cyber network operational capabilities to develop exploitation plans and make operational adjustments during execution. Additional relevant experience includes engineering hardware and software, programming, computer and network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and network and systems administration. The Exploitation Analyst shall possess the following capabilities: Experience in computer or information systems design/… development/analysis roles Experience engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration The ability to apply deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments as More ❯
connections, and traffic movements. Relevant experience includes computer or information systems design, development, and analysis, as well as engineering hardware and software, programming, computer and network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and network and systems administration. The Level 1 Digital Network Exploitation Analyst shall possess the following capabilities: Experience in computer or … information systems design, development, or analysis. Background in hardware/software engineering, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, or network and systems administration. Completion of military training in a relevant area such as the Joint Cyber Analysis Course (JCAC) may count towards the experience requirement (24-week JCAC course More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Corriculo Ltd
security team, monitoring and analysing real-time security events using SIEM tools to detect and respond to potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will investigate security incidents and conduct forensic analysis to determine the root cause and recommend remediation actions. Outside of … Firewalls, VPN, EDR/XDR, mail filtering and other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetrationtesting/vulnerability scanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don't meet More ❯
and Risk Management! Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Security Engineering, Vulnerability Testing, PenetrationTesting, Risk Management and Assessment, Insider Threat Analysis, and IT Policies and Procedures by improving, protecting, and defending our Nation's Security. Job Description: Identify overall … security requirements for the protection of data to ensure the implementation of appropriate information security controls. Provide analysis of customer mission needs to determine functional testing requirements. Work with security control assessors on systems testing. Perform functional analysis to identify required tasks and their interrelationships. Identify required resources. Maintain security posture for Information Systems or programs to ensure Information … The Level 2 Functional Analyst shall possess the following capabilities: Perform functional analysis to identify critical Cybersecurity tasks required and their interrelationships. Analyze customer/mission needs to determine testing requirements. Identify required resources to enable creation, registration, and assignment of SSPs in conjunction with Delegated Authorizing Officials (DAOs), ISSO's, and System Owners. Review and update organizational documentation More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Corriculo Ltd
security team, monitoring and analysing real-time security events using SIEM tools to detect and respond to potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will investigate security incidents and conduct forensic analysis to determine the root cause and recommend remediation actions. Outside of … Firewalls, VPN, EDR/XDR, mail filtering and other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetrationtesting/vulnerability scanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don't meet More ❯
respond to potential threats. Utilise advanced tools and techniques to analyse security data and identify patterns or anomalies that may indicate a security breach. Review regular vulnerability assessments and penetrationtesting to ensure the robustness of security measures. Ensure rapid response to common incidents: Contribute to incident response plans to address security breaches promptly and effectively. Key Skills More ❯
Edinburgh, Scotland, United Kingdom Hybrid / WFH Options
Acumin
and external partners to ensure data integrity and alignment What We’re Looking For: Deep understanding of cybersecurity operations, particularly in CIM and TVM (incident detection, response, patching, and penetrationtesting) Strong analytical and data visualization skills Ability to drive cross-functional collaboration in a geographically distributed environment Proven organizational skills and ability to manage competing priorities Qualifications More ❯
Edinburgh, Midlothian, United Kingdom Hybrid / WFH Options
Red Snapper Recruitment Limited
and external partners to ensure data integrity and alignment What We're Looking For: Deep understanding of cybersecurity operations, particularly in CIM and TVM (incident detection, response, patching, and penetrationtesting) Strong analytical and data visualization skills Ability to drive cross-functional collaboration in a geographically distributed environment Proven organizational skills and ability to manage competing priorities Qualifications More ❯
Edinburgh, City of Edinburgh, United Kingdom Hybrid / WFH Options
Red Snapper Recruitment Limited
and external partners to ensure data integrity and alignment What We're Looking For: Deep understanding of cybersecurity operations, particularly in CIM and TVM (incident detection, response, patching, and penetrationtesting) Strong analytical and data visualization skills Ability to drive cross-functional collaboration in a geographically distributed environment Proven organizational skills and ability to manage competing priorities Qualifications More ❯
Ability to convey technical findings clearly to various audiences. Preferred , Advanced degree in Cybersecurity, Computer Science, or related field. Industry certifications (CISSP, CEH, OSCP, GIAC, etc.). Experience with penetrationtesting, red/blue teaming, or automated threat detection. Knowledge of mobile/wireless technologies and data visualization tools. Foreign language skills are a plus. Location: Chantilly, VA More ❯
computer or information systems design/development/analysis roles. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
and Risk Management! Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Security Engineering, Vulnerability Testing, PenetrationTesting, Risk Management and Assessment, Insider Threat Analysis, and IT Policies and Procedures by improving, protecting, and defending our Nation's Security. Job Description: Collaborate with More ❯
Conduct on-site evaluations Validate the security requirements of the information system Verify and validates that the system meets the security requirements Provide vulnerability assessment of the system Coordinate penetrationtesting Provide a comprehensive verification and validation report (certification report) for the information system Provide process improvement recommendations Assist the Government to draft standards and guidelines for usage More ❯
to Methodically Find Faults and perform Root Cause Analysis • Able to evaluate multiple courses of action, achieving goals by non-standard means if necessary • System Regression • Protocol Analysis • Load Testing • Availability and Resilience Optimisation • Lockdowns and Basic PenetrationTesting Technologies • Operating Systems and Virtualisation (Windows and Linux) • Infrastructure as Code and Operational Automation (e.g. Terraform, Ansible) • Message More ❯
controls to secure systems, applications, network, or infrastructure services Hands-on experience with security tools and devices such as network firewalls, web proxy, intrusion prevention system, vulnerability scanner, and penetrationtesting tools. Demonstrated understanding of TCP/IP networking concepts and DNS. 3+ years of related Identity Management tools engineering experience, including installing, configuring and troubleshooting experience with More ❯
controls to secure systems, applications, network, or infrastructure services Hands-on experience with security tools and devices such as network firewalls, web proxy, intrusion prevention system, vulnerability scanner, and penetrationtesting tools. Demonstrated understanding of TCP/IP networking concepts and DNS. 3+ years of related Identity Management tools engineering experience, including installing, configuring and troubleshooting experience with More ❯
computer or information systems design/development/analysis roles. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
Huntsville, Alabama, United States Hybrid / WFH Options
Gridiron IT Solutions
and procedures Experience with computer programming languages, including PhP, Python, SQL, C++, Perl, or Java Experience with SIEM and Endpoint tools, including Splunk, Defender, QRadar, and ArcSight Experience with penetrationtesting CEH and Security+ or CSA+ Certification GIAC Cyber Threat Intelligence (GCTI) Certification Clearance: Applicants selected will be subject to a security investigation and may need to meet More ❯
computer or information systems design/development/analysis roles. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
computer or information systems design/development/analysis roles. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
have experience in computer or information systems design/development/analysis roles, which may include: Engineering hardware and/or software Programming Computer/network security Vulnerability analysis Penetrationtesting Computer forensics Information assurance Systems engineering Network and systems administration Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) may be More ❯
as a Recruitment Agency Partner, it is essential and your responsibility to ensure that candidates applying to LSEG are aware of this privacy notice. Similar Jobs (2) Senior Manager, PenetrationTesting locations 2 Locations time type Full time posted on Posted 30+ Days Ago Senior Analyst, Technology and Cyber Security GRC locations London, United Kingdom time type Full More ❯
defending our Nation's Security. Job Description: We are looking for a Computer Network Defense Analyst (CNDA) with experience in computer or information systems design, programming, cybersecurity, vulnerability analysis, penetrationtesting, computer forensics, information assurance, and systems engineering. You will utilize information from various sources, such as intrusion detection systems, firewalls, network traffic logs, and host system logs More ❯
defending our Nation's Security. Job Description: We are looking for a Computer Network Defense Analyst (CNDA) with experience in computer or information systems design, programming, cybersecurity, vulnerability analysis, penetrationtesting, computer forensics, information assurance, and systems engineering. You will utilize information from various sources, such as intrusion detection systems, firewalls, network traffic logs, and host system logs More ❯
defending our Nation's Security. Job Description: We are looking for a Computer Network Defense Analyst (CNDA) with experience in computer or information systems design, programming, cybersecurity, vulnerability analysis, penetrationtesting, computer forensics, information assurance, and systems engineering. You will utilize information from various sources, such as intrusion detection systems, firewalls, network traffic logs, and host system logs More ❯