Permanent Vulnerability Management Jobs

76 to 100 of 140 Permanent Vulnerability Management Jobs

Infrastructure security engineer

London Area, United Kingdom
Lorien
includes the provision of escalation security support to the Service Desk, Desktop Support, participation in Infrastructure Security projects and being responsible for Information Security Management System (ISMS) maintenance. Key Responsibilities/Accountabilities Taking responsibility for leading, guiding, supporting and delivering secure architectural design for the group cyber security maturity … or multiple offices location in order to complete your tasks for off the network countries. Knowledge and Experience Experience in Azure cloud and identity management solutions. Specific focus on network equipment. Palo Alto Firewall, Imperva WAF and NAC experience Netskope proxy and CASB experience Microsoft Defender and Crowdstrike experience … SSO & MFA gateway Data loss prevention tools experience Azure security centre and Wiz io experience Cymulate and Ping Castel experience SCCM or enterprise patch management tools TenableOne or enterprise vulnerability management tools Sound knowledge of industry best practices such as OWASP, Cyber security framework and NCSC guidance more »
Posted:

Enterprise Security Architect

Glasgow, Scotland, United Kingdom
NextTech Recruitment
in projects and operations Work with technical teams baseline security configuration standards for operating systems (e.g., OS hardening), network segmentation and identity and access management (IAM) Work with technical teams develops standards and practices for data encryption and tokenization Draft security procedures and standards to be reviewed and approved … by executive management and/or formally authorised by the chief information security officer (CISO) Threat modelling of services and applications that tie to the risk and data associated with the service or application Key Qualifications: Vast experience in leading/mentoring teams in “secure by design” including a … strong working knowledge of the methodologies to conduct threat-modeling exercises on new applications and services, identity management, as well as securing CI/CD pipelines. Direct, hands-on experience or a solid working knowledge of relevant security patterns, vulnerability management tools, securing public cloud applications. Full more »
Posted:

Security Operations Center Analyst

Doncaster, England, United Kingdom
Cloud Decisions
Provide analytical support to other SOC team members during security incidents and Threat Mining engagements. Assistance with onboarding process - deployment of SIEM, EDR and Vulnerability Management tools Direct communication with customers on threats and alerts Providing customers with reports and presenting findings Assistance with active directory administration. Assistance more »
Posted:

Cyber Security Lead

City Of Bristol, England, United Kingdom
Hybrid / WFH Options
E-Resourcing Ltd - Specialist I.T. Recruitment
on. Key Responsibilities: You will be responsible for defining, developing and maintaining the cyber security strategy across the organisation. You will monitor threats from vulnerability managements tools and support the design, implementation and management of any SIEM tools. You will promote a level of cyber security culture and … practice in relation to Cyber Security Around 7+ years of experience working in Security Engineering Strong knowledge of security tooling and technologies including SIEM, vulnerability management, DLP etc Experience of working in environments using ISO27001 or Cyber Essentials Plus Good knowledge of cloud platforms – AWS and Azure Good more »
Posted:

Senior Systems Administrator

Annapolis Junction, Maryland, United States
Leidos
/she will be responsible for ensuring server and desktop configurations are optimized and running continuously and efficiently. The individual will also perform security management and application performance optimization functions. Additional responsibilities may include: Administration/sustainment of a system that provides a web-based application for storing, sharing … and distributing information. Creating and maintaining complex server enclaves, including analyzing system scanning reports, patching, cert renewals, vulnerability management assessments, and active directory configurations. Identifying and correcting hardware and software issues. Responding to system administration, operations, and maintenance problems and developing re-work solutions. Creating and maintaining documentation … accurate information is readily available for incident resolution. Communicating with users and external support personnel regarding system outages and upgrades and conferring with upper management regarding recommended resolution options. Security Clearance Requirement: All candidates must possess an active TS/SCI with polygraph security clearance to be considered for more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Vulnerability Analyst

England, United Kingdom
Strativ Group
Our client, a critical national infrastructure organisation in the energy sector, are looking for Vulnerability Management Analysts to join their Security Team and lead the charge in building a robust cyber testing team to fortify their national infrastructure. As a vital member of our team, you will: Conduct … regular vulnerability assessments, utilising cutting-edge tools and techniques, to identify vulnerabilities in their systems and networks. Manage the entire lifecycle of vulnerabilities, from discovery to remediation, ensuring prompt and effective resolution. Analyse risks associated with identified vulnerabilities and collaborate with stakeholders to develop comprehensive remediation plans. Work closely … with IT teams to ensure timely application of security patches and updates. Generate detailed vulnerability assessment reports to communicate status and recommendations to management. Foster a culture of security awareness by providing guidance and training to employees. Essential skills and qualifications: Strong analytical and investigative skills. Knowledge of cybersecurity more »
Posted:

Information Systems Security Officer

Colorado Springs, Colorado, United States
Leidos
TF2200 program. Primary Responsibilities: The ISSO's primary duties will consist of: Responsible for meeting both regulatory and non-regulatory compliance demands. Responsible for management and enforcement of information security policies, conducting security and risk assessments using security frameworks (e.g., NIST, RMF, Common Criteria, etc.), mitigating risk via security … controls, vulnerability management (scanning, assessment, reporting, and mitigation verification). Responsible for the protection of information and maintain security controls for TF2200 systems in order to reduce risk. Support IA continuous monitoring tasks (auditing, security patching, scanning) to ensure compliance with security policies and procedures. Respond to and … of TF2200 systems as required. Assist with maintaining the security posture of TF2200 systems by performing regular cybersecurity updates to systems. Support the Risk Management Framework (RMF) authorization process to include developing and maintaining artifacts for the IS Body of Evidence (BoE). Perform in-office IT tasks as more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Information Systems Security Officer

Aurora, Colorado, United States
Leidos
TF2200 program. Primary Responsibilities: The ISSO's primary duties will consist of: Responsible for meeting both regulatory and non-regulatory compliance demands. Responsible for management and enforcement of information security policies, conducting security and risk assessments using security frameworks (e.g., NIST, RMF, Common Criteria, etc.), mitigating risk via security … controls, vulnerability management (scanning, assessment, reporting, and mitigation verification). Responsible for the protection of information and maintain security controls for TF2200 systems in order to reduce risk. Support IA continuous monitoring tasks (auditing, security patching, scanning) to ensure compliance with security policies and procedures. Respond to and … of TF2200 systems as required. Assist with maintaining the security posture of TF2200 systems by performing regular cybersecurity updates to systems. Support the Risk Management Framework (RMF) authorization process to include developing and maintaining artifacts for the IS Body of Evidence (BoE). Perform in-office IT tasks as more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Information Systems Security Officer

Denver, Colorado, United States
Leidos
TF2200 program. Primary Responsibilities: The ISSO's primary duties will consist of: Responsible for meeting both regulatory and non-regulatory compliance demands. Responsible for management and enforcement of information security policies, conducting security and risk assessments using security frameworks (e.g., NIST, RMF, Common Criteria, etc.), mitigating risk via security … controls, vulnerability management (scanning, assessment, reporting, and mitigation verification). Responsible for the protection of information and maintain security controls for TF2200 systems in order to reduce risk. Support IA continuous monitoring tasks (auditing, security patching, scanning) to ensure compliance with security policies and procedures. Respond to and … of TF2200 systems as required. Assist with maintaining the security posture of TF2200 systems by performing regular cybersecurity updates to systems. Support the Risk Management Framework (RMF) authorization process to include developing and maintaining artifacts for the IS Body of Evidence (BoE). Perform in-office IT tasks as more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security Manager

London Area, United Kingdom
Harrington Starr
programme to reduce the bank’s cyber threat landscape and ensure robust "Business As Usual" cyber assurance processes. Key Responsibilities: Cyber Test and Validation Management: Oversee the Cyber Test and Validation process, support Cyber Risk Assessment, and drive the Cyber Assurance programme across the bank. Security Engineering Advice: Advise … regulations not directly supported by our global framework. Security Control Implementation: Work with technology infrastructure teams to implement security controls across various platforms. Incident Management: Investigate, coordinate, and address Information and Cybersecurity incidents, including forensic evidence collection and security event investigation. Incident Analysis and Communication: Analyze infrastructure security incidents … convey technical analysis to management, and act as a liaison during security investigations. Regulatory Response: Respond to regulatory requests, manage engagements with regulators, and coordinate compliance-related investigations. Preferred Qualifications and Experience: Experience: A strong background in Cybersecurity, Systems, Infrastructure, Network, and Cloud. Technical Skills: Proficient in applications deployments more »
Posted:

Infrastructure Engineer - Identity and Access Management

Manchester, North West, United Kingdom
Hybrid / WFH Options
DWP Digital
within one of Europe's largest deployments of directory services and hybrid cloud environment? We are looking for an Infrastructure Engineer specialising in Identity management to join our dynamic team. As an Identity Infrastructure engineer, you will play a pivotal role in ensuring integrity, security, and efficiency of DWPs … Modern Authentication (MFA, WHfB), Entra ID Connect, and Single Sign-On technologies such as ADFS. The team provides support for a custom-built Identity Management platform that integrates seamlessly with ServiceNow, along with enterprise security systems such as Active Directory. What skills, knowledge and experience will you need? Experience … Entra ID eg. Enterprise Applications Knowledge in scripting languages for automation eg. PowerShell, Bash, Azure CLI Experience of implementing and working with Privileged Access Management systems and RBAC eg. Azure Privileged Identity (PIM) Management or CyberArk PAM Knowledge and experience of Windows Server Security, Monitoring and Vulnerability more »
Employment Type: Permanent, Work From Home
Salary: £45,000
Posted:

Infrastructure Engineer - Identity and Access Management

Leeds, West Yorkshire, Yorkshire, United Kingdom
Hybrid / WFH Options
DWP Digital
within one of Europe's largest deployments of directory services and hybrid cloud environment? We are looking for an Infrastructure Engineer specialising in Identity management to join our dynamic team. As an Identity Infrastructure engineer, you will play a pivotal role in ensuring integrity, security, and efficiency of DWPs … Modern Authentication (MFA, WHfB), Entra ID Connect, and Single Sign-On technologies such as ADFS. The team provides support for a custom-built Identity Management platform that integrates seamlessly with ServiceNow, along with enterprise security systems such as Active Directory. What skills, knowledge and experience will you need? Experience … Entra ID eg. Enterprise Applications Knowledge in scripting languages for automation eg. PowerShell, Bash, Azure CLI Experience of implementing and working with Privileged Access Management systems and RBAC eg. Azure Privileged Identity (PIM) Management or CyberArk PAM Knowledge and experience of Windows Server Security, Monitoring and Vulnerability more »
Employment Type: Permanent, Work From Home
Salary: £45,000
Posted:

Infrastructure Engineer - Identity and Access Management

Blackpool, Lancashire, North West, United Kingdom
Hybrid / WFH Options
DWP Digital
within one of Europe's largest deployments of directory services and hybrid cloud environment? We are looking for an Infrastructure Engineer specialising in Identity management to join our dynamic team. As an Identity Infrastructure engineer, you will play a pivotal role in ensuring integrity, security, and efficiency of DWPs … Modern Authentication (MFA, WHfB), Entra ID Connect, and Single Sign-On technologies such as ADFS. The team provides support for a custom-built Identity Management platform that integrates seamlessly with ServiceNow, along with enterprise security systems such as Active Directory. What skills, knowledge and experience will you need? Experience … Entra ID eg. Enterprise Applications Knowledge in scripting languages for automation eg. PowerShell, Bash, Azure CLI Experience of implementing and working with Privileged Access Management systems and RBAC eg. Azure Privileged Identity (PIM) Management or CyberArk PAM Knowledge and experience of Windows Server Security, Monitoring and Vulnerability more »
Employment Type: Permanent, Work From Home
Salary: £45,000
Posted:

Infrastructure Engineer - Identity and Access Management

Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom
Hybrid / WFH Options
DWP Digital
within one of Europe's largest deployments of directory services and hybrid cloud environment? We are looking for an Infrastructure Engineer specialising in Identity management to join our dynamic team. As an Identity Infrastructure engineer, you will play a pivotal role in ensuring integrity, security, and efficiency of DWPs … Modern Authentication (MFA, WHfB), Entra ID Connect, and Single Sign-On technologies such as ADFS. The team provides support for a custom-built Identity Management platform that integrates seamlessly with ServiceNow, along with enterprise security systems such as Active Directory. What skills, knowledge and experience will you need? Experience … Entra ID eg. Enterprise Applications Knowledge in scripting languages for automation eg. PowerShell, Bash, Azure CLI Experience of implementing and working with Privileged Access Management systems and RBAC eg. Azure Privileged Identity (PIM) Management or CyberArk PAM Knowledge and experience of Windows Server Security, Monitoring and Vulnerability more »
Employment Type: Permanent, Work From Home
Salary: £45,000
Posted:

Cyber Security Manager

Maidstone, Kent, South East, United Kingdom
Pearson Whiffin Recruitment Ltd
organisations assets and information. Role & Responsibilities: To act as a trusted advisor on information security matters. Oversee, manage , and maintain the companys information security management system and associated security certifications ( currently ISO 27001 and Cyber Essentials Plus in the UK) Support internal business teams with client and 3rd party … business. Manage and lead on security events and incidents reported or highlighted through internal processes and controls. Organise and support internal and external audits, vulnerability management processes, penetration testing and business continuity/disaster recovery planning. Contribute towards the annual budget and forecasting process for Infosec related items. … and communicate this appropriately to your audience. The ability to embrace and encourage change and provide continual improvement. Implementation of and/or ongoing management of security policies and associated documentation. A pragmatic view of information security and its relationship with the wider business objectives. A willingness to self more »
Employment Type: Permanent
Posted:

2nd Line Engineer

SW9, Oval, Greater London, United Kingdom
Hybrid / WFH Options
Integral Recruitment Ltd
and small projects Backup maintenance Configuration of standard mail and messaging clients including Outlook Installation, configuration, troubleshooting and customisation of Office 365 Installation and management of Microsoft SharePoint and SharePoint permission management Understanding of and ability to install, configure and test workstation hardware including video cards, NICs, sound … configuring network devices and implementing network security measures. Knowledge and understanding of security principles, best practices and compliance requirements, including security protocols, access controls, vulnerability management and implementing security measures to protect systems and data. Experience with anti-virus products (Sophos/Heimdal etc.). Experience with Cisco more »
Employment Type: Permanent
Salary: £34000 - £38000/annum
Posted:

SOC Engineer

Doncaster, South Yorkshire, Yorkshire, United Kingdom
Hybrid / WFH Options
Cloud Decisions
SOC Engineer you'll work handling both reactive and proactive security engagements. Your responsibilities will include: ?Protective Monitoring: Utilize industry-leading Security Information & Event Management (SIEM) and Intrusion Detection Systems (IDS) to monitor and detect threats. Provide advice and guidance to clients targeted by cyber attacks and malicious activity. … and alerts. Prepare and present findings to clients. ?Technical Assistance: Assist with the onboarding process, including deploying SIEM, Endpoint Detection and Response (EDR), and Vulnerability Management tools. Provide support for active directory administration and firewall management. Key Skills and Traits Needed: Must be eligible for SC Clearance Excellent more »
Employment Type: Permanent, Work From Home
Salary: £30,000
Posted:

SOC Engineer

Leeds, West Yorkshire, Yorkshire, United Kingdom
Hybrid / WFH Options
Cloud Decisions
SOC Engineer you'll work handling both reactive and proactive security engagements. Your responsibilities will include: ?Protective Monitoring: Utilize industry-leading Security Information & Event Management (SIEM) and Intrusion Detection Systems (IDS) to monitor and detect threats. Provide advice and guidance to clients targeted by cyber attacks and malicious activity. … and alerts. Prepare and present findings to clients. ?Technical Assistance: Assist with the onboarding process, including deploying SIEM, Endpoint Detection and Response (EDR), and Vulnerability Management tools. Provide support for active directory administration and firewall management. Key Skills and Traits Needed: Must be eligible for SC Clearance Excellent more »
Employment Type: Permanent, Work From Home
Salary: £30,000
Posted:

SOC Engineer

Sheffield, South Yorkshire, Yorkshire, United Kingdom
Hybrid / WFH Options
Cloud Decisions
SOC Engineer you'll work handling both reactive and proactive security engagements. Your responsibilities will include: ?Protective Monitoring: Utilize industry-leading Security Information & Event Management (SIEM) and Intrusion Detection Systems (IDS) to monitor and detect threats. Provide advice and guidance to clients targeted by cyber attacks and malicious activity. … and alerts. Prepare and present findings to clients. ?Technical Assistance: Assist with the onboarding process, including deploying SIEM, Endpoint Detection and Response (EDR), and Vulnerability Management tools. Provide support for active directory administration and firewall management. Key Skills and Traits Needed: Must be eligible for SC Clearance Excellent more »
Employment Type: Permanent, Work From Home
Salary: £30,000
Posted:

Information Security Manager

Mansfield, England, United Kingdom
Emberleigh
security posture. Playing a pivotal role in minimising risks & protecting assets. Here’s a taste of what the role will involve: Collaborating with senior management to develop and refine the organisation’s information security strategy, aligning it with business objectives and regulatory requirements. Developing, implementing, and maintaining information & data … as the company subject-matter expert for all security-related matters and develop campaigns/strategies to improve security posture. Manage technical risks via vulnerability management oversight & gap analysis, whilst also overseeing DLP alerts and creating reports. Develop and generate metrics & dashboards for senior management review. What more »
Posted:

Cyber Security Technical Lead

Peterhead, Aberdeenshire, Scotland, United Kingdom
PIVT Group Ltd
on Operational Technology. This will range from complex gas terminals to simpler Above Ground Installations. Cyber data checks and updates to the Cyber Asset Management system. Ensure we have the correct asset management data is key to cyber risk management. This shall include network drawing assurance. Support the … across the Operational Technology. This reduces the risk from unauthorised access to our assets. Upgrade configurable devices as directed by security in line with vulnerability management requirements. An example could be upgrading an operating system on an industrial PC to an approved version. Where assets have been approved more »
Employment Type: Permanent
Salary: £45,000
Posted:

Cyber Security Lead

Greater Bristol Area, United Kingdom
Peaple Talent
Security Experience of working in environments using ISO27001 or Cyber Essentials Plus would be beneficial Strong knowledge of security tooling and technologies including SIEM, vulnerability management, DLP etc Good knowledge and understanding of public Cloud platforms (e.g. AWS and Azure) Good understanding of the current threat landscape Excellent more »
Posted:

Security Operations Specialist

Glasgow, Scotland, United Kingdom
Hybrid / WFH Options
Nine Twenty Recruitment
and related technologies. Familiarity with networking and network infrastructure. Experienced in designing, implementing, and managing Security services such as SIEM, Endpoint protection, EDR, and Vulnerability management platforms. To be considered for this position, please apply today or contact Sophie on snorton@weareninetwenty.com more »
Posted:

Senior Cyber Security Operations Analyst

United Kingdom
Milestone Technologies, Inc
on different aspects such as source/destination addresses, usernames, and process names) Demonstrable comprehension of Information Security including malware, emerging threats, attacks, and vulnerability management A sound understanding of TCP/IP and networking concepts Understanding of network design principles with and knowledge of the OSI model. more »
Posted:

Cyber Security IT Analyst

England, United Kingdom
Hybrid / WFH Options
Larbey Evans
latest security principles, techniques, and protocols Detailed technical knowledge related to endpoints, servers, infrastructure and networking technologies Strong experience in supporting security systems, including vulnerability management, SIEM, DLP,SOAR, EDR solution, Network Firewalls etc. Working knowledge of IT processes (i.e., ITIL) including incident, problem, defect, change and release … management The Cyber Security IT Analyst requirements: 3+ years’ experience in Cyber Security IT operations (law firm preferable, professional services advantageous) Bachelor’s degree or higher in Computer Science or Information Security (essential) Advanced ability to organize, prioritize, coordinate, and work as part of a team Excellent written and more »
Posted:
Vulnerability Management
10th Percentile
£40,000
25th Percentile
£50,750
Median
£65,000
75th Percentile
£85,313
90th Percentile
£97,500