Perform initial triage and analysis of alerts generated by security tools (e.g., SIEM platforms). Conduct forensic analysis of digital artifacts including disk images and log data. Assist with penetrationtesting and vulnerability assessments. Apply remediation measures to detected vulnerabilities and provide security hardening recommendations. Support the deployment and monitoring of firewalls, encryption tools, and other security technologies. More ❯
Perform initial triage and analysis of alerts generated by security tools (e.g., SIEM platforms). Conduct forensic analysis of digital artifacts including disk images and log data. Assist with penetrationtesting and vulnerability assessments. Apply remediation measures to detected vulnerabilities and provide security hardening recommendations. Support the deployment and monitoring of firewalls, encryption tools, and other security technologies. More ❯
POA&Ms, deviation lists, and ensure systems maintain Authority to Operate (ATO). Provide FRCS cybersecurity engineering support and continuous monitoring in accordance with DoD and Army standards. Perform penetrationtesting, threat analysis, and security risk assessments in lab/test environments. Collaborate with stakeholders to improve system hardening, respond to ICS-CERT alerts, and mitigate CAT More ❯
The Senior Cybersecurity Engineer responsibilities involve conducting threat modeling, pinpointing process inefficiencies, and collaborating with both internal and external teams to resolve challenges identified through incident response, assessments, and penetration testing. Coordinate operational and support activities for enterprise-wide security issues encompassing resource allocation and the management of problems and solutions. Additionally, this role involves leading cross-functional initiatives More ❯
You will need to login before you can apply for a job. Employer: CGI Location: United Kingdom Salary: Competitive Closing date: 25 Jun 2025 Sector: IT Job Role: Penetration Tester Job Type: Permanent About CGI Cyber Security Team Our UK Cyber Security Team is one of the largest cybersecurity consultancies in the UK, with around 300 members. We work … provide comprehensive services to our clients, including Risk Assessments, Vulnerability Management, ISO27001 and GDPR compliance, Governance, Risk, and Compliance (GRC), Security Architecture Design and Implementation, Incident Response, Protective Monitoring, PenetrationTesting, and more. Our goal is to enhance our clients' security posture and maturity, ensuring they are confident in their security measures and systems, tailored to their needs. … your chosen direction. Security Clearance Roles are available only if you hold or can obtain a UK Security Clearance. Your Future Duties and Responsibilities We are looking for experienced penetration testers to join our expanding team. CGI has a longstanding reputation in this area, conducting rigorous testing for a variety of clients in both the public and private More ❯
wideopen, north east england, united kingdom Hybrid / WFH Options
CGI
range of areas including Risk Assessments, Vulnerability Management, Accreditations (ISO27001, GDPR), GRC (Governance, Risk, Compliance), Security Architecture Design and Build (technical and Non-technical), Incident Response, Protective Monitoring Services, PenetrationTesting and much more. We take clients through a journey to improve their overall security posture and maturity to ensure they feel reassured in the Security control, measures … go. Our roles are only available if you hold or fulfil the criteria to obtain a UK Security Clearance. Your future duties and responsibilities An opportunity for an experienced penetration testers has become available due to growth, joining the CGI Cyber Security business unit, one of the largest groups of cyber security specialists in the UK. CGI has a … long established reputation in this area, undertaking rigorous testing for a variety of commercial and public sector clients for over 30 years. Experience of the assessment of bespoke applications, cloud technologies and mobile applications (on diverse mobile platforms) would be of an advantage. You would join our established team of penetration testers with the possibility of progressing to More ❯
3+ years of experience in the area of information security engineering, cyber security engineering, or security operations 3+ years of experience with security devices, including firewalls, vulnerability scanners, and penetrationtesting tools 2+ years of experience supporting IAM, security operations and threat response, or security architecture 2+ years of experience with IAM tool CyberArk 1+ years of experience … with requirements, design, implementation, integration, testing, or change management Knowledge of Active Directory or LDAP management, configuration or design, PKI, X509, SSO across multiple domains, 2FA via PIV or CAC, and scripting and coding Ability to obtain a Secret clearance HS diploma or GED Nice If You Have: 2+ years of experience with implementing IAM tools in an enterprise More ❯
like ISO 27001, SOC 2, HITRUST, FedRAMP, and UK Cyber Essentials as applied to cloud SaaS, PaaS, and IaaS operations. Experience building continuous integration/deployment pipelines with robust testing and deployment schedules Experience working with internal customers and translating requests into prioritized work or features Expertise in applying risk identification techniques to develop security solutions Experience and understanding … of cryptographic algorithms, standards, implementation and application Experience and understanding of threat modeling, penetrationtesting, reverse engineering and attacks on software Experience working with large enterprise customers The ideal candidate posseses or has the ability to obtain and maintain a Developed Vetting (DV) clearance. More ❯
Chantilly, VA Full-Time TS/SCI with Poly Onsite Overview Lucayan Technology LLC is seeking a Level 2 Penetration Tester to join our cybersecurity team supporting mission-critical government programs in Chantilly, VA . A Penetration Tester (Pen Tester) is a security professional who reviews and evaluates NRO ISs and recommends changes to the Government that can … improve information confidentiality, integrity, and availability. Pen Testers are also responsible for performing security focused services to improve the security posture of NRO ISs. This role conducts penetrationtesting, vulnerability analysis, and exploitation to strengthen system security. What You'll Do Perform reconnaissance, vulnerability scanning, and penetration testing. Identify common and complex vulnerabilities. Document and report findings More ❯
Operational Technology (OT) Cyber Security Engineer to join their Service and Support team. The role involves designing and securing OT networks across various critical industries, conducting advanced threat analysis, penetrationtesting, and vulnerability assessments. The engineer will develop and implement cybersecurity solutions, lead risk mitigation efforts, mentor junior team members, and support project management and business development activities. More ❯
2025. The Cybersecurity Engineer responsibilities include, but are not limited to: Design, implement, and maintain cybersecurity measures to protect infrastructure from cyber threats. Perform risk assessments, vulnerability assessments, and penetrationtesting to identify and mitigate cyber risks. Develop and manage cybersecurity plans, policies, and procedures to ensure compliance with relevant regulations. Provide subject matter expertise to and advise More ❯
Birmingham, West Midlands, England, United Kingdom
TXP
Identify and remediate vulnerabilities using industry-standard tools Administer and configure security technologies (e.g., firewalls, SIEM, IDS/IPS, endpoint protection) Oversee access controls and identity management systems Conduct penetrationtesting and routine vulnerability scans Monitor networks and systems for threats; lead incident response efforts Perform root cause analysis and maintain incident response protocols Recommend enhancements to improve More ❯
response for security risks and issues raised by SOC teams Manage implementation of logging and SIEM integration for comprehensive monitoring Prioritise and oversee vulnerability remediation across the platform Support penetrationtesting activities and security audits Collaboration & Leadership: Build strong relationships with central security teams and contribute to communities of practice Manage escalations of security-related issues, risks, and More ❯
complex network issues, including those related to encryption, routing, and access control within the CSfC architecture. • Implement and enforce stringent security policies, perform regular security audits, vulnerability assessments, and penetrationtesting to identify and mitigate risks within the CSfC environment. • Maintain comprehensive documentation for network configurations, security procedures, and CSfC compliance, ensuring adherence to NSA, DoD, and other More ❯
critical systems. RESPONSIBILITIES & DUTIES: Design, deploy and manage cloud security architectures in AWS, Azure and/or other commercial or private cloud environments. Conduct risk assessments, vulnerability scans, and penetrationtesting to identify and mitigate security weaknesses. Implement and monitor cloud-native security controls, such as firewall, encryption, IAM policies, and logging/monitoring solutions/Develop and More ❯
with SOC and incident response teams to support real-time cyber defense operations. Identify and analyze malicious activity, trends, and threat actor behavior to inform defensive strategies. Assist in penetrationtesting and uncovering network vulnerabilities. Recommend and implement best practices for securing information systems and infrastructure. Install and configure cybersecurity software and protective measures including firewalls and encryption. More ❯
security architectures for federal aviation systems or other critical infrastructure environments. Familiarity with cloud service providers (AWS, Azure, GCP) and their FAA-compliant security capabilities. Background in incident response, penetrationtesting, or red/blue team exercises. SCA/Union/Intern Rate or Range Details Target Salary Range: $104,000 - $166,000. This represents the typical salary More ❯
and a highly collaborative team. In this position, you will: Provide technical security oversight throughout the system development life-cycle to ensure adherence to security requirements. Support vulnerability assessments, penetrationtesting, and risk analysis to identify and mitigate potential threats. Integrate continuous monitoring and compliance activities into system architectures and operational processes. Collaborate with system architects, developers, and More ❯
complex network issues, including those related to encryption, routing, and access control within the CSfC architecture. • Implement and enforce stringent security policies, perform regular security audits, vulnerability assessments, and penetrationtesting to identify and mitigate risks within the CSfC environment. • Maintain comprehensive documentation for network configurations, security procedures, and CSfC compliance, ensuring adherence to NSA, DoD, and other More ❯
Doncaster, South Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
DFS Furniture Ltd
techniques, and procedures (TTPs) within our environments. Continuously improve security processes, playbooks, and tooling based on real-world lessons 3. Assurance & Vulnerability Management Lead the technical support for our penetrationtesting programme, including sound scoping, engaging with pentesters, and owning the subsequent vulnerability remediation. Develop and implement a technical framework for the deeper assessment and management of Third More ❯
including malware, phishing, and unauthorized access attempts. Document incidents and produce reports for internal stakeholders and governance teams. Threat Prevention & Risk Management Arrange/conduct regular vulnerability assessments and penetration testing. Implement and manage security tools such as firewalls, antivirus, and endpoint detection systems. Collaborate with third-party providers to maintain and enhance cyber resilience capabilities. Policy & Compliance Develop More ❯
Responsibilities Partner with development, operations, and security teams to integrate security protocols seamlessly into the software development lifecycle. Design, build, and maintain CI/CD pipelines incorporating automated security testing, vulnerability assessments, and compliance checks. Develop and manage infrastructure as code (IaC) configurations, ensuring secure and scalable cloud resources and infrastructure. Conduct security assessments, code reviews, and penetrationtesting to identify and resolve application, code, and infrastructure vulnerabilities. Monitor system and application logs to detect and address potential security incidents. Implement and oversee identity and access management (IAM) systems to ensure secure authentication and authorization. Provide secure coding guidance to software engineers and assist in remediating security issues. Lead incident response efforts, investigating and mitigating security … code tools, including Terraform, CloudFormation, or Ansible. Strong scripting skills in languages such as Python and Bash for automation and integration. Proficiency with static code analysis, dynamic application security testing (DAST), and vulnerability scanning tools like Fortify and Acunetix. Knowledge: In-depth understanding of security frameworks (e.g., OWASP, NIST) and best practices for mitigating vulnerabilities. Familiarity with common threat More ❯
Arlington, Virginia, United States Hybrid / WFH Options
Millennium Corporation
and Cobalt Strike) Ability to operate in a critical fashion in dynamic environments Knowledge of FISMA and NIST 800 series standards In-depth knowledge of network mapping, vulnerability scanning, penetrationtesting, and Web Application testing In-depth knowledge of the procedures of Phishing Assessments, Wireless Assessments, Operating System Security Assessments, and Database Assessments Serves as Subject Matter More ❯
expectations. Responsibilities Collaborate with cross-functional teams to integrate robust security measures throughout the software development lifecycle. Design, implement, and manage CI/CD pipelines that include automated security testing, vulnerability scanning, and compliance validation. Develop and maintain infrastructure as code (IaC) configurations to ensure secure, scalable cloud and infrastructure deployments. Conduct comprehensive security assessments, code reviews, and penetrationtesting to identify and mitigate vulnerabilities. Monitor system and application logs for potential security threats and respond to incidents promptly. Implement and oversee identity and access management (IAM) solutions, maintaining secure authentication and authorization processes. Advise software engineers on secure coding practices and assist in addressing security vulnerabilities. Contribute to incident response activities by investigating and mitigating breaches More ❯
solutions. Collaborate with development, operations, and security teams to integrate security practices into the software development lifecycle. Design, implement, and maintain CI/CD pipelines that incorporate automated security testing, vulnerability scanning, and compliance checks. Develop and maintain infrastructure as code (IaC) templates and configurations, ensuring security best practices are applied to cloud resources and infrastructure components. Perform regular … security assessments, code reviews, and penetrationtesting to identify and address vulnerabilities and weaknesses in applications, code, and infrastructure. Monitor and analyze system and application logs to detect and respond to security incidents. Implement and manage identity and access management (IAM) solutions, ensuring appropriate authentication and authorization mechanisms are in place. Collaborate with software engineers to provide guidance … CloudFormation, or Ansible. Strong experience in scripting languages (e.g., Python, Bash) for automation and tool integration. Hands-on experience with security tools for static code analysis, dynamic application security testing (DAST), and vulnerability scanning, using tools such as Fortify, Acunetix, and Prisma Cloud Knowledge of security best practices, common vulnerabilities, and exposure to security frameworks (e.g., OWASP, NIST). More ❯