Washington, Washington DC, United States Hybrid / WFH Options
Marathon TS Inc
security risk management plan Perform security reviews and identify security gaps in security architecture resulting in recommendations for inclusion in the risk mitigation strategy Perform risk analysis (e.g., threat, vulnerability, and probability of occurrence) whenever an application or system undergoes a major change (or vulnerability patch updates) Plan and conduct security authorization reviews and assurance case development for … and recommend required actions to correct those deviations Conduct annual Contingency Plan Tests according to Categorization of system Core Competencies: Information Assurance Information Systems/Network Security Information Technology Assessment Legal, Government, and related federal security policies Risk Management Systems Testing and Evaluation VulnerabilityAssessment Security Technical Implementation Guides (STIGs) Security Requirements Guide (SRGs) Core Knowledge, Skills … Abilities: Knowledge of current industry methods and federal government standards for evaluating, implementing, and disseminating information technology (IT) security assessment, monitoring, detection, and remediation tools and procedures utilizing standards-based concepts and capabilities Knowledge of federal government cybersecurity principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation) Knowledge of cybersecurity principles used to manage risks related More ❯
moments. The ideal candidate has hand-on experience with advanced threat detection, incident response, and collaborative security assessments to protect critical government customer systems and infrastructure. Key Responsibilities: Perform vulnerability assessments, incident response, and threat hunting operations Support Purple Team initiatives by integrating offensive (Red Team) and defensive (Blue Team) strategies Able to execute strategic security plans aligned with … threat intelligence and operational priorities Threat Intelligence and Risk Assessment Interprets threat intelligence based on real-world risks Conduct risk-based evaluations of critical systems, networks, and Industrial Control Systems (ICS) infrastructure Maintain current knowledge of the evolving threat landscape and integrate insights into operations Threat Hunting and Incident Response Perfrom proactive threat hunting to detect and mitigate emerging … Teams to enhance overall security posture Work closely with Senir Analysts across technical domains to ensure comprehensive assessments and planning Tools and Techniques Use approved tools and techniques for vulnerability assessments and threat detection Stay connected with on-going evaluation of new tools and technologies to enhance team capabilities Required Qualifications: Bachelor's or Master's degree in Cybersecurity More ❯
moments. The ideal candidate has hand-on experience with advanced threat detection, incident response, and collaborative security assessments to protect critical government customer systems and infrastructure. Key Responsibilities: Perform vulnerability assessments, incident response, and threat hunting operations Support Purple Team initiatives by integrating offensive (Red Team) and defensive (Blue Team) strategies Able to execute strategic security plans aligned with … threat intelligence and operational priorities Threat Intelligence and Risk Assessment Interprets threat intelligence based on real-world risks Conduct risk-based evaluations of critical systems, networks, and Industrial Control Systems (ICS) infrastructure Maintain current knowledge of the evolving threat landscape and integrate insights into operations Threat Hunting and Incident Response Perfrom proactive threat hunting to detect and mitigate emerging … Teams to enhance overall security posture Work closely with Senir Analysts across technical domains to ensure comprehensive assessments and planning Tools and Techniques Use approved tools and techniques for vulnerability assessments and threat detection Stay connected with on-going evaluation of new tools and technologies to enhance team capabilities Required Qualifications: Bachelor's or Master's degree in Cybersecurity More ❯
will have the experience to determine strategies and lead efforts to advance cyber defense capability. Key Responsibilities: A member of Leadership and Strategic Planning group Lead and coordinate advanced vulnerability assessments, incident response, and threat hunting operations Support Purple Team initiatives by integrating offensive (Red Team) and defensive (Blue Team) strategies Help develop and execute strategic security plans aligned … with threat intelligence and operational priorities Threat Intelligence and Risk Assessment: Leverage threat intelligence to prioritize and scope security projects based on real-world risks Conduct risk-based evaluations of critical systems, networks, and Industrial Control Systems (ICS) infrastructure Maintain current knowledge of the evolving threat landscape and integrate insights into operations Threat Hunting and Incident Response: Oversee proactive … security posture Work closely with SMEs across technical domains to ensure comprehensive assessments and planning Tools and Techniques: Help teams in the use of approved tools and techniques for vulnerability assessments and threat detection Assist with the evaluation of new tools and technologies to enhance team capabilities Required Qualifications: Bachelor's or Master's degree in Cybersecurity, Computer Science More ❯
London, England, United Kingdom Hybrid / WFH Options
Dionach by Nomios
and we'll work to meet your needs. What You'll Do Deliver cyber security assurance services to identify vulnerabilities in different areas on a variety of technologies, including vulnerability assessments on external networks, internal networks, applications, and enterprise security systems. Delivering presentations to technical and non-technical stakeholders. Main role will be as a Junior Cyber Security Consultant … needed. What We're Looking For Qualifications: Relevant degree or one full year’s minimum experience in penetration testing or cyber security assurance. Experience: Some experience of cyber security assessment, vulnerability assessments, or penetration testing. Certifications: such as CPSA or CEH would be advantageous. Tools: Experience of penetration testing tools, Linux, Windows, and Active Directory. Communication: Strong verbal … oriented approach. Excellent verbal and written communication skills. Ability to work effectively under pressure. Commitment to maintaining the highest ethical and professional standards. Are you experienced in cyber security assessment, vulnerability assessments, or penetration testing and looking to further improve your skills and take on more responsibilities? If so, this opportunity is perfect for you! #J-18808-Ljbffr More ❯
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Nomios
and we'll work to meet your needs. What You'll Do Deliver cyber security assurance services to identify vulnerabilities in different areas on a variety of technologies, including vulnerability assessments on external networks, internal networks, applications, and enterprise security systems. Delivering presentations to technical and non-technical stakeholders. Main role will be as a Junior Cyber Security Consultant … needed. What We're Looking For Qualifications : Relevant degree or one full year’s minimum experience in penetration testing or cyber security assurance. Experience : Some experience of cyber security assessment, vulnerability assessments, or penetration testing. Certifications : such as CPSA or CEH would be advantageous. Tools: Experience of penetration testing tools, Linux, Windows, and Active Directory. Communication : Strong verbal … oriented approach. Excellent verbal and written communication skills. Ability to work effectively under pressure. Commitment to maintaining the highest ethical and professional standards. Are you experienced in cyber security assessment, vulnerability assessments, or penetration testing and looking to further improve your skills and take on more responsibilities? If so, this opportunity is perfect for you! #J-18808-Ljbffr More ❯
Environment (TSCE). Design, implement, configure, and enforce security controls on network, hardware, and software components and devices. Implement STIGs and manage enterprise-level deployment of Active Directory. Perform vulnerability assessments using Assured Compliance Assessment Solution tools. Configure Cisco networking devices and utilize packet analyzer tools such as Wireshark and tcpdump. Troubleshoot network connectivity issues and implement firewalls … implementation, configuration, and enforcement of security controls on network, hardware, and software components and devices. o STIG implementation. o Experience managing enterprise level deployment of Active Directory. o Performing vulnerability assessments with the Assured Compliance Assessment Solution tool. o Configuring Cisco networking devices. o Utilizing packet analyzer tools such as Wireshark and tcpdump; o Troubleshooting network connectivity issues More ❯
/IPS, SIEM) to detect and analyze potential threats. Investigate security alerts, logs, and incidents (e.g., malware, unauthorized access, breaches). Assist in incident response and remediation efforts. 2. Vulnerability Management Conduct vulnerability assessments and support penetration testing. Collaborate with senior teams to patch systems and mitigate risks. 3. Network Access Control (NAC) Configure switches and endpoints for …/IP telephony). Technical Skills: Hands–on experience with OSPF, BGP, STP, NAC, and IPT (Cisco). Proficiency in network monitoring tools, NDR, and SIEM systems. Knowledge of vulnerabilityassessment tools and patch management. Soft Skills: Ability to work under pressure and handle emergencies. Strong communication and collaboration skills. Working Conditions: Flexibility for after–hours/weekend More ❯
/IPS, SIEM) to detect and analyze potential threats. Investigate security alerts, logs, and incidents (e.g., malware, unauthorized access, breaches). Assist in incident response and remediation efforts. 2. Vulnerability Management Conduct vulnerability assessments and support penetration testing. Collaborate with senior teams to patch systems and mitigate risks. 3. Network Access Control (NAC) Configure switches and endpoints for …/IP telephony). Technical Skills: Hands-on experience with OSPF, BGP, STP, NAC, and IPT (Cisco). Proficiency in network monitoring tools, NDR, and SIEM systems. Knowledge of vulnerabilityassessment tools and patch management. Soft Skills: Ability to work under pressure and handle emergencies. Strong communication and collaboration skills. Working Conditions: Flexibility for after-hours/weekend More ❯
/IPS, SIEM) to detect and analyze potential threats. Investigate security alerts, logs, and incidents (e.g., malware, unauthorized access, breaches). Assist in incident response and remediation efforts. 2. Vulnerability Management Conduct vulnerability assessments and support penetration testing. Collaborate with senior teams to patch systems and mitigate risks. 3. Network Access Control (NAC) Configure switches and endpoints for …/IP telephony). Technical Skills: Hands-on experience with OSPF, BGP, STP, NAC, and IPT (Cisco). Proficiency in network monitoring tools, NDR, and SIEM systems. Knowledge of vulnerabilityassessment tools and patch management. Soft Skills: Ability to work under pressure and handle emergencies. Strong communication and collaboration skills. Working Conditions: Flexibility for after-hours/weekend More ❯
About Darkshield Darkshield is an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetration testing, vulnerabilityassessment, managed security, and more. Our mission is to protect businesses by delivering tailored, cutting-edge cybersecurity solutions that keep them resilient and ahead of cyber threats. The Role More ❯
operationalizing a configuration baselines program spanning physical and virtual systems, serverless workloads, container security, and other platforms. This engineer will assist in the minimization of potential attack surfaces through vulnerability management, managing a baselines program, cloud configuration assessments, incorporating threat intelligence from public and private sources, and work internally to build and enhance policies, standards, and processes. They will … in Wellington's vendor ecosystem to understand when third and fourth parties may be exposed to critical vulnerabilities. Contribute to team documentation for updates to existing processes, new processes, assessment tool infrastructure details and workflows. Contribute to firmwide documentation by being an SME contributor to policies and standards. NON-TECHNICAL QUALIFICATIONS A Passion for cyber-security is a must. … team members and share discoveries about your work. TECHNICAL QUALIFICATIONS Experience working with best practices frameworks such as CIS Critical Security Controls to drive an internal discovery and risk assessment program for a system baselines/hardening program. Knowledge of common cyber-attack types such as DDoS, SQLi, XSS, and others. This experience relied upon to make rational decisions More ❯
various network operating systems, such as Cisco IOS, Juniper Junos, and others. • Familiarity with scripting languages (e.g., Python, Bash) to automate patch deployment processes for network devices. • Knowledge of vulnerabilityassessment tools and network security tools. • Experience in network administration, network security, or a similar role, with a focus on patch management. • Experience in conducting vulnerability assessments More ❯
relevant regulatory frameworks (eg, ISO 27001, NIST, FCA ). Collaborate with key stakeholders to gather and analyze technical security data for accurate risk evaluation and remediation. Work closely with VulnerabilityAssessment & Penetration Testing (VAPT) , Threat Intelligence , and Incident Response teams to understand technical risks and validate that appropriate controls are in place. Contribute to the ongoing improvement of More ❯
Security, preferably in a senior or advanced analyst role. Proven experience in managing and auditing Information Security Management Systems (ISMS) aligned with ISO 27001 standards. Strong skills in risk assessment, vulnerability identification, and development of practical security solutions for complex IT environments. Experience with penetration testing and vulnerability assessments; certifications such as CEH (Certified Ethical Hacker) are More ❯
and incident response. Support security risk management and compliance with standards like PCI, GDPR, ISO. Perform other duties as assigned. Qualifications 10+ years of experience in information security, including vulnerabilityassessment, incident response, and audits. 5+ years working with business leadership and managing projects in a complex environment. Knowledge of security technologies and concepts such as firewalls, intrusion More ❯
analytical focus, problem solving skills, time management skills, and a passion for computer, network, or cyber security. • Understanding of Exploit methodology, processes and development. • Understanding of network scanning and vulnerability analysis/assessment DESIRED SKILLS: • Experience in a role as a computer network operator, possessing extensive penetration testing skills/experience to conduct vulnerability assessments leading to More ❯
Liverpool, England, United Kingdom Hybrid / WFH Options
Agoda
Know our Team: The Security Department oversees security, governance, risk management, and compliance, and security operations for all Agoda. We are vigilant in ensuring there is no breach or vulnerability threatening our company or endangering our employees to keep Agoda safe and protected. Given that the security ecosystem is moving forward at tremendous speed, we like to be early … advanced environment. The Opportunity: As a Security Analyst, you will focus on identifying, analyzing, and remediating vulnerabilities across our environment. You will be hands-on with penetration testing and vulnerability management, ensuring our systems remain secure and resilient. In this Role, you’ll get to: Develop Security Automation Tools to implement solutions at scale Triage security findings from multiple … tools and work with hundreds of teams to get them remediated within the right SLA Conduct security assessments through code reviews, vulnerability assessments, penetration testing and risk analysis Research on the negative effects of a vulnerability, from minimizing the impact to altering security controls for future prevention Identify potential threats so that the organization can protect itself from More ❯
Role : Security Architect Location : London Contract Role Job Description: Strong experience in building secure web and mobile apps Experience with Security architecture, Application Security assessments, penetration testing, vulnerabilityassessment, Secure SDLC, and Static code reviews Certified Secure Software Lifecycle Professional (CSSLP) (desirable) Responsibilities: - Design, develop, and implement security frameworks and solutions to safeguard company's assets and infrastructure. More ❯
senior stakeholders, both internal and client facing and be responsible for defining the vision, principles and strategy for security operations. Improve SOC processes, including incident response, threat hunting, and vulnerability management. Demonstrate expert understanding of security concepts and apply them to a technical level, at the highest levels of risk and customer complexity. Influence and challenge clients to define … meet customer needs and pain points. Provide mentorship across delivery team members, operating as an escalation expert for both internal and client facing issues. Designing, developing, and continuously improving vulnerabilityassessment, security testing, and risk analysis methods. Designing, developing, and continuously improving the security posture, effectiveness and efficiency of the company's products and services Providing developers with More ❯
London, England, United Kingdom Hybrid / WFH Options
Stripe Olt
player who wants to be part of a truly team driven environment. As a First Responder, you must display excellent outside-the-box thinking and communication skills. DESIRABLE EXPERIENCE. VulnerabilityAssessment experience. Knowledge of Penetration testing tools and techniques. Network and firewall alert management. Active Directory and group policy management experience. Experience in deploying, managing, and supporting of More ❯
Bristol, England, United Kingdom Hybrid / WFH Options
Stripe Olt
player who wants to be part of a truly team driven environment. As a First Responder, you must display excellent outside-the-box thinking and communication skills. DESIRABLE EXPERIENCE. VulnerabilityAssessment experience. Knowledge of Penetration testing tools and techniques. Network and firewall alert management. Active Directory and group policy management experience. Experience in deploying, managing, and supporting of More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
Stripe Olt
player who wants to be part of a truly team driven environment. As a First Responder, you must display excellent outside-the-box thinking and communication skills. DESIRABLE EXPERIENCE. VulnerabilityAssessment experience. Knowledge of Penetration testing tools and techniques. Network and firewall alert management. Active Directory and group policy management experience. Experience in deploying, managing, and supporting of More ❯
Directory Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerabilityassessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft More ❯
Directory Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerabilityassessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft More ❯