Permanent Vulnerability Management Jobs

1 to 25 of 276 Permanent Vulnerability Management Jobs

Senior Offensive Security Researcher

Reading, England, United Kingdom
Hybrid / WFH Options
Oracle
undocumented network protocol or the grammar of a new programming language. Other responsibilities includes as below Scope and execute in-depth security assessments and vulnerability research across a broad range of on-premise software, cloud services and infrastructure Perform in-depth security assessments using results from static and dynamic … achieving long term goals (for example, learning an unfamiliar programming language) Ability to effectively assess and communicate risks and appropriate levels of urgency to management and engineering staff Excellent organizational, presentation, verbal, and written communication skills This role does not require access to a cleared work environment. Security clearances … analysis tools Hands-on experience in one or more of the following with an interest in doing full time research: cybersecurity consulting, security engineering, vulnerability management, risk assessments, bug bounty hunting, malware analysis, forensics OSCP, OSWE certification, or interest in achieving certification Experience navigating and working with extremely more »
Posted:

Senior Security Engineer

London Area, United Kingdom
Hybrid / WFH Options
Xcede
engineer with deep knowledge of security principles in line with the CISSP CBK domains such as security monitoring, intrusion prevention & detection, network security, endpoint management & protection, identity management, threat detection, vulnerability management. Whilst the position entails significant exposure to vendor products and tooling, the incoming engineer should more »
Posted:

Cyber Security Study & Internship

United Kingdom
Oeson | Learning
global team spanning Oceania, Asia, Europe, and the Americas. Roles & Responsibilities: - Build a safe and secure system and gain knowledge of the principles of vulnerability assessment and reconnaissance to protect your infrastructure and web presence. - Utilize practical exploits and assess how they affect your systems. - Evaluate the risk assessment … and perform threat modeling of a web application architecture. - Create a successful vulnerability management strategy. - Learn how to use online open-source intelligence applications for passive reconnaissance. - Execute footprinting and reconnaissance, a crucial pre-attack part of the ethical hacking process using the most recent methods and technologies. more »
Posted:

DevSecOps Engineer

Greater Bristol Area, United Kingdom
Hybrid / WFH Options
Ada Meher
software and infrastructure security best practices and implementations. You'll also be pivotal in helping gear toward another successful ISO27001 audit and automating security vulnerability management. You'll need demonstrable experience in a similar DevSecOps role; with experience in AWS, Docker/Kubernetes, and Security implementation. Responsibilities Develop DevSecOps … AWS (Accreditations a huge bonus) Demonstrable level of experience with Cyber Security experience (security concepts, practices, and technologies, such as access control, encryption, and vulnerability management) Experience with software security and development practices and implementations Python, Bash, or PowerShell Security certification such as CISSP, CEH, OSCP We understand more »
Posted:

Information Security Manager

Cambridge, England, United Kingdom
Hybrid / WFH Options
Opus Talent Solutions
Compliance (GRC): Lead the development and implementation of robust information security policies, procedures, and controls to ensure compliance with industry standards and regulations. Risk Management: Identify, assess, and mitigate information security risks across all facets of our business operations, with a focus on safeguarding sensitive data and intellectual property. … Security Operations: Oversee the day-to-day management of security systems and protocols, including incident response, threat detection, and vulnerability management. Security Awareness: Develop and deliver comprehensive training programs to promote a culture of security awareness and best practices among employees. Vendor Management: Collaborate with third-party … compliance readiness. Qualifications: Bachelor’s degree in information security, Computer Science, or related field (Master's degree preferred). Proven experience in information security management, preferably within the pharmaceutical or healthcare industry. In-depth knowledge of relevant regulatory frameworks, such as ISO, GDPR, HIPAA, and FDA regulations. Strong understanding more »
Posted:

🌳🌳🌳Head of Information Security Operations – CONTRACT – 6-12 Months – Urgent – Reading/Thames Valley🌳🌳🌳

Reading, England, United Kingdom
Hybrid / WFH Options
Areti Group
the confidentiality, integrity and availability of information systems are maintained to protect customer, corporate and 3rd party data. You will have responsibility for the management of the CERT function as well as responsibility for the management of the SEIM and SOC partners. Responsibilities Creation and maintenance of Information … Security processes and procedures to support business policies and operations. Provide leadership and management of Information Security Operational teams to ensure efficient and effective, proactive and reactive security monitoring and defense across information assets. Ensure regular KPIs are developed and maintained and identify areas for improvement and make recommendations … is maintained and in-line with compliance and regulation. Act as an escalation point for Information Security Incidents, changes and problems. Responsibility for IDAM management and control. Production of Risk Landscape documentation in conjunction with the Information Security Risk functions and other colleagues. Experience 🌳Minimum 5+ years commercial experience more »
Posted:

Cyber Security Consultant

Reading, England, United Kingdom
Project People
customer trust in a reliable network which matches the best, whilst ensuring compliance to regulatory requirements, company policy and standards. Experience with information security management frameworks (NIST, PCI, GDPR, ISO, OWASP, ITIL, ISF SoGP, COBIT) is essential. The role will involve supporting project managers in risk and issue management … templates is vital. Expertise and experience in technical domains ie hybrid security, infrastructure and data centre security, network security, application security, identity and access management, and vulnerability management are important. Experience of influencing and negotiating technical outcomes with third parties, including conflict resolution due to changing priorities. … the clients they are supporting or projects they are deliverable in the UK. The role will involve supporting project managers in risk and issue management Creation, review, and approval of documentation such as requirements, architecture, design, and test artifacts. Experience in documenting and implementing processes, procedures, and architecture/ more »
Posted:

Information Technology Security Manager

Birmingham, England, United Kingdom
Hybrid / WFH Options
Crimson
business objectives and security needs to identify issues and establish priorities for both internal and external delivery teams. Key skills and responsibilities, IT Security Management experience the Security Operations pillar, devising and implementing requirements, techniques, and resources to enhance value and mitigate risks across proactive monitoring, incident response, threat … management, and vulnerability management, among other areas. the development and upkeep of Security Operations policies, standards, procedures, and documentation, including playbooks and guidelines. the implementation and adherence to security operations procedures, assessing real and potential security breaches, and ensuring thorough investigation and resolution. with IT Service Frameworks more »
Posted:

Enterprise Solutions Architect

Glasgow, Scotland, United Kingdom
Net Talent
capabilities across projects and operations. Collaborates with technical teams to establish baseline security configuration standards for operating systems, network segmentation, and identity and access management (IAM). Works closely with technical teams to define standards and procedures for data encryption and tokenisation, aligning with the organisation's data classification … criteria. Drafts security procedures and standards for review and approval by executive management and/or formal authorization by the CISO. Monitors developments and shifts in the digital business and threat landscapes to ensure alignment with security strategy plans and architecture artifacts. Facilitates or conducts threat modelling exercises for … principles, with a deep understanding of methodologies for conducting threat-modelling exercises on new applications and services, as well as proficient knowledge in identity management and securing CI/CD pipelines. Direct, hands-on experience or robust working knowledge of pertinent security patterns, vulnerability management tools, and more »
Posted:

Senior Security Engineer - Greenfield - Buy side

London Area, United Kingdom
Vertus Partners
robust controls. Requirements: Deep understanding of security engineering and implementing security controls Hands on experience of SecOps and security systems Understanding of threat detection, Vulnerability management Cloud & network security Scripting experience - Preferably Python Ability to lead projects and resolve complex issues Please note you will need to travel more »
Posted:

IT Operations Lead - Bedford - £75K

Central Bedfordshire, England, United Kingdom
Hybrid / WFH Options
Intellect Group
Administration: Manage Microsoft 365 services, including Exchange Online, SharePoint, Teams, and Viva. Uphold data security and compliance standards within the Microsoft 365 environment. *** Infrastructure Management: Strategize, deploy, and oversee cloud infrastructure to ensure optimal performance, scalability, security, and cost efficiency. Develop and maintain cloud network architecture to guarantee high … availability, reliability, and security. Implement cost management strategies to optimize expenditure. *** Security and Compliance Management: Implement and manage security tools and services. Collaborate with compliance teams to uphold and audit IT security policies and procedures. Utilize security tools to monitor and enforce compliance with GDPR, ISO27001, SEC, REC … and other industry-specific regulations. *** Third-Party SaaS Management: Assess, integrate, and maintain third-party SaaS tools to enhance productivity and efficiency. Monitor tool performance and cost-effectiveness. *** Vulnerability and Penetration Test Analysis: Analyse vulnerability and penetration test findings to identify potential security vulnerabilities across cloud infrastructure more »
Posted:

Infrastructure Engineer

Telford, England, United Kingdom
Searchstone Ltd
Network. Taking a security first approach, completing internal procedures and assisting or leading response to incidents. Backup environment including monitoring and capacity. Patch and Vulnerability management of environment. Microsoft Exchange messaging environment. Technical Skills Required: Microsoft Server support and administration Microsoft Azure support and administration Virtualisation - Hyper-V … standalone and clusters Mobile Device Management – Endpoint Central and SOTI MobiControl Microsoft Active Directory support and administration Group policy administration, PowerShell and scripting TCP/IP Networking (DNS, DHCP, LAN, WAN, VLAN, Firewalls, etc.), support, and administration. E-Mail Security - Mimecast MS Office 365 - configuration, and administration. Office Apps more »
Posted:

Vulnerability Analyst

Leeds, England, United Kingdom
Cynexa
Vulnerability Analyst £55,000 Leeds Are you passionate about cybersecurity and ready to make an impact? Join my clients team in Leeds as a Vulnerability Analyst and play a crucial role in fortifying their defences against evolving threats. You will bride the communication gap between technical teams and … senior leadership, ensuring that security protocols remain effective and aligned with business objectives. To succeed in this role, you'll need strong experience in vulnerability analysis or a related role. You must be able to show proficiency in vulnerability scanning tools and technologies, as well as a solid … excellent communication skills to convey technical information to non-technical audiences. Offensive security certifications are a definite plus. This is your chance to expand vulnerability management across new horizons within their business, ensuring that security is not just integrated but ingrained in every facet. Don't miss out more »
Posted:

Security Operations Engineer

Belfast, Northern Ireland, United Kingdom
Hybrid / WFH Options
Idox plc
best practice, quality assurance and governance, as appropriate for each project. The SecOps Engineer will take a proactive approach to security matters and risk management, leading investigations, root cause analysis and vulnerabilities under the guidance of the cloud architecture team. There may be an opportunity to develop a management … Kubernetes clusters, Docker containers, S3 buckets, and RDS databases. Respond promptly to security incidents and conduct thorough post-incident analysis to prevent future occurrences. Vulnerability Management: Conduct regular vulnerability assessments and penetration testing on AWS resources, identifying and remediating vulnerabilities in a timely manner. Implement and manage … automated scanning tools to ensure continuous security monitoring. Secure Configuration Management: Establish and enforce secure configuration standards for EC2 instances, Kubernetes clusters, Docker containers, S3 buckets, and RDS databases. Automate configuration management processes using infrastructure-as-code tools (Terraform). Security Compliance: Ensure AWS infrastructure and applications comply more »
Posted:

Vulnerability Management & Risk Specialist

Greater London, England, United Kingdom
Locke and McCloud
Vulnerability Management & Risk Specialist – London hybrid - £70,000 - £80,000 + Benefits Locke & McCloud are looking for an experienced Vulnerability Management Risk Specialist to join our clients growing Cyber Security function. In this role you will work with our clients various vendors and 3rd party suppliers … to manage security risks internally and externally, in addition to participating in incident response and vulnerability management activities. We are looking for people who have a strong background in managing risks with vendors, incident response, vulnerability management, and stakeholder management. Main Responsibilities: Collaborate across various teams … to establish and maintain an effective vulnerability management program. Identify, prioritise, and assess vulnerabilities across our clients infrastructure, systems, and applications. Develop and implement strategies to mitigate risks associated with identified vulnerabilities. Coordinate with vendors to assess and manage risks associated with third-party products and services. Lead more »
Posted:

Senior Security Engineer - Onsite - £100K

London Area, United Kingdom
Oliver Bernard
and security assurance testing, as well as configuring and fine tuning cyber security tools and solutions including preventative and detective measures for example firewalls, vulnerability management tools, and EDR. Skills You will have worked as a Cyber Security Engineer or in a similar position. You will have experience … in a broad variety of technology including AWS, Microsoft 365, internet protections, vulnerability management, SIEM, EDR. Experience securing on premises infrastructure and cloud services. Experience working with Systems Engineering teams, DevSecOps, CI/CD Senior Security Engineer - Onsite - £100K more »
Posted:

Lead/Director - Security Operations - Hedge Fund

London Area, United Kingdom
Selby Jennings
from an adversary's perspective. Hands-on experience with security operations processes and systems, encompassing security monitoring, intrusion prevention and detection, network security, endpoint management and protection, identity management, threat detection, and vulnerability management. Ability to identify threats in distributed environments and effectively respond to them. Programming more »
Posted:

Cyber Security Operations Analyst

London Area, United Kingdom
Cynexa
Security+, AWS Security or MA Azure Security and ideally CISSP. You will be responsible for: Security Monitoring and Incident Response Threat Intelligence Security Infrastructure Management Documentation and Reporting Candidates who can show hands on experience with security tools across SIEM/EDR and vulnerability Management will be more »
Posted:

IT Support Engineer

Kettering, Northamptonshire, United Kingdom
Clinch
to agreed service levels, compliance requirements in line with business needs. Supports shift left initiative – providing supporting documentation for L1 services Provides proactive problem management and engages in continuous improvement. Manages 3rd party warranty contracts and relationships for all end user IT equipment ensuring all incidents be logged with … OKTA, Multi-Factor Authentication Active Directory Services, Group Policy Manager, Enterprise printing and Enterprise Telephony Corporate Security Administration Obligations including AV, VPN, Rapid 7 Vulnerability Mgmt. Mobile device Technologies, Management and encryption, Mobile Iron DESIRABLE ITIL SCRUM RELEVANT CAREER HISTORY/EXPERIENCE NECESSARY TO FULFILL THE JOB ROLE … Demonstrable experience with enterprise class software solutions. DESIRABLE Relevant and most recent professional IT certification is desirable, though not critical. COMPETENCIES (RELATING TO PERFORMANCE MANAGEMENT SCHEME COMPETENCY MODEL) Customer Obsession : With an intense focus on our customers, we will do what is in our power to establish and maintain more »
Posted:

Cyber Security Vulnerability and Threat Engineer

Greater Cheshire West and Chester Area, United Kingdom
Hybrid / WFH Options
psd group
Job Title: Cyber Security Vulnerability and Threat Engineer Location: Cheshire (Hybrid - 2 days per week on-site) Benefits: (Full list of benefits available on application) psd group are delighted to bring this newly created job opportunity to market, partnered with a truly industry-leading organisation as they embark on … a journey to improve their current Cloud Infrastructure/Cyber Security. We are looking for an experienced Cyber Security Threat and Vulnerability Engineer, to take ownership of identifying signs of compromise in cyber security services, IT systems, and related infrastructure. This will be a hands-on approach to vulnerability management reduction across all IT Systems and you will work with the SOC to assist in the coordination and management of cyber incident response activities. The ideal candidate will have come from a Cloud Infrastructure background, have moved into Cyber Security, and will hold a current/ more »
Posted:

Cyber Security Software Engineer - Zurich, Switzerland

Zürich, Zurich
Hybrid / WFH Options
Noir
Design, CSA, ISO 27001/2, ISO 27017, ISO 27018, or NIST Cyber Security Framework Knowledge and Practical Experience, SIEM (Splunk, MS Sentinel), Log Management, Vulnerability Management, Incident Response, Security Monitoring, Penetration Testing, Linux Security, Threat Intelligence Analysis, Cloud Security Architecture, Network Security Protocols and Technologies, Secure … DevOps Practices, Cryptography and Key Management, Secure Software Development Lifecycle (SDLC), Identity and Access Management (IAM) Solutions, Data Loss Prevention (DLP) Technologies, Incident Response Plan Development and Execution. We have several fantastic new roles for Cyber Security Software Engineer to join an ambitious Financial Investment company. This is … your chance to work with the sharpest minds in private wealth management and financial software development. Our client's latest product release has changed the way people view private wealth management and allowed them to provide their clients with an individualised, scalable asset management framework that is more »
Employment Type: Permanent
Salary: £87,290 - £122,207
Posted:

IT Asset Manager

Bradford, West Yorkshire, Yorkshire, United Kingdom
Yorkshire Water
a key part of how we plan to meet the changing expectations of customers and regulators. Where you fit in: As our IT Asset Management Manager you will Develop and mature the IT Asset Management strategy Design and maintain Asset Management policies, procedures and process Ensure our … systems of record and management are maintained and up to to date Provide standard and ad hoc reporting of software and hardware inventory, equipment inventory and other ad hoc reporting of hardware and software estates Monitor and manage software licenses to ensure they comply with license agreements and useage … software harvesting programme, recovering and redeploying unused licences. What skills & qualifications you will need: Considerable experience working in a leadership role in IT Asset Management Demonstratable background knowledge within licence management and software audit management Good understanding of mega vendors including SAP, Oracle, IBM and Microsoft licencing more »
Employment Type: Permanent
Posted:

Security Operations Engineer

Bristol, Avon, South West, United Kingdom
Foundations Executive Search
as part of a collaborative and innovative team where you will be hands-on with various Security & Infrastructure products including Azure, WAF, Internet protection, Vulnerability management, SIEM, Firewalls, CASB and EDR. Within this role, you will work with the team to engage and technically support in driving performance more »
Employment Type: Permanent
Posted:

Cloud Operations Engineer

Westminster, Colorado, United States
Maxar Technologies
monitoring, alerting, and metrics from log aggregators and data collectors. Provide a collaborative conduit between security focused and development focused teams. Provide configuration and vulnerability management support for production applications and custom code. Minimum Requirements: Must be a U.S. citizen and be willing and able to obtain a … experience may be substituted for a degree. Experience automating, running and maintaining a variety of security tool types (some combination of i.e. monitoring, compliance, vulnerability detection, intrusion detection and prevention, change management and detection, code analysis, etc.) CompTIA Security+ or other DoDD 8140 certification Experience with custom source more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security Assurance Specialist

Birmingham, West Midlands, United Kingdom
Hays
supplier chain security agreements/contracts/questionnaires and manage completion and disengagement. * Lead reviews of governance practices with appropriate and sufficient independence from management activity. * Develop policies, standards, processes, guidelines for ensuring appropriate security standards are in place and are adhered to. * Ensure architectural security principles are applied … and assessments of product security architectures and designs across a diverse range of complex infrastructure, data and application systems. * Ensure timely and robust incident management resolution, including major incident response coordination and management. * Deputise for the Senior IT Security Manager as and when required. Education, Qualifications & Training * Achieved one … more relevant qualification/certification (i.e. CISSP, CISA, CISM Knowledge & Experience * Expert knowledge of security data tools, information security controls, security best practice and management strategies. * Experience of designing control maturity tests and conducting control maturity assessments. * Experience of overseeing and leading remediation of security assessments, technical testing, and more »
Employment Type: Permanent
Salary: £60,000
Posted:
Vulnerability Management
10th Percentile
£39,800
25th Percentile
£50,000
Median
£65,000
75th Percentile
£82,500
90th Percentile
£97,350