Vulnerability Assessment Job Vacancies

251 to 275 of 374 Vulnerability Assessment Jobs

Infrastructure Engineer

North East, United Kingdom
Damia Group Ltd
as Active Directory, DNS, DHCP, and email systems Support employee workstations, software provisioning, and user permissions Document infrastructure configurations, processes, and changes Assist in 3rd party IT audits and vulnerability assessments Provide out-of-hour support as needed and last line technical support for the customer support team Skills and experience 3-5 years of experience in IT infrastructure More ❯
Employment Type: Permanent
Salary: £50,000
Posted:

Software Engineer with Security Clearance

Maryland, United States
Que Technology Group
applications within Kubernetes environments, ensuring effective scaling and orchestration of SDR-related services. - Collaborate with security teams to incorporate security practices throughout the software development lifecycle, including threat modeling, vulnerability assessments, and automated security testing. - Build and maintain CI/CD pipelines to automate testing, integration, and deployment processes, ensuring reliable and efficient software delivery. - Leverage Docker for containerizing More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Site Reliability Engineer

Lisburn, County Antrim, United Kingdom
Hybrid / WFH Options
Camlin
Provide guidance and mentorship to junior team members. Security and Compliance Ensure systems comply with security standards and best practices. Implement and maintain security measures, including patch management and vulnerability assessments. Assist in audits and compliance initiatives as required. What you will need Bachelor's degree in Computer Science, Engineering, or a related field. 4+ years of hands-on More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cybersecurity Specialist with Security Clearance

Fort Belvoir, Virginia, United States
Barbaricum
Network Security Architect experience. Extensive understanding of the DoD standards guiding the development of cybersecurity policy, requirements, integration, engineering, and certification and accreditation. Perform security, analyses and risk/vulnerability assessments. Execute day to day certification and accreditation activities for a project team. Qualifications: Active DoD Secret Clearance. Bachelor's and 5+ years of relevant experience. This is contingent More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Vulnerability Manager

Milton Keynes, Buckinghamshire, South East, United Kingdom
InfinityQuest Ltd,
Requirements: Understand and analyse vulnerability data before they becomes overdue Organize and create work packages for teams for resolution Ensure fixes begin within SLA to prevent delays Help prioritize overdue and upcoming vulnerabilities effectively. Collaborate across teams to streamline technical remediation efforts." Understanding of vulnerability assessment and remediation processes Ability to triage and create meaningful work packages More ❯
Employment Type: Contract
Rate: £300 per day Inside IR35
Posted:

DOD Secret- IA Cyber Navy Compliance Specialist- IAT Level III- with Security Clearance

Indian Head, Maryland, United States
Associates Systems LLC
plans, developing and testing compliance with DISA STIGs, and maintaining robust cybersecurity documentation to support accreditation for an Authority to Operate (ATO). This role also involves risk and vulnerability assessments, security policy documentation, and serving as a certified Navy IA validator to ensure compliance with regulatory guidelines. Additionally, the specialist supports system administration by managing Windows and Linux More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security Engineer with Security Clearance

Atlanta, Georgia, United States
TEKsystems c/o Allegis Group
Engineer also creates novel cyber security technology components and software to ensure that critical systems and information are resilient to cyber exploits and attacks. The researcher also performs attendant vulnerability assessments, analysis, and software engineering and design. The Cyber Security Software Engineer also develops hardware and software prototypes, and tests those prototypes in realistic environments. Key Responsibilities • Perform software More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Software Engineer with Security Clearance

Fort Belvoir, Virginia, United States
Barbaricum
mission command systems. Extensive understanding of the DoD standards guiding the development of computer hardware and software policy, requirements, integration, engineering, and testing. Performs security, analyses and risk/vulnerability assessments of computer hardware and software Qualifications: Active DoD Secret Clearance. 10+ years of experience in software engineering. Bachelor's Degree in relevant field. This is contingent upon a More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Embedded Software Engineer

euclid, ohio, united states
Lincoln Electric
Yocto recipes and layers for new software components. Monitor and apply security patches to maintain system integrity. Security and Compliance Implement security best practices across the software stack. Conduct vulnerability assessments and risk analysis. Collaborate with security teams to address incidents and maintain compliance. Collaboration & Mentorship Work closely with hardware, firmware, and QA teams to define requirements and resolve More ❯
Posted:

Director of Cyber Defense and Operations

London, South East, England, United Kingdom
Hybrid / WFH Options
QBE Management Services (UK) Limited
Implement and manage data protection strategies to prevent unauthorized access, disclosure, or loss of sensitive information. Manage directly accountable vendor relationships to meet SLAs and track KPIs. Undertake regular vulnerability assessments across QBE's business and 3rd party providers. Implement and manage data protection strategies to safeguard sensitive information from unauthorized access, disclosure, or loss.? Required Qualifications: Tertiary Degree More ❯
Employment Type: Full-Time
Salary: Competitive salary
Posted:

Associate Solutions Architect

London, United Kingdom
Hybrid / WFH Options
Ten Group
architectural guidelines Support strategic projects, including: Migrating on-prem services and databases into AWS (RDS, Kubernetes) Improving observability across platforms (e.g., New Relic, Grafana, Logz.io) Participate in threat modelling, vulnerability assessments, and client security responses Help assess and reduce technical debt across legacy services Work across teams to promote high technical standards and help influence best practice adoption Communicate More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Architect

Gloucestershire, United Kingdom
Hybrid / WFH Options
SSR General & Management
security compliance and best practices, ensuring products meet regulatory and industry standards. Key Responsibilities: Identify security requirements and integrate controls into product development. Conduct risk assessments, threat modeling, and vulnerability analysis. Develop and implement risk management strategies using security frameworks. Collaborate with development teams to ensure security best practices and secure-by-design principles. Identify and mitigate security risks … MOD and HMG security standards (JSP, Def Stan 05-138/139). Proficiency in security threat modeling and risk assessments. Knowledge of secure development practices, penetration testing, and vulnerability assessments. Ability to communicate security risks and strategies to technical and non-technical stakeholders. Experience in incident response and remediation. Strong analytical and problem-solving skills. Qualifications & Requirements: Degree More ❯
Employment Type: Permanent
Salary: GBP 85,000 Annual
Posted:

Security Architect

Bristol, Kendleshire, Gloucestershire, United Kingdom
Hybrid / WFH Options
SSR General & Management
security compliance and best practices, ensuring products meet regulatory and industry standards. Key Responsibilities: Identify security requirements and integrate controls into product development. Conduct risk assessments, threat modeling, and vulnerability analysis. Develop and implement risk management strategies using security frameworks. Collaborate with development teams to ensure security best practices and secure-by-design principles. Identify and mitigate security risks … MOD and HMG security standards (JSP, Def Stan 05-138/139). Proficiency in security threat modeling and risk assessments. Knowledge of secure development practices, penetration testing, and vulnerability assessments. Ability to communicate security risks and strategies to technical and non-technical stakeholders. Experience in incident response and remediation. Strong analytical and problem-solving skills. Qualifications & Requirements: Degree More ❯
Employment Type: Permanent
Salary: £85000/annum
Posted:

Insider threat hunter with Security Clearance

Atlanta, Georgia, United States
TEKsystems c/o Allegis Group
controls to reduce unauthorized data transfers and improve visibility across cloud and on-prem environments. Conduct behavioral analysis and threat hunting using IOCs, TTPs, and threat intelligence feeds. Perform vulnerability assessments and risk analysis on high-value systems and personnel. Support compliance with NIST 800-53, DFARS , CMMC, and other regulatory frameworks. Engineer and maintain cybersecurity controls across IT … e.g., Code42, DTEX, UEBA platforms). Familiarity with NIST, DFARS, CMMC, and insider threat program frameworks (e.g., NISPOM, EO 13587). Strong understanding of incident response, threat hunting, and vulnerability management. Excellent communication skills and experience working cross-functionally with HR, legal, and compliance teams. One or more relevant certifications: CISSP, GCED, GCIH, GCFA, CEH, CySA+, or equivalent. Preferred More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

DevOps Engineer with Security Clearance

Colorado Springs, Colorado, United States
Take2 Consulting
SaaS Collaborate with development and operations teams to design, implement, and maintain secure and automated infrastructure Implement security best practices throughout the software development lifecycle (SDLC), including code scanning, vulnerability assessment, and threat modeling Develop and maintain CI/CD pipelines, enabling continuous integration, continuous delivery, and continuous deployment of applications Develop and maintain containerization and micro-services … Integrate security controls, such as automated vulnerability scanning, static and dynamic analysis, and security testing, into the CI/CD process Collaborate with cross-functional teams to ensure compliance with security standards and regulatory requirements Automate and orchestrate security processes, including incident response and threat detection, using technologies like Splunk, Chef Automate, and others Stay updated with emerging DevSecOps More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

DevSecOps Engineer - Security Clearance Required

Annapolis Junction, Maryland, United States
Maximus
SaaS - Collaborate with development and operations teams to design, implement, and maintain secure and automated infrastructure. - Implement security best practices throughout the software development lifecycle (SDLC), including code scanning, vulnerability assessment, and threat modeling. - Develop and maintain CI/CD pipelines, enabling continuous integration, continuous delivery, and continuous deployment of applications. - Develop and maintain containerization and micro-services. … Integrate security controls, such as automated vulnerability scanning, static and dynamic analysis, and security testing, into the CI/CD process. - Collaborate with cross-functional teams to ensure compliance with security standards and regulatory requirements. - Automate and orchestrate security processes, including incident response and threat detection, using technologies like Splunk, Chef Automate, and others. - Stay updated with emerging DevSecOps More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security Architect (d/m/f) - Ground Training Simulation

Manching, Bayern, Germany
E Airbus Defence and Space GmbH
cyber security. Proactively contribute to the business solutions architecture and design to manage and reduce security risks. Conduct the security risk assessments on the Airbus Products (including threat and vulnerability assessment). Lead the definition of security requirement and concept of security to mitigate the security risks. Lead the design of secure architecture for Training Simulation Solutions in … component. Ensure the security compliance of the products in accordance to the national and international security regulations in accordance to the applicable criteria and methodologies. Lead the Security Risk Assessment and Threat Modeling Processes for the related projects. Verification and Validation of Secure Systems and Network design. Evaluate, develop and adapt product and sub-products for secure system and … Family, CIS, NIST, ). You possess strong expertise with Secure Architecture Principles and Concepts (e.g Zero Trust , Defense in Depth, Least Privilege ). You are knowledgeable of the Risk Assessment framework. You have a solid understanding to define verification and validation procedures for secure architecture. Excellent communication and writing skills in English. German and Spanish would be a advantage. More ❯
Employment Type: Permanent
Salary: EUR Annual
Posted:

OT/IOT Security Consultant-Nozomi

Coventry, England, United Kingdom
HCLTech
Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), Information Event Management (SIEM). Key Responsibilities: Designing and implementing technical solutions for asset discovery, OT cyber security, vulnerability assessment tools Define and implement OT-specific security policies and monitoring rules within Nozomi to detect anomalies, threats and compliance violations. Deploy OT Security (Nozomi)/IDS platform More ❯
Posted:

OT/IOT Security Consultant-Nozomi

binley, midlands, united kingdom
HCLTech
Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), Information Event Management (SIEM). Key Responsibilities: Designing and implementing technical solutions for asset discovery, OT cyber security, vulnerability assessment tools Define and implement OT-specific security policies and monitoring rules within Nozomi to detect anomalies, threats and compliance violations. Deploy OT Security (Nozomi)/IDS platform More ❯
Posted:

OT/IOT Security Consultant-Nozomi

leicester, midlands, united kingdom
HCLTech
Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), Information Event Management (SIEM). Key Responsibilities: Designing and implementing technical solutions for asset discovery, OT cyber security, vulnerability assessment tools Define and implement OT-specific security policies and monitoring rules within Nozomi to detect anomalies, threats and compliance violations. Deploy OT Security (Nozomi)/IDS platform More ❯
Posted:

Supply Chain Risk Management Analyst

Fort George G Meade, Maryland, United States
ManTech
products and industry trend data to understand and analyze technical and non-technical vulnerabilities to Information Technology posed by foreign intelligence organizations. Based upon this analysis, provide impact and vulnerability assessments, recommendations, and countermeasures to threats. Collect, analyze and interpret open-source intelligence (OSINT) data across multiple collection platforms and fuse OSINT with classified intelligence to develop rigorously objective More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Nuclear Engineer (Scientific Support) with Security Clearance

Reston, Virginia, United States
Cyntel Technologies LLC
with current CI polygraph preferred Nuclear Engineer MID: This person will support defense analytical requirements with enhanced scientific/engineering research; reverse engineering analysis/characterizations; and facility and vulnerability assessments on foreign nuclear capabilities. This includes, but not limited to, nuclear engineering and sub-disciplines of thermo-hydraulics; seismic/earthquakes; physics; computational science; and/or fission More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Linux Systems Administrator with Security Clearance

Lehi, Utah, United States
FUSE Engineering
proficiency in using Nagios and Splunk for comprehensive system monitoring and analytics. Skills in automation scripts and experience with Salt and Ansible for configuration management are crucial. • Lead security vulnerability assessments and mitigation efforts on Linux systems and other devices, leveraging advanced features of Tenable Nessus. • Experience with Linux provisioning server tools such as Kickstart and Cobbler to facilitate More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Tenable Nessus Administrator with Security Clearance

Chantilly, Virginia, United States
Prism, Inc
be responsible for the development and management of scanning activities to enhance the organization's cybersecurity posture. Your primary focus will be overseeing and managing our ACAS (Assured Compliance Assessment Solution) scanning activities and the overall Tenable solution. You will work closely with the cybersecurity team, IT staff, and other stakeholders to ensure the effective operation of ACAS solution … on both Linux/Unix and Windows based environments Ensure compliance with organizational security policies and industry best practices Develop and implement strategies to optimize scanning processes and improve vulnerability management Collaborate with cross-functional teams to address security findings and implement remediation plans Generate and present reports to stakeholders on vulnerability assessments and risk mitigation efforts Responsible … for defining scan policies and audit policies Responsible for adding scan credentials Responsible for Scheduling scans Responsible for Generating Scan Reports Responsible for importing/uploading scan reports for Vulnerability Responsible for the Analysis and validation of the scan results. Qualifications Required: Required compliant certification such as CompTIA Security+ Other relevant cybersecurity certifications like Certified Information Systems Security Professional More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cybersecurity Course Instructor with Security Clearance

Hanover, Maryland, United States
Eccalon LLC
Real-world Case Studies: Integrate real-world security incidents, breaches, or news into course material to ensure relevance and applicability of the concepts being taught. Student Engagement Student Performance Assessment: Evaluate student assignments, exams, projects, and lab performance through both formative and summative assessments to ensure they meet learning objectives. Feedback: Offer constructive and timely feedback to students, guiding … IPS, network monitoring tools, threat intelligence platforms, and security protocols. Skills and Expectations: Technical Expertise In-depth knowledge of cybersecurity frameworks, tools, and protocols. Practical experience with penetration testing, vulnerability assessments, and security operations. Familiarity with incident response procedures, risk management, and security compliance. Instructional Skills Ability to convey complex technical information clearly and effectively to students with varying More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:
Vulnerability Assessment
10th Percentile
£41,250
25th Percentile
£46,875
Median
£57,500
75th Percentile
£73,750
90th Percentile
£86,000