Mongo, ElasticSearch, and Redis Experience with containerization, including Docker or Podman, or container orchestration, including Swarm or Kubernetes Experience operating with AWS Experience with computer and network security and penetrationtesting Experience with dataflow integration such as Apache NiFi Experience writing source code for new applications or generating and enhancing code samples for existing applications Experience using back … end and front-end languages to develop complete solutions Experience creating and using data models, data structures, data transformations, and data processing pipelines Ability to work with automated testing tools to perform testing and maintenance Clearance: Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information ; TS More ❯
Edinburgh, Scotland, United Kingdom Hybrid / WFH Options
Acumin
and external partners to ensure data integrity and alignment What We’re Looking For: Deep understanding of cybersecurity operations, particularly in CIM and TVM (incident detection, response, patching, and penetrationtesting) Strong analytical and data visualization skills Ability to drive cross-functional collaboration in a geographically distributed environment Proven organizational skills and ability to manage competing priorities Qualifications More ❯
Edinburgh, Midlothian, United Kingdom Hybrid / WFH Options
Red Snapper Recruitment Limited
and external partners to ensure data integrity and alignment What We're Looking For: Deep understanding of cybersecurity operations, particularly in CIM and TVM (incident detection, response, patching, and penetrationtesting) Strong analytical and data visualization skills Ability to drive cross-functional collaboration in a geographically distributed environment Proven organizational skills and ability to manage competing priorities Qualifications More ❯
Edinburgh, City of Edinburgh, United Kingdom Hybrid / WFH Options
Red Snapper Recruitment Limited
and external partners to ensure data integrity and alignment What We're Looking For: Deep understanding of cybersecurity operations, particularly in CIM and TVM (incident detection, response, patching, and penetrationtesting) Strong analytical and data visualization skills Ability to drive cross-functional collaboration in a geographically distributed environment Proven organizational skills and ability to manage competing priorities Qualifications More ❯
network design to GENM-A ISSM for delivery NLT five days of acceptance and approval by the Government. Provide the design and engineering plans to conduct vulnerability assessments, perform penetrationtesting, implement intrusion detection/prevention systems, and configure security policies (firewall rules, access control lists) Required Experience/Qualifications Bachelor's Degree in Cybersecurity, Information Assurance (IA More ❯
Arlington, Virginia, United States Hybrid / WFH Options
ANALYGENCE, Inc
engineering, and integration support for the continued design, development, enhancement, integration, deployment, operations, and sustainment of security supported initiatives. The Cyber Vulnerability Assessment Analyst (SME) is responsible for leading penetrationtesting, developing advanced security scenarios and testing systems against those scenarios, developing advanced security architectures for the implementation of custom countermeasures, provides security considerations to advise system More ❯
improvement. Responsible for the Facility Access Control and CCTV device maintenance with PLSA vendor and ensure they manage approved annual budget allocations. Work with Cyber security to schedule annual PenetrationTesting with outside vendor per government requirements. Additionally, ensure the report is reviewed and reported to upper management. A plan of action plan is created for any/… timeline. The findings and plan of action will be briefed to upper management. Responsible for maintaining alarm system UL certificates in accordance with NISPOM requirements. Ensure semi-annual alarm testing for SCIF environments is performed per regulations. Maintain UL certifications as required by the ICD 705 Tech spec regulation Conduct investigations of theft, damage and criminal activity and coordinate More ❯
computer or information systems design/development/analysis roles. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
general user's guides such as CONOPS, POA&M, Security & Risk Assessment Reports, Continous Monitoring Plans Provide continual updates to support cybersecurity compliance Perform risk assessments, vulnerability assessments, and penetrationtesting to identify and mitigate cyber risks Provide SME support to and advise cybersecurity officials on regulations, projects, tools, etc. resulting in successful program execution Qualifications Required Qualifications More ❯
distribute intelligence reporting to MDA customers. Meeting Support and Exercises: Participate in meetings and working groups to provide cyber threat intelligence support. Support cyber tabletop exercises (CTTXs), cooperative vulnerability penetrationtesting (CVPA), and adversarial assessments (AA). Qualification Requirements: Education: Bachelor's degree in a relevant field such as history, political science, sociology, or other social science disciplines. More ❯
to Methodically Find Faults and perform Root Cause Analysis • Able to evaluate multiple courses of action, achieving goals by non-standard means if necessary • System Regression • Protocol Analysis • Load Testing • Availability and Resilience Optimisation • Lockdowns and Basic PenetrationTesting Technologies • Operating Systems and Virtualisation (Windows and Linux) • Infrastructure as Code and Operational Automation (e.g. Terraform, Ansible) • Message More ❯
Security, Software Engineering, Information Assurance, or Computer Security) Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance and/or system engineering. Must have experience in network or system administration Compensation Range: $73,981.55 - $162,759.42 _ Compensation ranges encompass a More ❯
of secure coding practices and architectures for applications and systems. Responsibilities: • Provide expert technical guidance in the architecture, implementation, and security assessment of secure networks • Guide comprehensive security audits, penetrationtesting, and risk assessments, proactively identifying vulnerabilities and developing sophisticated mitigation strategies • Shape the design and implementation of cutting-edge security solutions, including multi-layered network segmentation and More ❯
Provides expertise in network protection needs assessment, requirements elicitation, security architecture, threat assessment, computer security, communication security, networking, security technologies, hardware and software development, test and evaluation, vulnerability assessment, penetrationtesting, and supply chain risk. Provides input to analyses of alternatives and to requirements, engineering, and risk trade-off analyses to achieve a cost-effective security architectural design More ❯
and the hardware and software that support it all. CNDA Requirements Experience in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, and/or systems engineering. Additionally, CNDAs must have experience in network or system administration. Qualifications Clearance Level TS/SCI level clearance More ❯
Provides expertise in network protection needs assessment, requirements elicitation, security architecture, threat assessment, computer security, communication security, networking, security technologies, hardware and software development, test and evaluation, vulnerability assessment, penetrationtesting, and supply chain risk. Provides input to analyses of alternatives and to requirements, engineering, and risk trade-off analyses to achieve a cost-effective security architectural design More ❯
computer or information systems design/development/analysis roles. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
Huntsville, Alabama, United States Hybrid / WFH Options
Gridiron IT Solutions
and procedures Experience with computer programming languages, including PhP, Python, SQL, C++, Perl, or Java Experience with SIEM and Endpoint tools, including Splunk, Defender, QRadar, and ArcSight Experience with penetrationtesting CEH and Security+ or CSA+ Certification GIAC Cyber Threat Intelligence (GCTI) Certification Clearance: Applicants selected will be subject to a security investigation and may need to meet More ❯
computer or information systems design/development/analysis roles. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
computer or information systems design/development/analysis roles. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
have experience in computer or information systems design/development/analysis roles, which may include: Engineering hardware and/or software Programming Computer/network security Vulnerability analysis Penetrationtesting Computer forensics Information assurance Systems engineering Network and systems administration Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) may be More ❯
Conducts on-site evaluations Validates the security requirements of the information system Verifies and validates that the system meets the security requirements Provides vulnerability assessment of the system Coordinates penetrationtesting Provides a comprehensive verification and validation report (certification report) for the information system Provides process improvement recommendations Assists the Government to draft standards and guidelines for usage More ❯
experience with network exploitation Nice If You Have : Experience with dataflow and signals intelligence architecture Experience with programming languages for scripting and automation, including Python or C++ Experience with penetrationtesting tools Knowledge of ports, protocols, and common network configurations Knowledge of IT logging best practices Network+, Security+, CEH, CCNA, or GPEN Certification Clearance: Applicants selected will be More ❯
as a Recruitment Agency Partner, it is essential and your responsibility to ensure that candidates applying to LSEG are aware of this privacy notice. Similar Jobs (2) Senior Manager, PenetrationTesting locations 2 Locations time type Full time posted on Posted 30+ Days Ago Senior Analyst, Technology and Cyber Security GRC locations London, United Kingdom time type Full More ❯
SOC, SIEM and log management technology). Good knowledge of IAM technologies and services. Good knowledge of Cloud Security Architecture and Technologies. Good knowledge of Cyber Security (Threat Modelling, Penetrationtesting, Risk Management, Cyber Defense Operations, Security Governance, Business resilience). Experience with or having a strong interest in the security of Industrial Control Systems is an extra More ❯