Overview: Personnel assigned to this role will serve primarily on the Operations & Response (O&R) Team; however, this role may also support the Vulnerability Assessment and Penetration Test (VAPT) and Engineering teams. This role is also responsible for coordinating with both the Cybersecurity Services Section and other sections or divisions within the organization. Job Duties: -Perform network security monitoring … and mitigation; analyzing security system logs, security tools, and data; network monitoring, and intrusion detection using host-based and network-based intrusion detection systems (IDS) and log management applications; testing, installing, patching, and upgrading computer hardware and operating systems (Windows, and UNIX) in an enterprise environment; identifying, collecting, processing, documenting, reporting, cyber security/incident response events; architecting, engineering … developing and implementing cyber security/incident response policies and procedures; engineering, testing, installing, patching, and upgrading various information security hardware and software applications. -3 years of experience using one or more of the following security tools: SourceFire, Arcsight, Splunk, NetWitness, Guidance Software, Digital Guardian, SureView, Intelliview, Nessus, and Foundstone. -3 years of penetrationtesting experience for More ❯
computer or information systems design/development/analysis roles. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
computer or information systems design/development/analysis roles. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
enhance the cybersecurity posture of assigned programs by tracking evolving cyber threats, adopting emerging technologies, and applying industry best practices. Perform continuous risk assessments, conduct vulnerability scans, and support penetrationtesting activities to proactively identify and mitigate potential threats. Provide expert technical guidance to multi-disciplinary teams and stakeholders on cybersecurity solutions, compliance strategies, and secure system architecture. More ❯
Assurance (SwA) tools and techniques (e.g., Fortify). Knowledge of FISMA, NIST 800-53, and DoD cybersecurity policies. Experience supporting cybersecurity test events, red/blue team exercises, or penetration testing. Background in DoD systems architecture, defense communications, or mission operations is a plus. More ❯
City of London, London, England, United Kingdom Hybrid / WFH Options
How to Job Ltd
who are eager to develop their skills in a collaborative and fast-paced environment. Responsibilities: •Monitor and analyze security alerts to identify potential threats. •Assist with vulnerability assessments and penetration testing. •Support the implementation of security tools and protocols. •Investigate and respond to security incidents alongside the IT team. •Create detailed reports on security findings and recommendations for stakeholders. More ❯
measures in line with best practices to ensure that the client is protected against the latest cyber security threats • Work with third parties and internal teams to schedule proactive penetration tests, ensuring that vulnerabilities are resolved or mitigated • Support the delivery of security training to all end users • Regular monitoring of potential security risks externally and internally, provide clear … to protect against unauthorised access and potential threats • Proficient with SIEM, IDS/IPS, vulnerability scanners, and Azure security tools. • Experience of leading on technical vulnerability assessments and regular penetrationtesting of IT systems and processes to identify potential vulnerabilities and provide recommendations for risk mitigation • Experience in testing and reviewing new security solutions • A strong commitment More ❯
measures in line with best practices to ensure that the client is protected against the latest cyber security threats • Work with third parties and internal teams to schedule proactive penetration tests, ensuring that vulnerabilities are resolved or mitigated • Support the delivery of security training to all end users • Regular monitoring of potential security risks externally and internally, provide clear … to protect against unauthorised access and potential threats • Proficient with SIEM, IDS/IPS, vulnerability scanners, and Azure security tools. • Experience of leading on technical vulnerability assessments and regular penetrationtesting of IT systems and processes to identify potential vulnerabilities and provide recommendations for risk mitigation • Experience in testing and reviewing new security solutions • A strong commitment More ❯
london (city of london), south east england, united kingdom
InterQuest Group
measures in line with best practices to ensure that the client is protected against the latest cyber security threats • Work with third parties and internal teams to schedule proactive penetration tests, ensuring that vulnerabilities are resolved or mitigated • Support the delivery of security training to all end users • Regular monitoring of potential security risks externally and internally, provide clear … to protect against unauthorised access and potential threats • Proficient with SIEM, IDS/IPS, vulnerability scanners, and Azure security tools. • Experience of leading on technical vulnerability assessments and regular penetrationtesting of IT systems and processes to identify potential vulnerabilities and provide recommendations for risk mitigation • Experience in testing and reviewing new security solutions • A strong commitment More ❯
measures in line with best practices to ensure that the client is protected against the latest cyber security threats • Work with third parties and internal teams to schedule proactive penetration tests, ensuring that vulnerabilities are resolved or mitigated • Support the delivery of security training to all end users • Regular monitoring of potential security risks externally and internally, provide clear … to protect against unauthorised access and potential threats • Proficient with SIEM, IDS/IPS, vulnerability scanners, and Azure security tools. • Experience of leading on technical vulnerability assessments and regular penetrationtesting of IT systems and processes to identify potential vulnerabilities and provide recommendations for risk mitigation • Experience in testing and reviewing new security solutions • A strong commitment More ❯
L33, Knowsley, Merseyside, United Kingdom Hybrid / WFH Options
Curveball Solutions
Drafting, maintaining and implementing information security policies and Standard Operating Procedures (SOPs). Configuring and overseeing mobile security—MDM (MAM/BYOD)—to protect business continuity. Leading vulnerability assessments, penetration tests, firewall policy enforcement, and remediation efforts. Authoring compelling tender responses, clearly demonstrating technical capability and strategic value. Enhancing Microsoft 365 security leveraging Purview, Conditional Access, MFA to safeguard … through closure. Strong understanding of ITIL, CAB, and structured change management. Skilled in crafting and updating security policies, SOPs, and managing tender documentation. Hands-on expertise with MDM tools, penetrationtesting, and policy-based firewalls. Experience designing and delivering compliance aligned services across GDPR, Cyber Essentials, ISO 27001. Proficient in using Microsoft 365 security stack: Purview, Defender, Conditional More ❯
Liverpool, Merseyside, North West, United Kingdom Hybrid / WFH Options
Curveball Solutions
objectives. Drafting, maintaining and implementing information security policies and Standard Operating Procedures (SOPs). Configuring and overseeing mobile securityMDM (MAM/BYOD)to protect business continuity. Leading vulnerability assessments, penetration tests, firewall policy enforcement, and remediation efforts. Authoring compelling tender responses, clearly demonstrating technical capability and strategic value. Enhancing Microsoft 365 security leveraging Purview, Conditional Access, MFA to safeguard … through closure. Strong understanding of ITIL, CAB, and structured change management. Skilled in crafting and updating security policies, SOPs, and managing tender documentation. Hands-on expertise with MDM tools, penetrationtesting, and policy-based firewalls. Experience designing and delivering compliance aligned services across GDPR, Cyber Essentials, ISO 27001. Proficient in using Microsoft 365 security stack: Purview, Defender, Conditional More ❯
Analyst Location: Newport, RI Full Time (Y/N): Y Status (Exempt/Non-Exempt): Exempt Clearance: Top Secret/SCI Primary Responsibilities: • Analysis, documentation and development of integration, testing, operations, and maintenance of system security. • Use data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs.) to analyze events from environments to … Detection System, policy server, IAVA management, Defense Information Systems Agency, Host Based Security System, Secure Configuration Compliance Validation Initiative, and Secure Configuration Remediation Initiative tools. • Virtual Private network management, penetrationtesting, forensics research and analysis, web content filter management, security incident reporting, and vulnerability scanning. • Knowledge of cybersecurity principles, cyber threats and vulnerabilities. • Analyze network alerts from enterprise More ❯
analytical, communication, and stakeholder engagement skills Experience supporting cybersecurity for intelligence or defense systems Familiarity with cloud security, Zero Trust architecture, and endpoint protection solutions Background in incident response, penetrationtesting, or threat intelligence Experience implementing RMF within classified environments Join a mission-driven team advancing government communication capabilities and operational readiness. Apply today and become part of More ❯
Reading, Berkshire, England, United Kingdom Hybrid / WFH Options
Proactive Appointments
implement effective security controls, system hardening and security improvement projects with a particular focus in application/web hosting security. Assist in the management of patching, vulnerability analysis and penetrationtesting to ensure recommendations are risk assessed and implemented in a timely manner Senior Cyber Security Engineer - Skills: Experience in Security Engineering, Network Security, and/or working More ❯
and system security Cybersecurity Service Providers (CSSP) Cyber Red Teams With at least 3 of the following 6 focus areas: Vulnerability Analysis Network Security Monitoring Incident Response/Forensics PenetrationTesting/Red Teaming CND Infrastructure Support CND Incident Response EDUCATION: Bachelor's degree in computer science, Information Technology, or an equivalent degree from an accredited college or More ❯
of appropriate ISO standards including 27001, 27002, 27005, 270017, 27018, 22301. Good working knowledge of Cryptography including symmetric & asymmetric encryption systems, infrastructure, risks, weaknesses and mitigations. Working knowledge of penetrationtesting skills and requirements. Proven successful delivery of security aspects of major projects and demonstrable professional credibility and authority having been within a key security role working on More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom
HMRC
of appropriate ISO standards including 27001, 27002, 27005, 270017, 27018, 22301. Good working knowledge of Cryptography including symmetric & asymmetric encryption systems, infrastructure, risks, weaknesses and mitigations. Working knowledge of penetrationtesting skills and requirements. Proven successful delivery of security aspects of major projects and demonstrable professional credibility and authority having been within a key security role working on More ❯
CISM, CISSO, FITSP-M, GCIA, GCSA, GCIH, GSLC, GICSP, CISSP-ISSMP, CISSP Desired Qualifications: 8+ years of experience analyzing, assessing, and implementing corrective actions based on vulnerability management and penetration testing. 8+ years of experience supporting DoD defensive cyber operations including but not limited to, information system protection, defense, response (incident handling), reporting and recovery. EEO Commitment All qualified More ❯
Current JOB DESCRIPTION: Inferno Systems is searching for Network Security Analysts to work on our red team to identify target network infrastructure and vulnerabilities. You will work closely with penetration testers and other team members to map out target networks (SIGDEV) using many different network artifacts. You will assist with identifying target objectives, understanding internal network connections and architectures … your findings. You will help scope, guide and analyze network exploitation activities and risks. You will be responsible for mapping out target networks, identifying opportunities for expansion and assisting Penetration Testers in planning out next steps. You can also assist the Penetration Testers to better hone their operational security, evade detection and find new ways to penetrate and … information and coordinate future operations. • Proven ability to communicate technical requirements to development teams and represent stakeholder equities through ongoing relationships. • Knowledge of IT defensive best practices and the penetrationtesting lifecycle DESIRED SKILLS: • Experience using scripting languages for automation, parsing data sets, and data visualization/analytics (e.g. python, perl, etc.). • Knowledge of stand-alone automated More ❯
Terraform, Ansible, Infrastructure as Code (IaC), DevOps, Kubernetes, Docker, Pen Testing, Splunk, Nutanix, Linux, Windows Due to federal contract requirements, United States citizenship and an active TS/SCI security clearance and polygraph are required for the position. Required: Must be a US Citizen. Must have TS/SCI clearance w/active polygraph. At least eight (08) years … customer requirements. These Qualifications Would be Nice to Have: Experience operating in an agile development environment and DevOps. Experience with container technologies such as Kubernetes and Docker. Knowledge of penetrationtesting or red team operations. Experience utilizing and development with Splunk. Experience with Nutanix. Defensive Cyber Security Operations. $175,000 - $200,000 a year The pay range for More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Corriculo Ltd
security team, monitoring and analysing real-time security events using SIEM tools to detect and respond to potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will investigate security incidents and conduct forensic analysis to determine the root cause and recommend remediation actions. Outside of … Firewalls, VPN, EDR/XDR, mail filtering and other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetrationtesting/vulnerability scanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don't meet More ❯
london, south east england, united kingdom Hybrid / WFH Options
Iceberg
Responsibilities: Develop and refine security monitoring controls and use-cases to detect threats and anomalies. Investigate security incidents, conduct forensics analysis, and manage incident response processes. Collaborate with independent penetrationtesting programs and support risk assessment processes. Implement and mature threat intelligence capabilities and integrate with security monitoring frameworks. Develop and oversee vulnerability management programs, ensuring alignment with More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
Iceberg
Responsibilities: Develop and refine security monitoring controls and use-cases to detect threats and anomalies. Investigate security incidents, conduct forensics analysis, and manage incident response processes. Collaborate with independent penetrationtesting programs and support risk assessment processes. Implement and mature threat intelligence capabilities and integrate with security monitoring frameworks. Develop and oversee vulnerability management programs, ensuring alignment with More ❯
slough, south east england, united kingdom Hybrid / WFH Options
Iceberg
Responsibilities: Develop and refine security monitoring controls and use-cases to detect threats and anomalies. Investigate security incidents, conduct forensics analysis, and manage incident response processes. Collaborate with independent penetrationtesting programs and support risk assessment processes. Implement and mature threat intelligence capabilities and integrate with security monitoring frameworks. Develop and oversee vulnerability management programs, ensuring alignment with More ❯