VULNERABILITY MANAGEMENT ANALYST Up to £70,000/Bonus + Excellent Staff Benefits Strong Career Growth Opportunities 2 Days Onsite/3 Days Remote No Shift Work (Normal 09:00-17:30pm) Working Hours An interesting opportunity has presented itself within one of the UKs largest Independent Software Based Organisations who are one of a major driving forces behind … Innovative Development of Enterprise-Led Internet Technology. Role Overview: As a Vulnerability Management Analyst you will focus on Technical Information Security within the Security Function , within a major part of the Organisation's Vulnerability Management Team . You will work closely within the Security Department covering Two Key Areas including Owning Processes & Schedules related to VulnerabilityScanning of All Endpoints of the business. As a Vulnerability Management Analyst you will use Leading, Enterprise-Led Tools & take Responsibility for Reviewing the Results of Risk & Impact Assessment, Scheduling & Planning for Specialist Third-Party Vulnerability & Penetration Testing, along with Reporting. Key Responsibilities of Vulnerability Management Analyst role would include: Conducting VulnerabilityScanning with leading More ❯
Annapolis Junction, Maryland, United States Hybrid / WFH Options
GTSC Talent Solutions
will ensure proper infrastructure functionality with PKI authentication, firewalls, and SSL/TLS, while also contributing to best practices for enterprise data analytics. Additional responsibilities include scripting for automation, vulnerabilityscanning, patch deployment, and documentation development to support security and IT teams. Location: Annapolis Junction, Maryland All work is on-site. This is not a hybrid or remote … of relevant experience. Experience with Splunk Machine Learning Toolkit (MLTK) Proficiency in scripting languages such as CSS, HTML, JavaScript, and Python Knowledge of RMF, Trellix ePO, NESSUS, SCAP, and vulnerabilityscanning tools Experience with ServiceNow Ticketing System Proficiency in shell scripting to automate tasks and manipulate data Ability to ensure Splunk infrastructure functions properly with PKI-based authentication … firewall security logs Experience with Splunk Machine Learning Toolkit (MLTK) Experience with scripting languages such as CSS, HTML, JavaScript, and Python Knowledge of RMF, Trellix ePO, NESSUS, SCAP, and vulnerabilityscanning ServiceNow Ticketing System Shell scripting to automate tasks and manipulate data Education and Required Qualification Bachelor's degree and Twenty (20) years of demonstrated combined experience in More ❯
Manassas, Virginia, United States Hybrid / WFH Options
Innova
A client of Innova Solutions is immediately hiring for a Vulnerability Management Position type: Contract Duration: 12 months Location: Manassas, VA Hybrid As Vulnerability Management you will be Defining and implementing vulnerability management and patching policies for on-premises infrastructure utilizing ServiceNow Vulnerability Response Module. Job description Vulnerability identification, analysis, and impact assessment considering base … and environmental factors. Perform severity assessments of software vulnerabilities for vulnerability prioritization and remediation. Engage and work directly with partner teams for onboarding to ServiceNow, provide support, and troubleshoot issues. Analyze existing architecture and recommend policies and procedures for improvement. Identify solutions to improve security automation and integration and coordinate the effort to implement those solutions. Query, analyze, and … report on large datasets for potential risks. Ideal Candidate will have: Enterprise Vulnerability Management, ServiceNow CMDB, ServiceNow Vulnerability Response, GRC, Vulnerability Analysis, VulnerabilityScanning Data Analysis, Exception Handling, Impact Assessment, Remediation Prioritization and Tracking and Threat Management Qualified candidates should APPLY NOW for immediate consideration! Please hit APPLY to provide the required information, and we More ❯
cybersecurity directives. Author detailed security assessment reports, System Security Plans (SSPs), and Risk Assessment Reports (RARs) for multiple Authority to Operate (ATO) packages. Conduct comprehensive security control testing and vulnerability assessments. Serve as the primary technical expert for government customer interactions, delivering security posture briefings and technical demonstrations of cybersecurity capabilities. Administer critical cybersecurity platforms including Varonis data security … and ACAS vulnerabilityscanning tools. Provide technical mentorship and guidance to junior cybersecurity personnel while conducting security assessments. Lead training initiatives on RMF processes, security tool administration, and incident response protocols for team development. Execute immediate response actions for Information Assurance Vulnerability Assessments (IAVAs), IAV Bulletins, and Marine Corps Directives. Apply security patches, update system configurations, and … efforts across the enterprise infrastructure. Implement Security Technical Implementation Guides (STIGs) through direct system configuration and automated compliance scripting. Monitor network security posture through daily analysis of security logs, vulnerability scan results, and threat intelligence feeds. Investigate security incidents, configure monitoring tools, and establish alert thresholds to maintain situational awareness across all MCU systems. Lead comprehensive cybersecurity incident response More ❯
Coedkernew, Newport, Gwent, Wales, United Kingdom Hybrid / WFH Options
Sopra Steria
Are you passionate about protecting critical infrastructure and driving proactive security? We’re looking for an individual who’s ready to take ownership of our vulnerability management ecosystem and lead the charge in deploying and optimizing Tenable Nessus and Tenable SC platforms. This is more than a technical role, it’s a mission-critical opportunity to shape how we … be at the forefront of enterprise security. What you will be doing: Lead deployment, configuration, and lifecycle management of Tenable Nessus and Tenable.SC across varied environments. Design and execute vulnerabilityscanning strategies aligned with business priorities and risk appetite. Validate results, investigate anomalies, and coordinate remediation with infra, network, hosting, and app teams. Maintain gold-standard documentation (guides … SOPs, user manuals). Build tailored dashboards and reports to drive visibility and informed decision-making. Embed vulnerability management into IT, security, and compliance workflows and planning. Provide training and mentorship to foster security awareness and technical excellence. Ensure practices meet Cyber Essentials Plus and ISO 27001 requirements, supporting audits and certification. Identify gaps, implement enhancements, and drive automation More ❯
Security Analyst provides expert-level cybersecurity oversight and technical support to protect AF TENCAP's multi-domain information systems and networks. This role develops and maintains accreditation packages, conducts vulnerability assessments, and coordinates with internal teams, leadership, and external agencies to ensure full compliance with DoD and Air Force cybersecurity directives. Operating with a high degree of autonomy, the … intelligence community cybersecurity requirements, including RMF, NIST SP 800-53, ICD 503, and DoDI 8510.01. Analyze system vulnerabilities, interpret risk assessment results, and recommend remediation strategies to leadership. Oversee vulnerabilityscanning, patch management compliance, and configuration control processes across all AF TENCAP systems. Lead incident response efforts, coordinate investigations, document findings, and ensure timely resolution of security events. … compliant certification (Sec+). EXPERIENCE 5+ years of Information Security experience (May be substituted for bachelor's degree in relevant field and 1 year of relevant experience) Experience performing vulnerabilityscanning and incident response. Experience supporting COMSEC equipment and keying procedures. Experience with SCAP and ACAS tools. SKILLS/ABILITIES Strong communication and problem-solving skills. Familiarity with More ❯
/SaaS Collaborate with development and operations teams to design, implement, and maintain secure and automated infrastructure Implement security best practices throughout the software development lifecycle (SDLC), including code scanning, vulnerability assessment, and threat modeling Develop and maintain CI/CD pipelines, enabling continuous integration, continuous delivery, and continuous deployment of applications Develop and maintain containerization and micro … services Integrate security controls, such as automated vulnerabilityscanning, static and dynamic analysis, and security testing, into the CI/CD process Collaborate with cross-functional teams to ensure compliance with security standards and regulatory requirements Automate and orchestrate security processes, including incident response and threat detection, using technologies like Splunk, Chef Automate, and others Stay updated with More ❯
/SaaS - Collaborate with development and operations teams to design, implement, and maintain secure and automated infrastructure. - Implement security best practices throughout the software development lifecycle (SDLC), including code scanning, vulnerability assessment, and threat modeling. - Develop and maintain CI/CD pipelines, enabling continuous integration, continuous delivery, and continuous deployment of applications. - Develop and maintain containerization and micro … services. - Integrate security controls, such as automated vulnerabilityscanning, static and dynamic analysis, and security testing, into the CI/CD process. - Collaborate with cross-functional teams to ensure compliance with security standards and regulatory requirements. - Automate and orchestrate security processes, including incident response and threat detection, using technologies like Splunk, Chef Automate, and others. - Stay updated with More ❯
/SaaS - Collaborate with development and operations teams to design, implement, and maintain secure and automated infrastructure. - Implement security best practices throughout the software development lifecycle (SDLC), including code scanning, vulnerability assessment, and threat modeling. - Develop and maintain CI/CD pipelines, enabling continuous integration, continuous delivery, and continuous deployment of applications. - Develop and maintain containerization and micro … services. - Integrate security controls, such as automated vulnerabilityscanning, static and dynamic analysis, and security testing, into the CI/CD process. - Collaborate with cross-functional teams to ensure compliance with security standards and regulatory requirements. - Automate and orchestrate security processes, including incident response and threat detection, using technologies like Splunk, Chef Automate, and others. - Stay updated with More ❯
/SaaS - Collaborate with development and operations teams to design, implement, and maintain secure and automated infrastructure. - Implement security best practices throughout the software development lifecycle (SDLC), including code scanning, vulnerability assessment, and threat modeling. - Develop and maintain CI/CD pipelines, enabling continuous integration, continuous delivery, and continuous deployment of applications. - Develop and maintain containerization and micro … services. - Integrate security controls, such as automated vulnerabilityscanning, static and dynamic analysis, and security testing, into the CI/CD process. - Collaborate with cross-functional teams to ensure compliance with security standards and regulatory requirements. - Automate and orchestrate security processes, including incident response and threat detection, using technologies like Splunk, Chef Automate, and others. - Stay updated with More ❯
and logistics. Our people bring unparalleled expertise and dedication and we are always looking to expand our team. Consulting Services Group (CSG) is seeking a cybersecurity analyst to execute vulnerabilityscanning and remediation operations within a geographically dispersed enterprise environment. This role encompasses network planning, assessments, and documentation support for compliance and accreditation purposes. Duties/Tasks and … Responsibilities: Assist in installation, configuration, and execution of vulnerability and compliance assessment tools including Tenable products like Security Center, Nessus, Nessus Agents, and other application assessment tools. Assists in execution of vulnerability and compliance scans. Perform assessments autonomously with minimal supervision. Ensure scan results are accurate and coordinate authentication and scan failure issues with internal stakeholders. Track software … updates and upgrades of all vulnerability assessment and compliance tools to ensure all systems managed by the team are secure. Assist, review, and maintain documentation including methods and procedures for each of the security boundaries and the scan infrastructure Build and maintain dashboards that present actionable data to leadership and stakeholders in an intuitive manner to include security and More ❯
Vulnerability Engineer/Manager to join a highly professional established security ops SOC team. You will lead Vulnerability ensuring identification, assessment and remediation of security vulnerabilities across infrastructure, applications and systems. Working with SOC analysts leading the end to end vulnerability management lifecycle, manage and optimise vulnerabilityscanning tools such as Tenable and Nessus. Regularly … scan networks, systems and applications for security vulnerabilities. Must have 3+ years cyber security experience and at least 2 yrs focusing on vulnerability management. Familiar with threat and standards such as CVSS, NIST, MITRE ATT&CK. This is an excellent opportunity working for an award winning MSP working on exciting projects. You will develop and maintain vulnerability policies More ❯
achieve the proper levels of confidentiality, integrity, availability, and privacy protection throughout the system life cycle. The ISSO also assists with the execution, analysis, and remediation activities for the vulnerability management program (scanning, assessment, reporting, and mitigation verification) that spans different accreditation entities, three distinct classification domain enclaves (U), (S) and (TS), using the Nessus and Tenable-ACAS … vulnerabilityscanning tools. RESPONSIBILITIES: • Develops risk mitigation strategies that contribute to the effectiveness, efficiencies, and performance outcomes for strategic projects, program goals, and business processes. • Must be able to quickly respond to the needs for updates and maintenance of security documentation, especially System Security Plans, Plans of Actions and Milestones (POA&Ms); Security Impact Assessment for proposed system … activities working with the NGA Designated Authorization Officials (DAO or DAOR). • Address any Information Assurance or Cybersecurity notices, orders, tasking, or directives as required following the NGA operations vulnerability and patch management processes. • Measure effectiveness of defense-in-depth architecture and Zero Trust policy implementations against known vulnerabilities. • Perform security audits and assessments, including creating, tracking, and assisting More ❯
allow for effective and efficient execution of business functions. Provide effective leadership to identify, assess, and mitigate cybersecurity risks; exercise direct ownership of system monitoring and auditing, threat intelligence, vulnerability management, incident response, cybersecurity awareness, and other critical continuous monitoring processes. Lead investigations of computer security violations and incidents, reporting as necessary to both the Facility Security and Senior … Technical Implementation Guide (STIGs) Working knowledge of information key security concepts, such as encryption, Public Key Infrastructure (PKI), and related Working knowledge of and hands-on experience with compliance scanning tools (e.g. SCAP), vulnerabilityscanning tools (e.g. ACAS), eMASS Excellent written and verbal communication and presentation skills. Ability to work in a cross-functional team environment and More ❯
Endpoints • Provides Tier-III assistance to maintain, analyze, troubleshoot, repair, and optimize services to include hardware, software, and network components necessary to deliver the latest secured desktop environment • Conducts vulnerabilityscanning and vulnerability assessment reporting in accordance with Government policy • Implements and maintains security measures to protect the VDI environment from threats and vulnerabilities • Continuous monitoring of More ❯
automation, CLI tools, role based and attribute-based access controls, cryptographic protocols and secure key lifecycle management, advanced threat modelling, SOC operations, securing microservices and APIs, DevSecOps best practices, vulnerabilityscanning, tools, approaches, vulnerability patching and vendor management for security Strong experience in penetration testing and hands-on coding in at least one of the following: JavaScript More ❯
automation, CLI tools, role based and attribute-based access controls, cryptographic protocols and secure key lifecycle management, advanced threat modelling, SOC operations, securing microservices and APIs, DevSecOps best practices, vulnerabilityscanning, tools, approaches, vulnerability patching and vendor management for security Strong experience in penetration testing and hands-on coding in at least one of the following: JavaScript More ❯
automation, CLI tools, role based and attribute-based access controls, cryptographic protocols and secure key lifecycle management, advanced threat modelling, SOC operations, securing microservices and APIs, DevSecOps best practices, vulnerabilityscanning, tools, approaches, vulnerability patching and vendor management for security Strong experience in penetration testing and hands-on coding in at least one of the following: JavaScript More ❯
The Senior Cyber Operations Engineer provides expert-level support to enterprise vulnerability management programs across cloud-based infrastructures. This role is critical in executing and maturing continuous monitoring capabilities through the use of industry-standard tools such as ACAS (Tenable.sc), AWS Inspector, and DISA STIG frameworks. The engineer is responsible for identifying, analyzing, and driving remediation of security vulnerabilities … in alignment with DoD cybersecurity standards and Risk Management Framework (RMF) requirements. Core Responsibilities: Lead enterprise-wide vulnerabilityscanning, analysis, and reporting using ACAS for traditional infrastructure and AWS Inspector for cloud-hosted assets Interpret and apply DISA STIGs to support secure configuration baselines, remediation plans, and POA&M lifecycle management Coordinates with system owners, application teams, and … ISSOs to drive resolution of findings Automates scanning and reporting pipelines to enhance operational efficiency Creates and maintains vulnerability dashboards, compliance reports, and audit-ready documentation Supports continuous monitoring tasks under RMF and ensures timely ingestion of findings into eMASS Provides mentorship to junior analysts and contributes to standard operating procedures and policy refinement Minimum Qualifications: 10+ years More ❯
and protect our customers from increasing threats and vulnerabilities in this digital age. We are looking for a Senior Cyber Operations Engineer to provide expert-level support to enterprise vulnerability management programs across cloud-based infrastructures. This role is critical in executing and maturing continuous monitoring capabilities through the use of industry-standard tools such as ACAS (Tenable.sc), AWS … The engineer is responsible for identifying, analyzing, and driving remediation of security vulnerabilities in alignment with DoD cybersecurity standards and Risk Management Framework (RMF) requirements. RESPONSIBILITIES: Lead enterprise-wide vulnerabilityscanning, analysis, and reporting using ACAS for traditional infrastructure and AWS Inspector for cloud-hosted assets Interpret and apply DISA STIGs to support secure configuration baselines, remediation plans … and POA&M lifecycle management Coordinates with system owners, application teams, and ISSOs to drive resolution of findings Automates scanning and reporting pipelines to enhance operational efficiency Creates and maintains vulnerability dashboards, compliance reports, and audit-ready documentation Supports continuous monitoring tasks under RMF and ensures timely ingestion of findings into eMASS Provides mentorship to junior analysts and More ❯
VA Full benefits package Must have strong hands-on AWS security cloud automaton and security ISEE background. Overview: The Senior Cyber Operations Engineer provides expert-level support to enterprise vulnerability management programs across cloud-based infrastructures. This role is critical in executing and maturing continuous monitoring capabilities through the use of industry-standard tools such as ACAS (Tenable.sc), AWS … engineer is responsible for identifying, analyzing, and driving remediation of security vulnerabilities in alignment with DoD cybersecurity standards and Risk Management Framework (RMF) requirements. Core Responsibilities: Lead enterprise-wide vulnerabilityscanning, analysis, and reporting using ACAS for traditional infrastructure and AWS Inspector for cloud-hosted assets Interpret and apply DISA STIGs to support secure configuration baselines, remediation plans … and POA&M lifecycle management Coordinates with system owners, application teams, and ISSOs to drive resolution of findings Automates scanning and reporting pipelines to enhance operational efficiency Creates and maintains vulnerability dashboards, compliance reports, and audit-ready documentation Supports continuous monitoring tasks under RMF and ensures timely ingestion of findings into eMASS Provides mentorship to junior analysts and More ❯
Senior Cyber Operations Engineer TS/SCI CI Poly Hybrid- Alexandria, VA Direct Hire Overview: The Senior Cyber Operations Engineer provides expert-level support to enterprise vulnerability management programs across cloud-based infrastructures. This role is critical in executing and maturing continuous monitoring capabilities through the use of industry-standard tools such as ACAS (Tenable.sc), AWS Inspector, and DISA … engineer is responsible for identifying, analyzing, and driving remediation of security vulnerabilities in alignment with DoD cybersecurity standards and Risk Management Framework (RMF) requirements. Core Responsibilities: Lead enterprise-wide vulnerabilityscanning, analysis, and reporting using ACAS for traditional infrastructure and AWS Inspector for cloud-hosted assets Interpret and apply DISA STIGs to support secure configuration baselines, remediation plans … and POA&M lifecycle management Coordinates with system owners, application teams, and ISSOs to drive resolution of findings Automates scanning and reporting pipelines to enhance operational efficiency Creates and maintains vulnerability dashboards, compliance reports, and audit-ready documentation Supports continuous monitoring tasks under RMF and ensures timely ingestion of findings into eMASS Provides mentorship to junior analysts and More ❯
Deep knowledge of Windows, Linux, and macOS patching. Experience with Windows Server Update Services (WSUS), SCCM, or Linux patching tools like YUM and APT. Network & Security Testing: Understanding of vulnerabilityscanning tools (Nessus, Qualys) and security compliance frameworks (DISA STIGs, NIST, CIS benchmarks). Database & Log Analysis: Ability to query logs and databases (SQL, Splunk, ELK Stack) for More ❯
and maintains AWS RDS (SQL Server) with a focus on performance, backups, and high availability. Develops and maintains CI/CD pipelines in GitLab, integrating SAST (SonarQube), DAST (Qualys), vulnerabilityscanning (Nessus), and Terraform automation. Translates FedRAMP/NIST 800-53 Rev 5 security controls into technical safeguards; remediates findings and supports continuous ATO (Authority to Operate). … translate regulatory requirements into technical safeguards. Proficiency in GitLab CI/CD, including runners, pipelines, and GitOps workflows. Experience building security gates into CI/CD processes (SAST, DAST, vulnerability scans, Terraform automation). Automation-first mindset with fluency in at least one backend language (Python, Go, or Java) and scripting (Bash or PowerShell). Experience integrating and managing More ❯
real-world adversary tactics and techniques. In particular, the role will also apply expertise to application security testing, working closely with development teams to ensure secure coding practices and vulnerability remediation are integrated into the development lifecycle. In addition to conducting hands-on offensive security testing, this role requires expertise in mapping attack scenarios to frameworks such as the … the development of effective defenses. Maps offensive security test results to the MITRE ATT&CK framework to ensure comprehensive understanding of adversary tactics, techniques, and procedures (TTPs). Executes vulnerability assessments and perform threat simulations to evaluate the effectiveness of security controls in place. Conducts vulnerability validation, including verifying the exploitability of identified vulnerabilities and conducting follow-up … ensure vulnerabilities are prioritized and remediated effectively. Documents and communicates findings, providing clear, actionable recommendations to improve security across technology platforms. Stays up to date with emerging threats and vulnerability trends, continuously improving security testing practices and capabilities. Candidate Profile Successful candidates should possess knowledge, experience, and demonstrate leadership skills as follows: Generally, a professional position with specific knowledge More ❯