monitoring, incident response, malware analysis, and threat hunting activities. • Develop and utilize analytics on the security information and event management (SIEM) platform to monitor for security alerts and coordinate vulnerability assessments and artifact collection across servers and network devices. • Asses Security Technical Implementation Guides (STIGs) compliance and completion. • Utilize asset mapping tools to verify connected inventory. • Handle Information Assurance … Vulnerability Management (IVAM) notifications. • Evaluate network structures and device configurations for security risks, offering recommendations based on best practices, and gather data to identify and respond to network intrusions. • Analyze network traffic and system logs to identify malicious activities, vulnerabilities exploited, and methods used, and develop processes to enhance SOC response and efficiency. • Conduct comprehensive technical analyses of computer More ❯
strategies to protect classified and unclassified environments. Collaborate with system owners, engineers, and program managers to ensure security requirements are integrated into system designs and operations. Support incident response, vulnerability remediation, and compliance audits as needed. Qualifications 5+ years of direct experience in Information Security or Cybersecurity. Active DoD Secret Security Clearance (minimum). Strong knowledge of: Information assurance … CISM, CEH, CASP+). Prior experience supporting Army or other DoD cybersecurity programs. Familiarity with cloud security, SIEM tools, and advanced threat detection technologies. Experience conducting security testing and vulnerability assessments on enterprise IT systems. More ❯
strategies to protect classified and unclassified environments. Collaborate with system owners, engineers, and program managers to ensure security requirements are integrated into system designs and operations. Support incident response, vulnerability remediation, and compliance audits as needed. Qualifications 5+ years of direct experience in Information Security or Cybersecurity. Active DoD Secret Security Clearance (minimum). Strong knowledge of: Information assurance … CISM, CEH, CASP+). Prior experience supporting Army or other DoD cybersecurity programs. Familiarity with cloud security, SIEM tools, and advanced threat detection technologies. Experience conducting security testing and vulnerability assessments on enterprise IT systems. More ❯
strategies to protect classified and unclassified environments. Collaborate with system owners, engineers, and program managers to ensure security requirements are integrated into system designs and operations. Support incident response, vulnerability remediation, and compliance audits as needed. Qualifications 5+ years of direct experience in Information Security or Cybersecurity. Active DoD Secret Security Clearance (minimum). Strong knowledge of: Information assurance … CISM, CEH, CASP+). Prior experience supporting Army or other DoD cybersecurity programs. Familiarity with cloud security, SIEM tools, and advanced threat detection technologies. Experience conducting security testing and vulnerability assessments on enterprise IT systems. More ❯
to drive innovation are absolute must Direct engagement with customer to provide support and understand customer needs Assist in responses to internal and external compliance audits, penetration tests and vulnerability assessments. TCS Employee Benefits Summary: Discretionary Annual Incentive. Comprehensive Medical Coverage: Medical & Health, Dental & Vision, Disability Planning & Insurance, Pet Insurance Plans. Family Support: Maternal & Parental Leaves. Insurance Options: Auto More ❯
and recommend hardware and software solutions to address business needs and improve the RHEL server environment Develop and maintain comprehensive documentation for system configurations, processes, and troubleshooting procedures Conduct vulnerability assessments using tools like Tenable, HP WebInspect, and similar platforms Investigate security incidents, assess risks, and design mitigation strategies, implementing proactive and reactive measures to enhance security Requirements: Active More ❯
e.g ITHC) of solutions on the public cloud (Azure, AWS, GCP), cloud native platforms (Docker, Kubernetes, etc.), and Software as a Service (SaaS) solutions. Formulate HMG Information Assurance Risk Assessment and Risk Treatment Plans Establish security requirements for cloud-based solutions by evaluating business strategies and requirements, implementing security standards such as ISO 27000 series, NIST, CSF, and CSA … development of patterns and principles Working within environments utilising DevOps, DevSecOps, SRE, CI/CD, Infrastructure & Security as Code (Docker, Git, Terraform) Managing technical assessments of security related technologies, vulnerability assessments and penetration tools and techniques Enabling & informing risk-based decisions: Working with higher impact or more complex risks, advising on the impact and whether this is within risk More ❯
secure configuration and access management within GitLab version control and CI/CD pipelines Integrate and secure telemetry tools including Cribl, Elastic, Splunk, Fluentd, and Syslog Conduct threat modelling, vulnerability assessments, and risk analysis for the telemetry pipeline Collaborate with DevOps engineers to embed security into infrastructure-as-code and deployment workflows Monitor and respond to security events and … of networking protocols, firewalls, VPNs, and security principles Experience with security frameworks (e.g., NIST, ISO 27001) and compliance requirements Knowledge of container security tools (e.g., Aqua, Twistlock, Trivy) and vulnerability scanners Excellent analytical and communication skills Preferred Qualifications Certifications such as CISSP, CISM, CKS (Certified Kubernetes Security Specialist), or equivalent Experience in building MVPs or working in startup-like More ❯
secure configuration and access management within GitLab version control and CI/CD pipelines Integrate and secure telemetry tools including Cribl, Elastic, Splunk, Fluentd, and Syslog Conduct threat modelling, vulnerability assessments, and risk analysis for the telemetry pipeline Collaborate with DevOps engineers to embed security into infrastructure-as-code and deployment workflows Monitor and respond to security events and … of networking protocols, firewalls, VPNs, and security principles Experience with security frameworks (e.g., NIST, ISO 27001) and compliance requirements Knowledge of container security tools (e.g., Aqua, Twistlock, Trivy) and vulnerability scanners Excellent analytical and communication skills Preferred Qualifications: Certifications such as CISSP, CISM, CKS (Certified Kubernetes Security Specialist), or equivalent Experience in building MVPs or working in startup-like More ❯
secure configuration and access management within GitLab version control and CI/CD pipelines Integrate and secure telemetry tools including Cribl, Elastic, Splunk, Fluentd, and Syslog Conduct threat modelling, vulnerability assessments, and risk analysis for the telemetry pipeline Collaborate with DevOps engineers to embed security into infrastructure-as-code and deployment workflows Monitor and respond to security events and … of networking protocols, firewalls, VPNs, and security principles Experience with security frameworks (e.g., NIST, ISO 27001) and compliance requirements Knowledge of container security tools (e.g., Aqua, Twistlock, Trivy) and vulnerability scanners Excellent analytical and communication skills Preferred Qualifications: Certifications such as CISSP, CISM, CKS (Certified Kubernetes Security Specialist), or equivalent Experience in building MVPs or working in startup-like More ❯
systems and ensuring compliance with Department of Defense (DoD) security policies. Key Responsibilities: Monitor and analyze system security logs and alerts to identify suspicious activities and potential threats. Support vulnerability assessments and risk analysis activities. Implement security controls in accordance with DoD cybersecurity regulations and RMF (Risk Management Framework). Assist with security incident response, containment, investigation, and remediation … years of hands-on experience in information security or cybersecurity analysis. Familiarity with DoD cybersecurity policies, RMF, STIGs, and NIST frameworks. Experience using security tools such as SIEMs, vulnerability scanners, and endpoint protection platforms. Strong analytical and problem-solving skills. Excellent communication and documentation abilities. Preferred Qualifications: Bachelor's degree in Cybersecurity, Information Technology, or a related field. Experience More ❯
systems and ensuring compliance with Department of Defense (DoD) security policies. Key Responsibilities • Monitor and analyze system security logs and alerts to identify suspicious activities and potential threats • Support vulnerability assessments and risk analysis activities • Implement security controls in accordance with DoD cybersecurity regulations and RMF (Risk Management Framework) • Assist with security incident response, containment, investigation, and remediation efforts … years of hands-on experience in information security or cybersecurity analysis • Familiarity with DoD cybersecurity policies, RMF, STIGs, and NIST frameworks • Experience using security tools such as SIEMs, vulnerability scanners, and endpoint protection platforms • Strong analytical and problem-solving skills • Excellent communication and documentation abilities Preferred Qualifications • Bachelor's degree in Cybersecurity, Information Technology, or a related field • Experience More ❯
/or MITRE D3FEND frameworks to assess and improve threat detection and response strategies Conduct advanced threat intelligence analysis, identify emerging potential threats, and provide threat intelligence recommendations Perform vulnerability assessments using the Assured Compliance Assessment Solution (ACAS) and other security tools Analyze vulnerability findings and develop remediation plans Remediate vulnerability findings by implementing vendor patches … virtualization Application of DoD cybersecurity policies and use of DoD security tools MITRE ATT&CK or MITRE D3FEND frameworks Threat intelligence assessments and identification of emerging potential threats Performing vulnerability assessments with ACAS Remediation of vulnerability findings to include implementation of vendor patches on both Linux and Windows Operating systems Design, implementation, configuration, and enforcement of security controls More ❯
/or MITRE D3FEND frameworks to assess and improve threat detection and response strategies Conduct advanced threat intelligence analysis, identify emerging potential threats, and provide threat intelligence recommendations Perform vulnerability assessments using the Assured Compliance Assessment Solution (ACAS) and other security tools Analyze vulnerability findings and develop remediation plans Remediate vulnerability findings by implementing vendor patches … virtualization Application of DoD cybersecurity policies and use of DoD security tools MITRE ATT&CK or MITRE D3FEND frameworks Threat intelligence assessments and identification of emerging potential threats Performing vulnerability assessments with ACAS Remediation of vulnerability findings to include implementation of vendor patches on both Linux and Windows Operating systems Design, implementation, configuration, and enforcement of security controls More ❯
/or MITRE D3FEND frameworks to assess and improve threat detection and response strategies Conduct advanced threat intelligence analysis, identify emerging potential threats, and provide threat intelligence recommendations Perform vulnerability assessments using the Assured Compliance Assessment Solution (ACAS) and other security tools Analyze vulnerability findings and develop remediation plans Remediate vulnerability findings by implementing vendor patches … virtualization Application of DoD cybersecurity policies and use of DoD security tools MITRE ATT&CK or MITRE D3FEND frameworks Threat intelligence assessments and identification of emerging potential threats Performing vulnerability assessments with ACAS Remediation of vulnerability findings to include implementation of vendor patches on both Linux and Windows Operating systems Design, implementation, configuration, and enforcement of security controls More ❯
crucial in maintaining and developing our Information Security (IS) program and ensuring compliance with established security policies and procedures. The ISSO will be responsible for overseeing operational security implementation, vulnerability management, system assessments, and recovery processes. The ideal candidate will play a key role in safeguarding critical information systems and contribute to a comprehensive security posture. Essential Duties and … validate adherence to security standards. • Promote awareness of security issues across the organization. • Provide ongoing training to ensure all staff understand their security responsibilities. • Prepare technical documents, incident reports, vulnerability assessments, and other situational awareness information for key stakeholders. • Assist in ensuring systems and configurations comply with security guidelines and regulatory requirements. • Monitor and validate compliance through continuous security … assessments and audits. • Conduct system vulnerability scanning, configuration assessment, and remediation to maintain system integrity and security. Qualifications: • Bachelor's degree in Computer Science, Information Systems, Cybersecurity, or a related field is required. • Proven experience in cybersecurity, risk management, or information security roles, particularly in relation to system security, vulnerability management, and compliance activities. • Strong knowledge of More ❯
Warrington, Cheshire, North West, United Kingdom Hybrid / WFH Options
Oscar Associates (UK) Limited
security, and consultancy. They focus on proactive system health checks, monitoring, and intervention to ensure smooth business operations. Additionally, their IT security services help protect data and networks through vulnerability assessments, risk mitigation, and business continuity planning Apply now! Or email your CV to Referrals: If this role is not right for you, do you know someone that might More ❯
Milestones (POA&Ms) to address identified cybersecurity gaps, ensuring alignment with applicable STIGs. - Assist in performing Risk Assessments using tools like ACAS, Nessus, and SCAP, and generate thorough Risk Assessment Reports (RARs). - Contribute to the preparation, review, and organization of Assessment and Authorization (A&A) packages ensuring completeness, consistency, and accuracy across documentation sets. - Maintain and update … entries in eMASS and deliver other cybersecurity-related documentation in MS Office or Visio formats. - Coordinate with Red and Blue Teams on vulnerability assessments and incident response activities. - Assist with technical writing tasks related to security documentation, policies, and system accreditation deliverables. Required Qualifications: - 5-7+ years in related experience - Prior experience with Navy or US Coast Guard … RMF/Cyber - Demonstrated understanding of NIST SP 800-series and DoDI/DoD 8500-series frameworks. - Hands-on experience with IA vulnerability assessments and tools such as NMap, ACAS/Nessus, and SCAP utilities. - Must meet IAT/IAM Level II certification requirements (e.g., Security+ CE, CAP, CISSP). - Solid communication and interpersonal skills to facilitate collaboration across More ❯
are Firewalls, Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Switch/Routers, Cross Domain Solutions (CDS), EMASS and, Endpoint Security Solution (ESS); o Performing STIG implementation; o Performing vulnerability assessments with the Assured Compliance Assessment Solution tool; and o Remediating vulnerability findings to include implementing vendor patches on both Linux and Windows Operating systems. More ❯
are Firewalls, Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Switch/Routers, Cross Domain Solutions (CDS), EMASS and, Endpoint Security Solution (ESS); o Performing STIG implementation; o Performing vulnerability assessments with the Assured Compliance Assessment Solution tool; and o Remediating vulnerability findings to include implementing vendor patches on both Linux and Windows Operating systems. More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
DMS Computer Recruitment
of the position include: Design and build resilient Cloud infrastructures that are protected against security threats Develop and assess Cloud security solutions to secure systems, databases and networks Conduct assessment and make recommendations to ensure that appropriate controls are in place Gain insight into security incidents and threats by monitoring/analyzing logs and performing vulnerability assessments Participate More ❯
Albany, New York, United States Hybrid / WFH Options
The Computer Merchant, LTD
role. Core Java coding experience. Previous job background as an engineer and Dev Sec position on a large scale public enterprise scale application. Key Responsibilities: Conduct penetration tests and vulnerability assessments for Java applications and infrastructure. Identify security flaws in Java code using automated and manual methods. Create and use custom exploits to test application security, simulating attacker tactics. … improve secure development processes (SDLC). Assist in responding to security incidents related to Java vulnerabilities, current published NIST CVE. Clearly document and report findings, including technical details, risk assessment, and recommended solutions. Communicate findings and recommendations to both technical and non-technical staff. Contribute to security policies for Java development and deployment. Manipulate URLs, query parameters and Application More ❯
o Reverse Engineering: • Analyze, decompile, and reverse-engineer software binaries to understand vulnerabilities and potential exploits. • Develop proof-of-concept exploits to demonstrate potential vulnerabilities in targeted systems. o Vulnerability Research • Identify, analyze, and document software vulnerabilities. • Collaborate with team members to develop mitigations and workarounds for discovered vulnerabilities. o System and Network Analysis: • Conduct network traffic analysis to … Participate in design and code reviews to ensure adherence to best practices and standards. o Documentation: • Prepare detailed technical documentation and reports, including user guides, system design documents, and vulnerability assessments. • Ensure all documentation is clear, concise, and accessible to team members and stakeholders. Required Qualifications: o Clearance: Active TS/SCI with Full Scope Polygraph is mandatory. o More ❯
on secure cloud architecture, policy implementation, and threat mitigation strategies. Provide direct support for compliance with NIST Risk Management Framework (RMF), FISMA, and relevant cybersecurity directives. Manage and oversee vulnerability assessments, system audits, and incident response planning. Support the integration of security controls including STIGs, SCAP, IAVA compliance, and policy documentation. Collaborate with leadership to ensure cybersecurity is embedded … the following certifications: CISM, CISSO, FITSP-M, GCIA, GCSA, GCIH, GSLC, GICSP, CISSP-ISSMP, CISSP Desired Qualifications: 8+ years of experience analyzing, assessing, and implementing corrective actions based on vulnerability management and penetration testing. 8+ years of experience supporting DoD defensive cyber operations including but not limited to, information system protection, defense, response (incident handling), reporting and recovery. EEO More ❯
/or MITRE D3FEND frameworks to assess and improve threat detection and response strategies Conduct advanced threat intelligence analysis, identify emerging potential threats, and provide threat intelligence recommendations Perform vulnerability assessments using the Assured Compliance Assessment Solution (ACAS) and other security tools Analyze vulnerability findings and develop remediation plans Remediate vulnerability findings by implementing vendor patches … virtualization Application of DoD cybersecurity policies and use of DoD security tools MITRE ATT&CK or MITRE D3FEND frameworks Threat intelligence assessments and identification of emerging potential threats Performing vulnerability assessments with ACAS Remediation of vulnerability findings to include implementation of vendor patches on both Linux and Windows Operating systems Design, implementation, configuration, and enforcement of security controls More ❯