King's Lynn, Norfolk, England, United Kingdom Hybrid / WFH Options
Opus People Solutions
Develop and administer a suite of security tools and systems to prevent threats and ensure data integrity including, but not limited to, Antivirus, Web and Email Filtering, Firewalls and Vulnerability Scanning. Monitor and provide timely response to new cybersecurity threats becoming part of an incident response team where necessary. Report to the Technical Services Manager but also work closely More ❯
processes and outcomes to reduce vulnerabilities across the Engineering estate; taking a lead role in detecting and responding to advanced threats across a growing portfolio of clients. Experience & responsibilities VulnerabilityScanning & Reporting - performing regular vulnerability scans and generating reports using SonarQube, Trivvy & Nessus; ensuring tool sets are kept up to date and that scans are performed regularly … regular system compliance audits and updates, ensuring systems are compliant with industry best practices. (CIS, STIG, NIST etc.) Performing regular reviews and updates to security enforcing GPOs, conducting periodic vulnerability assessments to identify and address potential vulnerabilities. About You You will possess hands on experience working in a similar Cyber Engineering role with a working knowledge of SonarQube, Nessus … and Ivanti and a broad experience spanning VulnerabilityScanning & Reporting, Endpoint Security, Incident Management & System Hardening. Security Clearance: Must hold an active SC clearance If you're interested in hearing more about this opportunity, please submit your application. Reasonable Adjustments: Respect and equality are core values to us. We are proud of the diverse and inclusive community we More ❯
Annapolis Junction, Maryland, United States Hybrid / WFH Options
GTSC Talent Solutions
will ensure proper infrastructure functionality with PKI authentication, firewalls, and SSL/TLS, while also contributing to best practices for enterprise data analytics. Additional responsibilities include scripting for automation, vulnerabilityscanning, patch deployment, and documentation development to support security and IT teams. Location: Annapolis Junction, Maryland All work is on-site. This is not a hybrid or remote … of relevant experience. Experience with Splunk Machine Learning Toolkit (MLTK) Proficiency in scripting languages such as CSS, HTML, JavaScript, and Python Knowledge of RMF, Trellix ePO, NESSUS, SCAP, and vulnerabilityscanning tools Experience with ServiceNow Ticketing System Proficiency in shell scripting to automate tasks and manipulate data Ability to ensure Splunk infrastructure functions properly with PKI-based authentication … firewall security logs Experience with Splunk Machine Learning Toolkit (MLTK) Experience with scripting languages such as CSS, HTML, JavaScript, and Python Knowledge of RMF, Trellix ePO, NESSUS, SCAP, and vulnerabilityscanning ServiceNow Ticketing System Shell scripting to automate tasks and manipulate data Education and Required Qualification Bachelor's degree and Twenty (20) years of demonstrated combined experience in More ❯
to identify vulnerabilities in code ️ Collaborating with DevOps and development teams to integrate security into the CI/CD pipeline ️ Conducting regular application security assessments, including penetration testing and vulnerabilityscanning ️ Providing guidance and training to development teams on secure coding practices and security tools What We're Looking For: ️ Proven experience as an Application Security Specialist or More ❯
/SaaS Collaborate with development and operations teams to design, implement, and maintain secure and automated infrastructure Implement security best practices throughout the software development lifecycle (SDLC), including code scanning, vulnerability assessment, and threat modeling Develop and maintain CI/CD pipelines, enabling continuous integration, continuous delivery, and continuous deployment of applications Develop and maintain containerization and micro … services Integrate security controls, such as automated vulnerabilityscanning, static and dynamic analysis, and security testing, into the CI/CD process Collaborate with cross-functional teams to ensure compliance with security standards and regulatory requirements Automate and orchestrate security processes, including incident response and threat detection, using technologies like Splunk, Chef Automate, and others Stay updated with More ❯
firewall security logs Experience with Splunk Machine Learning Toolkit (MLTK) Experience with scripting languages such as CSS, HTML, JavaScript, and Python Knowledge of RMF, Trellix ePO, NESSUS, SCAP, and vulnerabilityscanning ServiceNow Ticketing System Shell scripting to automate tasks and manipulate data More ❯
HTML, JavaScript, and Python Shell scripting to automate tasks and manipulate data Preferred DoD 8570 CE Certification Requirements: CompTIA Security+ CE Knowledge of RMF, Trellix ePO, NESSUS, SCAP, and vulnerabilityscanning and ServiceNow Ticketing System More ❯
Knowledge of Istio, mTLS, secrets management, and configuration management Understanding of security best practices and automated testing within infrastructure Bonus Skills (Nice to Have): Familiarity with Terragrunt, ArgoCD, and vulnerabilityscanning tools Experience supporting Java applications and AWS migration projects Background in regulated environments such as government or finance Existing SC clearance or BPSS is must to start More ❯
implementation (L2/L3), and IP address management. Proficiency in configuring and managing virtualization technologies such as VMware, vCenter, and NSX-T. Experience in network security, firewalls, ACLs, and vulnerabilityscanning tools. Hands-on experience with forensic tools like Cellebrite, XRY, FTK, and Autopsy. Strong troubleshooting skills, with a focus on network systems, server infrastructure, and performance metrics. More ❯
Huntsville, Alabama, United States Hybrid / WFH Options
All Points Logistics LLC
POSITION/DUTIES: The Systems Administrator II will provide core support services for Engineering Labs at Marshall Space Flight Center (MSFC) in Huntsville, Alabama. The support will include performing vulnerabilityscanning, reporting and mitigation of findings on isolated systems at MSFC, and standardizing OS/Backup versions. Duties may include, but are not limited to: Mid-level systems More ❯
ESXi preferred) Experience in large-scale deployments as an administrator Knowledge of cloud migration and AWS Cloud Platform (IaaS preferred) Load balancing/failover technologies General knowledge of antivirus, vulnerabilityscanning software, and Security Information and Event Management (SIEM) User acceptance testing (UAT) and industry certifications An active Top Secret clearance is preferred but not required. More ❯
include creating trust levels of critical resources • system and application security threats and vulnerabilities of network topologies, Wi-Fi Networking, and TCP/IP protocols • Splunk (or other SIEMs) • Vulnerabilityscanning, assessment and monitoring tools such as Security Center, Nessus, and Endgame • MITRE Adversary Tactics, Techniques and Common Knowledge (ATT&CK) • Must be able to work collaboratively across More ❯
Gloucester, Gloucestershire, United Kingdom Hybrid / WFH Options
Eplass
locations). You proactively ensure the highest availability of systems and infrastructures. You will perform routine maintenance on the infrastructure of our SaaS solutions, including software releases, patching, and vulnerabilityscanning processes. Implementation of automatizations to enhance efficiency and reduce manual intervention. Support the company in integration of new technologies. Work with our IT security and compliance team More ❯
London, England, United Kingdom Hybrid / WFH Options
BBC
practices (IAM, encryption, VPC configuration, audit logging) using AWS native services and third-party tools. Embed security throughout the software development lifecycle by integrating static and dynamic code analysis, vulnerabilityscanning, and policy-as-code tools into CI/CD pipelines-ensuring DevSecOps principles are applied from design to deployment. Promote a culture of continuous learning and knowledge More ❯
practices (IAM, encryption, VPC configuration, audit logging) using AWS native services and third-party tools. Embed security throughout the software development lifecycle by integrating static and dynamic code analysis, vulnerabilityscanning, and policy-as-code tools into CI/CD pipelines-ensuring DevSecOps principles are applied from design to deployment. Promote a culture of continuous learning and knowledge More ❯
practices (IAM, encryption, VPC configuration, audit logging) using AWS native services and third-party tools. Embed security throughout the software development lifecycle by integrating static and dynamic code analysis, vulnerabilityscanning, and policy-as-code tools into CI/CD pipelines-ensuring DevSecOps principles are applied from design to deployment. Promote a culture of continuous learning and knowledge More ❯
Barrow-In-Furness, Cumbria, Barrow in Furness, United Kingdom Hybrid / WFH Options
Adecco
Job Title: Vulnerability Manager Location: Barrow-in-Furness (Hybrid - 3 days onsite per week) Type: Full-time | Permanent Overview I'm recruiting on behalf of a leading organisation in the technology and cybersecurity space, looking to bring on an experienced and proactive Vulnerability Manager . This is a great opportunity for someone with a strong background in cybersecurity … vulnerability management, and governance. You'll be working closely with internal teams, clients, and third-party stakeholders to manage and improve security posture across complex environments. Key Responsibilities Manage and execute the end-to-end vulnerability management process Conduct vulnerability analysis , risk assessments, and impact reporting Identify current and emerging threats and communicate these effectively to stakeholders … support remediation activities through to closure Deliver security awareness sessions and support a culture of cybersecurity best practices across the team Ideal Candidate Will Have: Hands-on experience with vulnerabilityscanning tools and related frameworks Strong understanding of risk assessment methodologies and security governance Ability to present complex technical findings clearly to both technical and non-technical audiences More ❯
years of experience in Android development, including proficiency in Java, Kotlin, and Android SDK. Solid understanding of mobile security concepts, including secure coding practices, encryption algorithms, authentication protocols, and vulnerability assessment. Familiarity with Android security frameworks, libraries, and APIs. Experience with threat modeling, risk assessment, and security architecture design. Knowledge of secure coding practices and common vulnerabilities such as … OWASP Top 10. Proficiency in using security tools for vulnerabilityscanning and code analysis. Excellent problem-solving skills and attention to detail. Strong communication and collaboration abilities, with a passion for teamwork. Ability to adapt quickly to changing priorities and work effectively in a fast-paced environment. TS/SCI security clearance required. Join our team and contribute More ❯
into the CI/CD process: Implement security checks and controls at every stage of the pipeline to ensure secure software delivery. Use tools to perform static code analysis, vulnerabilityscanning, and compliance checks. Agile Development: Participate in agile ceremonies: Engage in sprint planning, daily stand- ups, and retrospectives to ensure effective and efficient development cycles. Collaborate with More ❯
Splunk, New Relic) that provide operational insight into the health of live applications and systems. Experience in applying a range of cloud security tools and techniques (e.g. threat modelling, vulnerabilityscanning, dependency checking, reducing attack surface area), ideally incorporating these tools and techniques into automated pipelines. The desire to upskill and enable product engineering squads to operate and More ❯
brand/reputation of working with large police forces across the UK and assisting with Technical Cyber Security consulting side and offering services such as outsourced SOC, penetration testing, vulnerabilityscanning to name a few. This role is to join the commercial team to leverage current client base and offer technical Cyber Security solutions but mainly to create More ❯
This is a dynamic and varied role, which includes things like: Build, deployment and maintenance of new and existing environments Designing and maintaining highly available architectures Security (patch management, vulnerabilityscanning & monitoring) Uptime ?" design and maintain the systems and networking for uptime, resilience, architecting for failure. Evaluation of new, cutting-edge technologies to help improve business processes and More ❯
This is a dynamic and varied role, which includes things like: • Build, deployment and maintenance of new and existing environments • Designing and maintaining highly available architectures • Security (patch management, vulnerabilityscanning & monitoring) • Uptime - design and maintain the systems and networking for uptime, resilience, architecting for failure. • Evaluation of new, cutting-edge technologies to help improve business processes and More ❯
Maidstone, Kent, United Kingdom Hybrid / WFH Options
Rocketsourcers B.V
Software Practices : Git workflows, Object-Oriented Programming (OOP), SOLID principles, use of design patterns DevOps & Infrastructure : Infrastructure as Code (IaC) Configuration management tools Containerisation (e.g., Docker) Security : Secure coding, vulnerabilityscanning, penetration testing, and general software security principles Debugging : Working with logs, databases, and root cause analysis Soft skills that make a difference: Strong communication skills (written and More ❯
We are currently seeking an experienced Qualys Subject Matter Expert (SME) to lead the ongoing customisation, optimisation, and management of our client's Qualys vulnerability management platform. This is a critical role focused on improving the organisation's security posture across on-premise, cloud, and hybrid environments. Key Responsibilities: Customise Qualys for reporting and real-time data capture across … organisational assets and infrastructure. Utilise and optimise Qualys Cloud Connectors for effective cloud vulnerability management. Mature the Qualys platform into a centralised view of vulnerability management across environments. Troubleshoot and resolve issues including agent communication, inventory scanning, data purging, and user access. Design and implement tagging strategies, including dynamic tagging, to meet customer requirements. Customise dashboards and … line with TruRisk scoring and stakeholder needs. Engage with internal customers to gather requirements, provide recommendations, and drive continuous improvements. Configure and maintain the Qualys platform to support ongoing vulnerability scans, compliance checks, and security assessments. Collaborate with IT and infrastructure teams to ensure seamless integration of Qualys into the broader security ecosystem. Deploy and manage Qualys Cloud Agents More ❯