Environment (TSCE). Design, implement, configure, and enforce security controls on network, hardware, and software components and devices. Implement STIGs and manage enterprise-level deployment of Active Directory. Perform vulnerability assessments using Assured Compliance Assessment Solution tools. Configure Cisco networking devices and utilize packet analyzer tools such as Wireshark and tcpdump. Troubleshoot network connectivity issues and implement firewalls … implementation, configuration, and enforcement of security controls on network, hardware, and software components and devices. o STIG implementation. o Experience managing enterprise level deployment of Active Directory. o Performing vulnerability assessments with the Assured Compliance Assessment Solution tool. o Configuring Cisco networking devices. o Utilizing packet analyzer tools such as Wireshark and tcpdump; o Troubleshooting network connectivity issues More ❯
/IPS, SIEM) to detect and analyze potential threats. Investigate security alerts, logs, and incidents (e.g., malware, unauthorized access, breaches). Assist in incident response and remediation efforts. 2. Vulnerability Management Conduct vulnerability assessments and support penetration testing. Collaborate with senior teams to patch systems and mitigate risks. 3. Network Access Control (NAC) Configure switches and endpoints for …/IP telephony). Technical Skills: Hands–on experience with OSPF, BGP, STP, NAC, and IPT (Cisco). Proficiency in network monitoring tools, NDR, and SIEM systems. Knowledge of vulnerabilityassessment tools and patch management. Soft Skills: Ability to work under pressure and handle emergencies. Strong communication and collaboration skills. Working Conditions: Flexibility for after–hours/weekend More ❯
/IPS, SIEM) to detect and analyze potential threats. Investigate security alerts, logs, and incidents (e.g., malware, unauthorized access, breaches). Assist in incident response and remediation efforts. 2. Vulnerability Management Conduct vulnerability assessments and support penetration testing. Collaborate with senior teams to patch systems and mitigate risks. 3. Network Access Control (NAC) Configure switches and endpoints for …/IP telephony). Technical Skills: Hands-on experience with OSPF, BGP, STP, NAC, and IPT (Cisco). Proficiency in network monitoring tools, NDR, and SIEM systems. Knowledge of vulnerabilityassessment tools and patch management. Soft Skills: Ability to work under pressure and handle emergencies. Strong communication and collaboration skills. Working Conditions: Flexibility for after-hours/weekend More ❯
/IPS, SIEM) to detect and analyze potential threats. Investigate security alerts, logs, and incidents (e.g., malware, unauthorized access, breaches). Assist in incident response and remediation efforts. 2. Vulnerability Management Conduct vulnerability assessments and support penetration testing. Collaborate with senior teams to patch systems and mitigate risks. 3. Network Access Control (NAC) Configure switches and endpoints for …/IP telephony). Technical Skills: Hands-on experience with OSPF, BGP, STP, NAC, and IPT (Cisco). Proficiency in network monitoring tools, NDR, and SIEM systems. Knowledge of vulnerabilityassessment tools and patch management. Soft Skills: Ability to work under pressure and handle emergencies. Strong communication and collaboration skills. Working Conditions: Flexibility for after-hours/weekend More ❯
About Darkshield Darkshield is an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetration testing, vulnerabilityassessment, managed security, and more. Our mission is to protect businesses by delivering tailored, cutting-edge cybersecurity solutions that keep them resilient and ahead of cyber threats. The Role More ❯
operationalizing a configuration baselines program spanning physical and virtual systems, serverless workloads, container security, and other platforms. This engineer will assist in the minimization of potential attack surfaces through vulnerability management, managing a baselines program, cloud configuration assessments, incorporating threat intelligence from public and private sources, and work internally to build and enhance policies, standards, and processes. They will … in Wellington's vendor ecosystem to understand when third and fourth parties may be exposed to critical vulnerabilities. Contribute to team documentation for updates to existing processes, new processes, assessment tool infrastructure details and workflows. Contribute to firmwide documentation by being an SME contributor to policies and standards. NON-TECHNICAL QUALIFICATIONS A Passion for cyber-security is a must. … team members and share discoveries about your work. TECHNICAL QUALIFICATIONS Experience working with best practices frameworks such as CIS Critical Security Controls to drive an internal discovery and risk assessment program for a system baselines/hardening program. Knowledge of common cyber-attack types such as DDoS, SQLi, XSS, and others. This experience relied upon to make rational decisions More ❯
various network operating systems, such as Cisco IOS, Juniper Junos, and others. • Familiarity with scripting languages (e.g., Python, Bash) to automate patch deployment processes for network devices. • Knowledge of vulnerabilityassessment tools and network security tools. • Experience in network administration, network security, or a similar role, with a focus on patch management. • Experience in conducting vulnerability assessments More ❯
Security, preferably in a senior or advanced analyst role. Proven experience in managing and auditing Information Security Management Systems (ISMS) aligned with ISO 27001 standards. Strong skills in risk assessment, vulnerability identification, and development of practical security solutions for complex IT environments. Experience with penetration testing and vulnerability assessments; certifications such as CEH (Certified Ethical Hacker) are More ❯
and incident response. Support security risk management and compliance with standards like PCI, GDPR, ISO. Perform other duties as assigned. Qualifications 10+ years of experience in information security, including vulnerabilityassessment, incident response, and audits. 5+ years working with business leadership and managing projects in a complex environment. Knowledge of security technologies and concepts such as firewalls, intrusion More ❯
analytical focus, problem solving skills, time management skills, and a passion for computer, network, or cyber security. • Understanding of Exploit methodology, processes and development. • Understanding of network scanning and vulnerability analysis/assessment DESIRED SKILLS: • Experience in a role as a computer network operator, possessing extensive penetration testing skills/experience to conduct vulnerability assessments leading to More ❯
Liverpool, England, United Kingdom Hybrid / WFH Options
Agoda
Know our Team: The Security Department oversees security, governance, risk management, and compliance, and security operations for all Agoda. We are vigilant in ensuring there is no breach or vulnerability threatening our company or endangering our employees to keep Agoda safe and protected. Given that the security ecosystem is moving forward at tremendous speed, we like to be early … advanced environment. The Opportunity: As a Security Analyst, you will focus on identifying, analyzing, and remediating vulnerabilities across our environment. You will be hands-on with penetration testing and vulnerability management, ensuring our systems remain secure and resilient. In this Role, you’ll get to: Develop Security Automation Tools to implement solutions at scale Triage security findings from multiple … tools and work with hundreds of teams to get them remediated within the right SLA Conduct security assessments through code reviews, vulnerability assessments, penetration testing and risk analysis Research on the negative effects of a vulnerability, from minimizing the impact to altering security controls for future prevention Identify potential threats so that the organization can protect itself from More ❯
Role : Security Architect Location : London Contract Role Job Description: Strong experience in building secure web and mobile apps Experience with Security architecture, Application Security assessments, penetration testing, vulnerabilityassessment, Secure SDLC, and Static code reviews Certified Secure Software Lifecycle Professional (CSSLP) (desirable) Responsibilities: - Design, develop, and implement security frameworks and solutions to safeguard company's assets and infrastructure. More ❯
senior stakeholders, both internal and client facing and be responsible for defining the vision, principles and strategy for security operations. Improve SOC processes, including incident response, threat hunting, and vulnerability management. Demonstrate expert understanding of security concepts and apply them to a technical level, at the highest levels of risk and customer complexity. Influence and challenge clients to define … meet customer needs and pain points. Provide mentorship across delivery team members, operating as an escalation expert for both internal and client facing issues. Designing, developing, and continuously improving vulnerabilityassessment, security testing, and risk analysis methods. Designing, developing, and continuously improving the security posture, effectiveness and efficiency of the company's products and services Providing developers with More ❯
London, England, United Kingdom Hybrid / WFH Options
Stripe Olt
player who wants to be part of a truly team driven environment. As a First Responder, you must display excellent outside-the-box thinking and communication skills. DESIRABLE EXPERIENCE. VulnerabilityAssessment experience. Knowledge of Penetration testing tools and techniques. Network and firewall alert management. Active Directory and group policy management experience. Experience in deploying, managing, and supporting of More ❯
Bristol, England, United Kingdom Hybrid / WFH Options
Stripe Olt
player who wants to be part of a truly team driven environment. As a First Responder, you must display excellent outside-the-box thinking and communication skills. DESIRABLE EXPERIENCE. VulnerabilityAssessment experience. Knowledge of Penetration testing tools and techniques. Network and firewall alert management. Active Directory and group policy management experience. Experience in deploying, managing, and supporting of More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
Stripe Olt
player who wants to be part of a truly team driven environment. As a First Responder, you must display excellent outside-the-box thinking and communication skills. DESIRABLE EXPERIENCE. VulnerabilityAssessment experience. Knowledge of Penetration testing tools and techniques. Network and firewall alert management. Active Directory and group policy management experience. Experience in deploying, managing, and supporting of More ❯
Directory Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerabilityassessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft More ❯
Directory Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerabilityassessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft More ❯
Directory Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerabilityassessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft More ❯
its adherence and updating or creating new processes for improvement and minimizing the wastage Encouraging and building automated processes wherever possible Identifying and deploying security measures by continuously performing vulnerabilityassessment and risk management Incident management and root cause analysis Coordination and communication with team and with customers both external and internal Selecting and deploying appropriate CI/ More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sparta Global Limited
a 'Spartan' consultant. In this role you will undertake: Network Security - Understanding of firewall configuration, intrusion detection/prevention systems (IDS/IPS), and secure network protocols. Penetration Testing & VulnerabilityAssessment - Skills in identifying, simulating, and remediating vulnerabilities through tools (e.g., Nessus, Metasploit) and manual testing. Incident Response & Forensic Analysis - Ability to manage and respond to security breaches More ❯
Windows) hardening procedures and impact on operation Experience with requirements management tools (e.g. DOORS, Codebeamer) Working knowledge of Networking Security technologies and solutions (Firewalls, IDS, Routing, Switching) Experience with vulnerabilityassessment, penetration testing, risk assessments and associated tools Knowledge of domain standards (e.g. ISO 27001, ICAO 9985) and how to apply them to product development and the support More ❯
to maintain service uptime. Plan and provision workloads for service enhancements, projects and client service requests to efficiently support the dynamic business needs. Enforce security policies by conducting regular vulnerability assessments. Ensuring the team patches and hardens systems as required whilst adhering to corporate Information Security Policies, Azure Security Benchmark and CIS controls. Collaboration with cross-functional teams (Development … is respected and valued Application and Interview Process To apply for this role, you will need to submit a CV and answer some pre-screening questions. The interview and assessment process for this role will involve a telephone interview with our Talent Team, followed by a first stage and a final stage interview. Interviews will be conducted either remotely More ❯
skills, with the ability to lead cross-functional teams and work independently. Technical Expertise Required Network Security Technologies: Expertise in Network Access Control (NAC), IPS, Firewalls (FW), Endpoint Protection, VulnerabilityAssessment tools, Mobile Device Management (MDM), and other similar cybersecurity solutions for both IT and OT environments. Networking Protocols & Infrastructure: Deep understanding of networking technologies such as routing More ❯
What You’ll Be Working On: ️ Monitoring network traffic and system activity to detect potential security threats ️ Analyzing security incidents and performing root cause analysis ️ Conducting vulnerability assessments and risk evaluations to identify weaknesses ️ Implementing security measures and controls to protect against data breaches and cyberattacks ️ Assisting in the development and implementation of security policies and procedures What We … or in a similar cybersecurity role ️ Strong knowledge of network security, firewalls, IDS/IPS, and endpoint security ️ Familiarity with security monitoring tools (e.g., SIEM, Splunk, Qualys) ️ Experience with vulnerability management, penetration testing, and incident response ️ Certifications such as CISSP, CISM, CompTIA Security+ or equivalent are highly desirable #J-18808-Ljbffr More ❯