of areas such as access management, IT operations, job scheduling/monitoring, data transfer (focusing on the completeness/accuracy of this), network security, cyber security, system development and testing, vulnerability assessment and penetrationtesting, and operational resilience. Must Haves: Previous experience as a technology auditor covering IT application and general controls, application development, information security, technology More ❯
cyber network operational capabilities to develop exploitation plans and make operational adjustments during execution. Additional relevant experience includes engineering hardware and software, programming, computer and network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and network and systems administration. The Level 3 Exploitation Analyst shall possess the following capabilities: Experience in computer or information systems … design/development/analysis roles Experience engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration The ability to apply deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational More ❯
cyber network operational capabilities to develop exploitation plans and make operational adjustments during execution. Additional relevant experience includes engineering hardware and software, programming, computer and network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and network and systems administration. The Exploitation Analyst shall possess the following capabilities: Experience in computer or information systems design/… development/analysis roles Experience engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration The ability to apply deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments as More ❯
cyber network operational capabilities to develop exploitation plans and make operational adjustments during execution. Additional relevant experience includes engineering hardware and software, programming, computer and network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and network and systems administration. The Exploitation Analyst shall possess the following capabilities: Experience in computer or information systems design/… development/analysis roles Experience engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration The ability to apply deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments as More ❯
cyber network operational capabilities to develop exploitation plans and make operational adjustments during execution. Additional relevant experience includes engineering hardware and software, programming, computer and network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and network and systems administration. The Exploitation Analyst shall possess the following capabilities: Experience in computer or information systems design/… development/analysis roles Experience engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration The ability to apply deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments as More ❯
cyber network operational capabilities to develop exploitation plans and make operational adjustments during execution. Additional relevant experience includes engineering hardware and software, programming, computer and network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and network and systems administration. The Exploitation Analyst shall possess the following capabilities: Experience in computer or information systems design/… development/analysis roles Experience engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration The ability to apply deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments as More ❯
cyber network operational capabilities to develop exploitation plans and make operational adjustments during execution. Additional relevant experience includes engineering hardware and software, programming, computer and network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and network and systems administration. The Exploitation Analyst shall possess the following capabilities: Experience in computer or information systems design/… development/analysis roles Experience engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration The ability to apply deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments as More ❯
cyber network operational capabilities to develop exploitation plans and make operational adjustments during execution. Additional relevant experience includes engineering hardware and software, programming, computer and network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and network and systems administration. The Exploitation Analyst shall possess the following capabilities: Experience in computer or information systems design/… development/analysis roles Experience engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration The ability to apply deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments as More ❯
cyber network operational capabilities to develop exploitation plans and make operational adjustments during execution. Additional relevant experience includes engineering hardware and software, programming, computer and network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and network and systems administration. The Exploitation Analyst shall possess the following capabilities: Experience in computer or information systems design/… development/analysis roles Experience engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration The ability to apply deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments as More ❯
connections, and traffic movements. Relevant experience includes computer or information systems design, development, and analysis, as well as engineering hardware and software, programming, computer and network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and network and systems administration. The Level 1 Digital Network Exploitation Analyst shall possess the following capabilities: Experience in computer or … information systems design, development, or analysis. Background in hardware/software engineering, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, or network and systems administration. Completion of military training in a relevant area such as the Joint Cyber Analysis Course (JCAC) may count towards the experience requirement (24-week JCAC course More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Corriculo Ltd
security team, monitoring and analysing real-time security events using SIEM tools to detect and respond to potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will investigate security incidents and conduct forensic analysis to determine the root cause and recommend remediation actions. Outside of … Firewalls, VPN, EDR/XDR, mail filtering and other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetrationtesting/vulnerability scanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don't meet More ❯
and Risk Management! Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Security Engineering, Vulnerability Testing, PenetrationTesting, Risk Management and Assessment, Insider Threat Analysis, and IT Policies and Procedures by improving, protecting, and defending our Nation's Security. Job Description: Identify overall … security requirements for the protection of data to ensure the implementation of appropriate information security controls. Provide analysis of customer mission needs to determine functional testing requirements. Work with security control assessors on systems testing. Perform functional analysis to identify required tasks and their interrelationships. Identify required resources. Maintain security posture for Information Systems or programs to ensure Information … The Level 2 Functional Analyst shall possess the following capabilities: Perform functional analysis to identify critical Cybersecurity tasks required and their interrelationships. Analyze customer/mission needs to determine testing requirements. Identify required resources to enable creation, registration, and assignment of SSPs in conjunction with Delegated Authorizing Officials (DAOs), ISSO's, and System Owners. Review and update organizational documentation More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Corriculo Ltd
security team, monitoring and analysing real-time security events using SIEM tools to detect and respond to potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will investigate security incidents and conduct forensic analysis to determine the root cause and recommend remediation actions. Outside of … Firewalls, VPN, EDR/XDR, mail filtering and other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetrationtesting/vulnerability scanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don't meet More ❯
respond to potential threats. Utilise advanced tools and techniques to analyse security data and identify patterns or anomalies that may indicate a security breach. Review regular vulnerability assessments and penetrationtesting to ensure the robustness of security measures. Ensure rapid response to common incidents: Contribute to incident response plans to address security breaches promptly and effectively. Key Skills More ❯
Edinburgh, Scotland, United Kingdom Hybrid / WFH Options
Acumin
and external partners to ensure data integrity and alignment What We’re Looking For: Deep understanding of cybersecurity operations, particularly in CIM and TVM (incident detection, response, patching, and penetrationtesting) Strong analytical and data visualization skills Ability to drive cross-functional collaboration in a geographically distributed environment Proven organizational skills and ability to manage competing priorities Qualifications More ❯
Edinburgh, Midlothian, United Kingdom Hybrid / WFH Options
Red Snapper Recruitment Limited
and external partners to ensure data integrity and alignment What We're Looking For: Deep understanding of cybersecurity operations, particularly in CIM and TVM (incident detection, response, patching, and penetrationtesting) Strong analytical and data visualization skills Ability to drive cross-functional collaboration in a geographically distributed environment Proven organizational skills and ability to manage competing priorities Qualifications More ❯
Edinburgh, City of Edinburgh, United Kingdom Hybrid / WFH Options
Red Snapper Recruitment Limited
and external partners to ensure data integrity and alignment What We're Looking For: Deep understanding of cybersecurity operations, particularly in CIM and TVM (incident detection, response, patching, and penetrationtesting) Strong analytical and data visualization skills Ability to drive cross-functional collaboration in a geographically distributed environment Proven organizational skills and ability to manage competing priorities Qualifications More ❯
Ability to convey technical findings clearly to various audiences. Preferred , Advanced degree in Cybersecurity, Computer Science, or related field. Industry certifications (CISSP, CEH, OSCP, GIAC, etc.). Experience with penetrationtesting, red/blue teaming, or automated threat detection. Knowledge of mobile/wireless technologies and data visualization tools. Foreign language skills are a plus. Location: Chantilly, VA More ❯
computer or information systems design/development/analysis roles. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
and Risk Management! Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Security Engineering, Vulnerability Testing, PenetrationTesting, Risk Management and Assessment, Insider Threat Analysis, and IT Policies and Procedures by improving, protecting, and defending our Nation's Security. Job Description: Collaborate with More ❯
Conduct on-site evaluations Validate the security requirements of the information system Verify and validates that the system meets the security requirements Provide vulnerability assessment of the system Coordinate penetrationtesting Provide a comprehensive verification and validation report (certification report) for the information system Provide process improvement recommendations Assist the Government to draft standards and guidelines for usage More ❯
to Methodically Find Faults and perform Root Cause Analysis • Able to evaluate multiple courses of action, achieving goals by non-standard means if necessary • System Regression • Protocol Analysis • Load Testing • Availability and Resilience Optimisation • Lockdowns and Basic PenetrationTesting Technologies • Operating Systems and Virtualisation (Windows and Linux) • Infrastructure as Code and Operational Automation (e.g. Terraform, Ansible) • Message More ❯
controls to secure systems, applications, network, or infrastructure services Hands-on experience with security tools and devices such as network firewalls, web proxy, intrusion prevention system, vulnerability scanner, and penetrationtesting tools. Demonstrated understanding of TCP/IP networking concepts and DNS. 3+ years of related Identity Management tools engineering experience, including installing, configuring and troubleshooting experience with More ❯
controls to secure systems, applications, network, or infrastructure services Hands-on experience with security tools and devices such as network firewalls, web proxy, intrusion prevention system, vulnerability scanner, and penetrationtesting tools. Demonstrated understanding of TCP/IP networking concepts and DNS. 3+ years of related Identity Management tools engineering experience, including installing, configuring and troubleshooting experience with More ❯
computer or information systems design/development/analysis roles. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯