Herndon, Virginia, United States Hybrid / WFH Options
VTG
security guidelines, including RMF and STIG compliance. Implement and maintain security measures such as firewalls, intrusion detection/prevention systems, and access controls. Conduct vulnerability assessments and patch management to mitigate security risks. Maintain physical and logical security protocols to protect classified information. Incident Response and Monitoring: Monitor network More ❯
Bethesda, Maryland, United States Hybrid / WFH Options
Lockheed Martin
operations including SIEM, SOAR, threat hunting, incident investigation, endpoint protection, standard frameworks, Microsoft 365 security, and strategic planning. • Strong knowledge of cyber threat landscape, vulnerability assessments, incident response, and threat hunting methodologies. • Extensive knowledge in security tools and technologies, including SIEM, intrusion detection/prevention systems, and threat intelligence More ❯
Harrington Starr have partnered with a global multi billion pound business in Belfast as they seek a Vulnerability and Penetration Testing Engineer to join their Belfast Centre team in providing security architecture, vulnerability and risk assessment. We are open to speaking to suitable canddiates who may be open … for secure system design. This includes meeting requirements outlines in the ISMS Policy, client contracts, regulatory expectations, and professional obligations. Architect, implement, and support assessment solutions identified as necessary for the protection of firms assets. Continually evaluate relevant products, tools, scripts, and techniques that improve existing assessment capabilities. … Essential Criteria: r+ years in a pen test role Excellent knowledge of Vulnerability and Penetrating Testing concepts and best practices, including the requirements for WhiteHat/Ethical Hacking. Experience with automated tools such as Nessus, Appscan, Burp Suite, Nipper, and Trustwave. Expert understanding of the difference between a vulnerabilityMore ❯
required, as well as overseeing and maintaining an outsourced SOC team and additional cyber security partners. Additionally, facilitating and overseeing audits, penetration tests and vulnerability assessments and driving remedial actions and improvements will form a large part of the role. Other accountabilities will include: Review, recommend and or update More ❯
and enforce security best practices, including patch management, access controls, and monitoring for compliance with DoD and Intelligence Community requirements. Perform regular system audits, vulnerability assessments, and remediation of security threats in accordance with IAT Level 2 and DoD 8570 requirements. Provide technical leadership and mentorship to junior administrators More ❯
required, as well as overseeing and maintaining an outsourced SOC team and additional cyber security partners. Additionally, facilitating and overseeing audits, penetration tests and vulnerability assessments and driving remedial actions and improvements will form a large part of the role. Other accountabilities will include: Review, recommend and or update More ❯
Edinburgh, Midlothian, Scotland, United Kingdom Hybrid / WFH Options
Motability Operations
have experience designing and implementing security measures that protect sensitive information in complex environments. Your technical expertise spans areas such as encryption, access controls, vulnerability assessments and incident response. You have excellent problem-solving skills and a proactive mindset, enabling you to anticipate potential threats and address them effectively. More ❯
Employment Type: Permanent, Part Time, Work From Home
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Motability Operations
have experience designing and implementing security measures that protect sensitive information in complex environments. Your technical expertise spans areas such as encryption, access controls, vulnerability assessments and incident response. You have excellent problem-solving skills and a proactive mindset, enabling you to anticipate potential threats and address them effectively. More ❯
Employment Type: Permanent, Part Time, Work From Home
required, as well as overseeing and maintaining an outsourced SOC team and additional cyber security partners. Additionally, facilitating and overseeing audits, penetration tests and vulnerability assessments and driving remedial actions and improvements will form a large part of the role. Other accountabilities will include: Review, recommend and or update More ❯
Colorado Springs, Colorado, United States Hybrid / WFH Options
OSAAVA Services
including NIST 800-53, RMF, and STIGs. • Work closely with developers, security engineers, and system administrators to implement security recommendations. • Perform penetration testing and vulnerability assessments on government software systems. • Document findings, create security reports, and provide actionable recommendations for remediation. • Assist with the development of secure coding practices … testing, or software security evaluation. • Certifications such as CISSP, CEH, OSCP, or GIAC GWEB are highly preferred. • Experience with secure coding practices and software vulnerabilityassessment tools (e.g., Nessus, Burp Suite, Fortify, SonarQube). • Familiarity with secure software development lifecycle (SSDLC) methodologies. • Strong knowledge of encryption protocols, authentication … postures. Preferred Qualifications: • Experience conducting cybersecurity assessments in DoD or government environments. • Understanding of container security and DevSecOps principles. • Familiarity with threat modeling, risk assessment frameworks, and security controls testing. • Knowledge of cloud security best practices (AWS, Azure, GovCloud). Work Environment & Requirements: • Location: Colorado Springs, CO - On-site More ❯
and support project teams to embed security best practices throughout the project lifecycle. Penetration Testing: Scope, manage, and track remediation of penetration testing and vulnerability assessments. Application Security: Maintain application security processes, standards and guidelines. Translate application security policies into security requirements. Risk Assessments: Conduct and document security risk More ❯
Responsibilities Advise and support project teams to embed security best practices throughout the project lifecycle. Scope, manage, and track remediation of penetration testing and vulnerability assessments. Maintain application security processes, standards and guidelines. Translate application security policies into security requirements. Conduct and document security risk assessments on changes, threats More ❯
architectures, network protocols, industrial protocols, Active Directory, Backup processes, virtualization of applications and other general IT knowledge. Fundamental knowledge in IT-Security threat modelling, vulnerability assessments and pen-testing. Experienced in the use of tools for incident investigations, simulation, and forensics - GxP regulations. Ability to present technical design proposals More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sparta Global Limited
role you will undertake: Network Security - Understanding of firewall configuration, intrusion detection/prevention systems (IDS/IPS), and secure network protocols. Penetration Testing & VulnerabilityAssessment - Skills in identifying, simulating, and remediating vulnerabilities through tools (e.g., Nessus, Metasploit) and manual testing. Incident Response & Forensic Analysis - Ability to manage More ❯
El Segundo, California, United States Hybrid / WFH Options
Aerospace Corporation
programming in Python, Rust, C/C++, or other relevant language Experience using SIEM tools, SOAR/Orchestration tools, EDR tools, Penetration Test or VulnerabilityAssessment tools, or Incident Response procedures and tools Understanding of cybersecurity threats and countermeasures Advanced knowledge and understanding of industry-accepted data processing More ❯
Leominster, Herefordshire, United Kingdom Hybrid / WFH Options
Leidos
solutions. Performance Monitoring & Optimization: Utilize tools to monitor and fine-tune system performance. Security & Compliance: Ensure adherence to industry best practices, including patch management, vulnerability assessments, and security. Automation & Scripting: Develop automation scripts using Bash, Python, or Ansible to streamline system operations and deployments. Documentation & Knowledge Sharing: Maintain technical More ❯
Washington, Washington DC, United States Hybrid / WFH Options
M9 Solutions
or create new processes for improvement and minimizing wastage. Encourage and build automated processes wherever possible. Identify and deploy security measures by continuously performing vulnerabilityassessment and risk management. Perform incident management and root cause analysis. Coordinate and communicate with the team and with customers, both external and More ❯
Huntsville, Alabama, United States Hybrid / WFH Options
Radiance Technologies
documentation Experience and understanding of Risk Management Framework (RMF), security controls and policies, and implementation of STIGs Experience scripting for automation of tasks and vulnerability assessments an active TS/SCI clearance is desired. EOE/Minorities/Females/Vet/Disabled More ❯
Solihull, England, United Kingdom Hybrid / WFH Options
Waterstones
brands. Cyber security requirements into solutions, projects and third-party supplier assessments. Provide security advice and guidance to a wider technical team. Conduct risk & vulnerability assessments and co-ordinate remediation activities. What we need from you Understanding and practical implementation of security frameworks (e.g. NIST, ISO 27001, CIS etc More ❯
and Network Security delivery teams. Clearly articulate and position Bytes' cybersecurity services, including Network Security, Compliance & Assurance (ISO 27001, PCI DSS), penetration testing, and vulnerability assessments. Provide thought leadership, offering expert guidance to customers, ensuring Bytes remains aligned with customer-specific requirements and outcomes. Maintain independence and objectivity in More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
The MRJ Group
a culture of security by engaging meaningfully with engineering and security teams. Continuous Monitoring: Identify threats and vulnerabilities through ongoing monitoring, penetration testing, and vulnerability assessments, audits, and compliance checks. Security Awareness & Best Practices : Provide technical guidance and training to stakeholders, promoting security best practices and risk mitigation strategies. … problem-solving abilities to translate business requirements into technical solutions. Collaboration and Influence: Effective communicator capable of navigating organizational complexities and influencing without authority. Vulnerability Management: Expertise in managing vulnerabilities across diverse assets and implementing application security in cloud environments. Security tooling: experience in any of the following; (Wiz More ❯
exposure to parallel processing environments used for large-scale analytics. An appreciation of security best practice in areas such as network security, threat modelling, vulnerabilityassessment, IAM, SIEM and incident response. Skills in system monitoring, performance tuning, and troubleshooting infrastructure and micro-service-based architectures. Understanding of compliance More ❯
Colorado Springs, Colorado, United States Hybrid / WFH Options
Aerospace Corporation
Xen Hypervisors, Microsoft Windows Server and Windows Server 2012r2/2016, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerabilityassessment Group Policy management and configuration, Scripting, BMC Footprints, WSUS, Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Win 10, Toolkits, SEIM, Logrhythm, ACAS More ❯