and implement system upgrades, patches, and new applications. Security Management: Implement and maintain security measures to safeguard systems against unauthorized access, vulnerabilities, and data breaches. Conduct regular security audits, vulnerability assessments, and implement corrective actions. Stay updated on the latest security trends, vulnerabilities, and best practices. Scripting and Automation: Develop and maintain scripts using Bash, Python, or PowerShell to More ❯
City of London, London, England, United Kingdom Hybrid / WFH Options
How to Job Ltd
knowledge of cybersecurity who are eager to develop their skills in a collaborative and fast-paced environment. Responsibilities: •Monitor and analyze security alerts to identify potential threats. •Assist with vulnerability assessments and penetration testing. •Support the implementation of security tools and protocols. •Investigate and respond to security incidents alongside the IT team. •Create detailed reports on security findings and More ❯
the organization's network security posture Ensure compliance with relevant security regulations and standards and assist in audit processes as needed Conduct regular security assessments including penetration testing and vulnerability assessments to identify and remediate potential security risks ESSENTIAL EXPERIENCE 12 years of Proven experience in network security with a strong understanding of network security fundamentals encryption technologies and More ❯
the organization's network security posture Ensure compliance with relevant security regulations and standards and assist in audit processes as needed Conduct regular security assessments including penetration testing and vulnerability assessments to identify and remediate potential security risks ESSENTIAL EXPERIENCE 12 years of Proven experience in network security with a strong understanding of network security fundamentals encryption technologies and More ❯
Endpoints • Provides Tier-III assistance to maintain, analyze, troubleshoot, repair, and optimize services to include hardware, software, and network components necessary to deliver the latest secured desktop environment • Conducts vulnerability scanning and vulnerabilityassessment reporting in accordance with Government policy • Implements and maintains security measures to protect the VDI environment from threats and vulnerabilities • Continuous monitoring of More ❯
ensure compliance with the most current applicable Security Technical Implementation Guides (STIGs)/Security Requirements Guides (SRGs) and related checklists Preparing documentation (artifacts and bodies of evidence) to support assessment and authorization (A&A) activities necessary to ensure system sustained Approval to Operate (ATO) Assisting in defining cyber requirements and design solutions, providing guidance and direction related to security … technologies, performing analysis on cybersecurity-collected data and test results, identifying, and implementing cybersecurity design, and preparing and maintaining engineering and security related documentation Performing and providing vulnerabilityassessment results and recommendations to the leadership. This is a 12 Month Contract or Contract to hire Clearance: Active Secret Clearance Qualifications You Must Have: Experience with performing assessments of … various operating systems with DISA STIGs and SRGs Experience with IA vulnerability testing and related network and system test tools, e.g., ACAS and Security Content Automation Protocol (SCAP) Experience with network and system security administration, including operating system security configuration and account management best practices for LINUX, Microsoft, and CISCO Systems (Previous experience with RHEL 6 and 7 is More ❯
Server, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerabilityassessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office More ❯
Server, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerabilityassessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office More ❯
Server, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerabilityassessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office More ❯
Server, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerabilityassessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office More ❯
Server, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerabilityassessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office More ❯
Server, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerabilityassessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office More ❯
Server, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerabilityassessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office More ❯
Server, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerabilityassessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office More ❯
Directory Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerabilityassessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft More ❯
Directory Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerabilityassessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft More ❯
Ashby de la Zouch, Ashby-de-la-Zouch, Leicestershire, United Kingdom
VIQU IT
Analyst: Support the design, implementation, and management of cyber security technologies across the business Monitor and respond to security incidents, alerts, and helpdesk requests, maintaining robust threat detection Conduct vulnerability assessments, penetration testing, and phishing simulations to identify and mitigate risks Collaborate closely with IT teams to embed security best practices into system management and project delivery Stay up More ❯
for assessing and securing complex systems in alignment with DoD RMF standards, performing system audits, analyzing vulnerabilities, and managing cyber tools across enterprise platforms. Key Responsibilities: Conduct system audits, vulnerability assessments, and hardening activities in accordance with NIST, DFARS, and OWASP standards. Configure, manage, and monitor cybersecurity tools including HBSS/ESS, Splunk, and ConfigOS on Windows and RHEL More ❯
Arlington, Virginia, United States Hybrid / WFH Options
ICF
ability to communicate effectively with various clients in order to explain and elaborate on technical details Practical experience with different scripting languages (e.g., Python, JavaScript, etc.) Experience with system vulnerability assessments Knowledge of Linux/Unix and Windows operating systems security Knowledge of computer programming and scripting languages Excellent written and verbal communication skills Scaled Agile Framework (SAFe) experience More ❯
various network operating systems, such as Cisco IOS, Juniper Junos, and others. • Familiarity with scripting languages (e.g., Python, Bash) to automate patch deployment processes for network devices. • Knowledge of vulnerabilityassessment tools and network security tools. • Experience in network administration, network security, or a similar role, with a focus on patch management. • Experience in conducting vulnerability assessments More ❯
protect networks, systems, and applications by evaluating and applying security tools. Provides expertise in configuring firewalls, intrusion detection and prevention systems, endpoint protection, and identity access management solutions. Conducts vulnerability assessments and penetration tests to evaluate the effectiveness of security controls as configured and deployed. Maintains compliance with internal standards and regulatory requirements. Collaborates with IT and business teams More ❯
platforms, including application control and cloud-based protection solutions. Manage and configure security infrastructure such as firewalls, VPN access, intrusion detection/prevention systems, and SIEM monitoring tools. Conduct vulnerability assessments and collaborate with system administrators to remediate risks across Windows and Linux environments. Analyze security logs, identify potential threats, and support incident response activities by preparing reports and More ❯
Liverpool, Merseyside, North West, United Kingdom Hybrid / WFH Options
Curveball Solutions
evolving business objectives. Drafting, maintaining and implementing information security policies and Standard Operating Procedures (SOPs). Configuring and overseeing mobile securityMDM (MAM/BYOD)to protect business continuity. Leading vulnerability assessments, penetration tests, firewall policy enforcement, and remediation efforts. Authoring compelling tender responses, clearly demonstrating technical capability and strategic value. Enhancing Microsoft 365 security leveraging Purview, Conditional Access, MFA More ❯
Platforms, including data services, storage, networking, and security components. Monitor and optimize system performance, and implement corrective actions on a hybrid/private cloud-based platform. Conduct regular cybersecurity vulnerability assessments and penetration testing. Develop and maintain security incident response plans and procedures. Develop and implement automation scripts and tools to streamline platform deployments, provisioning, and management tasks. Deploy More ❯