Cybersecurity Job Vacancies

51 to 75 of 5,547 Cybersecurity Jobs

Cyber security engineer

Corsham, Wiltshire, South West, United Kingdom
Global Technology Solutions Ltd
Job Title: DV Cleared Cyber Security Engineer Location: Corsham Type: Contract Security Clearance: Active DV (Developed Vetting) Clearance required Salary/Rate: £425-£550 Role Overview: We are seeking a highly capable and DV-cleared Cyber Security Engineer to join our growing security team in delivering secure, high-assurance systems across critical environments. This role is ideal for someone with … strong hands-on technical skills in cybersecurity, a proactive mindset, and the ability to work effectively within secure and regulated operational landscapes. As a Cyber Security Engineer, you will be responsible for protecting systems, networks, and data by designing, implementing, and maintaining security controls across the full lifecyclefrom architecture to operations. Key Responsibilities: Implement and manage security technologies, including firewalls … all phases of delivery Stay up to date with emerging threats, vulnerabilities, and industry best practices Essential Skills & Experience: DV Clearance (Developed Vetting) is mandatory Proven experience as a Cyber Security Engineer, Security Analyst, or similar role in a secure or regulated environment Strong knowledge of security technologies (e.g., firewalls, VPNs, SIEM, IDS/IPS, EDR, PKI, NAC) Hands-on More ❯
Employment Type: Contract
Posted:

Information Systems Security Engineer (ISSE) with Security Clearance

Chantilly, Virginia, United States
Executive Management Services, LLC
development lifecycle (SDLC) and that compliance with relevant regulations is achieved. This is a unique hands-on technical role in such that the ISSE is responsible for compliance-based cybersecurity engineering to include but not limited to cybersecurity engineering and generation of body of evidence requirements per DoD Risk Management Framework (RMF). Additionally, the ISSE shall provide management and … professional support, assistance, advice, to support the efficient and effective management and operation of the organization, activities, or systems specifically related to cybersecurity in all phases of RMF. This role will be the technical component supporting the ISSM. Per PWS section 1.3.9, Cybersecurity Support, specific tasks and responsibilities include but are not limited to: Specific responsibilities include but are not … analysis. • Apply STIGs, and various security mechanisms within Windows, Linux, and AWS cloud consoles. • Identify and analyze information system vulnerabilities and compliance issues. • Administration of AWS cloud console and cybersecurity mechanisms, and STIG/SCAP compliance checker. • Execute incident response as necessary • Provide detailed analysis, evaluation, and recommendations for improvements, optimization, and/or maintenance efforts for specified mission-critical More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Cyber Security Engineer

England, United Kingdom
Hybrid / WFH Options
Paragon Bank
savers and businesses across the UK, and together we use our expertise to help them achieve their ambitions and build a sustainable future. We are seeking an experienced Senior Cyber Security Engineer who is looking to grow in a friendly environment. We are flexible, inclusive, committed to your wellbeing, and passionate about supporting your potential. Let's grow together. Purpose … of the role Reporting to the Head of Cyber Security, the Cybersecurity Engineer will be part of a team ensuring the security of all group systems, infrastructure (cloud and on-premises), and applications. The role involves delivering and implementing the bank's technology roadmap, ensuring best practices, security standards, and policies are followed. Good communication skills, both verbal and written More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cybersecurity Engineer II - Manassas, VA with Security Clearance

Manassas, Virginia, United States
Epsilon Inc
Cybersecurity Engineer II Who is Epsilon: Epsilon is an IT Services company that was founded in 2009 and has become an established leader in providing Information Technology services to both Federal Government and Commercial businesses across the United States. Epsilon is known for its solution-focused and innovative approach, aligning technology systems, tools, and processes with the missions and objectives … VA initially and then transition to onsite in Manassas, VA within the first year. Our Customer's Mission: Team Epsilon has been chosen to deliver full-spectrum IT and Cyber Security support to a critical and enduring multinational organization within the United States Department of Defense. This DoD organization manages the resourcing, development and sustainment of one of our nation … corrective actions until all actions are closed. Provide support to plan, coordinate, and implement tactical responses to improve the organization's information security posture. Stay current on cloud and cyber security technologies trends. Utilize scripting languages (e.g., Python, PowerShell) to automate security processes, optimize workflows, and improve operational efficiency in threat detection and response. Basic Qualifications: As a requirement of More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cybersecurity Engineer II - Crystal City, VA with Security Clearance

Arlington, Virginia, United States
Epsilon Inc
Cybersecurity Engineer II Who is Epsilon: Epsilon is an IT Services company that was founded in 2009 and has become an established leader in providing Information Technology services to both Federal Government and Commercial businesses across the United States. Epsilon is known for its solution-focused and innovative approach, aligning technology systems, tools, and processes with the missions and objectives … VA initially and then transition to onsite in Manassas, VA within the first year. Our Customer's Mission: Team Epsilon has been chosen to deliver full-spectrum IT and Cyber Security support to a critical and enduring multinational organization within the United States Department of Defense. This DoD organization manages the resourcing, development and sustainment of one of our nation … corrective actions until all actions are closed. Provide support to plan, coordinate, and implement tactical responses to improve the organization's information security posture. Stay current on cloud and cyber security technologies trends. Utilize scripting languages (e.g., Python, PowerShell) to automate security processes, optimize workflows, and improve operational efficiency in threat detection and response. Basic Qualifications: As a requirement of More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Security Engineer - Splunk with Security Clearance

Fayetteville, North Carolina, United States
Anonymous Employer
security and policy review and configuration, security device implementation planning, configuration and implementation of security products, and technical quality assurance • Designs, architects, and implements Splunk solutions in support of cyber-security and IT operations and data scientists • Expected to demonstrate security related knowledge and skills, and good interpersonal and coordination skills • Create custom parsers and correlation rules for alerting security … personal to potential security incidents. • Research cyber security related emerging trends • Provide experience architecting and managing Splunk Core and Splunk ES • Assist in managing TAs, source types and data formats, search, index clustering, Splunk ES and data models, upgrades, etc • Serve as a Subject Matter Expert (SME) for improvements, implementation, administration, and operations to Cybersecurity systems • Your primary work location More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security Test Analyst

Sheffield, England, United Kingdom
Vallum Associates
Job Title: Cyber Security Test Analyst Location: Sheffield, UK (3 days/week Onsite) Duration: 6months+ Banking Client Experience required Job Summary: Required Experience Proven experience in software testing, preferably within Privileged Access Management (PAM) or Identity & Access Management (IAM). Experience with PAM solutions such as CyberArk, BeyondTrust, Delinea (Thycotic), or Microsoft PAM. Strong understanding of IAM principles, privileged More ❯
Posted:

Cybersecurity Engineer with Security Clearance

Washington, Washington DC, United States
Prism, Inc
Cybersecurity Engineer Prism is seeking a skilled Cybersecurity Engineer to support a mission-critical enterprise client in a hybrid capacity. This role focuses on managing and modernizing enterprise cybersecurity platforms, with a strong emphasis on Zscaler technologies (ZIA, ZPA, ZDX) and broader Secure Access Service Edge (SASE) implementations within a Microsoft-based environment. The ideal candidate will have hands-on … tickets , conduct health checks, and support upgrades or migrations. Collaborate with engineering, operations, and compliance teams to enhance the overall security posture. Qualifications: Basic Qualifications: Bachelor's degree in Cybersecurity, IT, or a related field (or 8+ years of equivalent experience). Minimum 5 years of cybersecurity experience supporting a broad range of tools across cloud, endpoint, identity, and network More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security Engineer

Warrington, Cheshire, United Kingdom
Alexander Mann Solutions - Public Sector Resourcing
On behalf of Sellafield, we are looking for a Cyber Security Engineer (Inside IR35) for a 12 month contract based hybrid in Warrington - 2/3 days per week. Work at Sellafield Ltd, and you're not just building a career. You're embarking on a mission. Joining 11,000 people on a 100-year project transforming the Sellafield site More ❯
Employment Type: Contract
Rate: GBP Annual
Posted:

Information Security Compliance Officer

London, United Kingdom
Guavapay Limited
Information Security Compliance Officer Required Qualifications & Certifications: Education Bachelor's degree in Cybersecurity, Information Technology, Computer Science , or a related field. A master's degree in information security , Risk Management, or Compliance is a plus. Certifications (Highly Valued) CISSP (Certified Information Systems Security Professional) CISM (Certified Information Security Manager) CISA (Certified Information Systems Auditor) ISO 27001 Lead Auditor/Implementer … Deep understanding of data protection laws (UK GDPR, EU GDPR, DPA 2018) . Familiarity with risk management frameworks like NIST CSF, CIS Controls, and ISO 27005 . Experience with cyber security tools (e.g., SIEM, Malware Protection, Firewalls and others) is a plus. Strong reporting and communication skills-ability to brief executives and regulators. Ability to design, implement, and enforce security More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Defence Analyst

Nottingham, Nottinghamshire, United Kingdom
Hybrid / WFH Options
Experian Group
performing in-depth analysis, assessment, and response to security threats by following documented policies to meet Service Level Goals. The team provides global 24x7 security operations and monitoring for cybersecurity events affecting Experian. You will be a part of the first line of defence in Experian's broader incident response and incident management departments, responsible for receiving and prioritizing cybersecurity … people across 32 countries. Our corporate headquarters are in Dublin, Ireland. Learn more at Experience and Skills Some information security experience working within a Security Operations Center or Cyber Security Incident Response Teams Bachelor's Degree in Computer Science, Computer Engineering, Information Systems, Information Security or professional certification related to Digital Forensics, Incident Response, or Ethical Hacking (e.g., GCIH, CEH … GCFE, GCFA, and CFCE). Knowledge of main concepts related to the Incident Response Life Cycle, MITRE ATT&CK Framework, Cyber Kill Chain, and other cybersecurity frameworks. High-level understanding of common intrusion methods and cyber-attack tactics, techniques, and procedures (TTPs), and common industry recommendations to prevent and respond to threats such as phishing, malware, network attacks, suspicious activity More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Technical Cyber Risk Assessment Manager

London, United Kingdom
Hybrid / WFH Options
Deloitte LLP
Lines of Defense (3LOD) model. Possess knowledge of risk management practices and the ability to conduct technical risk assessments. Work with the Global Technology Infrastructure team to integrate system cybersecurity assessments into their processes to ensure consistent implementation of security controls. Work with the Cybersecurity Architecture team and apply reference architectures for security solutions design and implementation. Work with the … Operations Center to evaluate the effectiveness of the security controls and architectures in relationship to actual intrusions seen on the Deloitte network, reported threats at peer organizations, and overall cybersecurity threats in the internet ecosystem and you will notify leadership of potential or existing threats and assist in the development of risk mitigating strategies of these items. Monitor security blogs … information into processes, procedures, and audit preparedness activities. Perform technology security risk assessments. Where appropriate, leverage security shared services (VRA, VM, Pen Testing) and provide oversight and assurance of cybersecurity controls in development and deployment all the way through the system go-live. Hold great working relationships with the Security Architecture team, Shared Security Service teams, Global Business Services organizations More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Technical Cyber Risk Assessment Manager

St. Albans, Hertfordshire, United Kingdom
Hybrid / WFH Options
Deloitte LLP
Lines of Defense (3LOD) model. Possess knowledge of risk management practices and the ability to conduct technical risk assessments. Work with the Global Technology Infrastructure team to integrate system cybersecurity assessments into their processes to ensure consistent implementation of security controls. Work with the Cybersecurity Architecture team and apply reference architectures for security solutions design and implementation. Work with the … Operations Center to evaluate the effectiveness of the security controls and architectures in relationship to actual intrusions seen on the Deloitte network, reported threats at peer organizations, and overall cybersecurity threats in the internet ecosystem and you will notify leadership of potential or existing threats and assist in the development of risk mitigating strategies of these items. Monitor security blogs … information into processes, procedures, and audit preparedness activities. Perform technology security risk assessments. Where appropriate, leverage security shared services (VRA, VM, Pen Testing) and provide oversight and assurance of cybersecurity controls in development and deployment all the way through the system go-live. Hold great working relationships with the Security Architecture team, Shared Security Service teams, Global Business Services organizations More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Technical Cyber Risk Assessment Manager

Reading, Berkshire, United Kingdom
Hybrid / WFH Options
Deloitte LLP
Lines of Defense (3LOD) model. Possess knowledge of risk management practices and the ability to conduct technical risk assessments. Work with the Global Technology Infrastructure team to integrate system cybersecurity assessments into their processes to ensure consistent implementation of security controls. Work with the Cybersecurity Architecture team and apply reference architectures for security solutions design and implementation. Work with the … Operations Center to evaluate the effectiveness of the security controls and architectures in relationship to actual intrusions seen on the Deloitte network, reported threats at peer organizations, and overall cybersecurity threats in the internet ecosystem and you will notify leadership of potential or existing threats and assist in the development of risk mitigating strategies of these items. Monitor security blogs … information into processes, procedures, and audit preparedness activities. Perform technology security risk assessments. Where appropriate, leverage security shared services (VRA, VM, Pen Testing) and provide oversight and assurance of cybersecurity controls in development and deployment all the way through the system go-live. Hold great working relationships with the Security Architecture team, Shared Security Service teams, Global Business Services organizations More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Technical Cyber Risk Assessment Manager

Guildford, Surrey, United Kingdom
Hybrid / WFH Options
Deloitte LLP
Lines of Defense (3LOD) model. Possess knowledge of risk management practices and the ability to conduct technical risk assessments. Work with the Global Technology Infrastructure team to integrate system cybersecurity assessments into their processes to ensure consistent implementation of security controls. Work with the Cybersecurity Architecture team and apply reference architectures for security solutions design and implementation. Work with the … Operations Center to evaluate the effectiveness of the security controls and architectures in relationship to actual intrusions seen on the Deloitte network, reported threats at peer organizations, and overall cybersecurity threats in the internet ecosystem and you will notify leadership of potential or existing threats and assist in the development of risk mitigating strategies of these items. Monitor security blogs … information into processes, procedures, and audit preparedness activities. Perform technology security risk assessments. Where appropriate, leverage security shared services (VRA, VM, Pen Testing) and provide oversight and assurance of cybersecurity controls in development and deployment all the way through the system go-live. Hold great working relationships with the Security Architecture team, Shared Security Service teams, Global Business Services organizations More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

ISSE with Security Clearance

Fairfax, Virginia, United States
Zeta Associates Inc
ISSE is to bridge the gap between high level security policies/requirements and technical/operational implementation of those requirements. Candidates should have in-depth understanding of the cybersecurity policies and procedures for Government (DoD, Intelligence Community) sectors information systems and sufficient technical knowledge and experience to implement them. The ISSE will work closely and effectively with the Information … response plans, plan of actions and milestones, risk management plans, vulnerability and compliance scanning, and/or vulnerability management plans. The ISSE will be an experienced System Administrator and Cyber Security Expert. The candidate will be supporting a larger team of developers, engineers, and analysts all charged with expanding, operating, and maintaining information systems built upon hundreds of Linux instances … on virtual and bare metal hardware. Team responsibilities include Linux system build automation, network architecture and implementation, all facets of cyber security compliance, deployment and management of core subsystems and services such as DNS, FreeIPA, email, Jira, Elastic Stack, VMware, Veeam. The team also maintains a small number of Windows systems. The ISSE will assume responsibility for ICD-503 RMF More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

IT Operations Platforms and Security Lead

London
Nexus Jobs Limited
that outsourced and cloud-based services are robust, cost-effective, and aligned with business needs and the Strategic IT vision. They will also play a key role in enhancing cybersecurity, protecting data and systems, driving transformative operational change, enhancing IT processes and ensuring compliance with governance bodies and industry regulations. Due to the nature of the role, complexity Security, Compliance More ❯
Employment Type: Permanent
Posted:

IT Operational Platforms and Security Lead

London, England, United Kingdom
Venquis
that outsourced and cloud-based services are robust, cost-effective, and aligned with business needs and the Strategic IT vision. They will also play a key role in enhancing cybersecurity, protecting data and systems, driving transformative operational change, enhancing IT processes and ensuring compliance with governance bodies and industry regulations. Due to the nature of the role, complexity of the More ❯
Posted:

IT Security and Infrastructure Analyst

Newbury, Berkshire, United Kingdom
Hybrid / WFH Options
Newbury Building Society
problem-solving skills to identify and assess risks, threats, patterns, and trends. Highly organised, with the ability to work effectively under pressure to meet deadlines. An understanding of the cyber security risks associated with various technologies and ways to manage them. In-depth experience of managing hosted and on-premises services and infrastructure, including network, perimeter security, hosting architecture and … cloud services. Good knowledge of Microsoft 365 Defender, Active Directory and Microsoft 365. Knowledge of IT and cyber security principles and best practice. Desirable skills and experience: Experience of as a Security Analyst within a multi-site environment Cyber Security qualification Experience of Azure and AWS Microsoft Certified Professional: - Windows Server - Microsoft 365 - Security Why work for Newbury Building Society More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security Project Manager with Security Clearance

Herndon, Virginia, United States
Quantum Science Solutions
Job Title: Cyber Security Project Manager Location: On-site Herndon, VA Clearance Required: TS/SCI with Full Scope Polygraph Company: Quantum Science Solutions (QSS) Rate: Open Position Overview Quantum Science Solutions (QSS) is seeking a Cyber Security Project Engineer to join a high-performing technical team supporting mission-critical cyber operations for a U.S. Government customer. This individual will … Rapid7, and Qualys. • Track and resolve POA&M items to ensure ongoing compliance and system health. • Utilize compliance platforms such as Xacta 360, RSA Archer, or RiskVision to manage cybersecurity documentation and activity. • Apply the common control provider model to streamline control inheritance across systems. • Coordinate with Security Control Assessors (SCAs) and prepare security packages for formal review. • Conduct and … documentation expectations. • Familiarity with cloud-native security services and secure system lifecycle best practices. • Ability to advise senior leadership on emerging cloud security risks and controls. • Experience collaborating with cybersecurity peers across multiple components. • Ability to review and refine security SOPs to align with evolving program goals and requirements. Education Requirement • Bachelor's degree in Cybersecurity, Information Systems, Computer Science More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

SOC Analyst L1

Birmingham, Staffordshire, United Kingdom
Applicable Limited
levels of supervision. Education Requirements & Experience Minimum of 2 to 3 years of experience in the IT security industry, preferably working in a SOC/NOC environment. Preferably holds Cyber Security Certification e.g. ISC2 CC, EPQ Experience with Cloud platforms (AWS and/or Microsoft Azure) Excellent knowledge of Microsoft Office products, especially Excel and Word Reports to Security Director More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Vulnerability Management Analyst

London, United Kingdom
ION Group
role holder will be expected to cultivate working relationships with other teams and colleagues of varying technical ability. The role would suit a technically strong candidate with an extensive cybersecurity background, at least 5+ years working in a security role, with focus on Vulnerability Management. Responsibilities: This role may require work-out of hours in support of 24x7 globally coordinated More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security Advisor

Leuven, Vlaams-Brabant, Belgium
SecWise
What does a Strategic Cyber Security Advisor do at SecWise? As our Cybersecurity Strategist, you'll bridge cybersecurity practices with our strategic business objectives, ensuring a comprehensive approach to managing cyber risks. Key Responsibilities: Develop and Implement Security Roadmap/Strategy Craft a comprehensive information security strategy that aligns with our customer's business objectives. Establish security policies, standards, and … address possible threats and vulnerabilities. Develop incident response plans and protocols to effectively respond to security incidents. Culture & Awareness Implement security awareness and training programs to educate employees about cybersecurity best practices. Organize security drills and tabletop exercises to test our customer's incident response capabilities. Security Operations Oversee the continuous monitoring and detection of security threats and vulnerabilities to … leadership and the board of directors on security posture, risks, and incidents. Collaborate with our customer's internal teams and external partners to drive security initiatives forward. Advise on cybersecurity investments to support our customer's strategic goals. Who are you? Soft Skills: Strong leadership and strategic thinking abilities to guide our customer's cybersecurity efforts. Excellent communication and interpersonal More ❯
Employment Type: Permanent
Salary: EUR Annual
Posted:

Cyber Security Consultant

Brussel (Stad), Brussel, Belgium
Hybrid / WFH Options
Proximus Group
Freelancer Opportunity Description: Senior Information Security Officer Are you passionate about AI or cybersecurity? You love working with high profile teams with a sure taste for challenge and variety? You dream to join a fast-growing company with start-up mentality? Eager to learn continuously? Join Proximus Ada! Within this Proximus' newly created centre of excellence for AI and Cybersecurity … assist with the overall reinforcement of their security posture. Help them in maintaining their ISO27001 certification or in preparing for an ISO 27001 certification and achieving NIS2 compliance. Perform cybersecurity assessments (NIS2, ISO27001, security maturity, risk) to identify gaps in the security program, define a baseline, As-Is state, to-be desired state and establish a roadmap. Create information security … requests for the products that Proximus offers to its customers by completing security questionnaires within established SLA. Your Profile: Bachelor's bachelor's or a master's degree in cyber security or computer science. 5+ years of experience in a combination of audit, risk management, information security and IT jobs. Knowledge of information security management frameworks, such as ISO More ❯
Employment Type: Permanent
Salary: EUR Annual
Posted:

Cybersecurity Course Instructor with Security Clearance

Hanover, Maryland, United States
Eccalon LLC
Cybersecurity Course Instructor Role The Cybersecurity Course Instructor will be responsible for teaching and facilitating courses in the Cyber Lab cybersecurity program. The Instructor must have skills to build labs, produce capstones, and use blended learning techniques to include reverse learning objectives. The instructor will develop and deliver curriculum aligned with both academic goals and industry standards. This role requires … in-depth knowledge of cybersecurity principles, tools, and best practices. The instructor will also ensure that the courses are engaging, hands-on, and aligned with the latest developments in the field. In addition, the instructor will manage lab environments, provide mentorship, and assess student performance. This position ensures a dynamic, hands-on learning environment that prepares students for the challenges … of cybersecurity careers while aligning with industry standards and evolving threats. The ideal candidate is passionate about teaching and cybersecurity, ready to contribute to a growing and innovative academic program. Responsibilities: Instruction and curriculum Delivery Course Instruction: Teach undergraduate or graduate-level cybersecurity courses, including topics such as network security, ethical hacking, digital forensics, risk management, cryptography, and incident response More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:
Cybersecurity
10th Percentile
£26,250
25th Percentile
£41,250
Median
£51,900
75th Percentile
£72,500
90th Percentile
£95,000