processes and procedures used by the Prime OEM Contractor/Subcontractor that develop software for the F-22 weapon system. • Track the F-22 system(s) documentation through the Assessment and Authorization (A&A) process ending with a signed authorization letter from the Authorizing Official. • Evaluate the technical implementation of the security design to ascertain security software, hardware, and … to understand and classify the criticality, risk of occurrence, and feasibility of mitigation strategies for legacy and support systems. The Contractor shall support and review existing and future cyber vulnerability assessments of new and legacy systems and recommend prioritized mitigation strategies. • Apply knowledge of industry cyber resiliency strategies to F-22 cyber resiliency efforts. • Contribute to and participate in More ❯
Bedford, Massachusetts, United States Hybrid / WFH Options
SkyBridge Aviation
Key Responsibilities: • Conduct comprehensive cybersecurity assessments in support of RMF accreditation for Air Force systems. • Develop and maintain cybersecurity documentation including System Security Plans (SSPs), POA&Ms, and Security Assessment Reports (SARs). • Perform control validation, security control testing, and system vulnerability assessments. • Support the Authorization and Accreditation (A&A) process in compliance with DoDI 8510.01 and NIST … 8570.01-M IAT Level III certification (e.g., CASP+, CISSP, or equivalent) • 7+ years of cybersecurity experience, including RMF and control assessments • Experience with DoD cybersecurity policies, NIST standards, and vulnerability management tools • Three (3) years of experience in a Certification and Accreditation/A&A role • Demonstrated experience with STIGs, SRGs, POA&Ms and cybersecurity best practices, as well More ❯
efforts for TRADOC G2 operations at Fort Eustis, VA, ensuring compliance with DoD Risk Management Framework (RMF), DISA STIGs, and cybersecurity policies. This role requires expertise in system accreditation, vulnerability assessments, and incident response, managing complex IT infrastructures within SCIF and open storage environments to protect critical mission data against cyber threats. Responsibilities Develop and enforce information assurance policies … and procedures. Perform risk assessments and vulnerability analyses for IT systems. Manage system accreditation processes, including RMF compliance. Oversee security audits and incident response activities. Provide guidance and mentorship to junior information assurance personnel. Qualifications Active DoD Top Secret/SCI clearance required. Bachelor's degree in cybersecurity, IT, or related field preferred. 8-13 years' experience CISSP, CISM More ❯
expert (SME) for OT systems during audits, inspections, and vendor engagements. • Evaluate new technologies and develop risk-based strategies to enhance OT cybersecurity and system reliability. • Support penetration testing, vulnerability assessments, and patch management activities in live and test environments. • Participate in a 24/7 on-call rotation to support critical infrastructure operations. Qualifications: • Bachelor's degree in … on experience deploying and configuring firewalls, switches, and routers. • Experience troubleshooting issues across all OSI model layers. • Familiarity with server virtualization (hypervisors, VMs, bare metal deployments) preferred. • Experience with vulnerability scanning and cyber tools in an OT environment is a plus. • Familiarity with the Purdue Model for ICS networks is strongly preferred. • Strong technical documentation and communication skills required. More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Corriculo Ltd
joining the internal security team, monitoring and analysing real-time security events using SIEM tools to detect and respond to potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will investigate security incidents and conduct forensic analysis to determine the root cause and recommend remediation …/XDR, mail filtering and other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetration testing/vulnerability scanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don't meet all of the criteria More ❯
ensuring mitigation plans are in place. Support the development and maintenance of security policies and standards. Assist with third-party security reviews and supplier risk management. Provide oversight of vulnerability assessments. Conduct architecture reviews for new systems and services. Evaluate technical controls and recommend improvements. Support the rollout of new security tools and technologies. Provide input into incident management … and security metrics reporting. About You: 2+ years' experience in an security role. Strong understanding of risk assessment methodologies. Knowledge of frameworks such as ISO 27001. Experience with vulnerability management and technical controls. Excellent problem-solving skills with strong attention to detail. Confident communicator with the ability to explain security concepts to non-technical stakeholders. This is more More ❯
ensuring mitigation plans are in place. Support the development and maintenance of security policies and standards. Assist with third-party security reviews and supplier risk management. Provide oversight of vulnerability assessments. Conduct architecture reviews for new systems and services. Evaluate technical controls and recommend improvements. Support the rollout of new security tools and technologies. Provide input into incident management … and security metrics reporting. About You: 2+ years' experience in an security role. Strong understanding of risk assessment methodologies. Knowledge of frameworks such as ISO 27001. Experience with vulnerability management and technical controls. Excellent problem-solving skills with strong attention to detail. Confident communicator with the ability to explain security concepts to non-technical stakeholders. This is more More ❯
ensuring mitigation plans are in place.· Support the development and maintenance of security policies and standards.· Assist with third-party security reviews and supplier risk management.· Provide oversight of vulnerability assessments.· Conduct architecture reviews for new systems and services.· Evaluate technical controls and recommend improvements.· Support the rollout of new security tools and technologies.· Provide input into incident management … and security metrics reporting. About You: · 2+ years' experience in an security role.· Strong understanding of risk assessment methodologies.· Knowledge of frameworks such as ISO 27001.· Experience with vulnerability management and technical controls.· Excellent problem-solving skills with strong attention to detail.· Confident communicator with the ability to explain security concepts to non-technical stakeholders. This is more More ❯
West Midlands Ambulance Service University NHS Foundation Trust
maintained Disability Confident Leader status and as part of our commitments to this we guarantee to invite all applicants who meet the essential criteria for a role to attend assessment or interview. If you have a disability or learning difficulty, and prefer to disclose it, please feel free to do so in your application. You can also contact the … information, reports and recommendations. Participate in the development and implementation of highly complex audit and compliance evaluation techniques and processing, ensuring the highest quality delivery of Trust Services. Conduct vulnerability assessments and other associated activities as appropriate within the Trust to Identify, remediate and mitigate risks to the Trust. Liaise with NHS England, NCSC and other relevant bodies as More ❯
Uxbridge, Middlesex, England, United Kingdom Hybrid / WFH Options
Network IT
design, implement, and maintain security network infrastructure to protect against cyber threats. Key Responsibilities: Act as a key reference point for network security , advising IT teams and stakeholders. Perform vulnerability assessments, audits, and continuous traffic monitoring for anomalies. Analyse and respond to security incidents, developing remediation and incident reports. Provide 2nd/3rd line support for network services, ensuring … Participate in project and change management, providing expertise on network security in planning and delivery. Experience Requirements: Strong technical background in network infrastructure and security operations . Experience with vulnerability assessments, incident response, and security tools. Knowledge of enterprise networking (wired, wireless, remote access). Familiarity with monitoring, alerting, and reporting solutions. Strong problem-solving skills and the ability More ❯
Surrey, England, United Kingdom Hybrid / WFH Options
Sanderson
Act as a security advocate and guide cross-functional teams in secure practices. Lead technical initiatives - Provide hands-on leadership and mentor more junior team members. Conduct threat and vulnerability assessments - Take a proactive role in identifying potential security threats. Skills and experience required: Strong experience in risk & controls within the information security, ideally in a regulated industry. Experience … e.g., multiple sites, technologies). Hands-on leadership in technical InfoSec initiatives. Strong understanding and implementation of control frameworks (NIST CSF, COBIT). Ability to run threat intelligence and vulnerability assessments. Experience collaborating with 2nd and 3rd line governance teams (e.g., audit, compliance). Strong stakeholder engagement and influencing skills. Reasonable Adjustments: Respect and equality are core values to More ❯
iAssure templates for all RMF families Process and submit Plans of Action and Milestones (POA&Ms) Ensure DISA STIGs/SRGs are implemented and enforced Perform Risk Analysis and Vulnerability Assessments Perform annual security reviews in accordance with FISMA reporting Review PPS, HW/SW listings, NSS checklists (all A&A artifacts) Minimum Requirements: An active Secret Security Clearance … end security testing of Applications (Web, Mobile, other APIs) Experience with industry standard tools such as Fortify, Checkmarx, and practices for code reviews, static/dynamic code analysis, and vulnerability assessments Knowledge of OWASP Top 10, SANS 25, NVD, CVE, etc. Experience with code languages and frameworks (Java, C+, Apex, etc.) End-to-end experience with attaining system ATOs More ❯
Basingstoke, Hampshire, England, United Kingdom Hybrid / WFH Options
Corriculo Ltd
joining the internal security team, monitoring and analysing real-time security events using SIEM tools to detect and respond to potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will investigate security incidents and conduct forensic analysis to determine the root cause and recommend remediation …/XDR, mail filtering and other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetration testing/vulnerability scanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don't meet all of the criteria More ❯
This is a contingent opportunity The Information Operations Specialist performs technical communications vulnerability assessments of computer networks, Industrial Control Systems, radio, wireless, and other communication systems that directly support the critical assets on DoD Installations or other agencies' facilities. Duties: Review and provide an assessment of the following: cyber issues and integration employment of the core capabilities of … deception and operations security (OPSEC) in concert with specified supporting and related capabilities to influence, disrupt, corrupt, or usurp adversarial human and automated decision-making Provide operational IO-related vulnerability mission impacts and remediation inputs Experience: Minimum Possess a minimum of 10 years IO and Cyberspace Operations (CS) experience Possess working knowledge of DoD's IT system and network … network hardware components and operating systems. In lieu of a degree, commensurate operational experience may be substituted. Additional Requirements Possess working knowledge of Department of Defense's Information Assurance Vulnerability Alert processes. Mastery level experience working hands-on with Computer Network modeling software. Mastery level experience working hands-on with Computer Network vulnerability/compliance analysis software. Ability More ❯
years or Master Degree years experience or 20 years of experience Experience identifying and managing system vulnerabilities and security events, particularly in cloud environments Experience tracking, reporting, and updating vulnerability management alerts, vulnerability assessments, red/blue team events, security incidents, and the common operating picture Familiarity with Zero Trust architecture principles as they relate to data security More ❯
broad spectrum of threats including accidents, natural disasters, technological failure, information system attacks, terrorists, radio frequency weapons (RFW), sabotage, and weapons of mass destruction (WMD). You will conduct vulnerability assessments of the emergency readiness of critical defense facilities, including assessments of continuity of operations programs (COOP), supply chain analysis, emergency management plans, chemical, biological, radiological, and nuclear readiness … and survivability (CBRN), and incident response. You will provide recommendations for eliminating or mitigating vulnerabilities for continuous facility operations. Duties: Conduct vulnerability assessments of defense facility readiness and emergency survivability. Provide expert advice on mitigating and eliminating emergency management vulnerabilities, improving continuity of operations, and mitigating CBRN threats. Collaborate with Team members on assessment activities. Document and communicate More ❯
maintained Disability Confident Leader status and as part of our commitments to this we guarantee to invite all applicants who meet the essential criteria for a role to attend assessment or interview. If you have a disability or learning difficulty, and prefer to disclose it, please feel free to do so in your application. You can also contact the … the Trustproducing management information, reports andrecommendations. Participate in the development and implementation ofhighly complex audit and compliance evaluation techniques and processing,ensuring the highest quality delivery of TrustServices. Conduct vulnerability assessments and other associatedactivities as appropriate within the Trust toIdentify, remediate and mitigate risks to the Trust. Liaise with NHS England, NCSC and other relevant bodies as required ensuring More ❯
In the capacity, plays a key role in developing and implementing security architectures for applications and IT systems, focusing on protecting data and preventing security breaches. • Conduct risk and vulnerability assessments to identify security weaknesses, conduct risk analyses • Create and deploy incident response plans, and lead efforts to respond to security breaches and attacks. • Interact with technical leads, developers … technology, etc., and demonstrate forward thinking around how this technology can support the operational needs of the Program and the future technical strategy of the organization • Conduct and analyze vulnerability assessments to validate system compliance with RMF controls and DISA Security Technical Information Guidelines (STIG) • Oversee patch management and compliance Required experience and educations • Bachelor of Science degree in More ❯
advanced cyber attacks, test defences, and influence enterprise-level security strategy. Key Responsibilities Lead red team operations , penetration testing, and ethical hacking engagements Plan and deliver cyber attack simulations, vulnerability assessments, and social engineering tests Work with SOC teams on purple team exercises to enhance detection and response Produce executive reporting on cyber threats, risks, and remediation progress Collaborate … scale. This role could suit individuals who have held the following role titles: Penetration Tester, Red Team Specialist, Lead Red Team Operator, Red Team Lead, Ethical Hacker, Security Tester, Vulnerability Analyst, Offensive Security Specialist, Threat Intelligence Analyst. Deerfoot Recruitment Solutions Ltd is a leading independent tech recruitment consultancy in the UK. For every CV sent to clients, we donate More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Deerfoot Recruitment Solutions
advanced cyber attacks, test defences, and influence enterprise-level security strategy. Key Responsibilities Lead red team operations , penetration testing, and ethical hacking engagements Plan and deliver cyber attack simulations, vulnerability assessments, and social engineering tests Work with SOC teams on purple team exercises to enhance detection and response Produce executive reporting on cyber threats, risks, and remediation progress Collaborate … scale. This role could suit individuals who have held the following role titles: Penetration Tester, Red Team Specialist, Lead Red Team Operator, Red Team Lead, Ethical Hacker, Security Tester, Vulnerability Analyst, Offensive Security Specialist, Threat Intelligence Analyst. Deerfoot Recruitment Solutions Ltd is a leading independent tech recruitment consultancy in the UK. For every CV sent to clients, we donate More ❯
London, Coleman Street, United Kingdom Hybrid / WFH Options
Deerfoot Recruitment Solutions Limited
advanced cyber attacks, test defences, and influence enterprise-level security strategy. Key Responsibilities Lead red team operations , penetration testing, and ethical hacking engagements Plan and deliver cyber attack simulations, vulnerability assessments, and social engineering tests Work with SOC teams on purple team exercises to enhance detection and response Produce executive reporting on cyber threats, risks, and remediation progress Collaborate … scale. This role could suit individuals who have held the following role titles: Penetration Tester, Red Team Specialist, Lead Red Team Operator, Red Team Lead, Ethical Hacker, Security Tester, Vulnerability Analyst, Offensive Security Specialist, Threat Intelligence Analyst. Deerfoot Recruitment Solutions Ltd is a leading independent tech recruitment consultancy in the UK. For every CV sent to clients, we donate More ❯
in-Depth principles and technology, including access/control, authorization, identification and authentication, Public Key Infrastructure (PKI), network and enterprise security architecture • 2 years of experience applying security risks assessment methodology to system development, including threat model development, vulnerability assessments, and resulting security risk analysis • A Master's Degree in Computer Science or IT Engineering is desired and More ❯
in-Depth principles and technology, including access/control, authorization, identification and authentication, Public Key Infrastructure (PKI), network and enterprise security architecture • 2 years of experience applying security risks assessment methodology to system development, including threat model development, vulnerability assessments, and resulting security risk analysis • A Master's Degree in Computer Science or IT Engineering is desired and More ❯
years of experience in Android development, including proficiency in Java, Kotlin, and Android SDK. Solid understanding of mobile security concepts, including secure coding practices, encryption algorithms, authentication protocols, and vulnerability assessment. Familiarity with Android security frameworks, libraries, and APIs. Experience with threat modeling, risk assessment, and security architecture design. Knowledge of secure coding practices and common vulnerabilities such … as OWASP Top 10. Proficiency in using security tools for vulnerability scanning and code analysis. Excellent problem-solving skills and attention to detail. Strong communication and collaboration abilities, with a passion for teamwork. Ability to adapt quickly to changing priorities and work effectively in a fast-paced environment. TS/SCI security clearance required. Join our team and contribute More ❯
The Red Cell Analyst is responsible for the overall conduct and management of specific vulnerability assessments, to include gathering information based on program objectives, identifying gaps in information gathering, and prioritizing courses of action pertaining to the assessment. The Red Cell Analyst provides assessment data to the White Cell Lead ensuring all statutory and regulatory requirements and other … national security. Responsibilities/Tasks - The Red Cell Analyst shall: Research the structure, ideology, intentions, tactics, and capabilities of adversarial organizations to develop threat characterization. Identify information requirements, develop assessment strategies and collection plans, identify information sources, and develop and conduct Open Source research, analysis, and fusion of relevant information to emulate adversarial planning capabilities. Characterize systems and conduct … nodal analysis, identify essential functions/tasks and critical assets necessary to perform them as determined by the assessment program plan. Facilitate timely information management flow from DoD Red Team partners and other entities supporting DoD Red Team operations. Develop courses of action an adversary may employ against customer personnel, equipment, facilities, networks, information and information systems, infrastructure, and More ❯