Find Your Perfect Job

Job Search Results for vulnerability management analyst

Sort and Filter  | 4 Results for vulnerability management analyst  | Save This Search

Jul 11, 2025

Chicago, IL

|

Security Engineering

|

Contract

|

$64 - $80 (hourly estimate)

{"JobID":426355,"JobType":["Contract"],"EmployerID":null,"Location":{"Latitude":-87.6629090909091,"Longitude":41.8489090909091,"Distance":null},"State":"Illinois","Zip":"60661","ReferenceID":"JAX-789011","PostedDate":"\/Date(1752192939000)\/","Description":"Insight Globals financial client is looking for a contractor to assist with several project efforts as we work to expand configuration compliance analysis across the network to include newer technologies, such as containerization. This role will include identifying insecure container configurations that may pose a risk as well as detection of containers in use. This role would require excellent communication, troubleshooting and project management skills along with strong critical thinking skills to uncover associated container-oriented risks.Compensation: $70 - $80 per hourWe are a company committed to creating inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity employer that believes everyone matters. Qualified candidates will receive consideration for employment opportunities without regard to race, religion, sex, age, marital status, national origin, sexual orientation, citizenship status, disability, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to Human Resources Request Form. The EEOC \"Know Your Rights\" Poster is available here. To learn more about how we collect, keep, and process your private information, please review Insight Global\u0027s Workforce Privacy Policy: https://insightglobal.com/workforce-privacy-policy/ .","Title":"Vulnerability Analyst (Containerization)","City":"Chicago","ExpirationDate":null,"PriorityOrder":0,"Requirements":"container configuration knowledge specific to Docker, Kubernetes or other Container Orchestration Platforms network configuration analysis of OSs (Windows, Unix/Linux)Vulnerability/Security scanning experience","Skills":"Routers/Switches Load Balancers Database (Oracle, SQL Server, Mongo etc) experience","Industry":"Security Engineering","Country":"US","Division":"IT","Office":null,"IsRemoteJob":false,"IsInternalJob":false,"ExtraValues":null,"__RecordIndex":0,"__OrdinalPosition":0,"__Timestamp":0,"Status":null,"ApplicantCount":0,"SubmittalCount":0,"ApplicationToHireRatio":0,"JobDuration":null,"SalaryHigh":80.2500,"SalaryLow":64.2000,"PayRateOvertime":0,"PayRateStraight":0,"Filled":0,"RemainingOpenings":0,"TotalOpenings":0,"Visa":null,"ClearanceType":null,"IsClearanceRequired":false,"IsHealthcare":false,"IsRemote":false,"EndClient":null,"JobCreatedDate":"\/Date(-62135578800000)\/","JobModifiedDate":"\/Date(-62135578800000)\/"}

Insight Globals financial client is looking for a contractor to assist with several project efforts as we work to expand configuration compliance analysis across the network to include newer... technologies, such as containerization. This role will include identifying insecure container configurations that may pose a risk as well as detection of containers in use. This role would require excellent communication, troubleshooting and project management skills along with strong critical thinking skills to uncover associated container-oriented risks.Compensation: $70 - $80 per hourWe are a company committed to creating inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity employer that believes everyone matters. Qualified candidates will receive consideration for employment opportunities without regard to race, religion, sex, age, marital status, national origin, sexual orientation, citizenship status, disability, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to Human Resources Request Form. The EEOC "Know Your Rights" Poster is available here. To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: https://insightglobal.com/workforce-privacy-policy/ .

Jul 11, 2025

Richmond, VA

|

Security Engineering

|

Contract-to-perm

|

$66 - $82 (hourly estimate)

{"JobID":427022,"JobType":["Contract-to-perm"],"EmployerID":null,"Location":{"Latitude":-77.4544545454545,"Longitude":37.5502727272727,"Distance":null},"State":"Virginia","Zip":"23230","ReferenceID":"RIC-793530","PostedDate":"\/Date(1752193030000)\/","Description":"The Information Security Operations Analyst II plays a critical role in both the engineering and analytical aspects of securing the companys systems and data. This position combines hands-on technical work with in-depth analysis, supporting a broad range of responsibilities including threat intelligence, vulnerability management, incident response, and the design, implementation, and tuning of defensive security controls. In this role, you will engage in engineering tasks such as building and optimizing detection mechanisms, automating response processes, and maintaining security infrastructure. Simultaneously, you will apply analytical thinking to investigate security events, assess risk, interpret threat intelligence, and guide tactical decision-making. The Security Operations Analyst II regularly collaborates with IT and business stakeholders to drive measurable cybersecurity improvements and serves as an escalation point for complex incidents and investigations. To remain effective, youll stay informed on the latest cybersecurity trends, tools, and tactics, continuously adapting defenses to meet evolving threats. The target pay rate during the contract period is between $60-70/hr and is based on years of experience. Duties and Responsibilities- Continually exhibit and uphold Core Values of Integrity, Accountability, Communication and Teamwork, Innovation and Customer Service- Continuously monitor security alerts and events from various sources, including network and application services, endpoint and SIEM tools, etc. to identify potential security incidents and anomalies-Investigate and analyze security incidents to determine their nature, scope, and impact, taking immediate action to contain, mitigate, and remediate security breaches to minimize damage- Stay informed about emerging cybersecurity threats, vulnerabilities, and attack techniques, using threat intelligence to proactively identify potential threats and vulnerabilities, and take measures to prevent them- Maintain detailed records of security incidents, their causes, and the actions taken for analysis, reporting, and compliance purposes, generating and submitting reports to management and stakeholders, as necessary- Manage and maintain security technologies, including SIEM systems, vulnerability management systems, endpoint and network security systems- Maintain awareness of information security best practices and communicate their applicability within the Information Security Office and IT organization- Partner with the Security Operations team and management to conduct security assessments to ensure that management, operational, and technical security controls are properly implemented and maintained- Lead the refinement of security processes, procedures, and policies- Support business units and staff, communicating applicable policies and standards, as well as escalating to Information Security management when appropriate- Consult with various areas of the business as an information risk subject matter expert- Serve as a mentor and trainer for Information Security Operations Analyst I under the direction of management- Serve as an escalation point by guiding and helping team members with project issuesWe are a company committed to creating inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity employer that believes everyone matters. Qualified candidates will receive consideration for employment opportunities without regard to race, religion, sex, age, marital status, national origin, sexual orientation, citizenship status, disability, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to Human Resources Request Form. The EEOC \"Know Your Rights\" Poster is available here. To learn more about how we collect, keep, and process your private information, please review Insight Global\u0027s Workforce Privacy Policy: https://insightglobal.com/workforce-privacy-policy/ .","Title":"Information Security Operations Analyst II","City":"Richmond","ExpirationDate":null,"PriorityOrder":0,"Requirements":"- 5+ years of experience in a security-related role (security operations, vulnerability management, incident response, engineering, etc)- SIEM/Splunk: Proficient with SIEM tools, specifically splunk. Understanding of its architecture and use for threat intelligence.- Threat Intelligence: Detection engineering, including attack frameworks and log analysis. Able to build detections in Splunk to trigger alerts. Own and manage threat intelligence processes.- Familiar with attacker toolsets (such as Kali Linux) for security testing and attack simulation - Vulnerability remediation experience","Skills":"- Certifications: Advanced certifications like CISSP, GSEC, CCSP, etc.- Ability to write python or powershell scripts- Diverse background - previous experience in infrastructure/ networking/ web development","Industry":"Security Engineering","Country":"US","Division":"IT","Office":null,"IsRemoteJob":false,"IsInternalJob":false,"ExtraValues":null,"__RecordIndex":0,"__OrdinalPosition":0,"__Timestamp":0,"Status":null,"ApplicantCount":0,"SubmittalCount":0,"ApplicationToHireRatio":0,"JobDuration":null,"SalaryHigh":82.0000,"SalaryLow":65.6000,"PayRateOvertime":0,"PayRateStraight":0,"Filled":0,"RemainingOpenings":0,"TotalOpenings":0,"Visa":null,"ClearanceType":null,"IsClearanceRequired":false,"IsHealthcare":false,"IsRemote":false,"EndClient":null,"JobCreatedDate":"\/Date(-62135578800000)\/","JobModifiedDate":"\/Date(-62135578800000)\/"}

The Information Security Operations Analyst II plays a critical role in both the engineering and analytical aspects of securing the companys systems and data. This position combines hands-on... technical work with in-depth analysis, supporting a broad range of responsibilities including threat intelligence, vulnerability management, incident response, and the design, implementation, and tuning of defensive security controls. In this role, you will engage in engineering tasks such as building and optimizing detection mechanisms, automating response processes, and maintaining security infrastructure. Simultaneously, you will apply analytical thinking to investigate security events, assess risk, interpret threat intelligence, and guide tactical decision-making. The Security Operations Analyst II regularly collaborates with IT and business stakeholders to drive measurable cybersecurity improvements and serves as an escalation point for complex incidents and investigations. To remain effective, youll stay informed on the latest cybersecurity trends, tools, and tactics, continuously adapting defenses to meet evolving threats. The target pay rate during the contract period is between $60-70/hr and is based on years of experience. Duties and Responsibilities- Continually exhibit and uphold Core Values of Integrity, Accountability, Communication and Teamwork, Innovation and Customer Service- Continuously monitor security alerts and events from various sources, including network and application services, endpoint and SIEM tools, etc. to identify potential security incidents and anomalies-Investigate and analyze security incidents to determine their nature, scope, and impact, taking immediate action to contain, mitigate, and remediate security breaches to minimize damage- Stay informed about emerging cybersecurity threats, vulnerabilities, and attack techniques, using threat intelligence to proactively identify potential threats and vulnerabilities, and take measures to prevent them- Maintain detailed records of security incidents, their causes, and the actions taken for analysis, reporting, and compliance purposes, generating and submitting reports to management and stakeholders, as necessary- Manage and maintain security technologies, including SIEM systems, vulnerability management systems, endpoint and network security systems- Maintain awareness of information security best practices and communicate their applicability within the Information Security Office and IT organization- Partner with the Security Operations team and management to conduct security assessments to ensure that management, operational, and technical security controls are properly implemented and maintained- Lead the refinement of security processes, procedures, and policies- Support business units and staff, communicating applicable policies and standards, as well as escalating to Information Security management when appropriate- Consult with various areas of the business as an information risk subject matter expert- Serve as a mentor and trainer for Information Security Operations Analyst I under the direction of management- Serve as an escalation point by guiding and helping team members with project issuesWe are a company committed to creating inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity employer that believes everyone matters. Qualified candidates will receive consideration for employment opportunities without regard to race, religion, sex, age, marital status, national origin, sexual orientation, citizenship status, disability, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to Human Resources Request Form. The EEOC "Know Your Rights" Poster is available here. To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: https://insightglobal.com/workforce-privacy-policy/ .

Jul 16, 2025

Fort Mill, SC

|

Security Engineering

|

Perm

|

$90k - $110k (estimate)

{"JobID":428559,"JobType":["Perm"],"EmployerID":null,"Location":{"Latitude":-80.9181818181818,"Longitude":35.0014545454545,"Distance":null},"State":"South Carolina","Zip":"29715","ReferenceID":"CLT-795614","PostedDate":"\/Date(1752664592000)\/","Description":"Insight Global is seeking an Application Security Analyst to join one of our clients\u0027 security team with focus on application security and vulnerability management. The ideal candidate will have knowledge of standards and practices for securing applications and APIs. This role will participate in efforts to identify, verify, report, and track vulnerabilities within their systems and applications. This role spans multiple domains, including desktop, mobile, web applications, and API infrastructure.Position Responsibilities:? Schedule and perform regular application tests.? Conduct penetration tests on important software and systems.? Test changes before they go live.? Analyze and validate vulnerabilities.? Track and report testing activities.? Present findings to stakeholders.? Maintain dashboards for vulnerabilities.? Improve asset management processes.? Enhance threat modeling.? Review source code and identify duplicates.? Use security testing tools (e.g., Veracode, Burp Suite).? Automate security scans and integrate with CI/CD pipelines.? Collaborate with developers to improve security practices.? Support incident response and investigations.? Perform various security tests (penetration, purple team, red team).We are a company committed to creating inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity employer that believes everyone matters. Qualified candidates will receive consideration for employment opportunities without regard to race, religion, sex, age, marital status, national origin, sexual orientation, citizenship status, disability, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to Human Resources Request Form. The EEOC \"Know Your Rights\" Poster is available here. To learn more about how we collect, keep, and process your private information, please review Insight Global\u0027s Workforce Privacy Policy: https://insightglobal.com/workforce-privacy-policy/ .","Title":"Application Security Analyst","City":"Fort Mill","ExpirationDate":null,"PriorityOrder":0,"Requirements":"Education \u0026 Experience:? Degree in Computer Science or related field.? Minimum 2 - 5 years of IT experience? Self-starter, able to work independently and in teams.Technical Skills:? Strong understanding of internet architecture.? Skilled in security testing (SAST, DAST, SCA, OWASP Top 10).? Ability to verify vulnerabilities and manual testing.? Familiar with security platforms (Checkmarx, AppScan, Fortify, Veracode, etc.).? Experience with web services, JSON, and API testing.? Conducting vulnerability assessments and communicating security issues.? Proficient in programming (.NET, C, csharp, Java, Python).? Knowledge of OOP concepts and JavaScript (Node, React).? 1-3 years of web development experience (HTML, ASP, ColdFusion, JSP, Node.js, React).? Knowledge of pipeline integration and source code management (Jenkins, GitHub, etc.).? knowledge of relational databases (SQL Server, MySQL).? Ability to write and understand SQL.? Basic knowledge of Azure.","Skills":"? Experience with ServiceNow? Threat modeling in SDLC? Knowledge of cloud computing and DevOps tools (Azure DevOps, Kubernetes, Docker, Chef)? Experience with cloud platforms (AWS, Google, Azure) and cloud security (Wiz, Prisma Cloud).? Machine learning experience? Experience with RPGLE, RPG-FREE application development","Industry":"Security Engineering","Country":"US","Division":"IT","Office":null,"IsRemoteJob":false,"IsInternalJob":false,"ExtraValues":null,"__RecordIndex":0,"__OrdinalPosition":0,"__Timestamp":0,"Status":null,"ApplicantCount":0,"SubmittalCount":0,"ApplicationToHireRatio":0,"JobDuration":null,"SalaryHigh":110000.0000,"SalaryLow":90000.0000,"PayRateOvertime":0,"PayRateStraight":0,"Filled":0,"RemainingOpenings":0,"TotalOpenings":0,"Visa":null,"ClearanceType":null,"IsClearanceRequired":false,"IsHealthcare":false,"IsRemote":false,"EndClient":null,"JobCreatedDate":"\/Date(-62135578800000)\/","JobModifiedDate":"\/Date(-62135578800000)\/"}

Insight Global is seeking an Application Security Analyst to join one of our clients' security team with focus on application security and vulnerability management. The ideal candidate will have... knowledge of standards and practices for securing applications and APIs. This role will participate in efforts to identify, verify, report, and track vulnerabilities within their systems and applications. This role spans multiple domains, including desktop, mobile, web applications, and API infrastructure.Position Responsibilities:? Schedule and perform regular application tests.? Conduct penetration tests on important software and systems.? Test changes before they go live.? Analyze and validate vulnerabilities.? Track and report testing activities.? Present findings to stakeholders.? Maintain dashboards for vulnerabilities.? Improve asset management processes.? Enhance threat modeling.? Review source code and identify duplicates.? Use security testing tools (e.g., Veracode, Burp Suite).? Automate security scans and integrate with CI/CD pipelines.? Collaborate with developers to improve security practices.? Support incident response and investigations.? Perform various security tests (penetration, purple team, red team).We are a company committed to creating inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity employer that believes everyone matters. Qualified candidates will receive consideration for employment opportunities without regard to race, religion, sex, age, marital status, national origin, sexual orientation, citizenship status, disability, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to Human Resources Request Form. The EEOC "Know Your Rights" Poster is available here. To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: https://insightglobal.com/workforce-privacy-policy/ .

Jul 16, 2025

Colorado Springs, CO

|

Security Engineering

|

Contract-to-perm

|

$48 - $60 (hourly estimate)

{"JobID":428604,"JobType":["Contract-to-perm"],"EmployerID":null,"Location":{"Latitude":-104.754363636364,"Longitude":38.8626363636364,"Distance":null},"State":"Colorado","Zip":"80912","ReferenceID":"DEN-795686","PostedDate":"\/Date(1752671800000)\/","Description":"A company in Colorado Springs, CO and Huntsville, AL is looking for a Secret Cyber Threat Emulation Analyst to join their team. This Analyst will perform proactive and reactive cybersecurity duties on customer networks to improve enterprise-wide security, and they will lead cyber events and incident investigations from start to conclusion including data gathering, analysis and reporting. Their responsibilities will include: Collaborate with the Cyberspace Domain Awareness (CDA) to develop evaluation criteria and methodologies, and perform Defensive Cyber Operations (DCO)/Cyber Security Service Provider (CSSP) duties Analyze correlated assets, threat, and vulnerability data against known adversary exploits and techniques to determine impact and improve network defensive posture Support the development, establishment, review and update of DCO procedures, processes, manuals, and other documentation Measure effectiveness of defense-in-depth architecture against known vulnerabilities Generate vulnerability assessment reports for customers and escalate for further review, and create custom dashboards and reports to provide analysis and recommended mediation steps Execute Cyber Threat Emulation (CTE) actions within the approved network zones with the specific adversary tactics, techniques, and procedures (TTPs) documented in each engagement to assess toolset detection and alertingThis position is onsite full-time at Schriever SFB or Redstone Arsenal, and the ideal candidate will quickly adapt to new situations, have a willingness to learn new technologies, and work well in a team environment. The pay rate is $55-63/hr depending on years and level of experience, education, and certifications. This role requires an Active Secret Clearance or higher.We are a company committed to creating inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity employer that believes everyone matters. Qualified candidates will receive consideration for employment opportunities without regard to race, religion, sex, age, marital status, national origin, sexual orientation, citizenship status, disability, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to Human Resources Request Form. The EEOC \"Know Your Rights\" Poster is available here. To learn more about how we collect, keep, and process your private information, please review Insight Global\u0027s Workforce Privacy Policy: https://insightglobal.com/workforce-privacy-policy/ .","Title":"Secret Cyber Threat Emulation Analyst (COS or HSV)","City":"Colorado Springs","ExpirationDate":null,"PriorityOrder":0,"Requirements":"4-6+ years of general (full-time) work experience 2-4+ years of combined experience with: - Performing manual or automated penetration testing in an enterprise environment - Practical experience with vulnerability assessment, cybersecurity frameworks, or conducting risk assessments - Experience performing the full life cycle of incident response and enterprise-level monitoring 1+ year experience in management or leadership in a team environment Current DoD 8570.01-M IAT Level II certification with Continuing Education (CE): CySA+, GICSP, GSEC, Security+ CE, SSCP Have, or obtain within 6 months of start date, a PenTest+ certification Active DoD Secret Security Clearance, or higher","Skills":"Bachelors degree, or higher, in Cybersecurity, Computer Science or related field Experience with Cyber Threat Emulation tools, policies, and procedures Experience operating custom software on top of a Linux platform Experience with security analysis and solutions in a WAN/LAN environment to include Routers, Switches, Network Devices, and Operating Systems (e.g., Windows and Linux) Experience with other Security Operations Centers (SOC)/DCO tools/applications, such as Firewalls, Intrusion Detection Systems / Intrusion Prevention Systems, Network Security Manager, Bluecoat, Barracuda, etc. Experience performing security compliance scans across a WAN (ACAS/Nessus preferred) Background in configuration, troubleshooting, and deployment of host-based security (ESS preferred) Ability to mentor and train personnel in an evolving, high-paced environment Familiarity with DoD Security Operations Centers (SOC) (aka CSSP) Familiarity with DCO/Cybersecurity Service Provider (CSSP)-guiding security policies and procedures Active DoD Top Secret clearance","Industry":"Security Engineering","Country":"US","Division":"Government","Office":null,"IsRemoteJob":false,"IsInternalJob":false,"ExtraValues":null,"__RecordIndex":0,"__OrdinalPosition":0,"__Timestamp":0,"Status":null,"ApplicantCount":0,"SubmittalCount":0,"ApplicationToHireRatio":0,"JobDuration":null,"SalaryHigh":60.0000,"SalaryLow":48.0000,"PayRateOvertime":0,"PayRateStraight":0,"Filled":0,"RemainingOpenings":0,"TotalOpenings":0,"Visa":null,"ClearanceType":null,"IsClearanceRequired":false,"IsHealthcare":false,"IsRemote":false,"EndClient":null,"JobCreatedDate":"\/Date(-62135578800000)\/","JobModifiedDate":"\/Date(-62135578800000)\/"}

A company in Colorado Springs, CO and Huntsville, AL is looking for a Secret Cyber Threat Emulation Analyst to join their team. This Analyst will perform proactive and reactive cybersecurity duties... on customer networks to improve enterprise-wide security, and they will lead cyber events and incident investigations from start to conclusion including data gathering, analysis and reporting. Their responsibilities will include: Collaborate with the Cyberspace Domain Awareness (CDA) to develop evaluation criteria and methodologies, and perform Defensive Cyber Operations (DCO)/Cyber Security Service Provider (CSSP) duties Analyze correlated assets, threat, and vulnerability data against known adversary exploits and techniques to determine impact and improve network defensive posture Support the development, establishment, review and update of DCO procedures, processes, manuals, and other documentation Measure effectiveness of defense-in-depth architecture against known vulnerabilities Generate vulnerability assessment reports for customers and escalate for further review, and create custom dashboards and reports to provide analysis and recommended mediation steps Execute Cyber Threat Emulation (CTE) actions within the approved network zones with the specific adversary tactics, techniques, and procedures (TTPs) documented in each engagement to assess toolset detection and alertingThis position is onsite full-time at Schriever SFB or Redstone Arsenal, and the ideal candidate will quickly adapt to new situations, have a willingness to learn new technologies, and work well in a team environment. The pay rate is $55-63/hr depending on years and level of experience, education, and certifications. This role requires an Active Secret Clearance or higher.We are a company committed to creating inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity employer that believes everyone matters. Qualified candidates will receive consideration for employment opportunities without regard to race, religion, sex, age, marital status, national origin, sexual orientation, citizenship status, disability, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to Human Resources Request Form. The EEOC "Know Your Rights" Poster is available here. To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: https://insightglobal.com/workforce-privacy-policy/ .

1 - 4 of 4