Amherst, Massachusetts, United States Hybrid / WFH Options
University of Massachusetts Amherst
technologies and techniques in order to recommend and utilize improvements to system manageability and uptime, such as virtualization and clustering. Manages system security by enrolling and monitoring systems in VulnerabilityManagement Software. Evaluates security risks and take appropriate measures to mitigate. Other Functions Performs other duties as assigned. Minimum Qualifications (Knowledge, Skills, Abilities, Education, Experience, Certifications, Licensure) A … emergency situations. Understanding that events of an emergency or planned nature may interfere with daily duties. Knowledge of Massachusetts Law Enforcement specific systems such as CJIS/CORI, record management and public safety communications systems, body-worn camera and vehicle cameras. Experience with Microsoft Active Directory Group Policies and scripting languages. Physical Demands/Working Conditions Typical office environment. More ❯
Hunting and Threat Intelligence (MITRE ATT&CK) Penetration Testing Security Automation (SOAR) It would help if you had experience with the following: SIEM tools (Microsoft Sentinel, Splunk, ELK, Siemplify) VulnerabilityManagement (Qualys, Nessus, Nexpose) Anti-Malware/EDR Software (Carbon Black, Microsoft Defender ATP, FireEye, CrowdStrike) Programming (Python, or other languages) What you can expect from us We More ❯
detections, SIEM rules, or EDR Significant experience with standard incident response processes Expertise in a broad range of information technologies, such as public cloud infrastructure (AWS,GCP), authentication systems, vulnerabilitymanagement solutions, network infrastructure, etc. Someone that has contributed to the development of detection and alerting pipelines Experience in dissecting attacker methodologies and techniques Comprehensive understanding of product More ❯
Reston, Virginia, United States Hybrid / WFH Options
CGI
Node.js, Bash, or PowerShell are all great. Familiar with monitoring and observability tools like CloudWatch, Splunk, Dynatrace, or OpenTelemetry. Understands and applies security best practices, including IAM, RBAC, and vulnerability management. Experience designing and supporting microservices and APIs, with a focus on resilience and fault tolerance. Experience with chaos engineering and tools like AWS FIS or Chaos Toolkit Comfortable More ❯
STIG Compliance/VulnerabilityManagement SME Boulder, CO or Fairmont, WV 5 days a week in Office with the possibility of 2 days remote Top Secret As the STIG Compliance/VulnerabilityManagement SME, you will work either independently or as part of a team to achieve critical mission objectives, ensuring smooth operations for the customer. … What Will You Do: • Evaluate security risks on systems • Evaluate STIG compliance • Execute and manage the NCSC VulnerabilityManagement Plan • Create and maintain compliance scan policies • Maintain a master asset list • Troubleshoot scan issues and coordinate with appropriate team members. • Continuously research emerging threats to the environment in order to disseminate the information to all stakeholders, immediately assess … the known environment for presence of the vulnerability, and work with the SOC and SE&O to protect the environment. • Ensure system compliance against federal and DOC policies • Identify & document all non-compliant areas • Support Assessment and Authorization activities • Conduct, operate, and maintain vulnerability/compliance assessments and the resulting data and reports • Author and maintain SOPs and More ❯
SOC and Vulnerability Analyst Logiq Consulting is a fantastic place to work. Our ethos is based on our core values of innovation, collaboration, and quality delivery which has created a genuine "Yes" culture. Being a fast growing SME working alongside some of most prestigious clients in the UK we can offer not only a varied and interesting workload, but … and The Role: An increase in clients across our Managed Services, along with the maturing of our service offering as driven the requirement for this new role, SOC and Vulnerability Analyst. The role will be reporting to our Information Security Lead and sit within our Information Security Team. The ideal candidate will have current or recent experience working in … a SOC environment and/or have a strong focus on vulnerability management. Key Responsibilities: As SOC and Vulnerability Analyst you be responsible for: Monitoring the clients IT infrastructure. Monitoring Logiq IT security systems, applications and networks for irregularities and alerts which may indicate incidents, breaches and events. Investigation of alerts and incidents to ascertain the criticality and More ❯
for our shareholders. Join our team and discover why we are a top veteran employer and Certified Great Place to Work ASRC Federal is currently seeking a Senior Enterprise Management Systems Administrator - Tier-3 Level to support upcoming work located in San Antonio, TX. Summary: This contract will provide 24/7/365 operations support to the customer. … but are not limited to, on-boarding & exiting assistance, timecard accounting, mentoring, and reporting. Expert-level knowledge or significant hands-on experience in: Manage IT Infrastructures utilizing approved Enterprise Management (EM) tools (currently Microsoft Endpoint Configuration Manger (MECM). Install, configure, and maintain the EM infrastructure at the proper approved release levels. Assist End Users in the deployment of … the EM client management tool. Perform ongoing maintenance to ensure server health, including database and server maintenance. Install, maintain, and administer the EM instance, to include granting access, managing permissions, setting up workflows and the proper 2-person integrity for actions and other required administrative actions. Modify the EM configuration and Server Management System (SMS_DEF.MOF) to collect More ❯
PCI DSS & AWS cloud background is required to join our global client's new UK cybersecurity team. This role is predominantly end-client facing, advising on security best practices, vulnerabilitymanagement and security standard compliance (e.g. NIST, ISO, PCI DSS etc), and leading audits and examinations. You will be reporting to the UK Head of Security and consulting … Skills & Experience Required: 4+ years of experience working in Cyber Security within an AWS cloud environment Any experience with CrowdStrike would be a bonus Good experience with PCI DSS Vulnerabilitymanagement & Compliance Lead on Audits Strong Security standard knowledge and experience, consulting on a range of security policies and standards such as GDPR, ISO, PCI, NIST Confidence when … headquarters. You will be working in a vibrant office with some of most forward-thinking technical people Key Responsibilities: Analysing and developing security requirements, as well as carrying out vulnerabilitymanagement & compliance work in PCI DSS type projects Ensure consistency across IT Security risk management activities. Advise Engineers on information related to new vulnerabilities and threats and More ❯
PCI DSS & AWS cloud background is required to join our global client's new UK cybersecurity team. This role is predominantly end-client facing, advising on security best practices, vulnerabilitymanagement and security standard compliance (e.g. NIST, ISO, PCI DSS etc), and leading audits and examinations. You will be reporting to the UK Head of Security and consulting … Skills & Experience Required: 4+ years of experience working in Cyber Security within an AWS cloud environment Any experience with CrowdStrike would be a bonus Good experience with PCI DSS Vulnerabilitymanagement & Compliance Lead on Audits Strong Security standard knowledge and experience, consulting on a range of security policies and standards such as GDPR, ISO, PCI, NIST Confidence when … headquarters. You will be working in a vibrant office with some of most forward-thinking technical people Key Responsibilities: Analysing and developing security requirements, as well as carrying out vulnerabilitymanagement & compliance work in PCI DSS type projects Ensure consistency across IT Security risk management activities. Advise Engineers on information related to new vulnerabilities and threats and More ❯
Cambridge, Cambridgeshire, East Anglia, United Kingdom
The Bridge (IT Recruitment) Limited
teaming, and security assessments. Driving the integration of secure development practices and automation within CI/CD workflows. Supporting compliance and audit activities through structured documentation and reporting. Coordinating vulnerabilitymanagement and helping teams meet security SLAs. Collaborating with cross-functional stakeholders to embed security into engineering culture and processes. Owning and improving security tooling roadmaps and BAU … delivery capacity. What we're looking for: Demonstrable experience of effective and efficient cyber security delivery, project management or security engineering. Strong understanding of vulnerabilitymanagement, secure software development, and compliance frameworks (NIST CSF 2.0, GDPR, ISO 27001). Strong examples of cross-functional stakeholder management, being a knowledgeable bridge between technical cyber security teams and … red teaming and security tool implementations. Strong knowledge and experience of integrating security into agile development environments and workflows. Experience with tools like Jira, Confluence, SharePoint or similar project management tools. Preferred certifications: CISA, CISM, Security+, PMP, Prince 2. More ❯
Position Description: The Cyber Systems Engineer - VulnerabilityManagement provides support to the customer in the area of Cyber Security. Daily tasks include, but are not limited to: Support the IT vulnerabilitymanagement lifecycle. Support government activities and reporting to appropriate IC and DoD authorities (i.e., USCYBERCOM, IC-SCC). Assesses and manages the implementation of identified … with technical vulnerabilities. Update and manage metrics reporting for several database sources. Collect the necessary data, develops, and delivers a periodic Cyber Vulnerabilities Metrics Reports. Develop and delivers asset vulnerability views for categories such as mission, cross domain, and location, as required by the customer. Develop cyber threat analysis for known threats. Document and deliver reporting activities related to … prepare Inspector General (IG) FISMA closure requests from field reps and program Information System Security Engineers (ISSEs) Coordinate with RMF stakeholders on closure Body of Evidence (BoE) for Enterprise Vulnerability and Remediation (EVAR) tracked findings Prepare and update slides for weekly and monthly meetings Research trending vulnerabilities being reported through enterprise security tools Support automation activities with system engineers More ❯
Responsibilities & Qualifications This role requires a blend of strategic thinking, technical expertise, and effective team management to ensure the organization maintains a robust and proactive approach to vulnerabilitymanagement in the government customer's dynamic and fast-paced cybersecurity environment. RESPONSIBILITIES Technical Leadership and Expertise Serve as the primary technical expert for enterprise vulnerability assessment tools … and practices, overseeing the architecture, engineering, and operation of the EVAP scanning infrastructure. Support hands-on configuration and optimization of vulnerability scanning solutions to ensure effectiveness and accuracy. Stay current with the latest vulnerability assessment tools, technologies, and threat landscapes to continuously refine scanning methodologies. Operational Oversight Direct day-to-day operations of the EVAP team to ensure … efficient and timely execution of vulnerability assessments. Provide hands-on guidance in conducting complex scans, troubleshooting tool issues, and analyzing results. Ensure scanning activities are aligned with organizational needs for maximum coverage and effectiveness. Team Management and Development Support, mentor, and support the team of Security and Vulnerability Assessment SMEs, fostering a collaborative environment and ensuring high More ❯
standards. • Collaborate daily with System Administrators, DevSecOps, Cybersecurity, Software Engineers, and Integration Engineers on a highly technical team delivering reliable solutions. • Assist the Information Assurance (IA) Team with system vulnerabilitymanagement, software patching, account management, and license compliance. Is This You? • 7+ years of database administration or engineering experience in secure environments • Bachelor's degree in STEM … MySQL, Microsoft SQL Server (Advanced experience required) • High-Availability Architecture, Clustering, Automated Failover • Backup Methodologies & Disaster Recovery Planning Systems & Security: • RHEL Linux Administration • Security Technical Implementation Guidelines (STIGs) • System VulnerabilityManagement & Patch Compliance Virtualization & Platforms: • KVM, VMware, RedHat OpenShift • Satellite Ground Systems & OPIR Program Exposure (Highly Preferred) DevOps & Automation: • Automated Scripting (Python or similar languages) • Infrastructure as Code … IaC) • Agile, Lean, and Continuous Process Improvement Frameworks • Configuration & Change Management Processes Collaboration & Communication: • Strong team player with excellent verbal and written communication • Ability to develop CONOPS, procedural documentation, and operational support materials If this sounds like you, we'd love to talk. Apply today and help us build mission-critical solutions that safeguard national security. More ❯
You will ensure robust, efficient and globally coordinated security operations that protect the organisation's people, systems, and data. This includes direct ownership of security controls, security testing, vendor management, vulnerability and threat management, and incident response. You will work daily with the Group CISO to support consistent, high-assurance security practices across all regions, in-line … with regional regulation and to support the management of cyber incidents. It is essential the individual who will fill this role has prior management experience, has supported building security teams previously and has knowledge around their responsibility at this level to report incidents and security concerns within regulatory timelines and standards. About the role Within this role, you … will have been supporting the Group CISO by managing the security team and programmes of work in your responsibility area. You will be responsible for the management of any global Cyber Incidents by supporting the CISO team. Additionally, you will be: Working collaboratively with the SOC to ensure 24/7 visibility and threat detection across global environments, driving More ❯
security frameworks (e.g., ISO 27001, NIST, GDPR) ️ Performing audits and security assessments to identify vulnerabilities and recommending appropriate mitigations ️ Collaborating with other teams to implement and maintain secure information management systems ️ Providing expert guidance on data classification, encryption, and access controls to maintain the integrity and confidentiality of sensitive data What We're Looking For: ️ Proven experience as an … a similar role focused on data protection and compliance ️ Strong understanding of information assurance frameworks (e.g., ISO 27001, NIST SP 800-53, COBIT) ️ Experience with security assessments, audits, and vulnerabilitymanagement ️ Knowledge of regulatory standards such as GDPR, HIPAA, and PCI-DSS ️ Certifications such as CISSP, CISM, or ISO 27001 Lead Implementer are highly desirable More ❯
Program Description: The program provides Systems Engineering and Technical Assistance (SETA) core and non-core support in the areas of Cyber Security and Management to improve the Information Assurance (IA) posture of a National customer. The contracts Core Capabilities are: IA Management, Federal Information Security Management Act (FISMA) coordination and reporting, Risk Management Framework (RMF) application … IA compliance measurements and metrics, Assessment and Authorization (A&A), VulnerabilityManagement, and Cyber Defense support. Position Description The Cyber Trainer provides support to the customer in the area of Cybersecurity policy, process, and tool training. Daily tasks include, but are not limited to: Works with the training team to provide IA training as directed by the Government … delivery, and follow-up Create and update training materials as new Cyber tools and capabilities are fielded or processes are created or modified Provide training related to ServiceNow, Risk Management Framework (RMF), Continuous Monitoring, Privileged Users, Information Assurance, Information System Owner cyber responsibilities, etc. Job Requirements Qualifications Required: Current U.S. Government Top Secret clearance with SCI eligibility Favorably adjudicated More ❯
resolving system and application faults and errors Ensuring operating systems and applications comply with Department of Defense (DoD) guidelines, including DISA Security Technical Implementation Guide (STIG) and Information Assurance VulnerabilityManagement (IAVM) bulletins What's In It For You Competitive wages Medical and dental benefits 401k plan Paid time off Rewards & recognition US Citizenship Requirement Pursuant to a … experience, or MS degree with 10+ years of related IT experience Desired Skills: Experience with Teamcenter SOA Gateway Experience with Agile Software Development using Jira Knowledge of software configuration management using GitHub Strong communication and presentation skills to articulate solution ideas Experience advising and consulting with management Effective project management and prioritization skills for handling multiple assignments … Collaboration with vendors for server technology implementation Tenacious documentation of activities, status, and issues worked Knowledge of Microsoft Active Directory, GPOs, DHCP, DNS, and PowerShell General understanding of antivirus, vulnerability scanning, and SIEM tools Preferred Education, Experience, & Skills (Not required but will increase consideration for the position): Teamcenter Application and/or Database Administration experience AWS or similar cloud More ❯
understand and be able to implement DoD RMF system accreditation processes. Assess use case and operational risk of integrated open source, and GOTS/COTS software components. Will use vulnerabilitymanagement systems, automated security scanning tools, and system accreditation record systems. Must be able to grasp new concepts, facilitate information exchanges for data gathering, and collaborate with diverse … audiences. Will follow established processes where applicable, and establish and execute defensible processes where none are prescribed. Provide security planning, assessment, risk analysis, and risk management support. Recommend system-level solutions to resolve security requirements and guide the development team in meeting the security posture requirements. Support the Government in the enforcement of the design and implementation of trusted … inner workings of various software and system level applications. DoD 8570 compliance with IAT Level II (SSCP, Security+, CCNA-Security, or GSEC certification) Experience with DISA STIGs and SRGs, vulnerabilitymanagement systems, mitigation and compliance processes, and reviewing results from automated security scanning tools. The ability to work independently and as part of a team is needed. Work More ❯
based applications using AWS, Kubernetes, and DevOps best practices. Design, build, and maintain CI/CD pipelines, infrastructure automation, and containerized environments. Apply security best practices, including encryption, compliance, vulnerabilitymanagement, and incident response. Develop, test, and optimize API integrations to ensure scalability and reliability. Utilize Python, Java, and scripting languages (YAML, JSON, Linux/UNIX) for cloud … 8+ years of experience, or Master's degree and 6+ years of experience Python/Java programming languages Understanding of DevOps principles, CI/CD pipelines, GitOps, automation, configuration management, and infrastructure as code Familiar with Scaled Agile methodology Familiarity with security best practices, risk, compliance & vulnerabilitymanagement, encryption & PKI, incident response, auditing and monitoring Proficiency in … JSON. Experience with AWS (AWS Solutions Architect strongly preferred) and its services (including fundamental AWS networking) Containerization using Docker and Kubernetes Strong understanding of API Design, testing, development and management Tools: CI/CD tools: Gitlab, Nexus Managed Artifacts, AWS: AWS EKS, EC2, Lambda, S3, EBS/EFS, VPC, DNS, IAM, KMS, CloudWatch, CloudTrail Configuration management: Ansible, Terragrunt More ❯
Havant, Hampshire, South East, United Kingdom Hybrid / WFH Options
Reed Technology
month FTC (with likely extension to permanent) Salary: 50 - 53K plus benefits We are seeking a Cyber Security Specialist to lead the implementation of a new Information Security Management System (ISMS) and ensure compliance with security standards. This role is crucial in driving security improvements, managing risks, and maintaining regulatory compliance within a dynamic IT environment of circa … IT users. Key Accountabilities: * Lead the implementation of a new ISMS, ensuring alignment with industry security standards. * Develop and maintain cyber security policies, procedures, and risk management frameworks. * Manage compliance with cyber security regulations, standards, and frameworks (ISO27001, CAF/eCAF, Cyber Essentials Plus). * Implement and manage security monitoring tools to detect and respond to security events. * Identify … with hands-on involvement in ensuring compliance to security frameworks (ISO27001, NIST, eCAF). * Proven experience in implementing security systems and/or monitoring tools. * Strong knowledge of SIEM, VulnerabilityManagement, Threat Intelligence, and IAM systems. * Experience contributing to enterprise-level security initiatives and aligning with industry standards. * Strong collaboration skills, including experience working with IT Operations teams More ❯
Brighton 2 days per week + WFH) Salary: 60K - 62.5K + exceptional Employee Benefits including 28% Employer Pension, (+ on-call payment), great work/life balance Key Skills: VulnerabilityManagement tools, Azure Security Centre, Defender, Sentinel and a broad Infrastructure Engineer background Summary: This role joins a high performing, dedicated, hands-on Cyber Security Team responsible for … and Microsoft cloud infrastructure, including: Cisco firewalls and ISE, Forcepoint or similar secure web gateway/CASB solution, Mimecast, IDS/IPS solutions, Network Detection and Response (NDR), Qualys vulnerability detection and management platform or similar Highly practical with a can-do attitude, able to demonstrate a proactive approach to identifying and mitigating potential security risks. Strong communications More ❯
DLP (Data Loss Prevention)/DRM (Digital Rights Management) SME You Have: Daily operation, maintenance, and monitoring of Data Loss Prevention (DLP) systems, preferably with one or more of the following: Varonis, Microsoft Purview, and Forcepoint Familiar with various DLP solutions, comprising Endpoint DLP, Network DLP, Discovery, and Cloud DLP, including responding to the alerts that the tool generates. … Strong understanding of Data Governance and establishing a policy-based Data Lifecycle Management (DLM) process. Ensures data is managed from creation to deletion, accessible to the right people, and supports business objectives. 3+ years of experience with security principles, approaches, and technologies and supporting DoD cybersecurity and information assurance processes Possesses excellent consulting skills to include problem-solving, leadership … time management, creativity, analytical skills, and collaboration Secret clearance Bachelor's degree in a technology field (e.g., Computer Science, Information Technology, Software Engineering) Nice If You Have: Experience providing subject matter expertise in a cyber domain, including vulnerabilitymanagement and assessment, scanning tools, and assessing system compliance with security controls Experience analyzing network configurations and network architecture More ❯
Alexandria, Virginia, United States Hybrid / WFH Options
Peraton
Day Work Responsibilities: TSSA Development & Implementation Architect and develop sophisticated automation work-flows using BMC TrueSight Server Automation (TSSA) platform. Create custom scripts and templates for provisioning, configuration, patch management, and compliance enforcement. Implement automated vulnerabilitymanagement and remediation processes, tightly integrated with security and change management systems. Deliver end-to-end patching automation solutions with … maintenance window scheduling and compliance tracking. Enterprise Infrastructure Automation Automate server life-cycle management from provisioning and configuration to decommissioning across physical, virtual, and cloud environments. Develop scalable configuration management systems to enforce security and compliance standards (STIG, CIS, DISA, HIPAA, PCI-DSS, SOX). Implement drift detection mechanisms and automated remediation solutions to ensure system integrity. Design … BMC tools such as Remedy and Patrol. Strong background in IT infrastructure management. Ability to obtain BMC TrueSight Server Automation certification. ITIL certification or equivalent understanding of ITIL service management processes.Preferred Qualifications: Security certifications (Security+, CISSP, etc.) Automation script and template development, architecture and configuration. TSSA console administration and deployment scenario design. Hands-on management of large-scale More ❯
Brighton, East Sussex, Preston Park, United Kingdom Hybrid / WFH Options
Data Careers Ltd
Brighton 2 days per week + WFH) Salary: £60K - £62.5K + exceptional Employee Benefits including 28% Employer Pension, (+ on-call payment), great work/life balance Key Skills: VulnerabilityManagement tools, Azure Security Centre, Defender, Sentinel and a broad Infrastructure Engineer background Summary: This role joins a high performing, dedicated, hands-on Cyber Security Team responsible for … and Microsoft cloud infrastructure, including: Cisco firewalls and ISE, Forcepoint or similar secure web gateway/CASB solution, Mimecast, IDS/IPS solutions, Network Detection and Response (NDR), Qualys vulnerability detection and management platform or similar Highly practical with a can-do attitude, able to demonstrate a proactive approach to identifying and mitigating potential security risks. Strong communications More ❯
or recommendations to local policies. Provides in a timely manner, a Policy Change Summary Report for the development of new or updated policies, procedures, standards, strategies, network architecture, etc. VulnerabilityManagement Expertise: Utilize ACAS to scan systems, review scan results, prioritize vulnerabilities. Create in a timely manner, customized reports to recommend the best course of action to mitigate … SUCCEED: Educations: Bachelor's Degree Required Experience: 7 years of related experience in Information Assurance with at least 3 years of experience within each expertise area of security policy, vulnerabilitymanagement, and security assessment and authorization. Required Technical Experience: In depth knowledge and experience implementing NIST guidance relating to SA&A, including System Security Plans, Security Test & Evaluation … Top Secret with SCI eligibility and a T5 or T5R within the last 5 years Required Skills and Abilities Communication skills required in one-on-one, team, and senior management settings. The ability to work and set priorities on multiple projects/tasks at once and operate in a dynamic, fast-paced team-oriented environment. Must have IAM Level More ❯