security-driven environments and is well-versed in Risk Management Framework (RMF), information assurance, and federal cybersecurity compliance. Essential Duties and Responsibilities (but not limited to): • Lead and support assessment and authorization activities in alignment with National, DoD, and Air Force cybersecurity policies and frameworks. • Evaluate threats, vulnerabilities, and risks across systems; develop mitigation strategies and ensure implementation of … effective safeguards. • Analyze, document, and advise on system modifications and their cybersecurity impacts including DRs, PRs, CRs, and infrastructure upgrades. • Conduct risk assessments, vulnerability inspections, and security evaluations of existing and planned systems. • Review and contribute to system security test plans, test reports, and RMF documentation including System Security Plans (SSPs), Security Risk Analyses, and Vulnerability Management Plans. … or related field. • 10+ years in cybersecurity or information assurance, preferably supporting DoD or federal systems. • Proficient with RMF, NIST standards, FISMA, and DoD-specific IA policies. • Skilled in vulnerabilityassessment tools and intrusion prevention systems. • Strong knowledge of cryptographic systems, COMSEC, and network access controls. • Comfortable working in both classified and unclassified environments. • Experience with system design More ❯
Environment (TSCE). Design, implement, configure, and enforce security controls on network, hardware, and software components and devices. Implement STIGs and manage enterprise-level deployment of Active Directory. Perform vulnerability assessments using Assured Compliance Assessment Solution tools. Configure Cisco networking devices and utilize packet analyzer tools such as Wireshark and tcpdump. Troubleshoot network connectivity issues and implement firewalls … implementation, configuration, and enforcement of security controls on network, hardware, and software components and devices. o STIG implementation. o Experience managing enterprise level deployment of Active Directory. o Performing vulnerability assessments with the Assured Compliance Assessment Solution tool. o Configuring Cisco networking devices. o Utilizing packet analyzer tools such as Wireshark and tcpdump; o Troubleshooting network connectivity issues More ❯
various network operating systems, such as Cisco IOS, Juniper Junos, and others. • Familiarity with scripting languages (e.g., Python, Bash) to automate patch deployment processes for network devices. • Knowledge of vulnerabilityassessment tools and network security tools. • Experience in network administration, network security, or a similar role, with a focus on patch management. • Experience in conducting vulnerability assessments More ❯
analytical focus, problem solving skills, time management skills, and a passion for computer, network, or cyber security. • Understanding of Exploit methodology, processes and development. • Understanding of network scanning and vulnerability analysis/assessment DESIRED SKILLS: • Experience in a role as a computer network operator, possessing extensive penetration testing skills/experience to conduct vulnerability assessments leading to More ❯
Directory Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerabilityassessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft More ❯
Directory Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerabilityassessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft More ❯
Directory Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerabilityassessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft More ❯
its adherence and updating or creating new processes for improvement and minimizing the wastage Encouraging and building automated processes wherever possible Identifying and deploying security measures by continuously performing vulnerabilityassessment and risk management Incident management and root cause analysis Coordination and communication with team and with customers both external and internal Selecting and deploying appropriate CI/ More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sparta Global Limited
a 'Spartan' consultant. In this role you will undertake: Network Security - Understanding of firewall configuration, intrusion detection/prevention systems (IDS/IPS), and secure network protocols. Penetration Testing & VulnerabilityAssessment - Skills in identifying, simulating, and remediating vulnerabilities through tools (e.g., Nessus, Metasploit) and manual testing. Incident Response & Forensic Analysis - Ability to manage and respond to security breaches More ❯
Windows) hardening procedures and impact on operation Experience with requirements management tools (e.g. DOORS, Codebeamer) Working knowledge of Networking Security technologies and solutions (Firewalls, IDS, Routing, Switching) Experience with vulnerabilityassessment, penetration testing, risk assessments and associated tools Knowledge of domain standards (e.g. ISO 27001, ICAO 9985) and how to apply them to product development and the support More ❯
to maintain service uptime. Plan and provision workloads for service enhancements, projects and client service requests to efficiently support the dynamic business needs. Enforce security policies by conducting regular vulnerability assessments. Ensuring the team patches and hardens systems as required whilst adhering to corporate Information Security Policies, Azure Security Benchmark and CIS controls. Collaboration with cross-functional teams (Development … is respected and valued Application and Interview Process To apply for this role, you will need to submit a CV and answer some pre-screening questions. The interview and assessment process for this role will involve a telephone interview with our Talent Team, followed by a first stage and a final stage interview. Interviews will be conducted either remotely More ❯
skills, with the ability to lead cross-functional teams and work independently. Technical Expertise Required Network Security Technologies: Expertise in Network Access Control (NAC), IPS, Firewalls (FW), Endpoint Protection, VulnerabilityAssessment tools, Mobile Device Management (MDM), and other similar cybersecurity solutions for both IT and OT environments. Networking Protocols & Infrastructure: Deep understanding of networking technologies such as routing More ❯
of safeguarding Industrial Control Systems and SCADA networks from evolving cyber threats.Key Responsibilities: Monitor and assess OT cybersecurity systems, ensuring effective threat detection and response. Conduct threat analysis and vulnerability assessments to support incident response activities. Develop and implement incident response plans tailored to OT environments. Support vulnerability management initiatives and penetration testing exercises. Contribute to policy development More ❯
Cyber Artifacts Management: Manage and assess cyber artifacts to ensure proper documentation and readiness for cyber assessments. • Cyber Testing: Develop, execute, and analyze cyber testing efforts including penetration tests, vulnerability assessments, and cybersecurity audits. • Risk Management Framework (RMF) Implementation: Guide and support the implementation of the RMF process, including categorizing information systems, selecting security controls, and managing security control … Security Technical Implementation Guides (STIGs) and maintain up-to-date security configurations. • Obtain ATO: Coordinate efforts across teams to prepare systems for ATO through proper documentation, risk assessments, and vulnerability remediation. • Collaboration: Work closely with program managers, engineers, and clients to ensure alignment with project goals and compliance with cybersecurity best practices. • Documentation & Reporting: Assist in the creation of … field. • Experience: 5+ years of experience in cybersecurity engineering, cyber risk management, or cyber testing. • Technical Expertise: Demonstrated experience with RMF, STIGs, and ATO processes. Hands-on experience with vulnerability management tools, penetration testing, and cyber defense technologies. • Communication: Strong ability to produce clear, concise technical reports, and provide briefings to clients and leadership. • Security: Experience working on classified More ❯
focused, and motivated candidate who can adapt to a constantly changing environment. What you will do - Manage and maintain a complex server-based enclave. Performing and mitigating system scans, vulnerability management activities, and active directory configuration. - Plan and implement IT enhancements needed for system optimization. - Identify and remediate hardware and/or software issues. - Create and update clear, concise … and accurate incident resolution documentation. - Support overlapping projects and maintain good inter-departmental relations. - Communicate and publish statuses of system outages, as needed. - Manage information assurance vulnerability alerts (IAVAs) and system security scanning of equipment suites in accordance with System Security Plans. - Actively identify and initiate IAVA responses and system security scans for remediation, deploy IAVA patches and/… and comprehension, development, integration, configuring data inputs and forwarders, data management, and/or monitoring. - Experience with Network Security Technologies such as Multiple Domain, PKI, SSP, and/or Vulnerability Assessment. - Experience with High Assurance Internet Protocol Encryptor (HAIPE) devices for in-line Network Encryption. - Experience with Puppet, Docker/Rancher, SALT. All are welcome At August Schell, we More ❯
o Reverse Engineering: • Analyze, decompile, and reverse-engineer software binaries to understand vulnerabilities and potential exploits. • Develop proof-of-concept exploits to demonstrate potential vulnerabilities in targeted systems. o Vulnerability Research • Identify, analyze, and document software vulnerabilities. • Collaborate with team members to develop mitigations and workarounds for discovered vulnerabilities. o System and Network Analysis: • Conduct network traffic analysis to … Participate in design and code reviews to ensure adherence to best practices and standards. o Documentation: • Prepare detailed technical documentation and reports, including user guides, system design documents, and vulnerability assessments. • Ensure all documentation is clear, concise, and accessible to team members and stakeholders. Required Qualifications: o Clearance: Active TS/SCI with Full Scope Polygraph is mandatory. o More ❯
operating systems, networks, security monitoring, and tuning. • Responsible for the management of IT security systems and applications, incident response, digital forensics, loss prevention, and eDiscovery actions, conducting risk and vulnerability assessments, and developing and implementing security controls. • Research, evaluate, and recommend new security tools, techniques, and technologies in alignment with program security strategy. • Configure and utilize the ELK Stack More ❯
Configure and maintain Linux and Windows systems. Manage virtualized environments (e.g., VMware, VirtualBox). Troubleshoot networking issues, including IP address configuration and virtual NICs. 5. Security and Compliance: Conduct vulnerability assessments and remediation. Apply cybersecurity principles to ensure secure software and system design. Qualifications: Education: BS in Computer Science or equivalent technical field. Advanced degree preferred. Experience: 5+ years More ❯
up on security vulnerabilities in IT systems. Help maintain an accurate IT asset inventory across various security platforms such as CMDB, AV, and SIEM. Participate in regular security reviews, vulnerability assessments, and ensure compliance with established security standards. Monitor user access and permissions, identifying and reporting potential unauthorized access. Implement and maintain Active Directory and File Share security controls More ❯
into operational systems and federated architectures Support systems maintenance, upgrades, and lifecycle sustainment Cybersecurity & Risk Management Implement security controls and support Authority to Operate (ATO) Conduct cyber analytics and vulnerability assessments Manage cybersecurity risk across networks, tools, and data environments Engineer security into AI models and supporting systems Project Management Responsibilities Serve as the primary point of contact for More ❯
Arlington, Virginia, United States Hybrid / WFH Options
ICF
ability to communicate effectively with various clients in order to explain and elaborate on technical details Practical experience with different scripting languages (e.g., Python, JavaScript, etc.) Experience with system vulnerability assessments Knowledge of Linux/Unix and Windows operating systems security Knowledge of computer programming and scripting languages Excellent written and verbal communication skills Scaled Agile Framework (SAFe) experience More ❯
relate alternative solutions and risks. • Develop routine proposals incorporating appropriate technical and operational issues into a plan based on consensus. • Write correspondence and coordinate with participants regarding operational plans, vulnerability assessments, risk evaluations, possible remedies, or execution plans. When appropriate, prepare intelligence reports following guidelines. • Ability to analyze the operational environment to identify appropriate equipment/systems required to More ❯
Platforms, including data services, storage, networking, and security components. -Monitor and optimize system performance, and implement corrective actions on a hybrid/private cloud-based platform. -Conduct regular cybersecurity vulnerability assessments and penetration testing. -Develop and maintain security incident response plans and procedures. -Develop and implement automation scripts and tools to streamline platform deployments, provisioning, and management tasks. -Deploy More ❯
implement corrective actions on current platform(s). - Experience in managing and maintaining application integration leveraging current networking concepts (TCP/IP, routing, firewalls) - Oversee and conduct regular cybersecurity vulnerability assessments and penetration testing. - Develop and maintain security incident response plans and procedures. - Develop and implement automation scripts and tools to streamline platform deployments, provisioning, and management tasks. - Deploy More ❯
Chantilly, Virginia, United States Hybrid / WFH Options
RogueThink Inc
integrate compliance and security scanning tools (e.g., SAST, DAST, SCA) into build pipelines. • Implement and monitor security controls and configurations in cloud platforms (AWS, Azure, or GCP). • Conduct vulnerability assessments and assist in remediation strategies. • Provide documentation and knowledge transfer to operations and development teams. • Collaborate with development teams on secure coding practices, especially in Node.js-based applications. More ❯