is. SIEM, IDS/IPS, ASM, WAF) to safeguard against security breaches, cyber threats and unauthorized access Report on and assist with all security events and incidents. Oversee Security testing, including penetrationtesting and vulnerability scanning Ensure products compliance with security standards and regulations Ensure NAVBLUE Security strategy deployment within technical operations Ensure effective synchronization and alignment … Excellent management, analytical and problem-resolution skills Working knowledge of the SDLC and AWS network architecture Knowledge of the SAFe Agile method would be an asset Understanding of security testing in the software pipeline (SAST, DAST, SCA, RASP) Knowledge of STRIDE, DICE and other threat and risk frameworks Knowledge of AWS tools Proven experience managing multiple projects simultaneously Practical More ❯
is. SIEM, IDS/IPS, ASM, WAF) to safeguard against security breaches, cyber threats and unauthorized access Report on and assist with all security events and incidents. Oversee Security testing, including penetrationtesting and vulnerability scanning Ensure products compliance with security standards and regulations Ensure NAVBLUE Security strategy deployment within technical operations Ensure effective synchronization and alignment … Excellent management, analytical and problem-resolution skills Working knowledge of the SDLC and AWS network architecture Knowledge of the SAFe Agile method would be an asset Understanding of security testing in the software pipeline (SAST, DAST, SCA, RASP) Knowledge of STRIDE, DICE and other threat and risk frameworks Knowledge of AWS tools Proven experience managing multiple projects simultaneously Practical More ❯
implementation Information Security Maturity Audits/CMMI Certification or alignment with recognised industry standards Compliance with applicable regulations & legislation Building and implementing governance & risk management processes Design implementation and testing of security tooling BC/DR & Incident response capability building and testing Production of threat intelligence reports and research Supply Chain Risk Management Consultants must possess and be … limited oversight. There is a base requirement to demonstrate understanding of and find ways to integrate activity with BlueVoyant colleagues across the globe, specifically Digital Forensics, Incident Response and PenetrationTesting specialists as well as wider BlueVoyant service offerings when appropriate, to produce threat-aware products, services and outputs that are impactful, efficient, cohesive, and are enhanced with More ❯
expert advice and guidance on security best practices for AI development and deployment. Stay up to date on the latest AI security threats and vulnerabilities. Conduct security audits and penetrationtesting of AI systems. Collaboration: Collaborate with data scientists, AI engineers, and other stakeholders to ensure security is integrated throughout the AI lifecycle. Communicate security risks and recommendations More ❯
risks through risk analysis and management frameworks. Security Architecture Design : Creating and maintaining security architecture frameworks and models, such as SABSA, TOGAF, and NIST. Vulnerability Management : Conducting vulnerability assessments, penetrationtesting, and managing remediation efforts. Cloud Security : Implementing security measures for cloud environments, including AWS, Azure, and Google Cloud Platform. Non-technical requirements: Good presenter who can convey More ❯
Security Tooling: Contribute to the creation and maintenance of in-house tools that enhance our security capabilities and automation. Product Security Support: Assist in security assessments, threat modeling, and penetrationtesting, working closely with the Product Security team. Secure Development Lifecycle: Help implement and improve security gates within the SDLC. Adapt & Collaborate: Be prepared to dive into any More ❯
or Practitioner AWS Certified Security Familiarity with TCP/IP, DNS, firewalls, VPNs, and VLANs. Basic experience with SIEMs and security logs Understanding of vulnerability management practices Understanding of penetrationtesting, Threat Hunting, Red Teaming methodologies Familiarity with application security and OWASP Top Ten Scripting languages Experience with capture-the-flags Familiarity with audit principles and different information More ❯
enhance the cybersecurity posture of assigned programs by tracking evolving cyber threats, adopting emerging technologies, and applying industry best practices. Perform continuous risk assessments, conduct vulnerability scans, and support penetrationtesting activities to proactively identify and mitigate potential threats. Provide expert technical guidance to multi-disciplinary teams and stakeholders on cybersecurity solutions, compliance strategies, and secure system architecture. More ❯
of the Cloud Platform, DevSecOps, Endpoints, Virtual Networks, and the Fnality Payment System. As the SME, this person will ensure security across the group, lead cyber projects, manage pen testing engagements, train junior team members, and handle daily security requirements. Role & Responsibilities Develop and implement security requirements for Fnality's platform, DevOps, security, and infrastructure. Support and secure Fnality … of secure, large-scale cloud projects. Knowledge of standards like ISO27001 and NIST. Experience with vulnerability detection tools, email security gateways, EDR solutions, and SIEM. Red teaming or pen testing experience is advantageous. Securing DevOps pipelines. Proficiency with containerization (Docker, Kubernetes, Helm). Scripting skills for automation. Strong understanding of network and security concepts. Experience with M365 and Azure More ❯
vulnerability management, firewalls, and network security. Hands-on experience in security control implementation and maintenance (e.g. ISO27001, Cyber Essentials). Familiarity with MITRE ATT&CK, incident response methodologies, and penetration testing. Experience in risk management, vendor security assessments, and compliance. Understanding of UK regulations, including Cyber Essentials, ISO27001, NIST CSF, and GDPR. Ability to support internal/external audits More ❯
Fort Belvoir, Virginia, United States Hybrid / WFH Options
Woodside Staffing Solutions & Consulting
years of experience with DOD Vulnerability Management System Bachelor's degree preferred DoD 8570.01-M Certification: DFARS Information Assurance Contractor DISA FSO certified CCRI Team Lead and certification in penetrationtesting, such as: o Licensed Penetration Tester (LPT) o Certified Expert Penetration Tester (CEPT) o Certified Ethical Hacker (CEH) o Global Information Assurance Certification Penetration Tester (GPEN) Additional Qualifications: • Proven proficiency performing CCRI/vulnerability assessment/penetrationtesting on networks, databases, computer applications and IT frameworks. • Strong analytical and problem-solving skills for resolving security issues. • Strong skills implementing and configuring networks and networks components. • Command Cyber Readiness Inspection certification in at least one of the following areas: o Retina scan … Detect o Physical Security • Required to possess a DOD SECRET Clearance and be eligible for an IT-II upon assignment. • DISA FSO certified CCRI Team Lead and certification in penetrationtesting, such as: o Licensed Penetration Tester (LPT) o Certified Expert Penetration Tester (CEPT) o Certified Ethical Hacker (CEH) o Global Information Assurance Certification PenetrationMore ❯
Engineer, you will work on developing and implementing advanced cyber defense technologies, securing sensitive systems, and supporting risk management processes. You will ensure compliance with cybersecurity frameworks, lead cyber testing initiatives, and contribute to obtaining and maintaining Authority to Operate (ATO) within secure systems. What You'll Do: • Cyber Artifacts Management: Manage and assess cyber artifacts to ensure proper … documentation and readiness for cyber assessments. • Cyber Testing: Develop, execute, and analyze cyber testing efforts including penetration tests, vulnerability assessments, and cybersecurity audits. • Risk Management Framework (RMF) Implementation: Guide and support the implementation of the RMF process, including categorizing information systems, selecting security controls, and managing security control assessments. • STIG Compliance: Ensure systems are compliant with Security … and clients to ensure alignment with project goals and compliance with cybersecurity best practices. • Documentation & Reporting: Assist in the creation of technical documents, maintain a detailed record of cyber testing activities, and ensure accuracy in reports for security reviews. Key Responsibilities: • Manage and review cybersecurity artifacts for accuracy and compliance with government standards. • Develop detailed cyber testing scenarios More ❯
Risk Management Framework (RMF), NMAP, PKI, Wireshark, auditing, penetrationtesting, scripting, IASAE, CISSP, ISSEP, NISCAP Due to federal contract requirements, United States citizenship and an active TS/SCI security clearance and polygraph are required for the position. Required: Must be a US Citizen Must have TS/SCI clearance w/active polygraph Bachelor's degree in … key infrastructure, network and enterprise security architecture and applying risk assessment methodology to system development. Must have a solid understanding of security practices and policies and hands-on vulnerability testing experience. Must have experience applying Risk Management Framework. Must have experience formulating and assessing IT security policy. Must have demonstrated knowledge of and experience with common security tools, such … Information Systems Security Engineering Professional ISSEP Certification. Computer Information Systems Security Professional CISSP Certification. Experience developing/implementing integrated security services management processes, such as assessing and auditing network penetrationtesting, anti-virus planning assistance, risk analysis, and incident response. Experience providing information assurance support for application development that includes system security certifications and project evaluations for firewalls More ❯
support of mission-critical programs focused on our National Security. Role Description: This position requires a solid understanding of security practices and policies as well as hands-on vulnerability testing experience. The selected candidate will have numerous responsibilities from day to day drawn from a wide array of activities. The strongest candidates will have experience working in these areas … system implementation against multiple security compliance policies and recommending and implementing enhancements. Evaluating the impact of new development on the operational security posture of the system. Evaluating, reviewing, and testing security-critical software. Proposing, assessing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies. Auditing and assessing system security configuration settings using common methodologies and tools. Managing … other IA program support functions. Working with development teams to enrich team-wide understanding of different types of vulnerabilities, attack vectors and remediation approaches. Planning and conducting security verification testing of relevant type 1 devices. Required Skills and Qualifications: To be eligible for this position you must hold an active TS/SCI clearance with Polygraph. Must have a More ❯
What You'll Be Working On: ️ Designing, implementing, and managing security architectures to safeguard systems and networks ️ Conducting vulnerability assessments, penetrationtesting, and risk analyses to identify and mitigate potential threats ️ Implementing and managing security tools such as firewalls, intrusion detection/prevention systems (IDS/IPS), and endpoint protection ️ Monitoring security alerts, investigating incidents, and responding to More ❯
Electrical Engineering, Information systems, Information Technology, Cybersecurity, or a closely related discipline. Four years of additional demonstrated work experience in Security Control Assessor (SCA) and Defensive Cyber Operations (DCO)Testing will be accepted in lieu of a bachelor's degree. A Master's degree in an applicable discipline be substituted for three years of demonstrated work experience • Three … a cloud computing environment. • Strong writing skills. • Write final reports and defend all findings, including risk or vulnerability, mitigation strategies, and references. • Report vulnerabilities identified during security assessments. • Write penetrationtesting Rules of Engagement (ROE), Test Plans, and Standard Operating Procedures (SOP). • Conducted security reviews, technical research and provided reporting to increase security defense mechanisms. • Travel Domestic More ❯
Analyst Location: Newport, RI Full Time (Y/N): Y Status (Exempt/Non-Exempt): Exempt Clearance: Top Secret/SCI Primary Responsibilities: • Analysis, documentation and development of integration, testing, operations, and maintenance of system security. • Use data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs.) to analyze events from environments to … Detection System, policy server, IAVA management, Defense Information Systems Agency, Host Based Security System, Secure Configuration Compliance Validation Initiative, and Secure Configuration Remediation Initiative tools. • Virtual Private network management, penetrationtesting, forensics research and analysis, web content filter management, security incident reporting, and vulnerability scanning. • Knowledge of cybersecurity principles, cyber threats and vulnerabilities. • Analyze network alerts from enterprise More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sparta Global Limited
partners as a 'Spartan' consultant. In this role you will undertake: Network Security - Understanding of firewall configuration, intrusion detection/prevention systems (IDS/IPS), and secure network protocols. PenetrationTesting & Vulnerability Assessment - Skills in identifying, simulating, and remediating vulnerabilities through tools (e.g., Nessus, Metasploit) and manual testing. Incident Response & Forensic Analysis - Ability to manage and respond to … review your application and invite you to the next stage if you showcase the right aptitude for success. Complete online assessments and a first-stage interview - These assessments are testing your aptitude for learning. Show us your potential and then your personality in a telephone interview. Final competency-based interview - Demonstrate your collaborative skills, problem-solving abilities, and growth More ❯
expert advice and guidance on security best practices for AI development and deployment. Stay up to date on the latest AI security threats and vulnerabilities. Conduct security audits and penetrationtesting of AI systems. Collaborate with data scientists, AI engineers, and other stakeholders to ensure security is integrated throughout the AI lifecycle. Communicate security risks and recommendations effectively More ❯
and system security Cybersecurity Service Providers (CSSP) Cyber Red Teams With at least 3 of the following 6 focus areas: Vulnerability Analysis Network Security Monitoring Incident Response/Forensics PenetrationTesting/Red Teaming CND Infrastructure Support CND Incident Response EDUCATION: Bachelor's degree in computer science, Information Technology, or an equivalent degree from an accredited college or More ❯
with Splunk Enterprise Security (accreditation preferred) - Experience with other Splunk premium security tools or products (UBA, RBA, Phantom) is a plus. • Extensive experience in threat hunting, red teaming, or penetrationtesting, with a deep understanding of common attack vectors and methodologies. • Strong analytical and problem-solving skills, with the ability to analyze large datasets and identify actionable insights. More ❯
Code (Terraform, CloudFormation) Experience with Jira or similar ticketing systems Technical architecture review skills Vulnerability identification (CWE, OWASP) Operating systems and hardening techniques Development concepts like CICD, Pipelines, SDLC Penetrationtesting knowledge (useful) Familiarity with Cloud Development Kit (CDK), GitOps Experience in DevOps/agile environments Docker, Kubernetes, serverless, Helm Platforms like Snowflake, MongoDB, Terraform Cloud, GitHub, Databricks More ❯
cybersecurity controls in accordance with the Risk Management Framework (RMF). •Maintain and update System Security Plans (SSPs), POA&Ms, risk assessments, and continuous monitoring documentation. •Perform vulnerability assessments, penetrationtesting, and security audits using tools such as Nessus, SCAP/STIG, or PowerShell. •Collaborate with the CFO and IT Manager to ensure compliance with NIST SP More ❯
Arnold, Missouri, United States Hybrid / WFH Options
Lockheed Martin
with infrastructure as code (IaC) tools (e.g., Terraform, Ansible) • Understanding of Risk Management Framework (RMF) NIST SP 800-53 • Understanding of security best practices and tools (e.g., vulnerability scanning, penetrationtesting) • Strong problem-solving and troubleshooting skills • Excellent communication and collaboration skills • Technical curiosity to learn new skills and are ready to help across the team Security Clearance More ❯
King Of Prussia, Pennsylvania, United States Hybrid / WFH Options
Lockheed Martin
with infrastructure as code (IaC) tools (e.g., Terraform, Ansible) • Understanding of Risk Management Framework (RMF) NIST SP 800-53 • Understanding of security best practices and tools (e.g., vulnerability scanning, penetrationtesting) • Strong problem-solving and troubleshooting skills • Excellent communication and collaboration skills • Technical curiosity to learn new skills and are ready to help across the team Security Clearance More ❯