Submitting more applications increases your chances of landing a job.

Here’s how busy the average job seeker was last month:

Opportunities viewed

Applications submitted

Keep exploring and applying to maximize your chances!

Looking for employers with a proven track record of hiring women?

Click here to explore opportunities now!
We Value Your Feedback

You are invited to participate in a survey designed to help researchers understand how best to match workers to the types of jobs they are searching for

Would You Be Likely to Participate?

If selected, we will contact you via email with further instructions and details about your participation.

You will receive a $7 payout for answering the survey.


https://bayt.page.link/Vg9s8sfDaU5YfC6W6
Back to the job results

Information Security Vulnerability Analyst

30+ days ago 2026/04/08
Other Business Support Services
Create a job alert for similar positions
Job alert turned off. You won’t receive updates for this search anymore.

Job description

  • Analyze organization's cyber defense policies and configurations and evaluate compliance with regulations and organizational directives.
  • Maintain deployable cyber defense audit toolkit (e.g., specialized cyber defense software and hardware) to support cyber defense audit missions.
  • Maintain knowledge of applicable cyber defense policies, regulations, and compliance documents specifically related to cyber defense auditing.
  • Prepare audit reports that identify technical and procedural findings and provide recommended remediation strategies/solutions.
  • Perform technical (evaluation of technology) and nontechnical (evaluation of people and operations) risk and vulnerability assessments of relevant technology focus areas (e.g., local computing environment, network and infrastructure, enclave boundary, supporting infrastructure, and applications).
  • Follow the day-to-day operations related to own jobs in the department to ensure continuity of work

Requirements
  • Bachelor’s degree or higher in Computer Science, Engineering, or any other related field.  
  • Experience with a variety of operating systems including Windows, Linux or UNIX, CEH, CISSP, well known protocols and services (FTP, HTTP, SSH, SMB) preferred
  • Packet Analysis Tools.
  • Skill in conducting vulnerability scans and recognizing vulnerabilities in security systems
  • Skill in the use of penetration testing tools and techniques.
  • Skill in using network analysis tools to identify vulnerabilities

This job post has been translated by AI and may contain minor differences or errors.

You’ve reached the maximum limit of 15 job alerts. To create a new alert, please delete an existing one first.
Job alert created for this search. You’ll receive updates when new jobs match.
Are you sure you want to unapply?

You'll no longer be considered for this role and your application will be removed from the employer's inbox.