Vulnerability Assessment Job Vacancies

501 to 525 of 557 Vulnerability Assessment Jobs

Linux Systems Administrator with Security Clearance

Lehi, Utah, United States
FUSE Engineering
proficiency in using Nagios and Splunk for comprehensive system monitoring and analytics. Skills in automation scripts and experience with Salt and Ansible for configuration management are crucial. • Lead security vulnerability assessments and mitigation efforts on Linux systems and other devices, leveraging advanced features of Tenable Nessus. • Experience with Linux provisioning server tools such as Kickstart and Cobbler to facilitate More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

C5ISRT with Security Clearance

Union City, Ohio, United States
OSAAVA Services
and contribute to the nation's most critical security challenges. Key Responsibilities • Provide subject matter expertise on C5ISRT architecture, interoperability, and mission-critical solutions. • Conduct advanced technical analyses and vulnerability assessments of C5ISRT systems and concepts of operation. • Develop actionable recommendations for future C5ISRT capabilities to enhance decision-making and operational effectiveness. • Coordinate with diverse engineering and intelligence teams More ❯
Employment Type: Permanent
Salary: USD 300,000 Annual
Posted:

Telecommunications for Space with Security Clearance

Union City, Ohio, United States
OSAAVA Services
and future-proofing of space communication networks. • Research, evaluate, and recommend commercial and government telecommunications technologies for integration into DoD space operations. • Support engineering teams with data link analyses, vulnerability assessments, and performance optimization of communication systems. • Prepare technical reports and brief senior leadership on telecommunications strategy, findings, and recommendations. Basic Qualifications • Active TS/SCI security clearance at More ❯
Employment Type: Permanent
Salary: USD 300,000 Annual
Posted:

Network Engineer

Manchester, England, United Kingdom
Peregrine
Support: Work with infrastructure, security, and application teams. Support change management and business continuity. Liaise with vendors and provide mentorship to junior staff. Security & Compliance: Enforce security policies, conduct vulnerability assessments, and support audits. Relevant Experience & Skills: Strong understanding of TCP/IP, DNS, DHCP, VPN, NAT, and subnetting. Experience with Cisco, Juniper, Fortinet, or equivalent equipment, including Fortinet More ❯
Posted:

Site Reliability Engineer

London, United Kingdom
AudioStack
experience (AWS or similar) A passion for designing and implementing scalable observability solutions Minimum 3 years experience working in a backend-related role Desirable: Security expertise or interest in vulnerability assessments Tech Stack: Kubernetes (Knative) for containerized workloads AWS Lambda No-SQL databases PostgreSQL Serverless architectures All major AWS Services Auth0 for authentication OSO-Cloud for authorization CircleCI Git More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cloud Engineer

Rudheath, Northwich, Cheshire, England, United Kingdom
Places for People
disruption. Develop and maintain comprehensive technical documentation, including build guides and topology diagrams. Collaboratewithcross-functional teams to deliver high-quality, cost-effective solutions. Ensure compliance withsecurity standards and conduct vulnerability assessments. Provide warranty and post-deploymentsupport, ensuring smooth transition to operations. Mentor and upskill IT Service Desk and junior engineers. Skills & Experience: Essential: Proven experience in IT infrastructureengineering and More ❯
Employment Type: Full-Time
Salary: £39,500 per annum
Posted:

Site Reliability Engineer

London, England, United Kingdom
Hybrid / WFH Options
AudioStack
experience (AWS or similar) A passion for designing and implementing scalable observability solutions Minimum 3 years experience working in a backend related role. Desirable: Security expertise or interest in vulnerability assessments. Tech Stack: Kubernetes (knative) for containerized workloads AWS Lambda No-SQL Postgres Serverless All major AWS Services Auth0, for authentication OSO-Cloud for authorization CircleCi Git Benefits The More ❯
Posted:

Vulnerability Analyst

Portsmouth, England, United Kingdom
Bestman Solutions
Operational Technology Vulnerability Analyst Hybrid (2 days onsite) | Permanent We're partnering with a UK leader in the energy transition, committed to building a zero-emissions future. As they continue to expand and modernise their infrastructure, they’re looking for a Vulnerability Analyst with a focus on Operational Technology (OT) to help keep critical systems secure. In this … control systems. You’ll work closely with cybersecurity, engineering, and operational teams to identify and address risks in environments that keep the UK running. What you’ll do: Lead vulnerability assessments across OT networks, assets, and systems Assess and prioritise risk in ICS/SCADA, PLCs, and other industrial environments Partner with cross-functional teams to mitigate vulnerabilities and … track remediation progress Stay current on emerging OT threats and attack techniques Support the evolution of tools and processes in OT vulnerability management What we’re looking for: Hands-on experience assessing vulnerabilities in OT or industrial environments Familiarity with ICS/SCADA, PLCs, HMIs, and OT architecture Understanding of OT-specific security challenges Experience using vulnerability scanning More ❯
Posted:

General Engineer with Security Clearance

Arlington, Virginia, United States
K2 Group, Inc
Assurance Benchmarks for Supporting Infrastructure The general engineer should also have a working knowledge of USAF Civil Engineering governance, programming, and processes. The general engineer will conduct a thorough vulnerability assessments across various infrastructure elements, such as water, wastewater, electricity, heating, ventilation, and air conditioning (HVAC), petroleum products, fire protection systems, generators, and natural gas systems. A crucial aspect … of this position involves performing structural engineering vulnerability assessments that address perimeter security. Experience: Minimum 10 years operational experience in the military or other comparable civilian position in structural or civil engineering role. Extensive experience with all the following blast software: Vulnerability Assessment and Protection Option (VAPO), Component Explosives Damage Assessment Workbook (CEDAW), Conventional Weapons Effects … Engineering Design Manuals. Working knowledge of issues and threats driving Design Based Threat (DBT) for military and Government facilities and construction programs. Ability to determine effects of blast, damage assessment, and physical barriers to mitigate blast affects. Excellent written and verbal communication skills. Education: Possess a Bachelor's of Science degree in Civil or Structural Engineering. Desired Skills: PhD More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Accreditor Validator Specialist III with Security Clearance

Virginia Beach, Virginia, United States
Strategic Resilience Group
alignment with DoD and Navy cybersecurity standards. The role involves conducting in-depth security assessments using STIG checklists and automated scanning tools, maintaining documentation in eMASS, and developing Security Assessment Plans and Risk Assessment Reports. The Specialist will identify and communicate security vulnerabilities, recommend risk mitigation strategies, and collaborate with system owners, engineers, and cybersecurity teams to enhance … Navy systems, ensuring compliance with DoD cybersecurity standards Conduct thorough security assessments using STIG checklists and automated scanning tools Utilize eMASS for documentation and process execution Develop detailed Security Assessment Plans and Risk Assessment reports Identify, analyze, and communicate security vulnerabilities and risk mitigation strategies to key stakeholders Collaborate with system owners, engineers, and cybersecurity professionals to enhance … experience performing Risk Management Framework Validation for Navy systems • Demonstrated experience in the following areas: o Performing STIG assessments to include using SCAP benchmarks and Evaluate STIG; o Performing vulnerability assessments with the Assured Compliance Assessment Solution tool; o Utilization and process execution within eMASS; o Developing Security Assessment Plans; o Performing Risk Assessments; o Completing full More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Security Operations Specialist (Physical Security) with Security Clearance

Arlington, Virginia, United States
K2 Group, Inc
critical assets at a level commensurate with the criticality of the missions. Perform oversight of the development, implementation and evaluation of IS security pro Responsible for overall physical security assessment focusing in the following areas: Protection Planning and Execution . This category involves the sufficiency of protection planning, resources and materials, training, and exercises that comprise an organization's … and capabilities. Access/Circulation Control . Determining whether measures are taken to screen out unauthorized personnel and vehicles and, if so, whether the measures are sufficient. Detection/Assessment . Determining whether the site has the capability to detect unauthorized entry/access. Reaction/Response . This category involves evaluating in-place reaction and response force planning … Experience: 8 - 10 years related experience Understanding of Army, Navy, Marine Corps, Air Force and Joint DoD security directives. Working knowledge of DoDI 3020.45 (Change 1) Experience in conducting vulnerability assessment for a wide-variety of mission critical infrastructure to include network and data centers, telecommunications systems, airfields, intrusion detection systems, nuclear weapons security systems, forward operating bases More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

INFORMATION SYSTEMS AUDITOR with Security Clearance

Arlington, Virginia, United States
K2 Group, Inc
This is a contingent opportunity Conducts technical cyber and communications vulnerability assessments of computer networks, other technology (OT) systems telecommunications and other communications systems. Duties: Perform oversight of the development, implementation and evaluation of IS security program policy; special emphasis placed upon integration of existing network infrastructure Advise the Information System Owner (ISO), Information Data Owner (IDO), Program Security … Officer (PSO), and the Delegated and/or Authorizing Official (DAO/AO) on any assessment and authorization issues Evaluate Authorization packages and make recommendation to the AO and/or DAO for authorization Evaluate IS threats and vulnerabilities to determine whether additional safeguards are required Advise the Government concerning the impact levels for Confidentiality, Integrity, and Availability for … the information on a system Ensure security assessments are completed and results documented and prepare the Security Assessment Report (SAR) for the Authorization boundary Initiate a Plan of Action and Milestones (POA&M) with identified weaknesses for each Authorization Boundaries assessed, based on findings and recommendations from the SAR Evaluate security assessment documentation and provide written recommendations for More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Operational Cyber Researcher

Gloucester, Gloucestershire, South West
BAE Systems
your recruiter about the options Requisition ID: 121883 Grade: GG10 - GG12 Operational Cyber Group is a team of industry-leading experts in high-assurance development, research, reverse engineering, and vulnerability research. With a focus on National Security, we work on some of the country’s toughest challenges. Our people provide mission-changing capability for our customers across a wide … to have a meaningful impact on National Security. Role Description Technical delivery: be able to systematically deconstruct a wide range of technologies and protocols to perform exploratory research and assessment, as well as experimental development (this includes creating prototypes and simulations). Mentorship, team-leadership, and collaboration: work in teams to deliver high-quality reports, whilst developing junior team … task at hand. Security mindset: be capable of identifying vulnerabilities and prioritise avenues of research that will deliver the most value to our customers. Have a working knowledge of vulnerability assessment or penetration-testing techniques. What we are looking for Familiarity with a variety of tools (e.g. IDEs, debuggers, source control, Ghidra, FRIDA, Wireshark, VMs) and techniques (e.g. More ❯
Employment Type: Permanent
Posted:

Sr. Mission Assurance/Antiterrorism SME with Security Clearance

Tampa, Florida, United States
T2C-Global
and analysis to USSOCOM Force Protection requirements. • Perform Force Protection related risk assessments. • Prepare security engineering planning and cost analysis for projects or improvements designed to mitigate risk. • Provide Vulnerability Assessment and Protection Option (VAPO) process analysis, or equivalent modeling and simulation capabilities. • Manage the DoD system of record for Mission Assurance Risk Management System (MARMS) • Provide Defense … Management (Antiterrorism/DCIP) • Five years' experience in the DOD Security Engineering planning process, as defined in the DOD Unified Facility Criteria 04-020 series • Five years' experience in Vulnerability Assessment Protection Option and Force Protection • Ten years' experience assigned to, attached, employed by, or contracted by USSOCOM or one of its subordinate organizations • Ten years' experience preparing More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Software Tester / UK

United Kingdom
Hybrid / WFH Options
G&L Consulting
APIs, databases, and service flows. Security Testing & Penetration Testing (Ethical Hacking) Simulate attacks to find vulnerabilities. Tools: Burp Suite , OWASP ZAP , Metasploit . CEH , OSCP , CISSP certifications an advantage Vulnerability Testing Scan systems for known vulnerabilities. Collaborate with SecOps and DevSecOps teams. Security QA/Secure Code Testing Test software from a secure coding perspective. Ensure compliance with secure … model predictions, fairness, and ethical AI compliance. Seniority Level Associate Industry IT Services and IT Consulting Employment Type Full-time Job Functions Information Technology Skills Test Automation Functional Testing Vulnerability Assessment and Penetration Testing (VAPT) Test Management Selenium More ❯
Posted:

DevSecOps Engineer

Colorado Springs, Colorado, United States
Maximus
SaaS - Collaborate with development and operations teams to design, implement, and maintain secure and automated infrastructure. - Implement security best practices throughout the software development lifecycle (SDLC), including code scanning, vulnerability assessment, and threat modeling. - Develop and maintain CI/CD pipelines, enabling continuous integration, continuous delivery, and continuous deployment of applications. - Develop and maintain containerization and micro-services. … Integrate security controls, such as automated vulnerability scanning, static and dynamic analysis, and security testing, into the CI/CD process. - Collaborate with cross-functional teams to ensure compliance with security standards and regulatory requirements. - Automate and orchestrate security processes, including incident response and threat detection, using technologies like Splunk, Chef Automate, and others. - Stay updated with emerging DevSecOps More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

DevSecOps Engineer - Secret Clearance Required

Colorado Springs, Colorado, United States
Maximus
SaaS - Collaborate with development and operations teams to design, implement, and maintain secure and automated infrastructure. - Implement security best practices throughout the software development lifecycle (SDLC), including code scanning, vulnerability assessment, and threat modeling. - Develop and maintain CI/CD pipelines, enabling continuous integration, continuous delivery, and continuous deployment of applications. - Develop and maintain containerization and micro-services. … Integrate security controls, such as automated vulnerability scanning, static and dynamic analysis, and security testing, into the CI/CD process. - Collaborate with cross-functional teams to ensure compliance with security standards and regulatory requirements. - Automate and orchestrate security processes, including incident response and threat detection, using technologies like Splunk, Chef Automate, and others. - Stay updated with emerging DevSecOps More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

DevSecOps Engineer - Secret Clearance Required

Annapolis Junction, Maryland, United States
Maximus
SaaS - Collaborate with development and operations teams to design, implement, and maintain secure and automated infrastructure. - Implement security best practices throughout the software development lifecycle (SDLC), including code scanning, vulnerability assessment, and threat modeling. - Develop and maintain CI/CD pipelines, enabling continuous integration, continuous delivery, and continuous deployment of applications. - Develop and maintain containerization and micro-services. … Integrate security controls, such as automated vulnerability scanning, static and dynamic analysis, and security testing, into the CI/CD process. - Collaborate with cross-functional teams to ensure compliance with security standards and regulatory requirements. - Automate and orchestrate security processes, including incident response and threat detection, using technologies like Splunk, Chef Automate, and others. - Stay updated with emerging DevSecOps More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Account Executive - UK

United Kingdom
Action1
first 200 endpoints, with no functional limits. By pioneering autonomous OS and third-party patching - AEM’s foundational use case - through peer-to-peer patch distribution and real-time vulnerability assessment without needing a VPN, it eliminates costly, time-consuming routine labor, preempts ransomware and security risks, and protects the digital employee experience. Trusted by thousands of enterprises More ❯
Posted:

Sr Software Dev Engineer Test, Quality Assurance

London, England, United Kingdom
Amazon
and tools building experience - - Experience programming with at least one modern language such as Java, C++, or C# including object-oriented design - - Experience in penetration testing and exploitability-focused vulnerability assessment - - Experience in platform-level security mitigations and hardening for Linux and Windows - - Knowledge of overall system architecture, scalability, reliability, and performance in a database environment - - Experience with More ❯
Posted:

Technology Resilience Manager

London, United Kingdom
Innovation Group
dynamic team to build innovative ways of building and assessing operationally resilient technology services. Principal Accountabilities: - Business Impact Assessments & Risk Identification: Develop asset management strategies, lead business impact and vulnerability assessments, conduct threat modelling, and maintain risk identification frameworks. - Risk Assessment & Evaluation: Ensure compliance with governance policies, provide expertise on operational resilience, and support risk assessments for internal More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Linux Cryptography and Security Engineer

Edinburgh, Scotland, United Kingdom
Hybrid / WFH Options
Canonical
directly with DISA-STIG or CIS benchmarks, including related audit + remediation tooling (e.g. Compliance as Code) Experience working directly with Linux Kernel Prior experience with Python, OVAL (Open Vulnerability Assessment Language), and Ansible History of contributions to open source projects What we offer you We consider geographical location, experience, and performance in shaping compensation worldwide. We revisit More ❯
Posted:

Systems Engineer with Security Clearance

Lexington, Massachusetts, United States
Aquila Technology
Clearance Requirements: None Aquila is seeking a Systems Engineer to join a team responsible for the execution of compliance and assistance with vulnerability remediation activities primarily associated with enterprise information systems. This new position has been added to an existing team to support department expansion. The person hired will not only become familiar with the utilization of vulnerability … required Excellent communication (both oral and writing) and organizational skills Proficiency and hands-on experience with Tenable's Security Center and IBM BigFix Proficiency and hands-on experience with vulnerability remediation across multiple Operating System (OS) platforms include Linux, Mac, and Windows Strong proficiency and hands-on experience with maintaining Red Hat Satellite, building Linux installation packages in support … other duties as assigned. Required Experience: 5 years of experience Systems Engineering OS platforms (Linux, Mac, Windows) Linux for Unix Redhat Enterprise Linux 7 & 8 2 years of experience Vulnerability Assessments IBM Bix Fix Tenable's Security Center Other Requirements Pass a comprehensive background investigation. Maintain an Active security clearance BS in a related field or equivalent experience Covid More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cybersecurity Analyst Devi Technologies

Birmingham, England, United Kingdom
Devitechs
exposure in identifying, preventing, and responding to digital threats while learning key tools and best practices in IT security. Responsibilities: ️ Assist in monitoring networks for security breaches ️ Help conduct vulnerability assessments and audits ️ Research the latest cybersecurity threats and trends ️ Support the implementation of security tools and protocols ️ Participate in phishing simulations and awareness training ️ Document and analyze incidents More ❯
Posted:

Penetration Tester Devi Technologies

United Kingdom
Devitechs
What You'll Be Working On: ️ Performing comprehensive penetration testing on web applications, networks, and infrastructure ️ Identifying vulnerabilities and providing detailed reports with recommendations for remediation ️ Conducting vulnerability assessments and risk analyses to identify areas of concern ️ Collaborating with development and IT teams to improve overall security posture ️ Keeping up to date with the latest security threats, techniques, and More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:
Vulnerability Assessment
10th Percentile
£41,750
25th Percentile
£47,531
Median
£57,500
75th Percentile
£77,500
90th Percentile
£89,875