Permanent Vulnerability Assessment Job Vacancies

301 to 325 of 525 Permanent Vulnerability Assessment Jobs

Cyber Security Engineer I with Security Clearance

Virginia Beach, Virginia, United States
Strategic Resilience Group
minimum IAT Level I. Experience: • Two (2) years of full-time professional experience performing system hardening with demonstrated experience in the following areas: o Performing STIG implementation; o Performing vulnerability assessments with the Assured Compliance Assessment Solution tool; o Experience with Security Management policy guidance and directives; and o Remediating vulnerability findings to include implementing vendor patches More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Incident & Threat Management Governance Analyst

Edinburgh, Midlothian, United Kingdom
Red Snapper Recruitment Limited
Red Snapper Recruitment are seeking a detail-oriented and experienced Cyber Incident Management (CIM) and Threat and Vulnerability Management (TVM) Governance Analyst to support a robust cybersecurity governance program. This role plays a key part in enhancing and maintaining the integrity of cybersecurity operations through effective data analysis, reporting, and cross-functional collaboration. The successful candidate will contribute to … external partners to support governance-related functions. Assist with distributing governance reports across organizational leadership and forums. What You Bring: Deep understanding of cyber incident response, patch management, and vulnerability assessment in large-scale environments. Strong problem-solving, analytical, and organizational skills. Ability to build strong working relationships in a global, distributed team environment. Experience using ticketing systems More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Incident & Threat Management Governance Analyst

Edinburgh, City of Edinburgh, United Kingdom
Red Snapper Recruitment Limited
Red Snapper Recruitment are seeking a detail-oriented and experienced Cyber Incident Management (CIM) and Threat and Vulnerability Management (TVM) Governance Analyst to support a robust cybersecurity governance program. This role plays a key part in enhancing and maintaining the integrity of cybersecurity operations through effective data analysis, reporting, and cross-functional collaboration. The successful candidate will contribute to … external partners to support governance-related functions. Assist with distributing governance reports across organizational leadership and forums. What You Bring: Deep understanding of cyber incident response, patch management, and vulnerability assessment in large-scale environments. Strong problem-solving, analytical, and organizational skills. Ability to build strong working relationships in a global, distributed team environment. Experience using ticketing systems More ❯
Employment Type: Permanent
Posted:

Cyber Security Engineer II with Security Clearance

Virginia Beach, Virginia, United States
Strategic Resilience Group
minimum IAT Level II. Experience: • Five (5) year of full-time professional experience performing system hardening with demonstrated experience in the following areas: o Performing STIG implementation. o Performing vulnerability assessments with the Assured Compliance Assessment Solution tool; o Experience with Security Management policy guidance and directives; and o Remediating vulnerability findings to include implementing vendor patches More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Defense Infrastructure Support Specialist - SME (Blue/Purp with Security Clearance

Washington, Washington DC, United States
TekSynap
focused teams responsible for defending against and mitigating cyber threats within a fast paced technical and cybersecurity proactive and reactive environment. RESPONSIBILITIES Leadership and Planning Support and coordinate advanced vulnerability assessments, incident response initiatives, and threat hunting operations for the Blue Team. Support the collaborative activities of the Purple Team, combining offensive (Red Team) and defensive (Blue Team) strategies … development and subsequent execution of strategic plans that align with threat intelligence and operational realities, ensuring assessments are comprehensive and based on real-world risks. Threat Intelligence and Risk Assessment Leverage threat intelligence to scope and prioritize projects, ensuring that assessments address true operational risks and are not limited by arbitrary system boundaries. Support risk-based evaluations of the … government customer critical systems, networks and infrastructure to uncover potential vulnerabilities that could impact missions. Maintain up-to-date knowledge of the threat landscape and integrate this information into assessment and response activities. Threat Hunting Oversight Support proactive threat hunting efforts to identify weaknesses and vulnerabilities to emerging threats on the government customer networks and systems. Recommend best practices More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

F-35 Air Systems Information Assurance Security Engineer Deputy with Security Clearance

Arlington, Virginia, United States
Hybrid / WFH Options
General Dynamics Information Technology
experience working on weapons systems platforms as a security engineer. 8 years of concurrent experience in system security Certification & Accreditation (C&A). 8 years of concurrent experience in Vulnerability Assessment and/or Risk Analysis. Required Certifications: DoD Manual 8140.03 (612) Security Control Assessor - Advanced Education: MS/MA/BS/BA Degree in Cyber Security … on work assignments. Work Location: Hybrid - Partial onsite support in Arlington, VA US Citizenship Required WHAT WE'D LOVE FOR YOU TO HAVE (Desired): 5+ years of experience in Vulnerability Assessment and/or Risk Analysis of test and operational systems. Experience in operational risk management a plus MA or MS degree in Computer Science, Information Systems or More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Journeyman Cybersecurity Engineer with Security Clearance

El Segundo, California, United States
V2X
and implements cybersecurity requirements aligned to overall architecture. Designs, develops, and tests standardized IaC/CaC across BIM. Provides Tier 3 engineering services. Provides expertise in network protection needs assessment, requirements elicitation, security architecture, threat assessment, computer security, communication security, networking, security technologies, hardware and software development, test and evaluation, vulnerability assessment, penetration testing, and supply More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Journeyman Cybersecurity Engineer with Security Clearance

Colorado Springs, Colorado, United States
V2X
and implements cybersecurity requirements aligned to overall architecture. Designs, develops, and tests standardized IaC/CaC across BIM. Provides Tier 3 engineering services. Provides expertise in network protection needs assessment, requirements elicitation, security architecture, threat assessment, computer security, communication security, networking, security technologies, hardware and software development, test and evaluation, vulnerability assessment, penetration testing, and supply More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Program Analyst - AI Test and Installation Support with Security Clearance

San Diego, California, United States
SAIC
is a recently awarded contract, funded for five years. Work is performed on site in San Diego, CA. Responsibilities: Testing & Installation Coordination: Oversee and manage the planning, execution, and assessment of software and hardware installations, ensuring alignment with operational needs and mission requirements. User & Fleet Engagement: Collaborate directly with fleet users, operational teams, and leadership to identify system gaps … Process Execution & Compliance: Ensure adherence to NAVSEA, OPNAV, and Joint Fleet Maintenance Manual guidelines governing the installation and integration of Programs of Record (POR) and non-POR systems. Risk & Vulnerability Assessment: Work closely with cybersecurity teams to evaluate system vulnerabilities, track remediation efforts, and enhance installation security compliance. Software & Systems Integration: Provide technical recommendations to developers to improve More ❯
Employment Type: Permanent
Salary: USD 120,000 Annual
Posted:

Information Systems Security Officer (ISSO) with Security Clearance

Colorado Springs, Colorado, United States
Caribou Thunder, LLC
You'll Do • Maintain and enhance the security posture of classified information systems within DoD environments. • Collaborate with the ISSM and ISO to manage day-to-day cybersecurity operations, vulnerability mitigation, and RMF compliance. • Coordinate and document system security changes, continuous monitoring efforts, and configuration management activities. • Conduct audit reviews, security assessments, and generate compliance reports for internal stakeholders … and managing Risk Management Framework (RMF) processes and conducting security impact analysis. Core Skills & Tools Cybersecurity & Compliance • NIST 800-53, RMF, DoD 8500 Series, Security Authorization Packages • Continuous Monitoring & Vulnerability Assessment • Configuration Management and System Recovery Systems & Platforms • Windows and Linux Operating Systems • Secure Media Handling Procedures • System Topology Design (Logical and Physical) Documentation & Audit • Security Assessments and More ❯
Employment Type: Permanent
Salary: USD 140,000 Annual
Posted:

Product and Hardware Security Penetration Tester with Security Clearance

Colorado Springs, Colorado, United States
Hybrid / WFH Options
Dark Wolf Solutions
environment out of Colorado Springs, CO. Key responsibilities include, but are not limited to: Duties/Responsibilities: Conducting comprehensive penetration testing on hardware, software, and network components. Performing advanced vulnerability scanning and assessments on all components. Performing a Cybersecurity evaluation of the product under test to identify vulnerabilities that would negatively impact the Confidentiality, Integrity, or Availability of system … SDR) for protocol reverse engineering and testing. Reporting detailed findings and providing actionable recommendations for remediation to enhance product security. Required Qualifications: 10+ years' experience in penetration testing and vulnerability assessment (for Senior level). 3 + years for junior to mid-.level. Proficiency in firmware analysis, reverse engineering, and binary exploitation. Experience in web application security testing More ❯
Employment Type: Permanent
Salary: USD 210,000 Annual
Posted:

Delegated Authorizing Official (DAO) Representative Level 3 (FOR with Security Clearance

Annapolis Junction, Maryland, United States
Columbia Technology Partners
for assisting in identifying the overall security requirements for the protection of data, to ensure the implementation of appropriate information security controls, and perform and analyze the security risk assessment, risk analysis, risk management process, security control assessments, and awareness activities for systems and networking operations. Provide assistance to ensure Cybersecurity functions are included in the configuration management process. … integration of legacy systems. Contribute to the acquisition/RDT&E environment and building Cybersecurity into systems deployed in operational environments. Prepare security authorization documentation. Perform security planning, security assessment, risk analysis, risk assessment, and risk management support activities Perform risk assessment and management to support integration of legacy systems into existing IT environment Review and analyze … Cybersecurity built into systems to be deployed to operational environments Prepare risk assessment, plan of actions, authorization recommendations, and related security authorization documentation Identify and support overall security requirements for the protection of data to ensure the implementation of information security policies, activities, and controls Ensure Cybersecurity functions are included in the development and risk management process, particularly those More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Delegated Authorizing Official (DAO) Representative Level 2 (FOR with Security Clearance

Annapolis Junction, Maryland, United States
Columbia Technology Partners
for assisting in identifying the overall security requirements for the protection of data, to ensure the implementation of appropriate information security controls, and perform and analyze the security risk assessment, risk analysis, risk management process, security control assessments, and awareness activities for systems and networking operations. Provide assistance to ensure Cybersecurity functions are included in the configuration management process. … integration of legacy systems. Contribute to the acquisition/RDT&E environment and building Cybersecurity into systems deployed in operational environments. Prepare security authorization documentation. Perform security planning, security assessment, risk analysis, risk assessment, and risk management support activities Perform risk assessment and management to support integration of legacy systems into existing IT environment Review and analyze … Cybersecurity built into systems to be deployed to operational environments Prepare risk assessment, plan of actions, authorization recommendations, and related security authorization documentation Identify and support overall security requirements for the protection of data to ensure the implementation of information security policies, activities, and controls Ensure Cybersecurity functions are included in the development and risk management process, particularly those More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Specialist, Cyber Intelligence with Security Clearance

Colorado Springs, Colorado, United States
L3Harris Technologies
will be knowledgeable in information technology and information assurance standards and regulations. Responsibilities include, but are not limited to, performing security control assessments and continuous monitoring, conducting configuration and vulnerability scanning and remediation, authoring and maintaining documentation and artifacts (body of evidence) in support of the Assessment and Authorization (A&A) of information systems following the National Institute … NESSUS, SCAP, and EvaluateSTIG. Experience supporting virtual environments and/or cloud-based environments. Experience performing RMF A&A activities and system accreditation. Experience conducting information system inspections and vulnerability assessments. Experience developing Plans of Action & Milestones (POA&M) to document and mitigate security control deficiencies. Experience hardening information systems and/or performing configuration/vulnerability assessments More ❯
Employment Type: Permanent
Salary: USD 168,500 Annual
Posted:

Lead Cyber Architect 5 - 23513 with Security Clearance

Dayton, Ohio, United States
HII Mission Technologies
architecture or design, and excels at decomposing complex systems and protocols to understand how they work. Must be a skilled collaborator with industry partners. Duties will include evaluation and vulnerability assessments of existing systems and designs to include system architecture evaluation, protocol analysis, hardware and/or software vulnerability discovery, and documentation of findings or recommendations. Essential Job … systems, applications, and solutions for external customer's enterprise-wide cyber systems and networks. Ensures system security needs established and maintained for operations development, security requirements definition, security risk assessment, systems analysis, systems design, security test and evaluation, certification and accreditation, systems hardening, vulnerability testing and scanning, incident response, disaster recovery, and business continuity planning and provides analytical More ❯
Employment Type: Permanent
Salary: USD 175,003 Annual
Posted:

Lead Information Systems Cyber Engineer with Security Clearance

San Diego, California, United States
MITRE Corporation
concepts in classified environments. Key Responsibilities: Develop, implement, and oversee classified information system security programs. Ensure compliance with Risk Management Framework (RMF) policies, including System Security Plans (SSPs), Risk Assessment Reports, and Security Controls Traceability Matrix (SCTM). Maintain operational security posture, conduct vulnerability assessments, and support Assessment & Authorization (A&A) activities. Mentor junior ISSOs and collaborate More ❯
Employment Type: Permanent
Salary: USD 191,500 Annual
Posted:

SME Cybersecurity Engineer with Security Clearance

Washington, Washington DC, United States
SAIC
components necessary to harden cyber posture and reduce threats Reviewing and updating System Security Plans and privileged and general user's guides such as CONOPS, POA&M, Security & Risk Assessment Reports, Continous Monitoring Plans Provide continual updates to support cybersecurity compliance Perform risk assessments, vulnerability assessments, and penetration testing to identify and mitigate cyber risks Provide SME support More ❯
Employment Type: Permanent
Salary: USD 240,000 Annual
Posted:

Cyber Security Engineer with Security Clearance

Reston, Virginia, United States
SAIC
Managing security aspects of deployed infrastructure and technical solutions, in addition to day to day security operations. Desired Skills: Demonstrated experience with Rapid7, WebInspect, AppDetective, CIS-CAT, and other vulnerability assessment tools and processes. Information security certifications such as CISSP, CISSE, CISA, CEH, CCSP, etc. Demonstrated experience with computer and network vulnerabilities (e.g., malware, zero-day attacks, denial More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Principal Systems Security Engineer with Security Clearance

Hill Afb, Utah, United States
BAE Systems
identifying vulnerabilities, implementing security measures, and responding to security incidents The SSE engineer should have skills, expertise, and experience in multiple areas including security requirements, security architecture views, threat assessment, networking, security technologies, hardware and software security, security test and evaluation, vulnerability assessment, penetration testing, and supply chain security risk assessment. This position works with Integrated Product More ❯
Employment Type: Permanent
Salary: USD 178,931 Annual
Posted:

DevSecOps Engineer with Security Clearance

San Diego, California, United States
Sev1Tech
quality, application security, and performance optimization, ensuring adherence to federal guidelines and compliance requirements. Collaborate with cybersecurity personnel to identify and implement appropriate security controls, automated security scans, and vulnerability assessments throughout the software development lifecycle. Support development of new code, updates, including security updates, and fixes to software applications following the SCRUM software development process. Update software development … CI/CD) like Gitlab and Jenkins • CI/CD pipelines to automate application build, test and deployment processes • Identify and Access Management (IAM) tools like Keycloak • Security Compliance Assessment tools like OpenSCAP • Dynamic Application Security Testing (DAST) tools like OWASP ZAP Familiarity with Agile/Scrum development methodologies and experience working within an Agile team. Excellent communication and More ❯
Employment Type: Permanent
Salary: USD 160,000 Annual
Posted:

Security Controls Assessor (SCA), Senior with Security Clearance

Columbia, Maryland, United States
Sentar Inc
requirements that are not in compliance Conducts on-site evaluations Validates the security requirements of the information system Verifies and validates that the system meets the security requirements Provides vulnerability assessment of the system Coordinates penetration testing Provides a comprehensive verification and validation report (certification report) for the information system Provides process improvement recommendations Assists the Government to More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Acquisition Security Manager, Journeyman with Security Clearance

Dayton, Ohio, United States
Odyssey Systems Consulting Group
Classification Guide (SCG) Development & DD Form 254 Administration Skilled in drafting and updating SCGs and DD 254s to ensure accurate and consistent security requirements for classified contracts. Risk and Vulnerability Assessment Proficient in conducting assessments to identify threats to personnel, systems, and data-supporting mitigation strategies across acquisition phases. SAP/SCI Access and Information Assurance Compliance Experience More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Acquisition Security Manager, Senior with Security Clearance

Dayton, Ohio, United States
Odyssey Systems Consulting Group
Classification Guide (SCG) Development & DD Form 254 Administration Skilled in drafting and updating SCGs and DD 254s to ensure accurate and consistent security requirements for classified contracts. Risk and Vulnerability Assessment Proficient in conducting assessments to identify threats to personnel, systems, and data-supporting mitigation strategies across acquisition phases. SAP/SCI Access and Information Assurance Compliance Experience More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Industrial Infrastructure Engineering Lead

United Kingdom
Northrop Grumman Corp. (JP)
maintain virtualised environments (e.g., VMware, Hyper-V) to facilitate scalable and secure development processes. This includes configuring virtual machines, monitoring system health, and automating deployment workflows for seamless operations. Vulnerability Assessments: Support vulnerability assessments of the development environment, including all networked systems, operating systems (Windows and Linux), and virtualisation platforms. Work with cybersecurity teams to identify and remediate … advanced cyber protection measures, including firewalls, intrusion detection/prevention systems (IDS/IPS), and secure authentication protocols, to safeguard both the development environment and the final ICS product. Vulnerability Management: Support regularly vulnerability scans, security audits, and patch management for both IT and OT systems. Collaborate with cybersecurity and product teams to address vulnerabilities, apply security patches … security settings. Virtualisation: Expertise in virtualisation technologies such as VMware and Hyper-V, with a demonstrated ability to set up, maintain, and optimise virtual environments for industrial applications. Cybersecurity & Vulnerability Management: Strong understanding of cybersecurity practices and vulnerability management for both IT and OT systems. Experience implementing vulnerability assessments reports, securing systems, and applying necessary patches or More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security Engineer, COR7186A

Basingstoke, Hampshire, South East, United Kingdom
Hybrid / WFH Options
Corriculo Ltd
joining the internal security team, monitoring and analysing real-time security events using SIEM tools to detect and respond to potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will investigate security incidents and conduct forensic analysis to determine the root cause and recommend remediation …/XDR, mail filtering and other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetration testing/vulnerability scanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don't meet all of the criteria More ❯
Employment Type: Permanent, Work From Home
Salary: £55,000
Posted:
Vulnerability Assessment
10th Percentile
£41,750
25th Percentile
£46,875
Median
£57,500
75th Percentile
£77,500
90th Percentile
£86,000