Permanent Vulnerability Assessment Job Vacancies

126 to 150 of 353 Permanent Vulnerability Assessment Jobs

Cybersecurity Engineer lll - 90k - 160k/annually

santa fe, california, united states
SimVentions, Inc - Glassdoor ✪ 4.6
an experienced cybersecurity professional to join our team! As a Cybersecurity Engineer III, you will play a key role in advancing cybersecurity operations by performing in-depth system hardening, vulnerability assessment, and security compliance activities in accordance with DoD requirements. The ideal candidate will have a solid foundation in cybersecurity practices and proven experience supporting both Linux and … oral presentations Must possess one of the following DoD 8570.01-M IAT Level III baseline certifications: CASP+ CE CCNP Security CISA CISSP (Associate) CISSP GCED GCIH CCSP Responsibilities: Develop Assessment and Authorization (A&A) packages for various systems Develop and maintain security documentation such as: Authorization Boundary Diagram System Hardware/Software/Information Flow System Security Plan Privacy … Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous Monitoring of Authorized Systems Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation Guides (STIG More ❯
Posted:

Cybersecurity Engineer lll - 90k - 160k/annually

del mar, california, united states
SimVentions, Inc - Glassdoor ✪ 4.6
an experienced cybersecurity professional to join our team! As a Cybersecurity Engineer III, you will play a key role in advancing cybersecurity operations by performing in-depth system hardening, vulnerability assessment, and security compliance activities in accordance with DoD requirements. The ideal candidate will have a solid foundation in cybersecurity practices and proven experience supporting both Linux and … oral presentations Must possess one of the following DoD 8570.01-M IAT Level III baseline certifications: CASP+ CE CCNP Security CISA CISSP (Associate) CISSP GCED GCIH CCSP Responsibilities: Develop Assessment and Authorization (A&A) packages for various systems Develop and maintain security documentation such as: Authorization Boundary Diagram System Hardware/Software/Information Flow System Security Plan Privacy … Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous Monitoring of Authorized Systems Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation Guides (STIG More ❯
Posted:

Cybersecurity Engineer lll - Industry leading benefits

cardiff-by-the-sea, california, united states
SimVentions, Inc - Glassdoor ✪ 4.6
an experienced cybersecurity professional to join our team! As a Cybersecurity Engineer III, you will play a key role in advancing cybersecurity operations by performing in-depth system hardening, vulnerability assessment, and security compliance activities in accordance with DoD requirements. The ideal candidate will have a solid foundation in cybersecurity practices and proven experience supporting both Linux and … oral presentations Must possess one of the following DoD 8570.01-M IAT Level III baseline certifications: CASP+ CE CCNP Security CISA CISSP (Associate) CISSP GCED GCIH CCSP Responsibilities: Develop Assessment and Authorization (A&A) packages for various systems Develop and maintain security documentation such as: Authorization Boundary Diagram System Hardware/Software/Information Flow System Security Plan Privacy … Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous Monitoring of Authorized Systems Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation Guides (STIG More ❯
Posted:

Cybersecurity Engineer lll - 90k - 160k/annually

chula vista, california, united states
SimVentions, Inc - Glassdoor ✪ 4.6
an experienced cybersecurity professional to join our team! As a Cybersecurity Engineer III, you will play a key role in advancing cybersecurity operations by performing in-depth system hardening, vulnerability assessment, and security compliance activities in accordance with DoD requirements. The ideal candidate will have a solid foundation in cybersecurity practices and proven experience supporting both Linux and … oral presentations Must possess one of the following DoD 8570.01-M IAT Level III baseline certifications: CASP+ CE CCNP Security CISA CISSP (Associate) CISSP GCED GCIH CCSP Responsibilities: Develop Assessment and Authorization (A&A) packages for various systems Develop and maintain security documentation such as: Authorization Boundary Diagram System Hardware/Software/Information Flow System Security Plan Privacy … Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous Monitoring of Authorized Systems Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation Guides (STIG More ❯
Posted:

Cybersecurity Engineer lll - 90k - 160k/annually

cardiff-by-the-sea, california, united states
SimVentions, Inc - Glassdoor ✪ 4.6
an experienced cybersecurity professional to join our team! As a Cybersecurity Engineer III, you will play a key role in advancing cybersecurity operations by performing in-depth system hardening, vulnerability assessment, and security compliance activities in accordance with DoD requirements. The ideal candidate will have a solid foundation in cybersecurity practices and proven experience supporting both Linux and … oral presentations Must possess one of the following DoD 8570.01-M IAT Level III baseline certifications: CASP+ CE CCNP Security CISA CISSP (Associate) CISSP GCED GCIH CCSP Responsibilities: Develop Assessment and Authorization (A&A) packages for various systems Develop and maintain security documentation such as: Authorization Boundary Diagram System Hardware/Software/Information Flow System Security Plan Privacy … Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous Monitoring of Authorized Systems Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation Guides (STIG More ❯
Posted:

Architect - Systems Programmer

brentwood, tennessee, united states
Health Support Center
/GCVE). - Dell's Superna Eyeglass Suite, including Superna Ransomware Defender for proactive ransomware detection, response, and forensic analysis within storage environments. - Cyber defense management including threat detection, vulnerability assessment, incident response, and forensics as they pertain to storage systems and data. - Data Vaulting solutions for secure, immutable storage, including air-gapped and logically isolated storage vaults More ❯
Posted:

Senior IT Security Specialist - Ashford (Kent), England OR Cairns, Australia.

United Kingdom
Maf Philippines
values is an essential condition of employment. Responsibilities What You'll Do Lead the implementation and management of SIEM systems, Fortinet tools, and endpoint detection & response (EDR) solutions. Conduct vulnerability assessments and penetration testing to stay ahead of cyber threats. Strengthen identity and access management (IAM) through Active Directory, Entra ID, MFA, and Zero Trust principles. Safeguard networks with More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

National Security Systems SCA with Security Clearance

Burke, Virginia, United States
Gray Tier LLC
NSS continuous monitoring activities. • Research, develop, and implement policies to improve the effectiveness and efficiency of the security authorization process while minimizing operational impacts on critical NSS systems. • Conduct vulnerability scans, create Body of Evidence (BoE) artifacts, and produce Security Assessment Reports (SARs) to document risk levels and recommended mitigations. • Provide in-depth analysis of cyber threat actor … and threat trends. • Actively participate in security meetings, including engineering review boards and cybersecurity supply chain risk management (C-SCRM) sessions, to inform and support NSS initiatives. • Develop automated assessment tools and dashboards to support continuous monitoring and ongoing authorization processes, leveraging tools like Splunk, Tenable, and Axonius. Basic Qualifications: • Bachelor's Degree in Information Technology, Cybersecurity, or a … to apply them to secure National Security Systems. • Strong background in cybersecurity risk analysis and reporting, with experience in creating detailed BoE artifacts. • Proficiency in using cybersecurity tools for vulnerability scanning and continuous monitoring. • Local to D.C. or Virginia with ability to work on-site for classified work. Preferred Qualifications: • Expertise in conducting SCAs and cybersecurity assessments for NSS More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Information Systems Security Officer (ISSO) with Security Clearance

Maryland, United States
NineFX, Inc
Lead Risk Management Framework (RMF) processes ensuring compliance with NIST standards and DoD directives • Develop and maintain Certification and Accreditation (C&A) packages for classified information systems • Prepare Risk Assessment Reports and System Requirements Traceability Matrices (SRTMs) Operational Security Excellence • Maintain day-to-day security operations for multiple information systems processing classified data • Evaluate and implement security solutions meeting … stringent requirements for classified information processing • Perform continuous vulnerability and risk assessments supporting ongoing authorization activities • Manage configuration control for security-relevant hardware, software, and firmware • Assess security impacts of system changes and coordinate remediation efforts Technical Security Management • Administer user identification and authentication mechanisms across diverse platforms • Maintain detailed records on security infrastructure including workstations, servers, routers, firewalls … DoD 8570 compliance with IAM Level I or higher (CAP, CND, GSLC, CISM, CISSP, or equivalent) • Clearance: Active security clearance with ability to maintain Technical Expertise • Proficiency with security assessment and authorization tools, particularly LatteArt, ScanBoy, Biscotti, Sear, and Exacta • Deep understanding of NIST Risk Management Framework and continuous monitoring strategies • Expert knowledge of Zero Trust architecture principles and More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cloud Engineer with Security Clearance

Saint Louis, Missouri, United States
AFORGE LLC
cybersecurity principles, best practices, and common attack vectors. • Knowledge of security compliance frameworks and regulations such as GDPR, HIPAA, PCI DSS, and SOC 2. • Ability to conduct risk assessments, vulnerability assessments, and penetration testing. • Proficiency in scripting languages like Python, PowerShell, or Bash for automation and orchestration tasks. Certifications: (Nice to have, not required: ) • Relevant certifications can be advantageous More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSO with Security Clearance

Washington, Washington DC, United States
MicroSys LLC
and operating as intended during all phases of the IS lifecycle • Ensure that system security documentation is developed, maintained, reviewed, and updated on a continuous basis • Conduct required IS vulnerability scans according to risk assessment parameters. • Develop Plan of Action and Milestones (POAMs) in response to reported security vulnerabilities • Manage the risks to ISs and other FBI assets … on-time with the highest quality • Must have excellent written communication skills as the candidate's job will include written interaction with senior- level executives. • Well versed with using vulnerability assessment tools (NESSUS, AppDetective, etc.) and analyzing the results generated from these assessments. Minimum/General Experience: • B.S. degree required (B.S. degree may be substituted for 4 years More ❯
Employment Type: Permanent
Salary: USD 145,000 Annual
Posted:

Sr Cyber Security Engineer - Cleared On-site

Lompoc, California, United States
The Computer Merchant, LTD
RANGE : 92.00-96.00 PER HOUR JOB NUMBER: REQUIRED EXPERIENCE: Qualifications You Must Have: Experience with performing assessments of various operating systems with DISA STIGs and SRGs Experience with IA vulnerability testing and related network and system test tools, e.g., ACAS and Security Content Automation Protocol (SCAP) An active and transferable DoD Secret security clearance is required on Day … month(s) JOB DESCRIPTION: Job Summary:Cyber Security Engineering team for a Sr. Cyber Security Engineer ISSO position supporting the operations and maintenance of custom solutions and Assessment & Authorization (A&A) activities at Vandenberg Space Force Base (VSFB) in Vandenberg, California. The ideal candidate will have strong cyber experience across the full spectrum of cyber operations from a mission … execution perspective, to include vulnerability management, compliance management, database, and enterprise information security infrastructure. What You Will Do:Assessing known systems vulnerabilities and verifying system hardening and patching activities to ensure compliance with the most current applicable Security Technical Implementation Guides (STIGs)/Security Requirements Guides (SRGs) and related checklists Preparing documentation (artifacts and bodies of evidence) to support More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSE 3 102-090 with Security Clearance

Bedford, Massachusetts, United States
IC-CAP
of exceptionally complex problems, and processes relating to them Provides expert level consultation and technical services on all aspects of Information Security Serves as technical expert to the Cybersecurity Assessment Program providing technical direction, interpretation and alternatives to complex problems Builds IA into systems deployed to operational environments Assists architects and systems developers in the identification and implementation of … design and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks throughout the program life cycle Contributes to the security planning, assessment, risk analysis, risk management, certification and awareness activities for system and networking operations Thinks independently and demonstrates exceptional written and oral communications skills. Applies advanced technical principles, theories, and … Directory, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSE 2 102-163 with Security Clearance

Macon, Georgia, United States
IC-CAP
of exceptionally complex problems, and processes relating to them Provides expert level consultation and technical services on all aspects of Information Security Serves as technical expert to the Cybersecurity Assessment Program providing technical direction, interpretation and alternatives to complex problems Builds IA into systems deployed to operational environments Assists architects and systems developers in the identification and implementation of … design and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks throughout the program life cycle Contributes to the security planning, assessment, risk analysis, risk management, certification and awareness activities for system and networking operations. Thinks independently and demonstrates exceptional written and oral communications skills. Applies advanced technical principles, theories, and … Directory, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Lead IT Systems Engineer with Security Clearance

College Park, Maryland, United States
University of Maryland
encryption, PKI, and secure communication protocols • Network design and testing experience including performance optimization and security validation • Infrastructure implementation experience (virtualization, cloud platforms, HPC) • Security monitoring, incident response, and vulnerability assessment knowledge • Excellent problem-solving skills and ability to work collaboratively in a team environment • Effective communication skills to interact with diverse groups of technical and non-technical … Security Implementation and Testing (25%) Manage classified and unclassified encryption systems. Implement and maintain cryptographic key management infrastructure. Conduct security assessments of quantum communication protocols. Perform penetration testing and vulnerability assessments. Monitor and respond to security incidents in quantum environments. Develop and maintain security protocols and compliance frameworks. System Administration (20%) Manage and optimize Linux-based quantum computing platforms. More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

SOC Analyst with Security Clearance

West Mifflin, Pennsylvania, United States
Mayhew Technology Solutions
engineering to strengthen security posture. • Utilize threat intelligence feeds to contextualize events and support proactive defense strategies. • Assist in developing and refining incident response procedures and SOC playbooks. • Support vulnerability assessments and remediation tracking. • Maintain compliance with government standards and security policies (e.g., NIST 800-53, FISMA, DFARS/CMMC). • Participate in security audits, reporting, and continuous monitoring More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Pen Tester/ Cloud Engineer with Security Clearance

Rome, New York, United States
Anonymous Employer
Working knowledge and/or familiarity with Cloud-based technologies (AWS Platform, Azure Platform, Google Cloud) • Experience with NIST Risk Management Framework or other similar control framework • Knowledge of vulnerability assessment tools including Nessus, Wireshark, Kali Linux, Nmap, Metasploit, and Lin/WinPEAS • Experience with penetration testing, adversarial emulation, or red teaming 2) Cloud Engineer A candidate must More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Security Architect

Macclesfield, England, United Kingdom
Hybrid / WFH Options
LTIMindtree
enhance the organizations network security posture Ensure compliance with relevant security regulations and standards and assist in audit processes as needed Conduct regular security assessments including penetration testing and vulnerability assessments to identify and remediate potential security risks Experience: Bachelors degree in computer science Information Technology or related field 12 years of Proven experience in network security with a More ❯
Posted:

Security Architect

warrington, cheshire, north west england, united kingdom
Hybrid / WFH Options
LTIMindtree
enhance the organizations network security posture Ensure compliance with relevant security regulations and standards and assist in audit processes as needed Conduct regular security assessments including penetration testing and vulnerability assessments to identify and remediate potential security risks Experience: Bachelors degree in computer science Information Technology or related field 12 years of Proven experience in network security with a More ❯
Posted:

IT Systems Engineer with Security Clearance

College Park, Maryland, United States
University of Maryland
Maintain classified and unclassified encryption systems Support cryptographic key management infrastructure Assist with security assessments of quantum communication protocols • Network Security and Testing (10%) Support penetration testing and vulnerability assessments Monitor and respond to security incidents in quantum environments Help maintain security protocols and compliance frameworks 3) System Administration (15%) • Linux System Administration (10%) Administer and optimize Linux-based More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Principal Cyber Security & Infrastructure Specialist

Birmingham, West Midlands, United Kingdom
West Midlands Combined Authority (WMCA)
Oversee contractors and third-party delivery. Whats essential. Degree in a cyber security-related field. Professional certification (e.g. CISSP, Azure Security Engineer, or equivalent). Skilled in risk/vulnerability assessments, compliance checks, and audits. Experienced in penetration testing and remediation. Knowledge of business continuity, disaster recovery, and incident response. Hands-on with hybrid cloud security tools (e.g. M365 More ❯
Employment Type: Contract, Part Time
Salary: £55,000
Posted:

Cloud Cybersecurity Engineer with Security Clearance

Stevensville, Maryland, United States
Halcyon Days Consulting, LLC
of, proactively hunting for threats, securing hybrid and multi-cloud environments, and ensuring compliance with industry best practices and regulatory frameworks. The Cloud Cybersecurity Engineer will lead efforts in vulnerability assessment, threat hunting, incident detection, and security automation while collaborating with cross-functional teams to safeguard mission critical systems. RESPONSIBILITIES & DUTIES: Design, deploy and manage cloud security architectures … in AWS, Azure and/or other commercial or private cloud environments. Conduct risk assessments, vulnerability scans, and penetration testing to identify and mitigate security weaknesses. Implement and monitor cloud-native security controls, such as firewall, encryption, IAM policies, and logging/monitoring solutions/Develop and maintain security baselines, hardening guides, and compliance templates for cloud services. Automate … suspicious patterns, and emerging attack techniques. 5+ years of experience in cybersecurity engineering with a focus on cloud environments. Strong knowledge of security frameworks and best practices. Experience with vulnerability scanning, intrusion detection/prevention, and incident response. Familiarity with automation tools (Terraform, Ansible, or similar) and DevSecOps. Proficiency in analyzing security logs, network traffic, and attack artifacts. Strong More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cybersecurity Test Engineer with Security Clearance

Rome, New York, United States
Hybrid / WFH Options
Gridiron IT Solutions
with penetration testing or adversarial emulation Experience with NIST 800-53 security controls Knowledge of cyber threats and how to appropriately harden a system to prevent them Knowledge of vulnerability assessment tools, including Kali Linux, Wireshark, Tripwire, Burp Suite, and Metasploit TS/SCI clearance Master's degree OSCP, CISSP, CASP, Red Hat CSA, or GPEN Certification Clearance More ❯
Employment Type: Permanent
Salary: USD 130,000 Annual
Posted:

Cyber Security Manager

Croydon, London, United Kingdom
Hybrid / WFH Options
Gold Group Limited
following : In-depth knowledge of cybersecurity frameworks, tools, and technologies Strong understanding of networking protocols, cloud security, and secure software development principles Experience with incident response, risk management, and vulnerability assessment Familiarity with regulatory compliance and standards (e.g. GDPR, ISO 27001) Experience in an organisation running or being part of an ISO27001 adoption project Incident management & change Management More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Information Security Analyst (Hybrid / Hatfield)

Hatfield, Hertfordshire, United Kingdom
Hybrid / WFH Options
Michael Page
Ensure security controls are in-place based on ISO27001 and NIST As the regional security representative in the global Security/Technology project Lead/execute phishing campaign Conduct vulnerability assessments and implement measures to mitigate potential risks. Involve in global security operations process, analysis and escalate security alerts/tickets from global SOC team Maintain and update security More ❯
Employment Type: Permanent
Posted:
Vulnerability Assessment
10th Percentile
£41,250
25th Percentile
£46,875
Median
£57,500
75th Percentile
£73,750
90th Percentile
£86,000