and operating as intended during all phases of the IS lifecycle • Ensure that system security documentation is developed, maintained, reviewed, and updated on a continuous basis • Conduct required IS vulnerability scans according to risk assessment parameters. • Develop Plan of Action and Milestones (POAMs) in response to reported security vulnerabilities • Manage the risks to ISs and other FBI assets … on-time with the highest quality • Must have excellent written communication skills as the candidate's job will include written interaction with senior- level executives. • Well versed with using vulnerabilityassessment tools (NESSUS, AppDetective, etc.) and analyzing the results generated from these assessments. Minimum/General Experience: • B.S. degree required (B.S. degree may be substituted for 4 years More ❯
RANGE : 92.00-96.00 PER HOUR JOB NUMBER: REQUIRED EXPERIENCE: Qualifications You Must Have: Experience with performing assessments of various operating systems with DISA STIGs and SRGs Experience with IA vulnerability testing and related network and system test tools, e.g., ACAS and Security Content Automation Protocol (SCAP) An active and transferable DoD Secret security clearance is required on Day … month(s) JOB DESCRIPTION: Job Summary:Cyber Security Engineering team for a Sr. Cyber Security Engineer ISSO position supporting the operations and maintenance of custom solutions and Assessment & Authorization (A&A) activities at Vandenberg Space Force Base (VSFB) in Vandenberg, California. The ideal candidate will have strong cyber experience across the full spectrum of cyber operations from a mission … execution perspective, to include vulnerability management, compliance management, database, and enterprise information security infrastructure. What You Will Do:Assessing known systems vulnerabilities and verifying system hardening and patching activities to ensure compliance with the most current applicable Security Technical Implementation Guides (STIGs)/Security Requirements Guides (SRGs) and related checklists Preparing documentation (artifacts and bodies of evidence) to support More ❯
of exceptionally complex problems, and processes relating to them Provides expert level consultation and technical services on all aspects of Information Security Serves as technical expert to the Cybersecurity Assessment Program providing technical direction, interpretation and alternatives to complex problems Builds IA into systems deployed to operational environments Assists architects and systems developers in the identification and implementation of … design and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks throughout the program life cycle Contributes to the security planning, assessment, risk analysis, risk management, certification and awareness activities for system and networking operations Thinks independently and demonstrates exceptional written and oral communications skills. Applies advanced technical principles, theories, and … Directory, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerabilityassessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft More ❯
of exceptionally complex problems, and processes relating to them Provides expert level consultation and technical services on all aspects of Information Security Serves as technical expert to the Cybersecurity Assessment Program providing technical direction, interpretation and alternatives to complex problems Builds IA into systems deployed to operational environments Assists architects and systems developers in the identification and implementation of … design and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks throughout the program life cycle Contributes to the security planning, assessment, risk analysis, risk management, certification and awareness activities for system and networking operations. Thinks independently and demonstrates exceptional written and oral communications skills. Applies advanced technical principles, theories, and … Directory, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerabilityassessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft More ❯
encryption, PKI, and secure communication protocols • Network design and testing experience including performance optimization and security validation • Infrastructure implementation experience (virtualization, cloud platforms, HPC) • Security monitoring, incident response, and vulnerabilityassessment knowledge • Excellent problem-solving skills and ability to work collaboratively in a team environment • Effective communication skills to interact with diverse groups of technical and non-technical … Security Implementation and Testing (25%) Manage classified and unclassified encryption systems. Implement and maintain cryptographic key management infrastructure. Conduct security assessments of quantum communication protocols. Perform penetration testing and vulnerability assessments. Monitor and respond to security incidents in quantum environments. Develop and maintain security protocols and compliance frameworks. System Administration (20%) Manage and optimize Linux-based quantum computing platforms. More ❯
engineering to strengthen security posture. • Utilize threat intelligence feeds to contextualize events and support proactive defense strategies. • Assist in developing and refining incident response procedures and SOC playbooks. • Support vulnerability assessments and remediation tracking. • Maintain compliance with government standards and security policies (e.g., NIST 800-53, FISMA, DFARS/CMMC). • Participate in security audits, reporting, and continuous monitoring More ❯
Working knowledge and/or familiarity with Cloud-based technologies (AWS Platform, Azure Platform, Google Cloud) • Experience with NIST Risk Management Framework or other similar control framework • Knowledge of vulnerabilityassessment tools including Nessus, Wireshark, Kali Linux, Nmap, Metasploit, and Lin/WinPEAS • Experience with penetration testing, adversarial emulation, or red teaming 2) Cloud Engineer A candidate must More ❯
Macclesfield, England, United Kingdom Hybrid / WFH Options
LTIMindtree
enhance the organizations network security posture Ensure compliance with relevant security regulations and standards and assist in audit processes as needed Conduct regular security assessments including penetration testing and vulnerability assessments to identify and remediate potential security risks Experience: Bachelors degree in computer science Information Technology or related field 12 years of Proven experience in network security with a More ❯
warrington, cheshire, north west england, united kingdom Hybrid / WFH Options
LTIMindtree
enhance the organizations network security posture Ensure compliance with relevant security regulations and standards and assist in audit processes as needed Conduct regular security assessments including penetration testing and vulnerability assessments to identify and remediate potential security risks Experience: Bachelors degree in computer science Information Technology or related field 12 years of Proven experience in network security with a More ❯
Maintain classified and unclassified encryption systems Support cryptographic key management infrastructure Assist with security assessments of quantum communication protocols • Network Security and Testing (10%) Support penetration testing and vulnerability assessments Monitor and respond to security incidents in quantum environments Help maintain security protocols and compliance frameworks 3) System Administration (15%) • Linux System Administration (10%) Administer and optimize Linux-based More ❯
Oversee contractors and third-party delivery. Whats essential. Degree in a cyber security-related field. Professional certification (e.g. CISSP, Azure Security Engineer, or equivalent). Skilled in risk/vulnerability assessments, compliance checks, and audits. Experienced in penetration testing and remediation. Knowledge of business continuity, disaster recovery, and incident response. Hands-on with hybrid cloud security tools (e.g. M365 More ❯
of, proactively hunting for threats, securing hybrid and multi-cloud environments, and ensuring compliance with industry best practices and regulatory frameworks. The Cloud Cybersecurity Engineer will lead efforts in vulnerabilityassessment, threat hunting, incident detection, and security automation while collaborating with cross-functional teams to safeguard mission critical systems. RESPONSIBILITIES & DUTIES: Design, deploy and manage cloud security architectures … in AWS, Azure and/or other commercial or private cloud environments. Conduct risk assessments, vulnerability scans, and penetration testing to identify and mitigate security weaknesses. Implement and monitor cloud-native security controls, such as firewall, encryption, IAM policies, and logging/monitoring solutions/Develop and maintain security baselines, hardening guides, and compliance templates for cloud services. Automate … suspicious patterns, and emerging attack techniques. 5+ years of experience in cybersecurity engineering with a focus on cloud environments. Strong knowledge of security frameworks and best practices. Experience with vulnerability scanning, intrusion detection/prevention, and incident response. Familiarity with automation tools (Terraform, Ansible, or similar) and DevSecOps. Proficiency in analyzing security logs, network traffic, and attack artifacts. Strong More ❯
Rome, New York, United States Hybrid / WFH Options
Gridiron IT Solutions
with penetration testing or adversarial emulation Experience with NIST 800-53 security controls Knowledge of cyber threats and how to appropriately harden a system to prevent them Knowledge of vulnerabilityassessment tools, including Kali Linux, Wireshark, Tripwire, Burp Suite, and Metasploit TS/SCI clearance Master's degree OSCP, CISSP, CASP, Red Hat CSA, or GPEN Certification Clearance More ❯
Hatfield, Hertfordshire, United Kingdom Hybrid / WFH Options
Michael Page
Ensure security controls are in-place based on ISO27001 and NIST As the regional security representative in the global Security/Technology project Lead/execute phishing campaign Conduct vulnerability assessments and implement measures to mitigate potential risks. Involve in global security operations process, analysis and escalate security alerts/tickets from global SOC team Maintain and update security More ❯
and implement system upgrades, patches, and new applications. Security Management: Implement and maintain security measures to safeguard systems against unauthorized access, vulnerabilities, and data breaches. Conduct regular security audits, vulnerability assessments, and implement corrective actions. Stay updated on the latest security trends, vulnerabilities, and best practices. Scripting and Automation: Develop and maintain scripts using Bash, Python, or PowerShell to More ❯
City of London, London, England, United Kingdom Hybrid / WFH Options
How to Job Ltd
knowledge of cybersecurity who are eager to develop their skills in a collaborative and fast-paced environment. Responsibilities: •Monitor and analyze security alerts to identify potential threats. •Assist with vulnerability assessments and penetration testing. •Support the implementation of security tools and protocols. •Investigate and respond to security incidents alongside the IT team. •Create detailed reports on security findings and More ❯
the organization's network security posture Ensure compliance with relevant security regulations and standards and assist in audit processes as needed Conduct regular security assessments including penetration testing and vulnerability assessments to identify and remediate potential security risks ESSENTIAL EXPERIENCE 12 years of Proven experience in network security with a strong understanding of network security fundamentals encryption technologies and More ❯
the organization's network security posture Ensure compliance with relevant security regulations and standards and assist in audit processes as needed Conduct regular security assessments including penetration testing and vulnerability assessments to identify and remediate potential security risks ESSENTIAL EXPERIENCE 12 years of Proven experience in network security with a strong understanding of network security fundamentals encryption technologies and More ❯
the organization's network security posture Ensure compliance with relevant security regulations and standards and assist in audit processes as needed Conduct regular security assessments including penetration testing and vulnerability assessments to identify and remediate potential security risks ESSENTIAL EXPERIENCE 12 years of Proven experience in network security with a strong understanding of network security fundamentals encryption technologies and More ❯
Endpoints • Provides Tier-III assistance to maintain, analyze, troubleshoot, repair, and optimize services to include hardware, software, and network components necessary to deliver the latest secured desktop environment • Conducts vulnerability scanning and vulnerabilityassessment reporting in accordance with Government policy • Implements and maintains security measures to protect the VDI environment from threats and vulnerabilities • Continuous monitoring of More ❯
ensure compliance with the most current applicable Security Technical Implementation Guides (STIGs)/Security Requirements Guides (SRGs) and related checklists Preparing documentation (artifacts and bodies of evidence) to support assessment and authorization (A&A) activities necessary to ensure system sustained Approval to Operate (ATO) Assisting in defining cyber requirements and design solutions, providing guidance and direction related to security … technologies, performing analysis on cybersecurity-collected data and test results, identifying, and implementing cybersecurity design, and preparing and maintaining engineering and security related documentation Performing and providing vulnerabilityassessment results and recommendations to the leadership. This is a 12 Month Contract or Contract to hire Clearance: Active Secret Clearance Qualifications You Must Have: Experience with performing assessments of … various operating systems with DISA STIGs and SRGs Experience with IA vulnerability testing and related network and system test tools, e.g., ACAS and Security Content Automation Protocol (SCAP) Experience with network and system security administration, including operating system security configuration and account management best practices for LINUX, Microsoft, and CISCO Systems (Previous experience with RHEL 6 and 7 is More ❯
Server, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerabilityassessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office More ❯
Server, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerabilityassessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office More ❯
Server, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerabilityassessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office More ❯
Server, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerabilityassessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office More ❯