proficiency in using Nagios and Splunk for comprehensive system monitoring and analytics. Skills in automation scripts and experience with Salt and Ansible for configuration management are crucial. • Lead security vulnerability assessments and mitigation efforts on Linux systems and other devices, leveraging advanced features of Tenable Nessus. • Experience with Linux provisioning server tools such as Kickstart and Cobbler to facilitate More ❯
and contribute to the nation's most critical security challenges. Key Responsibilities • Provide subject matter expertise on C5ISRT architecture, interoperability, and mission-critical solutions. • Conduct advanced technical analyses and vulnerability assessments of C5ISRT systems and concepts of operation. • Develop actionable recommendations for future C5ISRT capabilities to enhance decision-making and operational effectiveness. • Coordinate with diverse engineering and intelligence teams More ❯
and future-proofing of space communication networks. • Research, evaluate, and recommend commercial and government telecommunications technologies for integration into DoD space operations. • Support engineering teams with data link analyses, vulnerability assessments, and performance optimization of communication systems. • Prepare technical reports and brief senior leadership on telecommunications strategy, findings, and recommendations. Basic Qualifications • Active TS/SCI security clearance at More ❯
Support: Work with infrastructure, security, and application teams. Support change management and business continuity. Liaise with vendors and provide mentorship to junior staff. Security & Compliance: Enforce security policies, conduct vulnerability assessments, and support audits. Relevant Experience & Skills: Strong understanding of TCP/IP, DNS, DHCP, VPN, NAT, and subnetting. Experience with Cisco, Juniper, Fortinet, or equivalent equipment, including Fortinet More ❯
experience (AWS or similar) A passion for designing and implementing scalable observability solutions Minimum 3 years experience working in a backend-related role Desirable: Security expertise or interest in vulnerability assessments Tech Stack: Kubernetes (Knative) for containerized workloads AWS Lambda No-SQL databases PostgreSQL Serverless architectures All major AWS Services Auth0 for authentication OSO-Cloud for authorization CircleCI Git More ❯
Rudheath, Northwich, Cheshire, England, United Kingdom
Places for People
disruption. Develop and maintain comprehensive technical documentation, including build guides and topology diagrams. Collaboratewithcross-functional teams to deliver high-quality, cost-effective solutions. Ensure compliance withsecurity standards and conduct vulnerability assessments. Provide warranty and post-deploymentsupport, ensuring smooth transition to operations. Mentor and upskill IT Service Desk and junior engineers. Skills & Experience: Essential: Proven experience in IT infrastructureengineering and More ❯
London, England, United Kingdom Hybrid / WFH Options
AudioStack
experience (AWS or similar) A passion for designing and implementing scalable observability solutions Minimum 3 years experience working in a backend related role. Desirable: Security expertise or interest in vulnerability assessments. Tech Stack: Kubernetes (knative) for containerized workloads AWS Lambda No-SQL Postgres Serverless All major AWS Services Auth0, for authentication OSO-Cloud for authorization CircleCi Git Benefits The More ❯
Operational Technology Vulnerability Analyst Hybrid (2 days onsite) | Permanent We're partnering with a UK leader in the energy transition, committed to building a zero-emissions future. As they continue to expand and modernise their infrastructure, they’re looking for a Vulnerability Analyst with a focus on Operational Technology (OT) to help keep critical systems secure. In this … control systems. You’ll work closely with cybersecurity, engineering, and operational teams to identify and address risks in environments that keep the UK running. What you’ll do: Lead vulnerability assessments across OT networks, assets, and systems Assess and prioritise risk in ICS/SCADA, PLCs, and other industrial environments Partner with cross-functional teams to mitigate vulnerabilities and … track remediation progress Stay current on emerging OT threats and attack techniques Support the evolution of tools and processes in OT vulnerability management What we’re looking for: Hands-on experience assessing vulnerabilities in OT or industrial environments Familiarity with ICS/SCADA, PLCs, HMIs, and OT architecture Understanding of OT-specific security challenges Experience using vulnerability scanning More ❯
Assurance Benchmarks for Supporting Infrastructure The general engineer should also have a working knowledge of USAF Civil Engineering governance, programming, and processes. The general engineer will conduct a thorough vulnerability assessments across various infrastructure elements, such as water, wastewater, electricity, heating, ventilation, and air conditioning (HVAC), petroleum products, fire protection systems, generators, and natural gas systems. A crucial aspect … of this position involves performing structural engineering vulnerability assessments that address perimeter security. Experience: Minimum 10 years operational experience in the military or other comparable civilian position in structural or civil engineering role. Extensive experience with all the following blast software: VulnerabilityAssessment and Protection Option (VAPO), Component Explosives Damage Assessment Workbook (CEDAW), Conventional Weapons Effects … Engineering Design Manuals. Working knowledge of issues and threats driving Design Based Threat (DBT) for military and Government facilities and construction programs. Ability to determine effects of blast, damage assessment, and physical barriers to mitigate blast affects. Excellent written and verbal communication skills. Education: Possess a Bachelor's of Science degree in Civil or Structural Engineering. Desired Skills: PhD More ❯
alignment with DoD and Navy cybersecurity standards. The role involves conducting in-depth security assessments using STIG checklists and automated scanning tools, maintaining documentation in eMASS, and developing Security Assessment Plans and Risk Assessment Reports. The Specialist will identify and communicate security vulnerabilities, recommend risk mitigation strategies, and collaborate with system owners, engineers, and cybersecurity teams to enhance … Navy systems, ensuring compliance with DoD cybersecurity standards Conduct thorough security assessments using STIG checklists and automated scanning tools Utilize eMASS for documentation and process execution Develop detailed Security Assessment Plans and Risk Assessment reports Identify, analyze, and communicate security vulnerabilities and risk mitigation strategies to key stakeholders Collaborate with system owners, engineers, and cybersecurity professionals to enhance … experience performing Risk Management Framework Validation for Navy systems • Demonstrated experience in the following areas: o Performing STIG assessments to include using SCAP benchmarks and Evaluate STIG; o Performing vulnerability assessments with the Assured Compliance Assessment Solution tool; o Utilization and process execution within eMASS; o Developing Security Assessment Plans; o Performing Risk Assessments; o Completing full More ❯
critical assets at a level commensurate with the criticality of the missions. Perform oversight of the development, implementation and evaluation of IS security pro Responsible for overall physical security assessment focusing in the following areas: Protection Planning and Execution . This category involves the sufficiency of protection planning, resources and materials, training, and exercises that comprise an organization's … and capabilities. Access/Circulation Control . Determining whether measures are taken to screen out unauthorized personnel and vehicles and, if so, whether the measures are sufficient. Detection/Assessment . Determining whether the site has the capability to detect unauthorized entry/access. Reaction/Response . This category involves evaluating in-place reaction and response force planning … Experience: 8 - 10 years related experience Understanding of Army, Navy, Marine Corps, Air Force and Joint DoD security directives. Working knowledge of DoDI 3020.45 (Change 1) Experience in conducting vulnerabilityassessment for a wide-variety of mission critical infrastructure to include network and data centers, telecommunications systems, airfields, intrusion detection systems, nuclear weapons security systems, forward operating bases More ❯
This is a contingent opportunity Conducts technical cyber and communications vulnerability assessments of computer networks, other technology (OT) systems telecommunications and other communications systems. Duties: Perform oversight of the development, implementation and evaluation of IS security program policy; special emphasis placed upon integration of existing network infrastructure Advise the Information System Owner (ISO), Information Data Owner (IDO), Program Security … Officer (PSO), and the Delegated and/or Authorizing Official (DAO/AO) on any assessment and authorization issues Evaluate Authorization packages and make recommendation to the AO and/or DAO for authorization Evaluate IS threats and vulnerabilities to determine whether additional safeguards are required Advise the Government concerning the impact levels for Confidentiality, Integrity, and Availability for … the information on a system Ensure security assessments are completed and results documented and prepare the Security Assessment Report (SAR) for the Authorization boundary Initiate a Plan of Action and Milestones (POA&M) with identified weaknesses for each Authorization Boundaries assessed, based on findings and recommendations from the SAR Evaluate security assessment documentation and provide written recommendations for More ❯
your recruiter about the options Requisition ID: 121883 Grade: GG10 - GG12 Operational Cyber Group is a team of industry-leading experts in high-assurance development, research, reverse engineering, and vulnerability research. With a focus on National Security, we work on some of the country’s toughest challenges. Our people provide mission-changing capability for our customers across a wide … to have a meaningful impact on National Security. Role Description Technical delivery: be able to systematically deconstruct a wide range of technologies and protocols to perform exploratory research and assessment, as well as experimental development (this includes creating prototypes and simulations). Mentorship, team-leadership, and collaboration: work in teams to deliver high-quality reports, whilst developing junior team … task at hand. Security mindset: be capable of identifying vulnerabilities and prioritise avenues of research that will deliver the most value to our customers. Have a working knowledge of vulnerabilityassessment or penetration-testing techniques. What we are looking for Familiarity with a variety of tools (e.g. IDEs, debuggers, source control, Ghidra, FRIDA, Wireshark, VMs) and techniques (e.g. More ❯
and analysis to USSOCOM Force Protection requirements. • Perform Force Protection related risk assessments. • Prepare security engineering planning and cost analysis for projects or improvements designed to mitigate risk. • Provide VulnerabilityAssessment and Protection Option (VAPO) process analysis, or equivalent modeling and simulation capabilities. • Manage the DoD system of record for Mission Assurance Risk Management System (MARMS) • Provide Defense … Management (Antiterrorism/DCIP) • Five years' experience in the DOD Security Engineering planning process, as defined in the DOD Unified Facility Criteria 04-020 series • Five years' experience in VulnerabilityAssessment Protection Option and Force Protection • Ten years' experience assigned to, attached, employed by, or contracted by USSOCOM or one of its subordinate organizations • Ten years' experience preparing More ❯
APIs, databases, and service flows. Security Testing & Penetration Testing (Ethical Hacking) Simulate attacks to find vulnerabilities. Tools: Burp Suite , OWASP ZAP , Metasploit . CEH , OSCP , CISSP certifications an advantage Vulnerability Testing Scan systems for known vulnerabilities. Collaborate with SecOps and DevSecOps teams. Security QA/Secure Code Testing Test software from a secure coding perspective. Ensure compliance with secure … model predictions, fairness, and ethical AI compliance. Seniority Level Associate Industry IT Services and IT Consulting Employment Type Full-time Job Functions Information Technology Skills Test Automation Functional Testing VulnerabilityAssessment and Penetration Testing (VAPT) Test Management Selenium More ❯
SaaS - Collaborate with development and operations teams to design, implement, and maintain secure and automated infrastructure. - Implement security best practices throughout the software development lifecycle (SDLC), including code scanning, vulnerabilityassessment, and threat modeling. - Develop and maintain CI/CD pipelines, enabling continuous integration, continuous delivery, and continuous deployment of applications. - Develop and maintain containerization and micro-services. … Integrate security controls, such as automated vulnerability scanning, static and dynamic analysis, and security testing, into the CI/CD process. - Collaborate with cross-functional teams to ensure compliance with security standards and regulatory requirements. - Automate and orchestrate security processes, including incident response and threat detection, using technologies like Splunk, Chef Automate, and others. - Stay updated with emerging DevSecOps More ❯
SaaS - Collaborate with development and operations teams to design, implement, and maintain secure and automated infrastructure. - Implement security best practices throughout the software development lifecycle (SDLC), including code scanning, vulnerabilityassessment, and threat modeling. - Develop and maintain CI/CD pipelines, enabling continuous integration, continuous delivery, and continuous deployment of applications. - Develop and maintain containerization and micro-services. … Integrate security controls, such as automated vulnerability scanning, static and dynamic analysis, and security testing, into the CI/CD process. - Collaborate with cross-functional teams to ensure compliance with security standards and regulatory requirements. - Automate and orchestrate security processes, including incident response and threat detection, using technologies like Splunk, Chef Automate, and others. - Stay updated with emerging DevSecOps More ❯
SaaS - Collaborate with development and operations teams to design, implement, and maintain secure and automated infrastructure. - Implement security best practices throughout the software development lifecycle (SDLC), including code scanning, vulnerabilityassessment, and threat modeling. - Develop and maintain CI/CD pipelines, enabling continuous integration, continuous delivery, and continuous deployment of applications. - Develop and maintain containerization and micro-services. … Integrate security controls, such as automated vulnerability scanning, static and dynamic analysis, and security testing, into the CI/CD process. - Collaborate with cross-functional teams to ensure compliance with security standards and regulatory requirements. - Automate and orchestrate security processes, including incident response and threat detection, using technologies like Splunk, Chef Automate, and others. - Stay updated with emerging DevSecOps More ❯
first 200 endpoints, with no functional limits. By pioneering autonomous OS and third-party patching - AEM’s foundational use case - through peer-to-peer patch distribution and real-time vulnerabilityassessment without needing a VPN, it eliminates costly, time-consuming routine labor, preempts ransomware and security risks, and protects the digital employee experience. Trusted by thousands of enterprises More ❯
and tools building experience - - Experience programming with at least one modern language such as Java, C++, or C# including object-oriented design - - Experience in penetration testing and exploitability-focused vulnerabilityassessment - - Experience in platform-level security mitigations and hardening for Linux and Windows - - Knowledge of overall system architecture, scalability, reliability, and performance in a database environment - - Experience with More ❯
dynamic team to build innovative ways of building and assessing operationally resilient technology services. Principal Accountabilities: - Business Impact Assessments & Risk Identification: Develop asset management strategies, lead business impact and vulnerability assessments, conduct threat modelling, and maintain risk identification frameworks. - Risk Assessment & Evaluation: Ensure compliance with governance policies, provide expertise on operational resilience, and support risk assessments for internal More ❯
Edinburgh, Scotland, United Kingdom Hybrid / WFH Options
Canonical
directly with DISA-STIG or CIS benchmarks, including related audit + remediation tooling (e.g. Compliance as Code) Experience working directly with Linux Kernel Prior experience with Python, OVAL (Open VulnerabilityAssessment Language), and Ansible History of contributions to open source projects What we offer you We consider geographical location, experience, and performance in shaping compensation worldwide. We revisit More ❯
Clearance Requirements: None Aquila is seeking a Systems Engineer to join a team responsible for the execution of compliance and assistance with vulnerability remediation activities primarily associated with enterprise information systems. This new position has been added to an existing team to support department expansion. The person hired will not only become familiar with the utilization of vulnerability … required Excellent communication (both oral and writing) and organizational skills Proficiency and hands-on experience with Tenable's Security Center and IBM BigFix Proficiency and hands-on experience with vulnerability remediation across multiple Operating System (OS) platforms include Linux, Mac, and Windows Strong proficiency and hands-on experience with maintaining Red Hat Satellite, building Linux installation packages in support … other duties as assigned. Required Experience: 5 years of experience Systems Engineering OS platforms (Linux, Mac, Windows) Linux for Unix Redhat Enterprise Linux 7 & 8 2 years of experience Vulnerability Assessments IBM Bix Fix Tenable's Security Center Other Requirements Pass a comprehensive background investigation. Maintain an Active security clearance BS in a related field or equivalent experience Covid More ❯
exposure in identifying, preventing, and responding to digital threats while learning key tools and best practices in IT security. Responsibilities: ️ Assist in monitoring networks for security breaches ️ Help conduct vulnerability assessments and audits ️ Research the latest cybersecurity threats and trends ️ Support the implementation of security tools and protocols ️ Participate in phishing simulations and awareness training ️ Document and analyze incidents More ❯
What You'll Be Working On: ️ Performing comprehensive penetration testing on web applications, networks, and infrastructure ️ Identifying vulnerabilities and providing detailed reports with recommendations for remediation ️ Conducting vulnerability assessments and risk analyses to identify areas of concern ️ Collaborating with development and IT teams to improve overall security posture ️ Keeping up to date with the latest security threats, techniques, and More ❯