cybersecurity principles, best practices, and common attack vectors. • Knowledge of security compliance frameworks and regulations such as GDPR, HIPAA, PCI DSS, and SOC 2. • Ability to conduct risk assessments, vulnerability assessments, and penetration testing. • Proficiency in scripting languages like Python, PowerShell, or Bash for automation and orchestration tasks. Certifications: (Nice to have, not required: ) • Relevant certifications can be advantageous More ❯
and work closely with third-party cyber security service providers. Manage and optimize security tools, including endpoint protection, Microsoft Intune, Entra, Azure, and external detection and response tools. Conduct vulnerability assessments and coordinate patch management cycles. Collaborate with infrastructure and support teams to ensure secure configurations of networks, endpoints, applications, and services. Collaborate with non-technical end-users on More ❯
incident response efforts. Your Responsibilities. Actively participate in and contribute to day-to-day security operations, including advanced security monitoring, log analysis, and proactive threat hunting. Conduct in-depth vulnerability assessments, manage remediation efforts, and contribute to the development of strategies to address security weaknesses. Ensure ongoing adherence to information security standards, particularly ISO 27001 and NIS2 directives, and More ❯
and practices. Implementing data security policies such as DLP, privileged access management, and insider risk management. Designing and managing automation to improve security workflows. Supporting audits, penetration tests, and vulnerability assessments. Developing and analyzing KPIs, KRIs, and other metrics to inform security decisions and reporting. Ensuring the safety of company information and IT equipment through appropriate security measures. Experience More ❯
Auditor) are highly desirable. Strong knowledge of security frameworks (e.g., ISO 27001, COBIT), security technologies, tools, and best practices across EU, UK, and USA Proficiency in risk management processes, vulnerability assessments, and incident response strategies. Current technical and hands-on experience with security tools and technologies, including Rapid7, Rubrik, Sentinel, and endpoint protection solutions like Microsoft Defender. Excellent analytical More ❯
Auditor) are highly desirable. Strong knowledge of security frameworks (e.g., ISO 27001, COBIT), security technologies, tools, and best practices across EU, UK, and USA Proficiency in risk management processes, vulnerability assessments, and incident response strategies. Current technical and hands-on experience with security tools and technologies, including Rapid7, Rubrik, Sentinel, and endpoint protection solutions like Microsoft Defender. Excellent analytical More ❯
London, England, United Kingdom Hybrid / WFH Options
CloudBees
the audit process around demonstrating compliance effectively. Practical experience of the System Development Life Cycle, Software Development Life Cycle, and Agile framework Expertise in risk analysis, threat modeling, and vulnerability assessments Experience in coordinating with diverse cross-functional teams, including software engineers, designers, and stakeholders to drive the necessary outcomes. Strong technical abilities and a track record of working More ❯
London, England, United Kingdom Hybrid / WFH Options
CloudBees
the audit process around demonstrating compliance effectively. Practical experience of the System Development Life Cycle, Software Development Life Cycle, and Agile framework Expertise in risk analysis, threat modeling, and vulnerability assessments Experience in coordinating with diverse cross-functional teams, including software engineers, designers, and stakeholders to drive the necessary outcomes. Strong technical abilities and a track record of working More ❯
Social network you want to login/join with: Vulnerability and Compliance Lead, Belfast col-narrow-left Client: Location: Belfast, United Kingdom Job Category: Other - EU work permit required: Yes col-narrow-right Job Reference: eb1cb784778d Job Views: 7 Posted: 29.06.2025 Expiry Date: 13.08.2025 col-wide Job Description: Vulnerability & Compliance Lead We are Grant Thornton. We go beyond … valued. If you are looking to deepen and develop your skills, knowledge, and experience throughout your career, then that is what you will get, and more. Job Summary: The Vulnerability & Compliance Lead is responsible for tracking and managing the identification, assessment, and remediation of security vulnerabilities across the organization's infrastructure and endpoints and monitoring and reporting on … vulnerability and other security compliance status. This role requires collaboration with various departments to ensure that all security patches and updates are applied promptly and effectively. Additionally, the Lead ensures that the organization's security posture remains strong and compliant with industry standards. Key Responsibilities: Knowledge: Subject Matter Expert in vulnerability remediation, offering guidance and support to ensure More ❯
EITaaS IT Service Management offerings to SIPR. We are currently seeking a Nessus Engineer for an onsite position in Chantilly, VA. This position supports our cybersecurity initiatives by conducting vulnerability assessments and ensuring the overall security of our networks and systems. This position is critical in maintaining and improving the integrity and safety of our infrastructure using the Nessus … vulnerability scanning tool. The ideal candidate will have hands-on experience with Nessus or similar vulnerability management tools, a solid understanding of security best practices, and a passion for mitigating risks in complex IT environments. Minimum of 10+ years' experience in vulnerability management, cybersecurity, or IT security. Hands-on experience with Nessus (or similar tools such as … OpenVAS, Qualys) for vulnerability scanning and management. Experience with network protocols (TCP/IP, HTTP, DNS, etc.), operating systems (Windows, Linux, macOS), and security best practices. Installing and Configuring Nessus, Nessus Manager, Nessus Agents, Log Correlation Engine, Nessus Network Monitor, and Security Center on both Linux/Unix and Windows based environments Responsible for installing and configuring Nessus Agents More ❯
of exceptionally complex problems, and processes relating to them Provides expert level consultation and technical services on all aspects of Information Security Serves as technical expert to the Cybersecurity Assessment Program providing technical direction, interpretation and alternatives to complex problems Builds IA into systems deployed to operational environments Assists architects and systems developers in the identification and implementation of … design and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks throughout the program life cycle Contributes to the security planning, assessment, risk analysis, risk management, certification and awareness activities for system and networking operations Thinks independently and demonstrates exceptional written and oral communications skills. Applies advanced technical principles, theories, and … Directory, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerabilityassessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft More ❯
of exceptionally complex problems, and processes relating to them Provides expert level consultation and technical services on all aspects of Information Security Serves as technical expert to the Cybersecurity Assessment Program providing technical direction, interpretation and alternatives to complex problems Builds IA into systems deployed to operational environments Assists architects and systems developers in the identification and implementation of … design and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks throughout the program life cycle Contributes to the security planning, assessment, risk analysis, risk management, certification and awareness activities for system and networking operations. Thinks independently and demonstrates exceptional written and oral communications skills. Applies advanced technical principles, theories, and … Directory, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerabilityassessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft More ❯
be considered for this position. Responsibilities Engineer security solutions without oversight and collaborate with multiple departments; Analyze security systems and seek improvements on a continuous basis; Research vulnerabilities, perform vulnerability scanning, and mitigate threats; Develop security best practices and policies for the organization; Document new processes, cross-train coworkers, and assist employees on security-related matters; Provide security awareness … with the ability to solve problems as they arise, and ability to prioritize projects; and Basic scripting skills, such as PowerShell/Python scripting. Nice to have: Experience with vulnerabilityassessment tools such as Nessus and Tenable; Experience with enterprise web proxy solutions, web filters, and VPN; Experience with email security solutions; Experience with firewall and network architecture More ❯
current landscape with regards to lateral movement and areas where risks can be reduced. Monitor and analyse network traffic to identify potential security threats and lateral movement activities. Conduct vulnerability assessments and penetration testing to identify weaknesses in the network. Assist in the development and implementation of security controls to mitigate risks associated with lateral movement protocols. Collaborate with … with a focus on network security and analysis. Strong knowledge of malicious lateral movement techniques and mitigation strategies. Experience with security tools and technologies (e.g., SIEM, IDS/IPS, vulnerability scanners, host-based firewalls). Excellent analytical and problem-solving skills. Relevant certifications such as CEH, CompTIA Security+, or GIAC are highly desirable. Previous job roles that may indicate More ❯
current landscape with regards to lateral movement and areas where risks can be reduced. Monitor and analyse network traffic to identify potential security threats and lateral movement activities. Conduct vulnerability assessments and penetration testing to identify weaknesses in the network. Assist in the development and implementation of security controls to mitigate risks associated with lateral movement protocols. Collaborate with … with a focus on network security and analysis. Strong knowledge of malicious lateral movement techniques and mitigation strategies. Experience with security tools and technologies (e.g., SIEM, IDS/IPS, vulnerability scanners, host-based firewalls). Excellent analytical and problem-solving skills. Relevant certifications such as CEH, CompTIA Security+, or GIAC are highly desirable. Previous job roles that may indicate More ❯
Loughton, England, United Kingdom Hybrid / WFH Options
Talkspirit
service and responsible lending. Role Summary This is an initial 6-month contract for an experienced DevSecOps Engineer focused on securing Azure infrastructure, integrating security automation, PCI DSS compliance, vulnerability testing, and incident response. The role involves developing and maintaining secure Azure DevOps pipelines and Infrastructure as Code (IaC) using Terraform, mentoring an internal engineer, and managing Sentinel, Defender … Leverage Azure Security Centre, Microsoft Defender, and Sentinel for security monitoring. Oversee SOAR solutions including SOC Prime. Manage Web Application Firewalls (WAF) and Intrusion Prevention Systems (IPS). Conduct vulnerability assessments and penetration testing. Ensure PCI DSS compliance through audits and risk assessments. Implement DNS security solutions. Develop incident response processes with third-party support. Develop SIEM solutions, logging … with external security partners. Ensure comprehensive documentation for post-contract continuity. Minimum Requirements Strong expertise in Azure security, Microsoft Defender, and Sentinel. Experience with SOAR technologies, penetration testing, and vulnerability assessments. Proficiency with Terraform and IaC security automation. Knowledge of DevOps pipelines, PCI DSS, SIEM, and security frameworks. Scripting skills (Python, Bash, PowerShell). Excellent interpersonal skills and ability More ❯
Security Position Overview: Squarepoint is seeking an Information Security Analyst to join the Security Operations team. The Information security Analyst provides first line of support for security inquires, manages vulnerability assessments, assesses third-party vendors and software requests, and investigates and responds to security alerts. The ideal candidate has a strong technical foundation, problem-solving skills and a passion … tasks and analysis. Nice to have : 1-2 years of exposure to security operations or a relevant IT role. Experience with security tools such as EDR, SIEM, firewalls, and vulnerability scanning tools. Knowledge of cloud security concepts and practices. Solid understanding of Windows and Linux systems security. Exposure to penetration testing techniques, tools, and methodologies. Relevant security certifications (e.g. More ❯
for terrestrial and space-based systems. Lead cybersecurity efforts in support of system development, testing, and deployment. Apply RMF (Risk Management Framework) to obtain and maintain system ATOs. Conduct vulnerability assessments and support mitigation planning using tools like ACAS, Nessus, STIGs, and SCAP. Develop and maintain cybersecurity documentation, including SSPs, POA&Ms, and CONOPS. Perform security engineering analysis on … DoD or defense aerospace environment. Deep knowledge of RMF, NIST 800-53, STIGs, and DISA compliance tools. Familiarity with DoD systems engineering lifecycle and security accreditation processes. Proficient in vulnerability management, incident response, and network hardening. Excellent technical writing and documentation skills. DoD 8570 IAT Level II or III certification (e.g., Security+, CASP+, CISSP, CISM). Preferred Qualifications: Prior More ❯
for terrestrial and space-based systems. Lead cybersecurity efforts in support of system development, testing, and deployment. Apply RMF (Risk Management Framework) to obtain and maintain system ATOs. Conduct vulnerability assessments and support mitigation planning using tools like ACAS, Nessus, STIGs, and SCAP. Develop and maintain cybersecurity documentation, including SSPs, POA&Ms, and CONOPS. Perform security engineering analysis on … DoD or defense aerospace environment. Deep knowledge of RMF, NIST 800-53, STIGs, and DISA compliance tools. Familiarity with DoD systems engineering lifecycle and security accreditation processes. Proficient in vulnerability management, incident response, and network hardening. Excellent technical writing and documentation skills. DoD 8570 IAT Level II or III certification (e.g., Security+, CASP+, CISSP, CISM). Preferred Qualifications: Prior More ❯
networks * Resolves highly complex malware and intrusion issues * Evaluate/Implement new cyber security tools as well as policies to enhance Draper's security posture * Conducts network or software vulnerability assessments and penetration testing utilizing reverse engineering techniques. * Perform vulnerability analysis and exploitation of applications, operating systems or networks. Identifies intrusion or incident path and method. Isolates, blocks More ❯
effectively, escalating issues as necessary to maintain productivity and minimize downtime. Implement and enforce cybersecurity best practices, ensuring the security and integrity of all systems and data. Perform regular vulnerability assessments, patch management, and security audits to safeguard infrastructure and prevent unauthorized access. Monitor systems for security incidents, respond to threats, and conduct investigations and root cause analysis to … and ruggedized networking. Familiarity with Zero Trust architecture, NIST cybersecurity frameworks, or CMMC compliance. Hands-on experience implementing or managing SIEM tools, endpoint detection and response (EDR) solutions, or vulnerability management platforms. Practical experience with Infrastructure as Code (IaC) tools such as Terraform, Ansible, or PowerShell DSC in enterprise or hybrid cloud settings. Experience configuring and supporting Palo Alto More ❯
Falls Church, Virginia, United States Hybrid / WFH Options
Epsilon Inc
ML initiatives, automation engineering, and overall pipeline optimization. In this position you will: Implement and maintain security policies, standards, and procedures to protect organizational assets and data. Conduct regular vulnerability assessments and penetration tests to identify and remediate security weaknesses. Monitor and analyze security alerts and reports using SIEM tools to proactively detect threats and anomalies. Investigate security incidents … field. DOD 8570 IAT Level II Certification may be required (GSEC, GICSP, CND, CySA+, Security+ CE, SSCP or CCNA-Security). Proficiency with SIEM platforms (e.g., Splunk, QRadar) and vulnerability scanning tools (e.g., Nessus). Practical knowledge of security frameworks such as NIST, ISO 27001, and SOC 2. Hands-on experience with common security technologies like firewalls, IDS/ More ❯
and work closely with third-party cyber security service providers. Manage and optimize security tools, including endpoint protection, Microsoft Intune, Entra, Azure, and external detection and response tools. Conduct vulnerability assessments and coordinate patch management cycles. Collaborate with infrastructure and support teams to ensure secure configurations of networks, endpoints, applications, and services. Collaborate with non-technical end-users on More ❯
and work closely with third-party cyber security service providers. Manage and optimize security tools, including endpoint protection, Microsoft Intune, Entra, Azure, and external detection and response tools. Conduct vulnerability assessments and coordinate patch management cycles. Collaborate with infrastructure and support teams to ensure secure configurations of networks, endpoints, applications, and services. Collaborate with non-technical end-users on More ❯
vulnerabilities or breaches. Collaborate with teams to resolve performance issues and ensure business continuity. Monitor and maintain security infrastructure, including firewalls, VPNs, IDS/IPS, and endpoint protection. Conduct vulnerability assessments and penetration testing. Apply patches and updates to mitigate security threats. Lead response efforts in cyber-attacks or security breaches, including containment and remediation. Perform root cause analysis More ❯