Gathering your results ...
26 days
Not Specified
Not Specified
Not Specified
<p>Independently handle assignments that require foundational knowledge of security technologies and processes while developing business expertise. Work closely with peers and experienced team members to strengthen cyber threat management practices. Take direction, contribute to team processes, and continuously learn while establishing relationships within the security domain. Apply sound judgment within established cyber threat management processes and procedures to assess and respond to security incidents and tasks. Identify and recommend efficiency improvements within the team and related peer teams to enhance cyber threat management. Contributes to process development. 1+ years relevant experience and must have graduated within the past 12 months, or will be graduating by Spring 2026, with a Bachelor's or Master's degree in Computer Science, Information Security or related field from an accredited college or university. Reproduce reported vulnerabilities using tools such as Burp Suite, Nuclei or custom scripts. Engage with external researchers to request clarifications, verify details, and provide feedback when needed. Evaluate severity and impact of findings based on industry standards like CVSS. Collaborate with internal teams to verify exploitability, confirm scope, and facilitate remediation efforts. Maintain detailed triage documentation, metrics, and SLAs for incoming reports. Contribute to continuous improvement of triage workflows, automation scripts, and internal vulnerability tracking processes. Support creation of standard operating procedures and knowledge base for triage and validation. Stay up to date with emerging attack techniques, vulnerability classes, and researcher trends. Contribute to internal tooling and dashboards used for vulnerability identification, tracking or classification. Strong understanding of web and API security fundamentals, including authentication, session management, access control, and injection flaws etc. Understanding of network security concepts and scanning tools. Scripting and automation skills (Python equivalent). Familiarity with vulnerability frameworks and databases (OWASP Top 10, CVE, CWE). Bug bounty hunter; CTF player and active involvement in the information security community (conferences, blogs, or meetups) This is a Recent Graduate Full-Time position. Must have graduated within the past 12 months, or will be graduating by Spring 2026, with a Bachelor's or Master's degree in Computer Science, Information Security or related field from an accredited college or university.</p>
POST A JOB
It's completely FREE to post your jobs on ZiNG! There's no catch, no credit card needed, and no limits to number of job posts.
The first step is to SIGN UP so that you can manage all your job postings under your profile.
If you already have an account, you can LOGIN to post a job or manage your other postings.
Thank you for helping us get Americans back to work!
It's completely FREE to post your jobs on ZiNG! There's no catch, no credit card needed, and no limits to number of job posts.
The first step is to SIGN UP so that you can manage all your job postings under your profile.
If you already have an account, you can LOGIN to post a job or manage your other postings.
Thank you for helping us get Americans back to work!