Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Hargreaves Lansdown
how HL builds secure products at pace, while supporting a culture of 'Secure by Design'. What you'll be doing Design and implement automated security testing solutions and vulnerabilityscanning within the SDLC. Support the Application Security Lead in defining the strategy, tools and technologies. Running proof of concepts for new tools to support automated security assurance … program at HL through developer enablement and training. About you Experience of SAST/SCA/DAST toolsets (e.g. Snyk, Gitlab Ultimate Application Security, Rapid7). Experience of API scanning tools (e.g. Salt, 42Crunch). Strong understanding of vulnerability scoring frameworks such as CVSS and EPSS. Ability to code in at least one programming or scripting language (e.g. More ❯
Employment Type: Permanent, Part Time, Work From Home
Bradley Stoke, Gloucestershire, United Kingdom Hybrid / WFH Options
Hargreaves Lansdown
how HL builds secure products at pace, while supporting a culture of 'Secure by Design'. What you'll be doing Design and implement automated security testing solutions and vulnerabilityscanning within the SDLC. Support the Application Security Lead in defining the strategy, tools and technologies. Running proof of concepts for new tools to support automated security assurance … program at HL through developer enablement and training. About you Experience of SAST/SCA/DAST toolsets (e.g. Snyk, Gitlab Ultimate Application Security, Rapid7). Experience of API scanning tools (e.g. Salt, 42Crunch). Strong understanding of vulnerability scoring frameworks such as CVSS and EPSS. Ability to code in at least one programming or scripting language (e.g. More ❯
newport, wales, united kingdom Hybrid / WFH Options
Hargreaves Lansdown
how HL builds secure products at pace, while supporting a culture of 'Secure by Design'. What you'll be doing Design and implement automated security testing solutions and vulnerabilityscanning within the SDLC. Support the Application Security Lead in defining the strategy, tools and technologies. Running proof of concepts for new tools to support automated security assurance … program at HL through developer enablement and training. About you Experience of SAST/SCA/DAST toolsets (e.g. Snyk, Gitlab Ultimate Application Security, Rapid7). Experience of API scanning tools (e.g. Salt, 42Crunch). Strong understanding of vulnerability scoring frameworks such as CVSS and EPSS. Ability to code in at least one programming or scripting language (e.g. More ❯
bath, south west england, united kingdom Hybrid / WFH Options
Hargreaves Lansdown
how HL builds secure products at pace, while supporting a culture of 'Secure by Design'. What you'll be doing Design and implement automated security testing solutions and vulnerabilityscanning within the SDLC. Support the Application Security Lead in defining the strategy, tools and technologies. Running proof of concepts for new tools to support automated security assurance … program at HL through developer enablement and training. About you Experience of SAST/SCA/DAST toolsets (e.g. Snyk, Gitlab Ultimate Application Security, Rapid7). Experience of API scanning tools (e.g. Salt, 42Crunch). Strong understanding of vulnerability scoring frameworks such as CVSS and EPSS. Ability to code in at least one programming or scripting language (e.g. More ❯
crucial in maintaining and developing our Information Security (IS) program and ensuring compliance with established security policies and procedures. The ISSO will be responsible for overseeing operational security implementation, vulnerability management, system assessments, and recovery processes. The ideal candidate will play a key role in safeguarding critical information systems and contribute to a comprehensive security posture. Essential Duties and … validate adherence to security standards. • Promote awareness of security issues across the organization. • Provide ongoing training to ensure all staff understand their security responsibilities. • Prepare technical documents, incident reports, vulnerability assessments, and other situational awareness information for key stakeholders. • Assist in ensuring systems and configurations comply with security guidelines and regulatory requirements. • Monitor and validate compliance through continuous security … assessments and audits. • Conduct system vulnerabilityscanning, configuration assessment, and remediation to maintain system integrity and security. Qualifications: • Bachelor's degree in Computer Science, Information Systems, Cybersecurity, or a related field is required. • Proven experience in cybersecurity, risk management, or information security roles, particularly in relation to system security, vulnerability management, and compliance activities. • Strong knowledge of More ❯
Boundary Defense (PBD) system • Designing, testing, deploying, hardening, configuring and tuning the SIEM architecture components (Splunk or equivalent) • Creating Engineering Changes to support the lifecycle including engineering documentation • Performing vulnerability scans of the system and review on a weekly basis • Coordinating among stakeholders, including Security Engineers, Network Administrators, System Administrators, Information Assurance Managers (IAMs)/Information Systems Security Managers … an RMF accreditation package, e.g., system architecture and boundaries, hardware and software inventories, risk assessment reports, POA&Ms, data flows, and other necessary system, network, and application documentation • Using vulnerabilityscanning and assessment tools (e.g., ACAS/HBSS) necessary to identify and document compliance • Designing, implementing and hardening SIEM architectural components • Working full-time onsite in a secured More ❯
Newport, Gwent, United Kingdom Hybrid / WFH Options
Yolk Recruitment Ltd
into asset security while managing a small team of technical analysts and overseeing supplier relationships to drive successful outcomes. What You'll Bring: Proven experience in IT asset and vulnerability management In-depth knowledge of asset discovery tools, vulnerabilityscanning and remediation techniques Solid understanding of the differences between IT and operational technology environments Awareness of attacker More ❯
and security requirements, and ensuring those requirements are properly addressed through purposeful architecting, design, development, and configuration; and implementing security controls, configuration changes, software/hardware updates/patches, vulnerabilityscanning, and securing configurations. Demonstrated working knowledge of the Risk Management Framework (RMF) process. Hands-on experience with Information Assurance tools such as: DISA Enterprise Mission Assurance Support … of the following within DoD or Federal environments: Network and system security Cybersecurity Service Providers (CSSP) Cyber Red Teams With at least 3 of the following 6 focus areas: Vulnerability Analysis Network Security Monitoring Incident Response/Forensics Penetration Testing/Red Teaming CND Infrastructure Support CND Incident Response EDUCATION: Bachelor's degree in computer science, Information Technology, or More ❯
Basingstoke, Hampshire, England, United Kingdom Hybrid / WFH Options
Corriculo Ltd
joining the internal security team, monitoring and analysing real-time security events using SIEM tools to detect and respond to potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will investigate security incidents and conduct forensic analysis to determine the root cause and recommend remediation …/XDR, mail filtering and other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetration testing/vulnerabilityscanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don't meet all of the More ❯
Washington, Washington DC, United States Hybrid / WFH Options
OMW Consulting
team based in Washington, D.C. You must have an active Secret clearance or higher and a solid background in information security fundamentals and core technologies (e.g., authentication, encryption, firewalls, vulnerabilityscanning, SIEM/SOAR, audit logs). Your main responsibilities in this position will include: Achieving ATOs for the company's software across multiple government customers with minimal More ❯
AWS components such as EC2, ELB, Auto Scaling, and other relevant services. Automate system tasks using Bash, Python, or similar scripting languages Implement security hardening, including system configuration baselines, vulnerabilityscanning, and mitigation - in compliance with federal mandates (STIGs, NIST) Proactively monitor performance and availability; troubleshoot and resolve system, network, and AWS integration issues Manage user accounts, access More ❯
IDM/Windows Servers for DNS and Account Management, Juniper Firewalls, Arista Switches and NAS/SAN storage Familiarity with Multicast, and routing protocols (BGP, OSPF, etc) Experience with vulnerabilityscanning, hardening and resolution of findings Written skills to include development and maintenance of documentation for network, system, operations, etc. Familiarity with VMware vSphere and virtual machines Familiarity More ❯
Basingstoke, Hampshire, England, United Kingdom Hybrid / WFH Options
Corriculo Ltd
/XDR, mail filtering and other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetration testing/vulnerabilityscanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don't meet all of the More ❯
ESXi preferred) Experience in large-scale deployments as an administrator Knowledge of cloud migration and AWS Cloud Platform (IaaS preferred) Load balancing/failover technologies General knowledge of antivirus, vulnerabilityscanning software, and Security Information and Event Management (SIEM) User acceptance testing (UAT) and industry certifications An active Top Secret clearance is preferred but not required. More ❯
/CD pipelines for embedded systems. Proficiency with Agile methodologies and practices. Strong understanding of security principles and how they apply to embedded software development. Experience with code analysis, vulnerabilityscanning, and security testing tools. Knowledge of common software vulnerabilities and techniques to mitigate them. Strong problem-solving skills with the ability to work in a high-tempo More ❯
Huddersfield, West Yorkshire, England, United Kingdom
Aindale KTD
customer training through to ongoing support Working on Cyber Essentials & IASME Assured Level 1 assessments Working on Cyber Essentials Plus & IASME Assured Level 2 (Audited) audits Carrying out Internal VulnerabilityScanning (including customising reporting) Carrying out External Penetration Testing (including customising reporting) Using enterprise level tools to analyse and assess vulnerabilities Assist with the evolving product and services More ❯
to complete the DoD RMF assessment and authorization process. • Implement Implementation of DoD Security Technical Implementation Guides (STIGs) on traditional Information Technology (IT) and Operational Technology (OT) systems. • Conduct vulnerabilityscanning and document system vulnerabilities. • Work in a team environment alongside other cybersecurity engineers and Risk Management Framework (RMF) analysts. Required Education & Experience: Active TS/SCI w More ❯
maintain security controls and monitoring throughout the software development lifecycle (SDLC). Automation: Develop automated security processes and tools to detect and prevent vulnerabilities in CI/CD pipelines. Vulnerability Management: Conduct regular vulnerability assessments, penetration testing, and ensure timely remediation of findings. Protect all company data, especially sensitive information, from internal and external threats by creating comprehensive … for detail and an ability to multitask in a fast-paced environment Strong abilities in critical thinking, problem-solving, logic, and forensics Knowledge of security tools like SAST, DAST, vulnerability scanners, and SIEM solutions. Familiarity with scripting languages (Python, Bash, etc.) and automation frameworks. In depth knowledge of application security principles, OWASP Top 10, and threat modeling. Proficiency in More ❯
NSS continuous monitoring activities. • Research, develop, and implement policies to improve the effectiveness and efficiency of the security authorization process while minimizing operational impacts on critical NSS systems. • Conduct vulnerability scans, create Body of Evidence (BoE) artifacts, and produce Security Assessment Reports (SARs) to document risk levels and recommended mitigations. • Provide in-depth analysis of cyber threat actor behavior … to apply them to secure National Security Systems. • Strong background in cybersecurity risk analysis and reporting, with experience in creating detailed BoE artifacts. • Proficiency in using cybersecurity tools for vulnerabilityscanning and continuous monitoring. • Local to D.C. or Virginia with ability to work on-site for classified work. Preferred Qualifications: • Expertise in conducting SCAs and cybersecurity assessments for … environments, such as those encountered in NSS. • Experience developing and maintaining cybersecurity SOPs and CONOPs, with a focus on streamlining the risk assessment and authorization process. • Proficiency in using vulnerability assessment tools such as Nessus, Splunk, and AppDetective, along with MGMT compliance tools like CSAM-S. • Strong analytical skills to assess cyber threats, identify trends, and create actionable risk More ❯
packet capture and analysis tools Experience using computer and network forensics techniques Knowledgeable in hardening techniques Experience in network and web related protocol analysis Experience using industry standard security scanning tools Perform security testing in conjunction with the Security Control Assessment (SCA) team to achieve ATO (Authorization to Operate) Perform application security testing on mission critical IC systems Identify … using metadata Ability to reconstruct a malicious attack or activity based on network traffic Assess network topology and device configurations identifying critical security concerns Perform network monitoring, network mapping, vulnerabilityscanning, and penetration testing Train and mentor cybersecurity professionals Review test plans/procedures, test results, and test reports for completeness and accuracy, including compliance to approved plans More ❯
expert (SME) for OT systems during audits, inspections, and vendor engagements. • Evaluate new technologies and develop risk-based strategies to enhance OT cybersecurity and system reliability. • Support penetration testing, vulnerability assessments, and patch management activities in live and test environments. • Participate in a 24/7 on-call rotation to support critical infrastructure operations. Qualifications: • Bachelor's degree in … on experience deploying and configuring firewalls, switches, and routers. • Experience troubleshooting issues across all OSI model layers. • Familiarity with server virtualization (hypervisors, VMs, bare metal deployments) preferred. • Experience with vulnerabilityscanning and cyber tools in an OT environment is a plus. • Familiarity with the Purdue Model for ICS networks is strongly preferred. • Strong technical documentation and communication skills More ❯
systems Assisting in the development and verification of documentation necessary to complete the DoD RMF assessment and authorization process Conducting ICS/SCADA system inventories following DoD guidance Conducting vulnerabilityscanning and document system vulnerabilities Supporting ISO standardization and Quality inspections Participating in continuous improvement of organizational cybersecurity posture Provide system security engineering services and/or products … procedures to ensure information systems reliability and accessibility and to prevent and defend against unauthorized access to systems, networks, and data Assessment, mitigation, and closure of network vulnerabilities and vulnerability management eMASS Establishing, managing, and tracking of Plan of Action & Milestones (POA&M) Applying STIGs to servers, databases, applications, and other hardware Security Readiness Review (SRR) Tools (scripts and More ❯
firewall security logs Experience with Splunk Machine Learning Toolkit (MLTK) Experience with scripting languages such as CSS, HTML, JavaScript, and Python Knowledge of RMF, Trellix ePO, NESSUS, SCAP, and vulnerabilityscanning ServiceNow Ticketing System Shell scripting to automate tasks and manipulate data More ❯
Washington, Washington DC, United States Hybrid / WFH Options
OMW Consulting
team based in Washington, D.C. You must have an active Secret clearance or higher and a solid background in information security fundamentals and core technologies (e.g., authentication, encryption, firewalls, vulnerabilityscanning, SIEM/SOAR, audit logs). Your main responsibilities in this position will include: Achieving ATOs for the company's software across multiple government customers with minimal More ❯
HTML, JavaScript, and Python Shell scripting to automate tasks and manipulate data Preferred DoD 8570 CE Certification Requirements: CompTIA Security+ CE Knowledge of RMF, Trellix ePO, NESSUS, SCAP, and vulnerabilityscanning and ServiceNow Ticketing System More ❯