Vulnerability Assessment Job Vacancies

351 to 368 of 368 Vulnerability Assessment Jobs

Cyber Architect with Security Clearance

San Diego, California, United States
ASEG Inc
In the capacity, plays a key role in developing and implementing security architectures for applications and IT systems, focusing on protecting data and preventing security breaches. • Conduct risk and vulnerability assessments to identify security weaknesses, conduct risk analyses • Create and deploy incident response plans, and lead efforts to respond to security breaches and attacks. • Interact with technical leads, developers … technology, etc., and demonstrate forward thinking around how this technology can support the operational needs of the Program and the future technical strategy of the organization • Conduct and analyze vulnerability assessments to validate system compliance with RMF controls and DISA Security Technical Information Guidelines (STIG) • Oversee patch management and compliance Required experience and educations • Bachelor of Science degree in More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Penetration Testing / Red Team Lead

London, South East, England, United Kingdom
Hybrid / WFH Options
Deerfoot Recruitment Solutions Ltd
advanced cyber attacks, test defences, and influence enterprise-level security strategy. Key Responsibilities Lead red team operations , penetration testing, and ethical hacking engagements Plan and deliver cyber attack simulations, vulnerability assessments, and social engineering tests Work with SOC teams on purple team exercises to enhance detection and response Produce executive reporting on cyber threats, risks, and remediation progress Collaborate … security, penetration testing, and ethical hacking at enterprise scale.This role could suit individuals who have held the following role titles: Penetration Tester, Red Team Specialist, Ethical Hacker, Security Tester, Vulnerability Analyst, Offensive Security Specialist, Threat Intelligence Analyst. Deerfoot Recruitment Solutions Ltd is a leading independent tech recruitment consultancy in the UK. For every CV sent to clients, we donate More ❯
Employment Type: Full-Time
Salary: Salary negotiable
Posted:

Penetration Testing/Red Team Lead

London, United Kingdom
Hybrid / WFH Options
Deerfoot Recruitment Solutions Limited
advanced cyber attacks, test defences, and influence enterprise-level security strategy. Key Responsibilities Lead red team operations , penetration testing, and ethical hacking engagements Plan and deliver cyber attack simulations, vulnerability assessments, and social engineering tests Work with SOC teams on purple team exercises to enhance detection and response Produce executive reporting on cyber threats, risks, and remediation progress Collaborate … scale. This role could suit individuals who have held the following role titles: Penetration Tester, Red Team Specialist, Lead Red Team Operator, Red Team Lead, Ethical Hacker, Security Tester, Vulnerability Analyst, Offensive Security Specialist, Threat Intelligence Analyst. Deerfoot Recruitment Solutions Ltd is a leading independent tech recruitment consultancy in the UK. For every CV sent to clients, we donate More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Penetration Testing / Red Team Lead

City of London, London, United Kingdom
Hybrid / WFH Options
Deerfoot Recruitment Solutions
advanced cyber attacks, test defences, and influence enterprise-level security strategy. Key Responsibilities Lead red team operations , penetration testing, and ethical hacking engagements Plan and deliver cyber attack simulations, vulnerability assessments, and social engineering tests Work with SOC teams on purple team exercises to enhance detection and response Produce executive reporting on cyber threats, risks, and remediation progress Collaborate … scale. This role could suit individuals who have held the following role titles: Penetration Tester, Red Team Specialist, Lead Red Team Operator, Red Team Lead, Ethical Hacker, Security Tester, Vulnerability Analyst, Offensive Security Specialist, Threat Intelligence Analyst. Deerfoot Recruitment Solutions Ltd is a leading independent tech recruitment consultancy in the UK. For every CV sent to clients, we donate More ❯
Employment Type: Permanent, Work From Home
Posted:

Penetration Testing / Red Team Lead

London, Coleman Street, United Kingdom
Hybrid / WFH Options
Deerfoot Recruitment Solutions Limited
advanced cyber attacks, test defences, and influence enterprise-level security strategy. Key Responsibilities Lead red team operations , penetration testing, and ethical hacking engagements Plan and deliver cyber attack simulations, vulnerability assessments, and social engineering tests Work with SOC teams on purple team exercises to enhance detection and response Produce executive reporting on cyber threats, risks, and remediation progress Collaborate … scale. This role could suit individuals who have held the following role titles: Penetration Tester, Red Team Specialist, Lead Red Team Operator, Red Team Lead, Ethical Hacker, Security Tester, Vulnerability Analyst, Offensive Security Specialist, Threat Intelligence Analyst. Deerfoot Recruitment Solutions Ltd is a leading independent tech recruitment consultancy in the UK. For every CV sent to clients, we donate More ❯
Employment Type: Permanent
Posted:

Sr. Information System Security Engineer with Security Clearance

Columbia, Maryland, United States
Cyber Bat Inc
in-Depth principles and technology, including access/control, authorization, identification and authentication, Public Key Infrastructure (PKI), network and enterprise security architecture • 2 years of experience applying security risks assessment methodology to system development, including threat model development, vulnerability assessments, and resulting security risk analysis • A Master's Degree in Computer Science or IT Engineering is desired and More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Information Systems Security Engineer with Security Clearance

Maryland, United States
Cyber Bat Inc
in-Depth principles and technology, including access/control, authorization, identification and authentication, Public Key Infrastructure (PKI), network and enterprise security architecture • 2 years of experience applying security risks assessment methodology to system development, including threat model development, vulnerability assessments, and resulting security risk analysis • A Master's Degree in Computer Science or IT Engineering is desired and More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Android security Developer with Security Clearance

Herndon, Virginia, United States
Mauck Research Group
years of experience in Android development, including proficiency in Java, Kotlin, and Android SDK. Solid understanding of mobile security concepts, including secure coding practices, encryption algorithms, authentication protocols, and vulnerability assessment. Familiarity with Android security frameworks, libraries, and APIs. Experience with threat modeling, risk assessment, and security architecture design. Knowledge of secure coding practices and common vulnerabilities such … as OWASP Top 10. Proficiency in using security tools for vulnerability scanning and code analysis. Excellent problem-solving skills and attention to detail. Strong communication and collaboration abilities, with a passion for teamwork. Ability to adapt quickly to changing priorities and work effectively in a fast-paced environment. TS/SCI security clearance required. Join our team and contribute More ❯
Employment Type: Permanent
Salary: USD 250,000 Annual
Posted:

Red Cell Analyst with Security Clearance

Fort Belvoir, Virginia, United States
K2 Group, Inc
The Red Cell Analyst is responsible for the overall conduct and management of specific vulnerability assessments, to include gathering information based on program objectives, identifying gaps in information gathering, and prioritizing courses of action pertaining to the assessment. The Red Cell Analyst provides assessment data to the White Cell Lead ensuring all statutory and regulatory requirements and other … national security. Responsibilities/Tasks - The Red Cell Analyst shall: Research the structure, ideology, intentions, tactics, and capabilities of adversarial organizations to develop threat characterization. Identify information requirements, develop assessment strategies and collection plans, identify information sources, and develop and conduct Open Source research, analysis, and fusion of relevant information to emulate adversarial planning capabilities. Characterize systems and conduct … nodal analysis, identify essential functions/tasks and critical assets necessary to perform them as determined by the assessment program plan. Facilitate timely information management flow from DoD Red Team partners and other entities supporting DoD Red Team operations. Develop courses of action an adversary may employ against customer personnel, equipment, facilities, networks, information and information systems, infrastructure, and More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Systems Engineer with Security Clearance

Lexington, Massachusetts, United States
Aquila Technology
Clearance Requirements: None Aquila is seeking a Systems Engineer to join a team responsible for the execution of compliance and assistance with vulnerability remediation activities primarily associated with enterprise information systems. This new position has been added to an existing team to support department expansion. The person hired will not only become familiar with the utilization of vulnerability … required Excellent communication (both oral and writing) and organizational skills Proficiency and hands-on experience with Tenable's Security Center and IBM BigFix Proficiency and hands-on experience with vulnerability remediation across multiple Operating System (OS) platforms include Linux, Mac, and Windows Strong proficiency and hands-on experience with maintaining Red Hat Satellite, building Linux installation packages in support … other duties as assigned. Required Experience: 5 years of experience Systems Engineering OS platforms (Linux, Mac, Windows) Linux for Unix Redhat Enterprise Linux 7 & 8 2 years of experience Vulnerability Assessments IBM Bix Fix Tenable's Security Center Other Requirements Pass a comprehensive background investigation. Maintain an Active security clearance BS in a related field or equivalent experience Covid More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cloud-Based IAM Modernization Consultant -Rockville MD

Falls Church, Virginia, United States
Creative Information Technology, Inc
Oracle applications Design DMZ zoning: reverse proxy, firewalls, and application gateways Deploy and configure DMZ components Define access policies, attribute mappings, and claim rules Perform functional, security (penetration/vulnerability), and performance testing Conduct user acceptance testing with internal and external stakeholder groups Produce end-to-end security architecture diagrams and DMZ access patterns Document configuration steps, policy definitions … OCI IAM, Microsoft Entra ID, Azure B2C, and SAML/OIDC protocols. Strong expertise in DMZ design, firewall configurations, and application gateway setup. Proficient in conducting penetration testing and vulnerability assessments. Skilled in technical writing and training, with the ability to document and transfer knowledge effectively. Acceptance Criteria: Successful SSO login for all defined user personas without manual intervention. More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

INFORMATION SYSTEMS AUDITOR with Security Clearance

Arlington, Virginia, United States
K2 Group, Inc
This is a contingent opportunity Conducts technical cyber and communications vulnerability assessments of computer networks, other technology (OT) systems telecommunications and other communications systems. Duties: Perform oversight of the development, implementation and evaluation of IS security program policy; special emphasis placed upon integration of existing network infrastructure Advise the Information System Owner (ISO), Information Data Owner (IDO), Program Security … Officer (PSO), and the Delegated and/or Authorizing Official (DAO/AO) on any assessment and authorization issues Evaluate Authorization packages and make recommendation to the AO and/or DAO for authorization Evaluate IS threats and vulnerabilities to determine whether additional safeguards are required Advise the Government concerning the impact levels for Confidentiality, Integrity, and Availability for … the information on a system Ensure security assessments are completed and results documented and prepare the Security Assessment Report (SAR) for the Authorization boundary Initiate a Plan of Action and Milestones (POA&M) with identified weaknesses for each Authorization Boundaries assessed, based on findings and recommendations from the SAR Evaluate security assessment documentation and provide written recommendations for More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Software Engineer with Security Clearance

Annapolis Junction, Maryland, United States
Dexian Signature Federal
Description • The ideal candidate will perform Software Engineering and vulnerability research with a focus on OCO (Offensive Cyber Operations) and DCO (Defensive Cyber Operations) activities. • Work with customers directly performing full cycle system engineering, gathering requirements and source code, to technical documentation and specifications. • Performing long term, in depth vulnerability assessments using reverse engineering, kernel debugging, and exploitation More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cybersecurity Consultant – Senior Manager

City of London, London, United Kingdom
Hybrid / WFH Options
LT Harper - Cyber Security Recruitment
major UK clients — from security gap assessments to crisis simulations, risk frameworks, and technical reviews. Support the development and delivery of both technical (e.g. M365/cloud config reviews, vulnerability assessments) and GRC engagements. Help shape and evolve our cyber propositions , working closely with delivery leads across managed services, threat intel, and MDR. Scope and define client engagements with … of cyber engagements — both GRC and technical. Strong understanding of frameworks like NIST, ISO 27001, CIS, and a pragmatic view on applying them. Familiarity with technical tooling for assessments, vulnerability analysis, and cloud reviews (you don’t need to be an engineer — but you know your way around the tech). Experience working directly with clients to define risk More ❯
Posted:

Cybersecurity Consultant – Senior Manager

London Area, United Kingdom
Hybrid / WFH Options
LT Harper - Cyber Security Recruitment
major UK clients — from security gap assessments to crisis simulations, risk frameworks, and technical reviews. Support the development and delivery of both technical (e.g. M365/cloud config reviews, vulnerability assessments) and GRC engagements. Help shape and evolve our cyber propositions , working closely with delivery leads across managed services, threat intel, and MDR. Scope and define client engagements with … of cyber engagements — both GRC and technical. Strong understanding of frameworks like NIST, ISO 27001, CIS, and a pragmatic view on applying them. Familiarity with technical tooling for assessments, vulnerability analysis, and cloud reviews (you don’t need to be an engineer — but you know your way around the tech). Experience working directly with clients to define risk More ❯
Posted:

Cybersecurity Consultant – Senior Manager

london, south east england, united kingdom
Hybrid / WFH Options
LT Harper - Cyber Security Recruitment
major UK clients — from security gap assessments to crisis simulations, risk frameworks, and technical reviews. Support the development and delivery of both technical (e.g. M365/cloud config reviews, vulnerability assessments) and GRC engagements. Help shape and evolve our cyber propositions , working closely with delivery leads across managed services, threat intel, and MDR. Scope and define client engagements with … of cyber engagements — both GRC and technical. Strong understanding of frameworks like NIST, ISO 27001, CIS, and a pragmatic view on applying them. Familiarity with technical tooling for assessments, vulnerability analysis, and cloud reviews (you don’t need to be an engineer — but you know your way around the tech). Experience working directly with clients to define risk More ❯
Posted:

Cybersecurity Consultant – Senior Manager

london (city of london), south east england, united kingdom
Hybrid / WFH Options
LT Harper - Cyber Security Recruitment
major UK clients — from security gap assessments to crisis simulations, risk frameworks, and technical reviews. Support the development and delivery of both technical (e.g. M365/cloud config reviews, vulnerability assessments) and GRC engagements. Help shape and evolve our cyber propositions , working closely with delivery leads across managed services, threat intel, and MDR. Scope and define client engagements with … of cyber engagements — both GRC and technical. Strong understanding of frameworks like NIST, ISO 27001, CIS, and a pragmatic view on applying them. Familiarity with technical tooling for assessments, vulnerability analysis, and cloud reviews (you don’t need to be an engineer — but you know your way around the tech). Experience working directly with clients to define risk More ❯
Posted:

Cybersecurity Consultant – Senior Manager

slough, south east england, united kingdom
Hybrid / WFH Options
LT Harper - Cyber Security Recruitment
major UK clients — from security gap assessments to crisis simulations, risk frameworks, and technical reviews. Support the development and delivery of both technical (e.g. M365/cloud config reviews, vulnerability assessments) and GRC engagements. Help shape and evolve our cyber propositions , working closely with delivery leads across managed services, threat intel, and MDR. Scope and define client engagements with … of cyber engagements — both GRC and technical. Strong understanding of frameworks like NIST, ISO 27001, CIS, and a pragmatic view on applying them. Familiarity with technical tooling for assessments, vulnerability analysis, and cloud reviews (you don’t need to be an engineer — but you know your way around the tech). Experience working directly with clients to define risk More ❯
Posted:
Vulnerability Assessment
10th Percentile
£41,250
25th Percentile
£46,875
Median
£57,500
75th Percentile
£73,750
90th Percentile
£86,000