NewGen is seeking a Computer Network Defense VulnerabilityAssessment Specialist with the following background. Responsibilities - Developing and executing the organization's continuous vulnerabilityassessment strategy. - Measuring the effectiveness of defense-in-depth mechanisms against vulnerabilities and developing recommendations to remediate systemic security issues. - Configuring, operating, maintaining, and evaluating the effectiveness of vulnerability scanning and assessment … Assessing the level of risk introduced by vulnerabilities and developing remediation strategies. - Investigating and analyzing cybersecurity incidents to ensure the appropriate response activities and mitigations are applied. - Distributing periodic vulnerabilityassessment reports, summaries, notifications, and an annual vulnerabilityassessment scorecard to CIO leadership and IT stakeholders. - Developing and maintaining documentation as it pertains to the use … and operation of vulnerabilityassessment tools and methodologies (SOPs, assessment plants, test plants, etc.). Qualifications - 7+ years' experience as a cybersecurity analyst, administrator, or engineer responsible for Enterprise vulnerability management toolsets (e.g., ACAS, Tenable, Nessus, Rapid7, AppSpider, SCAP, STIG Viewer, etc.). - Demonstrated proficiency and expertise in the following areas: - Applying computer networking concepts, protocols More ❯
inquiries with internal and external organizations/agencies, and tracking test capability completion. Will also assist with writing test plans, test reports, and help guide Mission Based Cyber Risk Assessment (MBCRA) through execution. Required Skills: Due to the sensitivity of customer related requirements, U.S. Citizenship is required. Bachelor's Degree in Computer Science, Information Systems or related field plus … and Special Access Program (SAP) eligible. The TS security clearance must have been completed within the past 5 years. Minimum of three years of experience conducting cybersecurity test or assessment, consisting of MBCRA, Cybersecurity Table Top analysis, Cyber Vulnerability Identification (CVI), Cooperative Vulnerability and Penetration Assessment (CVPA), or Adversarial Assessment (AA) or 5 years' experience … in Highly Adaptive Cybersecurity Services, which are High Value Asset Assessment, Risk and VulnerabilityAssessment, Cyber Threat Hunt, Incident Response and Penetration Testing, in a DoD or government acquisition system. DoD 8140 Baseline Level 2 Information Assurance Technical (IAT) Certification is required. Knowledge and previous experience with cybersecurity; information assurance; full spectrum cyberspace operations; air operations centers More ❯
effectively across teams. What you'll do: Develop and implement proactive security strategies, policies, and procedures to protect our systems, networks, and data assets. Lead regular security assessments, including vulnerability scans and penetration tests, identifying risks and driving remediation efforts. Monitor infrastructure for security incidents or unauthorised activity, responding swiftly to mitigate potential threats. Investigate security breaches and incidents … the threat landscape, ideally in fintech environments. Hands-on expertise with security technologies, including firewalls, intrusion detection/prevention systems (IDS/IPS), SIEM, antivirus solutions, encryption mechanisms, and vulnerabilityassessment tools. Hands-on experience in security tools (e.g., SAST, DAST, OWASP ZAP). Relevant security certifications, such as Security+, IAT II/III level, or equivalent. Strong … capability in risk assessment, vulnerability management, and data informed decision -making. Solid understanding of incident response procedures, including containment, eradication, and recovery from cybersecurity events. Advanced proficiency in AWS, with experience in multi-region and hybrid cloud architectures Strong grasp of networking protocols, including TCP/IP, and core network security principles. Proficiency in scripting and programming (i.e. More ❯
that protection and detection capabilities are acquired or developed using the IS security engineering approach and are consistent with organization-level cybersecurity architecture. • Participate in an information security risk assessment during the Security Assessment and Authorization process. • Participate in the development or modification of the computer environment cybersecurity program plans and requirements. • Recognize a possible security violation and … Authorize documentation required to achieve an Authority to Operate (ATO). Prepare and maintain information systems ATO record on the Navy's Enterprise Mission Assurance Support Service (eMASS) • Run vulnerabilityassessment tools; ACAS vulnerability scanner, Security Content Automation Protocol (SCAP), STIG Viewe • Manage system/network vulnerabilities using the Vulnerability Remediation and Assets Manager (VRAM) Qualifications More ❯
Senior Vulnerability Analyst £50,000 - £57,000 + bonus and extensive benefits Full Time/Permanent West Midlands/Hybrid - 1-2 days a month in the office on average The Role and Company: I am looking for a driven Senior Vulnerability Analyst to join a large nationally recognised brand head quartered in the West Midlands. As a … Senior Vulnerability Analyst you will be joining a highly skilled Cyber Defence team. As a key part if this team you will manage threats to the organisation and safeguard systems that enable the business to function safely and effectively. We are ideally looking for someone Midlands based who can be on site in Warwickshire 1-2 days a month … on average. Responsibilities: Conducting regular vulnerability assessments using automated scanning tools, manual testing techniques, and security best practices to identify vulnerabilities in systems, networks, and applications Managing the lifecycle of vulnerabilities from discovery to remediation, including vulnerability triage, prioritisation, tracking, and reporting Analysing the impact and severity of identified vulnerabilities based on factors such as the likelihood of More ❯
Clearance Status: Must be Current JOB DESCRIPTION: Inferno Systems is currently looking for Penetration Tester positions with a minimum of 7+ years experience conducting technical security and/or vulnerability assessments. Please note the security clearance requirement above: candidates MUST have a current/active TS/SCI with Full Scope Poly to be considered. JOB SUMMARY: We are … law enforcement agencies. You should be able to use sophisticated techniques to identify vulnerabilities, exploit them, and gain and maintain access to targets. You will be performing offensive-like vulnerability assessments against network systems and IT infrastructure. You will identify weaknesses and recommend mitigation steps. You will draft assessment reports for review by senior management to implement your … computing environment and cloud security. • Demonstrated real world experience performing gray and black box penetration testing. • Strong familiarity with some of the following: OWASP top 10, DoD and NSA Vulnerability and Penetration Testing Standards. • Understanding of basic IP fundamentals and how protocols work • Ability to inspect and analyze new applications and traffic flows with the capability of breaking down More ❯
is a critical thinker with a strong technical background and a passion for safeguarding systems and data. Key Responsibilities: • Monitor, detect, and respond to security threats and incidents. • Conduct vulnerability assessments and risk mitigation. • Ensuring security updates are current across all systems • Implement and manage security tools (e.g., SIEM , endpoint protection). • Monitor for compliance with security standards such More ❯
East London, London, United Kingdom Hybrid / WFH Options
Client Server
Vulnerability Management Engineer London/WFH to £75k Are you a tech savvy Vulnerability Management Engineer with a broad range of security knowledge? You could be progressing your career at a global, hugely profitable, Investment Management firm. As a Vulnerability Management Engineer you'll perform assessments and communicate findings to stakeholders on the probability of exploitation and … day a week. About you: You have experience in a similar position with knowledge of common cyber attack types such as DDoS, SQLi, XSS, etc. You have experience with vulnerabilityassessment software and prioritisation of results using a combination of various frameworks tied to internal objects (CVE, CVSS, EPSS, etc.). You have experience of assessing, documenting and … AWS You have a background with network security or secure code development You're collaborative and pragmatic with great communication skills What's in it for you: As a Vulnerability Management Engineer you can expect to earn a competitive package: Salary to £75k Significant bonus Pension (15% employer contribution) Private Health, Dental and Optical care Life Assurance and Income More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Client Server Ltd
Vulnerability Management Engineer London/WFH to £75k Are you a tech savvy Vulnerability Management Engineer with a broad range of security knowledge? You could be progressing your career at a global, hugely profitable, Investment Management firm. As a Vulnerability Management Engineer you'll perform assessments and communicate findings to stakeholders on the probability of exploitation and … day a week. About you: You have experience in a similar position with knowledge of common cyber attack types such as DDoS, SQLi, XSS, etc. You have experience with vulnerabilityassessment software and prioritisation of results using a combination of various frameworks tied to internal objects (CVE, CVSS, EPSS, etc.). You have experience of assessing, documenting and … AWS You have a background with network security or secure code development You're collaborative and pragmatic with great communication skills What's in it for you: As a Vulnerability Management Engineer you can expect to earn a competitive package: Salary to £75k Significant bonus Pension (15% employer contribution) Private Health, Dental and Optical care Life Assurance and Income More ❯
Squadron (26NOS) is searching for qualified candidates for a position of Junior or Mid-Level ACAS Systems Operator I or II (depends upon experience). Seeking an individual for vulnerabilityassessment analysis and administration role with cybersecurity oriented principles to protect and defend information systems and networks. If you are seeking a challenging place to work, please review … the qualifications, a candidate may still be considered depending on your level of experience. Duties & Responsibilities: • Operates the security and compliance baseline configuration, inventory, and best practices for the vulnerability management solution (VMS) deployed across multiple unclassified and classified network locations supporting the implementation for Tenable products within Assured Compliance Assessment Solution (ACAS) including .SC (SecurityCenter ) and Nessus … Internet Protocol (IP) Router Network (NIPRNet, SIPRNet) environment for all ACAS implementations • Responsible for acquiring, configuring and ensuring external deliverables: DISA/Continuous Monitoring and Risk Scoring (CMRS), importing vulnerability and security audit plug-ins, DoD Patch Repository Defense Asset Distribution System (DADS), build/maintain vulnerability and audit repositories • Assist mapping scan zones, scanners, subnets to include More ❯
The Security Engineer III participates in all aspects of information systems and network security including intrusion detection, incident response, vulnerabilityassessment, application security and compliance with the corporate information security policy. Primarily be responsible for implementing, operating and improving security technologies including DLP, Antivirus, IPS/IDS, End Point Protection, Database Activity Monitoring, Web Application Firewall and processes. … schedule - Implement changes to our security technologies/infrastructure in accordance with standard and change control policies/procedures - Evaluate, implement, tune and operate Security Solutions such as IPS, Vulnerability scanning tools, encryption capabilities, etc. - Monitor and recommend improvements of security technologies and their various reports - Risk Management/Security Audit/Assessment Support/Ad-hoc support … Support security audit/assessment related activities and compliance reviews# - Performs other task, duties and projects as assigned - Provide Ad-hoc support as required. Job Requirements - Bachelor's Degree in Computer Science, Information Systems or related field, or equivalent experience - 7 years of IT relevant experience or equivalent combination of experience plus at least 3 years of experience performing More ❯
Auditor) are highly desirable. Strong knowledge of security frameworks (e.g., ISO 27001, COBIT), security technologies, tools, and best practices across EU, UK, and USA Proficiency in risk management processes, vulnerability assessments, and incident response strategies. Current technical and hands-on experience with security tools and technologies, including Rapid7, Rubrik, Sentinel, and endpoint protection solutions like Microsoft Defender. Excellent analytical More ❯
Auditor) are highly desirable. Strong knowledge of security frameworks (e.g., ISO 27001, COBIT), security technologies, tools, and best practices across EU, UK, and USA Proficiency in risk management processes, vulnerability assessments, and incident response strategies. Current technical and hands-on experience with security tools and technologies, including Rapid7, Rubrik, Sentinel, and endpoint protection solutions like Microsoft Defender. Excellent analytical More ❯
values is an essential condition of employment. Responsibilities What You'll Do Lead the implementation and management of SIEM systems, Fortinet tools, and endpoint detection & response (EDR) solutions. Conduct vulnerability assessments and penetration testing to stay ahead of cyber threats. Strengthen identity and access management (IAM) through Active Directory, Entra ID, MFA, and Zero Trust principles. Safeguard networks with More ❯
NSS continuous monitoring activities. • Research, develop, and implement policies to improve the effectiveness and efficiency of the security authorization process while minimizing operational impacts on critical NSS systems. • Conduct vulnerability scans, create Body of Evidence (BoE) artifacts, and produce Security Assessment Reports (SARs) to document risk levels and recommended mitigations. • Provide in-depth analysis of cyber threat actor … and threat trends. • Actively participate in security meetings, including engineering review boards and cybersecurity supply chain risk management (C-SCRM) sessions, to inform and support NSS initiatives. • Develop automated assessment tools and dashboards to support continuous monitoring and ongoing authorization processes, leveraging tools like Splunk, Tenable, and Axonius. Basic Qualifications: • Bachelor's Degree in Information Technology, Cybersecurity, or a … to apply them to secure National Security Systems. • Strong background in cybersecurity risk analysis and reporting, with experience in creating detailed BoE artifacts. • Proficiency in using cybersecurity tools for vulnerability scanning and continuous monitoring. • Local to D.C. or Virginia with ability to work on-site for classified work. Preferred Qualifications: • Expertise in conducting SCAs and cybersecurity assessments for NSS More ❯
Lead Risk Management Framework (RMF) processes ensuring compliance with NIST standards and DoD directives • Develop and maintain Certification and Accreditation (C&A) packages for classified information systems • Prepare Risk Assessment Reports and System Requirements Traceability Matrices (SRTMs) Operational Security Excellence • Maintain day-to-day security operations for multiple information systems processing classified data • Evaluate and implement security solutions meeting … stringent requirements for classified information processing • Perform continuous vulnerability and risk assessments supporting ongoing authorization activities • Manage configuration control for security-relevant hardware, software, and firmware • Assess security impacts of system changes and coordinate remediation efforts Technical Security Management • Administer user identification and authentication mechanisms across diverse platforms • Maintain detailed records on security infrastructure including workstations, servers, routers, firewalls … DoD 8570 compliance with IAM Level I or higher (CAP, CND, GSLC, CISM, CISSP, or equivalent) • Clearance: Active security clearance with ability to maintain Technical Expertise • Proficiency with security assessment and authorization tools, particularly LatteArt, ScanBoy, Biscotti, Sear, and Exacta • Deep understanding of NIST Risk Management Framework and continuous monitoring strategies • Expert knowledge of Zero Trust architecture principles and More ❯
cybersecurity principles, best practices, and common attack vectors. • Knowledge of security compliance frameworks and regulations such as GDPR, HIPAA, PCI DSS, and SOC 2. • Ability to conduct risk assessments, vulnerability assessments, and penetration testing. • Proficiency in scripting languages like Python, PowerShell, or Bash for automation and orchestration tasks. Certifications: (Nice to have, not required: ) • Relevant certifications can be advantageous More ❯
and operating as intended during all phases of the IS lifecycle • Ensure that system security documentation is developed, maintained, reviewed, and updated on a continuous basis • Conduct required IS vulnerability scans according to risk assessment parameters. • Develop Plan of Action and Milestones (POAMs) in response to reported security vulnerabilities • Manage the risks to ISs and other FBI assets … on-time with the highest quality • Must have excellent written communication skills as the candidate's job will include written interaction with senior- level executives. • Well versed with using vulnerabilityassessment tools (NESSUS, AppDetective, etc.) and analyzing the results generated from these assessments. Minimum/General Experience: • B.S. degree required (B.S. degree may be substituted for 4 years More ❯
RANGE : 92.00-96.00 PER HOUR JOB NUMBER: REQUIRED EXPERIENCE: Qualifications You Must Have: Experience with performing assessments of various operating systems with DISA STIGs and SRGs Experience with IA vulnerability testing and related network and system test tools, e.g., ACAS and Security Content Automation Protocol (SCAP) An active and transferable DoD Secret security clearance is required on Day … month(s) JOB DESCRIPTION: Job Summary:Cyber Security Engineering team for a Sr. Cyber Security Engineer ISSO position supporting the operations and maintenance of custom solutions and Assessment & Authorization (A&A) activities at Vandenberg Space Force Base (VSFB) in Vandenberg, California. The ideal candidate will have strong cyber experience across the full spectrum of cyber operations from a mission … execution perspective, to include vulnerability management, compliance management, database, and enterprise information security infrastructure. What You Will Do:Assessing known systems vulnerabilities and verifying system hardening and patching activities to ensure compliance with the most current applicable Security Technical Implementation Guides (STIGs)/Security Requirements Guides (SRGs) and related checklists Preparing documentation (artifacts and bodies of evidence) to support More ❯
of exceptionally complex problems, and processes relating to them Provides expert level consultation and technical services on all aspects of Information Security Serves as technical expert to the Cybersecurity Assessment Program providing technical direction, interpretation and alternatives to complex problems Builds IA into systems deployed to operational environments Assists architects and systems developers in the identification and implementation of … design and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks throughout the program life cycle Contributes to the security planning, assessment, risk analysis, risk management, certification and awareness activities for system and networking operations Thinks independently and demonstrates exceptional written and oral communications skills. Applies advanced technical principles, theories, and … Directory, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerabilityassessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft More ❯
of exceptionally complex problems, and processes relating to them Provides expert level consultation and technical services on all aspects of Information Security Serves as technical expert to the Cybersecurity Assessment Program providing technical direction, interpretation and alternatives to complex problems Builds IA into systems deployed to operational environments Assists architects and systems developers in the identification and implementation of … design and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks throughout the program life cycle Contributes to the security planning, assessment, risk analysis, risk management, certification and awareness activities for system and networking operations. Thinks independently and demonstrates exceptional written and oral communications skills. Applies advanced technical principles, theories, and … Directory, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerabilityassessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft More ❯
encryption, PKI, and secure communication protocols • Network design and testing experience including performance optimization and security validation • Infrastructure implementation experience (virtualization, cloud platforms, HPC) • Security monitoring, incident response, and vulnerabilityassessment knowledge • Excellent problem-solving skills and ability to work collaboratively in a team environment • Effective communication skills to interact with diverse groups of technical and non-technical … Security Implementation and Testing (25%) Manage classified and unclassified encryption systems. Implement and maintain cryptographic key management infrastructure. Conduct security assessments of quantum communication protocols. Perform penetration testing and vulnerability assessments. Monitor and respond to security incidents in quantum environments. Develop and maintain security protocols and compliance frameworks. System Administration (20%) Manage and optimize Linux-based quantum computing platforms. More ❯
engineering to strengthen security posture. • Utilize threat intelligence feeds to contextualize events and support proactive defense strategies. • Assist in developing and refining incident response procedures and SOC playbooks. • Support vulnerability assessments and remediation tracking. • Maintain compliance with government standards and security policies (e.g., NIST 800-53, FISMA, DFARS/CMMC). • Participate in security audits, reporting, and continuous monitoring More ❯
Working knowledge and/or familiarity with Cloud-based technologies (AWS Platform, Azure Platform, Google Cloud) • Experience with NIST Risk Management Framework or other similar control framework • Knowledge of vulnerabilityassessment tools including Nessus, Wireshark, Kali Linux, Nmap, Metasploit, and Lin/WinPEAS • Experience with penetration testing, adversarial emulation, or red teaming 2) Cloud Engineer A candidate must More ❯