Vulnerability Assessment Job Vacancies

226 to 250 of 563 Vulnerability Assessment Jobs

Senior Network Architect

London, England, United Kingdom
Dynamic Search Solutions
Lead strategic network transformation projects, focusing on Cisco-based security technologies (Firepower, ASA, ISE, Umbrella, etc.) Develop network security policies, best practices, and high-availability solutions Perform risk analysis, vulnerability assessments, and network hardening Collaborate with cross-functional teams to align network architecture with business goals What We’re Looking For: CCIE (Security or Enterprise Infrastructure) – active certification required More ❯
Posted:

Chief Technology Officer

London Area, United Kingdom
Hybrid / WFH Options
TranzyPay
APIs). Ensure robust integration capabilities with payment gateways, partner banks, and other relevant third-party systems. · Develop and implement comprehensive security policies, procedures, and controls. · Oversee security audits, vulnerability assessments, and penetration testing. · Collaborate with the Chief Compliance Officer (CCO) to ensure technology solutions meet all regulatory obligations within the remittance industry. Qualifications Proficiency in Software Development and More ❯
Posted:

Chief Technology Officer

City of London, London, United Kingdom
Hybrid / WFH Options
TranzyPay
APIs). Ensure robust integration capabilities with payment gateways, partner banks, and other relevant third-party systems. · Develop and implement comprehensive security policies, procedures, and controls. · Oversee security audits, vulnerability assessments, and penetration testing. · Collaborate with the Chief Compliance Officer (CCO) to ensure technology solutions meet all regulatory obligations within the remittance industry. Qualifications Proficiency in Software Development and More ❯
Posted:

Senior Cyber Security Analyst with Security Clearance

Arlington, Virginia, United States
Hybrid / WFH Options
ICF
ability to communicate effectively with various clients in order to explain and elaborate on technical details Practical experience with different scripting languages (e.g., Python, JavaScript, etc.) Experience with system vulnerability assessments Knowledge of Linux/Unix and Windows operating systems security Knowledge of computer programming and scripting languages Excellent written and verbal communication skills Scaled Agile Framework (SAFe) experience More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Linux Threat Hunter-TS/SCI with FS Poly with Security Clearance

Chantilly, Virginia, United States
Inferno Systems
relate alternative solutions and risks. • Develop routine proposals incorporating appropriate technical and operational issues into a plan based on consensus. • Write correspondence and coordinate with participants regarding operational plans, vulnerability assessments, risk evaluations, possible remedies, or execution plans. When appropriate, prepare intelligence reports following guidelines. • Ability to analyze the operational environment to identify appropriate equipment/systems required to More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Information Security Manager

London, England, United Kingdom
Hybrid / WFH Options
Crown Agents Bank
sleeves to get things done. Responsibilities Advise and support project teams to embed security best practices throughout the project lifecycle. Scope, manage, and track remediation of penetration testing and vulnerability assessments. Maintain application security processes, standards and guidelines. Translate application security policies into security requirements. Conduct and document security risk assessments on changes, threats, vulnerabilities, and new initiatives. Perform More ❯
Posted:

DevOps PaaS Engineer (Sr. RHEL Engineer) - Secret Clearance Required

Colorado Springs, Colorado, United States
Maximus
Platforms, including data services, storage, networking, and security components. -Monitor and optimize system performance, and implement corrective actions on a hybrid/private cloud-based platform. -Conduct regular cybersecurity vulnerability assessments and penetration testing. -Develop and maintain security incident response plans and procedures. -Develop and implement automation scripts and tools to streamline platform deployments, provisioning, and management tasks. -Deploy More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Platform Infrastructure Engineer

Annapolis Junction, Maryland, United States
Maximus
implement corrective actions on current platform(s). - Experience in managing and maintaining application integration leveraging current networking concepts (TCP/IP, routing, firewalls) - Oversee and conduct regular cybersecurity vulnerability assessments and penetration testing. - Develop and maintain security incident response plans and procedures. - Develop and implement automation scripts and tools to streamline platform deployments, provisioning, and management tasks. - Deploy More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Infrastructure Analyst

London, England, United Kingdom
Hybrid / WFH Options
2K
or automation tools (e.g., PowerShell, Bash, Ansible). ITIL certification or demonstrable service management experience. Demonstrable ability to work effectively in fast-paced, collaborative team settings. Experience in conducting vulnerability assessments and implementing remediation plans. Understanding compliance requirements relevant to the industry. Benefits: Discretionary bonus opportunity Hybrid Working (within Flexmodes) Private Medical Insurance Dental Scheme 25 days holiday per More ❯
Posted:

Job Title: DevSecOps Engineer II with Security Clearance

Chantilly, Virginia, United States
Hybrid / WFH Options
RogueThink Inc
integrate compliance and security scanning tools (e.g., SAST, DAST, SCA) into build pipelines. • Implement and monitor security controls and configurations in cloud platforms (AWS, Azure, or GCP). • Conduct vulnerability assessments and assist in remediation strategies. • Provide documentation and knowledge transfer to operations and development teams. • Collaborate with development teams on secure coding practices, especially in Node.js-based applications. More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Infrastructure Analyst

London, England, United Kingdom
Hybrid / WFH Options
Sony Interactive Entertainment
or automation tools (e.g., PowerShell, Bash, Ansible). ITIL certification or demonstrable service management experience. Demonstrable ability to work effectively in fast-paced, collaborative team settings. Experience in conducting vulnerability assessments and implementing remediation plans. Understanding compliance requirements relevant to the industry. Benefits: Discretionary bonus opportunity Hybrid Working (within Flexmodes) Private Medical Insurance Dental Scheme 25 days holiday per More ❯
Posted:

Project Manager with Security Clearance

Monterey, California, United States
Epsilon Inc
associated systems. The SOC is chartered to prevent, detect, contain, and eradicate cyber threats through monitoring, intrusion detection, and protective security services to information systems. The SOC also conducts vulnerability assessments, analyzes cyber threats, monitors the email gateway, and collects information on and investigates and reports on all confirmed or suspected security incidents. An average day: As Project Manager More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Infrastructure Analyst

London, England, United Kingdom
Hybrid / WFH Options
PlayStation Network
or automation tools (e.g., PowerShell, Bash, Ansible). ITIL certification or demonstrable service management experience. Demonstrable ability to work effectively in fast-paced, collaborative team settings. Experience in conducting vulnerability assessments and implementing remediation plans. Understanding compliance requirements relevant to the industry. Discretionary bonus opportunity Hybrid Working (within Flexmodes) Private Medical Insurance 25 days holiday per year On Site More ❯
Posted:

Staff Cloud Security Engineer

London, England, United Kingdom
MoonPay
future of our cloud security posture, driving continuous improvement and strategic initiatives Accurately document cloud security configurations, processes, and knowledge, and effectively disseminate this information to other teams Conduct vulnerability assessments and drive remediation for cloud infrastructure Support requirements and evidence requested from auditors, compliance and regulators What you'll be working on As part of our Cloud Security More ❯
Posted:

Vulnerability Analyst Interview

London, England, United Kingdom
The Interview Portal
Trust in digital transactions and financial technologies is crucial for the smooth functioning of modern society. Neelam Kadbane, our next pathbreaker, Senior Vulnerability Analyst at Mastercard, identifies and addresses security vulnerabilities within Mastercard’s environment & products by conducting network penetration tests. Neelam talks to Shyam Krishnamurthy fromThe Interview Portal about the innumerable challenges and the satisfacation of her work … . It was a significant achievement for me, especially since it’s rare for companies to hire freshers directly into the InfoSec domain. At Qualys, I worked with the Vulnerability Management team, where we researched new CVEs and zero-day vulnerabilities, and developed signatures for vulnerability scanners. A zero-day vulnerability is a security flaw in software … or hardware that is unknown to the vendor or developer. Since the vendor is unaware of the vulnerability, no patch or fix is available, making it highly dangerous. The term “zero-day” comes from the fact that once the vulnerability is discovered by malicious actors, the vendor has zero days to fix it before it can be exploited. More ❯
Posted:

Mid-Level Cybersecurity Analyst - EVAP Team with Security Clearance

Washington, Washington DC, United States
Paradyme Management
federal facilities in: Washington, DC; Huntsville, AL; and Clarksburg, WV. A current TOP SECRET clearance is required to be considered. We are seeking a Mid-level Cybersecurity Analyst - Enterprise Vulnerability Assessment Program (EVAP) Team, to conduct Enterprise Vulnerability Assessment Program (EVAP) tasks. This role requires candidate to have technical experience to assist the EVAP Team and … the government customer to maintain a proactive and resilient vulnerability management posture across its enterprise systems and infrastructure. Key Responsibilities: Serve as the administrator for enterprise vulnerability assessment tools and practices Helps maintain the architecture, engineering, and operation of the EVAP scanning infrastructure Assist with configuring and optimizing scanning solutions to ensure accuracy and effectiveness Continue to … Operation Procedures (SOP) to ensure tasks are performed within Cybersecurity policies Operational Oversight Performs daily operations of EVAP allowing EVAP, Red and Blue Teams to perform timely and effective vulnerability assessments Provide hands-on support for complex scans, troubleshooting, and result analysis Align scanning activities with organizational priorities for maximum impact Tool and Infrastructure Management Maintain and enhance the More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Cybersecurity Analyst - EVAP Team with Security Clearance

Washington, Washington DC, United States
Paradyme Management
secured federal facilities in: Washington, DC; Huntsville, AL; and Clarksburg, WV. A current TOP SECRET clearance is required to be considered. We are seeking a Senior Cybersecurity Analyst - Enterprise Vulnerability Assessment Program (EVAP). This role combines strategic oversight and technical expertise to ensure the government customer maintains a proactive and resilient vulnerability management posture across its … enterprise systems and infrastructure. Key Responsibilities: Serve as the technical authority for enterprise vulnerability assessment tools and practices Manage the architecture, engineering, and operation of the EVAP scanning infrastructure Configure and optimize scanning solutions to ensure accuracy and effectiveness Stay current with emerging tools, technologies, and threat landscapes to refine methodologies Operational Oversight: Performs daily operations of EVAP … allowing EVAP, Red and Blue Teams to perform timely and effective vulnerability assessments Provide hands-on support for complex scans, troubleshooting, and result analysis Align scanning activities with organizational priorities for maximum impact Tool and Infrastructure Management: Maintain and enhance the FBI's enterprise vulnerability scanning tools and infrastructure Ensure tools are secure, up to date, and effectively More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Information Systems Security Engineer (ISSE) with Security Clearance

Colorado Springs, Colorado, United States
OSAAVA Services
focused Information Systems Security Engineer (ISSE) to join our cybersecurity team supporting Department of Defense (DoD) systems. The ideal candidate will provide technical expertise in the design, implementation, and assessment of system security measures across the full system development lifecycle. This role is critical to ensuring the confidentiality, integrity, and availability of DoD information systems. Key Responsibilities: Design and … implement secure architectures and technical solutions for DoD systems in compliance with RMF and NIST 800-53. Conduct risk and vulnerability assessments on system architecture and software components. Develop and maintain security documentation including System Security Plans (SSPs), Security Assessment Reports (SARs), and POA&Ms. Collaborate with system administrators, engineers, and developers to integrate security requirements. Support … Clearance. 5+ years of experience in cybersecurity or information assurance engineering. Strong working knowledge of the Risk Management Framework (RMF), NIST 800-53, and DoD security policies. Experience with vulnerability assessment tools such as ACAS, Nessus, and STIG Viewer. Ability to develop, interpret, and analyze cybersecurity documentation and artifacts. Preferred Qualifications: CISSP, CAP, or equivalent cybersecurity certification. Experience More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cybersecurity Analyst with Security Clearance

Fort Belvoir, Virginia, United States
BreakPoiint Labs
Secret is required. Position Responsibilities: - Conduct continuous network monitoring and analysis using various defensive cyber tools - Enumerate vulnerable terrain in support of Tier 1 reporting. - Provide end customers with vulnerability assessment reports with tailored, prioritized mitigation actions. - Track vulnerability management efforts from identification, to notification, to remediation. - Investigate and report potential false positives from continuous monitoring tools. … agents. - Enumerate and report instances of specific platforms, installed software, and services (including unauthorized instances). - Validate network scanning quality and compliance IAW applicable JFHQ-DODIN TASKORDS. - Troubleshoot credentialed vulnerability scanning failures and provide remediation guidance. - Research emerging threats and vulnerabilities to aid in the identification of network security risks. - Assist in incident response activities by querying existing data … Program. - Provide prompt, quality customer service with excellent written and oral communication skills. - Provide direct support to the Protect Team Lead. - Experience with Tenable Security Center/Assured Compliance Assessment Solution (ACAS) strongly preferred. - Knowledge of network scanning principles and the potential impacts of intrusion detection/prevention systems (IDS/IPS) to scan data accuracy. Required Experience: - Knowledge More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

NMCC Information System Security Engineer (ISSE) with Security Clearance

Arlington, Virginia, United States
Country Intelligence Group
manage and maintain key cybersecurity tools such as Tenable Nessus and Trellix ePO (HBSS/ESS) across Windows and Red Hat Linux environments. Responsibilities include applying DISA STIGs, conducting vulnerability assessments, implementing system hardening measures, and supporting the Risk Management Framework (RMF) process. The ideal candidate has experience with tool administration, system architecture, Tier 3 troubleshooting, and security documentation. … servers. o Monitor system performance, identify bottlenecks, and implement solutions to ensure optimal operation of security tools. o Develop and maintain standard operating procedures (SOPs) for security tool administration. • Vulnerability Management & System Hardening: o Conduct technical security assessments of computing environments to identify points of vulnerability and recommend mitigation strategies. o Implement Security Technical Implementation Guides (STIGs) on … Integration: o Build IA into systems deployed to operational environments, validating and verifying system security requirements, and establishing system security designs for stand-alone systems. o Support security planning, assessment, risk analysis, and risk management. • Security Tool Troubleshooting & Support: o Provide Tier 3 troubleshooting support for cybersecurity tools such as ACAS and HBSS/ESS. • RMF Support & Documentation: o More ❯
Employment Type: Permanent
Salary: USD 152,000 Annual
Posted:

Security Engineer - Nessus Experience

Manchester Area, United Kingdom
Square One Resources
various components. While having experience with implementing the Tenable solution key, this job also requires full-time hands-on administration of the Tenable system as well as managing the vulnerability management aspect of the tool. You will be responsible for maintaining Nessus and the remediation of vulnerabilities across the bank. Installing and Configuring Nessus, Nessus Manager, Nessus Agents, Log … the Analysis and validation of the scan results. Responsible for monitoring, defining and configuring dashboards Required Skills/Experience The ideal candidate will have the following: Strong experience in Vulnerability management domain and experience with working with web Proxy teams and working on vulnerability assessment operational issues Experience in the design and implementation of enterprise-wide security … controls to secure systems, applications, network, or infrastructure services Hands-on experience with security tools and devices such as network firewalls, web proxy, intrusion prevention system, vulnerability scanner, and penetration testing tools. Demonstrated understanding of TCP/IP networking concepts and DNS. Related Identity Management tools engineering experience, including installing, configuring and troubleshooting experience with one or more of More ❯
Posted:

Cyber Security Engineer III with Security Clearance

Jacksonville, Florida, United States
Strategic Resilience Group
are Firewalls, Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Switch/Routers, Cross Domain Solutions (CDS), EMASS and, Endpoint Security Solution (ESS); o Performing STIG implementation; o Performing vulnerability assessments with the Assured Compliance Assessment Solution tool; and o Remediating vulnerability findings to include implementing vendor patches on both Linux and Windows Operating systems. More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security Engineer III with Security Clearance

Virginia Beach, Virginia, United States
Strategic Resilience Group
are Firewalls, Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Switch/Routers, Cross Domain Solutions (CDS), EMASS and, Endpoint Security Solution (ESS); o Performing STIG implementation; o Performing vulnerability assessments with the Assured Compliance Assessment Solution tool; and o Remediating vulnerability findings to include implementing vendor patches on both Linux and Windows Operating systems. More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security Engineer III with Security Clearance

San Diego, California, United States
Strategic Resilience Group
are Firewalls, Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Switch/Routers, Cross Domain Solutions (CDS), EMASS and, Endpoint Security Solution (ESS); o Performing STIG implementation; o Performing vulnerability assessments with the Assured Compliance Assessment Solution tool; and o Remediating vulnerability findings to include implementing vendor patches on both Linux and Windows Operating systems. More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security Engineer - Splunk, SOAR, SOC

London Area, United Kingdom
RiverSafe
Exabeam, Sentinel, Chronicle) and endpoint security platforms to the level of administration and deployment. Exposure to SOAR tools, observability tools and data stream processing tools Hands-on experience with vulnerability assessment tools, penetration testing methodologies and forensic analysis techniques. Experience in writing content/polices for monitoring in line with MITRE ATT&CK framework Familiarity with regulatory requirements More ❯
Posted:
Vulnerability Assessment
10th Percentile
£41,750
25th Percentile
£47,531
Median
£57,500
75th Percentile
£77,500
90th Percentile
£89,875