as Active Directory, DNS, DHCP, and email systems Support employee workstations, software provisioning, and user permissions Document infrastructure configurations, processes, and changes Assist in 3rd party IT audits and vulnerability assessments Provide out-of-hour support as needed and last line technical support for the customer support team Skills and experience 3-5 years of experience in IT infrastructure More ❯
applications within Kubernetes environments, ensuring effective scaling and orchestration of SDR-related services. - Collaborate with security teams to incorporate security practices throughout the software development lifecycle, including threat modeling, vulnerability assessments, and automated security testing. - Build and maintain CI/CD pipelines to automate testing, integration, and deployment processes, ensuring reliable and efficient software delivery. - Leverage Docker for containerizing More ❯
Lisburn, County Antrim, United Kingdom Hybrid / WFH Options
Camlin
Provide guidance and mentorship to junior team members. Security and Compliance Ensure systems comply with security standards and best practices. Implement and maintain security measures, including patch management and vulnerability assessments. Assist in audits and compliance initiatives as required. What you will need Bachelor's degree in Computer Science, Engineering, or a related field. 4+ years of hands-on More ❯
Network Security Architect experience. Extensive understanding of the DoD standards guiding the development of cybersecurity policy, requirements, integration, engineering, and certification and accreditation. Perform security, analyses and risk/vulnerability assessments. Execute day to day certification and accreditation activities for a project team. Qualifications: Active DoD Secret Clearance. Bachelor's and 5+ years of relevant experience. This is contingent More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom
InfinityQuest Ltd,
Requirements: Understand and analyse vulnerability data before they becomes overdue Organize and create work packages for teams for resolution Ensure fixes begin within SLA to prevent delays Help prioritize overdue and upcoming vulnerabilities effectively. Collaborate across teams to streamline technical remediation efforts." Understanding of vulnerabilityassessment and remediation processes Ability to triage and create meaningful work packages More ❯
plans, developing and testing compliance with DISA STIGs, and maintaining robust cybersecurity documentation to support accreditation for an Authority to Operate (ATO). This role also involves risk and vulnerability assessments, security policy documentation, and serving as a certified Navy IA validator to ensure compliance with regulatory guidelines. Additionally, the specialist supports system administration by managing Windows and Linux More ❯
Engineer also creates novel cyber security technology components and software to ensure that critical systems and information are resilient to cyber exploits and attacks. The researcher also performs attendant vulnerability assessments, analysis, and software engineering and design. The Cyber Security Software Engineer also develops hardware and software prototypes, and tests those prototypes in realistic environments. Key Responsibilities • Perform software More ❯
mission command systems. Extensive understanding of the DoD standards guiding the development of computer hardware and software policy, requirements, integration, engineering, and testing. Performs security, analyses and risk/vulnerability assessments of computer hardware and software Qualifications: Active DoD Secret Clearance. 10+ years of experience in software engineering. Bachelor's Degree in relevant field. This is contingent upon a More ❯
Yocto recipes and layers for new software components. Monitor and apply security patches to maintain system integrity. Security and Compliance Implement security best practices across the software stack. Conduct vulnerability assessments and risk analysis. Collaborate with security teams to address incidents and maintain compliance. Collaboration & Mentorship Work closely with hardware, firmware, and QA teams to define requirements and resolve More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
QBE Management Services (UK) Limited
Implement and manage data protection strategies to prevent unauthorized access, disclosure, or loss of sensitive information. Manage directly accountable vendor relationships to meet SLAs and track KPIs. Undertake regular vulnerability assessments across QBE's business and 3rd party providers. Implement and manage data protection strategies to safeguard sensitive information from unauthorized access, disclosure, or loss.? Required Qualifications: Tertiary Degree More ❯
architectural guidelines Support strategic projects, including: Migrating on-prem services and databases into AWS (RDS, Kubernetes) Improving observability across platforms (e.g., New Relic, Grafana, Logz.io) Participate in threat modelling, vulnerability assessments, and client security responses Help assess and reduce technical debt across legacy services Work across teams to promote high technical standards and help influence best practice adoption Communicate More ❯
Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
security compliance and best practices, ensuring products meet regulatory and industry standards. Key Responsibilities: Identify security requirements and integrate controls into product development. Conduct risk assessments, threat modeling, and vulnerability analysis. Develop and implement risk management strategies using security frameworks. Collaborate with development teams to ensure security best practices and secure-by-design principles. Identify and mitigate security risks … MOD and HMG security standards (JSP, Def Stan 05-138/139). Proficiency in security threat modeling and risk assessments. Knowledge of secure development practices, penetration testing, and vulnerability assessments. Ability to communicate security risks and strategies to technical and non-technical stakeholders. Experience in incident response and remediation. Strong analytical and problem-solving skills. Qualifications & Requirements: Degree More ❯
Bristol, Kendleshire, Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
security compliance and best practices, ensuring products meet regulatory and industry standards. Key Responsibilities: Identify security requirements and integrate controls into product development. Conduct risk assessments, threat modeling, and vulnerability analysis. Develop and implement risk management strategies using security frameworks. Collaborate with development teams to ensure security best practices and secure-by-design principles. Identify and mitigate security risks … MOD and HMG security standards (JSP, Def Stan 05-138/139). Proficiency in security threat modeling and risk assessments. Knowledge of secure development practices, penetration testing, and vulnerability assessments. Ability to communicate security risks and strategies to technical and non-technical stakeholders. Experience in incident response and remediation. Strong analytical and problem-solving skills. Qualifications & Requirements: Degree More ❯
controls to reduce unauthorized data transfers and improve visibility across cloud and on-prem environments. Conduct behavioral analysis and threat hunting using IOCs, TTPs, and threat intelligence feeds. Perform vulnerability assessments and risk analysis on high-value systems and personnel. Support compliance with NIST 800-53, DFARS , CMMC, and other regulatory frameworks. Engineer and maintain cybersecurity controls across IT … e.g., Code42, DTEX, UEBA platforms). Familiarity with NIST, DFARS, CMMC, and insider threat program frameworks (e.g., NISPOM, EO 13587). Strong understanding of incident response, threat hunting, and vulnerability management. Excellent communication skills and experience working cross-functionally with HR, legal, and compliance teams. One or more relevant certifications: CISSP, GCED, GCIH, GCFA, CEH, CySA+, or equivalent. Preferred More ❯
SaaS Collaborate with development and operations teams to design, implement, and maintain secure and automated infrastructure Implement security best practices throughout the software development lifecycle (SDLC), including code scanning, vulnerabilityassessment, and threat modeling Develop and maintain CI/CD pipelines, enabling continuous integration, continuous delivery, and continuous deployment of applications Develop and maintain containerization and micro-services … Integrate security controls, such as automated vulnerability scanning, static and dynamic analysis, and security testing, into the CI/CD process Collaborate with cross-functional teams to ensure compliance with security standards and regulatory requirements Automate and orchestrate security processes, including incident response and threat detection, using technologies like Splunk, Chef Automate, and others Stay updated with emerging DevSecOps More ❯
SaaS - Collaborate with development and operations teams to design, implement, and maintain secure and automated infrastructure. - Implement security best practices throughout the software development lifecycle (SDLC), including code scanning, vulnerabilityassessment, and threat modeling. - Develop and maintain CI/CD pipelines, enabling continuous integration, continuous delivery, and continuous deployment of applications. - Develop and maintain containerization and micro-services. … Integrate security controls, such as automated vulnerability scanning, static and dynamic analysis, and security testing, into the CI/CD process. - Collaborate with cross-functional teams to ensure compliance with security standards and regulatory requirements. - Automate and orchestrate security processes, including incident response and threat detection, using technologies like Splunk, Chef Automate, and others. - Stay updated with emerging DevSecOps More ❯
cyber security. Proactively contribute to the business solutions architecture and design to manage and reduce security risks. Conduct the security risk assessments on the Airbus Products (including threat and vulnerabilityassessment). Lead the definition of security requirement and concept of security to mitigate the security risks. Lead the design of secure architecture for Training Simulation Solutions in … component. Ensure the security compliance of the products in accordance to the national and international security regulations in accordance to the applicable criteria and methodologies. Lead the Security Risk Assessment and Threat Modeling Processes for the related projects. Verification and Validation of Secure Systems and Network design. Evaluate, develop and adapt product and sub-products for secure system and … Family, CIS, NIST, ). You possess strong expertise with Secure Architecture Principles and Concepts (e.g Zero Trust , Defense in Depth, Least Privilege ). You are knowledgeable of the Risk Assessment framework. You have a solid understanding to define verification and validation procedures for secure architecture. Excellent communication and writing skills in English. German and Spanish would be a advantage. More ❯
Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), Information Event Management (SIEM). Key Responsibilities: Designing and implementing technical solutions for asset discovery, OT cyber security, vulnerabilityassessment tools Define and implement OT-specific security policies and monitoring rules within Nozomi to detect anomalies, threats and compliance violations. Deploy OT Security (Nozomi)/IDS platform More ❯
Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), Information Event Management (SIEM). Key Responsibilities: Designing and implementing technical solutions for asset discovery, OT cyber security, vulnerabilityassessment tools Define and implement OT-specific security policies and monitoring rules within Nozomi to detect anomalies, threats and compliance violations. Deploy OT Security (Nozomi)/IDS platform More ❯
Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), Information Event Management (SIEM). Key Responsibilities: Designing and implementing technical solutions for asset discovery, OT cyber security, vulnerabilityassessment tools Define and implement OT-specific security policies and monitoring rules within Nozomi to detect anomalies, threats and compliance violations. Deploy OT Security (Nozomi)/IDS platform More ❯
products and industry trend data to understand and analyze technical and non-technical vulnerabilities to Information Technology posed by foreign intelligence organizations. Based upon this analysis, provide impact and vulnerability assessments, recommendations, and countermeasures to threats. Collect, analyze and interpret open-source intelligence (OSINT) data across multiple collection platforms and fuse OSINT with classified intelligence to develop rigorously objective More ❯
with current CI polygraph preferred Nuclear Engineer MID: This person will support defense analytical requirements with enhanced scientific/engineering research; reverse engineering analysis/characterizations; and facility and vulnerability assessments on foreign nuclear capabilities. This includes, but not limited to, nuclear engineering and sub-disciplines of thermo-hydraulics; seismic/earthquakes; physics; computational science; and/or fission More ❯
proficiency in using Nagios and Splunk for comprehensive system monitoring and analytics. Skills in automation scripts and experience with Salt and Ansible for configuration management are crucial. • Lead security vulnerability assessments and mitigation efforts on Linux systems and other devices, leveraging advanced features of Tenable Nessus. • Experience with Linux provisioning server tools such as Kickstart and Cobbler to facilitate More ❯
be responsible for the development and management of scanning activities to enhance the organization's cybersecurity posture. Your primary focus will be overseeing and managing our ACAS (Assured Compliance Assessment Solution) scanning activities and the overall Tenable solution. You will work closely with the cybersecurity team, IT staff, and other stakeholders to ensure the effective operation of ACAS solution … on both Linux/Unix and Windows based environments Ensure compliance with organizational security policies and industry best practices Develop and implement strategies to optimize scanning processes and improve vulnerability management Collaborate with cross-functional teams to address security findings and implement remediation plans Generate and present reports to stakeholders on vulnerability assessments and risk mitigation efforts Responsible … for defining scan policies and audit policies Responsible for adding scan credentials Responsible for Scheduling scans Responsible for Generating Scan Reports Responsible for importing/uploading scan reports for Vulnerability Responsible for the Analysis and validation of the scan results. Qualifications Required: Required compliant certification such as CompTIA Security+ Other relevant cybersecurity certifications like Certified Information Systems Security Professional More ❯
Real-world Case Studies: Integrate real-world security incidents, breaches, or news into course material to ensure relevance and applicability of the concepts being taught. Student Engagement Student Performance Assessment: Evaluate student assignments, exams, projects, and lab performance through both formative and summative assessments to ensure they meet learning objectives. Feedback: Offer constructive and timely feedback to students, guiding … IPS, network monitoring tools, threat intelligence platforms, and security protocols. Skills and Expectations: Technical Expertise In-depth knowledge of cybersecurity frameworks, tools, and protocols. Practical experience with penetration testing, vulnerability assessments, and security operations. Familiarity with incident response procedures, risk management, and security compliance. Instructional Skills Ability to convey complex technical information clearly and effectively to students with varying More ❯