regards to lateral movement and areas where risks can be reduced. Monitor and analyse network traffic to identify potential security threats and lateral movement activities. Conduct vulnerability assessments and penetrationtesting to identify weaknesses in the network. Assist in the development and implementation of security controls to mitigate risks associated with lateral movement protocols. Collaborate with the security … problem-solving skills. Relevant certifications such as CEH, CompTIA Security+, or GIAC are highly desirable. Previous job roles that may indicate success include Network Security Analyst, SOC Analyst, and Penetration Tester. Skills Required: Windows administration skills. Experience with Azure Log Analytics, KQL, and Azure Alerts. Python, Shell, and PowerShell scripting. Protocol analysis. Firewall/IPS/IDS engineering. Knowledge More ❯
regards to lateral movement and areas where risks can be reduced. Monitor and analyse network traffic to identify potential security threats and lateral movement activities. Conduct vulnerability assessments and penetrationtesting to identify weaknesses in the network. Assist in the development and implementation of security controls to mitigate risks associated with lateral movement protocols. Collaborate with the security … problem-solving skills. Relevant certifications such as CEH, CompTIA Security+, or GIAC are highly desirable. Previous job roles that may indicate success include Network Security Analyst, SOC Analyst, and Penetration Tester. Skills Required: Windows administration skills. Experience with Azure Log Analytics, KQL, and Azure Alerts. Python, Shell, and PowerShell scripting. Protocol analysis. Firewall/IPS/IDS engineering. Knowledge More ❯
security policies. Ensure security integration into the Software Development Lifecycle (SSDLC) by collaborating with product owners to implement security best practices. Lead and follow up on non-functional security testing (code scanning, penetrationtesting, threat modelling) and the yearly security auditing campaign, ensuring follow-up as part of the risk management process. Manage the related security risks … in the context of our software development and coordination activities, work with product owners and software development teams on managing identified risks. Provide security expertise to testing teams to enhance security coverage in functional test cases. Organise and perform security trainings for the teams. Support the architecture design activities with security related knowledge. Act as the single point of More ❯
System Security Professional Certification (CISSP) or Security X (previously known as the CASP+) Certification required Must have a solid understanding of security practices and policies and hands-on vulnerability testing experience using Customer tools. Must have experience applying Risk Management Framework. Must have experience formulating and assessing IT security policy. Must have demonstrated knowledge of and experience with common … infrastructure, network and enterprise security architecture) and applying risk assessment methodology to system development. Experience developing/implementing integrated security services management processes, such as assessing and auditing network penetrationtesting, anti-virus planning assistance, risk analysis, and incident response. Experience providing information assurance support for application development that includes system security certifications and project evaluations for firewalls … that encompass the development, design, and implementation. Experience with penetrationtesting tools. Experience with scripting languages. $200,000 - $250,000 a year The pay range for this job, with multi-levels, is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities More ❯
City of London, London, United Kingdom Hybrid / WFH Options
The MDU
part of projects and initiatives. Work with suppliers and vendors to coordinate contract security engineers, ensuring projects are appropriately resourced and deliverables are provided to a high standard. Organise penetrationtesting, managing the necessary remedial work and communicating go-live risks. Contribute to the development of the security architecture, the SDLC, and application security testing standards. Support … point of escalation in the event of Major Incidents, Disaster Recover or Business Continuity scenarios. Work with development teams to ensure applications are delivered having followed best practice security testing as part of the SDLC. Assist the CISO, as required, in the wider delivery of Cyber Security. Skills and Experience: Proven experience in a similar role within a mid More ❯
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetrationtesting reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate SOC/NOC alerts. Our Client is a globally recognised, successful … in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job holder will work very closely with all third-party vendors involved in the remediation process. The job holder will also prepare the necessary More ❯
Responsibilities Partner with development, operations, and security teams to integrate security protocols seamlessly into the software development lifecycle. Design, build, and maintain CI/CD pipelines incorporating automated security testing, vulnerability assessments, and compliance checks. Develop and manage infrastructure as code (IaC) configurations, ensuring secure and scalable cloud resources and infrastructure. Conduct security assessments, code reviews, and penetrationtesting to identify and resolve application, code, and infrastructure vulnerabilities. Monitor system and application logs to detect and address potential security incidents. Implement and oversee identity and access management (IAM) systems to ensure secure authentication and authorization. Provide secure coding guidance to software engineers and assist in remediating security issues. Lead incident response efforts, investigating and mitigating security … code tools, including Terraform, CloudFormation, or Ansible. Strong scripting skills in languages such as Python and Bash for automation and integration. Proficiency with static code analysis, dynamic application security testing (DAST), and vulnerability scanning tools like Fortify and Acunetix. Knowledge: In-depth understanding of security frameworks (e.g., OWASP, NIST) and best practices for mitigating vulnerabilities. Familiarity with common threat More ❯
City of London, London, United Kingdom Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetrationtesting reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate SOC/NOC alerts. Our Client is a globally recognised, successful … in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job holder will work very closely with all third-party vendors involved in the remediation process. The job holder will also prepare the necessary More ❯
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetrationtesting reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate SOC/NOC alerts. Our Client is a globally recognised, successful … in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job holder will work very closely with all third-party vendors involved in the remediation process. The job holder will also prepare the necessary More ❯
City of London, London, United Kingdom Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetrationtesting reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate SOC/NOC alerts. Our Client is a globally recognised, successful … in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job holder will work very closely with all third-party vendors involved in the remediation process. The job holder will also prepare the necessary More ❯
for cloud network architectures , including: AWS VPCs, Security Groups Azure NSGs GCP Firewall Rules Support security incident response by investigating and remediating network-level threats and anomalies. Collaborate with penetrationtesting and vulnerability scanning teams to validate vulnerabilities and verify implemented remediations. Work with GRC and compliance teams to align network configurations with regulatory frameworks like PCI-DSS More ❯
to support our efforts at DISA. Key Responsibilities: Detection/Monitoring : Continuously monitor and analyze systems for unusual activity and potential threats. Vulnerability Assessments : Conduct regular vulnerability assessments and penetrationtesting to identify and address security weaknesses. Incident Response : Investigate security breaches and other cybersecurity incidents, providing timely and effective responses. Security Measures : Develop and implement robust security More ❯
financial services or large-scale enterprises, with an understanding of regulatory requirements in IT and cybersecurity. Security certifications such as CISSP, CISM, CCSK, or similar. Familiarity with vulnerability management, penetrationtesting, and reviewing IT and security clauses in contracts. Knowledge of control frameworks and audit methodologies within second line risk functions. Strong communication and influencing skills, capable of More ❯
Proficiency in shell scripting, creating Snort rules, or other log-searching query languages. Confidence in handling common security incidents independently. Good understanding of Vulnerability Scanning, Management, and Ethical Hacking (PenetrationTesting). Knowledge of ITIL disciplines such as Incident, Problem, and Change Management. Ability to work with minimal supervision. Willingness to work in a 24/7 operations More ❯
experience with cloud platforms (AWS, Azure, or GCP) - cloud security knowledge preferred. Familiarity with virtualization technologies and associated security controls. Demonstrated experience in at least one of the following: PenetrationTesting : Offensive security and exploitation techniques. Digital Forensics : Host, network, or memory-based investigation. Threat Hunting : Detection engineering and hypothesis-driven threat investigation. Knowledge of modern security tooling More ❯
Lead and manage IT security incidents, including forensics when necessary. Security Services: Drive the delivery of services including Threat & Vulnerability Management, Privileged Access Management, IAM, DLP, Network Security, and Penetration Testing. Project Leadership: Lead IT/Cybersecurity improvement projects as an SME. Risk & Compliance: Evaluate IT changes for security risks, ensuring compliance with security policies and frameworks like ISO More ❯
best practices within the SDLC, collaborating with developers to ensure secure coding. Conduct security assessments, identify potential threats, and mitigate risks in web and mobile applications. Perform application security testing (SAST, DAST) and manual security code reviews. Implement and manage security tools such as SAST, DAST, SCA, and CI/CD security integrations. Investigate security incidents, prioritise remediation and … ISO 27001) and regulatory requirements (GDPR, PCI-DSS, etc.) Educate engineers and stakeholders on security threats, vulnerabilities and secure coding practices. Skills 5+ years of experience in application security, penetrationtesting, or software security engineering. Strong knowledge of secure coding principles in one or more languages (e.g., Python, Java, JavaScript, Go, .NET). Hands-on experience with SAST … AWS, Azure, GCP) and container security (Docker, Kubernetes). Knowledge of OWASP Top 10, CWE, CVSS, MITRE ATT&CK and NIST frameworks. Experience conducting threat modelling, code reviews and penetration testing. Excellent communication skills with the ability to influence and educate development teams. Security certifications such as CISSP, OSCP, GWAPT, CEH or CSSLP are a plus. Experience with Infrastructure More ❯
best practices within the SDLC, collaborating with developers to ensure secure coding. Conduct security assessments, identify potential threats, and mitigate risks in web and mobile applications. Perform application security testing (SAST, DAST) and manual security code reviews. Implement and manage security tools such as SAST, DAST, SCA, and CI/CD security integrations. Investigate security incidents, prioritise remediation and … ISO 27001) and regulatory requirements (GDPR, PCI-DSS, etc.) Educate engineers and stakeholders on security threats, vulnerabilities and secure coding practices. Skills 5+ years of experience in application security, penetrationtesting, or software security engineering. Strong knowledge of secure coding principles in one or more languages (e.g., Python, Java, JavaScript, Go, .NET). Hands-on experience with SAST … AWS, Azure, GCP) and container security (Docker, Kubernetes). Knowledge of OWASP Top 10, CWE, CVSS, MITRE ATT&CK and NIST frameworks. Experience conducting threat modelling, code reviews and penetration testing. Excellent communication skills with the ability to influence and educate development teams. Security certifications such as CISSP, OSCP, GWAPT, CEH or CSSLP are a plus. Experience with Infrastructure More ❯
Colorado Springs, Colorado, United States Hybrid / WFH Options
OSAAVA Services
Description: We are seeking Cybersecurity Software Evaluators to assess and analyze the security of software applications used in high-security government environments. This role involves conducting cyber evaluations, security testing, and risk assessments on software applications to ensure compliance with Department of Defense (DoD) cybersecurity standards. This position is initially for a few months with the potential for long … Test applications for compliance with DoD cybersecurity frameworks, including NIST 800-53, RMF, and STIGs. • Work closely with developers, security engineers, and system administrators to implement security recommendations. • Perform penetrationtesting and vulnerability assessments on government software systems. • Document findings, create security reports, and provide actionable recommendations for remediation. • Assist with the development of secure coding practices and … with the ability to maintain it in valid status. • Bachelor's degree in Cybersecurity, Computer Science, or related field (or equivalent experience). • 5+ years of experience in cybersecurity, penetrationtesting, or software security evaluation. • Certifications such as CISSP, CEH, OSCP, or GIAC GWEB are highly preferred. • Experience with secure coding practices and software vulnerability assessment tools (e.g. More ❯
incident analysis, investigation, and mitigation. Oversee and maintain security equipment including firewalls, intrusion prevention systems (IPS), web application firewalls (WAF), and antivirus systems. Perform periodic security drills and regular penetrationtesting to ensure the integrity of security systems. Harden security controls across Windows and Linux environments and ensure regular patching and firmware upgrades. Enhance data security through robust … encryption practices during usage, storage, transfer, and disposal. Conduct security evaluations on network and firewall policies and manage application security in both development and testing phases (SAST, DAST). Liaise with internal audit teams and international cybersecurity operations centres to implement security policies and controls. Provide cybersecurity training to ensure staff awareness and compliance. Skills & Qualifications: Minimum 3 years More ❯
incident analysis, investigation, and mitigation. Oversee and maintain security equipment including firewalls, intrusion prevention systems (IPS), web application firewalls (WAF), and antivirus systems. Perform periodic security drills and regular penetrationtesting to ensure the integrity of security systems. Harden security controls across Windows and Linux environments and ensure regular patching and firmware upgrades. Enhance data security through robust … encryption practices during usage, storage, transfer, and disposal. Conduct security evaluations on network and firewall policies and manage application security in both development and testing phases (SAST, DAST). Liaise with internal audit teams and international cybersecurity operations centres to implement security policies and controls. Provide cybersecurity training to ensure staff awareness and compliance. Skills & Qualifications: Minimum 3 years More ❯
value. Assist in managing security incidents, vulnerabilities, and malfunctions, ensuring efficient resolution. Conduct forensically sound acquisitions of computer systems and media for evidence collection. Provide advice and guidance in penetrationtesting and improving service offerings. Carry out reviews, internal audits, and spot-checks to ensure effective operation of security measures. Provide expertise in the design and implementation of … science. This will require occasional periods of intense concentration to ensure any evidence collected can be used in a court of law. 16. Provide appropriate advice and guidance in penetrationtesting and improving the service offering. 17. Carry out reviews, internal audits and spot-checks to ensure the effective operation of (but not limited to): IDS/IPS More ❯
value. Assist in managing security incidents, vulnerabilities, and malfunctions, ensuring efficient resolution. Conduct forensically sound acquisitions of computer systems and media for evidence collection. Provide advice and guidance in penetrationtesting and improving service offerings. Carry out reviews, internal audits, and spot-checks to ensure effective operation of security measures. Provide expertise in the design and implementation of … science. This will require occasional periods of intense concentration to ensure any evidence collected can be used in a court of law. 16. Provide appropriate advice and guidance in penetrationtesting and improving the service offering. 17. Carry out reviews, internal audits and spot-checks to ensure the effective operation of (but not limited to): IDS/IPS More ❯
expectations. Responsibilities Collaborate with cross-functional teams to integrate robust security measures throughout the software development lifecycle. Design, implement, and manage CI/CD pipelines that include automated security testing, vulnerability scanning, and compliance validation. Develop and maintain infrastructure as code (IaC) configurations to ensure secure, scalable cloud and infrastructure deployments. Conduct comprehensive security assessments, code reviews, and penetrationtesting to identify and mitigate vulnerabilities. Monitor system and application logs for potential security threats and respond to incidents promptly. Implement and oversee identity and access management (IAM) solutions, maintaining secure authentication and authorization processes. Advise software engineers on secure coding practices and assist in addressing security vulnerabilities. Contribute to incident response activities by investigating and mitigating breaches More ❯
Experience with NIST Risk Management Framework or other similar control framework • Knowledge of vulnerability assessment tools including Nessus, Wireshark, Kali Linux, Nmap, Metasploit, and Lin/WinPEAS • Experience with penetrationtesting, adversarial emulation, or red teaming 2) Cloud Engineer A candidate must meet ALL of the below criteria. The candidate must: • Have one of the following o A More ❯