Permanent Vulnerability Assessment Job Vacancies

51 to 75 of 655 Permanent Vulnerability Assessment Jobs

Cloud Engineer with Security Clearance

Saint Louis, Missouri, United States
AFORGE LLC
cybersecurity principles, best practices, and common attack vectors. • Knowledge of security compliance frameworks and regulations such as GDPR, HIPAA, PCI DSS, and SOC 2. • Ability to conduct risk assessments, vulnerability assessments, and penetration testing. • Proficiency in scripting languages like Python, PowerShell, or Bash for automation and orchestration tasks. Certifications: (Nice to have, not required: ) • Relevant certifications can be advantageous More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Cyber Security Engineer

London, England, United Kingdom
Volant Media UK Ltd
and work closely with third-party cyber security service providers. Manage and optimize security tools, including endpoint protection, Microsoft Intune, Entra, Azure, and external detection and response tools. Conduct vulnerability assessments and coordinate patch management cycles. Collaborate with infrastructure and support teams to ensure secure configurations of networks, endpoints, applications, and services. Collaborate with non-technical end-users on More ❯
Posted:

Cyber Security Engineer (Medior)

Belgium
Randstad Digital Belgium
incident response efforts. Your Responsibilities. Actively participate in and contribute to day-to-day security operations, including advanced security monitoring, log analysis, and proactive threat hunting. Conduct in-depth vulnerability assessments, manage remediation efforts, and contribute to the development of strategies to address security weaknesses. Ensure ongoing adherence to information security standards, particularly ISO 27001 and NIS2 directives, and More ❯
Employment Type: Permanent
Salary: EUR Annual
Posted:

Security Engineer

Leeds, England, United Kingdom
Maples Group
and practices. Implementing data security policies such as DLP, privileged access management, and insider risk management. Designing and managing automation to improve security workflows. Supporting audits, penetration tests, and vulnerability assessments. Developing and analyzing KPIs, KRIs, and other metrics to inform security decisions and reporting. Ensuring the safety of company information and IT equipment through appropriate security measures. Experience More ❯
Posted:

Cybersecurity & Compliance Manager

Dudley, England, United Kingdom
JR United Kingdom
Auditor) are highly desirable. Strong knowledge of security frameworks (e.g., ISO 27001, COBIT), security technologies, tools, and best practices across EU, UK, and USA Proficiency in risk management processes, vulnerability assessments, and incident response strategies. Current technical and hands-on experience with security tools and technologies, including Rapid7, Rubrik, Sentinel, and endpoint protection solutions like Microsoft Defender. Excellent analytical More ❯
Posted:

Cybersecurity & Compliance Manager

Birmingham, England, United Kingdom
JR United Kingdom
Auditor) are highly desirable. Strong knowledge of security frameworks (e.g., ISO 27001, COBIT), security technologies, tools, and best practices across EU, UK, and USA Proficiency in risk management processes, vulnerability assessments, and incident response strategies. Current technical and hands-on experience with security tools and technologies, including Rapid7, Rubrik, Sentinel, and endpoint protection solutions like Microsoft Defender. Excellent analytical More ❯
Posted:

Principal Product Manager - Security and Compliance

London, England, United Kingdom
Hybrid / WFH Options
CloudBees
the audit process around demonstrating compliance effectively. Practical experience of the System Development Life Cycle, Software Development Life Cycle, and Agile framework Expertise in risk analysis, threat modeling, and vulnerability assessments Experience in coordinating with diverse cross-functional teams, including software engineers, designers, and stakeholders to drive the necessary outcomes. Strong technical abilities and a track record of working More ❯
Posted:

Principal Product Manager - Security and Compliance

London, England, United Kingdom
Hybrid / WFH Options
CloudBees
the audit process around demonstrating compliance effectively. Practical experience of the System Development Life Cycle, Software Development Life Cycle, and Agile framework Expertise in risk analysis, threat modeling, and vulnerability assessments Experience in coordinating with diverse cross-functional teams, including software engineers, designers, and stakeholders to drive the necessary outcomes. Strong technical abilities and a track record of working More ❯
Posted:

Vulnerability and Compliance Lead

Belfast, Northern Ireland, United Kingdom
Grant Thornton
Social network you want to login/join with: Vulnerability and Compliance Lead, Belfast col-narrow-left Client: Location: Belfast, United Kingdom Job Category: Other - EU work permit required: Yes col-narrow-right Job Reference: eb1cb784778d Job Views: 7 Posted: 29.06.2025 Expiry Date: 13.08.2025 col-wide Job Description: Vulnerability & Compliance Lead We are Grant Thornton. We go beyond … valued. If you are looking to deepen and develop your skills, knowledge, and experience throughout your career, then that is what you will get, and more. Job Summary: The Vulnerability & Compliance Lead is responsible for tracking and managing the identification, assessment, and remediation of security vulnerabilities across the organization's infrastructure and endpoints and monitoring and reporting on … vulnerability and other security compliance status. This role requires collaboration with various departments to ensure that all security patches and updates are applied promptly and effectively. Additionally, the Lead ensures that the organization's security posture remains strong and compliant with industry standards. Key Responsibilities: Knowledge: Subject Matter Expert in vulnerability remediation, offering guidance and support to ensure More ❯
Posted:

Nessus Engineer with Security Clearance

Chantilly, Virginia, United States
Oneida Innovations Group, LLC
EITaaS IT Service Management offerings to SIPR. We are currently seeking a Nessus Engineer for an onsite position in Chantilly, VA. This position supports our cybersecurity initiatives by conducting vulnerability assessments and ensuring the overall security of our networks and systems. This position is critical in maintaining and improving the integrity and safety of our infrastructure using the Nessus … vulnerability scanning tool. The ideal candidate will have hands-on experience with Nessus or similar vulnerability management tools, a solid understanding of security best practices, and a passion for mitigating risks in complex IT environments. Minimum of 10+ years' experience in vulnerability management, cybersecurity, or IT security. Hands-on experience with Nessus (or similar tools such as … OpenVAS, Qualys) for vulnerability scanning and management. Experience with network protocols (TCP/IP, HTTP, DNS, etc.), operating systems (Windows, Linux, macOS), and security best practices. Installing and Configuring Nessus, Nessus Manager, Nessus Agents, Log Correlation Engine, Nessus Network Monitor, and Security Center on both Linux/Unix and Windows based environments Responsible for installing and configuring Nessus Agents More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSE 3 102-090 with Security Clearance

Bedford, Massachusetts, United States
IC-CAP
of exceptionally complex problems, and processes relating to them Provides expert level consultation and technical services on all aspects of Information Security Serves as technical expert to the Cybersecurity Assessment Program providing technical direction, interpretation and alternatives to complex problems Builds IA into systems deployed to operational environments Assists architects and systems developers in the identification and implementation of … design and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks throughout the program life cycle Contributes to the security planning, assessment, risk analysis, risk management, certification and awareness activities for system and networking operations Thinks independently and demonstrates exceptional written and oral communications skills. Applies advanced technical principles, theories, and … Directory, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSE 2 102-163 with Security Clearance

Macon, Georgia, United States
IC-CAP
of exceptionally complex problems, and processes relating to them Provides expert level consultation and technical services on all aspects of Information Security Serves as technical expert to the Cybersecurity Assessment Program providing technical direction, interpretation and alternatives to complex problems Builds IA into systems deployed to operational environments Assists architects and systems developers in the identification and implementation of … design and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks throughout the program life cycle Contributes to the security planning, assessment, risk analysis, risk management, certification and awareness activities for system and networking operations. Thinks independently and demonstrates exceptional written and oral communications skills. Applies advanced technical principles, theories, and … Directory, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Information Security Engineer

London, England, United Kingdom
Medpace, Inc
be considered for this position. Responsibilities Engineer security solutions without oversight and collaborate with multiple departments; Analyze security systems and seek improvements on a continuous basis; Research vulnerabilities, perform vulnerability scanning, and mitigate threats; Develop security best practices and policies for the organization; Document new processes, cross-train coworkers, and assist employees on security-related matters; Provide security awareness … with the ability to solve problems as they arise, and ability to prioritize projects; and Basic scripting skills, such as PowerShell/Python scripting. Nice to have: Experience with vulnerability assessment tools such as Nessus and Tenable; Experience with enterprise web proxy solutions, web filters, and VPN; Experience with email security solutions; Experience with firewall and network architecture More ❯
Posted:

Security Analyst

London Area, United Kingdom
Albany Beck
current landscape with regards to lateral movement and areas where risks can be reduced. Monitor and analyse network traffic to identify potential security threats and lateral movement activities. Conduct vulnerability assessments and penetration testing to identify weaknesses in the network. Assist in the development and implementation of security controls to mitigate risks associated with lateral movement protocols. Collaborate with … with a focus on network security and analysis. Strong knowledge of malicious lateral movement techniques and mitigation strategies. Experience with security tools and technologies (e.g., SIEM, IDS/IPS, vulnerability scanners, host-based firewalls). Excellent analytical and problem-solving skills. Relevant certifications such as CEH, CompTIA Security+, or GIAC are highly desirable. Previous job roles that may indicate More ❯
Posted:

Security Analyst

City of London, London, United Kingdom
Albany Beck
current landscape with regards to lateral movement and areas where risks can be reduced. Monitor and analyse network traffic to identify potential security threats and lateral movement activities. Conduct vulnerability assessments and penetration testing to identify weaknesses in the network. Assist in the development and implementation of security controls to mitigate risks associated with lateral movement protocols. Collaborate with … with a focus on network security and analysis. Strong knowledge of malicious lateral movement techniques and mitigation strategies. Experience with security tools and technologies (e.g., SIEM, IDS/IPS, vulnerability scanners, host-based firewalls). Excellent analytical and problem-solving skills. Relevant certifications such as CEH, CompTIA Security+, or GIAC are highly desirable. Previous job roles that may indicate More ❯
Posted:

DevSecOps Engineer - ONSITE

Loughton, England, United Kingdom
Hybrid / WFH Options
Talkspirit
service and responsible lending. Role Summary This is an initial 6-month contract for an experienced DevSecOps Engineer focused on securing Azure infrastructure, integrating security automation, PCI DSS compliance, vulnerability testing, and incident response. The role involves developing and maintaining secure Azure DevOps pipelines and Infrastructure as Code (IaC) using Terraform, mentoring an internal engineer, and managing Sentinel, Defender … Leverage Azure Security Centre, Microsoft Defender, and Sentinel for security monitoring. Oversee SOAR solutions including SOC Prime. Manage Web Application Firewalls (WAF) and Intrusion Prevention Systems (IPS). Conduct vulnerability assessments and penetration testing. Ensure PCI DSS compliance through audits and risk assessments. Implement DNS security solutions. Develop incident response processes with third-party support. Develop SIEM solutions, logging … with external security partners. Ensure comprehensive documentation for post-contract continuity. Minimum Requirements Strong expertise in Azure security, Microsoft Defender, and Sentinel. Experience with SOAR technologies, penetration testing, and vulnerability assessments. Proficiency with Terraform and IaC security automation. Knowledge of DevOps pipelines, PCI DSS, SIEM, and security frameworks. Scripting skills (Python, Bash, PowerShell). Excellent interpersonal skills and ability More ❯
Posted:

Information Security Analyst

London, England, United Kingdom
Squarepoint Capital
Security Position Overview: Squarepoint is seeking an Information Security Analyst to join the Security Operations team. The Information security Analyst provides first line of support for security inquires, manages vulnerability assessments, assesses third-party vendors and software requests, and investigates and responds to security alerts. The ideal candidate has a strong technical foundation, problem-solving skills and a passion … tasks and analysis. Nice to have : 1-2 years of exposure to security operations or a relevant IT role. Experience with security tools such as EDR, SIEM, firewalls, and vulnerability scanning tools. Knowledge of cloud security concepts and practices. Solid understanding of Windows and Linux systems security. Exposure to penetration testing techniques, tools, and methodologies. Relevant security certifications (e.g. More ❯
Posted:

Senior Cybersecurity Engineer with Security Clearance

Huntsville, Alabama, United States
OSAAVA Services
for terrestrial and space-based systems. Lead cybersecurity efforts in support of system development, testing, and deployment. Apply RMF (Risk Management Framework) to obtain and maintain system ATOs. Conduct vulnerability assessments and support mitigation planning using tools like ACAS, Nessus, STIGs, and SCAP. Develop and maintain cybersecurity documentation, including SSPs, POA&Ms, and CONOPS. Perform security engineering analysis on … DoD or defense aerospace environment. Deep knowledge of RMF, NIST 800-53, STIGs, and DISA compliance tools. Familiarity with DoD systems engineering lifecycle and security accreditation processes. Proficient in vulnerability management, incident response, and network hardening. Excellent technical writing and documentation skills. DoD 8570 IAT Level II or III certification (e.g., Security+, CASP+, CISSP, CISM). Preferred Qualifications: Prior More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Cyber Engineer with Security Clearance

Colorado Springs, Colorado, United States
OSAAVA Services
for terrestrial and space-based systems. Lead cybersecurity efforts in support of system development, testing, and deployment. Apply RMF (Risk Management Framework) to obtain and maintain system ATOs. Conduct vulnerability assessments and support mitigation planning using tools like ACAS, Nessus, STIGs, and SCAP. Develop and maintain cybersecurity documentation, including SSPs, POA&Ms, and CONOPS. Perform security engineering analysis on … DoD or defense aerospace environment. Deep knowledge of RMF, NIST 800-53, STIGs, and DISA compliance tools. Familiarity with DoD systems engineering lifecycle and security accreditation processes. Proficient in vulnerability management, incident response, and network hardening. Excellent technical writing and documentation skills. DoD 8570 IAT Level II or III certification (e.g., Security+, CASP+, CISSP, CISM). Preferred Qualifications: Prior More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Sr. Information Security Analyst

Cambridge, England, United Kingdom
Draper Labs
networks * Resolves highly complex malware and intrusion issues * Evaluate/Implement new cyber security tools as well as policies to enhance Draper's security posture * Conducts network or software vulnerability assessments and penetration testing utilizing reverse engineering techniques. * Perform vulnerability analysis and exploitation of applications, operating systems or networks. Identifies intrusion or incident path and method. Isolates, blocks More ❯
Posted:

SYSTEMS ENGINEER

Ellabell, Georgia, United States
DANIEL DEFENSE LLC
effectively, escalating issues as necessary to maintain productivity and minimize downtime. Implement and enforce cybersecurity best practices, ensuring the security and integrity of all systems and data. Perform regular vulnerability assessments, patch management, and security audits to safeguard infrastructure and prevent unauthorized access. Monitor systems for security incidents, respond to threats, and conduct investigations and root cause analysis to … and ruggedized networking. Familiarity with Zero Trust architecture, NIST cybersecurity frameworks, or CMMC compliance. Hands-on experience implementing or managing SIEM tools, endpoint detection and response (EDR) solutions, or vulnerability management platforms. Practical experience with Infrastructure as Code (IaC) tools such as Terraform, Ansible, or PowerShell DSC in enterprise or hybrid cloud settings. Experience configuring and supporting Palo Alto More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Information Security Analyst II with Security Clearance

Falls Church, Virginia, United States
Hybrid / WFH Options
Epsilon Inc
ML initiatives, automation engineering, and overall pipeline optimization. In this position you will: Implement and maintain security policies, standards, and procedures to protect organizational assets and data. Conduct regular vulnerability assessments and penetration tests to identify and remediate security weaknesses. Monitor and analyze security alerts and reports using SIEM tools to proactively detect threats and anomalies. Investigate security incidents … field. DOD 8570 IAT Level II Certification may be required (GSEC, GICSP, CND, CySA+, Security+ CE, SSCP or CCNA-Security). Proficiency with SIEM platforms (e.g., Splunk, QRadar) and vulnerability scanning tools (e.g., Nessus). Practical knowledge of security frameworks such as NIST, ISO 27001, and SOC 2. Hands-on experience with common security technologies like firewalls, IDS/ More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Cyber Security Engineer

City of London, London, United Kingdom
Volant Media UK Ltd
and work closely with third-party cyber security service providers. Manage and optimize security tools, including endpoint protection, Microsoft Intune, Entra, Azure, and external detection and response tools. Conduct vulnerability assessments and coordinate patch management cycles. Collaborate with infrastructure and support teams to ensure secure configurations of networks, endpoints, applications, and services. Collaborate with non-technical end-users on More ❯
Posted:

Senior Cyber Security Engineer

London Area, United Kingdom
Volant Media UK Ltd
and work closely with third-party cyber security service providers. Manage and optimize security tools, including endpoint protection, Microsoft Intune, Entra, Azure, and external detection and response tools. Conduct vulnerability assessments and coordinate patch management cycles. Collaborate with infrastructure and support teams to ensure secure configurations of networks, endpoints, applications, and services. Collaborate with non-technical end-users on More ❯
Posted:

Senior IT Engineer (Cybersecurity)

Coventry, Warwickshire, United Kingdom
Nasmyth Group
vulnerabilities or breaches. Collaborate with teams to resolve performance issues and ensure business continuity. Monitor and maintain security infrastructure, including firewalls, VPNs, IDS/IPS, and endpoint protection. Conduct vulnerability assessments and penetration testing. Apply patches and updates to mitigate security threats. Lead response efforts in cyber-attacks or security breaches, including containment and remediation. Perform root cause analysis More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:
Vulnerability Assessment
10th Percentile
£41,750
25th Percentile
£47,313
Median
£57,500
75th Percentile
£77,500
90th Percentile
£90,650