Vulnerability Assessment Job Vacancies

201 to 225 of 378 Vulnerability Assessment Jobs

Consultant, Security Support

brentwood, tennessee, united states
Health Support Center
Security Operations Monitor OCI environments using tools like Oracle Cloud Guard and Oracle Security Zones. Respond to security incidents, conduct root cause analysis, and implement corrective actions. Perform regular vulnerability assessments and risk evaluations. Data Protection & Privacy Ensure encryption, tokenization, and secure handling of ePHI and other sensitive data. Conduct periodic audits to validate data protection controls and access More ❯
Posted:

Senior Cloud Security Engineer

United Kingdom
Hybrid / WFH Options
Paradigm
future of our cloud security posture, driving continuous improvement and strategic initiatives Accurately document cloud security configurations, processes, and knowledge, and effectively disseminate this information to other teams. Conduct vulnerability assessments and drive remediation for cloud infrastructure. Support requirements and evidence requested from auditors, compliance and regulators What you'll be working on As part of our Cloud Security More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Information Systems Security Manager with Security Clearance

Quantico, Virginia, United States
Epsilon Inc
of security policies, technical controls, and procedural frameworks to ensure full compliance with DoD Information Assurance Risk Management Framework (DIARMF) standards and Marine Corps cybersecurity directives. Author detailed security assessment reports, System Security Plans (SSPs), and Risk Assessment Reports (RARs) for multiple Authority to Operate (ATO) packages. Conduct comprehensive security control testing and vulnerability assessments. Serve as … the primary technical expert for government customer interactions, delivering security posture briefings and technical demonstrations of cybersecurity capabilities. Administer critical cybersecurity platforms including Varonis data security and ACAS vulnerability scanning tools. Provide technical mentorship and guidance to junior cybersecurity personnel while conducting security assessments. Lead training initiatives on RMF processes, security tool administration, and incident response protocols for team … development. Execute immediate response actions for Information Assurance Vulnerability Assessments (IAVAs), IAV Bulletins, and Marine Corps Directives. Apply security patches, update system configurations, and validate remediation efforts across the enterprise infrastructure. Implement Security Technical Implementation Guides (STIGs) through direct system configuration and automated compliance scripting. Monitor network security posture through daily analysis of security logs, vulnerability scan results More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior IT Security Engineer

London, South East, England, United Kingdom
Hays Specialist Recruitment Limited
Office, Security Operation Centre of Data Centre for implementing security policies, projects and security controls. Work with Internal Audit and other departments to execute penetration tests, cybersecurity risk self-assessment, ensure best practice and international baseline standards are in place and in line with local regulations.The ideal candidate will be responsible for managing information security systems, ensuring compliance with … respond to security incidents, conducting investigations and implementing corrective actions.- Collaborate with IT and other departments to ensure the security of network infrastructure and data.- Manage risk assessments and vulnerability assessments to identify potential security threats.- Oversee the implementation of security measures such as firewalls, intrusion detection systems, and data encryption technologies.- Provide training and guidance to staff on … MCSE- Microsoft Certified Solution Expert; MCITP-Microsoft Certified IT Professional; VMware Certified Professional;CCNA/CCNP Experience with security tools and technologies such as intrusion detection systems, SIEM, and vulnerability management tools. Familiarity with regulatory requirements and industry standards related to IT security. Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business for More ❯
Employment Type: Full-Time
Salary: £90,000 - £95,000 per annum
Posted:

General Engineer with Security Clearance

Arlington, Virginia, United States
K2 Group, Inc
Assurance Benchmarks for Supporting Infrastructure The general engineer should also have a working knowledge of USAF Civil Engineering governance, programming, and processes. The general engineer will conduct a thorough vulnerability assessments across various infrastructure elements, such as water, wastewater, electricity, heating, ventilation, and air conditioning (HVAC), petroleum products, fire protection systems, generators, and natural gas systems. A crucial aspect … of this position involves performing structural engineering vulnerability assessments that address perimeter security. Experience: Minimum 10 years operational experience in the military or other comparable civilian position in structural or civil engineering role. Extensive experience with all the following blast software: Vulnerability Assessment and Protection Option (VAPO), Component Explosives Damage Assessment Workbook (CEDAW), Conventional Weapons Effects … Engineering Design Manuals. Working knowledge of issues and threats driving Design Based Threat (DBT) for military and Government facilities and construction programs. Ability to determine effects of blast, damage assessment, and physical barriers to mitigate blast affects. Excellent written and verbal communication skills. Education: Possess a Bachelor's of Science degree in Civil or Structural Engineering. Desired Skills: PhD More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Vulnerability Manager

Bletchley, Buckinghamshire, United Kingdom
Uniting People
Urgent Contract Vulnerability Manager Job Type: Contract Duration: 4 Months Work Location: Milton Keynes, United Kingdom x3 a week at client office - Mandatory Start date : ASAP Note: Candidate should be immediately available Understand and analyse vulnerability data before they becomes overdue Organize and create work packages for teams for resolution Ensure fixes begin within SLA to prevent delays … Help prioritize overdue and upcoming vulnerabilities effectively. Collaborate across teams to streamline technical remediation efforts." Understanding of vulnerability assessment and remediation processes Ability to triage and create meaningful work packages for remediation of vulnerabilities. Good coordination skills to facilitate work packages. Effective ability for cross-team collaboration. Planning and Management skills More ❯
Employment Type: Contract
Rate: GBP 250 - 320 Daily
Posted:

Vulnerability Manager

MK9, Milton Keynes, Buckinghamshire, United Kingdom
Uniting People
Urgent Contract Vulnerability Manager Job Type: Contract Duration: 4 Months Work Location: Milton Keynes, United Kingdom [x3 a week at client office] - Mandatory Start date : ASAP Note: Candidate should be immediately available Understand and analyse vulnerability data before they becomes overdue Organize and create work packages for teams for resolution Ensure fixes begin within SLA to prevent delays … Help prioritize overdue and upcoming vulnerabilities effectively. Collaborate across teams to streamline technical remediation efforts." Understanding of vulnerability assessment and remediation processes Ability to triage and create meaningful work packages for remediation of vulnerabilities. Good coordination skills to facilitate work packages. Effective ability for cross-team collaboration. Planning and Management skills More ❯
Employment Type: Contract
Rate: £250 - £320/day inside IR35
Posted:

Senior Cyber Architect with Security Clearance

San Diego, California, United States
Kaztronix
environment to support the specification, development, and application of computer security technologies, cybersecurity and information assurance management techniques to DoD systems. Tasks may include: Leading systems engineering teams Leading Assessment and Authorization (A&A) activities for DoD Systems in accordance with Risk Management Framework Supporting traditional systems engineering tasks such as CONOPS, requirements development and allocation, cyber design engineering … and assessing system security plans including, security concepts of operation, risk management matrix, security control traceability matrix, security test procedures, and plan of action and milestones Conducting and analyzing vulnerability assessments to validate system compliance with RMF controls and DISA Security Technical Information Guidelines (STIG) Analyzing static code scans and dynamic code scans to validate Application Security and Development … A tools: ACAS Nessus, SCAP Scanner, STIG Viewer Demonstrated expertise in national Cybersecurity policies, DoD A&A processes and procedures and industry best practices on complex systems Expertise in vulnerability assessment, control allocation and risk mitigation Preferred Skills and Education: Other cyber certifications (CISSP-ISSAP, CISSP-ISSEP, CCSP, CEH, OSCP, etc.) Top Secret/SCI security clearance by More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

CYBER SECURITY ENGINEER with Security Clearance

Tampa, Florida, United States
Blue Obsidian Solutions
maintain security controls and monitoring throughout the software development lifecycle (SDLC). Automation: Develop automated security processes and tools to detect and prevent vulnerabilities in CI/CD pipelines. Vulnerability Management: Conduct regular vulnerability assessments, penetration testing, and ensure timely remediation of findings. Protect all company data, especially sensitive information, from internal and external threats by creating comprehensive … for detail and an ability to multitask in a fast-paced environment Strong abilities in critical thinking, problem-solving, logic, and forensics Knowledge of security tools like SAST, DAST, vulnerability scanners, and SIEM solutions. Familiarity with scripting languages (Python, Bash, etc.) and automation frameworks. In depth knowledge of application security principles, OWASP Top 10, and threat modeling. Proficiency in More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Test Engineer with Security Clearance

Winchester, Virginia, United States
Mission Services LLC (MSI)
standards. Key Responsibilities Develop comprehensive test plans, automated test scripts, and test cases to validate system requirements across SCOR platforms. Conduct functional, integration, regression, performance, and security testing-including vulnerability and compliance checks. Integrate automated tests within CI/CD pipelines; support DevOps workflows. Hire for Belonging+1Jobed.ai+1 Log, track, and manage defects; collaborate with stakeholders to drive timely resolution. … ability to obtain). Preferred Skills Prior experience testing within government or law enforcement environments. Familiarity with cloud testing platforms (AWS GovCloud, Azure Government). Experience in cybersecurity testing, vulnerability assessment, or penetration testing. Certifications such as ISTQB, CSTE, or technical certifications related to tools or CI/CD practices. More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

DV Cleared Security Engineer

North West London, London, United Kingdom
VIQU IT Recruitment
Assurance & Compliance Ensure commission controls comply with MOD policies (e.g. JSP 440/JSP 604) and security frameworks such as NIST, ISO 27005, STIGs, and UK Functional Standard 007 Vulnerability Assessment & Access Review Support regular access reviews, entitlement audits, and role certification; identify and remediate potential vulnerabilities in provisioning and access enforcement. Incident Management & Response Participate in access More ❯
Employment Type: Permanent
Posted:

DV Cleared Security Engineer

London, United Kingdom
VIQU Ltd
Assurance & Compliance Ensure commission controls comply with MOD policies (eg JSP 440/JSP 604) and security frameworks such as NIST, ISO 27005, STIGs, and UK Functional Standard 007 Vulnerability Assessment & Access Review Support regular access reviews, entitlement audits, and role certification; identify and remediate potential vulnerabilities in provisioning and access enforcement. Incident Management & Response Participate in access More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

CyberSecurityAnalyst

Nottingham, Nottinghamshire, East Midlands, United Kingdom
Hybrid / WFH Options
Littlefish
or similar technical positions. Fundamental understanding of security threats and compromise methods. Proficiency in server, client, and network technologies. Knowledge of malware, network reconnaissance, and emerging threats. Competence in vulnerability assessment and remediation procedures. Strong analytical skills, logical thinking, and sound judgment. Proficiency in KQL. Familiarity with the Microsoft Defender Suite. Education/Qualifications: CompTIA Security+ or equivalent More ❯
Employment Type: Permanent, Work From Home
Salary: £26,000
Posted:

IT Security Lead

EC1, Farringdon, Greater London, United Kingdom
Picture More Ltd
in the central London office. What you'll be doing: Monitoring and analysing network traffic and logs for threats Managing security tools - Firewalls, IDS/IPS, endpoint protection Driving vulnerability assessments and audits Leading on incident response and remediation Developing security policies, standards and best practice Acting as an escalation point for the business and projects What we're More ❯
Employment Type: Permanent
Salary: £70000 - £80000/annum
Posted:

IT Security Lead

London, South East, England, United Kingdom
Picture More
in the central London office. What you'll be doing: Monitoring and analysing network traffic and logs for threats Managing security tools - Firewalls, IDS/IPS, endpoint protection Driving vulnerability assessments and audits Leading on incident response and remediation Developing security policies, standards and best practice Acting as an escalation point for the business and projects What we're More ❯
Employment Type: Full-Time
Salary: £70,000 - £80,000 per annum
Posted:

Pen Tester , (Onsite)

Salem, Oregon, United States
Spark infotech
and NIST Standards.Proficiency in using security tools like Burp Suite, ZAP, Metasploit, Checkmarx, andAppScan.Hands-on experience with DAST and SAST tools such as IBM AppScan, HP WebInspect, andAcunetix for vulnerability assessments.Practical experience with AWS services(EC2, S3, KMS, RDS) and security best practices relevant to cloud environments.Familiar with Azure cloud security architecture,VNets, and Azure DevOps pipelines.Proficient in Python More ❯
Employment Type: Any
Salary: USD Annual
Posted:

Platform Infrastructure Engineer with Security Clearance

Idaho Springs, Colorado, United States
Prism, Inc
implement corrective actions on current platform(s). Experience in managing and maintaining application integration leveraging current networking concepts (TCP/IP, routing, firewalls) Oversee and conduct regular cybersecurity vulnerability assessments and penetration testing. Develop and maintain security incident response plans and procedures. Develop and implement automation scripts and tools to streamline platform deployments, provisioning, and management tasks. Deploy More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Level II Linux Service Desk Technician with Security Clearance

Maryland, United States
TENAX Technologies
security controls and supporting documentation as required for risk management framework (RMF). • Fault finding, analysis and of logging information for reporting of performance exceptions. • Support security incident reporting, vulnerability assessments, and information assurance compliance scans. • Maintain system evaluations and certifications. • Facilitate the creation and maintenance of Identity and Device Management • Provide platform administration for Linux based applications. • Provide More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Linux System Administrator with Security Clearance

Gunpowder, Maryland, United States
TENAX Technologies
security controls and supporting documentation as required for risk management framework (RMF). Fault finding, analysis and of logging information for reporting of performance exceptions. Support security incident reporting, vulnerability assessments, and information assurance compliance scans. Maintain system evaluations and certifications. Facilitate the creation and maintenance of Identity and Device Management Provide platform administration for Linux based applications. Provide More ❯
Employment Type: Permanent
Salary: USD 120,000 Annual
Posted:

Information Security Analyst

Northamptonshire, England, United Kingdom
Howdens Joinery
information security Support the PMO (Project Management Office) to ensure appropriate security is assessed within projects alongside overseeing supplier compliance to Howdens needs for Cyber Security Conduct risk and vulnerability assessments to identify and mitigate security risks Engage with IT projects to perform Security Reviews and ensure findings are appropriately communicated and added to the appropriate logs to be More ❯
Employment Type: Contractor
Rate: Salary negotiable
Posted:

Cyber Security Engineer with Security Clearance

Aberdeen Proving Ground, Maryland, United States
Legacy Consulting Services , LLC
management solutions. in Aberdeen Proving Grounds. MD Key Responsibilities: • Work on a small team of cyber engineers to perform security assessments in search of vulnerabilities and identify mitigations. • Conduct vulnerability assessments on web applications, networked devices, standalone software products, and other technologies as assigned using the penetration testing life cycle. • Maintain test efficacy by identifying and applying new testing More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Platform Infrastructure Engineer

Colorado Springs, Colorado, United States
Maximus
implement corrective actions on current platform(s). - Experience in managing and maintaining application integration leveraging current networking concepts (TCP/IP, routing, firewalls) - Oversee and conduct regular cybersecurity vulnerability assessments and penetration testing. - Develop and maintain security incident response plans and procedures. - Develop and implement automation scripts and tools to streamline platform deployments, provisioning, and management tasks. - Deploy More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Platform Infrastructure Engineer - Secret Clearance Required

Colorado Springs, Colorado, United States
Maximus
implement corrective actions on current platform(s). - Experience in managing and maintaining application integration leveraging current networking concepts (TCP/IP, routing, firewalls) - Oversee and conduct regular cybersecurity vulnerability assessments and penetration testing. - Develop and maintain security incident response plans and procedures. - Develop and implement automation scripts and tools to streamline platform deployments, provisioning, and management tasks. - Deploy More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Information System Security Engineer (ISSE) - Cyber Ops IV with Security Clearance

Colorado, United States
Aleut Federal LLC
all technical controls are clearly defined with planned inputs, expected behaviors, and functional outcomes. Contribute to the assembly of the full RMF Security Authorization Package, including the SSP, Security Assessment Report (SAR), POA&M, risk statements, and briefing materials for the Authorizing Official (AO). Develop and update required RMF and system documentation including: Monitoring Strategy Document POA&M … and SSP updates System Security Plan Analysis Security Categorization Review Security Plan Approval Recommendation Letter SAR with vulnerability assessment results Issue Resolution and Remediation Status Reports Residual Risk Statements for Risk Acceptance Recommendations Presentation briefings and meeting support documents Collaborate with ISSMs, ISSOs, SCARs, and system owners to gather evidence, produce high-quality deliverables, and ensure traceability of … control implementation and assessment results. Author, edit, and standardize RMF documentation to ensure clarity, completeness, and consistency across systems, adhering to DoD, AFMAN, and USAFA-specific templates and quality standards. Maintain alignment between documentation and actual system behavior, identifying gaps or noncompliance early and supporting remediation planning. Provide peer review, formatting, and compliance support across all cybersecurity deliverables, including More ❯
Employment Type: Permanent
Salary: USD 120,000 Annual
Posted:

Information Technology Internal Auditor

Birmingham, England, United Kingdom
Insight Global
for a driven technology auditor who wants to play a role in audit execution which focuses on the review of technology processes, the analysis of risks involved, and the assessment of the design and operating effectiveness of the controls implemented to mitigate the risk. Audits may include the assessment of areas such as access management, IT operations, job … scheduling/monitoring, data transfer (focusing on the completeness/accuracy of this), network security, cyber security, system development and testing, vulnerability assessment and penetration testing, and operational resilience. Must Haves: Previous experience as a technology auditor covering IT application and general controls, application development, information security, technology consulting or other relevant industry experience Basic understanding of software More ❯
Posted:
Vulnerability Assessment
10th Percentile
£41,250
25th Percentile
£46,875
Median
£57,500
75th Percentile
£73,750
90th Percentile
£86,000