Average salary: $167,500 /yearly
More statsGet new jobs by email
- ...Job Title: Vulnerability Manager - Contract to Hire Location: Houston, TX (Hybrid - 4 days onsite / 1 day remote) Job Summary We are seeking a proactive, detail-oriented Vulnerability Manager to lead our enterprise vulnerability management program. This...SuggestedContract workRemote work
- ...government and cloud environment. You will succeed in this role if you can work both independently and collaboratively, effectively manage priorities, and maintain alignment with the cadence of government projects and cybersecurity efforts. This position requires...SuggestedFull timeRemote work3 days per week
- ...Base in Albuquerque, New Mexico. Cyber System Administrator (Vulnerability Analyst) supports the Distributed Mission Operations Center (... ...changes with the cybersecurity team. Support patch management, ensuring OS/applications are properly updated and compliant;...SuggestedFull timeContract workPart timeLocal areaRemote workFlexible hours
- ...LLC, a Koniag Government Services company, is seeking a Cyber Vulnerability Analyst (Encryptor Specialist) with a TS/SCI security clearance... ...Rapid7) to identify and analyze security risks. Configure, manage, and troubleshoot encryption devices to ensure secure and...SuggestedWork at officeLocal areaRemote workFlexible hours
$100k - $125k
...production readiness, post‑implementation validation, and issue triage. Ensure compliance with enterprise standards for change management, risk, controls, and documentation. Contribute to continuous improvement of BA practices, templates, and standards within the...SuggestedContract workWork at officeRemote workWorldwideWork visaRelocation package3 days per week- ...Cybersecurity Vulnerability Analyst Location: Arlington, VA Must have an active Top Secret Security Clearance Node is supporting... ...Analyst utilizes cybersecurity best practices, risk management techniques, critical thinking, and strong analytical skills to...Suggested
- ...to meet our customers' most demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission enablement, and software modernization....SuggestedFor contractorsImmediate startRemote work
- Our Partner provides remote and onsite advanced technical assistance, proactive hunting, rapid onsite incident response, and immediate investigation and resolution using host-based, network-based and cloud-based cybersecurity analysis capabilities. Team personnel provide...SuggestedImmediate startRemote work
- ...PowerShell, Python, Bash, or JavaScript . Familiarity with Terraform, Kubernetes, Docker, CloudFormation, or Azure Resource Manager for automation and orchestration. Understanding of MITRE ATT&CK for Cloud and adversary emulation techniques. Strong communication...SuggestedRemote work
- ...ensure effective communication between the entities. Required Qualifications: Bachelor's degree in Computer Science, Management Information Services, or equivalent experience/knowledge Three (3) years of professional IT work experience Ability to coordinate...SuggestedWork experience placementCurrently hiringWork at officeRemote workMonday to Friday
$86.8k - $198k
...software development projects, including Agile, in the systems development life cycle Experience with Help Desk or IT Service Management (ITSM) software such as ServiceNow or Jira Service Management Experience managing and supporting Microsoft Azure subscriptions...SuggestedFull timeContract workPart timeWork at officeLocal areaRemote work$86.8k - $198k
...software development projects, including Agile, in the systems development life cycle Experience with Help Desk or IT Service Management (ITSM) software such as ServiceNow or Jira Service Management Experience managing and supporting Microsoft Azure subscriptions...SuggestedFull timeContract workPart timeLocal areaRemote work- ...cyber defense network tools in response to new or observed threats within the network environment or enclave Notify designated managers, cyber incident responders, and cybersecurity service provider team members of suspected cyber incidents and articulate the event'...SuggestedFull timeContract workWork at officeLocal areaImmediate startRemote work
- ...scope Maintain forensic tool set by staying current on version updates and new options in the market Work closely with project management and other team members on completing complex projects in a fast pace, deadline-driven environment Assist in developing,...SuggestedWork at officeRemote workFlexible hours
- ...Services company , is seeking an Information System Security Manager/Officer (ISSM/O) with TS/SCI security clearance to support... ...and maintain directorate cybersecurity policies Remediate vulnerabilities identified by SCAs/SCARs within established timelines Ensure...SuggestedInterim roleLocal areaRemote workFlexible hours
- ...About the Company A client of Insight Global is seeking a Telecommunications Project Manager to support long-term telecom infrastructure projects in a primarily remote environment. About the Role This individual will be responsible for planning, coordinating...For contractorsRemote work
- ...Summary ********************** Job Description - Manage and support IT system security, including configuration checks and policy compliance - Perform security vulnerability remediation and coordinate with relevant teams - Conduct database...
- ...and operational workflows. This position requires a deep understanding of healthcare workflows, system integration, and project management to ensure the efficient operation of the healthcare system's IT infrastructure. Partners closely with operational leaders and...Work at officeLocal areaRemote workShift work
- ...policies, backup processes, batch jobs, and Identity and Access Management (IAM). Monitors scheduled tasks, IAM alerts and alarms.... ...operational impacts of cybersecurity lapses. Cyber threats and vulnerabilities and cybersecurity principles. Personally Identifiable...Local area
- ...TechnicalToolsets(e.g., ACAS, HBSS, Splunk, etc.) RESPONSIBILITIES Manage andmaintainperimeter defense systems (e.g., firewalls, IDS/IPS... ...DoDI 8510.01 , and other applicable regulations. Conduct vulnerability scans and ensure remediation of findings using tools such as...Full timeContract workTemporary workFor contractorsWork at officeLocal areaDay shift
$110k - $145k
...Americans with disabilities. The IT Security Operations Manager leads the organization's security operations to protect the... ...systems. This role oversees security monitoring, incident response, vulnerability management, and operational security processes, ensuring...Work at officeImmediate startRemote workAfternoon shift$90k - $120k
...Network Analysts (Cyber, Forensic, Signals, Exploitation etc) Vulnerability Analysts Data Analysts Penetration Testers Malware... .../or analysis of network cybersecurity risks to enable risk management and mitigation activities. Duties could include: data collection...Local areaRemote work$90k - $120k
...Network Analysts (Cyber, Forensic, Signals, Exploitation etc) Vulnerability Analysts Data Analysts Penetration Testers... ...and/or analysis of network cybersecurity risks to enable risk management and mitigation activities. Duties could include: data collection...Local areaRemote work$120k - $140k
...servers, switches, routers, crypto, fiber connections, attached leased circuits and distant end hardware are all fully operational, Manage user accounts. Ensure accounts which include individual's profiles are accurate and up to date. Archive accounts as personnel...Full timeContract workPart timeWork experience placementLocal areaRemote work- ...Configure and maintain backend support for M365 services, including Teams, SharePoint Online, Exchange Online, and OneDrive Manage user accounts, licenses, and security groups in Entra ID (formerly Azure AD) and On-Premise Active Directory Implement and manage...For contractors
- ...communication to both understand problems and explain their solutions. This role will continuously work under the guidance of the IT Manager. Responsibilities: - Monitor company networks for security concerns. - Network hardware upkeep, patching, issue...Remote work
- ...implement network security tools Provide subject matter expertise on network security, firewalls and industry best practices Manage firewall configurations within the SpaceX enterprise network based on operational requirements Analyze and proactively come up...Permanent employmentRemote workFlexible hoursWeekend work
- ...inclusive workplace. Inspirational Leadership: Work with a management team that values innovation and employee growth. Career... ...a senior advisor on network security strategy, identifying vulnerabilities and recommending long-term improvements aligned with business...Work at officeLocal areaRemote workFlexible hours
- • Managing and monitoring all installed security systems and infrastructure • Installing, configuring, testing and maintaining security systems, application software and system management tools • Ensuring the highest levels of systems and infrastructure availability...Remote work
- ...Update software with the latest security patches and ensure the proper defenses are present for each network resource. 23. Perform vulnerability and penetration tests, identifying and defending against threats, and develop disaster recovery plans. 24. Configure security...Work at officeLocal areaRemote work


