Smyrna, Georgia, United States Hybrid / WFH Options
Crest Security Assurance
Vulnerability Management Analyst Provide support to increase the Cybersecurity Center's ability to manage the cybersecurity risk to systems, assets, data, and agency capabilities through active identification of system/application weaknesses that require remediation and/or mitigation, enabling DoD to focus and prioritize its risk and … vulnerability management efforts in alignment with the needs of the Agency. Work shall be performed in accordance with Chairman of the Joint Chiefs of Staff Manual (CJCSM) 6510.01, NIST SP 800-40, DoDI 8530.01, CJCSM 6510.02, TASKORD 20-020, FRAGO 21 to OPORD 05-01CJCSI 6510.01F, CJCSM 6510.02 … released directives/mandates. Responsibilities: • Ensure routine action is taken to identify and correct vulnerabilities according to the following phases. Vulnerabilities include Information Assurance Vulnerability Management (IAVM) as well as vulnerabilities not be addressed through IAVM directives but affect DoD owned and managed information systems (ISs) and devices: Identify More ❯
Reston, Virginia, United States Hybrid / WFH Options
ICF
M for our customers. We are seeking a Senior Security Engineer to support our Federal customer's CIO Cyber Security organization and manage all vulnerabilityremediation activities, including Binding Operational Directive (BOD) compliance. Responsibilities: Perform Security Impact Analyses on application releases and provide recommendations to federal leadership Perform … software vulnerability scans, interpret the results, and provide vulnerability mitigation recommendations Support and develop analyses of alternatives and decisions on courses of action by providing security insights to project teams and federal leadership Review and provide recommendations on requests for AWS policy changes Work with development teams and … updates to secure coding standards documentation and the ongoing assessment of the customer organization against the NIST Cyber Security Framework Support Information Security Center vulnerability management groups by performing asset inventory, secure configurations and continuous monitoring, tracking and reporting and vulnerability service catalog. Support Vulnerability Management activities More ❯
Huntsville, Alabama, United States Hybrid / WFH Options
Lockheed Martin
Analyst assists users with resolving technical issues with applications, connectivity and other IT related issues. This individual will assist with Information Assurance, performing environmental vulnerability scans, remediation of vulnerabilities and system hardening. They will ensure that all Lockheed Martin assets and software are properly accounted for, managed, and … products, DOORS, Creo, etc.) • Knowledge of Network Protocols (i.e., TCP/IP, DNS, DHCP, LDAP, etc.) • Knowledge of Risk Management Framework (RMF) • Knowledge of vulnerabilityremediation and security management (i.e., system hardening, log management, configuration management (i.e., Nessus, McAfee, WSUS, SCCM, Ivanti, Shavlik, Blade Logic, Splunk, ACAS, SCAP More ❯
Strong troubleshooting abilities in systems, networking, and cloud environments Proven hands-on experience with tools like PAM, EDR, CASB, SIEM, DLP, email filtering , and vulnerability management Proficient in cloud services , especially in environments using virtual machines, identity management, web apps , and networking components (e.g., virtual networks, security groups, load More ❯
/Tier 4 support by analyzing and resolving problems and evaluating alternative means of satisfying user requirements Research, test, and deploy security patches and vulnerabilityremediation changes Provide support for the implementation, troubleshooting and maintenance of complex IT systems Perform automation tasks through scripting and testing Provide follow More ❯
logging is being collected and analyzed and relevant security alerts are being generated. Automate processes to reduce manual task delivery and enhance process delivery. Vulnerability Management Collaborate with IT and development teams to detect and remediate vulnerabilities across the enterprise in alignment with defined SLAs. Understand current and emerging … . Knowledge of security frameworks and regulatory compliance standards (NIST CSF, SOX ITGC, GDPR, MITRE ATT&CK, etc.) Experience with common industry SIEM and vulnerability management platforms. Experience maintaining the Microsoft Defender platform and other Microsoft security products. Ability to rank and prioritize vulnerabilities and security recommendations appropriately within More ❯
City of London, Greater London, United Kingdom Hybrid / WFH Options
Deltra Group
Strong troubleshooting abilities in systems, networking, and cloud environments Proven hands-on experience with tools like PAM, EDR, CASB, SIEM, DLP, email filtering, and vulnerability management Proficient in cloud services, especially in environments using virtual machines, identity management, web apps, and networking components (e.g., virtual networks, security groups, load More ❯
include: Security Analysis and Improvement: Continuously analyse our security systems for potential improvements, ensuring that our defences remain at the forefront of cybersecurity practices. Vulnerability Management: Proactively identify, assess, and remediate security vulnerabilities to maintain the integrity and confidentiality of our customer data. Security Automation: Automate security processes and More ❯
Chantilly, Virginia, United States Hybrid / WFH Options
Battelle Memorial Institute
within a network infrastructure to isolate, characterize and categorize network anomalies to help determine root source/root cause. Write reports to document observations, remediation, and recommended actions. Collaborate with other Battelle teams, e.g., simulating adversarial techniques in a lab Ensure pedigree and veracity of data collected. Research emerging More ❯
architecture, technical standards, technical controls, security solutions, guidelines, procedures, and other elements necessary to maintain security posture. Responsible for assessing information risk and facilitating remediation of identified vulnerabilities & risks across the organization. Accountable for coordinating the execution of security measures to protect our computer infrastructure, information systems and to … detect, mitigate, and analyze threats. Works closely with other teams to develop controls such as firewalls, business systems, data leakage protection systems, patching, encryption, vulnerability scanning, application code scanning, remediation as well as defining configuration for a variety of security tools. Prior experience in an international enterprise environment … delivery is on-time, within budget, and adopted to meet the company's information protection requirements. Perform or coordinate internal security assessments, penetration tests, vulnerability scans, and assess organization cybersecurity maturity complying with frameworks and regulations such as COBIT, NIST (800-53, cybersecurity), ISO, ITIL, PCI, GLBA, GDPR, HIPAA More ❯
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetration testing reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate SOC/… supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The … job holder will work very closely with all third-party vendors involved in the remediation process. The job holder will also prepare the necessary MI/Dashboard reports for the relevant stakeholders and alleviate the workload of the IT Service desk function when required. The primary responsibilities of the More ❯
london, south east england, united kingdom Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetration testing reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate SOC/… supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The … job holder will work very closely with all third-party vendors involved in the remediation process. The job holder will also prepare the necessary MI/Dashboard reports for the relevant stakeholders and alleviate the workload of the IT Service desk function when required. The primary responsibilities of the More ❯
Arlington, Virginia, United States Hybrid / WFH Options
ANALYGENCE, Inc
Job Description ANALYGENCE is seeking an experienced Cyber Vulnerability Assessment Analyst (SME) to supportour federal customer who plays a key role in enhancing the security, resiliency, and reliability of the nation's cyber and communications infrastructure. This role directly supports the customer Mission Engineering (ME) Information Security Branch (ISB … providing programmatic, technical, engineering, and integration support for the continued design, development, enhancement, integration, deployment, operations, and sustainment of security supported initiatives. The Cyber Vulnerability Assessment Analyst (SME) is responsible for leading penetration testing, developing advanced security scenarios and testing systems against those scenarios, developing advanced security architectures for … of custom countermeasures, provides security considerations to advise system engineering teams with the objective to reduce errors, flaws, and weaknesses that may constitute security vulnerability, performing advanced code analysis, and performing advanced protocol analysis for nation-state and state-sponsored cyber threat actor capabilities. The current team member work More ❯
london, south east england, united kingdom Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetration testing reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate SOC/… supporting the IT & Cyber Security Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The … job holder will work very closely with all third-party vendors involved in the remediation process. The job holder will also prepare the necessary MI/Dashboard reports for the relevant stakeholders and alleviate the workload of the IT Service desk function when required. The primary responsibilities of the More ❯
Crawley, Sussex, United Kingdom Hybrid / WFH Options
Thales Group
in Windows desktop operating system deployment and management. Experience with Microsoft SCCM, including task sequence creation and management. Strong understanding of security patching and vulnerability management. Experience in capacity planning and resource optimisation. Knowledge of thin client technologies and management platforms. Experience in troubleshooting virtual desktop performance issues and More ❯
/IPS configurations Establishing and implementing security 'best-practice' standards as well as departmental policies and procedures Responsible for Security scanning and the efficient remediation of vulnerabilities Responsible for analysing all security incidents to determine root cause Determine, recommend, and implement upgrade security measures and controls Delivery security responses More ❯
Huntsville, Alabama, United States Hybrid / WFH Options
Dark Wolf Solutions
networks, security monitoring, tuning and management of IT security systems and applications, incident response, digital forensics, loss prevention, and eDiscovery actions. Conducting risk and vulnerability assessment at the network, system and application level. Conducting threat modeling exercises. Developing and implementing security controls and formulating operational risk mitigations along with More ❯
Aberdeen, Scotland, United Kingdom Hybrid / WFH Options
ESK Recruitment LTD
audits and lead training on cybersecurity awareness and best practices. Coordinate responses to incidents and ensure timely resolution and documentation. Oversee threat detection and vulnerabilityremediation processes. What We're Looking For: Previous experience in an Information Security Management or similar leadership role. Familiarity with industry standards and More ❯
aberdeen, north east scotland, united kingdom Hybrid / WFH Options
ESK Recruitment LTD
audits and lead training on cybersecurity awareness and best practices. Coordinate responses to incidents and ensure timely resolution and documentation. Oversee threat detection and vulnerabilityremediation processes. What We're Looking For: Previous experience in an Information Security Management or similar leadership role. Familiarity with industry standards and More ❯
OpenShift) Infrastructure-as-Code (Terraform, Ansible, Crossplane) Container orchestration, networking, and automation (Kubernetes, Docker) Scripting (Bash, Powershell, Python) Programming languages (Golang, Java, Ruby, Python) Vulnerabilityremediation and mitigation tools (BlackDuck, Snyk) We value your ability to adapt over deep specialization. In addition, we're currently seeking folks with More ❯
london, south east england, united kingdom Hybrid / WFH Options
Container Solutions
OpenShift) Infrastructure-as-Code (Terraform, Ansible, Crossplane) Container orchestration, networking, and automation (Kubernetes, Docker) Scripting (Bash, Powershell, Python) Programming languages (Golang, Java, Ruby, Python) Vulnerabilityremediation and mitigation tools (BlackDuck, Snyk) We value your ability to adapt over deep specialization. In addition, we're currently seeking folks with More ❯
Role: Deliver security engineering across network, cloud, and endpoint infrastructure Support detection, response, and threat modelling Help mature identity & access management controls Lead on vulnerabilityremediation and risk assessments Act as SME in cross-functional projects involving security tooling & design What You Need: ✔ Proven experience in senior security More ❯
london, south east england, united kingdom Hybrid / WFH Options
Harrington Starr
Role: Deliver security engineering across network, cloud, and endpoint infrastructure Support detection, response, and threat modelling Help mature identity & access management controls Lead on vulnerabilityremediation and risk assessments Act as SME in cross-functional projects involving security tooling & design What You Need: ✔ Proven experience in senior security More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Michael Page (UK)
The Successful Applicant Solid experience in AWS Security Practical experience in automation, scripting, track record in automating security process Experience in vulnerabilities assessment and remediation Experience in using Terraform or other infrastructure-as-code tools Strong understanding of information security principles and practices. Familiar with fast-paced environment What More ❯