Permanent Vulnerability Scanning Job Vacancies

26 to 50 of 197 Permanent Vulnerability Scanning Jobs

Network Infrastructure Security Manager - HYBRID WORKING - 10941HS

London, United Kingdom
Hybrid / WFH Options
Proactive.IT Appointments Limited
Responsible for driving company IT security, and stability of all IT systems and services. Responsibilities Implement and enforce cybersecurity best practices (ISO 27001, CE+, CIS benchmarks), including endpoint protection, vulnerability scanning, penetration testing, and incident response planning. Ensure compliance with regulatory standards such as GDPR Ensure best security practice for Office 365, Exchange Online, and SharePoint administration. Administer More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Network Infrastructure Security Manager - HYBRID WORKING

London, South East, England, United Kingdom
Hybrid / WFH Options
Proactive Appointments
for driving company IT security, and stability of all IT systems and services. Key Responsibilities: Implement and enforce cybersecurity best practices (ISO 27001,CE+, CIS benchmarks), including endpoint protection, vulnerability scanning, penetration testing, and incident response planning. Ensure compliance with regulatory standards such as GDPR Ensure best security practice for Office 365, Exchange Online, and SharePoint administration. Administer More ❯
Employment Type: Full-Time
Salary: £70,000 - £80,000 per annum
Posted:

System Administrator with Security Clearance

Hill Afb, Utah, United States
Golden Tech Systems Inc
analysis and resolve system and application faults and errors Maintain working knowledge of Microsoft Active Directory, Group Policy Objects (GPOs), DHCP, DNS, and PowerShell General understanding of antivirus and vulnerability scanning software Basic understanding of Security Information and Event Management (SIEM) tools Ensure compliance of assigned operating systems and applications with Department of Defense (DoD) directives, including DISA … Security Technical Implementation Guide (STIG) and Information Assurance Vulnerability Management (IAVM) bulletins What's In It For You Competitive wages Medical and dental coverage 401k plan Paid time off Rewards & recognition US Citizenship Requirement Clearance Requirement This position requires an active final Secret clearance upon hire, with the ability to obtain and maintain a Top Secret clearance. An active More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cybersecurity System Administrator - DMV with Security Clearance

Milwaukee, Wisconsin, United States
M.C. Dean
Monitor networks for real-time threat indicators; investigate and respond to security events. Implement and operate cybersecurity tools such as ACAS, NESSUS, SCAP, and STIG Checklists. Conduct and remediate vulnerability scans; follow DISA STIGs and IAVA compliance. Manage POA&Ms, deviation lists, and ensure systems maintain Authority to Operate (ATO). Provide FRCS cybersecurity engineering support and continuous monitoring … to complete the DoD RMF assessment and authorization process. • Implement Implementation of DoD Security Technical Implementation Guides (STIGs) on traditional Information Technology (IT) and Operational Technology (OT) systems. • Conduct vulnerability scanning and document system vulnerabilities. • Work in a team environment alongside other cybersecurity engineers and Risk Management Framework (RMF) analysts. Required Education & Experience: Active TS/SCI w … CySA+). TS/SCI clearance is required. 5+ years of experience in DoD RMF cybersecurity and system administration. Experience with IA tools and processes: STIGs, Nessus, SCAP, ACAS, vulnerability management. Demonstrated knowledge of: Windows Server/Client, RHEL, VMware Cybersecurity frameworks: RMF, NIST SP 800-53, FISMA Security monitoring, firewall, and encryption toolsets. 3+ Years of Experience with More ❯
Employment Type: Permanent
Salary: USD 104,080 Annual
Posted:

Senior Systems Administrator with Security Clearance

Huntsville, Alabama, United States
Teledyne Brown Engineering (TBE)
other Domain services in accordance with MS best practices and compliance requirements. Experience with Current versions of Windows (e.g. Server 2019, 2022, Windows 10, 11 Enterprise) Configure and execute vulnerability scanning tools, SCAP/STIG scans (SCC Tool, OpenSCAP, etc.), and perform remediating steps based on findings on Windows and Linux operating systems. Apply OS patches and upgrades More ❯
Employment Type: Permanent
Salary: USD 135,000 Annual
Posted:

CND Specialist with Security Clearance

Springfield, Virginia, United States
NewGen Technologies, Inc
NewGen is seeking a Computer Network Defense Vulnerability Assessment Specialist with the following background. Responsibilities - Developing and executing the organization's continuous vulnerability assessment strategy. - Measuring the effectiveness of defense-in-depth mechanisms against vulnerabilities and developing recommendations to remediate systemic security issues. - Configuring, operating, maintaining, and evaluating the effectiveness of vulnerability scanning and assessment toolsets. … Assessing the level of risk introduced by vulnerabilities and developing remediation strategies. - Investigating and analyzing cybersecurity incidents to ensure the appropriate response activities and mitigations are applied. - Distributing periodic vulnerability assessment reports, summaries, notifications, and an annual vulnerability assessment scorecard to CIO leadership and IT stakeholders. - Developing and maintaining documentation as it pertains to the use and operation … of vulnerability assessment tools and methodologies (SOPs, assessment plants, test plants, etc.). Qualifications - 7+ years' experience as a cybersecurity analyst, administrator, or engineer responsible for Enterprise vulnerability management toolsets (e.g., ACAS, Tenable, Nessus, Rapid7, AppSpider, SCAP, STIG Viewer, etc.). - Demonstrated proficiency and expertise in the following areas: - Applying computer networking concepts, protocols, and security methodologies to More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security Lead

Oxfordshire, United Kingdom
Planet Recruitment
for the MSP's own security posture ensuring tools, processes, and teams meet the same standards we deliver to clients. They monitor measurable posture metrics (e.g., Microsoft Secure Score, Vulnerability etc.), ensure continuous improvement, and keep the MSP's security practice relevant through ongoing training, certifications, and emerging threat awareness. While day-to-day execution is delegated to Security … the Security Lead owns security end-to-end: identifying risks, embedding controls, and ensuring compliance is demonstrable. Key Responsibilities Client-Facing Lead Quarterly Security Reviews (QSRs), presenting patch/vulnerability posture, incidents, compliance status, and risk register updates. Translate technical security risks into clear business impact and outcomes. Own the client exception process, ensuring risks are documented, communicated, and … escalation point for clients when risks require senior involvement. Internal MSP Security Own the MSP's internal security frameworks and certifications (e.g., CE+, ISO, SOC 2). Oversee patching, vulnerability, and risk management of MSP-owned infrastructure and tools. Ensure MSP's technology stack (RMM, XDR, PSA, backup, etc.) is securely deployed and monitored. Drive staff security awareness, training More ❯
Employment Type: Permanent
Salary: £50000 - £60000/annum
Posted:

Intermediate, Cybersecurity Systems Analyst with Security Clearance

Hurlburt Field, Florida, United States
FEDITC, LLC
shortcomings and vulnerabilities. Advise on network and system risks, risk mitigation courses of action, and operational. Additionally, the Cybersecurity Systems Analyst should be able to perform security evaluations and vulnerability assessments using the DOD Assured Compliance Assessment Solution (ACAS), Nessus vulnerability scanning tool and Security Content Automation Protocol tool. Identify applicable STIGs and perform assessments using the … hardware, and software using the DoD & IC RMF to obtain an Authority to Operate (ATO), Interim Authority to Test (IATT), or Authority to Connect (ATC). Perform risk and vulnerability assessments of IT and IS for authorization; prepare risk assessment reports for submission to the SCA and Authorizing Official/Designated Authorizing Official/Designated Accrediting Authority (AO/… hardware, software and device security authorization and assessments, as well as the application and execution of policy, including project management support services. Validate the patching of systems, perform validation scanning, develop Plans of Action & Milestone (POA&Ms), and report as directed by applicable policies, procedures, and regulations. Provide subject matter expertise for COA development and the implementation of Cybersecurity More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

SOC Solutions Engineer

City of London, London, United Kingdom
Hybrid / WFH Options
Anson Mccade
log parsing, SIEM query languages (KQL, SPL, AQL), and automation with Python/PowerShell. Deep understanding of incident response, threat detection, and frameworks (MITRE, NIST, CIS). Knowledge of vulnerability scanning, penetration testing, and network traffic analysis. Familiarity with ITIL processes (Incident, Problem, Change). Excellent stakeholder communication, with the ability to mentor and lead from a technical More ❯
Employment Type: Permanent, Work From Home
Posted:

Cyber Security Engineer

Leeds, West Yorkshire, United Kingdom
Elevate Technology Group Ltd
security standards such as ISO 27001, Cyber Essentials, GDPR, and Data Protection Act. Experience with Microsoft O365 Security solutions and network security operations. Understanding of security testing principles, including vulnerability scanning, risk identification, and mitigation. Knowledge of security auditing and security incident response processes. Experience with event and log analysis to monitor and assess security risks. Solid understanding … a global organisation, apply now. Keywords: Information Security Consultant, IT Security Consultant, Cybersecurity Specialist, Microsoft O365 Security, Enterprise Security Jobs, Information Security Leeds, IT Risk Management, Security Incident Response, Vulnerability Management, ISO 27001, GDPR Compliance, Security Awareness, Disaster Recovery and Business Continuity. More ❯
Employment Type: Permanent
Salary: £55000 - £70000/annum
Posted:

Information Security System Officer with Security Clearance

Dahlgren, Virginia, United States
Kitty Hawk Technologies
Assessment and Authorization (A&A) activities to obtain and maintain Authority to Operate (ATO). - Conduct and document regular security reviews, risk assessments, and audit log analysis. - Assist with vulnerability scanning and remediation (e.g., ACAS, Nessus, STIGs, SCAP). - Enforce security policies, procedures, and guidelines for users, developers, and administrators. - Report and respond to security incidents in coordination … 3+ years of experience in DoD cybersecurity, including RMF and NIST 800-53 compliance. - Active DoD Secret security clearance or higher. - Familiarity with DISA STIGs, SCAP tools, eMASS, and vulnerability management tools. - Experience with A&A processes and associated documentation and submission of RMF packages. - Experience coordinating with DCSA - DoD 8570 IAT Level II or IAM Level I certification More ❯
Employment Type: Permanent
Salary: USD 130,000 Annual
Posted:

Teamcenter Systems Administrator with Security Clearance

Hill Afb, Utah, United States
Golden Tech Systems Inc
resolving system and application faults and errors Ensuring operating systems and applications comply with Department of Defense (DoD) guidelines, including DISA Security Technical Implementation Guide (STIG) and Information Assurance Vulnerability Management (IAVM) bulletins What's In It For You Competitive wages Medical and dental benefits 401k plan Paid time off Rewards & recognition US Citizenship Requirement Pursuant to a government … Collaboration with vendors for server technology implementation Tenacious documentation of activities, status, and issues worked Knowledge of Microsoft Active Directory, GPOs, DHCP, DNS, and PowerShell General understanding of antivirus, vulnerability scanning, and SIEM tools Preferred Education, Experience, & Skills (Not required but will increase consideration for the position): Teamcenter Application and/or Database Administration experience AWS or similar More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Lead Cyber Security Engineer

Greater London, England, United Kingdom
DVF Recruitment
WAF, DDoS, VPN, perimeter firewalls, email/web security, MFA, SSO, PAM, MDM/MAM, and conditional access. Partnering with InfoSec to align platforms with overall security strategy. Supporting vulnerability scanning, remediation, and risk mitigation efforts. Collaborating with external penetration testers and ensuring compliance with frameworks such as ISO 27001, NIST, and CIS . Staying up to date More ❯
Posted:

Lead Cyber Security Engineer

london, south east england, united kingdom
DVF Recruitment
WAF, DDoS, VPN, perimeter firewalls, email/web security, MFA, SSO, PAM, MDM/MAM, and conditional access. Partnering with InfoSec to align platforms with overall security strategy. Supporting vulnerability scanning, remediation, and risk mitigation efforts. Collaborating with external penetration testers and ensuring compliance with frameworks such as ISO 27001, NIST, and CIS . Staying up to date More ❯
Posted:

Lead Cyber Security Engineer

slough, south east england, united kingdom
DVF Recruitment
WAF, DDoS, VPN, perimeter firewalls, email/web security, MFA, SSO, PAM, MDM/MAM, and conditional access. Partnering with InfoSec to align platforms with overall security strategy. Supporting vulnerability scanning, remediation, and risk mitigation efforts. Collaborating with external penetration testers and ensuring compliance with frameworks such as ISO 27001, NIST, and CIS . Staying up to date More ❯
Posted:

Cyber Security Lead

Horsham, West Sussex, South East, United Kingdom
Hybrid / WFH Options
Platform Recruitment Limited
Managing Microsoft 365 security tools, firewalls, networks, Wi-Fi, and email security platforms Acting as the main contact for our outsourced SOC and overseeing incident response Running pen tests, vulnerability scans, and regular security assessments Owning governance, risk, and compliance activities (ISO 27001, Cyber Essentials) Delivering supplier risk assessments and secure onboarding processes What were looking for Strong technical … Office 365, Azure, AWS) Experience working with or managing a SOC Practical 3rd line operational security background Familiarity with audits, compliance frameworks, and risk management Knowledge of pen testing, vulnerability scanning, and networking best practices Confident project management skills and ability to lead from the front This is an opportunity to be the go-to security expert in More ❯
Employment Type: Permanent, Work From Home
Salary: £75,000
Posted:

IT Security Consultant

Bedford, Bedfordshire, South East, United Kingdom
Hybrid / WFH Options
Total IT
cyber security measures, best practices, and threat management. Develop and maintain documentation, including best practice guides and incident reports, to educate clients and team members on security awareness. Conduct vulnerability assessments and participate in the development of incident response protocols to enhance security posture. Offer technical guidance to team members, fostering a culture of continuous learning and improvement within … of the strategy plan Active innovation and improvement of internal policies and strategies Technical Skills Required: In-depth knowledge of Office 365 security features and best practices. Proficiency in vulnerability scanning tools and techniques. Solid understanding of networking principles, including TCP/IP, patching, and network security protocols. ISO27001 Implementation and understanding Exceptional report writing skills, with the More ❯
Employment Type: Permanent, Work From Home
Salary: £40,000
Posted:

DevSecOps Engineer III with Security Clearance

Colorado Springs, Colorado, United States
Golden Tech Systems Inc
Responsibilities Collaborate with cross-functional teams to integrate robust security measures throughout the software development lifecycle. Design, implement, and manage CI/CD pipelines that include automated security testing, vulnerability scanning, and compliance validation. Develop and maintain infrastructure as code (IaC) configurations to ensure secure, scalable cloud and infrastructure deployments. Conduct comprehensive security assessments, code reviews, and penetration More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

INFORMATION SYSTEMS SECURITY ENGINEER - VIRGINIA -URGENT with Security Clearance

Chantilly, Virginia, United States
Cyberstrike Group
Preferred Scripting experience in Bash, Python, or Perl Knowledge of network protocols and technologies, such as TCP/IP, DNS, and VPNs Experience with security-related tools such as vulnerability scanners, SIEMs, endpoint protection systems and cloud computing platforms such as AWS or Azure More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cloud Cybersecurity Engineer with Security Clearance

Stevensville, Maryland, United States
Halcyon Days Consulting, LLC
of, proactively hunting for threats, securing hybrid and multi-cloud environments, and ensuring compliance with industry best practices and regulatory frameworks. The Cloud Cybersecurity Engineer will lead efforts in vulnerability assessment, threat hunting, incident detection, and security automation while collaborating with cross-functional teams to safeguard mission critical systems. RESPONSIBILITIES & DUTIES: Design, deploy and manage cloud security architectures in … AWS, Azure and/or other commercial or private cloud environments. Conduct risk assessments, vulnerability scans, and penetration testing to identify and mitigate security weaknesses. Implement and monitor cloud-native security controls, such as firewall, encryption, IAM policies, and logging/monitoring solutions/Develop and maintain security baselines, hardening guides, and compliance templates for cloud services. Automate security … suspicious patterns, and emerging attack techniques. 5+ years of experience in cybersecurity engineering with a focus on cloud environments. Strong knowledge of security frameworks and best practices. Experience with vulnerability scanning, intrusion detection/prevention, and incident response. Familiarity with automation tools (Terraform, Ansible, or similar) and DevSecOps. Proficiency in analyzing security logs, network traffic, and attack artifacts. More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Tanium Enterprise Support Admin- Dod Secret with Security Clearance

Philadelphia, Pennsylvania, United States
Associates Systems LLC
Active or Interim DOD Secret Clearance AIT Level II Cert required All qualified resumes will be responded to in 24hrs or less Tanium Cybersecurity/IAVM Patch Manager and Vulnerability Specialist 3-5 years' experience in Cybersecurity and in supporting patching and configuring Windows and Linux operating systems and third-party applications. Specifically, experience with the ACAS and Tanium … platforms and proficiency in deploying, configuring, and maintaining Tanium modules (e.g., Discover, Patch, Deploy, Comply, Enforce, Threat Response); ability to perform vulnerability scanning, patch management, and configuration compliance in accordance with DoD/NIST cybersecurity standards; working knowledge of scripting languages (PowerShell, Bash, Python) to develop custom sensors, packages, and automation workflows; strong background in Windows and Linux More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber and Information Security Lead

Bath, Somerset, United Kingdom
YT Technologies
technical stakeholders, including senior leadership, product teams, and external partners. Team leadership & mentoring: Proven ability to lead, mentor, and develop a high-performing governance, risk, and compliance (GRC) team. Vulnerability management: Experience scoping, overseeing and interpreting the results of vulnerability scanning, penetration testing, and security audits. Please apply for more details More ❯
Employment Type: Permanent
Salary: GBP 75,000 - 85,000 Annual
Posted:

Cyber and Information Security Lead

BA1, Bath, Bath and North East Somerset, Somerset, United Kingdom
YT Technologies
technical stakeholders, including senior leadership, product teams, and external partners. Team leadership & mentoring: Proven ability to lead, mentor, and develop a high-performing governance, risk, and compliance (GRC) team. Vulnerability management: Experience scoping, overseeing and interpreting the results of vulnerability scanning, penetration testing, and security audits. Please apply for more details More ❯
Employment Type: Permanent
Salary: £75000 - £85000/annum
Posted:

Sr. DevSecOps Engineer IV with Security Clearance

College Park, Maryland, United States
Golden Tech Systems Inc
Partner with development, operations, and security teams to integrate security protocols seamlessly into the software development lifecycle. Design, build, and maintain CI/CD pipelines incorporating automated security testing, vulnerability assessments, and compliance checks. Develop and manage infrastructure as code (IaC) configurations, ensuring secure and scalable cloud resources and infrastructure. Conduct security assessments, code reviews, and penetration testing to … Terraform, CloudFormation, or Ansible. Strong scripting skills in languages such as Python and Bash for automation and integration. Proficiency with static code analysis, dynamic application security testing (DAST), and vulnerability scanning tools like Fortify and Acunetix. Knowledge: In-depth understanding of security frameworks (e.g., OWASP, NIST) and best practices for mitigating vulnerabilities. Familiarity with common threat vectors and More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

NSE Cybersecurity Project Assurance Manager, Cybersecurity, Technology & Digital Services

Edinburgh, United Kingdom
Hybrid / WFH Options
Deloitte LLP
is embedded throughout the development lifecycle of Technology Assets by using Deloitte's Secure System Development Lifecyle (SSDLC) to assure paths to production. Oversee that security testing activities like vulnerability scanning, penetration testing, and code reviews are completed to identify weaknesses and potential exploits on the identified security requirements. Identify potential information security risks within a project, analyse … information security principles, including confidentiality, integrity, and availability. Demonstrable understanding of Cybersecurity risk and controls inherent in various technologies, and related best practices. This includes OWASP Top 10 and vulnerability management. Have strong knowledge in cybersecurity frameworks and standards like ISO 27001, NIST, COBIT, and Cyber Essentials+ or equivalent. Experience with risk management methodologies, techniques, and being able to More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:
Vulnerability Scanning
10th Percentile
£46,450
25th Percentile
£53,750
Median
£62,500
75th Percentile
£90,000
90th Percentile
£90,250