Permanent Vulnerability Scanning Job Vacancies

126 to 150 of 194 Permanent Vulnerability Scanning Jobs

Application Security Engineer

Bristol, Avon, South West, United Kingdom
Hybrid / WFH Options
Hargreaves Lansdown
how HL builds secure products at pace, while supporting a culture of 'Secure by Design'. What you'll be doing Design and implement automated security testing solutions and vulnerability scanning within the SDLC. Support the Application Security Lead in defining the strategy, tools and technologies. Running proof of concepts for new tools to support automated security assurance … program at HL through developer enablement and training. About you Experience of SAST/SCA/DAST toolsets (e.g. Snyk, Gitlab Ultimate Application Security, Rapid7). Experience of API scanning tools (e.g. Salt, 42Crunch). Strong understanding of vulnerability scoring frameworks such as CVSS and EPSS. Ability to code in at least one programming or scripting language (e.g. More ❯
Employment Type: Permanent, Part Time, Work From Home
Posted:

Application Security Engineer

Bradley Stoke, Gloucestershire, United Kingdom
Hybrid / WFH Options
Hargreaves Lansdown
how HL builds secure products at pace, while supporting a culture of 'Secure by Design'. What you'll be doing Design and implement automated security testing solutions and vulnerability scanning within the SDLC. Support the Application Security Lead in defining the strategy, tools and technologies. Running proof of concepts for new tools to support automated security assurance … program at HL through developer enablement and training. About you Experience of SAST/SCA/DAST toolsets (e.g. Snyk, Gitlab Ultimate Application Security, Rapid7). Experience of API scanning tools (e.g. Salt, 42Crunch). Strong understanding of vulnerability scoring frameworks such as CVSS and EPSS. Ability to code in at least one programming or scripting language (e.g. More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Application Security Engineer

newport, wales, united kingdom
Hybrid / WFH Options
Hargreaves Lansdown
how HL builds secure products at pace, while supporting a culture of 'Secure by Design'. What you'll be doing Design and implement automated security testing solutions and vulnerability scanning within the SDLC. Support the Application Security Lead in defining the strategy, tools and technologies. Running proof of concepts for new tools to support automated security assurance … program at HL through developer enablement and training. About you Experience of SAST/SCA/DAST toolsets (e.g. Snyk, Gitlab Ultimate Application Security, Rapid7). Experience of API scanning tools (e.g. Salt, 42Crunch). Strong understanding of vulnerability scoring frameworks such as CVSS and EPSS. Ability to code in at least one programming or scripting language (e.g. More ❯
Posted:

Application Security Engineer

bath, south west england, united kingdom
Hybrid / WFH Options
Hargreaves Lansdown
how HL builds secure products at pace, while supporting a culture of 'Secure by Design'. What you'll be doing Design and implement automated security testing solutions and vulnerability scanning within the SDLC. Support the Application Security Lead in defining the strategy, tools and technologies. Running proof of concepts for new tools to support automated security assurance … program at HL through developer enablement and training. About you Experience of SAST/SCA/DAST toolsets (e.g. Snyk, Gitlab Ultimate Application Security, Rapid7). Experience of API scanning tools (e.g. Salt, 42Crunch). Strong understanding of vulnerability scoring frameworks such as CVSS and EPSS. Ability to code in at least one programming or scripting language (e.g. More ❯
Posted:

Information Systems Security Officer with Security Clearance

Boston, Massachusetts, United States
Digital Prospectors
crucial in maintaining and developing our Information Security (IS) program and ensuring compliance with established security policies and procedures. The ISSO will be responsible for overseeing operational security implementation, vulnerability management, system assessments, and recovery processes. The ideal candidate will play a key role in safeguarding critical information systems and contribute to a comprehensive security posture. Essential Duties and … validate adherence to security standards. • Promote awareness of security issues across the organization. • Provide ongoing training to ensure all staff understand their security responsibilities. • Prepare technical documents, incident reports, vulnerability assessments, and other situational awareness information for key stakeholders. • Assist in ensuring systems and configurations comply with security guidelines and regulatory requirements. • Monitor and validate compliance through continuous security … assessments and audits. • Conduct system vulnerability scanning, configuration assessment, and remediation to maintain system integrity and security. Qualifications: • Bachelor's degree in Computer Science, Information Systems, Cybersecurity, or a related field is required. • Proven experience in cybersecurity, risk management, or information security roles, particularly in relation to system security, vulnerability management, and compliance activities. • Strong knowledge of More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Splunk Engineer with Security Clearance

Charleston, South Carolina, United States
TEKsystems c/o Allegis Group
Boundary Defense (PBD) system • Designing, testing, deploying, hardening, configuring and tuning the SIEM architecture components (Splunk or equivalent) • Creating Engineering Changes to support the lifecycle including engineering documentation • Performing vulnerability scans of the system and review on a weekly basis • Coordinating among stakeholders, including Security Engineers, Network Administrators, System Administrators, Information Assurance Managers (IAMs)/Information Systems Security Managers … an RMF accreditation package, e.g., system architecture and boundaries, hardware and software inventories, risk assessment reports, POA&Ms, data flows, and other necessary system, network, and application documentation • Using vulnerability scanning and assessment tools (e.g., ACAS/HBSS) necessary to identify and document compliance • Designing, implementing and hardening SIEM architectural components • Working full-time onsite in a secured More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security Asset Manager

Newport, Gwent, United Kingdom
Hybrid / WFH Options
Yolk Recruitment Ltd
into asset security while managing a small team of technical analysts and overseeing supplier relationships to drive successful outcomes. What You'll Bring: Proven experience in IT asset and vulnerability management In-depth knowledge of asset discovery tools, vulnerability scanning and remediation techniques Solid understanding of the differences between IT and operational technology environments Awareness of attacker More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Information Systems Security Specialist II Mid and III Senior with Security Clearance

Philadelphia, Pennsylvania, United States
SBG Technology Solutions, Inc
and security requirements, and ensuring those requirements are properly addressed through purposeful architecting, design, development, and configuration; and implementing security controls, configuration changes, software/hardware updates/patches, vulnerability scanning, and securing configurations. Demonstrated working knowledge of the Risk Management Framework (RMF) process. Hands-on experience with Information Assurance tools such as: DISA Enterprise Mission Assurance Support … of the following within DoD or Federal environments: Network and system security Cybersecurity Service Providers (CSSP) Cyber Red Teams With at least 3 of the following 6 focus areas: Vulnerability Analysis Network Security Monitoring Incident Response/Forensics Penetration Testing/Red Teaming CND Infrastructure Support CND Incident Response EDUCATION: Bachelor's degree in computer science, Information Technology, or More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security Engineer, COR7186A

Basingstoke, Hampshire, England, United Kingdom
Hybrid / WFH Options
Corriculo Ltd
joining the internal security team, monitoring and analysing real-time security events using SIEM tools to detect and respond to potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will investigate security incidents and conduct forensic analysis to determine the root cause and recommend remediation …/XDR, mail filtering and other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetration testing/vulnerability scanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don't meet all of the More ❯
Employment Type: Full-Time
Salary: £35,000 - £55,000 per annum
Posted:

Information Systems Security Engineer with Security Clearance

Washington, Washington DC, United States
Hybrid / WFH Options
OMW Consulting
team based in Washington, D.C. You must have an active Secret clearance or higher and a solid background in information security fundamentals and core technologies (e.g., authentication, encryption, firewalls, vulnerability scanning, SIEM/SOAR, audit logs). Your main responsibilities in this position will include: Achieving ATOs for the company's software across multiple government customers with minimal More ❯
Employment Type: Permanent
Salary: USD 185,000 Annual
Posted:

Linux System Administrator with Security Clearance

Winchester, Virginia, United States
Mission Services LLC (MSI)
AWS components such as EC2, ELB, Auto Scaling, and other relevant services. Automate system tasks using Bash, Python, or similar scripting languages Implement security hardening, including system configuration baselines, vulnerability scanning, and mitigation - in compliance with federal mandates (STIGs, NIST) Proactively monitor performance and availability; troubleshoot and resolve system, network, and AWS integration issues Manage user accounts, access More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Network Design Engineer Support with Security Clearance

Scottsdale, Arizona, United States
GeoLogics Corporation
IDM/Windows Servers for DNS and Account Management, Juniper Firewalls, Arista Switches and NAS/SAN storage Familiarity with Multicast, and routing protocols (BGP, OSPF, etc) Experience with vulnerability scanning, hardening and resolution of findings Written skills to include development and maintenance of documentation for network, system, operations, etc. Familiarity with VMware vSphere and virtual machines Familiarity More ❯
Employment Type: Permanent
Salary: USD 80 Hourly
Posted:

Security Engineer, Network Security, Basingstoke, COR7186

Basingstoke, Hampshire, England, United Kingdom
Hybrid / WFH Options
Corriculo Ltd
/XDR, mail filtering and other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetration testing/vulnerability scanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don't meet all of the More ❯
Employment Type: Full-Time
Salary: £35,000 - £55,000 per annum
Posted:

Senior Linux System Administrator with Security Clearance

Utah, United States
Golden Tech Systems Inc
ESXi preferred) Experience in large-scale deployments as an administrator Knowledge of cloud migration and AWS Cloud Platform (IaaS preferred) Load balancing/failover technologies General knowledge of antivirus, vulnerability scanning software, and Security Information and Event Management (SIEM) User acceptance testing (UAT) and industry certifications An active Top Secret clearance is preferred but not required. More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cybersecurity / DevSecOps Engineer with Security Clearance

Huntsville, Alabama, United States
CCS Global Tech
/CD pipelines for embedded systems. Proficiency with Agile methodologies and practices. Strong understanding of security principles and how they apply to embedded software development. Experience with code analysis, vulnerability scanning, and security testing tools. Knowledge of common software vulnerabilities and techniques to mitigate them. Strong problem-solving skills with the ability to work in a high-tempo More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security Engineer

Huddersfield, West Yorkshire, England, United Kingdom
Aindale KTD
customer training through to ongoing support Working on Cyber Essentials & IASME Assured Level 1 assessments Working on Cyber Essentials Plus & IASME Assured Level 2 (Audited) audits Carrying out Internal Vulnerability Scanning (including customising reporting) Carrying out External Penetration Testing (including customising reporting) Using enterprise level tools to analyse and assess vulnerabilities Assist with the evolving product and services More ❯
Employment Type: Full-Time
Salary: £26,400 - £35,000 per annum
Posted:

Cyber Security Specialist 3 - DMV with Security Clearance

Milwaukee, Wisconsin, United States
M.C. Dean
to complete the DoD RMF assessment and authorization process. • Implement Implementation of DoD Security Technical Implementation Guides (STIGs) on traditional Information Technology (IT) and Operational Technology (OT) systems. • Conduct vulnerability scanning and document system vulnerabilities. • Work in a team environment alongside other cybersecurity engineers and Risk Management Framework (RMF) analysts. Required Education & Experience: Active TS/SCI w More ❯
Employment Type: Permanent
Salary: USD 151,080 Annual
Posted:

CYBER SECURITY ENGINEER with Security Clearance

Tampa, Florida, United States
Blue Obsidian Solutions
maintain security controls and monitoring throughout the software development lifecycle (SDLC). Automation: Develop automated security processes and tools to detect and prevent vulnerabilities in CI/CD pipelines. Vulnerability Management: Conduct regular vulnerability assessments, penetration testing, and ensure timely remediation of findings. Protect all company data, especially sensitive information, from internal and external threats by creating comprehensive … for detail and an ability to multitask in a fast-paced environment Strong abilities in critical thinking, problem-solving, logic, and forensics Knowledge of security tools like SAST, DAST, vulnerability scanners, and SIEM solutions. Familiarity with scripting languages (Python, Bash, etc.) and automation frameworks. In depth knowledge of application security principles, OWASP Top 10, and threat modeling. Proficiency in More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

National Security Systems SCA with Security Clearance

Burke, Virginia, United States
Gray Tier LLC
NSS continuous monitoring activities. • Research, develop, and implement policies to improve the effectiveness and efficiency of the security authorization process while minimizing operational impacts on critical NSS systems. • Conduct vulnerability scans, create Body of Evidence (BoE) artifacts, and produce Security Assessment Reports (SARs) to document risk levels and recommended mitigations. • Provide in-depth analysis of cyber threat actor behavior … to apply them to secure National Security Systems. • Strong background in cybersecurity risk analysis and reporting, with experience in creating detailed BoE artifacts. • Proficiency in using cybersecurity tools for vulnerability scanning and continuous monitoring. • Local to D.C. or Virginia with ability to work on-site for classified work. Preferred Qualifications: • Expertise in conducting SCAs and cybersecurity assessments for … environments, such as those encountered in NSS. • Experience developing and maintaining cybersecurity SOPs and CONOPs, with a focus on streamlining the risk assessment and authorization process. • Proficiency in using vulnerability assessment tools such as Nessus, Splunk, and AppDetective, along with MGMT compliance tools like CSAM-S. • Strong analytical skills to assess cyber threats, identify trends, and create actionable risk More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Security Control Assessor Test Engineer with Security Clearance

Chantilly, Virginia, United States
LV8D Solutions
packet capture and analysis tools Experience using computer and network forensics techniques Knowledgeable in hardening techniques Experience in network and web related protocol analysis Experience using industry standard security scanning tools Perform security testing in conjunction with the Security Control Assessment (SCA) team to achieve ATO (Authorization to Operate) Perform application security testing on mission critical IC systems Identify … using metadata Ability to reconstruct a malicious attack or activity based on network traffic Assess network topology and device configurations identifying critical security concerns Perform network monitoring, network mapping, vulnerability scanning, and penetration testing Train and mentor cybersecurity professionals Review test plans/procedures, test results, and test reports for completeness and accuracy, including compliance to approved plans More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

OT Systems Engineer - Senior Level with Security Clearance

Springfield, Virginia, United States
Squires Group, Inc
expert (SME) for OT systems during audits, inspections, and vendor engagements. • Evaluate new technologies and develop risk-based strategies to enhance OT cybersecurity and system reliability. • Support penetration testing, vulnerability assessments, and patch management activities in live and test environments. • Participate in a 24/7 on-call rotation to support critical infrastructure operations. Qualifications: • Bachelor's degree in … on experience deploying and configuring firewalls, switches, and routers. • Experience troubleshooting issues across all OSI model layers. • Familiarity with server virtualization (hypervisors, VMs, bare metal deployments) preferred. • Experience with vulnerability scanning and cyber tools in an OT environment is a plus. • Familiarity with the Purdue Model for ICS networks is strongly preferred. • Strong technical documentation and communication skills More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cybersecurity Engineer 6 with Security Clearance

Chantilly, Virginia, United States
M.C. Dean
systems Assisting in the development and verification of documentation necessary to complete the DoD RMF assessment and authorization process Conducting ICS/SCADA system inventories following DoD guidance Conducting vulnerability scanning and document system vulnerabilities Supporting ISO standardization and Quality inspections Participating in continuous improvement of organizational cybersecurity posture Provide system security engineering services and/or products … procedures to ensure information systems reliability and accessibility and to prevent and defend against unauthorized access to systems, networks, and data Assessment, mitigation, and closure of network vulnerabilities and vulnerability management eMASS Establishing, managing, and tracking of Plan of Action & Milestones (POA&M) Applying STIGs to servers, databases, applications, and other hardware Security Readiness Review (SRR) Tools (scripts and More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Splunk Engineer with Security Clearance

Annapolis Junction, Maryland, United States
Tech USA
firewall security logs Experience with Splunk Machine Learning Toolkit (MLTK) Experience with scripting languages such as CSS, HTML, JavaScript, and Python Knowledge of RMF, Trellix ePO, NESSUS, SCAP, and vulnerability scanning ServiceNow Ticketing System Shell scripting to automate tasks and manipulate data More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSE with Security Clearance

Washington, Washington DC, United States
Hybrid / WFH Options
OMW Consulting
team based in Washington, D.C. You must have an active Secret clearance or higher and a solid background in information security fundamentals and core technologies (e.g., authentication, encryption, firewalls, vulnerability scanning, SIEM/SOAR, audit logs). Your main responsibilities in this position will include: Achieving ATOs for the company's software across multiple government customers with minimal More ❯
Employment Type: Permanent
Salary: USD 185,000 Annual
Posted:

SYSTEMS ENGINEER 3 (319) - MARYLAND - URGENT with Security Clearance

Annapolis, Maryland, United States
Cyberstrike Group
HTML, JavaScript, and Python Shell scripting to automate tasks and manipulate data Preferred DoD 8570 CE Certification Requirements: CompTIA Security+ CE Knowledge of RMF, Trellix ePO, NESSUS, SCAP, and vulnerability scanning and ServiceNow Ticketing System More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:
Vulnerability Scanning
10th Percentile
£45,800
25th Percentile
£53,750
Median
£62,500
75th Percentile
£90,000
90th Percentile
£90,375