Permanent Vulnerability Assessment Job Vacancies

201 to 225 of 544 Permanent Vulnerability Assessment Jobs

Cloud Security Engineer

Farnborough, England, United Kingdom
Hybrid / WFH Options
Copello Global
infrastructure within the programme, applying appropriate security frameworks and implementing the right controls to ensure the security and integrity of relevant information. Your role will cover several core areas, vulnerability assessments (scanning and reporting), system hardening, endpoint security and incident management. You will ensure relevant documentation around these activities is maintained while working effectively with the wider team. The … Skills This role requires a Security Engineer possessing a blend of Information Security and Cyber Security skills with knowledge of: Cloud Security (AWS) Experience in Vulnerability Assessments and Incident Management, Implementation of security controls, UK Information Security standards (eg. MoD, NCSC, NIST), Excellent communication skills, Clearance UK Security Clearance is essential to start. Apply To apply, follow the instructions More ❯
Posted:

OT Cyber Security Analyst

North East, England, United Kingdom
SR2
of safeguarding Industrial Control Systems and SCADA networks from evolving cyber threats.Key Responsibilities: Monitor and assess OT cybersecurity systems, ensuring effective threat detection and response. Conduct threat analysis and vulnerability assessments to support incident response activities. Develop and implement incident response plans tailored to OT environments. Support vulnerability management initiatives and penetration testing exercises. Contribute to policy development More ❯
Employment Type: Full-Time
Salary: £36,000 - £45,000 per annum
Posted:

Cybersecurity Engineer with Security Clearance

Lexington Park, Maryland, United States
Fusion 2 Inc
Cyber Artifacts Management: Manage and assess cyber artifacts to ensure proper documentation and readiness for cyber assessments. • Cyber Testing: Develop, execute, and analyze cyber testing efforts including penetration tests, vulnerability assessments, and cybersecurity audits. • Risk Management Framework (RMF) Implementation: Guide and support the implementation of the RMF process, including categorizing information systems, selecting security controls, and managing security control … Security Technical Implementation Guides (STIGs) and maintain up-to-date security configurations. • Obtain ATO: Coordinate efforts across teams to prepare systems for ATO through proper documentation, risk assessments, and vulnerability remediation. • Collaboration: Work closely with program managers, engineers, and clients to ensure alignment with project goals and compliance with cybersecurity best practices. • Documentation & Reporting: Assist in the creation of … field. • Experience: 5+ years of experience in cybersecurity engineering, cyber risk management, or cyber testing. • Technical Expertise: Demonstrated experience with RMF, STIGs, and ATO processes. Hands-on experience with vulnerability management tools, penetration testing, and cyber defense technologies. • Communication: Strong ability to produce clear, concise technical reports, and provide briefings to clients and leadership. • Security: Experience working on classified More ❯
Employment Type: Permanent
Salary: USD 150,000 Annual
Posted:

Contract Cyber Security Engineer

London, England, United Kingdom
WA Consultants
month contract. The successful candidate will support a Public Sector client of ours within their Application Security Team and will be responsible for the following: * Perform penetration testing and vulnerability assessments of web applications, APIs, and cloud infrastructure. * Evaluate the automated security tooling into CI/CD pipelines (SAST, DAST, dependency checking, IaC etc), and make necessary recommendations. * Collaborate … line with set guidelines. * SC Clearance is an essential requirement for this role, as a minimum you must be willing & eligible to undergo checks. * Penetration testing, ethical hacking, or vulnerability assessments. * Security testing tools (e.g., Burp Suite, OWASP ZAP, Nikto, Nmap, Metasploit, etc.). * DevSecOps principles and tools (e.g., Veracode, SonarQube, GitHub Advanced Security, IaC scanning, etc.). * Secure More ❯
Posted:

Sr. Systems Administrator with Security Clearance

Maryland, United States
August Schell Enterprises
focused, and motivated candidate who can adapt to a constantly changing environment. What you will do - Manage and maintain a complex server-based enclave. Performing and mitigating system scans, vulnerability management activities, and active directory configuration. - Plan and implement IT enhancements needed for system optimization. - Identify and remediate hardware and/or software issues. - Create and update clear, concise … and accurate incident resolution documentation. - Support overlapping projects and maintain good inter-departmental relations. - Communicate and publish statuses of system outages, as needed. - Manage information assurance vulnerability alerts (IAVAs) and system security scanning of equipment suites in accordance with System Security Plans. - Actively identify and initiate IAVA responses and system security scans for remediation, deploy IAVA patches and/… and comprehension, development, integration, configuring data inputs and forwarders, data management, and/or monitoring. - Experience with Network Security Technologies such as Multiple Domain, PKI, SSP, and/or Vulnerability Assessment. - Experience with High Assurance Internet Protocol Encryptor (HAIPE) devices for in-line Network Encryption. - Experience with Puppet, Docker/Rancher, SALT. All are welcome At August Schell, we More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security Engineer

London, England, United Kingdom
Damia Group Ltd
You will be joining an AppSec team focused on building security automation into delivery pipelines and conducting security focused tests against digital services. Key Responsibilities Perform penetration testing and vulnerability assessments of web applications, APIs, and cloud infrastructure. Evaluate the automated security tooling into CI/CD pipelines (SAST, DAST, dependency checking, IaC etc), and make necessary recommendations. Collaborate … AWS, Azure, or GCP) and DevSecOps tooling. Assist in maintaining security assurance across the SDLC in line with MoJ and NCSC guidelines. Essential Criteria Penetration testing, ethical hacking, or vulnerability assessments. Security testing tools (e.g., Burp Suite, OWASP ZAP, Nikto, Nmap, Metasploit, etc.). DevSecOps principles and tools (e.g., Veracode, SonarQube, GitHub Advanced Security, IaC scanning, etc.). Secure More ❯
Posted:

Network Engineer - Mandarin Speaking

City of London, England, United Kingdom
Michael Page (UK)
and logs to detect unusual activities or threats. Incident Response: Assist in the investigation and response to security incidents, such as malware infections, unauthorized access attempts, and data breaches. Vulnerability Management: Assist in conducting vulnerability assessments and penetration testing to identify potential system and network weaknesses. Work with senior team members to apply patches and updates to mitigate More ❯
Posted:

CNO Developer / Computer Scientist / Reverse Engineer with Security Clearance

Annapolis Junction, Maryland, United States
Elucidation Concepts LLC
o Reverse Engineering: • Analyze, decompile, and reverse-engineer software binaries to understand vulnerabilities and potential exploits. • Develop proof-of-concept exploits to demonstrate potential vulnerabilities in targeted systems. o Vulnerability Research • Identify, analyze, and document software vulnerabilities. • Collaborate with team members to develop mitigations and workarounds for discovered vulnerabilities. o System and Network Analysis: • Conduct network traffic analysis to … Participate in design and code reviews to ensure adherence to best practices and standards. o Documentation: • Prepare detailed technical documentation and reports, including user guides, system design documents, and vulnerability assessments. • Ensure all documentation is clear, concise, and accessible to team members and stakeholders. Required Qualifications: o Clearance: Active TS/SCI with Full Scope Polygraph is mandatory. o More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Security Engineer II (Remote - UK)

London, England, United Kingdom
Hybrid / WFH Options
Jobgether
in secure practices Respond to escalated incidents as part of a 24/7 on-call rotation Develop and enforce security best practices, aligned with industry standards Conduct regular vulnerability assessments and implement mitigation strategies Support audit and compliance initiatives to maintain certifications Collaborate with cross-functional teams to embed security in infrastructure and code Stay current on evolving … security engineering, including operations, blue team, DevOps, and architecture Strong knowledge of incident response, threat patterns, and mitigation strategies Hands-on experience with security tools: SIEM, IDS, DLP, MFA, vulnerability scanners, WAFs Proficient in AWS security best practices and Infrastructure as Code (e.g., Terraform, Ansible) Deep understanding of securing Windows, macOS, Linux, and virtualized environments Experience in automation/ More ❯
Posted:

Cyber Security Analyst

London, England, United Kingdom
Hybrid / WFH Options
Air IT Limited
management system Conduct investigations and security audits on a variety of software and cloud systems Carry out security assessments for clients once qualified such as Cyber Essentials assessments and vulnerability assessments. Analyse data from multiple sources to identify anomaly and security threats Manage the creation, maintenance and delivery of cyber security awareness training and phishing campaigns Support customers and … related certifications in Cyber Security. Knowledge and experience of Cyber Essentials Accreditation, or other information security standards. Experience in offensive security such as CTF or bug bounty Experience with vulnerability scanners Experience in conducting security training or phishing simulation We will invest significantly in your training, with the requirement that you will commit a portion of your own time More ❯
Posted:

Information Security Manager

Hemel Hempstead, England, United Kingdom
Smiths Detection
securing and maintaining ISO 27001 and MOD accreditation. Understanding of GDPR compliance requirements. Ability to produce security risk assessments and recommend mitigations. Experience with CPNI requirements and Threat and Vulnerability Assessments. UK National Security clearance capability. Certifications such as CISSP, CISM, CEH, or equivalent are desirable. Desirable Skills Expertise in security for IT networks, cloud services, and OS hardening. More ❯
Posted:

Information System Security Engineer with Security Clearance

Aurora, Colorado, United States
Cyber Defense Technologies
operating systems, networks, security monitoring, and tuning. • Responsible for the management of IT security systems and applications, incident response, digital forensics, loss prevention, and eDiscovery actions, conducting risk and vulnerability assessments, and developing and implementing security controls. • Research, evaluate, and recommend new security tools, techniques, and technologies in alignment with program security strategy. • Configure and utilize the ELK Stack More ❯
Employment Type: Permanent
Salary: USD 180,000 Annual
Posted:

Sr. Test Engineer with Security Clearance

Annapolis Junction, Maryland, United States
Ring0 Technologies, Inc
Configure and maintain Linux and Windows systems. Manage virtualized environments (e.g., VMware, VirtualBox). Troubleshoot networking issues, including IP address configuration and virtual NICs. 5. Security and Compliance: Conduct vulnerability assessments and remediation. Apply cybersecurity principles to ensure secure software and system design. Qualifications: Education: BS in Computer Science or equivalent technical field. Advanced degree preferred. Experience: 5+ years More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

AI/ML Solutions Architect - Program Lead with Security Clearance

Fairborn, Ohio, United States
SDV International
into operational systems and federated architectures Support systems maintenance, upgrades, and lifecycle sustainment Cybersecurity & Risk Management Implement security controls and support Authority to Operate (ATO) Conduct cyber analytics and vulnerability assessments Manage cybersecurity risk across networks, tools, and data environments Engineer security into AI models and supporting systems Project Management Responsibilities Serve as the primary point of contact for More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Network Engineer

Belfast, Northern Ireland, United Kingdom
Hybrid / WFH Options
JR United Kingdom
security incidents. Conduct capacity planning and recommend hardware/software upgrades. Security & Compliance; Implement and manage network security policies, firewalls, and intrusion detection systems (IDS/IPS). Perform vulnerability assessments and network penetration testing. Ensure compliance with ISO 27001, GDPR, SOC 2, and other industry standards. Cloud & Virtualization Networking; Manage cloud networking (AWS, Azure, Google Cloud) including VPCs More ❯
Posted:

Network Engineer

Londonderry, Northern Ireland, United Kingdom
Hybrid / WFH Options
Digital Waffle
security incidents. Conduct capacity planning and recommend hardware/software upgrades. Security & Compliance; Implement and manage network security policies, firewalls, and intrusion detection systems (IDS/IPS). Perform vulnerability assessments and network penetration testing. Ensure compliance with ISO 27001, GDPR, SOC 2, and other industry standards. Cloud & Virtualization Networking; Manage cloud networking (AWS, Azure, Google Cloud) including VPCs More ❯
Posted:

Cyber Security Consultant

London, England, United Kingdom
Hybrid / WFH Options
Moore Kingston Smith
A client-focused mindset with strong problem-solving skills Industry certifications (e.g. ISO 27001 Lead Auditor, CISSP, CISA, CISM) are a bonus If you have exposure to penetration testing, vulnerability assessments, cloud security (e.g. AWS, Azure, GCP) or Operational Technology (OT) - that's a real plus! What's in it for you? A client-facing role in a supportive More ❯
Posted:

Network Engineer

Omagh, Northern Ireland, United Kingdom
Hybrid / WFH Options
Digital Waffle
security incidents. Conduct capacity planning and recommend hardware/software upgrades. Security & Compliance; Implement and manage network security policies, firewalls, and intrusion detection systems (IDS/IPS). Perform vulnerability assessments and network penetration testing. Ensure compliance with ISO 27001, GDPR, SOC 2, and other industry standards. Cloud & Virtualization Networking; Manage cloud networking (AWS, Azure, Google Cloud) including VPCs More ❯
Posted:

Senior Network Architect

London, England, United Kingdom
Dynamic Search Solutions
Lead strategic network transformation projects, focusing on Cisco-based security technologies (Firepower, ASA, ISE, Umbrella, etc.) Develop network security policies, best practices, and high-availability solutions Perform risk analysis, vulnerability assessments, and network hardening Collaborate with cross-functional teams to align network architecture with business goals What We’re Looking For: CCIE (Security or Enterprise Infrastructure) – active certification required More ❯
Posted:

Chief Technology Officer

London, UK
Hybrid / WFH Options
TranzyPay
APIs). Ensure robust integration capabilities with payment gateways, partner banks, and other relevant third-party systems. · Develop and implement comprehensive security policies, procedures, and controls. · Oversee security audits, vulnerability assessments, and penetration testing. · Collaborate with the Chief Compliance Officer (CCO) to ensure technology solutions meet all regulatory obligations within the remittance industry. Qualifications Proficiency in Software Development and More ❯
Posted:

Chief Technology Officer

City of London, Greater London, UK
Hybrid / WFH Options
TranzyPay
APIs). Ensure robust integration capabilities with payment gateways, partner banks, and other relevant third-party systems. · Develop and implement comprehensive security policies, procedures, and controls. · Oversee security audits, vulnerability assessments, and penetration testing. · Collaborate with the Chief Compliance Officer (CCO) to ensure technology solutions meet all regulatory obligations within the remittance industry. Qualifications Proficiency in Software Development and More ❯
Posted:

Senior Cyber Security Analyst with Security Clearance

Arlington, Virginia, United States
Hybrid / WFH Options
ICF
ability to communicate effectively with various clients in order to explain and elaborate on technical details Practical experience with different scripting languages (e.g., Python, JavaScript, etc.) Experience with system vulnerability assessments Knowledge of Linux/Unix and Windows operating systems security Knowledge of computer programming and scripting languages Excellent written and verbal communication skills Scaled Agile Framework (SAFe) experience More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Linux Threat Hunter-TS/SCI with FS Poly with Security Clearance

Chantilly, Virginia, United States
Inferno Systems
relate alternative solutions and risks. • Develop routine proposals incorporating appropriate technical and operational issues into a plan based on consensus. • Write correspondence and coordinate with participants regarding operational plans, vulnerability assessments, risk evaluations, possible remedies, or execution plans. When appropriate, prepare intelligence reports following guidelines. • Ability to analyze the operational environment to identify appropriate equipment/systems required to More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Information Security Manager

London, England, United Kingdom
Hybrid / WFH Options
Crown Agents Bank
sleeves to get things done. Responsibilities Advise and support project teams to embed security best practices throughout the project lifecycle. Scope, manage, and track remediation of penetration testing and vulnerability assessments. Maintain application security processes, standards and guidelines. Translate application security policies into security requirements. Conduct and document security risk assessments on changes, threats, vulnerabilities, and new initiatives. Perform More ❯
Posted:

DevOps PaaS Engineer (Sr. RHEL Engineer) - Secret Clearance Required

Colorado Springs, Colorado, United States
Maximus
Platforms, including data services, storage, networking, and security components. -Monitor and optimize system performance, and implement corrective actions on a hybrid/private cloud-based platform. -Conduct regular cybersecurity vulnerability assessments and penetration testing. -Develop and maintain security incident response plans and procedures. -Develop and implement automation scripts and tools to streamline platform deployments, provisioning, and management tasks. -Deploy More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:
Vulnerability Assessment
10th Percentile
£41,750
25th Percentile
£47,531
Median
£57,500
75th Percentile
£77,500
90th Percentile
£89,875