Key activities in relation to Penetration Testing & Vulnerability Assessments will include conducting internal and external penetration tests to evaluate system security. • Performing regular vulnerability scans using tools like Nessus, Qualys, or OpenVAS. • Analysing scan results, prioritizing risks, and coordinating with stakeholders for remediation. • Key activities in relation to threat monitoring and response will include monitoring networks, systems, and applications for More ❯
with a focus on endpoint security Hands-on experience with AV and EDR platforms (e.g., CrowdStrike, SentinelOne, Microsoft Defender) Familiarity with CAASM tools and vulnerability management solutions (e.g., Tenable, Qualys) Strong understanding of Windows, macOS, and Linux endpoint environments Knowledge of incident response processes and threat detection techniques Excellent problem-solving and communication skills Preferred Qualifications Relevant certifications (e.g., CISSP More ❯
Greater Bristol Area, United Kingdom Hybrid/Remote Options
Logiq
EDR, anti-malware, and DLP. Monitoring & Threat Detection Operate and optimise SIEM tools (Splunk, Microsoft Sentinel) for proactive threat detection and incident response. Vulnerability Management Perform vulnerability assessments using Qualys and Tenable, driving remediation and continuous improvement. Compliance & Governance Align security controls with frameworks such as ISO 27001, NIST, CIS, and Cyber Essentials, supporting audits and certification processes. What We More ❯
Proven capability in creating and executing comprehensive threat and vulnerability management programmes, including vulnerability scanning, penetration testing, and security awareness training. Proficiency in using vulnerability scanning tools (e.g. Tenable, Qualys, Rapid7, Veracode, JFrog Xray), threat intelligence platforms, and incident response tools. Prior experience implementing automated solutions for vulnerability scanning, threat detection, and incident response, with a focus on continuous process More ❯
for continuous security posture monitoring. Implement RBAC, MFA, and Zero Trust principles to strengthen identity and access control mechanisms. Conduct vulnerability assessments and remediation using tools like Nessus, Tenable, Qualys, and Trivy. Ensure compliance with industry frameworks and regulations (ISO 27001, NIST 800-53, PCI DSS, HIPAA, FedRAMP, CJIS). Collaborate with application and infrastructure teams to embed security best More ❯
Birmingham, West Midlands, England, United Kingdom
TXP
significant experience in cyber security or information security roles Familiarity with frameworks such as MITRE ATT&CK, NIST, ISO 27001, Cyber Essentials+ Hands-on experience with tools like Nessus, Qualys, SIEM, EDR, DLP, VPNs, and firewalls Strong understanding of network protocols (TCP/IP, DNS, HTTP, SSH) and segmentation Knowledge of Zero Trust architecture and cloud-native security practices Proficiency More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid/Remote Options
TXP
significant experience in cyber security or information security roles Familiarity with frameworks such as MITRE ATT&CK, NIST, ISO 27001, Cyber Essentials+ Hands-on experience with tools like Nessus, Qualys, SIEM, EDR, DLP, VPNs, and firewalls Strong understanding of network protocols (TCP/IP, DNS, HTTP, SSH) and segmentation Knowledge of Zero Trust architecture and cloud-native security practices Proficiency More ❯
educate, and share information with non-technical people Contribute to the growth and mentorship of other team members Detailed knowledge in the inner workings of vulnerability scanners such as Qualys, Rapid7, Tenable, etc. Experience with identifying product and market changes and needed analysis/detection coverage changes in your existing sources History of identifying product and market changes and needed More ❯
including prioritization, investigation, and tracking remediation activities. Evaluate new tools and techniques in security testing and articulate their value and impact. Operate vulnerability and configuration scanning tools, like Tenable, Qualys, InsightVM. Perform technical and non-technical risk and vulnerability assessments of relevant technology focus areas. Defining, creating and implementing various SOPs (Standard Operating Procedures) and SOMs (Service Operating Models). More ❯
Proven capability in creating and executing comprehensive threat and vulnerability management programmes, including vulnerability scanning, penetration testing, and security awareness training. Proficiency in using vulnerability scanning tools (e.g. Tenable, Qualys, Rapid7, Veracode, JFrog Xray), threat intelligence platforms, and incident response tools. Prior experience implementing automated solutions for vulnerability scanning, threat detection, and incident response, with a focus on continuous process … both technical and non-technical stakeholders, including executive leadership. Education/Qualifications/Technical Competencies Essential Recognised cybersecurity certification: CISSP and/or CISM Strong knowledge of: Ivanti LANDesk, Qualys, Splunk Windows Server/Desktop, RHEL/OEL Linux PowerShell and Python scripting Proven experience leading strategic security initiatives and process automation in large-scale environments Desirable Additional certifications: CCSP More ❯
Central London, London, United Kingdom Hybrid/Remote Options
Colt Technology Services
requirements of supported security and network devices Required profile: Self-driven individual with vulnerability management function experience. Proven experience with products dealing with vulnerability management services which include - Rapid7, Qualys, Nessus etc. Strong understanding on Windows systems, Linux systems Strong understanding on Networking Should have completed certifications like CEH, ECSA or other equivalent security certifications Degree in Information Technology, Engineering More ❯
and network devices What We're Looking For? Self-driven individual with relevant vulnerability management function experience. Proven experience with products dealing with vulnerability management services which include - Rapid7, Qualys, Nessus etc. Strong understanding on Windows systems, Linux systems Strong understanding on Networking Should have completed certifications like CEH, ECSA or other equivalent security certifications Degree in Information Technology, Engineering More ❯
to peers or leadership. Organizational and task management skills, with familiarity using tools like JIRA or similar platforms to document work. Exposure to security platforms such as Splunk, Tanium, Qualys, CyberArk, Fusion, Okta, Azure Active Directory, or SailPoint. Compensation range: The salary range for this position is: $85,040 - $162,550. USAA does not provide visa sponsorship for this role. More ❯
Manchester, Lancashire, England, United Kingdom Hybrid/Remote Options
4Square Recruitment Ltd
capability. What You’ll Bring 2–5 years’ experience in ethical hacking or penetration testing. Strong understanding of OWASP, web, and infrastructure testing. Experience with Burp Suite, Nmap, Nessus, Qualys, Metasploit, Kali Linux. Familiarity with cloud security (AWS, Azure, or GCP). Confident communicator with client-facing experience. Bonus points for: Public sector testing experience. Code review skills (Python, Java More ❯
East Grinstead, West Sussex, South East, United Kingdom Hybrid/Remote Options
Blue Cube Security
experience in cyber security or network engineering. Strong understanding of network security principles and practices. Knowledge of leading vendor security technologies with experience in vendor products such as Fortinet, Qualys, Trend Micro, Thales or Imperva (desirable). Working knowledge of cloud providers such as Amazon Web Services. Awareness of industry standards and frameworks including NIST, and UK specific schemes such More ❯
platforms (e.g., Microsoft Sentinel, IBM QRadar, CrowdStrike Falcon). Architect and deploy cloud security solutions across Azure and AWS environments. Manage and optimise vulnerability management tools (e.g., Tenable.SC, Rapid7, Qualys). Support the development and operation of Cyber Security Operations Centres (CSOCs) . Conduct threat modelling, risk assessments, and incident response . Implement and manage identity and access management (IAM … experience (10+ years) in Cyber Security Engineering, Architecture, or Operations . Strong background in Microsoft Security Stack (Sentinel, Defender, SOAR). Hands-on experience with CrowdStrike XDR , Tenable , Rapid7 , Qualys , and ForcePoint . Deep understanding of Cisco, Check Point, and Juniper network security. Expertise in cloud security (Azure & AWS) . Demonstrated success leading or building CSOCs or security programmes . More ❯
Job Description Microsoft Defender; Qualys; Exposure Mgt; Attack Path analysis; IT and Infrastructure experience (Windows Server and/or Red Hat Linux); development of monitoring use cases; collaboration and remediation engagement 3+ years of experience in vulnerability management or compliance monitoring Experience in design and implementation of security technologi Experience with IT controls monitoring for regulatory and compliance requirements Experience More ❯
Must have excellent communication skills - written and verbal Job Description: Vuln Mgmt and Config Compliance surge support is a mid to senior-level cyber security professional with experience with Qualys, ServiceNow, and cloud compliance tools (Prisma, Wiz, etc.). They ll provide support where needed to ensure sustainable vulnerability and compliance data integration, support risk treatment processes, and enable cloud More ❯
large enterprises, across a diverse technology stack (IaaS/PaaS/SaaS/physical/mainframe/hybrid-cloud) and delivery lifecycles (Project/COTS applications, DevOps) Expertise with Qualys and other vulnerability and exposure management technologies Expertise in the full vulnerability management lifecycle Vendor and market analysis and engagement Ability to translate technical information into Risks, Threats, and Vulnerabilities More ❯
experience: • Experience with containerization technologies e.g., Docker, and orchestration platforms e.g., Kubernetes. • Familiarity with other cloud platforms (AWS, GCP). • Knowledge of configuration management tools e.g., Snyk, SonarQube, or Qualys • Understanding of compliance frameworks and security best practices. Rewards & Benefits TCS is consistently voted a Top Employer in the UK and globally. Our competitive salary packages feature pension, health care More ❯
experience: • Experience with containerization technologies e.g., Docker, and orchestration platforms e.g., Kubernetes. • Familiarity with other cloud platforms (AWS, GCP). • Knowledge of configuration management tools e.g., Snyk, SonarQube, or Qualys • Understanding of compliance frameworks and security best practices. Rewards & Benefits TCS is consistently voted a Top Employer in the UK and globally. Our competitive salary packages feature pension, health care More ❯
compliance frameworks Skilled in vulnerability management, penetration testing, and supplier assurance Strong communicator with the ability to translate technical risk into business impact Experience with tools like ISMS Online, Qualys VMDR, and Cofense phishing simulation A proactive leader with sound judgement and stakeholder engagement skills This is a high-impact opportunity for someone who thrives in a collaborative, fast-paced More ❯
City of London, London, United Kingdom Hybrid/Remote Options
Lorien
Identification - Attack Surface Mapping - Risk Assessment - Prioritisation & Remediation - Continuous Monitoring Strong understanding of exposure scoring systems (e.g., VPR, ACR, contextual risk). Hands-on experience with tools such as Qualys, Tenable, Rapid7 . Familiarity with AWS and GCP environments . Knowledge of DevSecOps pipelines and how security integrates into CI/CD. Ability to communicate technical risk to both technical More ❯
Identification - Attack Surface Mapping - Risk Assessment - Prioritisation & Remediation - Continuous Monitoring Strong understanding of exposure scoring systems (e.g., VPR, ACR, contextual risk). Hands-on experience with tools such as Qualys, Tenable, Rapid7 . Familiarity with AWS and GCP environments . Knowledge of DevSecOps pipelines and how security integrates into CI/CD. Ability to communicate technical risk to both technical More ❯
Your Impact and Responsibilities Design, implement, and maintain security measures to protect information and network infrastructure. Conduct regular security audits, risk assessments, and vulnerability scans (using tools such as Qualys). Manage and monitoring of technical vulnerabilities and manage remediation across IT assets. Monitor systems and networks for security breaches, irregular behavior, and abuse of permissions. Administer and optimize Email … and written communication skills for technical and non-technical audiences. Ability to educate and mentor staff. Project management skills are a plus. Expertise in vulnerability management and patch management (Qualys or similar platforms). Understanding of Email Security platforms (e.g., Darktrace) and Security Awareness & Training platforms. Knowledge of security frameworks (ISO 27001, NIST, GDPR, etc.). Familiarity with SIEM, security More ❯