Permanent 'Vulnerability Management' Job Vacancies

126 to 150 of 282 Permanent Vulnerability Management Jobs

Cloud SecOps Lead

United Kingdom
Atos
Defender for Cloud. Guide project teams on remediation steps and ensure alignment with security best practices. Support WebOps activities including deployment and configuration of SIEM and CNAPP tools. Oversee vulnerability management processes and ensure timely remediation. Manage and maintain LogicMonitor for cloud platform monitoring: Create and update logicmodules Configure alert rules and escalation chains Manage ServiceNow integration for … Deploy and manage Workbooks Configure Azure Policies for security posture Implement regulatory compliance templates Hands-on experience with LogicMonitor and ServiceNow integrations Proven ability to lead incident response and vulnerability remediation efforts Nice-to-Have Skills: Familiarity with multi-cloud environments (AWS, GCP) Experience in coordinating ITHC assessments and managing audit findings Knowledge of cloud architecture patterns and security … frameworks Strong communication and stakeholder management skills We Care About Our Employees' Happiness By providing: 25 days of Annual leave + an option to purchase more through our Flexible Benefits. Flex benefits system – exciting opportunity to choose your own benefits. Retail discounts. Pension - matching contribution up to 10%. Private Medical Scheme. Life Assurance. Opportunities to learn in Atos More ❯
Posted:

Security Engineer

Alconbury, England, United Kingdom
MM Flowers
security threats; supporting digital transformation through the adoption and modernisation of cloud-based security solutions; and fostering a high-performing, collaborative team environment that encourages innovation while prioritising risk management, compliance, and continual improvement of security controls. Core Business Responsibilities Responsible for overseeing the design, implementation, and ongoing enhancement of security infrastructure and operational security systems. This includes ensuring … levels of security service availability and prompt incident response, supporting transformation through cloud security adoption and modernisation, and fostering a collaborative team culture that balances innovation with effective risk management and compliance. The role also involves working closely with IT teams, key security vendors, and business stakeholders to deliver critical security projects and support digital transformation initiatives whilst ensuring … experience in a security engineering or closely related IT security role Strong hands-on knowledge of security technologies (such as firewalls, intrusion detection/prevention systems, endpoint protection, SIEM, vulnerability management tools, etc.) Experience administering and supporting security solutions within cloud and on-premises environments Proven capability in responding to and investigating security incidents Familiarity with security frameworks More ❯
Posted:

IT Systems Analyst

london, south east england, united kingdom
Dweet
the implementation and monitoring of cyber security best practices across the business. Administer security tools, including , multi-factor authentication (MFA), mail filtering and Anti-Virus software . Participate in vulnerability management, incident response coordination, and system security reviews. Help maintain system documentation, asset registers, and compliance records in line with IT policies and data protection regulations. Project Support … and ongoing system enhancements. Process & Documentation Maintain up-to-date documentation of IT systems, configurations, procedures, and security protocols. Support the continuous improvement of IT operational processes and incident management workflows. Skills & Experience Required Proven experience in a Systems Analyst, IT Support Analyst, or Desktop Support role, ideally within a retail, luxury, or manufacturing business environment. Strong hands-on … experience supporting Microsoft 365 environments (essential) — including Exchange, Entra, SharePoint, Teams, OneDrive. Solid understanding of cyber security fundamentals — including access management, endpoint protection, MFA, secure cloud configuration, and vulnerability management. Exposure to, and understanding of compliance standards such as PCI and GDPR Experience supporting Windows 10/11, Active Directory, Mac OS, iOS, Print and network technology . More ❯
Posted:

Information Security Manager

Theale, Berkshire, UK
Hybrid/Remote Options
Cornerstone
transformation with our people and our customers at its heart. As Cornerstone’s Information Security Manager, you will lead the development, implementation, and continuous improvement of our Information Security Management System (ISMS), ensuring alignment with ISO 27001:2022. You will be responsible for safeguarding our digital infrastructure, managing cyber risk, and embedding a security-first culture across the organisation. … we meet our obligations to customers and regulatory standards Delivery ISMS Leadership: Own and maintain the ISMS, ensuring it meets ISO 27001:2022 requirements and supports business objectives. Risk Management: Identify, evaluate, and mitigate information security risks across systems, suppliers, and processes. Maintain visibility over key cyber risks and report to senior leadership. Incident Response: Lead the response to … the project lifecycle, from initial design through to deployment and ongoing maintenance Role Expertise The successful candidate will possess substantial experience in managing and maintaining an enterprise Information Security Management System (ISMS), with a demonstrable track record of leading and supporting external ISO 27001 audits and implementing and managing robust security frameworks. They will have a comprehensive understanding of More ❯
Posted:

Information Security Manager

Theale, England, United Kingdom
Hybrid/Remote Options
Cornerstone
transformation with our people and our customers at its heart. As Cornerstone’s Information Security Manager, you will lead the development, implementation, and continuous improvement of our Information Security Management System (ISMS), ensuring alignment with ISO 27001:2022. You will be responsible for safeguarding our digital infrastructure, managing cyber risk, and embedding a security-first culture across the organisation. … we meet our obligations to customers and regulatory standards Delivery ISMS Leadership: Own and maintain the ISMS, ensuring it meets ISO 27001:2022 requirements and supports business objectives. Risk Management: Identify, evaluate, and mitigate information security risks across systems, suppliers, and processes. Maintain visibility over key cyber risks and report to senior leadership. Incident Response: Lead the response to … the project lifecycle, from initial design through to deployment and ongoing maintenance Role Expertise The successful candidate will possess substantial experience in managing and maintaining an enterprise Information Security Management System (ISMS), with a demonstrable track record of leading and supporting external ISO 27001 audits and implementing and managing robust security frameworks. They will have a comprehensive understanding of More ❯
Posted:

Senior Security Engineer

Portsmouth, Hampshire, England, United Kingdom
Computappoint
Defender, CrowdStrike, Elastic). Expertise in building and tuning detection rules, dashboards, and automation playbooks. Proficiency in scripting or automation (KQL, PowerShell, Python, or similar). Knowledge of log management, APIs, data normalisation, and cloud security (Azure, AWS, or M365). Solid understanding of network, system, and identity security fundamentals. Excellent problem-solving skills and a passion for continuous … Cortex XSOAR, Splunk SOAR). Knowledge of MITRE ATT&CK mapping and detection engineering frameworks. Infrastructure-as-Code experience (Terraform, Bicep, or ARM templates). Exposure to threat hunting, vulnerability management, or integrations with ServiceNow/ITSM tools. Services offered by Computappoint Limited are those of an Employment Business and/or Employment Agency in relation to this More ❯
Employment Type: Full-Time
Salary: £71,250 - £78,500 per annum
Posted:

Senior IT Architect / Technical Manager - Fairfax, VA

Falls Church, Virginia, United States
Creative Information Technology, Inc
Technical Leadership & Architecture: Design and implement secure, scalable, and cost-effective cloud solutions across AWS and Azure (hybrid and multi-cloud). Build robust security architectures, leveraging Identity & Access Management (IAM), zero-trust policies, and tools like firewalls, WAFs, and SIEMs. Oversee enterprise networking (SD-WAN, VPNs, VPCs, and load balancers) and ensure efficient, secure connectivity across systems. Cloud … cost optimization and ensure production environments meet SLAs. Develop disaster recovery plans, enhance system monitoring, and reduce downtime through proactive troubleshooting. Cybersecurity Oversight: Safeguard systems through advanced threat detection, vulnerability management, encryption, and compliance initiatives (e.g., NIST, GDPR, ISO 27001). Collaborate with SOC teams on incident response and risk mitigation strategies. Cross-Team Collaboration & Strategy: Work with More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Defence Analyst

Farnborough, Hampshire, South East, United Kingdom
Hybrid/Remote Options
Leidos Innovations UK Limited
respond to Cyber Security Incidents Ensure confidentiality and discretion is practiced when dealing with multiple clients to demonstrate professionalism and evidence their information is not shared with others. Run Vulnerability Assessment tools to measure compliance with security updates and security patches. Member of a Team who are responsible for making multiple daily CSOC checks to detect and respond to … XDR and Microsoft Defender variants, and Elastic Security, or displays aptitude to learn how to work with a SIEM. Experience and knowledge of SIEM tools, Cyber Security Incident Response, Vulnerability Management and Cyber Threat Intelligence. Experience of investigating Cyber Security incidents and supporting root cause analysis or can demonstrate transferable skills and acumen to learn and excel at More ❯
Employment Type: Permanent
Salary: £45,000
Posted:

Information Security Manager

Birmingham, West Midlands, England, United Kingdom
Robert Walters
Robert Walters is working in partnership with a leading financial services business. They specialise in providing experts services across pensions, wealth management and financial planning across both personal and commercial services. In addition, they offer tailored services across retirement, tax and estate planning. They are considered market leaders in providing customer and client-centric services, operating across multiple locations. … with hands-on expertise across critical systems. Information Security Manager: Duties Experience of business acquisitions - Highly desirable Develop/Maintain enterprise InfoSec strategy aligned business goals Oversee security architecture, vulnerability management, incident response and threat intelligence Lead security risk assessments and manage remediation plans for gaps Financial regulation compliance - GDRP, PCI DSS, SOX, FCA Establish security policies, standards … Manager: Experience Experience within a financial services environment - Highly desirable Manage security for cloud-first environments - AWS, Azure, Google Cloud Implement SOC & Automated security monitoring Lead third-party risk management & vendor security programmes Experience of DevSecOps practises and SDLC Design/Implement security frameworks - ISO 27001, NIST Hands-on experience of SIEM, DLP, IAM, Endpoint Technology The permanent opportunity More ❯
Employment Type: Full-Time
Salary: £80,000 - £95,000 per annum
Posted:

Information Security Consultant

United Kingdom
Hybrid/Remote Options
People's Partnership
supporting innovation and business objectives. Conduct Security Assessments Perform comprehensive security assessments of both third-party vendors and internal applications. Oversee and evaluate security audits and penetration tests. Risk Management And Incident Response Provide consultancy on risk mitigation, incident response planning, and disaster recovery. Analyse security events, incidents, and potential threats. Policy Development And Compliance Develop security documentation in … accordance with ISO 27001, CIS Controls, and other relevant standards. Ensure ongoing compliance with industry regulations and internal governance requirements. Threat Intelligence And Vulnerability Management Stay current on new threats, vulnerabilities, and regulatory changes (e.g., GDPR, ISO 27001). Conduct threat modelling assessments for new interconnected technologies. What We’re Looking For Strong ability to identify, assess, and More ❯
Posted:

Cyber Security Controls Testing Lead

Berkshire, United Kingdom
GCS
templates, and standards. Assist in the development and localisation of standard test scripts, ensuring they are tailored to specific control environments and aligned with the organisation's Enterprise Risk Management Framework. Conduct control testing activities to evaluate the design and operational effectiveness of cybersecurity controls, documenting results clearly and raising issues where appropriate. Ensure timely delivery of assigned control … role, the essential criteria you'll need are Proven experience in performing cybersecurity control assessments, including evaluating design and operational effectiveness. Strong understanding of information security principles, cyber risk management, and control frameworks. Experience in IT, OT and Cloud environments, with a focus on cybersecurity controls. Clear and professional verbal and written communication, including the ability to explain cybersecurity … with minimal supervision, taking ownership of assigned tasks and driving them to completion while maintaining high standards of quality and accuracy. Strong understanding of Cybersecurity Domains, including Threat Intelligence, Vulnerability Management, Security Testing, Security Architecture, Infrastructure Protection, Application Security, Identity and Access Management, Incident Investigation & Response and Cryptography. Additional skills and experiences would be great to have More ❯
Employment Type: Permanent
Salary: £65000 - £70000/annum bonus/ pension
Posted:

Information Security Architect - Solutions & Enterprise Security Architecture

Manchester, England, United Kingdom
Hybrid/Remote Options
Acumin
architectures in hybrid and cloud (AWS/Azure) environments. Strong hands-on expertise with enterprise security platforms – including Endpoint Protection, Cloud Security, Network Security, DevSecOps, SIEM/SOAR, and vulnerability management. Deep understanding of secure design principles, IAM, encryption, API security, and application security. Experience performing threat modelling, security risk assessments, and control design validation. In-depth knowledge of More ❯
Posted:

Information Security Architect - Solutions & Enterprise Security Architecture

London Area, United Kingdom
Hybrid/Remote Options
Acumin
architectures in hybrid and cloud (AWS/Azure) environments. Strong hands-on expertise with enterprise security platforms – including Endpoint Protection, Cloud Security, Network Security, DevSecOps, SIEM/SOAR, and vulnerability management. Deep understanding of secure design principles, IAM, encryption, API security, and application security. Experience performing threat modelling, security risk assessments, and control design validation. In-depth knowledge of More ❯
Posted:

Information Security Architect - Solutions & Enterprise Security Architecture

City of London, London, United Kingdom
Hybrid/Remote Options
Acumin
architectures in hybrid and cloud (AWS/Azure) environments. Strong hands-on expertise with enterprise security platforms – including Endpoint Protection, Cloud Security, Network Security, DevSecOps, SIEM/SOAR, and vulnerability management. Deep understanding of secure design principles, IAM, encryption, API security, and application security. Experience performing threat modelling, security risk assessments, and control design validation. In-depth knowledge of More ❯
Posted:

IT Support Apprentice

Bedminster, Bristol, Avon, England, United Kingdom
QA
s mission is to help businesses protect their data, enhance productivity, and achieve compliance through its comprehensive Protect & Grow managed IT plans. Services include Microsoft 365 and Google Workspace management, device security, vulnerability management, AI-enhanced email security, and disaster recovery planning. With a reputation for clear, jargon-free communication and strong client relationships, Dial A Geek More ❯
Employment Type: Full-Time
Salary: £15,000 per annum
Posted:

Cybersecurity Engineer III

Chesapeake, Virginia, United States
SimVentions, Inc - Glassdoor 4.6
an experienced cybersecurity professional to join our team! As a Cybersecurity Engineer III, you will play a key role in advancing cybersecurity operations by performing in-depth system hardening, vulnerability assessment, and security compliance activities in accordance with DoD requirements. The ideal candidate will have a solid foundation in cybersecurity practices and proven experience supporting both Linux and Windows … Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation Guides (STIG), and conduct Information Assurance Vulnerability Management (IAVM) reviews Perform automated ACAS scanning, STIG, SCAP checks (Evaluate STIG, Tenable Nessus, etc.) on various standalone and networked systems Analyze cybersecurity test scan results and develop … security, military system specifications, and DoD cybersecurity policies National Cyber Range Complex (NCRC) Total Ship Computing Environment (TSCE) Program requirements and mission, ship install requirements, and protocols (preferred) Risk Management Framework (RMF), and the implementation of Cybersecurity and IA boundary defense techniques and various IA-enabled appliances. Examples of these appliances and applications are Firewalls, Intrusion Detection System (IDS More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cybersecurity Engineer III

Virginia Beach, Virginia, United States
SimVentions, Inc - Glassdoor 4.6
an experienced cybersecurity professional to join our team! As a Cybersecurity Engineer III, you will play a key role in advancing cybersecurity operations by performing in-depth system hardening, vulnerability assessment, and security compliance activities in accordance with DoD requirements. The ideal candidate will have a solid foundation in cybersecurity practices and proven experience supporting both Linux and Windows … Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation Guides (STIG), and conduct Information Assurance Vulnerability Management (IAVM) reviews Perform automated ACAS scanning, STIG, SCAP checks (Evaluate STIG, Tenable Nessus, etc.) on various standalone and networked systems Analyze cybersecurity test scan results and develop … security, military system specifications, and DoD cybersecurity policies National Cyber Range Complex (NCRC) Total Ship Computing Environment (TSCE) Program requirements and mission, ship install requirements, and protocols (preferred) Risk Management Framework (RMF), and the implementation of Cybersecurity and IA boundary defense techniques and various IA-enabled appliances. Examples of these appliances and applications are Firewalls, Intrusion Detection System (IDS More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cybersecurity Engineer III

Portsmouth, Virginia, United States
SimVentions, Inc - Glassdoor 4.6
an experienced cybersecurity professional to join our team! As a Cybersecurity Engineer III, you will play a key role in advancing cybersecurity operations by performing in-depth system hardening, vulnerability assessment, and security compliance activities in accordance with DoD requirements. The ideal candidate will have a solid foundation in cybersecurity practices and proven experience supporting both Linux and Windows … Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation Guides (STIG), and conduct Information Assurance Vulnerability Management (IAVM) reviews Perform automated ACAS scanning, STIG, SCAP checks (Evaluate STIG, Tenable Nessus, etc.) on various standalone and networked systems Analyze cybersecurity test scan results and develop … security, military system specifications, and DoD cybersecurity policies National Cyber Range Complex (NCRC) Total Ship Computing Environment (TSCE) Program requirements and mission, ship install requirements, and protocols (preferred) Risk Management Framework (RMF), and the implementation of Cybersecurity and IA boundary defense techniques and various IA-enabled appliances. Examples of these appliances and applications are Firewalls, Intrusion Detection System (IDS More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cybersecurity Engineer III

Norfolk, Virginia, United States
SimVentions, Inc - Glassdoor 4.6
an experienced cybersecurity professional to join our team! As a Cybersecurity Engineer III, you will play a key role in advancing cybersecurity operations by performing in-depth system hardening, vulnerability assessment, and security compliance activities in accordance with DoD requirements. The ideal candidate will have a solid foundation in cybersecurity practices and proven experience supporting both Linux and Windows … Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation Guides (STIG), and conduct Information Assurance Vulnerability Management (IAVM) reviews Perform automated ACAS scanning, STIG, SCAP checks (Evaluate STIG, Tenable Nessus, etc.) on various standalone and networked systems Analyze cybersecurity test scan results and develop … security, military system specifications, and DoD cybersecurity policies National Cyber Range Complex (NCRC) Total Ship Computing Environment (TSCE) Program requirements and mission, ship install requirements, and protocols (preferred) Risk Management Framework (RMF), and the implementation of Cybersecurity and IA boundary defense techniques and various IA-enabled appliances. Examples of these appliances and applications are Firewalls, Intrusion Detection System (IDS More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cybersecurity Engineer - PTO, Paid Holidays & Paid Leave

Bonita, California, United States
SimVentions, Inc - Glassdoor 4.6
an experienced cybersecurity professional to join our team! As a Cybersecurity Engineer III, you will play a key role in advancing cybersecurity operations by performing in-depth system hardening, vulnerability assessment, and security compliance activities in accordance with DoD requirements. The ideal candidate will have a solid foundation in cybersecurity practices and proven experience supporting both Linux and Windows … Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation Guides (STIG), and conduct Information Assurance Vulnerability Management (IAVM) reviews Perform automated ACAS scanning, STIG, SCAP checks (Evaluate STIG, Tenable Nessus, etc.) on various standalone and networked systems Analyze cybersecurity test scan results and develop … security, military system specifications, and DoD cybersecurity policies National Cyber Range Complex (NCRC) Total Ship Computing Environment (TSCE) Program requirements and mission, ship install requirements, and protocols (preferred) Risk Management Framework (RMF), and the implementation of Cybersecurity and IA boundary defense techniques and various IA-enabled appliances. Examples of these appliances and applications are Firewalls, Intrusion Detection System (IDS More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cybersecurity Engineer III

La Mesa, California, United States
SimVentions, Inc - Glassdoor 4.6
an experienced cybersecurity professional to join our team! As a Cybersecurity Engineer III, you will play a key role in advancing cybersecurity operations by performing in-depth system hardening, vulnerability assessment, and security compliance activities in accordance with DoD requirements. The ideal candidate will have a solid foundation in cybersecurity practices and proven experience supporting both Linux and Windows … Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation Guides (STIG), and conduct Information Assurance Vulnerability Management (IAVM) reviews Perform automated ACAS scanning, STIG, SCAP checks (Evaluate STIG, Tenable Nessus, etc.) on various standalone and networked systems Analyze cybersecurity test scan results and develop … security, military system specifications, and DoD cybersecurity policies National Cyber Range Complex (NCRC) Total Ship Computing Environment (TSCE) Program requirements and mission, ship install requirements, and protocols (preferred) Risk Management Framework (RMF), and the implementation of Cybersecurity and IA boundary defense techniques and various IA-enabled appliances. Examples of these appliances and applications are Firewalls, Intrusion Detection System (IDS More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cybersecurity Engineer - Competitive 401(k) programs

San Diego, California, United States
SimVentions, Inc - Glassdoor 4.6
an experienced cybersecurity professional to join our team! As a Cybersecurity Engineer III, you will play a key role in advancing cybersecurity operations by performing in-depth system hardening, vulnerability assessment, and security compliance activities in accordance with DoD requirements. The ideal candidate will have a solid foundation in cybersecurity practices and proven experience supporting both Linux and Windows … Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation Guides (STIG), and conduct Information Assurance Vulnerability Management (IAVM) reviews Perform automated ACAS scanning, STIG, SCAP checks (Evaluate STIG, Tenable Nessus, etc.) on various standalone and networked systems Analyze cybersecurity test scan results and develop … security, military system specifications, and DoD cybersecurity policies National Cyber Range Complex (NCRC) Total Ship Computing Environment (TSCE) Program requirements and mission, ship install requirements, and protocols (preferred) Risk Management Framework (RMF), and the implementation of Cybersecurity and IA boundary defense techniques and various IA-enabled appliances. Examples of these appliances and applications are Firewalls, Intrusion Detection System (IDS More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cybersecurity Engineer III

San Diego, California, United States
SimVentions, Inc - Glassdoor 4.6
an experienced cybersecurity professional to join our team! As a Cybersecurity Engineer III, you will play a key role in advancing cybersecurity operations by performing in-depth system hardening, vulnerability assessment, and security compliance activities in accordance with DoD requirements. The ideal candidate will have a solid foundation in cybersecurity practices and proven experience supporting both Linux and Windows … Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation Guides (STIG), and conduct Information Assurance Vulnerability Management (IAVM) reviews Perform automated ACAS scanning, STIG, SCAP checks (Evaluate STIG, Tenable Nessus, etc.) on various standalone and networked systems Analyze cybersecurity test scan results and develop … security, military system specifications, and DoD cybersecurity policies National Cyber Range Complex (NCRC) Total Ship Computing Environment (TSCE) Program requirements and mission, ship install requirements, and protocols (preferred) Risk Management Framework (RMF), and the implementation of Cybersecurity and IA boundary defense techniques and various IA-enabled appliances. Examples of these appliances and applications are Firewalls, Intrusion Detection System (IDS More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cybersecurity Engineer - PTO, Paid Holidays & Paid Leave

Imperial Beach, California, United States
SimVentions, Inc - Glassdoor 4.6
an experienced cybersecurity professional to join our team! As a Cybersecurity Engineer III, you will play a key role in advancing cybersecurity operations by performing in-depth system hardening, vulnerability assessment, and security compliance activities in accordance with DoD requirements. The ideal candidate will have a solid foundation in cybersecurity practices and proven experience supporting both Linux and Windows … Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation Guides (STIG), and conduct Information Assurance Vulnerability Management (IAVM) reviews Perform automated ACAS scanning, STIG, SCAP checks (Evaluate STIG, Tenable Nessus, etc.) on various standalone and networked systems Analyze cybersecurity test scan results and develop … security, military system specifications, and DoD cybersecurity policies National Cyber Range Complex (NCRC) Total Ship Computing Environment (TSCE) Program requirements and mission, ship install requirements, and protocols (preferred) Risk Management Framework (RMF), and the implementation of Cybersecurity and IA boundary defense techniques and various IA-enabled appliances. Examples of these appliances and applications are Firewalls, Intrusion Detection System (IDS More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cybersecurity Engineer - PTO, Paid Holidays & Paid Leave

San Diego, California, United States
SimVentions, Inc - Glassdoor 4.6
an experienced cybersecurity professional to join our team! As a Cybersecurity Engineer III, you will play a key role in advancing cybersecurity operations by performing in-depth system hardening, vulnerability assessment, and security compliance activities in accordance with DoD requirements. The ideal candidate will have a solid foundation in cybersecurity practices and proven experience supporting both Linux and Windows … Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation Guides (STIG), and conduct Information Assurance Vulnerability Management (IAVM) reviews Perform automated ACAS scanning, STIG, SCAP checks (Evaluate STIG, Tenable Nessus, etc.) on various standalone and networked systems Analyze cybersecurity test scan results and develop … security, military system specifications, and DoD cybersecurity policies National Cyber Range Complex (NCRC) Total Ship Computing Environment (TSCE) Program requirements and mission, ship install requirements, and protocols (preferred) Risk Management Framework (RMF), and the implementation of Cybersecurity and IA boundary defense techniques and various IA-enabled appliances. Examples of these appliances and applications are Firewalls, Intrusion Detection System (IDS More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:
Vulnerability Management
10th Percentile
£35,650
25th Percentile
£47,500
Median
£68,500
75th Percentile
£90,000
90th Percentile
£97,500