Raleigh, North Carolina, United States Hybrid / WFH Options
First Citizens Bank
ongoing research. Communicates effective and clear technical information to associates and management. Serves as a resource to wider business unit, management, and project teams. VulnerabilityAssessment: Conducting vulnerability assessments using Qualys tools. Analyzing and interpreting vulnerability data. • Remediation Strategies: Developing and implementing remediation plans. Collaborating with … IT and security teams to address vulnerabilities. Reporting and Documentation: Creating detailed reports on vulnerability findings and remediation actions. Maintaining documentation for compliance and audits. Continuous Improvement: Keeping abreast of the latest security trends and technologies. Improving and optimizing the vulnerability management process. Technical Skills: Profound knowledge of … Qualys cloud solutions, especially in vulnerability management. Experience in deploying, configuring, and managing Qualys tools. In-depth understanding of vulnerabilityassessment and remediation processes. Knowledge of various vulnerabilities and threats, including CVEs, CVSS scoring, etc. Understanding of cybersecurity frameworks, standards, and best practices. Familiarity with firewalls, IDS more »
of sensitive data. This is a contract position offering a competitive daily rate and the opportunity to work remotely. Key Responsibilities Implement and maintain vulnerability management programs and processes. Identify, assess, and prioritize vulnerabilities within the company's technology infrastructure. Perform regular scans, audits, and penetration testing to identify … potential weaknesses. Create reports and provide insights to stakeholders regarding vulnerability status and remediation strategies. Collaborate with cross-functional teams to address vulnerabilities and implement security controls. Maintain up-to-date knowledge of emerging security threats and industry best practices. Participate in incident response and provide guidance in the … event of a security breach. Job Requirements Significant experience in vulnerability management, including vulnerabilityassessment, penetration testing, and remediation. Strong knowledge of vulnerability scanning tools such as Nessus, Qualys, or similar. Understanding of industry frameworks and standards, such as OWASP, NIST, and CVSS. Ability to analyze more »
San Antonio, Texas, United States Hybrid / WFH Options
Leidos
C2E members and teams, delegated authorizing officials and other government security representatives. Adherence to all aspects of the Information Assurance (IA) program, Preparation of Assessment and Authorization (A&A) documents, procedures, and policies to ensure the organization is secure. A Hybrid work plan is in place and the mission … related experience. DoD 8570 IAT-II or above Knowledge of various security concepts: enterprise cloud architecture, infrastructure security and compliance, data encryption, continuous monitoring, vulnerabilityassessment, security control validation, etc. Supports secure systems operations and maintenance Effectively communicate, conduct meetings, and brief executive leadership, key stakeholders and customers more »
processes and adhering to best practices. Knowledge of penetration testing methodologies. Knowledge of Intrusion detection/prevention systems (IDS/IPS/WAF) and vulnerabilityassessment tools. Extensive switching, routing and firewall experience. Experience in producing implementation documents (e.g. new office setup). Extensive VPN and Global network more »
identifying vulnerabilities, enhancing security measures, and ensuring the safety of our clients’ digital environments. Your responsibilities will span a wide range of tasks, from vulnerability scanning to technical content creation. Responsibilities: Vulnerability Detection and Automation: Collaborate with our security team to scan customer systems for critical vulnerabilities. Develop … new vulnerability checks using tools like Nuclei. Curate crowd-sourced checks for inclusion in our Intruder platform. Automate penetration testing processes to scale across multiple clients simultaneously. Rapid Response and Custom Scanning: Conduct custom scans on customer targets to identify emerging critical weaknesses. Provide rapid response solutions to address … Occasionally participate in industry events and conferences. Qualifications and Experience: Industry Experience: Minimum of 2 years in offensive security roles. Proven track record in vulnerabilityassessment and penetration testing. Educational Background: Technical academic background in software engineering or cyber security. Certifications (One or More): OSCP OSWE OSEP CRT more »
Belfast, Northern Ireland, United Kingdom Hybrid / WFH Options
Idox plc
Kubernetes clusters, Docker containers, S3 buckets, and RDS databases. Respond promptly to security incidents and conduct thorough post-incident analysis to prevent future occurrences. Vulnerability Management: Conduct regular vulnerability assessments and penetration testing on AWS resources, identifying and remediating vulnerabilities in a timely manner. Implement and manage automated more »
Bellevue, Washington, United States Hybrid / WFH Options
The Pokémon Company International
Performs cloud security audits and testing and evaluates system security configurations to ensure efficacy and compliance with policies and procedures. Oversees penetration testing and vulnerability assessments of applications, operating systems and/or networks. Alongside the Information Security team, responsible for responding to and remediating security events/incidents. more »
Hatfield, Hertfordshire, United Kingdom Hybrid / WFH Options
Hays Technology
but not be limited to): Perform comprehensive security control reviews and collaborate with external experts. Analyse IT security posture, manage OS patches, and conduct vulnerability scans; advise on risk mitigation. Investigate security breaches, preserve evidence, and maintain a Cybersecurity Incident Response Plan. Develop IT security training for users and … of cyber security Extensive practical experience in managing Microsoft server systems, NGAV, Amazon Cloud services, AD, ADFS, M365, security, public clouds, Azure services, SIEM, vulnerabilityassessment, patch management, DLP, and endpoint protection. Substantial proven expertise in supporting large corporate systems and applications within a large enterprise networked environment. more »
Employment Type: Permanent
Salary: £54421 - £61228/annum £54,000 - 61,000 per annum
Hatfield, Hertfordshire, South East, United Kingdom Hybrid / WFH Options
Hays
but not be limited to): Perform comprehensive security control reviews and collaborate with external experts. Analyse IT security posture, manage OS patches, and conduct vulnerability scans; advise on risk mitigation. Investigate security breaches, preserve evidence, and maintain a Cybersecurity Incident Response Plan. Develop IT security training for users and … of cyber security Extensive practical experience in managing Microsoft server systems, NGAV, Amazon Cloud services, AD, ADFS, M365, security, public clouds, Azure services, SIEM, vulnerabilityassessment, patch management, DLP, and endpoint protection. Substantial proven expertise in supporting large corporate systems and applications within a large enterprise networked environment. more »
Hatfield, Hertfordshire, United Kingdom Hybrid / WFH Options
Reed Technology
monitoring of security systems for potential threats and efficient incident management. - Establishing technical standards aligned with corporate security policies and regulatory compliance. - Conducting thorough vulnerability assessments and driving effective remediation strategies. - Engaging in security architecture reviews to identify and rectify gaps. - Playing an active role in the Change Advisory more »
Hatfield, Hertfordshire, South East, United Kingdom Hybrid / WFH Options
Reed Technology
monitoring of security systems for potential threats and efficient incident management. - Establishing technical standards aligned with corporate security policies and regulatory compliance. - Conducting thorough vulnerability assessments and driving effective remediation strategies. - Engaging in security architecture reviews to identify and rectify gaps. - Playing an active role in the Change Advisory more »
analyse root causes, and implement necessary remediation actions. - Develop and maintain incident response procedures to ensure timely and effective handling of security breaches. 2. Vulnerability Management: - Conduct regular vulnerability assessments and penetration tests to identify weaknesses in our systems and infrastructure. - Collaborate with system administrators and developers to more »
Weymouth, England, United Kingdom Hybrid / WFH Options
Cogito
and fine tune existing network & security infrastructure: Endpoint Security, Next Generation Firewall, encryption, email and network proxy gateways, Microsoft 365, DLP etc. comprehensive reports, assessment-based findings, outcomes, and propositions for further system security enhancement. relevant projects, initiatives, and security activities such as the security awareness program and security … emerging technologies. Good problem solving and analytical skills. in security architecture, security solution, security project implementation, security operation, security education, network penetration testing, application vulnerability assessments, risk analysis and compliance testing. driven, with a continuous improvement mind-set acumen. A proven track record as an Information Security Analyst, contributing more »
Experience: Bonus points if you have experience with: Experience creating deployment pipelines with ArgoCD Technical exposure to Containerization, Kubernetes, Helm, Kibana, Elasticsearch, Grafana Security vulnerabilityassessment and resolution The Benefits: Joining our team comes with a host of benefits, including: Flexible working arrangements (fully remote or flexible hybrid more »
GitLab and Jenkins to automate the deployment process, ensuring efficient and reliable releases. Ensure the security of systems and applications through best practices, regular vulnerability assessments, and compliance with industry standards. Use tools to manage server configurations and ensure consistency across environments. Create and maintain comprehensive documentation related to more »
City & Guilds. In this role you will lead and act as subject matter expert for computer and network threat intelligence, incident responses, investigations and vulnerability assessments that pertain to different types of cyber threats, including malware, data theft, denial of service, and data breaches. You will collaborate with a … infrastructure and systems. You will have extensive experience of technologies including but not limited to Firewalls, IPS & IDS, Active Directory, Windows Server, Linux, AWS, Vulnerability management and SIEM, DRM. We would expect you to have a familiarity with industry security standards such as NIST, Cyber Essentials, ISO27001 and GDPR. more »
discuss the clients needs. SKILLS: 1 year+ commercial experience as a penetration tester or similar Experience with Red Teaming exercises such as simulated attacks Vulnerability Assessments and Scans Infrastructure and Web Applications Stakeholder experience Team player and good collaborator Good communication skills Salary: £(phone number removed) This is a more »
SE1, Blackfriars, Greater London, United Kingdom Hybrid / WFH Options
Profile 29
upgrades. Implement and maintain backup and recovery strategies for Servers. Implement and enforce security measures to safeguard server infrastructure. Conduct regular security audits and vulnerability assessments. Ensure compliance with industry regulations and best practices. Other stuff; £’s: flexible – in the region of £300 per day (direct contract between you more »
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
ensure that our cloud infrastructure is secure and compliant with industry standards and regulations. You will also monitor and respond to security incidents, perform vulnerability assessments and penetration testing, and develop and maintain security policies and procedures. Responsibilities: Support the LCST Security Working Groups which require close co-operation … AWS architecture best practices and best-in-class security standards Review relevant Cyber Risk alerts/notifications and MODCERT notices, assess impact on and vulnerability of our solution, define actions to take and work with the technical teams to design, and implement mitigating solutions within required timeframes Duties may … monitoring and operating intrusion detection systems Act as IS focal point for cyber incidents and lead IS response to security incidents and alerts Conduct vulnerability assessments and support penetration testing. Develop and maintain security policies and procedures Collaborate with development and operations teams to ensure security best practices are more »
Greater London, England, United Kingdom Hybrid / WFH Options
Franklin Fitch
are looking for an enthusiastic and innovative IT Security Engineer. Security Engineer main responsibilities will include, but are not necessarily limited to, the following: Vulnerability Management o Take lead on the daily vulnerability management activities, including but not limited to application vulnerability and infrastructure vulnerability assessments. … Manage prioritisation of vulnerabilities through a risk-based approach, to meet patch management policies, regulatory compliance, and audit findings. o Management and configuration of vulnerability management tools (Microsoft Azure and Qualys) o Support the InfoSec function in proactively identifying and leveraging threat intelligence sources to inform strategic vulnerabilitymore »
and build resilient Cloud infrastructures that are protected against security threats Develop and assess Cloud security solutions to secure systems, databases and networks Conduct assessment and make recommendations to ensure that appropriate controls are in place Gain insight into security incidents and threats by monitoring/analyzing logs and … performing vulnerability assessments Participate in efforts that shape the company’s security policies, procedures and standards for use in Cloud environments Create technical and managerial level security reports for Cloud-based applications and infrastructure Implement and tests network and security Disaster Recovery procedures to ensure business continuity Monitor use more »
Cardiff, Wales, United Kingdom Hybrid / WFH Options
Intaso
Interviews available immediately Intaso’s long standing client are seeking a dynamic individual to join their Security Operations team as the Security Vulnerability Manager, a pivotal role within their organization. This position will focus on identifying, monitoring, analysing, and facilitating the remediation of vulnerabilities across their systems. Key Responsibilities … Develop and document a comprehensive vulnerability management strategy aligned with stakeholder and business need Create intuitive reporting and dashboarding mechanisms to convey threat and risk profiles associated with vulnerabilities to stakeholders Ensure regular vulnerability scans cover all IT and OT assets, maintaining up-to-date coverage. Collaborate with … IT and OT asset owners to execute vulnerability and compliance scans in a controlled manner. Partner with both technical and non-technical stakeholders to devise effective mitigation plans for identified vulnerabilities. Lead cross-functional teams in responding to high-risk or complex vulnerabilities, leveraging technical expertise. Stay informed about more »
Cardiff, Wales, United Kingdom Hybrid / WFH Options
Persistent Systems
the work with the offshore team. Candidate should have effective communication skills with excellent customer handling capabilities. Experience required: 1. Experience on Infrastructure & Application Vulnerability Assessments and Management. Validate and triage identified vulnerabilities. 2. Experience in vulnerability remediation. 3. Hands-on experience on SAST, DAST, SCA, Container scanning … issues. 10. Web application firewall Administration and management 11. Able to work on Azure Devops Pipeline. Benefits: Focused on talent development with quarterly assessment cycles and company-sponsored certifications. Working with cutting-edge technologies. Engagement initiatives such as project parties, flexible work hours, Persistent Business Run. Private medical and more »
implement security design standards and frameworks Collaborate with engineering and product teams to incorporate security considerations into product design and development Conduct threat modelling, vulnerability assessments, and security code reviews to identify potential security issues Develop and maintain a secure software development lifecycle (SDLC) to ensure security is integrated … at every stage Educate and train engineering and product teams on security awareness and best practices Experience with threat modelling, risk assessment, and the development of mitigation strategies The Senior Product Security Engineer is a high-profile role with significant business and technology engagement. This a hybrid working role more »