Smyrna, Georgia, United States Hybrid / WFH Options
Crest Security Assurance
Vulnerability Management Analyst Provide support to increase the Cybersecurity Center's ability to manage the cybersecurity risk to systems, assets, data, and agency capabilities through active identification of system/application weaknesses that require remediation and/or mitigation, enabling DoD to focus and prioritize its risk and … vulnerability management efforts in alignment with the needs of the Agency. Work shall be performed in accordance with Chairman of the Joint Chiefs of Staff Manual (CJCSM) 6510.01, NIST SP 800-40, DoDI 8530.01, CJCSM 6510.02, TASKORD 20-020, FRAGO 21 to OPORD 05-01CJCSI 6510.01F, CJCSM 6510.02 … released directives/mandates. Responsibilities: • Ensure routine action is taken to identify and correct vulnerabilities according to the following phases. Vulnerabilities include Information Assurance Vulnerability Management (IAVM) as well as vulnerabilities not be addressed through IAVM directives but affect DoD owned and managed information systems (ISs) and devices: Identify More ❯
Reston, Virginia, United States Hybrid / WFH Options
ICF
M for our customers. We are seeking a Senior Security Engineer to support our Federal customer's CIO Cyber Security organization and manage all vulnerabilityremediation activities, including Binding Operational Directive (BOD) compliance. Responsibilities: Perform Security Impact Analyses on application releases and provide recommendations to federal leadership Perform … software vulnerability scans, interpret the results, and provide vulnerability mitigation recommendations Support and develop analyses of alternatives and decisions on courses of action by providing security insights to project teams and federal leadership Review and provide recommendations on requests for AWS policy changes Work with development teams and … updates to secure coding standards documentation and the ongoing assessment of the customer organization against the NIST Cyber Security Framework Support Information Security Center vulnerability management groups by performing asset inventory, secure configurations and continuous monitoring, tracking and reporting and vulnerability service catalog. Support Vulnerability Management activities More ❯
Huntsville, Alabama, United States Hybrid / WFH Options
Lockheed Martin
Analyst assists users with resolving technical issues with applications, connectivity and other IT related issues. This individual will assist with Information Assurance, performing environmental vulnerability scans, remediation of vulnerabilities and system hardening. They will ensure that all Lockheed Martin assets and software are properly accounted for, managed, and … products, DOORS, Creo, etc.) • Knowledge of Network Protocols (i.e., TCP/IP, DNS, DHCP, LDAP, etc.) • Knowledge of Risk Management Framework (RMF) • Knowledge of vulnerabilityremediation and security management (i.e., system hardening, log management, configuration management (i.e., Nessus, McAfee, WSUS, SCCM, Ivanti, Shavlik, Blade Logic, Splunk, ACAS, SCAP More ❯
Strong troubleshooting abilities in systems, networking, and cloud environments Proven hands-on experience with tools like PAM, EDR, CASB, SIEM, DLP, email filtering , and vulnerability management Proficient in cloud services , especially in environments using virtual machines, identity management, web apps , and networking components (e.g., virtual networks, security groups, load More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
adoption. Evaluate and recommend security technologies, tools, and vendors. Investigate vulnerabilities and implement mitigation actions. Liaise with technology and business teams regarding patching and vulnerability remediation. Develop and maintain cybersecurity engineering dashboards and metrics. Provide tooling support and maintenance for Identity & Access Management, Privileged Access Management, Endpoint Security, and More ❯
implementing security infrastructure including SIEM, WAFs, Firewalls and EDR/AV Working with engineering teams to ensure best practices including secure development, security testing, vulnerabilityremediation and supply chain security Working with DevOps on our Cloud Security Posture, ensure appropriate IAM structures are in place, and review, triage … and remediate (or coordinate remediation of) cloud infrastructure threats and findings Work closely with on Governance, Risk and Compliance to maintain certifications (e.g. ISO 27001), and identify opportunities for automation - improving efficiency and coverage. You may be right for this role if you: Have hands-on experience in one More ❯
/Tier 4 support by analyzing and resolving problems and evaluating alternative means of satisfying user requirements Research, test, and deploy security patches and vulnerabilityremediation changes Provide support for the implementation, troubleshooting and maintenance of complex IT systems Perform automation tasks through scripting and testing Provide follow More ❯
Washington, Washington DC, United States Hybrid / WFH Options
RSCY Consultants, LLC
Entra ID, Intune, VMware, and backup systems. Maintain server health, perform patching, and ensure configurations comply with IT security policies and guidelines. Assist with vulnerabilityremediation and documentation updates. Location: Washington, DC (Hybrid - Onsite and Remote) Clearance Requirement: Must be eligible for a Public Trust Experience: Minimum … and Purview Records Management. Maintain standard configurations and perform updates in accordance with the Change Control Board (CCB) guidelines. Assist in cybersecurity hardening and remediation activities (POA&M items, vulnerability resolution). Support both on-premises and cloud-based systems (including Azure-hosted servers). Maintain documentation, Standard More ❯
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Net Talent
in-depth technical support for the identification, investigation, and resolution of security vulnerabilities and threats Work with internal support teams to advise and guide vulnerabilityremediation , improving organisational resilience Collaborate with the Group and the Information Security Leader to support key security processes and contribute to agreed security … timely response, mitigation, and lessons learned 🧠 Skills & Experience Required Strong background in technical information security, with a focus on security controls, system hardening, and vulnerability management Demonstrated experience managing and operating enterprise-grade security tools and platforms (e.g., SIEM, DLP, endpoint protection, identity & access management) Familiarity with Microsoft security More ❯
include: Security Analysis and Improvement: Continuously analyse our security systems for potential improvements, ensuring that our defences remain at the forefront of cybersecurity practices. Vulnerability Management: Proactively identify, assess, and remediate security vulnerabilities to maintain the integrity and confidentiality of our customer data. Security Automation: Automate security processes and More ❯
Chantilly, Virginia, United States Hybrid / WFH Options
Battelle Memorial Institute
within a network infrastructure to isolate, characterize and categorize network anomalies to help determine root source/root cause. Write reports to document observations, remediation, and recommended actions. Collaborate with other Battelle teams, e.g., simulating adversarial techniques in a lab Ensure pedigree and veracity of data collected. Research emerging More ❯
logging is being collected and analyzed and relevant security alerts are being generated. Automate processes to reduce manual task delivery and enhance process delivery. Vulnerability Management Collaborate with IT and development teams to detect and remediate vulnerabilities across the enterprise in alignment with defined SLAs. Understand current and emerging … . Knowledge of security frameworks and regulatory compliance standards (NIST CSF, SOX ITGC, GDPR, MITRE ATT&CK, etc.) Experience with common industry SIEM and vulnerability management platforms. Experience maintaining the Microsoft Defender platform and other Microsoft security products. Ability to rank and prioritize vulnerabilities and security recommendations appropriately within More ❯
City of London, Greater London, United Kingdom Hybrid / WFH Options
Deltra Group
Strong troubleshooting abilities in systems, networking, and cloud environments Proven hands-on experience with tools like PAM, EDR, CASB, SIEM, DLP, email filtering, and vulnerability management Proficient in cloud services, especially in environments using virtual machines, identity management, web apps, and networking components (e.g., virtual networks, security groups, load More ❯
architecture, technical standards, technical controls, security solutions, guidelines, procedures, and other elements necessary to maintain security posture. Responsible for assessing information risk and facilitating remediation of identified vulnerabilities & risks across the organization. Accountable for coordinating the execution of security measures to protect our computer infrastructure, information systems and to … detect, mitigate, and analyze threats. Works closely with other teams to develop controls such as firewalls, business systems, data leakage protection systems, patching, encryption, vulnerability scanning, application code scanning, remediation as well as defining configuration for a variety of security tools. Prior experience in an international enterprise environment … delivery is on-time, within budget, and adopted to meet the company's information protection requirements. Perform or coordinate internal security assessments, penetration tests, vulnerability scans, and assess organization cybersecurity maturity complying with frameworks and regulations such as COBIT, NIST (800-53, cybersecurity), ISO, ITIL, PCI, GLBA, GDPR, HIPAA More ❯
london, south east england, united kingdom Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetration testing reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate SOC/… supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The … job holder will work very closely with all third-party vendors involved in the remediation process. The job holder will also prepare the necessary MI/Dashboard reports for the relevant stakeholders and alleviate the workload of the IT Service desk function when required. The primary responsibilities of the More ❯
Crawley, Sussex, United Kingdom Hybrid / WFH Options
Thales Group
in Windows desktop operating system deployment and management. Experience with Microsoft SCCM, including task sequence creation and management. Strong understanding of security patching and vulnerability management. Experience in capacity planning and resource optimisation. Knowledge of thin client technologies and management platforms. Experience in troubleshooting virtual desktop performance issues and More ❯
Arlington, Virginia, United States Hybrid / WFH Options
ANALYGENCE, Inc
Job Description ANALYGENCE is seeking an experienced Cyber Vulnerability Assessment Analyst (SME) to supportour federal customer who plays a key role in enhancing the security, resiliency, and reliability of the nation's cyber and communications infrastructure. This role directly supports the customer Mission Engineering (ME) Information Security Branch (ISB … providing programmatic, technical, engineering, and integration support for the continued design, development, enhancement, integration, deployment, operations, and sustainment of security supported initiatives. The Cyber Vulnerability Assessment Analyst (SME) is responsible for leading penetration testing, developing advanced security scenarios and testing systems against those scenarios, developing advanced security architectures for … of custom countermeasures, provides security considerations to advise system engineering teams with the objective to reduce errors, flaws, and weaknesses that may constitute security vulnerability, performing advanced code analysis, and performing advanced protocol analysis for nation-state and state-sponsored cyber threat actor capabilities. The current team member work More ❯
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetration testing reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate SOC/… supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The … job holder will work very closely with all third-party vendors involved in the remediation process. The job holder will also prepare the necessary MI/Dashboard reports for the relevant stakeholders and alleviate the workload of the IT Service desk function when required. The primary responsibilities of the More ❯
london, south east england, united kingdom Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetration testing reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate SOC/… supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The … job holder will work very closely with all third-party vendors involved in the remediation process. The job holder will also prepare the necessary MI/Dashboard reports for the relevant stakeholders and alleviate the workload of the IT Service desk function when required. The primary responsibilities of the More ❯
/IPS configurations Establishing and implementing security 'best-practice' standards as well as departmental policies and procedures Responsible for Security scanning and the efficient remediation of vulnerabilities Responsible for analysing all security incidents to determine root cause Determine, recommend, and implement upgrade security measures and controls Delivery security responses More ❯
Huntsville, Alabama, United States Hybrid / WFH Options
Dark Wolf Solutions
networks, security monitoring, tuning and management of IT security systems and applications, incident response, digital forensics, loss prevention, and eDiscovery actions. Conducting risk and vulnerability assessment at the network, system and application level. Conducting threat modeling exercises. Developing and implementing security controls and formulating operational risk mitigations along with More ❯
OpenShift) Infrastructure-as-Code (Terraform, Ansible, Crossplane) Container orchestration, networking, and automation (Kubernetes, Docker) Scripting (Bash, Powershell, Python) Programming languages (Golang, Java, Ruby, Python) Vulnerabilityremediation and mitigation tools (BlackDuck, Snyk) We value your ability to adapt over deep specialization. In addition, we're currently seeking folks with More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Container Solutions
OpenShift) Infrastructure-as-Code (Terraform, Ansible, Crossplane) Container orchestration, networking, and automation (Kubernetes, Docker) Scripting (Bash, Powershell, Python) Programming languages (Golang, Java, Ruby, Python) Vulnerabilityremediation and mitigation tools (BlackDuck, Snyk) We value your ability to adapt over deep specialization. In addition, we're currently seeking folks with More ❯
Role: Deliver security engineering across network, cloud, and endpoint infrastructure Support detection, response, and threat modelling Help mature identity & access management controls Lead on vulnerabilityremediation and risk assessments Act as SME in cross-functional projects involving security tooling & design What You Need: ✔ Proven experience in senior security More ❯