Software Vulnerability Researcher Jobs
By STR At , Woburn
Identifying software vulnerabilities, and developing tools to assist in this process
Experience with software reverse engineering tools (Ghidra, IDA Pro, Binary Ninja)
Reverse engineering and characterizing software and firmware
Developing custom emulation solutions to enable dynamic analysis
Communicating results to other employees and our customers
U.S. Citizen with the ability to obtain a Top Security (TS) Clearance
Manager, Vulnerability Research Jobs
By BitSight At , Remote
Demonstrated experience in security research people management
Over 750 teammates are dispersed throughout Boston, Raleigh, New York, Lisbon, Singapore, Argentina, and remote
Establish team priorities for research and development of new vulnerability intelligence collection and analysis capabilities
Evaluate, align, and escalate vulnerability detection capabilities within Bitsight’s established risk assessment framework
Communicate timelines and expectations for high-priority vulnerability detection capabilities
Recruit, train, and develop an international team of vulnerability researchers of diverse backgrounds and skill sets
Vulnerability Researcher Jobs
By Raytheon At , Annapolis Junction, 20701
Experience building and using tools to find, exploit, and productize vulnerabilities in complex software systems
Experience with C or C++
4+ years of professional experience
3 or more of the "desired skills" below
Experience reading or writing assembly (x86, x64, ARM, PPC, MIPS, SPARC, 68k, or others)
Experience using reverse engineering tools such as IDA Pro, HexRays, Ghidra, Binary Ninja, or objdump.
Vulnerability Manager Jobs
By The Travelers Companies, Inc. At , Hartford $142,600 - $235,200 a year
Lead strategic planning/roadmap creation for Vulnerability Management.
Define key performance indicators and metrics to illustrate efficacy with vulnerability management
Provide educational content on how to remediate vulnerabilities
May directly manage the configuration, testing, documentation, and implementation of upgrades to vulnerability management processes, controls or products as directed.
Regularly report on the state of vulnerabilities including criticality, exploit probability, business impact and remediation to security and IT leadership
Remain current with emerging threats and share knowledge to improve security posture
Senior Vulnerability Management Analyst
By Saliense At Tysons Corner, VA, United States
Experience with developing and management of POA&Ms.
Knowledge of Federal Risk and Authorization Management Program (FedRAMP).
Knowledge of risk management processes and tools (e.g., methods and tools for assessing and mitigating risks).
Develop and implement strategy for vulnerability management team in coordination with compliance, system teams, executive teams and other key stakeholders.
Knowledge of cybersecurity related requirements in MOU/MOAs and SLAs.
Knowledge of current and past cybersecurity threats and vulnerabilities.
Vulnerability Management Analyst Jobs
By SMS Data Products Group, Inc. At , Camp Springs, Md $80,000 - $90,000 a year
Utilize vulnerability management tools (Dashboards, Vulnerability and Compliance Scanner, etc.) to track vulnerability compliance levels.
Create situational awareness products to provide the organization with detailed information related to vulnerabilities and appropriate mitigation strategies.
Provide notification of potential threats by tracking vulnerabilities and potential exploits throughout the organization.
Manage Plans of Actions and Milestones (POA&M) and Information Assurance Vulnerability Alert (IAVA) compliance status.
BS degree and a minimum 4 years of prior relevant experience
Tenable Assured Compliance Assessment Solution (ACAS) experience.
Threat And Vulnerability Lead
By Hologic At , Marlborough, Ma $124,200 - $206,900 a year
Lifecycle management of threat and vulnerability tools
Maintaining current knowledge and understanding of threats, emerging threats, and vulnerabilities.
Experience coaching IT and Security Engineers to strengthen the skills and value of the team.
If you have the right skills and experience, apply today!
Developing Key Performance Indicators and Key Risk Indicators for threats and vulnerabilities to Hologic's information assets
Experience leading large portfolios of inter-related projects, achieving target outcomes and business value within budget and timeline.
Vulnerability Researcher Jobs
By Flashpoint At New York, NY, United States
In-depth knowledge of common security software and hardware vulnerabilities and attack vectors. Deep familiarity with OWASP top 20.
You have writing skills and affinity for writing research papers and summarizing complex subjects into short entries.
You have some experience with vulnerability exploit development and familiarity with security assessment tools and techniques.
In-depth knowledge of security and network fundamentals, such as cryptography, authentication, access control, and network protocols (TCP/IP, UDP, DNS, HTTP, etc.)
Some programming experience with scripted languages (preferably Python3) and compiled languages (preferably C).
You possess high reading comprehension, attention to detail, and deductive reasoning.
Vulnerability Analyst Jobs
By Starbucks At Seattle, WA, United States
Experience with risk management processes such as methods for assessing and mitigating risk.
Build world class communications, governance and awareness campaigns for global vulnerability management that inspire action and compliance from Technology teams.
Create and maintain vulnerability management policy, procedures, and training.
Develop reporting for Starbucks Technology leadership which provides visibility into compliance against vulnerability management security standards.
Partner with Starbucks Technology support teams to confirm that vulnerabilities are remediated within the timeframes stated by information security standards.
Working knowledge of NIST, NVD, CVSS algorithms.
Vulnerability & Compliance Analyst Jobs
By Technology Ventures At McLean, VA, United States
• Issue Management, Audit Liaison and Support Operational Risk Assessment
• Log Analysis, Security, Vulnerabilities and Compliance
• Strong decision-making skills: problem solving, coupled with attention to detail.
• Minimum 6+ years of experience in IT
• Demonstrable experience with AWS Platform
• Excellent verbal and written communication skills.
Jr. Vulnerability Management Analyst
By Saliense At Virginia, United States
Experience with developing and management of POA&Ms.
Knowledge of Federal Risk and Authorization Management Program (FedRAMP).
Knowledge of risk management processes and tools (e.g., methods and tools for assessing and mitigating risks).
Implement strategy for vulnerability management team in coordination with compliance, system teams, executive teams and other key stakeholders.
Knowledge of cybersecurity related requirements in MOU/MOAs and SLAs.
Knowledge of current and past cybersecurity threats and vulnerabilities.
Vulnerability Cyber Security Analyst
By Insight Global At United States
Knowledge of information security auditing and risk management.
Must have strong working knowledge of pertinent DoD and NIST (mandates computers that should be secure in specific ways) requirements.
Knowledge of IPS/IDS, Malware Analysis, Wireshark, ACAS, Firewalls and other security capabilities
Day to day operations experience (regular system scanning)
Experience with security tools (Splunk, Nessus, Nmap, etc)
Demonstrated skill in performing complex security analyses.
Vulnerability Management Senior Analyst
By TikTok At San Jose, CA, United States

Responsibilities TikTok is the leading destination for short-form mobile video. Our mission is to inspire creativity and bring joy. TikTok has global offices including Los Angeles, New York, ...

Vulnerability Analyst Jobs
By Diamondpick At United States
• Candidate must have exposure and experience working on any Privilege Access Management (PAM) tool.
• Need the person to be experienced in atleast one of the following skills :
• Candidate must have working knowledge on PowerBI to create Dashboards for reporting.
• Exposure and knowledge about Enterprise tool, Brinqa and the scanning tool Nessus is plus.
Responsibilities Will include the selected candidate to perform a lot of coordination between customer stakeholders.
Title: IT - Vulnerability Analyst III

Are you looking for an exciting opportunity to use your skills to protect organizations from cyber threats? We are looking for a Vulnerability Analyst to join our team and help us identify and mitigate security risks. You will be responsible for conducting vulnerability scans, analyzing results, and providing recommendations to improve security posture. If you have a passion for security and a desire to make a difference, this is the job for you!

Overview A Vulnerability Analyst is a cybersecurity professional who is responsible for identifying, analyzing, and mitigating security vulnerabilities in an organization’s systems and networks. They use a variety of tools and techniques to identify and assess potential security risks and develop strategies to reduce or eliminate them. Detailed Job Description A Vulnerability Analyst is responsible for identifying, analyzing, and mitigating security vulnerabilities in an organization’s systems and networks. They use a variety of tools and techniques to identify and assess potential security risks and develop strategies to reduce or eliminate them. They must be able to identify and analyze security threats and vulnerabilities, develop and implement security policies and procedures, and monitor and report on security incidents. They must also be able to communicate effectively with stakeholders and other security professionals. Job Skills Required
• Knowledge of security principles, technologies, and best practices
• Knowledge of network security, firewalls, and intrusion detection systems
• Knowledge of vulnerability assessment and penetration testing tools
• Ability to analyze and interpret security logs and reports
• Ability to identify and assess security risks
• Ability to develop and implement security policies and procedures
• Ability to communicate effectively with stakeholders and other security professionals
• Ability to work independently and as part of a team
Job Qualifications
• Bachelor’s degree in Computer Science, Information Security, or a related field
• Relevant certifications such as CISSP, CISM, or CEH
• At least 3 years of experience in a security-related role
• Knowledge of security principles, technologies, and best practices
• Knowledge of network security, firewalls, and intrusion detection systems
• Knowledge of vulnerability assessment and penetration testing tools
Job Knowledge
• Knowledge of security principles, technologies, and best practices
• Knowledge of network security, firewalls, and intrusion detection systems
• Knowledge of vulnerability assessment and penetration testing tools
• Knowledge of security policies and procedures
• Knowledge of security incident response and investigation
Job Experience
• At least 3 years of experience in a security-related role
• Experience with vulnerability assessment and penetration testing
• Experience with security incident response and investigation
• Experience with security policies and procedures
• Experience with security log analysis
Job Responsibilities
• Identify and analyze security threats and vulnerabilities
• Develop and implement security policies and procedures
• Monitor and report on security incidents
• Perform vulnerability assessments and penetration tests
• Analyze security logs