Vulnerability Assessment Job Vacancies

276 to 300 of 362 Vulnerability Assessment Jobs

Journeyman SOC Analyst with Security Clearance

Hawaii, United States
Clark Creative Solutions
monitoring, incident response, malware analysis, and threat hunting activities. • Develop and utilize analytics on the security information and event management (SIEM) platform to monitor for security alerts and coordinate vulnerability assessments and artifact collection across servers and network devices. • Asses Security Technical Implementation Guides (STIGs) compliance and completion. • Utilize asset mapping tools to verify connected inventory. • Handle Information Assurance … Vulnerability Management (IVAM) notifications. • Evaluate network structures and device configurations for security risks, offering recommendations based on best practices, and gather data to identify and respond to network intrusions. • Analyze network traffic and system logs to identify malicious activities, vulnerabilities exploited, and methods used, and develop processes to enhance SOC response and efficiency. • Conduct comprehensive technical analyses of computer More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Security Engineer with Security Clearance

Orlando, Florida, United States
VAE, Inc
strategies to protect classified and unclassified environments. Collaborate with system owners, engineers, and program managers to ensure security requirements are integrated into system designs and operations. Support incident response, vulnerability remediation, and compliance audits as needed. Qualifications 5+ years of direct experience in Information Security or Cybersecurity. Active DoD Secret Security Clearance (minimum). Strong knowledge of: Information assurance … CISM, CEH, CASP+). Prior experience supporting Army or other DoD cybersecurity programs. Familiarity with cloud security, SIEM tools, and advanced threat detection technologies. Experience conducting security testing and vulnerability assessments on enterprise IT systems. More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Security Engineer with Security Clearance

Huntsville, Alabama, United States
VAE, Inc
strategies to protect classified and unclassified environments. Collaborate with system owners, engineers, and program managers to ensure security requirements are integrated into system designs and operations. Support incident response, vulnerability remediation, and compliance audits as needed. Qualifications 5+ years of direct experience in Information Security or Cybersecurity. Active DoD Secret Security Clearance (minimum). Strong knowledge of: Information assurance … CISM, CEH, CASP+). Prior experience supporting Army or other DoD cybersecurity programs. Familiarity with cloud security, SIEM tools, and advanced threat detection technologies. Experience conducting security testing and vulnerability assessments on enterprise IT systems. More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Security Engineer with Security Clearance

Sierra Vista, Arizona, United States
VAE, Inc
strategies to protect classified and unclassified environments. Collaborate with system owners, engineers, and program managers to ensure security requirements are integrated into system designs and operations. Support incident response, vulnerability remediation, and compliance audits as needed. Qualifications 5+ years of direct experience in Information Security or Cybersecurity. Active DoD Secret Security Clearance (minimum). Strong knowledge of: Information assurance … CISM, CEH, CASP+). Prior experience supporting Army or other DoD cybersecurity programs. Familiarity with cloud security, SIEM tools, and advanced threat detection technologies. Experience conducting security testing and vulnerability assessments on enterprise IT systems. More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

SAP Data Quality Analyst

Seattle, Washington, United States
Tata Consultancy Services
to drive innovation are absolute must Direct engagement with customer to provide support and understand customer needs Assist in responses to internal and external compliance audits, penetration tests and vulnerability assessments. TCS Employee Benefits Summary: Discretionary Annual Incentive. Comprehensive Medical Coverage: Medical & Health, Dental & Vision, Disability Planning & Insurance, Pet Insurance Plans. Family Support: Maternal & Parental Leaves. Insurance Options: Auto More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

CSOC Admin with Security Clearance

Colorado Springs, Colorado, United States
Take2 Consulting
and recommend hardware and software solutions to address business needs and improve the RHEL server environment Develop and maintain comprehensive documentation for system configurations, processes, and troubleshooting procedures Conduct vulnerability assessments using tools like Tenable, HP WebInspect, and similar platforms Investigate security incidents, assess risks, and design mitigation strategies, implementing proactive and reactive measures to enhance security Requirements: Active More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Lead Security Architect

Central London, London, United Kingdom
Aker Systems Limited
e.g ITHC) of solutions on the public cloud (Azure, AWS, GCP), cloud native platforms (Docker, Kubernetes, etc.), and Software as a Service (SaaS) solutions. Formulate HMG Information Assurance Risk Assessment and Risk Treatment Plans Establish security requirements for cloud-based solutions by evaluating business strategies and requirements, implementing security standards such as ISO 27000 series, NIST, CSF, and CSA … development of patterns and principles Working within environments utilising DevOps, DevSecOps, SRE, CI/CD, Infrastructure & Security as Code (Docker, Git, Terraform) Managing technical assessments of security related technologies, vulnerability assessments and penetration tools and techniques Enabling & informing risk-based decisions: Working with higher impact or more complex risks, advising on the impact and whether this is within risk More ❯
Employment Type: Permanent
Posted:

Security Engineer

Glasgow, United Kingdom
Experis - ManpowerGroup
secure configuration and access management within GitLab version control and CI/CD pipelines Integrate and secure telemetry tools including Cribl, Elastic, Splunk, Fluentd, and Syslog Conduct threat modelling, vulnerability assessments, and risk analysis for the telemetry pipeline Collaborate with DevOps engineers to embed security into infrastructure-as-code and deployment workflows Monitor and respond to security events and … of networking protocols, firewalls, VPNs, and security principles Experience with security frameworks (e.g., NIST, ISO 27001) and compliance requirements Knowledge of container security tools (e.g., Aqua, Twistlock, Trivy) and vulnerability scanners Excellent analytical and communication skills Preferred Qualifications Certifications such as CISSP, CISM, CKS (Certified Kubernetes Security Specialist), or equivalent Experience in building MVPs or working in startup-like More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Engineer

Glasgow, City of Glasgow, United Kingdom
Experis
secure configuration and access management within GitLab version control and CI/CD pipelines Integrate and secure telemetry tools including Cribl, Elastic, Splunk, Fluentd, and Syslog Conduct threat modelling, vulnerability assessments, and risk analysis for the telemetry pipeline Collaborate with DevOps engineers to embed security into infrastructure-as-code and deployment workflows Monitor and respond to security events and … of networking protocols, firewalls, VPNs, and security principles Experience with security frameworks (e.g., NIST, ISO 27001) and compliance requirements Knowledge of container security tools (e.g., Aqua, Twistlock, Trivy) and vulnerability scanners Excellent analytical and communication skills Preferred Qualifications: Certifications such as CISSP, CISM, CKS (Certified Kubernetes Security Specialist), or equivalent Experience in building MVPs or working in startup-like More ❯
Employment Type: Contract
Rate: £600 - £650/day
Posted:

Security Engineer

Glasgow, Lanarkshire, Scotland, United Kingdom
Experis
secure configuration and access management within GitLab version control and CI/CD pipelines Integrate and secure telemetry tools including Cribl, Elastic, Splunk, Fluentd, and Syslog Conduct threat modelling, vulnerability assessments, and risk analysis for the telemetry pipeline Collaborate with DevOps engineers to embed security into infrastructure-as-code and deployment workflows Monitor and respond to security events and … of networking protocols, firewalls, VPNs, and security principles Experience with security frameworks (e.g., NIST, ISO 27001) and compliance requirements Knowledge of container security tools (e.g., Aqua, Twistlock, Trivy) and vulnerability scanners Excellent analytical and communication skills Preferred Qualifications: Certifications such as CISSP, CISM, CKS (Certified Kubernetes Security Specialist), or equivalent Experience in building MVPs or working in startup-like More ❯
Employment Type: Contract
Rate: £600 - £650 per day
Posted:

Information Systems Security Officer (ISSO)- Journeyman Level with Security Clearance

Eglin Afb, Florida, United States
OSAAVA Services
systems and ensuring compliance with Department of Defense (DoD) security policies. Key Responsibilities: Monitor and analyze system security logs and alerts to identify suspicious activities and potential threats. Support vulnerability assessments and risk analysis activities. Implement security controls in accordance with DoD cybersecurity regulations and RMF (Risk Management Framework). Assist with security incident response, containment, investigation, and remediation … years of hands-on experience in information security or cybersecurity analysis. Familiarity with DoD cybersecurity policies, RMF, STIGs, and NIST frameworks. Experience using security tools such as SIEMs, vulnerability scanners, and endpoint protection platforms. Strong analytical and problem-solving skills. Excellent communication and documentation abilities. Preferred Qualifications: Bachelor's degree in Cybersecurity, Information Technology, or a related field. Experience More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSO - Informations Systems Security Officer with Security Clearance

Eglin Afb, Florida, United States
OSAAVA Services
systems and ensuring compliance with Department of Defense (DoD) security policies. Key Responsibilities • Monitor and analyze system security logs and alerts to identify suspicious activities and potential threats • Support vulnerability assessments and risk analysis activities • Implement security controls in accordance with DoD cybersecurity regulations and RMF (Risk Management Framework) • Assist with security incident response, containment, investigation, and remediation efforts … years of hands-on experience in information security or cybersecurity analysis • Familiarity with DoD cybersecurity policies, RMF, STIGs, and NIST frameworks • Experience using security tools such as SIEMs, vulnerability scanners, and endpoint protection platforms • Strong analytical and problem-solving skills • Excellent communication and documentation abilities Preferred Qualifications • Bachelor's degree in Cybersecurity, Information Technology, or a related field • Experience More ❯
Employment Type: Permanent
Salary: USD 90,000 Annual
Posted:

Network Security Engineer - Industry leading benefits

chesapeake, virginia, united states
SimVentions, Inc - Glassdoor ✪ 4.6
/or MITRE D3FEND frameworks to assess and improve threat detection and response strategies Conduct advanced threat intelligence analysis, identify emerging potential threats, and provide threat intelligence recommendations Perform vulnerability assessments using the Assured Compliance Assessment Solution (ACAS) and other security tools Analyze vulnerability findings and develop remediation plans Remediate vulnerability findings by implementing vendor patches … virtualization Application of DoD cybersecurity policies and use of DoD security tools MITRE ATT&CK or MITRE D3FEND frameworks Threat intelligence assessments and identification of emerging potential threats Performing vulnerability assessments with ACAS Remediation of vulnerability findings to include implementation of vendor patches on both Linux and Windows Operating systems ⁠Design, implementation, configuration, and enforcement of security controls More ❯
Posted:

Network Security Engineer - Industry leading benefits

norfolk, virginia, united states
SimVentions, Inc - Glassdoor ✪ 4.6
/or MITRE D3FEND frameworks to assess and improve threat detection and response strategies Conduct advanced threat intelligence analysis, identify emerging potential threats, and provide threat intelligence recommendations Perform vulnerability assessments using the Assured Compliance Assessment Solution (ACAS) and other security tools Analyze vulnerability findings and develop remediation plans Remediate vulnerability findings by implementing vendor patches … virtualization Application of DoD cybersecurity policies and use of DoD security tools MITRE ATT&CK or MITRE D3FEND frameworks Threat intelligence assessments and identification of emerging potential threats Performing vulnerability assessments with ACAS Remediation of vulnerability findings to include implementation of vendor patches on both Linux and Windows Operating systems ⁠Design, implementation, configuration, and enforcement of security controls More ❯
Posted:

Network Security Engineer - Industry leading benefits

virginia beach, virginia, united states
SimVentions, Inc - Glassdoor ✪ 4.6
/or MITRE D3FEND frameworks to assess and improve threat detection and response strategies Conduct advanced threat intelligence analysis, identify emerging potential threats, and provide threat intelligence recommendations Perform vulnerability assessments using the Assured Compliance Assessment Solution (ACAS) and other security tools Analyze vulnerability findings and develop remediation plans Remediate vulnerability findings by implementing vendor patches … virtualization Application of DoD cybersecurity policies and use of DoD security tools MITRE ATT&CK or MITRE D3FEND frameworks Threat intelligence assessments and identification of emerging potential threats Performing vulnerability assessments with ACAS Remediation of vulnerability findings to include implementation of vendor patches on both Linux and Windows Operating systems ⁠Design, implementation, configuration, and enforcement of security controls More ❯
Posted:

Information Systems Security Officer with Security Clearance

Boston, Massachusetts, United States
Digital Prospectors
crucial in maintaining and developing our Information Security (IS) program and ensuring compliance with established security policies and procedures. The ISSO will be responsible for overseeing operational security implementation, vulnerability management, system assessments, and recovery processes. The ideal candidate will play a key role in safeguarding critical information systems and contribute to a comprehensive security posture. Essential Duties and … validate adherence to security standards. • Promote awareness of security issues across the organization. • Provide ongoing training to ensure all staff understand their security responsibilities. • Prepare technical documents, incident reports, vulnerability assessments, and other situational awareness information for key stakeholders. • Assist in ensuring systems and configurations comply with security guidelines and regulatory requirements. • Monitor and validate compliance through continuous security … assessments and audits. • Conduct system vulnerability scanning, configuration assessment, and remediation to maintain system integrity and security. Qualifications: • Bachelor's degree in Computer Science, Information Systems, Cybersecurity, or a related field is required. • Proven experience in cybersecurity, risk management, or information security roles, particularly in relation to system security, vulnerability management, and compliance activities. • Strong knowledge of More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Business Development Manager

Warrington, Cheshire, North West, United Kingdom
Hybrid / WFH Options
Oscar Associates (UK) Limited
security, and consultancy. They focus on proactive system health checks, monitoring, and intervention to ensure smooth business operations. Additionally, their IT security services help protect data and networks through vulnerability assessments, risk mitigation, and business continuity planning Apply now! Or email your CV to Referrals: If this role is not right for you, do you know someone that might More ❯
Employment Type: Permanent, Work From Home
Salary: £40,000
Posted:

Assistant Information System Security Officer (AISSO) with Security Clearance

Washington, Washington DC, United States
Data Intelligence LLC
Milestones (POA&Ms) to address identified cybersecurity gaps, ensuring alignment with applicable STIGs. - Assist in performing Risk Assessments using tools like ACAS, Nessus, and SCAP, and generate thorough Risk Assessment Reports (RARs). - Contribute to the preparation, review, and organization of Assessment and Authorization (A&A) packages ensuring completeness, consistency, and accuracy across documentation sets. - Maintain and update … entries in eMASS and deliver other cybersecurity-related documentation in MS Office or Visio formats. - Coordinate with Red and Blue Teams on vulnerability assessments and incident response activities. - Assist with technical writing tasks related to security documentation, policies, and system accreditation deliverables. Required Qualifications: - 5-7+ years in related experience - Prior experience with Navy or US Coast Guard … RMF/Cyber - Demonstrated understanding of NIST SP 800-series and DoDI/DoD 8500-series frameworks. - Hands-on experience with IA vulnerability assessments and tools such as NMap, ACAS/Nessus, and SCAP utilities. - Must meet IAT/IAM Level II certification requirements (e.g., Security+ CE, CAP, CISSP). - Solid communication and interpersonal skills to facilitate collaboration across More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security Engineer III with Security Clearance

Jacksonville, Florida, United States
Strategic Resilience Group
are Firewalls, Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Switch/Routers, Cross Domain Solutions (CDS), EMASS and, Endpoint Security Solution (ESS); o Performing STIG implementation; o Performing vulnerability assessments with the Assured Compliance Assessment Solution tool; and o Remediating vulnerability findings to include implementing vendor patches on both Linux and Windows Operating systems. More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security Engineer III with Security Clearance

San Diego, California, United States
Strategic Resilience Group
are Firewalls, Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Switch/Routers, Cross Domain Solutions (CDS), EMASS and, Endpoint Security Solution (ESS); o Performing STIG implementation; o Performing vulnerability assessments with the Assured Compliance Assessment Solution tool; and o Remediating vulnerability findings to include implementing vendor patches on both Linux and Windows Operating systems. More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cloud Security Engineer (AWS) - Remote

London, South East, England, United Kingdom
Hybrid / WFH Options
DMS Computer Recruitment
of the position include: Design and build resilient Cloud infrastructures that are protected against security threats Develop and assess Cloud security solutions to secure systems, databases and networks Conduct assessment and make recommendations to ensure that appropriate controls are in place Gain insight into security incidents and threats by monitoring/analyzing logs and performing vulnerability assessments Participate More ❯
Employment Type: Full-Time
Salary: £70,000 - £90,000 per annum
Posted:

Hybrid Penetration Tester (Java)

Albany, New York, United States
Hybrid / WFH Options
The Computer Merchant, LTD
role. Core Java coding experience. Previous job background as an engineer and Dev Sec position on a large scale public enterprise scale application. Key Responsibilities: Conduct penetration tests and vulnerability assessments for Java applications and infrastructure. Identify security flaws in Java code using automated and manual methods. Create and use custom exploits to test application security, simulating attacker tactics. … improve secure development processes (SDLC). Assist in responding to security incidents related to Java vulnerabilities, current published NIST CVE. Clearly document and report findings, including technical details, risk assessment, and recommended solutions. Communicate findings and recommendations to both technical and non-technical staff. Contribute to security policies for Java development and deployment. Manipulate URLs, query parameters and Application More ❯
Employment Type: Permanent
Salary: USD 70 Hourly
Posted:

CNO Developer / Computer Scientist / Reverse Engineer with Security Clearance

Annapolis Junction, Maryland, United States
Elucidation Concepts LLC
o Reverse Engineering: • Analyze, decompile, and reverse-engineer software binaries to understand vulnerabilities and potential exploits. • Develop proof-of-concept exploits to demonstrate potential vulnerabilities in targeted systems. o Vulnerability Research • Identify, analyze, and document software vulnerabilities. • Collaborate with team members to develop mitigations and workarounds for discovered vulnerabilities. o System and Network Analysis: • Conduct network traffic analysis to … Participate in design and code reviews to ensure adherence to best practices and standards. o Documentation: • Prepare detailed technical documentation and reports, including user guides, system design documents, and vulnerability assessments. • Ensure all documentation is clear, concise, and accessible to team members and stakeholders. Required Qualifications: o Clearance: Active TS/SCI with Full Scope Polygraph is mandatory. o More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cloud Cybersecurity Subject Matter Expert with Security Clearance

Washington, Washington DC, United States
Barbaricum
on secure cloud architecture, policy implementation, and threat mitigation strategies. Provide direct support for compliance with NIST Risk Management Framework (RMF), FISMA, and relevant cybersecurity directives. Manage and oversee vulnerability assessments, system audits, and incident response planning. Support the integration of security controls including STIGs, SCAP, IAVA compliance, and policy documentation. Collaborate with leadership to ensure cybersecurity is embedded … the following certifications: CISM, CISSO, FITSP-M, GCIA, GCSA, GCIH, GSLC, GICSP, CISSP-ISSMP, CISSP Desired Qualifications: 8+ years of experience analyzing, assessing, and implementing corrective actions based on vulnerability management and penetration testing. 8+ years of experience supporting DoD defensive cyber operations including but not limited to, information system protection, defense, response (incident handling), reporting and recovery. EEO More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cybersecurity Engineer - Competitive 401(k) programs

chesapeake, virginia, united states
SimVentions, Inc - Glassdoor ✪ 4.6
/or MITRE D3FEND frameworks to assess and improve threat detection and response strategies Conduct advanced threat intelligence analysis, identify emerging potential threats, and provide threat intelligence recommendations Perform vulnerability assessments using the Assured Compliance Assessment Solution (ACAS) and other security tools Analyze vulnerability findings and develop remediation plans Remediate vulnerability findings by implementing vendor patches … virtualization Application of DoD cybersecurity policies and use of DoD security tools MITRE ATT&CK or MITRE D3FEND frameworks Threat intelligence assessments and identification of emerging potential threats Performing vulnerability assessments with ACAS Remediation of vulnerability findings to include implementation of vendor patches on both Linux and Windows Operating systems ⁠Design, implementation, configuration, and enforcement of security controls More ❯
Posted:
Vulnerability Assessment
10th Percentile
£41,250
25th Percentile
£46,875
Median
£57,500
75th Percentile
£73,750
90th Percentile
£86,000