MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious
Largest dedicated platform of global Information Technology (IT) job search and career opportunities for IT professionals.If you are hiring IT professionals, post IT & Technology Job Descriptions for free. IT jobs can be viewed anytime from anywhere using mobile devices.
Thank you. Your job is saved. You can edit the details at any time via "My Page".
    Technology Jobs for Vulnerability Assessment
  • IT Executive - Network Security

    Responsibilities: Perform IT security administration (e.g. firewall, anti-virus, Windows, database, patching) Perform system log reviews to detect for IT security violations Assist in IT security incident logging and reporting as well as other support work as required Conduct vulnerability assessmen...

  • Senior Associate - Scenario Generation (3 - 8 yrs)

    Support macroeconomic stress scenario design, development and parameterisation through quantitative techniques and qualitative assessment for internal stress testsSupport enrichment of regulatory macroeconomic and market risk scenarios for Bank of England and EBA stress tests including parameterisat...

  • Web and Mobile application Security Analyst (2 - 3 yrs)

    Web, Mobile, client Server application to assess the vulnerabilities To conduct Manual and Automated testing of Application, database To conduct white, black , grey box testing To Verify security controls as per Open Source Security Testing Methodology Manual (OSSTMM), OWASP, SANS To Identify false ...

  • Chief Information Security Manager (7 - 12 yrs)

    Preferred Certified CEH, CISSP; ISO 27001Ability to apply threat intelligence to identify, assess, and report on current advanced threatsRecommends courses of action based on analysis of both existing and emerging threats. Delivers reports, briefings, and assessments to leadership, facilitating unde...

  • Database Security Engineer- Guardium (3 - 8 yrs)

    Database security engineer: Management and monitoring of database activity monitoring tool i.e. IBM Guardium and ensure its smooth functioningIncident reporting of any alerts and ensuring reporting and root cause analysis (RCA) of the incidentVulnerability assessment and penetration testing at the d...

  • Designation: Security Analyst / Sr. Security Analyst Role overview: SecurView is searching for a Security Analyst / Sr. Security Analyst with relevant experience on vulnerability assessment penetration testing for networks, mobile, wireless, web applications, source code review etc. Qualificatio...

  • Security Information Analyst

    Maintains and audits up-to-date baselines for the secure configuration and operations of all in-place devices, whether they be under direct control (ie, security tools) or not (ie, workstations, servers, network devices, etc.). Develops assessments and reports, weekly trends of incidents, and securi...

  • IT SPECIALIST (NETWORK/INFOSEC)

    Job Overview Summary NCDOC Statement: Want to lead the cyber war from the front? Our mission enables global power projection through proactive network defense so join our team of elite cyber warriors who defend our nation! This is the position to make a difference in global cyber defense where purpo...

  • Info Sec Attack Monitoring Manager

    Confidential - computerjobs-uk

    An International Investment Bank based in London, is looking for an Information Security Attacking Monitoring Manager to join their growing team.About the Information Security Attack Monitoring Manager Role:Within the clients Cyber Security Operations Centre, Attack Monitoring is the backbone for se...

Please login to view more jobs
Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top