- …Software Development Life Cycle (SDLC), System Designs, Technical Advice, Vulnerability Scanning-Preferred Skills:Job Posting End Date:08/3/2025 *A job posting is ... effective until 11:59:59PM on the day BEFORE -the listed job posting end date. Please ensure you apply to a job posting no later than the day BEFORE the job posting end date. Requisition ID:R357429 more
- Tekfortune (Dallas, TX)
- …support activities in varied security domains such as SOC ,SIEM, IAM, Vulnerability Management, Infra Security, GRC, etc - Responsible for working with Delivery ... domains of Cyber-security like SIEM, Identity and Access Management, Vulnerability management, Endpoint Security-In-depth knowledge of security concepts such as… more
- Tenable, Inc. (Columbia, MD)
- …dynamic product marketing professional to help extend the company's leadership in vulnerability assessment. Nessus is the most widely deployed vulnerability ... assessment solution, trusted by millions of security professionals worldwide. It identifies vulnerabilities, policy-violating configurations and web application flaws that attackers can exploit. Tenable's unique business model combines free and paid versions… more
- Cyfle (New York, NY)
- …Data Management processes, standards, and automation Monitor and updates Security Vulnerability Testing and associated policies Work with Development teams to ... including Selenium and QC Experience working with Static Code Analysis and Vulnerability Scanning tools such as SonarQube and Veracode. Experience working with… more
- Quorum Business Solutions, Inc. (Houston, TX)
- …Security Framework and policies or guidelines of the Quorum's sponsor Oversee the vulnerability scan & pen test process based upon a centralized platform of ... VPN, anti-malware, email protection and filtering, system security controls, vulnerability assessment, penetration testing, etc. "white-hat"-type experience a strong… more
- Insight Global (Providence, RI)
- …of the controls (eg, reviewing configurations, analyzing logs, conducting vulnerability scans). 5. Reporting: Document the audit findings, including any ... weaknesses or vulnerabilities discovered, and provide recommendations for improvement. 6. Follow-Up: Track the implementation of the recommendations and conduct periodic re-assessments to ensure ongoing compliance. We are a company committed to creating… more
- Jefferies (New York, NY)
- …operating systems, database, middleware, infrastructure technology, threat & vulnerability management, problem & incident management, change management, application ... development, networking, resilience, logical and physical access security, etc. Familiarity with IT governance frameworks and guidelines (eg, ITIL, COBIT, NIST, CIS, FFIEC, etc.), as well as technology architecture, data governance, and cloud. Candidates must… more
- Quantum Dynamics, Inc. (Coronado, CA)
- …(CND), training systems (eg Virtual Hosting Environment (VHE), Network Security Vulnerability Technician (NSVT), support equipment, Joint systems (eg Joint High ... Speed Vessel (JHSV)) and Foreign Military systems. Overseeing strategic planning, human resource management, budgeting, and training personnel when necessary, and acting as a liaison between managers and subordinates. Analyzing program-related issues and… more
- Renewance, Inc (Elmhurst, IL)
- …office IT equipment and accessories. Perform annual IT risk assessment and vulnerability analysis to ensure integrity and security to evidence the commitment to ... IT governance. Evaluate and manage relationships with IT service providers and vendors to ensure high-quality services. Collaborate with leadership and internal stakeholders to understand operational requirements and ensure client-facing security and uptime… more
Related Job Searches:
Junior Vulnerability Assessment Analyst,
Manager Vulnerability Management,
Reverse Engineer Vulnerability Researcher,
Security Engineer Vulnerability Management,
Senior Vulnerability Management Engineer,
Senior Vulnerability Remediation Engineer,
Technical Program Manager Vulnerability,
Vulnerability Analyst,
Vulnerability Management Engineer,
Vulnerability Management Security Analyst