Permanent Vulnerability Management Job Vacancies

276 to 300 of 478 Permanent Vulnerability Management Jobs

Systems Analyst (Hybrid Opportunity)

Amherst, Massachusetts, United States
Hybrid / WFH Options
University of Massachusetts Amherst
technologies and techniques in order to recommend and utilize improvements to system manageability and uptime, such as virtualization and clustering. Manages system security by enrolling and monitoring systems in Vulnerability Management Software. Evaluates security risks and take appropriate measures to mitigate. Other Functions Performs other duties as assigned. Minimum Qualifications (Knowledge, Skills, Abilities, Education, Experience, Certifications, Licensure) A … emergency situations. Understanding that events of an emergency or planned nature may interfere with daily duties. Knowledge of Massachusetts Law Enforcement specific systems such as CJIS/CORI, record management and public safety communications systems, body-worn camera and vehicle cameras. Experience with Microsoft Active Directory Group Policies and scripting languages. Physical Demands/Working Conditions Typical office environment. More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Security Operations Analyst

London, United Kingdom
dunnhumby
Hunting and Threat Intelligence (MITRE ATT&CK) Penetration Testing Security Automation (SOAR) It would help if you had experience with the following: SIEM tools (Microsoft Sentinel, Splunk, ELK, Siemplify) Vulnerability Management (Qualys, Nessus, Nexpose) Anti-Malware/EDR Software (Carbon Black, Microsoft Defender ATP, FireEye, CrowdStrike) Programming (Python, or other languages) What you can expect from us We More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Security Engineer, Detection and Response

London, United Kingdom
Archa
detections, SIEM rules, or EDR Significant experience with standard incident response processes Expertise in a broad range of information technologies, such as public cloud infrastructure (AWS,GCP), authentication systems, vulnerability management solutions, network infrastructure, etc. Someone that has contributed to the development of detection and alerting pipelines Experience in dissecting attacker methodologies and techniques Comprehensive understanding of product More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Site Reliability Engineer (SRE) with Security Clearance

Reston, Virginia, United States
Hybrid / WFH Options
CGI
Node.js, Bash, or PowerShell are all great. Familiar with monitoring and observability tools like CloudWatch, Splunk, Dynatrace, or OpenTelemetry. Understands and applies security best practices, including IAM, RBAC, and vulnerability management. Experience designing and supporting microservices and APIs, with a focus on resilience and fault tolerance. Experience with chaos engineering and tools like AWS FIS or Chaos Toolkit Comfortable More ❯
Employment Type: Permanent
Salary: USD 137,100 Annual
Posted:

STIG Compliance/Vulnerability Management SME with Security Clearance

Boulder, Colorado, United States
Prism, Inc
STIG Compliance/Vulnerability Management SME Boulder, CO or Fairmont, WV 5 days a week in Office with the possibility of 2 days remote Top Secret As the STIG Compliance/Vulnerability Management SME, you will work either independently or as part of a team to achieve critical mission objectives, ensuring smooth operations for the customer. … What Will You Do: • Evaluate security risks on systems • Evaluate STIG compliance • Execute and manage the NCSC Vulnerability Management Plan • Create and maintain compliance scan policies • Maintain a master asset list • Troubleshoot scan issues and coordinate with appropriate team members. • Continuously research emerging threats to the environment in order to disseminate the information to all stakeholders, immediately assess … the known environment for presence of the vulnerability, and work with the SOC and SE&O to protect the environment. • Ensure system compliance against federal and DOC policies • Identify & document all non-compliant areas • Support Assessment and Authorization activities • Conduct, operate, and maintain vulnerability/compliance assessments and the resulting data and reports • Author and maintain SOPs and More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

SOC and Vulnerability Analyst

Greater Bristol Area, United Kingdom
Logiq
SOC and Vulnerability Analyst Logiq Consulting is a fantastic place to work. Our ethos is based on our core values of innovation, collaboration, and quality delivery which has created a genuine "Yes" culture. Being a fast growing SME working alongside some of most prestigious clients in the UK we can offer not only a varied and interesting workload, but … and The Role: An increase in clients across our Managed Services, along with the maturing of our service offering as driven the requirement for this new role, SOC and Vulnerability Analyst. The role will be reporting to our Information Security Lead and sit within our Information Security Team. The ideal candidate will have current or recent experience working in … a SOC environment and/or have a strong focus on vulnerability management. Key Responsibilities: As SOC and Vulnerability Analyst you be responsible for: Monitoring the clients IT infrastructure. Monitoring Logiq IT security systems, applications and networks for irregularities and alerts which may indicate incidents, breaches and events. Investigation of alerts and incidents to ascertain the criticality and More ❯
Posted:

Senior Enterprise Management (EM) System Administrator, Tier-3 with Security Clearance

San Antonio, Texas, United States
ASRC Federal
for our shareholders. Join our team and discover why we are a top veteran employer and Certified Great Place to Work ASRC Federal is currently seeking a Senior Enterprise Management Systems Administrator - Tier-3 Level to support upcoming work located in San Antonio, TX. Summary: This contract will provide 24/7/365 operations support to the customer. … but are not limited to, on-boarding & exiting assistance, timecard accounting, mentoring, and reporting. Expert-level knowledge or significant hands-on experience in: Manage IT Infrastructures utilizing approved Enterprise Management (EM) tools (currently Microsoft Endpoint Configuration Manger (MECM). Install, configure, and maintain the EM infrastructure at the proper approved release levels. Assist End Users in the deployment of … the EM client management tool. Perform ongoing maintenance to ensure server health, including database and server maintenance. Install, maintain, and administer the EM instance, to include granting access, managing permissions, setting up workflows and the proper 2-person integrity for actions and other required administrative actions. Modify the EM configuration and Server Management System (SMS_DEF.MOF) to collect More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Cyber Security Analyst - AWS - Manchester

Manchester, North West, United Kingdom
Circle Group
PCI DSS & AWS cloud background is required to join our global client's new UK cybersecurity team. This role is predominantly end-client facing, advising on security best practices, vulnerability management and security standard compliance (e.g. NIST, ISO, PCI DSS etc), and leading audits and examinations. You will be reporting to the UK Head of Security and consulting … Skills & Experience Required: 4+ years of experience working in Cyber Security within an AWS cloud environment Any experience with CrowdStrike would be a bonus Good experience with PCI DSS Vulnerability management & Compliance Lead on Audits Strong Security standard knowledge and experience, consulting on a range of security policies and standards such as GDPR, ISO, PCI, NIST Confidence when … headquarters. You will be working in a vibrant office with some of most forward-thinking technical people Key Responsibilities: Analysing and developing security requirements, as well as carrying out vulnerability management & compliance work in PCI DSS type projects Ensure consistency across IT Security risk management activities. Advise Engineers on information related to new vulnerabilities and threats and More ❯
Employment Type: Permanent
Salary: £65,000
Posted:

Senior Cyber Security Analyst - AWS - Manchester

Manchester, Lancashire, England, United Kingdom
Circle Recruitment
PCI DSS & AWS cloud background is required to join our global client's new UK cybersecurity team. This role is predominantly end-client facing, advising on security best practices, vulnerability management and security standard compliance (e.g. NIST, ISO, PCI DSS etc), and leading audits and examinations. You will be reporting to the UK Head of Security and consulting … Skills & Experience Required: 4+ years of experience working in Cyber Security within an AWS cloud environment Any experience with CrowdStrike would be a bonus Good experience with PCI DSS Vulnerability management & Compliance Lead on Audits Strong Security standard knowledge and experience, consulting on a range of security policies and standards such as GDPR, ISO, PCI, NIST Confidence when … headquarters. You will be working in a vibrant office with some of most forward-thinking technical people Key Responsibilities: Analysing and developing security requirements, as well as carrying out vulnerability management & compliance work in PCI DSS type projects Ensure consistency across IT Security risk management activities. Advise Engineers on information related to new vulnerabilities and threats and More ❯
Employment Type: Full-Time
Salary: £50,000 - £65,000 per annum
Posted:

Cyber Security Programme Manager

Cambridge, Cambridgeshire, East Anglia, United Kingdom
The Bridge (IT Recruitment) Limited
teaming, and security assessments. Driving the integration of secure development practices and automation within CI/CD workflows. Supporting compliance and audit activities through structured documentation and reporting. Coordinating vulnerability management and helping teams meet security SLAs. Collaborating with cross-functional stakeholders to embed security into engineering culture and processes. Owning and improving security tooling roadmaps and BAU … delivery capacity. What we're looking for: Demonstrable experience of effective and efficient cyber security delivery, project management or security engineering. Strong understanding of vulnerability management, secure software development, and compliance frameworks (NIST CSF 2.0, GDPR, ISO 27001). Strong examples of cross-functional stakeholder management, being a knowledgeable bridge between technical cyber security teams and … red teaming and security tool implementations. Strong knowledge and experience of integrating security into agile development environments and workflows. Experience with tools like Jira, Confluence, SharePoint or similar project management tools. Preferred certifications: CISA, CISM, Security+, PMP, Prince 2. More ❯
Employment Type: Permanent
Posted:

Cyber Systems Engineer (VMD) with Security Clearance

Chantilly, Virginia, United States
RDR, Inc
Position Description: The Cyber Systems Engineer - Vulnerability Management provides support to the customer in the area of Cyber Security. Daily tasks include, but are not limited to: Support the IT vulnerability management lifecycle. Support government activities and reporting to appropriate IC and DoD authorities (i.e., USCYBERCOM, IC-SCC). Assesses and manages the implementation of identified … with technical vulnerabilities. Update and manage metrics reporting for several database sources. Collect the necessary data, develops, and delivers a periodic Cyber Vulnerabilities Metrics Reports. Develop and delivers asset vulnerability views for categories such as mission, cross domain, and location, as required by the customer. Develop cyber threat analysis for known threats. Document and deliver reporting activities related to … prepare Inspector General (IG) FISMA closure requests from field reps and program Information System Security Engineers (ISSEs) Coordinate with RMF stakeholders on closure Body of Evidence (BoE) for Enterprise Vulnerability and Remediation (EVAR) tracked findings Prepare and update slides for weekly and monthly meetings Research trending vulnerabilities being reported through enterprise security tools Support automation activities with system engineers More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Defense Incident Responder - SME (EVAP Team Lead) with Security Clearance

Washington, Washington DC, United States
TekSynap
Responsibilities & Qualifications This role requires a blend of strategic thinking, technical expertise, and effective team management to ensure the organization maintains a robust and proactive approach to vulnerability management in the government customer's dynamic and fast-paced cybersecurity environment. RESPONSIBILITIES Technical Leadership and Expertise Serve as the primary technical expert for enterprise vulnerability assessment tools … and practices, overseeing the architecture, engineering, and operation of the EVAP scanning infrastructure. Support hands-on configuration and optimization of vulnerability scanning solutions to ensure effectiveness and accuracy. Stay current with the latest vulnerability assessment tools, technologies, and threat landscapes to continuously refine scanning methodologies. Operational Oversight Direct day-to-day operations of the EVAP team to ensure … efficient and timely execution of vulnerability assessments. Provide hands-on guidance in conducting complex scans, troubleshooting tool issues, and analyzing results. Ensure scanning activities are aligned with organizational needs for maximum coverage and effectiveness. Team Management and Development Support, mentor, and support the team of Security and Vulnerability Assessment SMEs, fostering a collaborative environment and ensuring high More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Database Administrator with Security Clearance

Longmont, Colorado, United States
Caribou Thunder, LLC
standards. • Collaborate daily with System Administrators, DevSecOps, Cybersecurity, Software Engineers, and Integration Engineers on a highly technical team delivering reliable solutions. • Assist the Information Assurance (IA) Team with system vulnerability management, software patching, account management, and license compliance. Is This You? • 7+ years of database administration or engineering experience in secure environments • Bachelor's degree in STEM … MySQL, Microsoft SQL Server (Advanced experience required) • High-Availability Architecture, Clustering, Automated Failover • Backup Methodologies & Disaster Recovery Planning Systems & Security: • RHEL Linux Administration • Security Technical Implementation Guidelines (STIGs) • System Vulnerability Management & Patch Compliance Virtualization & Platforms: • KVM, VMware, RedHat OpenShift • Satellite Ground Systems & OPIR Program Exposure (Highly Preferred) DevOps & Automation: • Automated Scripting (Python or similar languages) • Infrastructure as Code … IaC) • Agile, Lean, and Continuous Process Improvement Frameworks • Configuration & Change Management Processes Collaboration & Communication: • Strong team player with excellent verbal and written communication • Ability to develop CONOPS, procedural documentation, and operational support materials If this sounds like you, we'd love to talk. Apply today and help us build mission-critical solutions that safeguard national security. More ❯
Employment Type: Permanent
Salary: USD 195,000 Annual
Posted:

Head of Security Operations

London, United Kingdom
CFC
You will ensure robust, efficient and globally coordinated security operations that protect the organisation's people, systems, and data. This includes direct ownership of security controls, security testing, vendor management, vulnerability and threat management, and incident response. You will work daily with the Group CISO to support consistent, high-assurance security practices across all regions, in-line … with regional regulation and to support the management of cyber incidents. It is essential the individual who will fill this role has prior management experience, has supported building security teams previously and has knowledge around their responsibility at this level to report incidents and security concerns within regulatory timelines and standards. About the role Within this role, you … will have been supporting the Group CISO by managing the security team and programmes of work in your responsibility area. You will be responsible for the management of any global Cyber Incidents by supporting the CISO team. Additionally, you will be: Working collaboratively with the SOC to ensure 24/7 visibility and threat detection across global environments, driving More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Information Assurance Specialist Devi Technologies

United Kingdom
Devitechs
security frameworks (e.g., ISO 27001, NIST, GDPR) ️ Performing audits and security assessments to identify vulnerabilities and recommending appropriate mitigations ️ Collaborating with other teams to implement and maintain secure information management systems ️ Providing expert guidance on data classification, encryption, and access controls to maintain the integrity and confidentiality of sensitive data What We're Looking For: ️ Proven experience as an … a similar role focused on data protection and compliance ️ Strong understanding of information assurance frameworks (e.g., ISO 27001, NIST SP 800-53, COBIT) ️ Experience with security assessments, audits, and vulnerability management ️ Knowledge of regulatory standards such as GDPR, HIPAA, and PCI-DSS ️ Certifications such as CISSP, CISM, or ISO 27001 Lead Implementer are highly desirable More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Trainer with Security Clearance

Chantilly, Virginia, United States
RDR, Inc
Program Description: The program provides Systems Engineering and Technical Assistance (SETA) core and non-core support in the areas of Cyber Security and Management to improve the Information Assurance (IA) posture of a National customer. The contracts Core Capabilities are: IA Management, Federal Information Security Management Act (FISMA) coordination and reporting, Risk Management Framework (RMF) application … IA compliance measurements and metrics, Assessment and Authorization (A&A), Vulnerability Management, and Cyber Defense support. Position Description The Cyber Trainer provides support to the customer in the area of Cybersecurity policy, process, and tool training. Daily tasks include, but are not limited to: Works with the training team to provide IA training as directed by the Government … delivery, and follow-up Create and update training materials as new Cyber tools and capabilities are fielded or processes are created or modified Provide training related to ServiceNow, Risk Management Framework (RMF), Continuous Monitoring, Privileged Users, Information Assurance, Information System Owner cyber responsibilities, etc. Job Requirements Qualifications Required: Current U.S. Government Top Secret clearance with SCI eligibility Favorably adjudicated More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Teamcenter Systems Administrator with Security Clearance

Hill Afb, Utah, United States
Golden Tech Systems Inc
resolving system and application faults and errors Ensuring operating systems and applications comply with Department of Defense (DoD) guidelines, including DISA Security Technical Implementation Guide (STIG) and Information Assurance Vulnerability Management (IAVM) bulletins What's In It For You Competitive wages Medical and dental benefits 401k plan Paid time off Rewards & recognition US Citizenship Requirement Pursuant to a … experience, or MS degree with 10+ years of related IT experience Desired Skills: Experience with Teamcenter SOA Gateway Experience with Agile Software Development using Jira Knowledge of software configuration management using GitHub Strong communication and presentation skills to articulate solution ideas Experience advising and consulting with management Effective project management and prioritization skills for handling multiple assignments … Collaboration with vendors for server technology implementation Tenacious documentation of activities, status, and issues worked Knowledge of Microsoft Active Directory, GPOs, DHCP, DNS, and PowerShell General understanding of antivirus, vulnerability scanning, and SIEM tools Preferred Education, Experience, & Skills (Not required but will increase consideration for the position): Teamcenter Application and/or Database Administration experience AWS or similar cloud More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSE (Security Engineer) with Security Clearance

Fort Belvoir, Virginia, United States
Alltech International, Inc
understand and be able to implement DoD RMF system accreditation processes. Assess use case and operational risk of integrated open source, and GOTS/COTS software components. Will use vulnerability management systems, automated security scanning tools, and system accreditation record systems. Must be able to grasp new concepts, facilitate information exchanges for data gathering, and collaborate with diverse … audiences. Will follow established processes where applicable, and establish and execute defensible processes where none are prescribed. Provide security planning, assessment, risk analysis, and risk management support. Recommend system-level solutions to resolve security requirements and guide the development team in meeting the security posture requirements. Support the Government in the enforcement of the design and implementation of trusted … inner workings of various software and system level applications. DoD 8570 compliance with IAT Level II (SSCP, Security+, CCNA-Security, or GSEC certification) Experience with DISA STIGs and SRGs, vulnerability management systems, mitigation and compliance processes, and reviewing results from automated security scanning tools. The ability to work independently and as part of a team is needed. Work More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Advanced Software Engineer - Cloud with Security Clearance

Scottsdale, Arizona, United States
Moseley Technical Services, Inc
based applications using AWS, Kubernetes, and DevOps best practices. Design, build, and maintain CI/CD pipelines, infrastructure automation, and containerized environments. Apply security best practices, including encryption, compliance, vulnerability management, and incident response. Develop, test, and optimize API integrations to ensure scalability and reliability. Utilize Python, Java, and scripting languages (YAML, JSON, Linux/UNIX) for cloud … 8+ years of experience, or Master's degree and 6+ years of experience Python/Java programming languages Understanding of DevOps principles, CI/CD pipelines, GitOps, automation, configuration management, and infrastructure as code Familiar with Scaled Agile methodology Familiarity with security best practices, risk, compliance & vulnerability management, encryption & PKI, incident response, auditing and monitoring Proficiency in … JSON. Experience with AWS (AWS Solutions Architect strongly preferred) and its services (including fundamental AWS networking) Containerization using Docker and Kubernetes Strong understanding of API Design, testing, development and management Tools: CI/CD tools: Gitlab, Nexus Managed Artifacts, AWS: AWS EKS, EC2, Lambda, S3, EBS/EFS, VPC, DNS, IAM, KMS, CloudWatch, CloudTrail Configuration management: Ansible, Terragrunt More ❯
Employment Type: Permanent
Salary: USD 89 Hourly
Posted:

Cyber Security Specialist

Havant, Hampshire, South East, United Kingdom
Hybrid / WFH Options
Reed Technology
month FTC (with likely extension to permanent) Salary: 50 - 53K plus benefits We are seeking a Cyber Security Specialist to lead the implementation of a new Information Security Management System (ISMS) and ensure compliance with security standards. This role is crucial in driving security improvements, managing risks, and maintaining regulatory compliance within a dynamic IT environment of circa … IT users. Key Accountabilities: * Lead the implementation of a new ISMS, ensuring alignment with industry security standards. * Develop and maintain cyber security policies, procedures, and risk management frameworks. * Manage compliance with cyber security regulations, standards, and frameworks (ISO27001, CAF/eCAF, Cyber Essentials Plus). * Implement and manage security monitoring tools to detect and respond to security events. * Identify … with hands-on involvement in ensuring compliance to security frameworks (ISO27001, NIST, eCAF). * Proven experience in implementing security systems and/or monitoring tools. * Strong knowledge of SIEM, Vulnerability Management, Threat Intelligence, and IAM systems. * Experience contributing to enterprise-level security initiatives and aligning with industry standards. * Strong collaboration skills, including experience working with IT Operations teams More ❯
Employment Type: Permanent, Work From Home
Salary: £50,000
Posted:

Senior Cyber Engineer

Sussex, United Kingdom
Hybrid / WFH Options
Data Careers Ltd
Brighton 2 days per week + WFH) Salary: 60K - 62.5K + exceptional Employee Benefits including 28% Employer Pension, (+ on-call payment), great work/life balance Key Skills: Vulnerability Management tools, Azure Security Centre, Defender, Sentinel and a broad Infrastructure Engineer background Summary: This role joins a high performing, dedicated, hands-on Cyber Security Team responsible for … and Microsoft cloud infrastructure, including: Cisco firewalls and ISE, Forcepoint or similar secure web gateway/CASB solution, Mimecast, IDS/IPS solutions, Network Detection and Response (NDR), Qualys vulnerability detection and management platform or similar Highly practical with a can-do attitude, able to demonstrate a proactive approach to identifying and mitigating potential security risks. Strong communications More ❯
Employment Type: Permanent
Salary: GBP 55,000 - 62,000 Annual
Posted:

Data Loss Prevention Engineer with Security Clearance

Fort George G Meade, Maryland, United States
Take2 Consulting
DLP (Data Loss Prevention)/DRM (Digital Rights Management) SME You Have: Daily operation, maintenance, and monitoring of Data Loss Prevention (DLP) systems, preferably with one or more of the following: Varonis, Microsoft Purview, and Forcepoint Familiar with various DLP solutions, comprising Endpoint DLP, Network DLP, Discovery, and Cloud DLP, including responding to the alerts that the tool generates. … Strong understanding of Data Governance and establishing a policy-based Data Lifecycle Management (DLM) process. Ensures data is managed from creation to deletion, accessible to the right people, and supports business objectives. 3+ years of experience with security principles, approaches, and technologies and supporting DoD cybersecurity and information assurance processes Possesses excellent consulting skills to include problem-solving, leadership … time management, creativity, analytical skills, and collaboration Secret clearance Bachelor's degree in a technology field (e.g., Computer Science, Information Technology, Software Engineering) Nice If You Have: Experience providing subject matter expertise in a cyber domain, including vulnerability management and assessment, scanning tools, and assessing system compliance with security controls Experience analyzing network configurations and network architecture More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

TrueSight Automation Developer - Systems Engineer with Security Clearance

Alexandria, Virginia, United States
Hybrid / WFH Options
Peraton
Day Work Responsibilities: TSSA Development & Implementation Architect and develop sophisticated automation work-flows using BMC TrueSight Server Automation (TSSA) platform. Create custom scripts and templates for provisioning, configuration, patch management, and compliance enforcement. Implement automated vulnerability management and remediation processes, tightly integrated with security and change management systems. Deliver end-to-end patching automation solutions with … maintenance window scheduling and compliance tracking. Enterprise Infrastructure Automation Automate server life-cycle management from provisioning and configuration to decommissioning across physical, virtual, and cloud environments. Develop scalable configuration management systems to enforce security and compliance standards (STIG, CIS, DISA, HIPAA, PCI-DSS, SOX). Implement drift detection mechanisms and automated remediation solutions to ensure system integrity. Design … BMC tools such as Remedy and Patrol. Strong background in IT infrastructure management. Ability to obtain BMC TrueSight Server Automation certification. ITIL certification or equivalent understanding of ITIL service management processes.Preferred Qualifications: Security certifications (Security+, CISSP, etc.) Automation script and template development, architecture and configuration. TSSA console administration and deployment scenario design. Hands-on management of large-scale More ❯
Employment Type: Permanent
Salary: USD 138,000 Annual
Posted:

Senior Cyber Engineer

Brighton, East Sussex, Preston Park, United Kingdom
Hybrid / WFH Options
Data Careers Ltd
Brighton 2 days per week + WFH) Salary: £60K - £62.5K + exceptional Employee Benefits including 28% Employer Pension, (+ on-call payment), great work/life balance Key Skills: Vulnerability Management tools, Azure Security Centre, Defender, Sentinel and a broad Infrastructure Engineer background Summary: This role joins a high performing, dedicated, hands-on Cyber Security Team responsible for … and Microsoft cloud infrastructure, including: Cisco firewalls and ISE, Forcepoint or similar secure web gateway/CASB solution, Mimecast, IDS/IPS solutions, Network Detection and Response (NDR), Qualys vulnerability detection and management platform or similar Highly practical with a can-do attitude, able to demonstrate a proactive approach to identifying and mitigating potential security risks. Strong communications More ❯
Employment Type: Permanent
Salary: £55000 - £62000/annum + 28% pension contribution
Posted:

Information Assurance NIST RMF - Active Top Secret with Security Clearance

Washington, Washington DC, United States
General Dynamics Information Technology
or recommendations to local policies. Provides in a timely manner, a Policy Change Summary Report for the development of new or updated policies, procedures, standards, strategies, network architecture, etc. Vulnerability Management Expertise: Utilize ACAS to scan systems, review scan results, prioritize vulnerabilities. Create in a timely manner, customized reports to recommend the best course of action to mitigate … SUCCEED: Educations: Bachelor's Degree Required Experience: 7 years of related experience in Information Assurance with at least 3 years of experience within each expertise area of security policy, vulnerability management, and security assessment and authorization. Required Technical Experience: In depth knowledge and experience implementing NIST guidance relating to SA&A, including System Security Plans, Security Test & Evaluation … Top Secret with SCI eligibility and a T5 or T5R within the last 5 years Required Skills and Abilities Communication skills required in one-on-one, team, and senior management settings. The ability to work and set priorities on multiple projects/tasks at once and operate in a dynamic, fast-paced team-oriented environment. Must have IAM Level More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:
Vulnerability Management
10th Percentile
£37,650
25th Percentile
£48,545
Median
£60,000
75th Percentile
£77,813
90th Percentile
£90,000