Permanent Vulnerability Management Jobs

51 to 75 of 220 Permanent Vulnerability Management Jobs

Security Operations Manager

London Area, United Kingdom
Cynexa
Security+, AWS Security or MA Azure Security and ideally CISSP. You will be responsible for: Security Monitoring and Incident Response Threat Intelligence Security Infrastructure Management Documentation and Reporting Candidates who can show hands on experience with security tools across SIEM/EDR and vulnerability Management will be more »
Posted:

VP - Information Security

London Area, United Kingdom
Gresham Hunt
and implementing operational policies and standards. Demonstrable experience in a variety of areas such as cloud security, IAM, 3rd party risk, threat assessments and vulnerability management. Strong knowledge of cyber security architecture. Relevant certifications would be beneficial (e.g. TOGAF, SABSA). Ability to interact with and challenge technical teams more »
Posted:

Cyber Security Consultant - CISSP, Nessus, Rapid7, Sentinel

London Area, United Kingdom
InfraView - Specialist Cloud & IT Infrastructure Technology Recruitment
real-world experience. Worked on a Managed Security Service previously. Previous experience of working as a Cyber Security Consultant across multiple customers. Microsoft stack, vulnerability management tools (Nessus and Rapid 7), EDR platforms, SIEMs. Previous experience of delivering security projects, including implementation and post- implementation support, providing guidance … and support to customers throughout. Experience of overseeing and leading remediation of security assessments, technical testing, and vulnerability analysis including Cyber Essentials, Cyber Essentials Plus, and NIST CSF. Responsibilities: Deliver the technical and advisory aspects of our Managed Security Service across the customer base. Join security incident response calls more »
Posted:

Senior Cyber Security Operations (SOC Lead)

United Kingdom
Milestone Technologies, Inc
on different aspects such as source/destination addresses, usernames, and process names) Demonstrable comprehension of Information Security including malware, emerging threats, attacks, and vulnerability management A sound understanding of TCP/IP and networking concepts Understanding of network design principles with and knowledge of the OSI model. more »
Posted:

DevSecOps Engineer

England, United Kingdom
Hybrid / WFH Options
Ada Meher
software and infrastructure security best practices and implementations. You'll also be pivotal in helping gear toward another successful ISO27001 audit and automating security vulnerability management. You'll need demonstrable experience in a similar DevSecOps role; with experience in AWS, Docker/Kubernetes, and Security implementation. Responsibilities Develop DevSecOps … AWS (Accreditations a huge bonus) Demonstrable level of experience with Cyber Security experience (security concepts, practices, and technologies, such as access control, encryption, and vulnerability management) Experience with software security and development practices and implementations Python, Bash, or PowerShell Security certification such as CISSP, CEH, OSCP We understand more »
Posted:

Cyber Security Engineer

Gloucestershire, England, United Kingdom
F5 Consultants
the team on a full time, permanent basis. You will be leading and delivering crucial projects for their clients including Risk Assessments, Security Controls, Vulnerability Management, acting as their Security Subject Matter Expert. Key requirements: 🟢 Previous background working within the Public/Defence sector 🟢 Strong understanding of Network more »
Posted:

Senior Security Engineer

London Area, United Kingdom
Hybrid / WFH Options
Talented Recruitment Group
you do it for? Would like to do this with well recognised eCommerce brand where you get the opportunity to lead programs across across vulnerability management? You could even tell your friends about it and they would at least know exactly who you work for. You'll get more »
Posted:

Cyber Security Expert - Benelux

Dordogne, France
Seargin
assessment, guidance on residual risk and mitigation strategies, application of security design patterns and best practices, etc. You will be responsible for providing assurance, management and control of cyber security and enhancing our Security posture in Serco Europe entities by staying abreast of the latest cyber security trends, threats … stakeholders interpret the results of the tests and audits, as well as supporting the implementation of any remedial actions, where required Highly engaged in vulnerability management activities across Serco Europe (such as identification, reporting and mitigation/resolution) to reduce risk of exploit Contribute to on-going Security … our standard operating procedures, approaches, and protocols remain appropriate and align to Cyber Security best practice and Serco's policies and standards Production and management of the Security KPI's including driving improvements of the KPI's In return, we offer a friendly, supportive and professional environment that respects more »
Employment Type: Permanent
Salary: EUR 100,000 Annual
Posted:

Threat and Vulnerability Lead

City of London, Langbourn, United Kingdom
Xpertise Recruitment
Xpertise are working with a client in the Insurance industry who are searching for a talented Threat and Vulnerability Lead to join their team. Job Title: Threat and Vulnerability Lead Salary: £75,000 - £90,000 Location: 3 days a week in Central London office About the role: You … Security teams to assess the vulnerabilities and reduce the Cyber related risks. My client is looking for people with the following skillset: - Familiarity with vulnerability scanning and detection technologies. - Familiarity with MITRE ATT&CK framework - Excellent ability to present information and results to the business - Pen testing experience Key … responsibilities in this role will include: - This role will involve working closely with the Enterprise Security team - Great understanding of Threat and vulnerability management practises - Working closely with, and reporting into the BISO If keen please apply more »
Employment Type: Permanent
Salary: £75000 - £90000/annum
Posted:

SOC Manager

City of London, London, United Kingdom
Adecco
Center (SOC) team. Your role will involve managing both external and internal SOC personnel, overseeing security monitoring and analysis, incident response, threat intelligence, and vulnerability management activities. Key Responsibilities: Act as the subject matter expert on SOC matters for the organization. Manage the external SOC team and a more »
Employment Type: Permanent
Salary: £85000 - £90000/annum
Posted:

Cyber Security Engineer (IT digital systems)

South East, United Kingdom
Hudson Shribman
Engineer role will support the systems and applications that deliver enterprise security services for a global organisation. With a focus on identity and access management, the Security Engineer will provide expert knowledge to support the planning, design, development, and deployment of centralized IAM and PAM solutions and the delivery … of the enterprise-level Privileged Access Management program. The role will also support the implementation and management of all cyber security technologies and services in use at the company Role & Accountabilities Provide expert knowledge and act as a subject matter expert on key principles of (IAM) with an … in-depth knowledge in the areas of authentication and authorization systems, identity lifecycle management, and identity governance. Build the IAM strategy, and ensure its implementation is a success across the business. Staying up-to-date on current IAM threats and industry solutions, and ensuring IAM measures are appropriate. Support more »
Employment Type: Permanent
Salary: £49000 - £61000/annum
Posted:

Security Engineer

Greater London, England, United Kingdom
Hybrid / WFH Options
Franklin Fitch
are looking for an enthusiastic and innovative IT Security Engineer. Security Engineer main responsibilities will include, but are not necessarily limited to, the following: Vulnerability Management o Take lead on the daily vulnerability management activities, including but not limited to application vulnerability and infrastructure vulnerability assessments. o Manage prioritisation of vulnerabilities through a risk-based approach, to meet patch management policies, regulatory compliance, and audit findings. o Management and configuration of vulnerability management tools (Microsoft Azure and Qualys) o Support the InfoSec function in proactively identifying and leveraging threat intelligence … sources to inform strategic vulnerability mitigation measures. Threat Management o Take lead on the daily threat management activities o Maintain and update incident response playbooks and automation o Monitor security dashboards and reports for alerts and threats o 2nd line support to IT Service Desk for cyber more »
Posted:

Cyber Risk Specialist

London Area, United Kingdom
Locke and McCloud
assessing, managing, and mitigating cyber risks, manage various vendor and third-party supplier relationships, and act as a key point of contact when overseeing vulnerability management and incident response processes. This role requires a deep understanding of cyber risk, stakeholder and vendor management skills, and expertise in … vulnerability management and incident response processes. Main responsibilities: Conduct cyber risk assessments to identify vulnerabilities and threats. Analyse existing security measures and recommend enhancements to mitigate identified risks. Collaborate closely with internal stakeholders across various departments to understand their unique cybersecurity needs and requirements. Evaluate third-party vendors … and assess their cybersecurity practices to ensure they meet our clients security standards. Implement and oversee vulnerability management processes to proactively identify and remediate security vulnerabilities. Coordinate with relevant teams to prioritise and address vulnerabilities. Develop and maintain incident response plans and procedures to effectively respond to cybersecurity more »
Posted:

Security Architect

Reading, England, United Kingdom
Hybrid / WFH Options
Vallum Associates
experience in Cybersecurity. Responsibilities Help develop an Enterprise Security Architecture Framework, including patterns for identity & authentication, authorization and access control, cryptographic key and certificate management, auditing and security monitoring, data leakage prevention, privacy enhancement & protection and other standards in alignment with Enterprise Architect platforms. • Establish metrics and monitoring to … Strong knowledge of IT infrastructure, IP networking, security best practices, and automation technologies. • Application security: including but not limited to: authentication, identity and access management, auditing, use of cryptography, data security, privacy enhancing technologies, web services security, OWASP, threat & vulnerability management and secure code development methodologies. • Infrastructure … security, device security, VPNs & SSLs, secure file transfers, security event monitoring, malware security and cyber security. • Operational security: including but not limited to: incident management, change & patch management, data centre & physical security, backups, DR & BCP, outsourcing, managed services, cloud computing, asset management, cryptographic keys & certificate management more »
Posted:

Technology Manager

Glasgow, Scotland, United Kingdom
Hybrid / WFH Options
Gen+
strong technical skills and a great customer service approach. You will have a good understanding of platform operations, integrations and surrounding technology (preferably Learning Management Systems), knowledge around cloud hosting and be able to use SQL to create custom reports. What you will be doing LMS/Platform Administration … monitor school sync systems (Includes Glow/RM and Xporter sync systems) Maintain/Develop the platform staging site for testing, demos, etc. Bug Management – Collate information, document, test and raise bugs with the development partner using Jira Maintain progress Reports for the education team – utilising PowerBI Build light … team around Educational technology, LMS/Platform functionality, accessibility and general technology Prepare reports for CEO, COO and wider Gen+ team IT and Security management Maintain the platform DPIA/Risk Assessment process – feeding into the Risk Register DNS record and certificate management relating to platform Manage GitHub more »
Posted:

Data & AI Platforms Security Engineer

London Area, United Kingdom
Hybrid / WFH Options
KPMG UK
to ensure the implementation of security processes aligns KPMG’s security frameworks, policies, standards, whilst collaborating with other security teams in areas such as vulnerability management, and incident management. In this delivery-focused Security Engineer role, you will have the exciting opportunity to manage multiple workstreams simultaneously. Your … doing? Develop, document, and maintain Platform security processes and plans per KPMG’s trust and verify framework. Support in the development/design and management of Product/Platform security processes and automated tooling that prevent security issues. Lead on threat modelling exercises for our products. Perform security-focused … code reviews. Prioritise and oversee vulnerability remediation. Manage the implementation of logging and integration to the corporate SIEM for SOC monitoring. Lead Clara’s response to incidents and risks raised by the SOC. What will you need to do it? Excellent understanding of security controls within Azure environments Previous more »
Posted:

Senior Principal Security Researcher

Reading, England, United Kingdom
Hybrid / WFH Options
Oracle
the thousands of servers supporting our cloud services. Other responsibilities include: Designing and evaluating complex systems for security Scope and execute security assessments and vulnerability research Perform in-depth security assessments using results from static and dynamic analysis Create testing tools to help engineering teams identify security-related weaknesses … IT security in one or more of the following areas: software/product security assessments, penetration testing, red teaming, web application assessments Interest in vulnerability research and exploit development Demonstrable experience in designing and evaluating complex systems for security Aptitude for self-study, setting and achieving long term goals … for example, learning an unfamiliar programming language) Ability to effectively assess and communicate risks and appropriate levels of urgency to management and engineering staff Excellent organizational, presentation, verbal, and written communication skills This role does not require access to a cleared work environment. Security clearances are not required, and more »
Posted:

Senior Security Analyst

London Area, United Kingdom
Hybrid / WFH Options
Korn Ferry
to contain and remediate security incidents. Threat Intelligence Keep up to date with latest trends in cybersecurity threats, vulnerabilities, and best practices. Security Infrastructure Management Assist with the maintenance of existing security tools and technologies, such as SIEM, EDR and firewalls. Contribute to the selection of new security tools. … Documentation and Reporting Create and maintain detailed documentation of security processes and procedures. Generate regular reports on security metrics, incidents, and trends for management review. Collaboration and Communication Work closely with other IT teams to identify and remediate security vulnerabilities. PROFESSIONAL EXPERIENCE/QUALIFICATIONS/SKILLS Hands on experience … with security tools such as SIEM/EDR and vulnerability Management. Proven experience in a security operations role. In-depth knowledge of cybersecurity principles, threat landscapes, and attack vectors. Experience working in a large, multinational, complex company. Good knowledge of infrastructure concepts – such as Windows/Linux, DNS, AD more »
Posted:

Tier 2 VAT Analyst

Bluemont, Virginia, United States
Leidos
Description Department of Homeland Security (DHS), Federal Emergency Management Agency (FEMA) Security Operations Center (SOC) is a US Government program responsible to prevent, identify, contain and eradicate cyber threats to FEMA networks through monitoring, intrusion detection and protective security services to FEMA information systems including local area networks/… information systems, and collects, investigates, and reports any suspected and confirmed security violations. The VAT Analyst will be assisting with the Enterprise Information System Vulnerability Management (ISVM) compliance validation, execute Vulnerability Scans and will conduct vulnerability assessments of IT systems. Perform research on current vulnerabilities, support … Incident Response and SOC functions as related to vulnerabilities. Will be responsible for authoring security advisories. Basic Qualifications: Expertise and experience conducting assessments and vulnerability scans against web, database, operating system, wifi and network devices using DHS CDM vulnerability scanning tool suites. Experience customizing and maintaining scan polices more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Space Force Cybersecurity Policy Expert

Odenton, Maryland, United States
Leidos
with multiple mission partners to deliver tailored Cybersecurity Service Provider (CSSP) solutions to USSF components. Workload will encompass Protective Domain Name Services, Attack Surface Management and Threat Intelligence Collaboration activities. Primary Responsibilities: Document and execute policies compliant with DoD, USSF, NSA, NISSPOM, and NIST Special Publications. Promote rigorous awareness … develop policy, programs, and guidelines for implementation. Interpret and apply applicable laws, statutes, and regulatory documents and integrate into policy. Develop and disseminate Cybersecurity Vulnerability Management alerts, bulletins, and Security Technical Implementation Guides (STIGS). Analyze unit host systems for indicators of Malicious Cyber Activity (MCA), Insider Threat … or lack of Defensive Cyber Operations best practices, document and report findings, and help implement risk mitigating corrective actions. Oversee Risk Management Framework (RMF) management and execution activities. Perform cyber threat analysis and reporting on information derived from various intelligence sources. Conduct Information Assurance and Cyber Defense training more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security Vulnerability Manger

Slough, England, United Kingdom
iFindTech Ltd
Job Overview: Join a dynamic and high-performing team as a Senior Analyst in Vulnerability Management & Security Testing. This role offers the unique opportunity to enhance a best-in-class Threat Defence capability and make significant contributions to our security operations. Ideal candidates will bring a strong background … in threat management, vulnerability assessment, and security testing, aiming to drive innovation and excellence in our security practices. Key Responsibilities: Conduct thorough vulnerability assessments across various platforms, including networks, systems, applications, and devices. Analyze risks associated with vulnerabilities, provide detailed reporting, and recommend actionable remediation strategies. Work … across IT, IoT, and OT environments. Coordinate and oversee remediation efforts to ensure timely and effective resolution of security vulnerabilities. Requirements: Extensive experience in vulnerability management and remediation, including hands-on experience with vulnerability scanning tools. Good knowledge of Exabeam, Tenable.io and Tenable.sc would be considered a more »
Posted:

Security Risk Manager

Greater London, England, United Kingdom
Locke and McCloud
Cyber Security function. Our client is looking for candidates who have a proven track record in managing security risks associated with third-party vendors, vulnerability management, stakeholder engagement, and remediation efforts. This role requires a deep understanding of cybersecurity principles, strong communication skills, and the ability to collaborate … effectively across various departments and external partners. Main responsibilities: Manage and oversee all aspects of third-party vendor security risk management, including assessment, monitoring, and mitigation strategies. Develop and implement third-party risk management programs to ensure compliance with regulatory requirements and industry best practices. Conduct regular risk … vulnerabilities and track progress to resolution. Establish and maintain effective communication channels with stakeholders to provide updates on security risks and mitigation efforts. Lead vulnerability management activities, including the identification, prioritisation, and remediation of security vulnerabilities across our client and their vendors and suppliers. Work with various teams more »
Posted:

Threat and Vulnerability Manager

London Area, United Kingdom
Gresham Hunt
Threat & Vulnerability Manager London – Hybrid Salary: DoE Gresham Hunt is currently partnered with a leading financial services client in the search for an experienced Vulnerability Management professional for their London based team. This is an exciting opportunity to help drive the vulnerability management programme as … part of the global technology team. The successful candidate will have: 8 years experience across different technical disciplines within the Cybersecurity landscape. Experience using vulnerability scanning tools such as Nessus, Qualys, Rapid7, Wiz, OpenVAS, and penetration testing frameworks like Metasploit. Knowledge of security and risk frameworks, plus regulatory compliance … frameworks e.g. NIST, Cobit, ISO 27001. Understanding of OWASP, MITRE, CVSS and other standards/frameworks relevant to application security and vulnerability management. Experience with cloud technologies, preferably Azure and AWS. Familiarity with security methodologies: Attack and Defensive, Threat Hunting, etc. Scripting experience would be beneficial i.e. Python, Shell more »
Posted:

Senior SOC Analyst

London Area, United Kingdom
Hybrid / WFH Options
CLS Group
and services to ensure that CLS is equipped with appropriate industry best tools and solutions Operational Operate and maintain controls related to SIEM, DLP, Vulnerability Management, DLP, Cyber Threat Intelligence, Endpoint Protection, etc with an emphasis on cloud deployments and implementations. Conduct IT Security risk assessments for all … help design, implement and maintain security Prepare for, identify (hunt) and remediate cyber threats Operate and maintain IT Security controls related to SIEM, DLP, Vulnerability Management, Cyber Threat Intelligence, DLP, Endpoint Protection, etc. Participate in an on-call rotation to act as an escalation point for events requiring … collaborate effectively with others to drive forward key security objectives Strong documentation and report writing skills (to both technical and business audiences) Excellent time management and organizational skills combined with technical IT Security acumen Expert knowledge of Firewalls, TCP/IP, IPS, DLP, proxies, SIEM, & Endpoint Protection software Financial more »
Posted:

Head of Microsoft Security

London Area, United Kingdom
InfraView - Specialist Cloud & IT Infrastructure Technology Recruitment
leading and developing a team of Cyber Security experts. Building, maturing and providing Security services to multiple customers in multiple sectors. This is a management position but this person must also be able to lead from the front from a technical perspective. We need a “people manager” as well … business is excited about the value this person can add. You will provide insights and guidance to customers as a vCISO as well as vulnerability management, major incident response, and security monitoring improvements and be expected to demonstrate technical expertise in Audit, Assessments, Design, Implementation, Testing, Compliance and … SC-200, AZ-500, MS-500). Technical knowledge and broad hands-on experience of working with security technologies such as the Microsoft stack, vulnerability management tools, SIEMs including Sentinel. Previous experience of delivering security projects Experience of overseeing and leading remediation of security assessments including Cyber Essentials more »
Posted:
Vulnerability Management
10th Percentile
£39,900
25th Percentile
£50,000
Median
£65,000
75th Percentile
£84,375
90th Percentile
£97,500