Permanent Vulnerability Assessment Job Vacancies

226 to 250 of 280 Permanent Vulnerability Assessment Jobs

Sr. Information System Security Engineer with Security Clearance

Columbia, Maryland, United States
Cyber Bat Inc
in-Depth principles and technology, including access/control, authorization, identification and authentication, Public Key Infrastructure (PKI), network and enterprise security architecture • 2 years of experience applying security risks assessment methodology to system development, including threat model development, vulnerability assessments, and resulting security risk analysis • A Master's Degree in Computer Science or IT Engineering is desired and More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Information Systems Security Engineer with Security Clearance

Maryland, United States
Cyber Bat Inc
in-Depth principles and technology, including access/control, authorization, identification and authentication, Public Key Infrastructure (PKI), network and enterprise security architecture • 2 years of experience applying security risks assessment methodology to system development, including threat model development, vulnerability assessments, and resulting security risk analysis • A Master's Degree in Computer Science or IT Engineering is desired and More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Test Engineer (Security) - Companies House - HEO

United Kingdom
Hybrid / WFH Options
Manchester Digital
promote a culture of continuous improvement. We are seeking an enthusiastic Senior Test Engineer (Non-Functional Security) with strong technical skills to deliver and support security testing workstreams, including vulnerability assessments and penetration testing. You will guide other testers on security testing best practices. You will be part of our non-functional testing specialist team, collaborating closely with your … SC) is required, with at least 3 out of the last 5 years in the UK. Key responsibilities Coordinate and execute security testing within the software development lifecycle, including vulnerability scans using tools like Burp Suite, and testing security issues. Support the wider testing team by sharing knowledge on security testing approaches and tools. Attend meetings and update stakeholders. … similar cloud providers, SQL/MongoDB/Oracle, Karate DSL or Rest Assured, Git, SAST/DAST tools, IaC scanning tools, threat modelling, OWASP Top 10 testing approaches. Behaviours Assessment will include: Making Effective Decisions Managing a Quality Service Working Together Seeing the Big Picture Technical skills Further technical skills will be assessed during the selection process. More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

DevSecOps Engineer - Security Clearance Required

Colorado Springs, Colorado, United States
Maximus
SaaS - Collaborate with development and operations teams to design, implement, and maintain secure and automated infrastructure. - Implement security best practices throughout the software development lifecycle (SDLC), including code scanning, vulnerability assessment, and threat modeling. - Develop and maintain CI/CD pipelines, enabling continuous integration, continuous delivery, and continuous deployment of applications. - Develop and maintain containerization and micro-services. … Integrate security controls, such as automated vulnerability scanning, static and dynamic analysis, and security testing, into the CI/CD process. - Collaborate with cross-functional teams to ensure compliance with security standards and regulatory requirements. - Automate and orchestrate security processes, including incident response and threat detection, using technologies like Splunk, Chef Automate, and others. - Stay updated with emerging DevSecOps More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

DevSecOps Engineer - Security Clearance Required

Annapolis Junction, Maryland, United States
Maximus
SaaS - Collaborate with development and operations teams to design, implement, and maintain secure and automated infrastructure. - Implement security best practices throughout the software development lifecycle (SDLC), including code scanning, vulnerability assessment, and threat modeling. - Develop and maintain CI/CD pipelines, enabling continuous integration, continuous delivery, and continuous deployment of applications. - Develop and maintain containerization and micro-services. … Integrate security controls, such as automated vulnerability scanning, static and dynamic analysis, and security testing, into the CI/CD process. - Collaborate with cross-functional teams to ensure compliance with security standards and regulatory requirements. - Automate and orchestrate security processes, including incident response and threat detection, using technologies like Splunk, Chef Automate, and others. - Stay updated with emerging DevSecOps More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Boundary Security Engineer with Security Clearance

Montgomery, Alabama, United States
TEKsystems c/o Allegis Group
Boundary Protection Team Operator for the 26 Network Operations Squadron (26 NOS) at Maxwell Air force Base-Gunter Annex, Alabama. o Oversees intrusion detection, intrusion prevention, boundary protection and vulnerability assessment operations to defend the Air Force Network (AFNet). o Identifies unknown or unauthorized sources which attempt to access the AFNet and, when such attempts occur, notifies More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Infrastructure Security Manager - Banking & Finance

Edinburgh, United Kingdom
Hybrid / WFH Options
Hamilton Barnes Associates Limited
in ensuring the security and integrity of the infrastructure, which includes the data centers, cloud environments, networks, and office/branch assets. This is an exciting opportunity to lead vulnerability assessments, drive remediation efforts, and enforce secure builds and configurations across our estate. Key Responsibilities: Lead the implementation of Infrastructure & Cloud security strategies, policies, controls, services, metrics, and compliance. … Oversee and support vulnerability management efforts across both on-premise and cloud environments. Contribute to the strategy, policy, controls, services, and metrics related to network security, including WAF, DDoS protection, and firewalls. Experience & Skills: Primary Expertise: Vulnerability management within infrastructure environments, with proven experience leading teams. Secondary Expertise: Knowledge and experience in network security, including firewalls, micro-segmentation More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Engineer - SC cleared

London, United Kingdom
Hybrid / WFH Options
Sanderson Government and Defence
processes and outcomes to reduce vulnerabilities across the Engineering estate; taking a lead role in detecting and responding to advanced threats across a growing portfolio of clients. Experience & responsibilities Vulnerability Scanning & Reporting - performing regular vulnerability scans and generating reports using SonarQube, Trivvy & Nessus; ensuring tool sets are kept up to date and that scans are performed regularly and … regular system compliance audits and updates, ensuring systems are compliant with industry best practices. (CIS, STIG, NIST etc.) Performing regular reviews and updates to security enforcing GPOs, conducting periodic vulnerability assessments to identify and address potential vulnerabilities. About You You will possess hands on experience working in a similar Cyber Engineering role with a working knowledge of SonarQube, Nessus … and Ivanti and a broad experience spanning Vulnerability Scanning & Reporting, Endpoint Security, Incident Management & System Hardening. Security Clearance: Must hold an active SC clearance If you're interested in hearing more about this opportunity, please submit your application. Reasonable Adjustments: Respect and equality are core values to us. We are proud of the diverse and inclusive community we have More ❯
Employment Type: Permanent
Salary: £70,000
Posted:

PRINCIPAL ISSO (364) - VIRGINIA- URGENT with Security Clearance

Fort Belvoir, Virginia, United States
Cyberstrike Group
years or Master Degree years experience or 20 years of experience Experience identifying and managing system vulnerabilities and security events, particularly in cloud environments Experience tracking, reporting, and updating vulnerability management alerts, vulnerability assessments, red/blue team events, security incidents, and the common operating picture Familiarity with Zero Trust architecture principles as they relate to data security More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security Consultant - System Integrator

England, United Kingdom
Hybrid / WFH Options
Hamilton Barnes Associates Limited
to advance your cyber security career in a dynamic and supportive setting? Apply now to make an impact across diverse sectors. Key Responsibilities: Lead or support the delivery of vulnerability assessments and penetration testing projects Provide technical security consultancy and basic to intermediate-level training to clients across the UK and internationally Occasionally deputise for the Head of Cyber … directly with clients to define and deliver tailored security solutions Contribute to business development through proposal writing and client engagement Skills/Must have: Strong understanding of penetration testing, vulnerability assessments, EDR, and endpoint protection Experience working in or with government or defence clients Previous consultancy experience with client-facing responsibilities SC clearance (or willingness to undergo clearance) Excellent More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Firmware Reverse Engineer, CNO with Security Clearance

Fairfax, Virginia, United States
Legion X
cyber solutions through applied research, prototyping, and engineering services. We are a small, tight-knit company built and run by engineers who pursue the most interesting and impactful cyber vulnerability research we can find. We take on tasks like vulnerability assessments, exploit development, cyber vulnerability research, penetration tests, firmware reverse engineering, hardware reverse engineering, customized test rigs … capability development, and CNO support for both government and commercial customers. Our vision is to be the premier cyber vulnerability research and red team outfit in the nation. We are a small, new company embracing what we believe to be the best and most efficient ways of working in the modern era of cybersecurity. That means freedom and flexibility … meet these requirements or you will be rejected: -US Citizen with TOP SECRET clearance eligibility -Experience and skillset aligned with the role (firmware reverse engineering experience and skills; cyber vulnerability research skills; protocol analysis skills; communication skills; self-motivation and drive; clear interest in the work) -We do not have Certification or Degree requirements for this position your skill More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security Consultant

London, UK
Hybrid / WFH Options
Searchability
Cyber Essentials Plus assessments, including practical remediation support (certification as a Cyber Essentials Plus Assessor or similar qualifications with the intention to certify is highly advantageous) Practical experience conducting vulnerability assessments across infrastructure, networks, and applications Working knowledge of threat and vulnerability management platforms such as Qualys Strong written and verbal communication skills, with the ability to clearly More ❯
Posted:

Senior Test Engineer (Security) - Companies House - HEO

Remote working (anywhere in the UK)
Hybrid / WFH Options
Government Digital & Data
culture of continuous improvement.??? We are looking for an enthusiastic? Senior Test Engineer? (Non-Functional Security)?with great technical skills, able to deliver and support security testing workstreams, including vulnerability assessments and penetration testing. You will also offer guidance to other testers on security testing best practices.?? You will be part of our non-functional testing specialist team, working … on security you will;???? Working within a delivery team, you'll contribute to the coordination and execution of security testing across the software development lifecycle. This will involve running vulnerability scans using tools such as Burp, coordinating with relevant teams, testing security related issues.?? Support the wider test team by sharing knowledge and guidance on security testing approaches and … working towards this OR have proven working experience.??? Working knowledge of at least 5 of the following security tools and technologies: Burp Suite (including Burp Scanner) - for web app vulnerability scanning and manual security testing. OWASP ZAP - for DAST and automated security regression testing. Postman or SOAP UI - for API testing with a security focus (e.g. injection, authorisation, token More ❯
Employment Type: Permanent
Salary: £40,398 - £51,398
Posted:

Cyber Security Consultant

City of London, Greater London, UK
Hybrid / WFH Options
Searchability
Cyber Essentials Plus assessments, including practical remediation support (certification as a Cyber Essentials Plus Assessor or similar qualifications with the intention to certify is highly advantageous) Practical experience conducting vulnerability assessments across infrastructure, networks, and applications Working knowledge of threat and vulnerability management platforms such as Qualys Strong written and verbal communication skills, with the ability to clearly More ❯
Posted:

Cyber Security Consultant

London, South East, England, United Kingdom
Hybrid / WFH Options
Searchability
Cyber Essentials Plus assessments, including practical remediation support (certification as a Cyber Essentials Plus Assessor or similar qualifications with the intention to certify is highly advantageous) Practical experience conducting vulnerability assessments across infrastructure, networks, and applications Working knowledge of threat and vulnerability management platforms such as Qualys Strong written and verbal communication skills, with the ability to clearly More ❯
Employment Type: Full-Time
Salary: £60,000 - £65,000 per annum
Posted:

Senior Test Engineer (Security)

Cardiff/remote, Cardiff
Hybrid / WFH Options
Companies House
culture of continuous improvement. We are looking for an enthusiastic Senior Test Engineer (Non-Functional Security) with great technical skills, able to deliver and support security testing workstreams, including vulnerability assessments and penetration testing. You will also offer guidance to other testers on security testing best practices. You will be part of our non-functional testing specialist team, working … on security you will; Working within a delivery team, you'll contribute to the coordination and execution of security testing across the software development lifecycle. This will involve running vulnerability scans using tools such as Burp, coordinating with relevant teams, testing security related issues. Support the wider test team by sharing knowledge and guidance on security testing approaches and … working towards this OR have proven working experience. Working knowledge of at least 5 of the following security tools and technologies: Burp Suite (including Burp Scanner) - for web app vulnerability scanning and manual security testing. OWASP ZAP - for DAST and automated security regression testing. Postman or SOAP UI - for API testing with a security focus (e.g. injection, authorisation, token More ❯
Employment Type: Permanent
Salary: £40,398 - £51,398
Posted:

Linux Systems Administrator with Security Clearance

Lehi, Utah, United States
FUSE Engineering
proficiency in using Nagios and Splunk for comprehensive system monitoring and analytics. Skills in automation scripts and experience with Salt and Ansible for configuration management are crucial. • Lead security vulnerability assessments and mitigation efforts on Linux systems and other devices, leveraging advanced features of Tenable Nessus. • Experience with Linux provisioning server tools such as Kickstart and Cobbler to facilitate More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Site Reliability Engineer

London, United Kingdom
AudioStack
experience (AWS or similar) A passion for designing and implementing scalable observability solutions Minimum 3 years experience working in a backend-related role Desirable: Security expertise or interest in vulnerability assessments Tech Stack: Kubernetes (Knative) for containerized workloads AWS Lambda No-SQL databases PostgreSQL Serverless architectures All major AWS Services Auth0 for authentication OSO-Cloud for authorization CircleCI Git More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cloud Engineer

Rudheath, Northwich, Cheshire, England, United Kingdom
Places for People
disruption. Develop and maintain comprehensive technical documentation, including build guides and topology diagrams. Collaboratewithcross-functional teams to deliver high-quality, cost-effective solutions. Ensure compliance withsecurity standards and conduct vulnerability assessments. Provide warranty and post-deploymentsupport, ensuring smooth transition to operations. Mentor and upskill IT Service Desk and junior engineers. Skills & Experience: Essential: Proven experience in IT infrastructureengineering and More ❯
Employment Type: Full-Time
Salary: £39,500 per annum
Posted:

Vulnerability Analyst

Portsmouth, Hampshire, UK
Bestman Solutions
Operational Technology Vulnerability Analyst Hybrid (2 days onsite) | Permanent We're partnering with a UK leader in the energy transition, committed to building a zero-emissions future. As they continue to expand and modernise their infrastructure, they’re looking for a Vulnerability Analyst with a focus on Operational Technology (OT) to help keep critical systems secure. In this … control systems. You’ll work closely with cybersecurity, engineering, and operational teams to identify and address risks in environments that keep the UK running. What you’ll do: Lead vulnerability assessments across OT networks, assets, and systems Assess and prioritise risk in ICS/SCADA, PLCs, and other industrial environments Partner with cross-functional teams to mitigate vulnerabilities and … track remediation progress Stay current on emerging OT threats and attack techniques Support the evolution of tools and processes in OT vulnerability management What we’re looking for: Hands-on experience assessing vulnerabilities in OT or industrial environments Familiarity with ICS/SCADA, PLCs, HMIs, and OT architecture Understanding of OT-specific security challenges Experience using vulnerability scanning More ❯
Posted:

General Engineer with Security Clearance

Arlington, Virginia, United States
K2 Group, Inc
Assurance Benchmarks for Supporting Infrastructure The general engineer should also have a working knowledge of USAF Civil Engineering governance, programming, and processes. The general engineer will conduct a thorough vulnerability assessments across various infrastructure elements, such as water, wastewater, electricity, heating, ventilation, and air conditioning (HVAC), petroleum products, fire protection systems, generators, and natural gas systems. A crucial aspect … of this position involves performing structural engineering vulnerability assessments that address perimeter security. Experience: Minimum 10 years operational experience in the military or other comparable civilian position in structural or civil engineering role. Extensive experience with all the following blast software: Vulnerability Assessment and Protection Option (VAPO), Component Explosives Damage Assessment Workbook (CEDAW), Conventional Weapons Effects … Engineering Design Manuals. Working knowledge of issues and threats driving Design Based Threat (DBT) for military and Government facilities and construction programs. Ability to determine effects of blast, damage assessment, and physical barriers to mitigate blast affects. Excellent written and verbal communication skills. Education: Possess a Bachelor's of Science degree in Civil or Structural Engineering. Desired Skills: PhD More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Accreditor Validator Specialist III with Security Clearance

Virginia Beach, Virginia, United States
Strategic Resilience Group
alignment with DoD and Navy cybersecurity standards. The role involves conducting in-depth security assessments using STIG checklists and automated scanning tools, maintaining documentation in eMASS, and developing Security Assessment Plans and Risk Assessment Reports. The Specialist will identify and communicate security vulnerabilities, recommend risk mitigation strategies, and collaborate with system owners, engineers, and cybersecurity teams to enhance … Navy systems, ensuring compliance with DoD cybersecurity standards Conduct thorough security assessments using STIG checklists and automated scanning tools Utilize eMASS for documentation and process execution Develop detailed Security Assessment Plans and Risk Assessment reports Identify, analyze, and communicate security vulnerabilities and risk mitigation strategies to key stakeholders Collaborate with system owners, engineers, and cybersecurity professionals to enhance … experience performing Risk Management Framework Validation for Navy systems • Demonstrated experience in the following areas: o Performing STIG assessments to include using SCAP benchmarks and Evaluate STIG; o Performing vulnerability assessments with the Assured Compliance Assessment Solution tool; o Utilization and process execution within eMASS; o Developing Security Assessment Plans; o Performing Risk Assessments; o Completing full More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Security Operations Specialist (Physical Security) with Security Clearance

Arlington, Virginia, United States
K2 Group, Inc
critical assets at a level commensurate with the criticality of the missions. Perform oversight of the development, implementation and evaluation of IS security pro Responsible for overall physical security assessment focusing in the following areas: Protection Planning and Execution . This category involves the sufficiency of protection planning, resources and materials, training, and exercises that comprise an organization's … and capabilities. Access/Circulation Control . Determining whether measures are taken to screen out unauthorized personnel and vehicles and, if so, whether the measures are sufficient. Detection/Assessment . Determining whether the site has the capability to detect unauthorized entry/access. Reaction/Response . This category involves evaluating in-place reaction and response force planning … Experience: 8 - 10 years related experience Understanding of Army, Navy, Marine Corps, Air Force and Joint DoD security directives. Working knowledge of DoDI 3020.45 (Change 1) Experience in conducting vulnerability assessment for a wide-variety of mission critical infrastructure to include network and data centers, telecommunications systems, airfields, intrusion detection systems, nuclear weapons security systems, forward operating bases More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

INFORMATION SYSTEMS AUDITOR with Security Clearance

Arlington, Virginia, United States
K2 Group, Inc
This is a contingent opportunity Conducts technical cyber and communications vulnerability assessments of computer networks, other technology (OT) systems telecommunications and other communications systems. Duties: Perform oversight of the development, implementation and evaluation of IS security program policy; special emphasis placed upon integration of existing network infrastructure Advise the Information System Owner (ISO), Information Data Owner (IDO), Program Security … Officer (PSO), and the Delegated and/or Authorizing Official (DAO/AO) on any assessment and authorization issues Evaluate Authorization packages and make recommendation to the AO and/or DAO for authorization Evaluate IS threats and vulnerabilities to determine whether additional safeguards are required Advise the Government concerning the impact levels for Confidentiality, Integrity, and Availability for … the information on a system Ensure security assessments are completed and results documented and prepare the Security Assessment Report (SAR) for the Authorization boundary Initiate a Plan of Action and Milestones (POA&M) with identified weaknesses for each Authorization Boundaries assessed, based on findings and recommendations from the SAR Evaluate security assessment documentation and provide written recommendations for More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Operational Cyber Researcher

Gloucester, Gloucestershire, South West
BAE Systems
your recruiter about the options Requisition ID: 121883 Grade: GG10 - GG12 Operational Cyber Group is a team of industry-leading experts in high-assurance development, research, reverse engineering, and vulnerability research. With a focus on National Security, we work on some of the country’s toughest challenges. Our people provide mission-changing capability for our customers across a wide … to have a meaningful impact on National Security. Role Description Technical delivery: be able to systematically deconstruct a wide range of technologies and protocols to perform exploratory research and assessment, as well as experimental development (this includes creating prototypes and simulations). Mentorship, team-leadership, and collaboration: work in teams to deliver high-quality reports, whilst developing junior team … task at hand. Security mindset: be capable of identifying vulnerabilities and prioritise avenues of research that will deliver the most value to our customers. Have a working knowledge of vulnerability assessment or penetration-testing techniques. What we are looking for Familiarity with a variety of tools (e.g. IDEs, debuggers, source control, Ghidra, FRIDA, Wireshark, VMs) and techniques (e.g. More ❯
Employment Type: Permanent
Posted:
Vulnerability Assessment
10th Percentile
£41,750
25th Percentile
£47,531
Median
£57,500
75th Percentile
£77,500
90th Percentile
£89,875