for mitigating risks in complex IT environments. Minimum of 10+ years' experience in vulnerability management, cybersecurity, or IT security. Hands-on experience with Nessus (or similar tools such as OpenVAS, Qualys) for vulnerability scanning and management. Experience with network protocols (TCP/IP, HTTP, DNS, etc.), operating systems (Windows, Linux, macOS), and security best practices. Installing and Configuring Nessus, Nessus More ❯
testing, vulnerability assessment, and application security. Proven track record of executing penetration tests and exploiting vulnerabilities in complex systems and applications. Experience with vulnerability scanning tools (e.g., Nessus, Qualys, OpenVAS) and penetration testing tools (e.g., Metasploit, Burp Suite, Kali Linux). Familiarity with common security frameworks and compliance requirements (e.g., NIST, ISO 27001, GDPR, PCI-DSS) Relevant certifications (e.g., CEH More ❯
Gloucester, Gloucestershire, South West, United Kingdom
Forward Role
of C, C++, or C#. Familiarity with scripting and automation using Python. Experience working with Linux or Windows-based systems. Hands-on experience with vulnerability scanning tools (e.g., Nessus, OpenVAS, Burp Suite, or similar). Familiarity with CVSS scoring, vulnerability databases (e.g., NVD, MITRE ATT&CK), and risk prioritization frameworks. Understanding of patch management processes, secure configuration baselines, and compliance More ❯
impact while meeting compliance deadlines. o Verify patch deployment success and troubleshoot any issues arising from updates. Vulnerability Management: o Perform regular vulnerability scans using tools such as Nessus, OpenVAS, or similar platforms. o Administration of Endpoint Detection and Response (EDR) systems, including Trellix o Analyze scan results, prioritize vulnerabilities based on risk, and develop mitigation strategies. o Track and More ❯
Experience with patch management solutions • Experience with standard forensic practices, imaging software, tools, and techniques • Experience with Security Technical Implementation Guide (STIG) experience • Experience with Vulnerability Management (Nessus, NexPose, OpenVAS, etc) • ELINT, Radio Frequency, Electronic Warfare, and/or SIGINT experience a plus • Translating technical customer requirements into business process and tasking • Technical consulting both buyer and end user customer More ❯
network, which identifies known security flaws. The scanner reports these issues so the IT team can prioritize and fix them to secure the network. Thereare tools like Nessus, Qualys, OpenVAS, Nexpose, Astra etc. CVE stands for Common Vulnerabilities and Exposures and is a standardized identifier for known security vulnerabilities. Each CVE entry includes a uniqueidentifier (e.g., CVE-2024-XXXX), a More ❯
Advise the Information System Owner (ISO) concerning the impact levels for Confidentiality, Integrity, and Availability for the information on systems. Ensure security assessments are completed for each IS. Initiate a POA&M with identified weaknesses and suspense dates for each More ❯
familiarity with Docker, MongoDB, and Elastic Search; Ansible and GitLab; RedHat Satellite. Must have working knowledge of software-defined networks. Experience deploying and maintaining nginx; system monitoring platforms like OpenVAS, Prometheus and Grafana; SELinux and FIPS. Must have knowledge of LatteArt/Biscotti, Netseer, SEAR logging. $210,000 - $235,000 a year The pay range for this job, with multi More ❯