implement corrective actions on current platform(s). Experience in managing and maintaining application integration leveraging current networking concepts (TCP/IP, routing, firewalls) Oversee and conduct regular cybersecurity vulnerability assessments and penetration testing. Develop and maintain security incident response plans and procedures. Develop and implement automation scripts and tools to streamline platform deployments, provisioning, and management tasks. Deploy More ❯
security controls and supporting documentation as required for risk management framework (RMF). • Fault finding, analysis and of logging information for reporting of performance exceptions. • Support security incident reporting, vulnerability assessments, and information assurance compliance scans. • Maintain system evaluations and certifications. • Facilitate the creation and maintenance of Identity and Device Management • Provide platform administration for Linux based applications. • Provide More ❯
security controls and supporting documentation as required for risk management framework (RMF). Fault finding, analysis and of logging information for reporting of performance exceptions. Support security incident reporting, vulnerability assessments, and information assurance compliance scans. Maintain system evaluations and certifications. Facilitate the creation and maintenance of Identity and Device Management Provide platform administration for Linux based applications. Provide More ❯
management solutions. in Aberdeen Proving Grounds. MD Key Responsibilities: • Work on a small team of cyber engineers to perform security assessments in search of vulnerabilities and identify mitigations. • Conduct vulnerability assessments on web applications, networked devices, standalone software products, and other technologies as assigned using the penetration testing life cycle. • Maintain test efficacy by identifying and applying new testing More ❯
implement corrective actions on current platform(s). - Experience in managing and maintaining application integration leveraging current networking concepts (TCP/IP, routing, firewalls) - Oversee and conduct regular cybersecurity vulnerability assessments and penetration testing. - Develop and maintain security incident response plans and procedures. - Develop and implement automation scripts and tools to streamline platform deployments, provisioning, and management tasks. - Deploy More ❯
implement corrective actions on current platform(s). - Experience in managing and maintaining application integration leveraging current networking concepts (TCP/IP, routing, firewalls) - Oversee and conduct regular cybersecurity vulnerability assessments and penetration testing. - Develop and maintain security incident response plans and procedures. - Develop and implement automation scripts and tools to streamline platform deployments, provisioning, and management tasks. - Deploy More ❯
all technical controls are clearly defined with planned inputs, expected behaviors, and functional outcomes. Contribute to the assembly of the full RMF Security Authorization Package, including the SSP, Security Assessment Report (SAR), POA&M, risk statements, and briefing materials for the Authorizing Official (AO). Develop and update required RMF and system documentation including: Monitoring Strategy Document POA&M … and SSP updates System Security Plan Analysis Security Categorization Review Security Plan Approval Recommendation Letter SAR with vulnerabilityassessment results Issue Resolution and Remediation Status Reports Residual Risk Statements for Risk Acceptance Recommendations Presentation briefings and meeting support documents Collaborate with ISSMs, ISSOs, SCARs, and system owners to gather evidence, produce high-quality deliverables, and ensure traceability of … control implementation and assessment results. Author, edit, and standardize RMF documentation to ensure clarity, completeness, and consistency across systems, adhering to DoD, AFMAN, and USAFA-specific templates and quality standards. Maintain alignment between documentation and actual system behavior, identifying gaps or noncompliance early and supporting remediation planning. Provide peer review, formatting, and compliance support across all cybersecurity deliverables, including More ❯
for a driven technology auditor who wants to play a role in audit execution which focuses on the review of technology processes, the analysis of risks involved, and the assessment of the design and operating effectiveness of the controls implemented to mitigate the risk. Audits may include the assessment of areas such as access management, IT operations, job … scheduling/monitoring, data transfer (focusing on the completeness/accuracy of this), network security, cyber security, system development and testing, vulnerabilityassessment and penetration testing, and operational resilience. Must Haves: Previous experience as a technology auditor covering IT application and general controls, application development, information security, technology consulting or other relevant industry experience Basic understanding of software More ❯
Office, Security Operation Centre of Data Centre for implementing security policies, projects and security controls. Work with Internal Audit and other departments to execute penetration tests, cybersecurity risk self-assessment, ensure best practice and international baseline standards are in place and in line with local regulations.The ideal candidate will be responsible for managing information security systems, ensuring compliance with … implement, and maintain information security policies, procedures, and guidelines.- Conduct regular security audits and assessments to identify vulnerabilities and ensure compliance with industry standards (e.g., ISO 27001).- SIEM & Vulnerability Management.- Monitor and respond to security incidents, conducting investigations and implementing corrective actions.- Collaborate with IT and other departments to ensure the security of network infrastructure and data.- Manage … risk assessments and vulnerability assessments to identify potential security threats.- Oversee the implementation of security measures such as firewalls, intrusion detection systems, and data encryption technologies.- Provide training and guidance to staff on information security best practices.- Stay updated on the latest cybersecurity trends and technologies.**Qualifications:**- Bachelor's degree in Information Security, Computer Science, or a related field. More ❯
complex and rewarding challenges. Join our team. Barbaricum is seeking a Compliance Specialist to support cybersecurity and assurance activities across Navy enterprise systems. This role will provide STIG enforcement, vulnerabilityassessment, and secure configuration guidance to maintain accreditation and cyber readiness. Responsibilities: Conduct vulnerability scans and analysis for Windows and Linux/UNIX systems Enforce STIG controls More ❯
emerging technologies, exploitation techniques, and custom tools Perform reverse engineering of cyber actor tools and techniques to advance defenses Perform network analysis and design for law enforcement operations Conduct vulnerability research and analysis of technical information Support systems integration for law enforcement operations Develop custom scripts and tools for data collection and analysis Implement secure development practices for sensitive … Mid-Level-Proficiency with: Python or other scripting languages Basic malware analysis techniques Network protocol analysis Data collection and processing Linux and Windows operating systems Basic reverse engineering concepts Vulnerabilityassessment techniques Version control systems (Git) Containerization (Docker) Experience with tool development for cyber operations Understanding of cyber threat actor tactics, techniques, and procedures Senior-Level Advanced proficiency … with: Advanced programming in multiple languages Complex malware analysis and reverse engineering Exploit development and vulnerability research Advanced network analysis and protocol manipulation Tool development for specialized cyber operations Custom data processing and analytics pipelines Secure coding practices for operational tools Cloud platforms (AWS GovCloud, SC2S, C2S) DevSecOps practices for rapid deployment Demonstrated experience developing advanced capabilities for cyber More ❯
Hampton, New Hampshire, United States Hybrid / WFH Options
Unitil Service Corporation
OT/IT environment from cyber threats and ensuring the continuous and safe operation of essential industrial processes. Additionally, this position will be responsible for OT asset inventory and vulnerability management for the company's network assets including firewalls, switches, IoT devices which includes physical security systems, cameras, UPS devices, HVAC and lighting controls. Key Responsibilities: Cybersecurity Assessment: Conduct security assessments and vulnerability assessments on IT/OT systems to identify potential weaknesses and threats. Incident Response: Develop and implement incident response plans specific to OT environments to detect and mitigate cyber incidents. Network Security: Design, implement, and maintain security measures for OT networks, including firewalls, intrusion detection systems, and access controls. Patch Management: Oversee patch … the OT environment, aligned with industry standards and regulatory requirements. Security Monitoring: Implement real-time monitoring solutions to detect anomalies and unauthorized access in OT networks and systems. Risk Assessment: Perform risk assessments and develop risk mitigation strategies for OT assets and processes. Compliance: Ensure compliance with relevant industry standards and regulations, such as NERC-CIP and CIS. Collaboration More ❯
data engineering, data science, advanced analytics techniques, research and development, and innovation within one or more of the Cybersecurity sciences (e.g. network, endpoint and cloud security, cryptography, malware analysis, vulnerabilityassessment, privileged access management, anomaly/intrusion detection, incident response, or offensive security). The Principal Cybersecurity Analytics Engineer role is a key leadership, hands on technical role More ❯
Boundary Protection Team Operator for the 26 Network Operations Squadron (26 NOS) at Maxwell Air force Base-Gunter Annex, Alabama. o Oversees intrusion detection, intrusion prevention, boundary protection and vulnerabilityassessment operations to defend the Air Force Network (AFNet). o Identifies unknown or unauthorized sources which attempt to access the AFNet and, when such attempts occur, notifies More ❯
Uxbridge, London, United Kingdom Hybrid / WFH Options
Network IT
alignment with IT transformation goals. Lead and manage a high-performing team, responsible for wired, Wi-Fi, and remote access services. Oversee the security of the network , including compliance, vulnerability assessments, and incident response. Provide technical and strategic advice to senior stakeholders on network performance and emerging risks. Manage budgets, procurement, and vendor relationships, ensuring cost-effective service delivery. More ❯
Uxbridge, Middlesex, England, United Kingdom Hybrid / WFH Options
Network IT
alignment with IT transformation goals. Lead and manage a high-performing team, responsible for wired, Wi-Fi, and remote access services. Oversee the security of the network , including compliance, vulnerability assessments, and incident response. Provide technical and strategic advice to senior stakeholders on network performance and emerging risks. Manage budgets, procurement, and vendor relationships, ensuring cost-effective service delivery. More ❯
Nottinghamshire, England, United Kingdom Hybrid / WFH Options
Digital Waffle
response plans, ensuring continuous improvements Integrate security practices seamlessly into the DevOps pipeline Manage and optimise monitoring tools to provide real-time threat visibility Carry out regular threat and vulnerability assessments, applying effective remediation strategies Coach and mentor colleagues, keeping the team ahead of evolving risks and technologies What you bring: Significant experience in security operations across both cloud More ❯
nottingham, midlands, united kingdom Hybrid / WFH Options
Digital Waffle
response plans, ensuring continuous improvements Integrate security practices seamlessly into the DevOps pipeline Manage and optimise monitoring tools to provide real-time threat visibility Carry out regular threat and vulnerability assessments, applying effective remediation strategies Coach and mentor colleagues, keeping the team ahead of evolving risks and technologies What you bring: Significant experience in security operations across both cloud More ❯
and Log Analytics. Creating dashboards and reports with Power BI to visualise system performance. Ensuring security and compliance with GDPR, ISO 27001, RBAC, and NSGs. Conducting security audits and vulnerability assessments using Azure Security Centre. Collaborating across engineering teams to align goals and resolve technical issues. Mentoring junior team members and promoting a culture of continuous improvement. Providing expert More ❯
Experience with Supply Chain Risk Management, including one or more of the following: assessing system and component criticality, mapping supply chains, identifying critical suppliers, assessing supply chain threat and vulnerability assessments, conducting risk identification and mitigation, and monitoring mitigation effectiveness over time. Ability to conduct open-source research to identify potential disruptions, threats, and vulnerabilities to ASPR equities. Ability More ❯
Computer Science or a related technical field (equivalent military training may be considered). Strong understanding of IP core infrastructure, network traffic analysis, and cybersecurity. Experience with SIGINT analysis, vulnerability assessments, or penetration testing. Demonstrated ability to work with multi-disciplinary teams in high-stakes environments. An active TS/SCI clearance with polygraph Salary Range More ❯
legacy CRMs UI/UX into a modern, high-performance platform Cybersecurity & Risk Management Own enterprise cybersecurity strategy, audits, and incident response Design post-attack processes and lead quarterly vulnerability assessments Infrastructure & Performance Optimise PHP/MySQL stack for speed, uptime, and stability Resolve CRM bottlenecks and implement diagnostic monitoring tools Systems Integration & Data Strategy Integrate platforms like SpeechIQ More ❯
CRM’s UI/UX into a modern, high-performance platform Cybersecurity & Risk Management Own enterprise cybersecurity strategy, audits, and incident response Design post-attack processes and lead quarterly vulnerability assessments Infrastructure & Performance Optimise PHP/MySQL stack for speed, uptime, and stability Resolve CRM bottlenecks and implement diagnostic monitoring tools Systems Integration & Data Strategy Integrate platforms like SpeechIQ More ❯
legacy CRMs UI/UX into a modern, high-performance platform Cybersecurity & Risk Management Own enterprise cybersecurity strategy, audits, and incident response Design post-attack processes and lead quarterly vulnerability assessments Infrastructure & Performance Optimise PHP/MySQL stack for speed, uptime, and stability Resolve CRM bottlenecks and implement diagnostic monitoring tools Systems Integration & Data Strategy Integrate platforms like SpeechIQ More ❯
Network Security Architect experience. Extensive understanding of the DoD standards guiding the development of cybersecurity policy, requirements, integration, engineering, and certification and accreditation. Perform security, analyses and risk/vulnerability assessments. Execute day to day certification and accreditation activities for a project team. Qualifications: Active DoD Secret Clearance. Master's degree and 15+ years of relevant experience. This is More ❯