/SaaS Collaborate with development and operations teams to design, implement, and maintain secure and automated infrastructure Implement security best practices throughout the software development lifecycle (SDLC), including code scanning, vulnerability assessment, and threat modeling Develop and maintain CI/CD pipelines, enabling continuous integration, continuous delivery, and continuous deployment of applications Develop and maintain containerization and micro … services Integrate security controls, such as automated vulnerabilityscanning, static and dynamic analysis, and security testing, into the CI/CD process Collaborate with cross-functional teams to ensure compliance with security standards and regulatory requirements Automate and orchestrate security processes, including incident response and threat detection, using technologies like Splunk, Chef Automate, and others Stay updated with More ❯
firewall security logs Experience with Splunk Machine Learning Toolkit (MLTK) Experience with scripting languages such as CSS, HTML, JavaScript, and Python Knowledge of RMF, Trellix ePO, NESSUS, SCAP, and vulnerabilityscanning ServiceNow Ticketing System Shell scripting to automate tasks and manipulate data More ❯
HTML, JavaScript, and Python Shell scripting to automate tasks and manipulate data Preferred DoD 8570 CE Certification Requirements: CompTIA Security+ CE Knowledge of RMF, Trellix ePO, NESSUS, SCAP, and vulnerabilityscanning and ServiceNow Ticketing System More ❯
Knowledge of Istio, mTLS, secrets management, and configuration management Understanding of security best practices and automated testing within infrastructure Bonus Skills (Nice to Have): Familiarity with Terragrunt, ArgoCD, and vulnerabilityscanning tools Experience supporting Java applications and AWS migration projects Background in regulated environments such as government or finance Existing SC clearance or BPSS is must to start More ❯
implementation (L2/L3), and IP address management. Proficiency in configuring and managing virtualization technologies such as VMware, vCenter, and NSX-T. Experience in network security, firewalls, ACLs, and vulnerabilityscanning tools. Hands-on experience with forensic tools like Cellebrite, XRY, FTK, and Autopsy. Strong troubleshooting skills, with a focus on network systems, server infrastructure, and performance metrics. More ❯
Huntsville, Alabama, United States Hybrid / WFH Options
All Points Logistics LLC
POSITION/DUTIES: The Systems Administrator II will provide core support services for Engineering Labs at Marshall Space Flight Center (MSFC) in Huntsville, Alabama. The support will include performing vulnerabilityscanning, reporting and mitigation of findings on isolated systems at MSFC, and standardizing OS/Backup versions. Duties may include, but are not limited to: Mid-level systems More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Lorien
architecture across diverse technologies and platforms. Deep understanding of cloud architecture principles, ideally within Microsoft Azure. Familiarity of working across the SDLC and secure software development practices. Experience with vulnerabilityscanning, remediation strategies, and CI/CD pipelines is a plus. Analytical and detail-oriented, with the ability to work independently and manage sensitive information. Strong communication skills More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Lorien
architecture across diverse technologies and platforms. Deep understanding of cloud architecture principles, ideally within Microsoft Azure. Familiarity of working across the SDLC and secure software development practices. Experience with vulnerabilityscanning, remediation strategies, and CI/CD pipelines is a plus. Analytical and detail-oriented, with the ability to work independently and manage sensitive information. Strong communication skills More ❯
on AWS Cloud migration projects Experience with any or all of: Terragrunt & ArgoCD Experience supporting the build, deployment production support of Java applications Solid understanding of common security principles Vulnerabilityscanning & reporting experience Able to demonstrate they have worked in regulated environments (eg, finance, government) Demonstrable experience of identifying manual processes suitable for automation Carbon60, Lorien & SRG - The More ❯
ESXi preferred) Experience in large-scale deployments as an administrator Knowledge of cloud migration and AWS Cloud Platform (IaaS preferred) Load balancing/failover technologies General knowledge of antivirus, vulnerabilityscanning software, and Security Information and Event Management (SIEM) User acceptance testing (UAT) and industry certifications An active Top Secret clearance is preferred but not required. More ❯
include creating trust levels of critical resources • system and application security threats and vulnerabilities of network topologies, Wi-Fi Networking, and TCP/IP protocols • Splunk (or other SIEMs) • Vulnerabilityscanning, assessment and monitoring tools such as Security Center, Nessus, and Endgame • MITRE Adversary Tactics, Techniques and Common Knowledge (ATT&CK) • Must be able to work collaboratively across More ❯
Gloucester, Gloucestershire, United Kingdom Hybrid / WFH Options
Eplass
locations). You proactively ensure the highest availability of systems and infrastructures. You will perform routine maintenance on the infrastructure of our SaaS solutions, including software releases, patching, and vulnerabilityscanning processes. Implementation of automatizations to enhance efficiency and reduce manual intervention. Support the company in integration of new technologies. Work with our IT security and compliance team More ❯
practices (IAM, encryption, VPC configuration, audit logging) using AWS native services and third-party tools. Embed security throughout the software development lifecycle by integrating static and dynamic code analysis, vulnerabilityscanning, and policy-as-code tools into CI/CD pipelines-ensuring DevSecOps principles are applied from design to deployment. Promote a culture of continuous learning and knowledge More ❯
practices (IAM, encryption, VPC configuration, audit logging) using AWS native services and third-party tools. Embed security throughout the software development lifecycle by integrating static and dynamic code analysis, vulnerabilityscanning, and policy-as-code tools into CI/CD pipelines-ensuring DevSecOps principles are applied from design to deployment. Promote a culture of continuous learning and knowledge More ❯
Barrow-In-Furness, Cumbria, Barrow in Furness, United Kingdom Hybrid / WFH Options
Adecco
Job Title: Vulnerability Manager Location: Barrow-in-Furness (Hybrid - 3 days onsite per week) Type: Full-time | Permanent Overview I'm recruiting on behalf of a leading organisation in the technology and cybersecurity space, looking to bring on an experienced and proactive Vulnerability Manager . This is a great opportunity for someone with a strong background in cybersecurity … vulnerability management, and governance. You'll be working closely with internal teams, clients, and third-party stakeholders to manage and improve security posture across complex environments. Key Responsibilities Manage and execute the end-to-end vulnerability management process Conduct vulnerability analysis , risk assessments, and impact reporting Identify current and emerging threats and communicate these effectively to stakeholders … support remediation activities through to closure Deliver security awareness sessions and support a culture of cybersecurity best practices across the team Ideal Candidate Will Have: Hands-on experience with vulnerabilityscanning tools and related frameworks Strong understanding of risk assessment methodologies and security governance Ability to present complex technical findings clearly to both technical and non-technical audiences More ❯
years of experience in Android development, including proficiency in Java, Kotlin, and Android SDK. Solid understanding of mobile security concepts, including secure coding practices, encryption algorithms, authentication protocols, and vulnerability assessment. Familiarity with Android security frameworks, libraries, and APIs. Experience with threat modeling, risk assessment, and security architecture design. Knowledge of secure coding practices and common vulnerabilities such as … OWASP Top 10. Proficiency in using security tools for vulnerabilityscanning and code analysis. Excellent problem-solving skills and attention to detail. Strong communication and collaboration abilities, with a passion for teamwork. Ability to adapt quickly to changing priorities and work effectively in a fast-paced environment. TS/SCI security clearance required. Join our team and contribute More ❯
into the CI/CD process: Implement security checks and controls at every stage of the pipeline to ensure secure software delivery. Use tools to perform static code analysis, vulnerabilityscanning, and compliance checks. Agile Development: Participate in agile ceremonies: Engage in sprint planning, daily stand- ups, and retrospectives to ensure effective and efficient development cycles. Collaborate with More ❯
Splunk, New Relic) that provide operational insight into the health of live applications and systems. Experience in applying a range of cloud security tools and techniques (e.g. threat modelling, vulnerabilityscanning, dependency checking, reducing attack surface area), ideally incorporating these tools and techniques into automated pipelines. The desire to upskill and enable product engineering squads to operate and More ❯
infrastructure design, development, and review, with a specific focus on security. Proven track record of designing and documenting security solutions. Knowledge and experience with the design and implementation of vulnerabilityscanning solutions. Adaptive ability to consider new innovations and technologies within compressed timeframes. Strong presentation skills to robustly defend security designs to both peer and leadership positions. Benefits More ❯
brand/reputation of working with large police forces across the UK and assisting with Technical Cyber Security consulting side and offering services such as outsourced SOC, penetration testing, vulnerabilityscanning to name a few. This role is to join the commercial team to leverage current client base and offer technical Cyber Security solutions but mainly to create More ❯
This is a dynamic and varied role, which includes things like: Build, deployment and maintenance of new and existing environments Designing and maintaining highly available architectures Security (patch management, vulnerabilityscanning & monitoring) Uptime ?" design and maintain the systems and networking for uptime, resilience, architecting for failure. Evaluation of new, cutting-edge technologies to help improve business processes and More ❯
This is a dynamic and varied role, which includes things like: • Build, deployment and maintenance of new and existing environments • Designing and maintaining highly available architectures • Security (patch management, vulnerabilityscanning & monitoring) • Uptime - design and maintain the systems and networking for uptime, resilience, architecting for failure. • Evaluation of new, cutting-edge technologies to help improve business processes and More ❯
to join our ranks. Our managed services division is a significant enabler to NCC Groups growth strategy. It focuses on delivering scalable, cutting-edge managed security services, ranging from vulnerabilityscanning through to world class threat management services (MDR/XDR/EDR/NDR etc) . As we continue to grow and evolve based on increasing client More ❯