expert (SME) for OT systems during audits, inspections, and vendor engagements. • Evaluate new technologies and develop risk-based strategies to enhance OT cybersecurity and system reliability. • Support penetration testing, vulnerability assessments, and patch management activities in live and test environments. • Participate in a 24/7 on-call rotation to support critical infrastructure operations. Qualifications: • Bachelor's degree in … on experience deploying and configuring firewalls, switches, and routers. • Experience troubleshooting issues across all OSI model layers. • Familiarity with server virtualization (hypervisors, VMs, bare metal deployments) preferred. • Experience with vulnerabilityscanning and cyber tools in an OT environment is a plus. • Familiarity with the Purdue Model for ICS networks is strongly preferred. • Strong technical documentation and communication skills More ❯
systems Assisting in the development and verification of documentation necessary to complete the DoD RMF assessment and authorization process Conducting ICS/SCADA system inventories following DoD guidance Conducting vulnerabilityscanning and document system vulnerabilities Supporting ISO standardization and Quality inspections Participating in continuous improvement of organizational cybersecurity posture Provide system security engineering services and/or products … procedures to ensure information systems reliability and accessibility and to prevent and defend against unauthorized access to systems, networks, and data Assessment, mitigation, and closure of network vulnerabilities and vulnerability management eMASS Establishing, managing, and tracking of Plan of Action & Milestones (POA&M) Applying STIGs to servers, databases, applications, and other hardware Security Readiness Review (SRR) Tools (scripts and More ❯
firewall security logs Experience with Splunk Machine Learning Toolkit (MLTK) Experience with scripting languages such as CSS, HTML, JavaScript, and Python Knowledge of RMF, Trellix ePO, NESSUS, SCAP, and vulnerabilityscanning ServiceNow Ticketing System Shell scripting to automate tasks and manipulate data More ❯
Washington, Washington DC, United States Hybrid / WFH Options
OMW Consulting
team based in Washington, D.C. You must have an active Secret clearance or higher and a solid background in information security fundamentals and core technologies (e.g., authentication, encryption, firewalls, vulnerabilityscanning, SIEM/SOAR, audit logs). Your main responsibilities in this position will include: Achieving ATOs for the company's software across multiple government customers with minimal More ❯
HTML, JavaScript, and Python Shell scripting to automate tasks and manipulate data Preferred DoD 8570 CE Certification Requirements: CompTIA Security+ CE Knowledge of RMF, Trellix ePO, NESSUS, SCAP, and vulnerabilityscanning and ServiceNow Ticketing System More ❯
security project assurance. Knowledge of frameworks and standards such as ISO 27001, GDPR/DPA, and risk management methodologies. Experience with a broad range of security tools and technologies (vulnerabilityscanning, SIEM, authentication/authorisation, firewalls, DLP, cloud, networking etc). Excellent communication skills – able to present findings and influence stakeholders. Security qualifications such as CISSP, CISM or More ❯
Huntsville, Alabama, United States Hybrid / WFH Options
All Points Logistics LLC
POSITION/DUTIES: The Systems Administrator II will provide core support services for Engineering Labs at Marshall Space Flight Center (MSFC) in Huntsville, Alabama. The support will include performing vulnerabilityscanning, reporting and mitigation of findings on isolated systems at MSFC, and standardizing OS/Backup versions. Duties may include, but are not limited to: Mid-level systems More ❯
Agile Software Development and Scrum team dynamics Experience with: Automated software testing tools and frameworks DevSecOps workflows and pipelines Docker, Kubernetes, and container orchestration tools Automated container deployment and vulnerabilityscanning Performance testing and software debugging Network fundamentals and troubleshooting Proficiency using the Atlassian Suite (JIRA, Confluence, Bitbucket, etc.) Strong technical curiosity and desire to experiment with emerging More ❯
Agile Software Development and Scrum team dynamics Experience with: Automated software testing tools and frameworks DevSecOps workflows and pipelines Docker, Kubernetes, and container orchestration tools Automated container deployment and vulnerabilityscanning Performance testing and software debugging Network fundamentals and troubleshooting Proficiency using the Atlassian Suite (JIRA, Confluence, Bitbucket, etc.) Strong technical curiosity and desire to experiment with emerging More ❯
include creating trust levels of critical resources • system and application security threats and vulnerabilities of network topologies, Wi-Fi Networking, and TCP/IP protocols • Splunk (or other SIEMs) • Vulnerabilityscanning, assessment and monitoring tools such as Security Center, Nessus, and Endgame • MITRE Adversary Tactics, Techniques and Common Knowledge (ATT&CK) • Must be able to work collaboratively across More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
Rebel Recruitment
based solutions. You are someone who loves to automate mundane tasks, make scalable, highly available, and robust solutions, and ensure whatever youre working on is secure, through things like vulnerabilityscanning, threat analysis, and patching, which is high on your priority list. Whilst you love new shiny tech and always make a point of having a play around More ❯
Continuous Deployment (CI/CD) pipelines to automate the testing, deployment, and monitoring of software applications, when required by the government. Shall conduct regular code reviews, secure coding techniques, vulnerabilityscanning, and testing (unit, integration, system, and user acceptance) to ensure quality and performance, when required by the government. Shall collaborate with stakeholders to gather and validate requirements More ❯
Continuous Deployment (CI/CD) pipelines to automate the testing, deployment, and monitoring of software applications, when required by the government. Shall conduct regular code reviews, secure coding techniques, vulnerabilityscanning, and testing (unit, integration, system, and user acceptance) to ensure quality and performance, when required by the government. Shall collaborate with stakeholders to gather and validate requirements More ❯
North London, London, United Kingdom Hybrid / WFH Options
VERTECH GROUP (UK) LTD
security roles Strong knowledge of web/mobile security (OWASP Top 10, API security), cloud security (AWS), and CI/CD pipeline hardening Familiar with SAST/DAST tools, vulnerability scanners, penetration testing frameworks, and monitoring platforms (e.g. Splunk, ELK, Datadog) Understanding of GDPR and data privacy best practices Tremendous opportunity offering plenty of scope for career progression in More ❯
security roles Strong knowledge of web/mobile security (OWASP Top 10, API security), cloud security (AWS), and CI/CD pipeline hardening Familiar with SAST/DAST tools, vulnerability scanners, penetration testing frameworks, and monitoring platforms (e.g. Splunk, ELK, Datadog) Understanding of GDPR and data privacy best practices Tremendous opportunity offering plenty of scope for career progression in More ❯
application development and infrastructure. - Security & Compliance: Ensure all systems follow best practices in terms of security and compliance with relevant regulations. This includes role-based access, encryption, and automated vulnerability scanning. Requirements: - Active SECRET clearance or higher is required for consideration. - Bachelor's degree (or equivalent) in computer science or related discipline - A minimum of two(2) years of More ❯
each assigned system, including assessment scope, testing schedule, security tools, control evaluation methods, and designated assessor personnel. Draft and coordinate Rules of Engagement (ROE) documents for penetration testing and vulnerabilityscanning activities to ensure alignment with mission requirements and operational constraints. Conduct or oversee security control assessments for management, operational, and technical controls, leveraging interviews, evidence review, technical … assessment results and risk impacts in the Security Assessment Report (SAR), providing a clear summary of control effectiveness, risk posture, and any residual vulnerabilities. Support SAR preparation activities including: Vulnerability assessments and validation Security categorization reviews System Security Plan (SSP) analysis Risk issue resolution and remediation status reporting Preparation of SAR briefings, findings presentations, and meeting support materials Provide More ❯
Information System Security Officer for a multitude of information systems. Performs technical audits of assigned information systems as well as periodic monitoring of compliance with established standards. Uses SIEM, vulnerability management, and other tools to actively correlate data and hunt threats. Ensures system is configured in accordance with required standards. Evaluates and creates artifacts which demonstrate system configuration, procedures … substitute additional experience for education). • Has or able to obtain required DODM 8570.01-M baseline certification (e.g. CISSP) within 6 months of hire. Preferred Qualifications: • Experience using common vulnerabilityscanning and SIEM tools. • Previous experience as an ISSO or ISSE in a classified environment. • Previous experience implementing the requirements of the DCSA Assessment and Authorization Process Manual. More ❯
systems Assisting in the development and verification of documentation necessary to complete the DoD RMF assessment and authorization process Conducting ICS/SCADA system inventories following DoD guidance Conducting vulnerabilityscanning and document system vulnerabilities Supporting ISO standardization and Quality inspections Participating in continuous improvement of organizational cybersecurity posture Qualifications Education: 5+ Years of Experience with a Master … procedures to ensure information systems reliability and accessibility and to prevent and defend against unauthorized access to systems, networks, and data Assessment, mitigation, and closure of network vulnerabilities and vulnerability management eMASS Establishing, managing, and tracking of Plan of Action & Milestones (POA&M) Applying STIGs to servers, databases, applications, and other hardware Security Readiness Review (SRR) Tools (scripts and More ❯
in accordance with IC compliance requirements. - Experience reviewing and evaluating customer security issues and implement corrective actions as needed. - Experience managing continuous monitoring responsibilities for IT systems - Experience managing vulnerabilityscanning responsibilities for IT systems - Experience supporting security planning, assessment, risk analysis, and risk management using the Risk Management Framework (RMF) - An understanding of the security requirements for More ❯
requirements. Close coordination with the Security Control Assessor (SCA) and Authorizing Official Designated Representative (AODR) is essential to obtain and maintain security approvals. Additional duties include account management, auditing, vulnerabilityscanning, and advising both civilian and military personnel on cybersecurity matters. The role also supports compliance efforts and audit readiness. This is an excellent opportunity for an experienced More ❯
experience in software development and/or information security Experience with DevOps and Agile methodologies. Strong understanding of security principles and best practices Experience with security tools such as vulnerability scanners, intrusion detection systems, and log analysis tools. Excellent communication and collaboration skills Ability to work independently and as part of a team. Security certifications such as CISSP, CISM More ❯
years of experience in Android development, including proficiency in Java, Kotlin, and Android SDK. Solid understanding of mobile security concepts, including secure coding practices, encryption algorithms, authentication protocols, and vulnerability assessment. Familiarity with Android security frameworks, libraries, and APIs. Experience with threat modeling, risk assessment, and security architecture design. Knowledge of secure coding practices and common vulnerabilities such as … OWASP Top 10. Proficiency in using security tools for vulnerabilityscanning and code analysis. Excellent problem-solving skills and attention to detail. Strong communication and collaboration abilities, with a passion for teamwork. Ability to adapt quickly to changing priorities and work effectively in a fast-paced environment. TS/SCI security clearance required. Join our team and contribute More ❯
review boards, offering expert advice on security concerns and compliance issues. Collaborate with system owners, engineers, and stakeholders to verify the proper implementation and functioning of security controls. Support vulnerability scans, compliance audits, and configuration reviews to identify and remediate security issues promptly. Contribute to the RMF documentation lifecycle, including creating and updating Concept of Operations (CONOPS), System Security … capabilities Expertise in validating and testing security controls Knowledge of RMF processes and NIST SP 800-53/800-37 standards Experience tracking and remediating POA&Ms Familiarity with vulnerabilityscanning tools such as Nessus, Qualys, etc. Understanding of secure network architectures and system configurations Technical Competence: Solid understanding of cybersecurity principles: confidentiality, integrity, availability Experience reviewing and More ❯
and OpenShift Implement Infrastructure as Code using Terraform, CloudFormation, and Ansible Create and optimise secure CI/CD pipelines with GitLab CI/CD, Jenkins, and ArgoCD Embed security scanning and compliance tools (Snyk, Trivy, Checkov, SonarQube) into automated workflows Manage authentication, access control, and secrets using Vault, AWS Secrets Manager, OAuth2.0, and Zero Trust principles Monitor environments with … OpenShift experience advantageous) Proven expertise in IaC, automation, and modern CI/CD practices Deep knowledge of application security, access management, and Zero Trust Networking Hands-on experience with vulnerabilityscanning, policy-as-code, and automated compliance tooling Proficiency in building secure, reliable, and scalable pipelines and platforms Excellent collaboration skills across cross-functional teams in secure environments More ❯