louisville, kentucky, united states Hybrid / WFH Options
ScionHealth
and Security Ensure all systems and processes meet HIPAA, HITECH, and other healthcare regulatory requirements. Implement security measures to protect sensitive patient data, including encryption, firewall configurations, and regular vulnerability assessments. Conduct regular audits of IT systems to identify potential compliance or security risks. Technical Liaison and Training Serve as a primary point of contact between healthcare providers and More ❯
Perform system installations, configurations, and upgrades, adhering to best practices. Respond promptly to incidents, resolving issues within defined SLAs. Implement and manage system security measures, including patch management and vulnerability assessments. Collaborate with cross-functional teams to support infrastructure projects and deployments. Develop and maintain scripts to automate routine tasks and improve system efficiency. Document system configurations, procedures, and More ❯
platforms. A good understanding of network security and protocols like TCP/IP. Experience with technical concepts such as tunneling traffic and IP configuration. Experience delivering penetration tests and vulnerability assessments for networks, applications, and cloud services. Excellent communication skills, both verbal and written, with the ability to present to clients. Ability to manage time effectively and work to More ❯
Security & Compliance Enforce network security policies, including access controls, firewalls, VPNs, and intrusion detection systems. Support compliance with regulatory and internal security requirements (e.g., ISO, NIST). Conduct regular vulnerability assessments and participate in security audits. Relevant experience & skills: Strong understanding of TCP/IP, DNS, DHCP, VPN, NAT, and subnetting. Hands-on experience with Cisco, Juniper, Fortinet, or More ❯
London, England, United Kingdom Hybrid / WFH Options
Lunar Energy
in one or more scripting programming languages (Python, Ruby, Bash, etc.) Linux Desirable Skills: Experience with serverless technologies Experience with Typescript Proficiency in application penetration testing, ethical hacking, and vulnerability assessments Interest in the IoT and renewable energy industry Joining us gives you: A competitive salary and stock options package 25 days annual leave a year + public holidays More ❯
London, England, United Kingdom Hybrid / WFH Options
Euroclear
staff to support infrastructure needs and maintain comprehensive documentation of systems and procedures Security Management: implement and maintain security best practices for infrastructure, including patch management, antivirus solutions, and vulnerability assessments (Support) the automation of recurrent activities Propose harmonization of existing automation developments. Participate in the Day-to-Day service support (incident, alerts, changes, ...); Provide on-call support More ❯
CI/CD tools like GitLab Strong practitioner of DevOps practices, utilizing relevant tooling to enhance development and deployment processes, and ensuring application security through secure coding techniques and vulnerability assessments Technical skillset includes data models, messaging, REST, API design and development, and standard methodologies for system integration Knowledge of Oracle Database and SQL, with experience in performance monitoring More ❯
CI/CD tools like GitLab Strong practitioner of DevOps practices, utilizing relevant tooling to enhance development and deployment processes, and ensuring application security through secure coding techniques and vulnerability assessments Technical skillset includes data models, messaging, REST, API design and development, and standard methodologies for system integration Knowledge of Oracle Database and SQL, with experience in performance monitoring More ❯
Patching and Vulnerability Engineer (12m FTC) Join to apply for the Patching and Vulnerability Engineer (12m FTC) role at Lockton Continue with Google Continue with Google Patching and Vulnerability Engineer (12m FTC) Join to apply for the Patching and Vulnerability Engineer (12m FTC) role at Lockton Your Responsibilities We are seeking a skilled and proactive Patching … and Vulnerability Engineer to join our dynamic Technology team. The successful candidate will be responsible for identifying, assessing, and mitigating vulnerabilities within our systems and networks. Your Responsibilities We are seeking a skilled and proactive Patching and Vulnerability Engineer to join our dynamic Technology team. The successful candidate will be responsible for identifying, assessing, and mitigating vulnerabilities within … networks. This role is crucial in ensuring the security and integrity of our IT infrastructure. Working closely with the local, regional and global CISO’s Key Responsibilities will be: VulnerabilityAssessment: Conduct regular vulnerability assessments to identify security weaknesses in systems, applications, and networks. Patch Management: Work within the Global patching and vulnerability guidelines. To ensure More ❯
NewGen is seeking a Computer Network Defense VulnerabilityAssessment Specialist with the following background. Responsibilities - Developing and executing the organization's continuous vulnerabilityassessment strategy. - Measuring the effectiveness of defense-in-depth mechanisms against vulnerabilities and developing recommendations to remediate systemic security issues. - Configuring, operating, maintaining, and evaluating the effectiveness of vulnerability scanning and assessment … Assessing the level of risk introduced by vulnerabilities and developing remediation strategies. - Investigating and analyzing cybersecurity incidents to ensure the appropriate response activities and mitigations are applied. - Distributing periodic vulnerabilityassessment reports, summaries, notifications, and an annual vulnerabilityassessment scorecard to CIO leadership and IT stakeholders. - Developing and maintaining documentation as it pertains to the use … and operation of vulnerabilityassessment tools and methodologies (SOPs, assessment plants, test plants, etc.). Qualifications - 7+ years' experience as a cybersecurity analyst, administrator, or engineer responsible for Enterprise vulnerability management toolsets (e.g., ACAS, Tenable, Nessus, Rapid7, AppSpider, SCAP, STIG Viewer, etc.). - Demonstrated proficiency and expertise in the following areas: - Applying computer networking concepts, protocols More ❯
of December 2025 SECRET Clearance required We are seeking an Information Systems Security Specialist II; this role is focused on conducting Security Technical Implementation Guide (STIG) assessments and performing vulnerability assessments using the Assured Compliance Assessment Solution (ACAS). You will manage security authorization packages and risk assessment documentation in eMASS, while developing and maintaining Plans of … security risk mitigation recommendations and guidance to stakeholders. On-site only, no telework. Position Responsibilities: Conduct Security Technical Implementation Guide (STIG) assessments, utilizing SCAP benchmarks and Evaluate STIG. Perform vulnerability assessments using the Assured Compliance Assessment Solution (ACAS) tool. Manage security authorization packages and risk assessment documentation within eMASS. Develop and maintain Plans of Actions and Milestones … full-time professional experience performing Risk Management Framework activities. • Demonstrated experience in the following areas: o Performing STIG assessments to include using SCAP benchmarks and Evaluate STIG. o Performing vulnerability assessments with the Assured Compliance Assessment Solution tool. o Utilization and process execution within eMASS; o Developing Plans of Actions and Milestones (POA&M) entries; and o Completing More ❯
penetration testing with a range of automated tools, security patch management, secure cloud, and hybrid engineering and possess an active Top Secret. Responsibilities: • Perform penetration testing, software assurance, and vulnerabilityassessment in support of HHS customers. • Interpret penetration testing results to identify and recommend corrective actions and/or mitigation strategies. • Produce and deliver reports on individual and … activities including, but not limited to: requirements, design, implementation, testing, and delivery of new IT solutions, applications, services, and systems, or updating and enhancing existing ones. • Perform and document vulnerability assessments of Government-identified HHS systems (Deliverable: VulnerabilityAssessment Reports). • Performs social engineering tests; analyzes technical security weaknesses; performs risk analyses; and develops exploits. • Researches and … configurations within automated DevSecOps tools and manual processes to ensure compliance with IC policy. Upon government approval, implement changes to processes and technologies for penetration testing, software assurance, and vulnerabilityassessment activities, and report metrics in Monthly Status Reports. Required Qualifications: • Must have at least 6 years of penetration testing experience and 8 years of general work experience. More ❯
Understand and advise on cyber security vulnerability, risks, audit & compliance in a business or operational context and cyber security threat environment Key Accountabilities Cyber Risk Advisor/Consultant 1. Create business risk models and associated material, in support of operational cyber security and business planning across a range of different domains or sectors using established frameworks (e.g. NIST, UK … audit processes in support of operational and business planning activity across a range of different domains or sectors against recognised standards (e.g. ISO27001, UK Government) 3. Undertake cyber security vulnerability analysis to provide a rich picture of organisational maturity and risk exposure to cyber security, in support of operational and business planning activity across a range of different domains … in particular computer and computer network) • Awareness of how architects and designers employ the technology to build systems of interest • Demonstrate good judgement in relation to cyber risk and vulnerabilityassessment • Able to articulate evidenced and convincing arguments for recommended courses of action • Government, defence, CNI market understanding • Able to work independently and seek guidance on own initiative More ❯
Job Summary Your essential job functions will include but may not be limited to: Perform system security technical decomposition, analysis, and impact assessments with the focus on the vulnerabilityassessment of ground- and space-based cyber physical, logical and embedded systems operating in a variety of domains and mission contexts. Apply cybersecurity analytical methods, processes, and frameworks, such … as RMF, to support the development, assessment, and authorization of secure technical solutions. Develop and review system documentation for cybersecurity measures to support program management and Defense acquisition life cycle milestone requirements. Conduct operational and system data flow analysis and documentation for vulnerability assessments. Complete verification, validation analysis and documentation of system interfaces or sub-components of cyber … minimal travel. Qualifications and Skills Required knowledge and years of experience Minimum 5+ years relevant work experience (cyber offense/defense, hardware/software reverse engineering, technical cyber risk assessment) Qualifications Desired: Experience with modern ground- and space-based cryptographic hardware, including device certifications and assessments, with demonstrated collaboration with industry and Government stakeholders. Experience providing substantive contributions to More ❯
SRG is seeking an Intelligence Security Specialist to manage Risk Management Framework (RMF) activities, focusing on Step 5 authorization and continuous monitoring. Key tasks include conducting STIG assessments, performing vulnerability assessments with ACAS, managing RMF packages via eMASS or XACTA, and developing POA&Ms. You'll also support RMF Step 5 authorizations, provide risk reduction recommendations, manage privileged user … phases, with a focus on Step 5 authorization and continuous monitoring support. Conduct STIG assessments using SCAP benchmarks and Evaluate STIG to ensure compliance with DoD security requirements. Perform vulnerability assessments utilizing the Assured Compliance Assessment Solution (ACAS) and recommend mitigation strategies. Utilize eMASS or XACTA for managing RMF packages, documenting artifacts, and supporting ATO processes. Develop and … full-time professional experience in performing Risk Management Framework activities. • Demonstrated experience in the following areas: o Performing STIG assessments to include using SCAP benchmarks and EvaluateSTIG; o Performing vulnerability assessments with the Assured Compliance Assessment Solution tool. o Using eMASS or XACTA for RMF package management. o Developing Plans of Actions and Milestones (POA&M) entries. o More ❯
Bath, Somerset, South West, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
Infrastructure Security Analyst, SCCM, Vulnerability, Patch management, Qualys/Nessus Our client, a leading private sector business based in Bath, is looking to hire contractor with a background in infrastructure and related security. The successful candidate will be responsible for ensuring security and integrity for our clients IT infrastructure, taking responsibility for patching and vulnerability remediation for both … physical and virtual environments. This will include proactive identification, assessment, and mitigation of security vulnerabilities across Windows servers, legacy applications and cloud environments. Hybrid working - 3/2-day split. Engagement is via umbrella company only. General responsibilities: Deploy patches to Windows servers to address vulnerabilities, ensuring compliance with security policies. Manage patching windows and downtime coordination with various … incident response by applying emergency patches and remediations Contribute to disaster recovery and business continuity plans Skills and experience required: - Windows server including patching processes Server/security hardening. Vulnerability management tools e.g. Nessus, Qualys, for conducting vulnerability assessments Hands-on experience in patch management systems - SCCM, WSUS, or Azure Update Management - for deploying patches in both on More ❯
for a driven technology auditor who wants to play a role in audit execution which focuses on the review of technology processes, the analysis of risks involved, and the assessment of the design and operating effectiveness of the controls implemented to mitigate the risk. Audits may include the assessment of areas such as access management, IT operations, job … scheduling/monitoring, data transfer (focusing on the completeness/accuracy of this), network security, cyber security, system development and testing, vulnerabilityassessment and penetration testing, and operational resilience. Must Haves: Previous experience as a technology auditor covering IT application and general controls, application development, information security, technology consulting or other relevant industry experience Basic understanding of software More ❯
in our new Soho Place office - opened in 2023 - in the heart of Central London and home to our Research Lab. The role We're looking for a Security Assessment Specialist to join our growing Cyber Security team, reporting into the Security Assessment Manager. In this role, you'll lead and conduct penetration tests and vulnerability assessments … ideal candidate will have the following skills and experience: Proven expertise across the full penetration testing lifecycle, from scoping and execution to reporting and stakeholder debriefs Deep understanding of vulnerabilityassessment practices, including effective remediation strategies for both infrastructure and application-level security Strong background in technical security roles across diverse environments; familiarity with DevOps technologies is a More ❯
31.05.2025 Expiry Date: 15.07.2025 col-wide Job Description: We are seeking a dynamic and detail-oriented Cyber Security Business Analyst to join our clients team for an OT Asset & Vulnerability Project. This pivotal initiative aims to enhance our operational technology infrastructure by improving asset management and vulnerability processes. The project is preparing to enter the pilot phase in … will involve refining processes, gathering feedback, and driving improvements during the implementation phase. Key Responsibilities Collaborate with stakeholders to define project objectives, scope, and deliverables for the OT Asset & Vulnerability Project. Conduct requirements gathering sessions with users and translate these into detailed functional specifications. Analyze current workflows and identify areas for improvement in asset and vulnerability management processes. … issues proactively. Assist in user onboarding and training activities during the rollout phase. Skills and Qualifications Experience: 10+ years as a Business Analyst, preferably in OT, IT security, or vulnerability management projects. Technical Understanding: Familiarity with operational technology environments, asset management, and vulnerabilityassessment processes. Analytical Skills: Ability to analyze complex systems, identify gaps, and propose practical More ❯
or reported issues Implement and maintain version promotion of one or more applications within CI pipelines Integrate CI pipelines with development tools for artifact management, software test, software quality assessment, etc. Implement Continuous Delivery and execute automated or manual deployments of applications into orchestrated k8s environments Execute checkout and troubleshooting of deployed applications within development and production environments Execute … least one year of professional experience using Linux operating systems Detail-oriented Good verbal and written communication skills Desired Qualifications: Java programming experience is desired Strong experience with software vulnerability scanning with static and dynamic code analysis Strong experience with software docker or package artifact management using JFrog Artifactory, Nexus or similar Experience with software vulnerabilityassessmentMore ❯
This is a contingent opportunity The Information Operations Specialist performs technical communications vulnerability assessments of computer networks, Industrial Control Systems, radio, wireless, and other communication systems that directly support the critical assets on DoD Installations or other agencies' facilities. Duties: Review and provide an assessment of the following: cyber issues and integration employment of the core capabilities of … deception and operations security (OPSEC) in concert with specified supporting and related capabilities to influence, disrupt, corrupt, or usurp adversarial human and automated decision-making Provide operational IO-related vulnerability mission impacts and remediation inputs Experience: Minimum Possess a minimum of 10 years IO and Cyberspace Operations (CS) experience Possess working knowledge of DoD's IT system and network … network hardware components and operating systems. In lieu of a degree, commensurate operational experience may be substituted. Additional Requirements Possess working knowledge of Department of Defense's Information Assurance Vulnerability Alert processes. Mastery level experience working hands-on with Computer Network modeling software. Mastery level experience working hands-on with Computer Network vulnerability/compliance analysis software. Ability More ❯
London, England, United Kingdom Hybrid / WFH Options
Wanstor
contributing to the continuous improvement of Wanstor's security products and processes. What You'll Do • Lead and deliver Cyber Essentials and Cyber Essentials Plus audits, guiding clients through assessment, remediation, and certification • Serve as a technical and strategic lead on customer engagements, ensuring alignment with business and compliance needs • Support the commercial and sales process by contributing to … and endpoint environments - including advice on best practices, policy development, and technical control implementation • Act as an escalation point and mentor for other consultants and engineers • Own and deliver vulnerability assessments, including reporting, debriefs, and remediation planning • Continuously evolve Wanstor's cyber security product offerings, including templates, processes, automation and toolsets • Maintain up-to-date knowledge of compliance standards … audits, including hands-on remediation guidance (Cyber Essentials Plus Assessor certified or holding related certifications with the intention of becoming CE Plus Assessor certified is highly desirable) • Hands-on vulnerabilityassessment experience across infrastructure, networks, and applications • Familiarity with threat and vulnerability management tools (e.g.Qualys) • Excellent report writing and communication skills, able to present technical findings to More ❯
in real-world technical understanding. Key Requirements: Proven experience in information security risk management , particularly in GRC. Solid technical security background in at least one of the following areas: VulnerabilityAssessment & Penetration Testing (VAPT) Threat Intelligence Incident Response Or other relevant technical security domains. Ability to assess, communicate, and manage risk in alignment with security policies and business More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Cititec
in real-world technical understanding. Key Requirements: Proven experience in information security risk management , particularly in GRC. Solid technical security background in at least one of the following areas: VulnerabilityAssessment & Penetration Testing (VAPT) Threat Intelligence Incident Response Or other relevant technical security domains. Ability to assess, communicate, and manage risk in alignment with security policies and business More ❯
broad spectrum of threats including accidents, natural disasters, technological failure, information system attacks, terrorists, radio frequency weapons (RFW), sabotage, and weapons of mass destruction (WMD). You will conduct vulnerability assessments of the emergency readiness of critical defense facilities, including assessments of continuity of operations programs (COOP), supply chain analysis, emergency management plans, chemical, biological, radiological, and nuclear readiness … and survivability (CBRN), and incident response. You will provide recommendations for eliminating or mitigating vulnerabilities for continuous facility operations. Duties: Conduct vulnerability assessments of defense facility readiness and emergency survivability. Provide expert advice on mitigating and eliminating emergency management vulnerabilities, improving continuity of operations, and mitigating CBRN threats. Collaborate with Team members on assessment activities. Document and communicate More ❯