The Red Cell Analyst is responsible for the overall conduct and management of specific vulnerability assessments, to include gathering information based on program objectives, identifying gaps in information gathering, and prioritizing courses of action pertaining to the assessment. The Red Cell Analyst provides assessment data to the White Cell Lead ensuring all statutory and regulatory requirements and other … national security. Responsibilities/Tasks - The Red Cell Analyst shall: Research the structure, ideology, intentions, tactics, and capabilities of adversarial organizations to develop threat characterization. Identify information requirements, develop assessment strategies and collection plans, identify information sources, and develop and conduct Open Source research, analysis, and fusion of relevant information to emulate adversarial planning capabilities. Characterize systems and conduct … nodal analysis, identify essential functions/tasks and critical assets necessary to perform them as determined by the assessment program plan. Facilitate timely information management flow from DoD Red Team partners and other entities supporting DoD Red Team operations. Develop courses of action an adversary may employ against customer personnel, equipment, facilities, networks, information and information systems, infrastructure, and More ❯
Clearance Requirements: None Aquila is seeking a Systems Engineer to join a team responsible for the execution of compliance and assistance with vulnerability remediation activities primarily associated with enterprise information systems. This new position has been added to an existing team to support department expansion. The person hired will not only become familiar with the utilization of vulnerability … required Excellent communication (both oral and writing) and organizational skills Proficiency and hands-on experience with Tenable's Security Center and IBM BigFix Proficiency and hands-on experience with vulnerability remediation across multiple Operating System (OS) platforms include Linux, Mac, and Windows Strong proficiency and hands-on experience with maintaining Red Hat Satellite, building Linux installation packages in support … other duties as assigned. Required Experience: 5 years of experience Systems Engineering OS platforms (Linux, Mac, Windows) Linux for Unix Redhat Enterprise Linux 7 & 8 2 years of experience Vulnerability Assessments IBM Bix Fix Tenable's Security Center Other Requirements Pass a comprehensive background investigation. Maintain an Active security clearance BS in a related field or equivalent experience Covid More ❯
Oracle applications Design DMZ zoning: reverse proxy, firewalls, and application gateways Deploy and configure DMZ components Define access policies, attribute mappings, and claim rules Perform functional, security (penetration/vulnerability), and performance testing Conduct user acceptance testing with internal and external stakeholder groups Produce end-to-end security architecture diagrams and DMZ access patterns Document configuration steps, policy definitions … OCI IAM, Microsoft Entra ID, Azure B2C, and SAML/OIDC protocols. Strong expertise in DMZ design, firewall configurations, and application gateway setup. Proficient in conducting penetration testing and vulnerability assessments. Skilled in technical writing and training, with the ability to document and transfer knowledge effectively. Acceptance Criteria: Successful SSO login for all defined user personas without manual intervention. More ❯
This is a contingent opportunity Conducts technical cyber and communications vulnerability assessments of computer networks, other technology (OT) systems telecommunications and other communications systems. Duties: Perform oversight of the development, implementation and evaluation of IS security program policy; special emphasis placed upon integration of existing network infrastructure Advise the Information System Owner (ISO), Information Data Owner (IDO), Program Security … Officer (PSO), and the Delegated and/or Authorizing Official (DAO/AO) on any assessment and authorization issues Evaluate Authorization packages and make recommendation to the AO and/or DAO for authorization Evaluate IS threats and vulnerabilities to determine whether additional safeguards are required Advise the Government concerning the impact levels for Confidentiality, Integrity, and Availability for … the information on a system Ensure security assessments are completed and results documented and prepare the Security Assessment Report (SAR) for the Authorization boundary Initiate a Plan of Action and Milestones (POA&M) with identified weaknesses for each Authorization Boundaries assessed, based on findings and recommendations from the SAR Evaluate security assessment documentation and provide written recommendations for More ❯
Description • The ideal candidate will perform Software Engineering and vulnerability research with a focus on OCO (Offensive Cyber Operations) and DCO (Defensive Cyber Operations) activities. • Work with customers directly performing full cycle system engineering, gathering requirements and source code, to technical documentation and specifications. • Performing long term, in depth vulnerability assessments using reverse engineering, kernel debugging, and exploitation More ❯
City of London, London, United Kingdom Hybrid / WFH Options
LT Harper - Cyber Security Recruitment
major UK clients — from security gap assessments to crisis simulations, risk frameworks, and technical reviews. Support the development and delivery of both technical (e.g. M365/cloud config reviews, vulnerability assessments) and GRC engagements. Help shape and evolve our cyber propositions , working closely with delivery leads across managed services, threat intel, and MDR. Scope and define client engagements with … of cyber engagements — both GRC and technical. Strong understanding of frameworks like NIST, ISO 27001, CIS, and a pragmatic view on applying them. Familiarity with technical tooling for assessments, vulnerability analysis, and cloud reviews (you don’t need to be an engineer — but you know your way around the tech). Experience working directly with clients to define risk More ❯
major UK clients — from security gap assessments to crisis simulations, risk frameworks, and technical reviews. Support the development and delivery of both technical (e.g. M365/cloud config reviews, vulnerability assessments) and GRC engagements. Help shape and evolve our cyber propositions , working closely with delivery leads across managed services, threat intel, and MDR. Scope and define client engagements with … of cyber engagements — both GRC and technical. Strong understanding of frameworks like NIST, ISO 27001, CIS, and a pragmatic view on applying them. Familiarity with technical tooling for assessments, vulnerability analysis, and cloud reviews (you don’t need to be an engineer — but you know your way around the tech). Experience working directly with clients to define risk More ❯
london, south east england, united kingdom Hybrid / WFH Options
LT Harper - Cyber Security Recruitment
major UK clients — from security gap assessments to crisis simulations, risk frameworks, and technical reviews. Support the development and delivery of both technical (e.g. M365/cloud config reviews, vulnerability assessments) and GRC engagements. Help shape and evolve our cyber propositions , working closely with delivery leads across managed services, threat intel, and MDR. Scope and define client engagements with … of cyber engagements — both GRC and technical. Strong understanding of frameworks like NIST, ISO 27001, CIS, and a pragmatic view on applying them. Familiarity with technical tooling for assessments, vulnerability analysis, and cloud reviews (you don’t need to be an engineer — but you know your way around the tech). Experience working directly with clients to define risk More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
LT Harper - Cyber Security Recruitment
major UK clients — from security gap assessments to crisis simulations, risk frameworks, and technical reviews. Support the development and delivery of both technical (e.g. M365/cloud config reviews, vulnerability assessments) and GRC engagements. Help shape and evolve our cyber propositions , working closely with delivery leads across managed services, threat intel, and MDR. Scope and define client engagements with … of cyber engagements — both GRC and technical. Strong understanding of frameworks like NIST, ISO 27001, CIS, and a pragmatic view on applying them. Familiarity with technical tooling for assessments, vulnerability analysis, and cloud reviews (you don’t need to be an engineer — but you know your way around the tech). Experience working directly with clients to define risk More ❯
slough, south east england, united kingdom Hybrid / WFH Options
LT Harper - Cyber Security Recruitment
major UK clients — from security gap assessments to crisis simulations, risk frameworks, and technical reviews. Support the development and delivery of both technical (e.g. M365/cloud config reviews, vulnerability assessments) and GRC engagements. Help shape and evolve our cyber propositions , working closely with delivery leads across managed services, threat intel, and MDR. Scope and define client engagements with … of cyber engagements — both GRC and technical. Strong understanding of frameworks like NIST, ISO 27001, CIS, and a pragmatic view on applying them. Familiarity with technical tooling for assessments, vulnerability analysis, and cloud reviews (you don’t need to be an engineer — but you know your way around the tech). Experience working directly with clients to define risk More ❯