Permanent Vulnerability Management Jobs

26 to 50 of 221 Permanent Vulnerability Management Jobs

Security Analyst

Doncaster, South Yorkshire, Yorkshire, United Kingdom
Forward Role
24x7x365. The successful candidates will work in the Security Operations Centre on both reactive and proactive security engagements with regards to Security Information & Event Management (SIEM), Intrusion Detection Systems (IDS), Cyber Threat Intelligence (CTI) and Threat Mining (TM). Role Responsibilities Provide around the clock protective monitoring through the … Provide analytical support to other SOC team members during security incidents and Threat Mining engagements. Assistance with onboarding process - deployment of SIEM , EDR and Vulnerability Management tools Assistance with active directory administration. Assistance with firewall management. Key Skills Experience in a SOC environment Excellent communication skills and comfortable more »
Employment Type: Permanent
Salary: £30,000
Posted:

Infrastructure Engineer, Cirencester £50,000

Cirencester, Gloucestershire, United Kingdom
SR2
I'm on the lookout for an Infrastructure Engineer specialist with a strong background in cloud services and modern IT infrastructure management, specifically within the Microsoft ecosystem to join my client based just outside of Cirencester. and easily commutable from Swindon. Their office is in a beautiful location with … desktop infrastructure. Your skill set should encompass the entire Microsoft 365 Suite and MS Azure, along with a good knowledge of email security platforms, vulnerability management, and IT networking techniques as they currently work towards their Cyber essentials plus certification. They are in the process of upgrading their more »
Employment Type: Permanent
Salary: £40000 - £50000/annum
Posted:

Information Systems Security Officer

Chantilly, Virginia, United States
Leidos
in support of C&A/A& and ICD-503, NIST 800-53 security controls mappings, reporting of FISMA and reporting of Information Assurance Vulnerability Alerts (IAVA)/Intelligence Community Vulnerability Alerts (ICVA). Monitor and report on integrating and testing features and functions within the A&A … Management solution. This includes, but may not be limited to, DoD 8500.2, and NIST 800-53 Security Controls mappings; implementing updates business processes, workflow, and templates; and direct support to the government customer Handle information system Assessment and Authorizations (A&A) as well as Continuous Monitoring (ConMon) tasks. Prepare … Collaborate with cross-functional team to implement security controls and measures and provide technical guidance to team members on security-related issues. Conduct Configuration Management (CM) tasks to ensure all associated hardware, software, and security relevant functions are maintained and documented. Review system vulnerability scans, verify implementation of more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Information Systems Security Officer

Aldie, Virginia, United States
Leidos
in support of C&A/A& and ICD-503, NIST 800-53 security controls mappings, reporting of FISMA and reporting of Information Assurance Vulnerability Alerts (IAVA)/Intelligence Community Vulnerability Alerts (ICVA). Monitor and report on integrating and testing features and functions within the A&A … Management solution. This includes, but may not be limited to, DoD 8500.2, and NIST 800-53 Security Controls mappings; implementing updates business processes, workflow, and templates; and direct support to the government customer Handle information system Assessment and Authorizations (A&A) as well as Continuous Monitoring (ConMon) tasks. Prepare … Collaborate with cross-functional team to implement security controls and measures and provide technical guidance to team members on security-related issues. Conduct Configuration Management (CM) tasks to ensure all associated hardware, software, and security relevant functions are maintained and documented. Review system vulnerability scans, verify implementation of more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Information Systems Security Officer

Reston, Virginia, United States
Leidos
in support of C&A/A& and ICD-503, NIST 800-53 security controls mappings, reporting of FISMA and reporting of Information Assurance Vulnerability Alerts (IAVA)/Intelligence Community Vulnerability Alerts (ICVA). Monitor and report on integrating and testing features and functions within the A&A … Management solution. This includes, but may not be limited to, DoD 8500.2, and NIST 800-53 Security Controls mappings; implementing updates business processes, workflow, and templates; and direct support to the government customer Handle information system Assessment and Authorizations (A&A) as well as Continuous Monitoring (ConMon) tasks. Prepare … Collaborate with cross-functional team to implement security controls and measures and provide technical guidance to team members on security-related issues. Conduct Configuration Management (CM) tasks to ensure all associated hardware, software, and security relevant functions are maintained and documented. Review system vulnerability scans, verify implementation of more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Information Systems Security Officer

Sterling, Virginia, United States
Leidos
in support of C&A/A& and ICD-503, NIST 800-53 security controls mappings, reporting of FISMA and reporting of Information Assurance Vulnerability Alerts (IAVA)/Intelligence Community Vulnerability Alerts (ICVA). Monitor and report on integrating and testing features and functions within the A&A … Management solution. This includes, but may not be limited to, DoD 8500.2, and NIST 800-53 Security Controls mappings; implementing updates business processes, workflow, and templates; and direct support to the government customer Handle information system Assessment and Authorizations (A&A) as well as Continuous Monitoring (ConMon) tasks. Prepare … Collaborate with cross-functional team to implement security controls and measures and provide technical guidance to team members on security-related issues. Conduct Configuration Management (CM) tasks to ensure all associated hardware, software, and security relevant functions are maintained and documented. Review system vulnerability scans, verify implementation of more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Information Systems Security Officer

Merrifield, Virginia, United States
Leidos
in support of C&A/A& and ICD-503, NIST 800-53 security controls mappings, reporting of FISMA and reporting of Information Assurance Vulnerability Alerts (IAVA)/Intelligence Community Vulnerability Alerts (ICVA). Monitor and report on integrating and testing features and functions within the A&A … Management solution. This includes, but may not be limited to, DoD 8500.2, and NIST 800-53 Security Controls mappings; implementing updates business processes, workflow, and templates; and direct support to the government customer Handle information system Assessment and Authorizations (A&A) as well as Continuous Monitoring (ConMon) tasks. Prepare … Collaborate with cross-functional team to implement security controls and measures and provide technical guidance to team members on security-related issues. Conduct Configuration Management (CM) tasks to ensure all associated hardware, software, and security relevant functions are maintained and documented. Review system vulnerability scans, verify implementation of more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Information Systems Security Officer

Manassas, Virginia, United States
Leidos
in support of C&A/A& and ICD-503, NIST 800-53 security controls mappings, reporting of FISMA and reporting of Information Assurance Vulnerability Alerts (IAVA)/Intelligence Community Vulnerability Alerts (ICVA). Monitor and report on integrating and testing features and functions within the A&A … Management solution. This includes, but may not be limited to, DoD 8500.2, and NIST 800-53 Security Controls mappings; implementing updates business processes, workflow, and templates; and direct support to the government customer Handle information system Assessment and Authorizations (A&A) as well as Continuous Monitoring (ConMon) tasks. Prepare … Collaborate with cross-functional team to implement security controls and measures and provide technical guidance to team members on security-related issues. Conduct Configuration Management (CM) tasks to ensure all associated hardware, software, and security relevant functions are maintained and documented. Review system vulnerability scans, verify implementation of more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Information Systems Security Officer

Burke, Virginia, United States
Leidos
in support of C&A/A& and ICD-503, NIST 800-53 security controls mappings, reporting of FISMA and reporting of Information Assurance Vulnerability Alerts (IAVA)/Intelligence Community Vulnerability Alerts (ICVA). Monitor and report on integrating and testing features and functions within the A&A … Management solution. This includes, but may not be limited to, DoD 8500.2, and NIST 800-53 Security Controls mappings; implementing updates business processes, workflow, and templates; and direct support to the government customer Handle information system Assessment and Authorizations (A&A) as well as Continuous Monitoring (ConMon) tasks. Prepare … Collaborate with cross-functional team to implement security controls and measures and provide technical guidance to team members on security-related issues. Conduct Configuration Management (CM) tasks to ensure all associated hardware, software, and security relevant functions are maintained and documented. Review system vulnerability scans, verify implementation of more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Information Systems Security Officer

Springfield, Virginia, United States
Leidos
in support of C&A/A& and ICD-503, NIST 800-53 security controls mappings, reporting of FISMA and reporting of Information Assurance Vulnerability Alerts (IAVA)/Intelligence Community Vulnerability Alerts (ICVA). Monitor and report on integrating and testing features and functions within the A&A … Management solution. This includes, but may not be limited to, DoD 8500.2, and NIST 800-53 Security Controls mappings; implementing updates business processes, workflow, and templates; and direct support to the government customer Handle information system Assessment and Authorizations (A&A) as well as Continuous Monitoring (ConMon) tasks. Prepare … Collaborate with cross-functional team to implement security controls and measures and provide technical guidance to team members on security-related issues. Conduct Configuration Management (CM) tasks to ensure all associated hardware, software, and security relevant functions are maintained and documented. Review system vulnerability scans, verify implementation of more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Information Systems Security Officer

Falls Church, Virginia, United States
Leidos
in support of C&A/A& and ICD-503, NIST 800-53 security controls mappings, reporting of FISMA and reporting of Information Assurance Vulnerability Alerts (IAVA)/Intelligence Community Vulnerability Alerts (ICVA). Monitor and report on integrating and testing features and functions within the A&A … Management solution. This includes, but may not be limited to, DoD 8500.2, and NIST 800-53 Security Controls mappings; implementing updates business processes, workflow, and templates; and direct support to the government customer Handle information system Assessment and Authorizations (A&A) as well as Continuous Monitoring (ConMon) tasks. Prepare … Collaborate with cross-functional team to implement security controls and measures and provide technical guidance to team members on security-related issues. Conduct Configuration Management (CM) tasks to ensure all associated hardware, software, and security relevant functions are maintained and documented. Review system vulnerability scans, verify implementation of more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Information Systems Security Officer

Herndon, Virginia, United States
Leidos
in support of C&A/A& and ICD-503, NIST 800-53 security controls mappings, reporting of FISMA and reporting of Information Assurance Vulnerability Alerts (IAVA)/Intelligence Community Vulnerability Alerts (ICVA). Monitor and report on integrating and testing features and functions within the A&A … Management solution. This includes, but may not be limited to, DoD 8500.2, and NIST 800-53 Security Controls mappings; implementing updates business processes, workflow, and templates; and direct support to the government customer Handle information system Assessment and Authorizations (A&A) as well as Continuous Monitoring (ConMon) tasks. Prepare … Collaborate with cross-functional team to implement security controls and measures and provide technical guidance to team members on security-related issues. Conduct Configuration Management (CM) tasks to ensure all associated hardware, software, and security relevant functions are maintained and documented. Review system vulnerability scans, verify implementation of more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Vulnerability Assessment Analyst

Ashburn, Virginia, United States
Leidos
of coordination and communication. Security Clearance Required: Active/Current Top Secret clearance to be considered. Must be US Citizen. Primary Responsibilities Information Security Vulnerability Management Continuously research emerging threats to the environment in order to disseminate the information to all stakeholders, immediately assess the known environment for … presence of the vulnerability, and work with the NOSC and enterprise networking teams to proactively block exploitation within the DHS environment. Perform enterprise-wide network scans, agent scans, including credentialed scans of UNIX, Windows, Network devices, and VMware assets Develop and execute vulnerability/compliance scans through Tenable.SC … maintain scan templates based on asset types, repository, credentials, etc. in support of continuous scanning requirements for various FISMA systems Perform security compliance and vulnerability assessments, specifically developing and applying STIG or CIS baselines for various operating systems, including Windows or RHEL and CentOS Maintain, optimize, and troubleshoot scan more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Infrastructure Security Specialist

Manchester, North West, United Kingdom
Great Places
youll be doing Day to day monitoring and administration of security controls around tooling solutions and Cloud based systems such as Office 365, Azure. Management and configuration of our key security systems, Crowstrike, Rapid7, Mimecast, Azure security suite & Netskope. Monitor the GPHG security services to ensure the patching, security … controls and mechanisms are operating effectively. Investigate issues and escalate. Assist in delivering security reviews and the management of metrics to ensure confidentiality, integrity, standardisation and consolidation for ease of support and maintenance. Take ownership in obtaining information, evidence and data required to diagnose and resolve complex problems. Proactively … security, technology architecture or an infrastructure role. Experience in designing and implementing written and technical information including security policies. Experience in IT security incident management Practical knowledge of information security risks, controls and frameworks (e.g., NIST, COS or ISO27001) Experience of security withing Azure/Cloud environment, Mimecast or more »
Employment Type: Permanent
Salary: £50,000
Posted:

AWS Security Engineer

Bristol, Avon, South West, United Kingdom
Hybrid / WFH Options
Leidos Innovations UK Limited
ensure that our cloud infrastructure is secure and compliant with industry standards and regulations. You will also monitor and respond to security incidents, perform vulnerability assessments and penetration testing, and develop and maintain security policies and procedures. Responsibilities: Support the LCST Security Working Groups which require close co-operation … AWS architecture best practices and best-in-class security standards Review relevant Cyber Risk alerts/notifications and MODCERT notices, assess impact on and vulnerability of our solution, define actions to take and work with the technical teams to design, and implement mitigating solutions within required timeframes Duties may … monitoring and operating intrusion detection systems Act as IS focal point for cyber incidents and lead IS response to security incidents and alerts Conduct vulnerability assessments and support penetration testing. Develop and maintain security policies and procedures Collaborate with development and operations teams to ensure security best practices are more »
Employment Type: Permanent
Salary: £55,000
Posted:

Information Security Lead - Vulnerability Management

London, England, United Kingdom
Hybrid / WFH Options
Starling Bank
from home, that's to be agreed upon between you and your manager. About the Role We are seeking a highly motivated and experienced Vulnerability Manager to lead a growing vulnerability management team. A successful candidate will work with the team to analyse emerging vulnerabilities provided by … threat intelligence sources and penetration testing. The vulnerability manager will collaborate with various technology and engineering teams to share vulnerability findings, provide guidance, and assist through the remediation process. This person will help present this information in a simple digestible format, and coordinate remediation and mitigation efforts with … teams across remote and office locations. There will be opportunities to guide continual improvement of the vulnerability management process. Responsibilities Lead a team of information security professionals to: Assess, investigate and provide guidance on emerging vulnerabilities, incorporating information from threat intelligence sources, internal software and infrastructure scans. Collate more »
Posted:

Security Engineer

London Area, United Kingdom
Marcus Donald People
Office 365, Defender for Cloud, Defender for Cloud Apps (CASB) Preferrable: Defender for Identity, Azure MFA), IBM QROC/QRadar. Desirable: Any experience of Vulnerability Management Optimisation at scale in an enterprise environment. (e.g., Kenna. VM/Cisco Vulnerability Management, Nucleus, Rapid 7, Armis – other similar … Vulnerability Management Optimisation platforms also considered) In addition you must have Prior experience in Security Engineering and track record in carrying out technical security risk assessments. Good understanding for how to assess third-party suppliers of cloud/SaaS based technology platforms. Experience in vulnerability management optimisation (e.g., Kenna. VM/Cisco Vulnerability Management, Nucleus, Rapid 7, Armis – other similar Vulnerability Management Optimisation platforms also accepted). Data Classification and Labelling, Microsoft Purview. Bachelor's degree in a security related field is preferred (i.e., Security Analysis, Penetration Testing, Malware Analysis, Digital more »
Posted:

Cyber Risk Manager

London Area, United Kingdom
Locke and McCloud
managing cyber risks across our client and their vendors/3rd party suppliers. Our client is looking for candidates who hold strong skills in vulnerability management, vendor relationship management, incident response, and possess a deep understanding of cyber risk. Main Responsibilities: Develop and implement cyber risk management strategies, policies, and procedures. Lead vulnerability management efforts, including identifying, assessing, prioritising, and remediation of vulnerabilities. Establish and maintain strong vendor relationships to ensure third-party vendors comply with cybersecurity requirements and standards. Oversee incident response activities, including incident detection, analysis, containment, eradication, and recovery. Conduct risk … specialist to our client and their vendors. To be considered for this role, you should have: Must have a strong background in cyber risk management, vulnerability management, vendor relationship management, and incident response. Strong understanding of standards such as PCI-DSS, NIST, ISO27001, GDPR, and similar. more »
Posted:

Cyber Security Vulnerability Manager

Cardiff, Wales, United Kingdom
Hybrid / WFH Options
Intaso
Interviews available immediately Intaso’s long standing client are seeking a dynamic individual to join their Security Operations team as the Security Vulnerability Manager, a pivotal role within their organization. This position will focus on identifying, monitoring, analysing, and facilitating the remediation of vulnerabilities across their systems. Key Responsibilities … Develop and document a comprehensive vulnerability management strategy aligned with stakeholder and business need Create intuitive reporting and dashboarding mechanisms to convey threat and risk profiles associated with vulnerabilities to stakeholders Ensure regular vulnerability scans cover all IT and OT assets, maintaining up-to-date coverage. Collaborate … with IT and OT asset owners to execute vulnerability and compliance scans in a controlled manner. Partner with both technical and non-technical stakeholders to devise effective mitigation plans for identified vulnerabilities. Lead cross-functional teams in responding to high-risk or complex vulnerabilities, leveraging technical expertise. Stay informed more »
Posted:

Senior Infrastructure Security Engineer

London, England, United Kingdom
Hybrid / WFH Options
Ripple Labs Inc
and strategic related issues related to information security systems and services Collaborate with product owners and engineering teams to ensure smooth transition of the Vulnerability Management technologies into production and ensure maximum visibility into a variety of environments Work closely with engineering to identify opportunities for automation eliminating … service available across AWS, GPC and other public cloud providers Responsible for maintaining current versions of functionalities and technologies in production by effecting change management processes Proactively participate in compliance support activities such as trainings, audit prep, playbook authoring and ensure business as usual (BAU) activities are completed accurately … Familiarity with the CIS benchmarks and how to monitor and remidiate deficiencies Experience in Cloud Computing like AWS, GCP with emphasis on Cloud Baseline management tools like Lacework Experience in Information Security frameworks and best practices for Vulnerability management, Risk Analysis, Reporting Metrics and Assessments Problem solving more »
Employment Type: Technology
Posted:

Information Technology Security Specialist

Aberdeen, Scotland, United Kingdom
Hybrid / WFH Options
prosource.it
leads to the creation of high quality, secure by design, project deliveries. Examples of projects: Secure Internet Access Privileged Remote Access VPN consolidation Information Management (Records Management & Data Governance) Infrastructure Road Mapping Security Email Gateway Identifying security related risk from projects and leading risk assessment processes Identify divergences … deliveries Technical Experience: Security Risk Assessment Network Architecture Principles Web & email security technologies Reviewing and assessing security policy configuration within cloud environments (preferably Azure) Vulnerability Management and Security logging and monitoring tools Cloud Virtualisation and Containerisation security assessments and review Edge Security Technology, IAM, PAM Data Security and … governance Network Monitoring Tools and SIEM Technology Risk Management Tools Ability to act proactively, escalating issues as required Strong documentation and communication skills (verbal and written) Excellent problem-solving skills Strong knowledge and experience of IT change management processes and principles Willingness to stay up to date on more »
Posted:

Head of Information Security

Reading, England, United Kingdom
Hybrid / WFH Options
Project People
the Confidentiality, integrity and availability of information systems are maintained to protect Customer, corporate and 3rd party data. You will have responsibility for the management of the CERT function as well as responsibility for the management of the SEIM and SOC Partners. Responsibilities Creation and maintenance of Information … Security processes and procedures to support business policies and operations. Provide leadership and management of Information Security Operational teams to ensure efficient and effective, proactive and reactive security monitoring and defense across information assets. Ensure regular KPIs are developed and maintained and identify areas for improvement and make recommendations … is maintained and in-line with compliance and regulation. Act as an escalation point for Information Security Incidents, changes and problems. Responsibility for IDAM management and control. Production of Risk Landscape documentation in conjunction with the Information Security Risk functions and other colleagues. Technical Experience Minimum 5+ years commercial more »
Posted:

Information & Cyber Security Analyst - Financial Services - £50,000-£70,000 + Bonus

London Area, United Kingdom
Hybrid / WFH Options
Hunter Bond
and compliance Detecting any issues or security breaches across global infrastructure Monitoring of devices and infrastructure, including reporting Investigating potential threats and issues Risk management and analysis Utilising tooling such as packet inspection and security forensics to resolve and report issues Security & Best Practice Working with various other Security … Mitigating Information and Cyber based risks Identifying potential threats and risks Assisting with resolution of incidents Incident response and threat hunting Working with threat management frameworks Threat intelligence and continuous improvement Security monitoring and traffic analysis Vulnerability management You will advise on Security best practices, and act more »
Posted:

Senior Security Engineer

London Area, United Kingdom
Caspian One
. Ability to develop and implement strategies for compliance with data protection regulations. Knowledge and experience in security technologies such as EDR, SIEM, and Vulnerability Management is a plus. Relevant security certifications (CISSP, GCIA, CISM, etc.) and/or product certifications (Azure, Windows, AD, etc.) are desirable. This more »
Posted:

SOC Engineer

Doncaster, England, United Kingdom
Lorien
On-Site About Our Client: Our client is an award-winning provider of Security Services, specializing in market-leading Cyber Security Services such as Vulnerability Management, Information Security, PCI-DSS, Penetration Testing, Managed Security Services, and Security Consultancy. With their fully managed Security Operations Centre (SOC), they are more »
Posted:
Vulnerability Management
10th Percentile
£39,900
25th Percentile
£50,000
Median
£65,000
75th Percentile
£84,375
90th Percentile
£97,500