Find Your Perfect Job

Job Search Results for vulnerability management analyst

Sort and Filter  | 2 Results for vulnerability management analyst  | Save This Search

Dec 01, 2025

Los Alamitos, CA

|

Security Engineering

|

Contract

|

$24 - $30 (hourly estimate)

{"JobID":472124,"JobType":["Contract"],"EmployerID":null,"Location":{"Latitude":-118.06,"Longitude":33.79,"Distance":null},"State":"California","Zip":"90720","ReferenceID":"OCC-a4342739-4298-4af8-9968-9c91c1f706c0","PostedDate":"\/Date(1764621917000)\/","Description":"The Information Security Analyst will be tasked with monitoring and identifying organizational security risks, detecting attack methods and sources, and preserving electronic evidence when required. This role requires expertise in analyzing, recommending, designing, implementing, and maintaining systems and processes that safeguard business and client data. Core responsibilities include conducting risk assessments, performing security analyses, and creating remediation strategies. The individual should be capable of working independently while contributing to security programs as part of the incident response team. Strong written communication skills are essential for preparing formal reports. Professional fluency in English and Portuguese is required. This is an onsite position in Brazil, five days per week, offered as a 6?12 month contract with potential for extension or conversion to a full-time role.Responsibilities but not limited to:? IT Security Administration: Focus on minimizing downtime and ensuring scalability by addressing security risks across systems and networks.? Application Security Alignment: Guarantee that security architecture, designs, plans, controls, and policies comply with IT standards and overall security requirements.? Documentation: Develop and maintain detailed records for all security systems and networks, updating documentation whenever changes occur.? Project Participation: Contribute to initiatives and projects centered on information security.? Program Support: Assist with implementing, maintaining, and monitoring the information security program, including gap analysis, risk assessments, third-party evaluations, procedure development, recurring processes, and incident response.? Solution Deployment: Handle integration, initial configuration, and upgrades of new and existing security solutions following industry best practices.? Operating Systems Expertise: Demonstrate advanced knowledge of Linux, Windows, and OS X environments.? Cloud Security: Apply experience in securing cloud infrastructures such as AWS and Azure.? Vulnerability Management: Lead efforts to identify and remediate security weaknesses in networks and systems, providing technical guidance and support.? Policy Development: Create, implement, and maintain internal procedures to safeguard data and manage incident response effectively.? Collaboration: Work with project teams and system architects to design secure systems and project plans that meet established security standards.? Threat Awareness: Stay informed on current and emerging security threats and design architectures to mitigate potential risks.We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to HR@insightglobal.com.To learn more about how we collect, keep, and process your private information, please review Insight Global\u0027s Workforce Privacy Policy: https://insightglobal.com/workforce-privacy-policy/.","Title":"Information Security Analyst? INTL Brazil","City":"Los Alamitos","ExpirationDate":null,"PriorityOrder":0,"Requirements":"? Knowledge with Security solutions: SIEM, IAM, PAM, EDR/XDR, CSAM, CASB, Proxies, ZTNA? Solid security understanding with Microsoft security controls (AD, Entra, O365, Intune MDM, etc)? Minimum 7+ years of experience in information technology security or equivalent combination of education and experience ? Security+, CISSP, CISA or SANS GIAC certification ? Understanding of application, network, operating system, and core infrastructure security concepts.? Knowledge on security monitoring tools such as UTM, IPS, IDS and other security appliances? Project management, organizational and prioritizing skills? Understanding of WAN, MPLS, and technologies such as VoIP beneficial? Working knowledge of common information technology management frameworks such as ISO/IEC 27001, ITIL, COBIT, and NIST","Skills":"","Industry":"Security Engineering","Country":"US","Division":"IT","Office":null,"IsRemoteJob":false,"IsInternalJob":false,"ExtraValues":null,"__RecordIndex":0,"__OrdinalPosition":0,"__Timestamp":0,"Status":null,"ApplicantCount":0,"SubmittalCount":0,"ApplicationToHireRatio":0,"JobDuration":null,"SalaryHigh":30.0000,"SalaryLow":24.0000,"PayRateOvertime":0,"PayRateStraight":0,"Filled":0,"RemainingOpenings":0,"TotalOpenings":0,"Visa":null,"ClearanceType":null,"IsClearanceRequired":false,"IsHealthcare":false,"IsRemote":false,"EndClient":null,"JobCreatedDate":"\/Date(-62135578800000)\/","JobModifiedDate":"\/Date(-62135578800000)\/"}

The Information Security Analyst will be tasked with monitoring and identifying organizational security risks, detecting attack methods and sources, and preserving electronic evidence when required.... This role requires expertise in analyzing, recommending, designing, implementing, and maintaining systems and processes that safeguard business and client data. Core responsibilities include conducting risk assessments, performing security analyses, and creating remediation strategies. The individual should be capable of working independently while contributing to security programs as part of the incident response team. Strong written communication skills are essential for preparing formal reports. Professional fluency in English and Portuguese is required. This is an onsite position in Brazil, five days per week, offered as a 6?12 month contract with potential for extension or conversion to a full-time role.Responsibilities but not limited to:? IT Security Administration: Focus on minimizing downtime and ensuring scalability by addressing security risks across systems and networks.? Application Security Alignment: Guarantee that security architecture, designs, plans, controls, and policies comply with IT standards and overall security requirements.? Documentation: Develop and maintain detailed records for all security systems and networks, updating documentation whenever changes occur.? Project Participation: Contribute to initiatives and projects centered on information security.? Program Support: Assist with implementing, maintaining, and monitoring the information security program, including gap analysis, risk assessments, third-party evaluations, procedure development, recurring processes, and incident response.? Solution Deployment: Handle integration, initial configuration, and upgrades of new and existing security solutions following industry best practices.? Operating Systems Expertise: Demonstrate advanced knowledge of Linux, Windows, and OS X environments.? Cloud Security: Apply experience in securing cloud infrastructures such as AWS and Azure.? Vulnerability Management: Lead efforts to identify and remediate security weaknesses in networks and systems, providing technical guidance and support.? Policy Development: Create, implement, and maintain internal procedures to safeguard data and manage incident response effectively.? Collaboration: Work with project teams and system architects to design secure systems and project plans that meet established security standards.? Threat Awareness: Stay informed on current and emerging security threats and design architectures to mitigate potential risks.We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to HR@insightglobal.com.To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: https://insightglobal.com/workforce-privacy-policy/.

Oct 23, 2025

Colorado Springs, CO

|

Software Engineering

|

Perm

|

$50 - $62 (hourly estimate)

{"JobID":458008,"JobType":["Perm"],"EmployerID":null,"Location":{"Latitude":-104.76,"Longitude":38.86,"Distance":null},"State":"Colorado","Zip":"80912","ReferenceID":"DEN-5dab47d3-b0e8-48c3-8fa1-8de764463254","PostedDate":"\/Date(1761252431000)\/","Description":"A client of Insight Global\u0027s is looking for a Secret Mid-Level Cyber Threat Emulation Analyst, to join their team! This position will play a key role in supporting the Missile Defense Agency (MDA). Job Responsibilities:- Perform proactive and reactive cybersecurity duties on customer networks to strengthen enterprise-wide security posture.- Analyze assets, threats, and vulnerabilities to identify weaknesses and enhance network defenses; measure effectiveness of defense-in-depth architecture.- Develop, review, and update Defensive Cyber Operations (DCO) procedures, processes, manuals, and related documentation.- Generate vulnerability assessment reports, escalate findings, and support enterprise-wide incident response in compliance with DoD regulations; lead cyber events and investigations from start to finish.- Execute Cyber Threat Emulation (CTE) actions using automated validation tools; create dashboards and reports detailing vulnerabilities, remediation steps, and security posture assessments.- Draft and submit Cyber Tasking Orders (CTOs) to address issues identified during CTE engagements; implement Higher Headquarters Tasking Orders (HHQ) and Fragmentary Orders as directed.- Mentor and train analysts at all levels; collaborate with Cyberspace Domain Awareness (CDA) to develop evaluation criteria and methodologies aligned with HHQ and industry best practices.This position is onsite full-time in Colorado Springs, CO or Huntsville, Alabama. This is a six month contract to hire opportunity and the salary range for this role is between $120,000 - $132,000/yr depending on years and level of experience, education, and certifications. This role requires an Active Secret Clearance or higher. Typical benefits offered include flexible work schedules, educational reimbursement, retirement benefits (401K match), employee stock purchase plan, health benefits, tax saving options, disability benefits, life and accident insurance, voluntary benefits, paid time off and paid holidays, and parental leave.We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to HR@insightglobal.com.To learn more about how we collect, keep, and process your private information, please review Insight Global\u0027s Workforce Privacy Policy: https://insightglobal.com/workforce-privacy-policy/.","Title":"Secret Mid-Level Cyber Threat Emulation Analyst","City":"Colorado Springs","ExpirationDate":null,"PriorityOrder":0,"Requirements":"- DoD Secret Security Clearance (Top Secret Preferred)- DoD 8570.01-M IAT Level II certification with Continuing Education (CE) - (CySA+, GICSP, GSEC, Security+ CE, SSCP) - 6+ years of general work experience- 4 years of experience directly related to: ? Performing manual or automated penetration test in an enterprise environment ? Practical experience with vulnerability assessment, cybersecurity frameworks, or conducting risk assessments? Experience performing the full life cycle of incident response and enterprise-level monitoring - 1+ years of management or leadership experience in a team environment- Currently hold, or obtain within 6 months of start date, a PenTest+ certification","Skills":"- Bachelor?s degree, or higher, in Cybersecurity, Computer Science or related field - Experience working with Cyber Threat Emulation tools, policies, and procedures- Experience operating custom software on top of a Linux platform - Experience with security analysis and solutions in a WAN/LAN environment to include Routers, Switches, Network Devices, and Operating Systems (e.g., Windows, and Linux) - Experience with other Security Operations Centers (SOC)/DCO tools/applications, such as Firewalls, Intrusion Detection Systems / Intrusion Prevention Systems, Network Security Manager, Bluecoat, Barracuda, etc. - Experience performing security compliance scans across a WAN (ACAS/Nessus preferred)- Background in configuration, troubleshooting, and deployment of host-based security (ESS preferred) - Experience mentoring and training personnel in an evolving, high-paced environment - Familiarity with DoD Security Operations Centers (SOC) (aka CSSP) and DCO/Cybersecurity Service Provider (CSSP)-guiding security policies and procedures","Industry":"Software Engineering","Country":"US","Division":"IT","Office":null,"IsRemoteJob":false,"IsInternalJob":false,"ExtraValues":null,"__RecordIndex":0,"__OrdinalPosition":0,"__Timestamp":0,"Status":null,"ApplicantCount":0,"SubmittalCount":0,"ApplicationToHireRatio":0,"JobDuration":null,"SalaryHigh":62.0000,"SalaryLow":49.6000,"PayRateOvertime":0,"PayRateStraight":0,"Filled":0,"RemainingOpenings":0,"TotalOpenings":0,"Visa":null,"ClearanceType":null,"IsClearanceRequired":false,"IsHealthcare":false,"IsRemote":false,"EndClient":null,"JobCreatedDate":"\/Date(-62135578800000)\/","JobModifiedDate":"\/Date(-62135578800000)\/"}

A client of Insight Global's is looking for a Secret Mid-Level Cyber Threat Emulation Analyst, to join their team! This position will play a key role in supporting the Missile Defense Agency (MDA).... Job Responsibilities:- Perform proactive and reactive cybersecurity duties on customer networks to strengthen enterprise-wide security posture.- Analyze assets, threats, and vulnerabilities to identify weaknesses and enhance network defenses; measure effectiveness of defense-in-depth architecture.- Develop, review, and update Defensive Cyber Operations (DCO) procedures, processes, manuals, and related documentation.- Generate vulnerability assessment reports, escalate findings, and support enterprise-wide incident response in compliance with DoD regulations; lead cyber events and investigations from start to finish.- Execute Cyber Threat Emulation (CTE) actions using automated validation tools; create dashboards and reports detailing vulnerabilities, remediation steps, and security posture assessments.- Draft and submit Cyber Tasking Orders (CTOs) to address issues identified during CTE engagements; implement Higher Headquarters Tasking Orders (HHQ) and Fragmentary Orders as directed.- Mentor and train analysts at all levels; collaborate with Cyberspace Domain Awareness (CDA) to develop evaluation criteria and methodologies aligned with HHQ and industry best practices.This position is onsite full-time in Colorado Springs, CO or Huntsville, Alabama. This is a six month contract to hire opportunity and the salary range for this role is between $120,000 - $132,000/yr depending on years and level of experience, education, and certifications. This role requires an Active Secret Clearance or higher. Typical benefits offered include flexible work schedules, educational reimbursement, retirement benefits (401K match), employee stock purchase plan, health benefits, tax saving options, disability benefits, life and accident insurance, voluntary benefits, paid time off and paid holidays, and parental leave.We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to HR@insightglobal.com.To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: https://insightglobal.com/workforce-privacy-policy/.

1 - 2 of 2