experience in cloud security, particularly with AWS, and at least 2+ years in software development. Strong understanding of cloud and application security concepts, including secure coding practices, threat modeling, vulnerabilitymanagement, and access control mechanisms. Experience with AWS, Kubernetes, Service Mesh, API gateways, and API Security (authentication and authorization). Proficiency in programming languages such as Python, JavaScript … GoLang, Terraform, CloudFormation (AWS), and AWS CDK. Familiarity with Agile methodologies like SCRUM, along with proven project management skills to manage multiple security projects effectively. Desired: Ability to work independently, take initiative, and maintain a keen attention to detail, ensuring high security standards. Strong communication and interpersonal skills, facilitating effective collaboration with both technical and non-technical teams. Why More ❯
for malicious cyber activity. MicroSys is supporting a customer by delivering intelligence support to customer through proactively identifying, analyzing, and responding to cyber threats to inform the customer's vulnerabilitymanagement (VM) efforts. In support of the customer's strategic direction, MicroSys is looking for motivated individuals who can support the development of new and innovative Cyber Threat … and physical locations • Must have experience using multiple Intelligence Community database search tools and familiarity with intelligence monitoring, collection, targeting and reporting • Must have working familiarity with Intelligence Community management of information, classification, dissemination and information and records system • Must have working familiarity with Open-Source Intelligence sources including the use of scraping tools and darkweb browsers • Must have More ❯
in analyzing security events, logs, and alerts from various security tools (e.g., SIEM, firewalls, IDS/IPS). Familiarity with CVEs, threat intelligence frameworks (e.g., MITRE ATT&CK), and vulnerabilitymanagement practices. Knowledge of NETCOM policies, Cyber Tasking Orders (CTOs), and cybersecurity compliance requirements. A high-level performer with the ability to be proactive and respond rapidly to More ❯
Computer Science , Information Technology, Cybersecurity, or a related field. Experience with DoD and Army cybersecurity standards and practices. Strong knowledge of cybersecurity frameworks and tools. Proficiency in risk assessment, vulnerabilitymanagement, and incident response. Excellent communication and collaboration skills. Must meet certification requirements for the role. Relevant certifications may include CISSP, CISM, CEH, Security+, or equivalent. Must possess More ❯
employees. Install, relocate, configure, troubleshoot, scan media, and repair desktop computers, laptops, and printers. Load, configure, and troubleshoot software applications. Load proper patches to computers identified during information Assurance VulnerabilityManagement (IAVM) scanning. Support Client Service Liaison (CSL) in maintaining physical media control processes. Prepare equipment for DRMO disposal, prepare DRMO paperwork as required, validate equipment to ensure More ❯
Responsibilities: • Conduct analysis and research on emerging threats and intelligence by collecting and analyzing commercial and government cyber intelligence reports to provide actionable cyber intelligence to support incident response, vulnerabilitymanagement, and other cybersecurity initiatives. • Monitor and assess the global threat landscape, including threat actors, malware, hacking techniques that may impact NGA systems and networks • Collaborate with internal More ❯
Milton Keynes, Buckinghamshire, England, United Kingdom
Sonepar
WHAT DO YOU NEED TO BRING TO SONEPAR UK? • Technical Cybersecurity Expertise: Demonstrated experience in implementing and managing security controls across hybrid environments, including endpoint protection, threat detection, and vulnerabilitymanagement tools.• Incident Response & Problem Solving: Ability to respond swiftly and effectively to security incidents, minimizing impact and ensuring rapid recovery through structured analysis and remediation.• Threat Awareness More ❯
Arlington, Virginia, United States Hybrid / WFH Options
ANALYGENCE, Inc
have extensive experience working with various security methodologies and processes, compliance controls related to cloud security, performing assessments in cloud computing environment, extensive experience providing analysis and trending of vulnerability data form a large number of heterogeneous devices, and must possess expert knowledge in risk and vulnerability management. Must possess excellent verbal and written communication skills. Summary Our More ❯
VulnerabilityManagement Architect 5 Month Contract Hybrid - travel to Bracknell and London, Pimlico as and when required Our Retail client is seeking a VulnerabilityManagement Architect to join their team on a 5-month contract basis. As a VulnerabilityManagement Architect, you will play a crucial role in modernising the company's vulnerabilitymanagement capabilities, ensuring they can support a fast-moving business and stand as a strong pillar within their zero-trust framework. Accountabilities: Explore and document our baseline vulnerabilitymanagement architecture Capture our vulnerabilitymanagement requirements and usage scenarios, captured as a set of patterns that a future solution will need to support Build out … evaluate the drivers and benefits for change Provide market assessment as appropriate, partnering with our procurement teams as needed Provide a validated and recommended strategy solution architecture for our vulnerabilitymanagement services (i.e. this is all about explaining how the elements of the solution will work together, vendor agnostic) Compile vendor solution options to address the above (with More ❯
VulnerabilityManagement Architect 5 Month Contract Hybrid - travel to Bracknell and London, Pimlico as and when required Our Retail client is seeking a VulnerabilityManagement Architect to join their team on a 5-month contract basis. As a VulnerabilityManagement Architect, you will play a crucial role in modernising the company's vulnerabilitymanagement capabilities, ensuring they can support a fast-moving business and stand as a strong pillar within their zero-trust framework. Accountabilities: Explore and document our baseline vulnerabilitymanagement architecture Capture our vulnerabilitymanagement requirements and usage scenarios, captured as a set of patterns that a future solution will need to support Build out … evaluate the drivers and benefits for change Provide market assessment as appropriate, partnering with our procurement teams as needed Provide a validated and recommended strategy solution architecture for our vulnerabilitymanagement services (i.e. this is all about explaining how the elements of the solution will work together, vendor agnostic) Compile vendor solution options to address the above (with More ❯
person. In Technology, we're asking that you attend the office a minimum of 1 day per week. About the Role We are seeking a highly motivated and experienced VulnerabilityManagement Engineer to join our Cyber Security team. As a VulnerabilityManagement Engineer, your primary responsibility will be to manage existing vulnerabilitymanagement-specific … tooling, and have an active role in improving existing processes. You will achieve this by creating automated solutions through collaboration with various technical teams. Responsibilities Develop and maintain vulnerabilitymanagement tooling and solutions Implement automation to remove manual processes and increase efficiency Work with internal remediators to prioritise vulnerabilitymanagement activities Process vulnerability data to … provide reports, insights and metrics, that aid in the risk-based approach to vulnerability management. Develop integrations for internal and external tools to capture data relevant to the vulnerability remediation process (e.g. by interacting with APIs) Ensure compliance with relevant security standards, frameworks, and regulations Stay up to date with the latest trends and developments in vulnerabilityMore ❯
Red Snapper Recruitment are seeking a detail-oriented and experienced Cyber Incident Management (CIM) and Threat and VulnerabilityManagement (TVM) Governance Analyst to support a robust cybersecurity governance program. This role plays a key part in enhancing and maintaining the integrity of cybersecurity operations through effective data analysis, reporting, and cross-functional collaboration. The successful candidate will … teams and external partners to support governance-related functions. Assist with distributing governance reports across organizational leadership and forums. What You Bring: Deep understanding of cyber incident response, patch management, and vulnerability assessment in large-scale environments. Strong problem-solving, analytical, and organizational skills. Ability to build strong working relationships in a global, distributed team environment. Experience using More ❯
Red Snapper Recruitment are seeking a detail-oriented and experienced Cyber Incident Management (CIM) and Threat and VulnerabilityManagement (TVM) Governance Analyst to support a robust cybersecurity governance program. This role plays a key part in enhancing and maintaining the integrity of cybersecurity operations through effective data analysis, reporting, and cross-functional collaboration. The successful candidate will … teams and external partners to support governance-related functions. Assist with distributing governance reports across organizational leadership and forums. What You Bring: Deep understanding of cyber incident response, patch management, and vulnerability assessment in large-scale environments. Strong problem-solving, analytical, and organizational skills. Ability to build strong working relationships in a global, distributed team environment. Experience using More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Capgemini
including: identity, nationality (single or dual) or immigration status, employment history going back 3 continuous years, and unspent criminal record check (known as Disclosure and Barring Service) Your role VulnerabilityManagement Understand the VulnerabilityManagement end to end process and reporting and Have working experience of VulnerabilityManagement tools Conduct vulnerability analysis and … create impact assessments including risk assessment of vulnerability reports and impact risks to service Collate conclusions and recommendations and Identify and communicate current and emerging information security threats Assess current technology architecture for vulnerabilities, weaknesses and for possible upgrades or improvement and notify requirements to address security deficiencies Report audit findings, including corrective action suggestions, Conducts follow up remediation … part of everyday life, and will be part of your working reality. We have built an inclusive and welcoming environment, for everyone. Your skills and experience Strong understanding of vulnerabilitymanagement frameworks and tools. Experience in conducting risk assessments and interpreting vulnerability reports. Familiarity with audit processes, compliance standards, and security governance. Skilled in delivering security training More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Computershare
Cyber Vulnerability Analyst - Bristol/Edinburgh (Hybrid) In this position, you'll be based in either the Bristol or Edinburgh office for a minimum of three days a week with the flexibility to work from home for some of your working week. Find out more about our flexible work culture at We give you a world of potential Computershare … are currently recruiting for a talented individual to join our Cyber Assurance team as a Cyber Vulnerability Analyst. Our Cyber Assurance team are a small but growing team based across our UK sites and sit within the wider InfoSec department. The team are responsible for assessing our global systems for vulnerabilities, determining our priorities, and working closely with our … wider technical teams to remediate issues. A role you will love Along with your teammates, you will be responsible for conducting and co-ordinating technical vulnerability assessments across our IT infrastructure, applications, and services. You will provide recommendations towards the development of appropriate remediation plans and deliver clear reports detailing the organisation's level of security assurance against internal More ❯
PCI DSS & AWS cloud background is required to join our global client's new UK cybersecurity team. This role is predominantly end-client facing, advising on security best practices, vulnerabilitymanagement and security standard compliance (e.g. NIST, ISO, PCI DSS etc), and leading audits and examinations. Skills & Experience Required: 3+ years of experience working in Cyber Security within … an AWS cloud environment Any experience with CrowdStrike would be a bonus Good experience with PCI DSS Vulnerabilitymanagement & Compliance Lead on Audits Strong Security standard knowledge and experience, consulting on a range of security policies and standards such as GDPR, ISO, PCI, NIST Confidence when speaking with stakeholders and clients, as well as the ability to provide … headquarters. You will be working in a vibrant office with some of most forward-thinking technical people Key Responsibilities: Analysing and developing security requirements, as well as carrying out vulnerabilitymanagement & compliance work in PCI DSS type projects Ensure consistency across IT Security risk management activities. Advise Engineers on information related to new vulnerabilities and threats and More ❯
PCI DSS & AWS cloud background is required to join our global client's new UK cybersecurity team. This role is predominantly end-client facing, advising on security best practices, vulnerabilitymanagement and security standard compliance (e.g. NIST, ISO, PCI DSS etc), and leading audits and examinations. Skills & Experience Required: 3+ years of experience working in Cyber Security within … an AWS cloud environment Any experience with CrowdStrike would be a bonus Good experience with PCI DSS Vulnerabilitymanagement & Compliance Lead on Audits Strong Security standard knowledge and experience, consulting on a range of security policies and standards such as GDPR, ISO, PCI, NIST Confidence when speaking with stakeholders and clients, as well as the ability to provide … headquarters. You will be working in a vibrant office with some of most forward-thinking technical people Key Responsibilities: Analysing and developing security requirements, as well as carrying out vulnerabilitymanagement & compliance work in PCI DSS type projects Ensure consistency across IT Security risk management activities. Advise Engineers on information related to new vulnerabilities and threats and More ❯
a skilled Industrial Control Systems (ICS) Infrastructure Engineer to join our team. This position offers the unique opportunity to design, develop, and maintain cutting-edge infrastructure for naval platform management systems, including both surface ships and submarines. You will play a critical role in both the development of the product and the provision and maintenance of the development environment … itself, supporting mission-critical naval programmes. In addition to integrating IT/OT systems, you will be responsible for the management of IT assets within the development environment, ensuring compliance with company and regulatory standards such as ISO27001 and IEC62443. This role is ideal for engineers familiar with Windows Server domains, Red Hat Linux, virtualisation, industrial networking, and working … Security: Design and manage robust industrial networking architectures (e.g., Profinet, Ethernet/IP, fibre optics, wireless) for mission-critical applications, while ensuring compliance with defence-level security standards. Platform Management Systems: Work closely with multidisciplinary teams to design and integrate ICS solutions into PMS, ensuring they meet rigorous naval requirements for performance, reliability, and security. Development Environment Provision & Maintenance More ❯
West London, London, England, United Kingdom Hybrid / WFH Options
Ashdown Group
Duties will include: - Working with the wider business on ISO27001 and Cyber Essentials - Network and data security monitoring - Responding to tickets and working with teams on access, malware and vulnerability - Deploy SIEM - Support ongoing improvements to internal defence - Oversee policies and procedures - Support data protection initiatives - Security projects - Develop disaster recovery plans - Establish and improve vulnerabilitymanagementMore ❯
control traffic flow. - Collaborate with other teams to define and enforce network access policies, ensuring that only authorized personnel and devices have appropriate access rights. Proactive Security Testing and VulnerabilityManagement: - Conduct and organise regular security assessments, including vulnerability scanning and testing, to identify weaknesses in the network infrastructure. - Collaborate with system administrators and application owners to … address identified vulnerabilities and implement necessary patches or configuration changes. - Develop and maintain a comprehensive vulnerabilitymanagement program, including vulnerability tracking, risk assessment, and remediation planning. Stakeholder Collaboration: - Act as a stakeholder for the response team, providing expert guidance on security-related alerts, incidents, and potential improvements. - Collaborate with cross-functional teams, including network engineers, system administrators More ❯
Solutions Through Innovative Technologies, Inc. (STI-TEC) specializes in the delivery of professional business and information management services. STI-TEC offers government and commercial clients a comprehensive portfolio of services that identify, manage, distribute and improve business processes related to entities' most valued resource, information. As a fast-growing solutions provider, established in 2000, total customer satisfaction has remained … a collaborative user community across the military, government, industry, academia, and international partners. To enhance AFSIM's growth, the Department of the Air Force (DAF) is establishing a Model Management Office (MMO). In this cutting-edge new MMO the Cybersecurity Engineer willenhance and maintain the cybersecurity posture of MMO products and services, to include AFSIM. The contractor shall … libraries for emerging vulnerabilities and weaknesses, particularly those vulnerabilities as identified in the public Common Vulnerabilities and Exposures (CVE) list Participate in critical design or code reviews and inspections. Vulnerability or Weakness Remediation Advise or assist in the tracking and remediation of potential vulnerabilities and weaknesses associated with MMO products or services Perform security impact assessments and communicate risk More ❯
West London, London, United Kingdom Hybrid / WFH Options
Ashdown Group
Duties will include: - Working with the wider business on ISO27001 and Cyber Essentials - Network and data security monitoring - Responding to tickets and working with teams on access, malware and vulnerability - Deploy SIEM - Support ongoing improvements to internal defence - Oversee policies and procedures - Support data protection initiatives - Security projects - Develop disaster recovery plans - Establish and improve vulnerabilitymanagementMore ❯
DoE Q or DoD OR Top-Secret clearance Job Type: Contract - Long Term Key Responsibilities • Administer and optimize RedHat Linux systems, OpenShift, VMWare, and Cloudera platforms including authentication, cluster management, user management, monitoring, performance and data management. • Implement and enforce security measures to meet NIST 800-53 standards. • Monitor system performance, troubleshoot issues, and perform regular maintenance. • Manage … system updates, patches, and upgrades to ensure system integrity. • Develop and enforce backup and disaster recovery plans. • Provide support for system configurations, user management, and access control. • Document system configurations, procedures and updates. • Collaborate with IT teams to integrate and manage applications and services Required Experience • Bachelor's degree in computer science, Information Technology, or related field, or equivalent … least five years' experience with RedHat Linux, VMware, and OpenShift cumulative, • At least two years of experience supporting development of information system security authorization packages in accordance with Risk Management Framework (NIST 800-37, 800-53, 800-53a) • Strong understanding of system security principles and experience with NIST 800-53 compliance. Proficient in system performance tuning, troubleshooting and More ❯
Responsibilities & Qualifications This role requires a blend of strategic thinking and technical expertise to support the robust and proactive approach to vulnerabilitymanagement in the government customer's dynamic and fast-paced cybersecurity environment. RESPONSIBILITIES Operational Duties Use enterprise vulnerability assessment tools and practices and operation of the EVAP scanning infrastructure. Support hands-on configuration and optimization … of vulnerability scanning solutions to ensure effectiveness and accuracy. Stay current with the latest vulnerability assessment tools, technologies, and threat landscapes to continuously refine scanning methodologies. Conduct complex scans, troubleshooting tool issues, and analyzing results. Participate in a collaborative environment and ensuring high performance. Meet project deadlines. Use enterprise vulnerability scanning tools. Conduct Comprehensive Vulnerability Assessments … Complete efficient and timely execution of vulnerability assessments. Support technical execution of enterprise-wide vulnerability assessments, focusing on identifying and mitigating security risks across the government customer networks, systems, and infrastructure. Conduct in-depth analysis of vulnerabilities to determine potential impacts and recommend remediation steps. Ensure that assessments cover a variety of technologies, including network devices, databases, operating More ❯